Category Archives: China’s Informatization – 中國信息化

Communist China’s Emphasis On the Evolution of Warfare

共產中國對戰爭演變的重視

2019年12月12日10:20 | 資料來源:解放軍報

現代英語:

What is the driving force behind the evolution of war forms, and what laws can be followed? To answer this question well and analyze the evolution trend of contemporary war forms, we should first start from the characteristics of the times, grasp the social motivations that promote its development from an overall perspective, and then examine the breadth, depth, magnitude, and intensity of the effects of various influencing factors, so as to make scientific judgments. At present, human society is in a historical period where the scientific and technological revolution, industrial revolution, and military revolution are strongly intersecting, and the war forms and combat methods are likely to undergo subversive changes.

A new round of global technological revolution is the fundamental driving force behind the evolution of contemporary warfare

Science and technology is a revolutionary force that has played a driving role in history. It is also the original driving force for the development of war and the basic basis for understanding the development of war. Engels once pointed out: “Once technological advances can be used for military purposes and have been used for military purposes, they will immediately and almost forcibly, and often against the will of the commander, cause changes or even revolutions in the way of warfare.” At the beginning of this century, the scientific community predicted that the “scientific silence” has lasted for more than 60 years since the second half of the 20th century, and the historical cycle of technological revolution is approaching. In recent years, a new round of scientific and technological revolution is ready to take off. Original breakthroughs in some major scientific issues such as the structure of matter, the evolution of the universe, the origin of life, and the nature of consciousness are opening up new frontiers and new directions. Some major disruptive technological innovations are creating new industries and new formats. Information technology, biotechnology, manufacturing technology, new material technology, and new energy technology have penetrated into almost all fields, driving a major collective technological change characterized by green, intelligent, and ubiquitous. The military field is the most sensitive field to the development of science and technology. Every major scientific and technological progress and innovation will cause a profound change in the form of war and the way of warfare. With the brewing of a new round of scientific and technological revolution, emerging strategic military technologies, especially disruptive military technologies, are emerging in a concentrated manner, and the driving force for military development is unprecedentedly strong. At present, the “perception revolution” caused by the Internet of Things technology, the “computing revolution” caused by cloud computing, the “prediction revolution” caused by big data, the “communication revolution” caused by quantum technology, the “material revolution” caused by nanotechnology, the “behavior revolution” caused by artificial intelligence technology, and the “strike revolution” caused by military aerospace, new aviation, electromagnetic launch, directed energy weapons, deep-sea development, unmanned combat systems, and smart ammunition are developing in a coordinated manner, converging and integrating, accelerating the comprehensive reshaping of combat means, showing unprecedented transformation and subversion, and becoming the “first driving force” for the evolution of war forms and combat methods.

Global strategic adjustments and intensified competition among major powers provide the background for the evolution of contemporary warfare

At present, the international situation is at a new turning point. Various strategic forces are accelerating their differentiation and combination, and the international system has entered a critical period of accelerated evolution and profound adjustment. The collective rise of emerging market countries and the accelerated rise and fall of international strategic power have posed a great impact on the international governance structure dominated by the West. Hegemonism and power politics are becoming increasingly unpopular. The social economy and comprehensive national strength of the West, represented by the United States, have grown slowly, and the internal centripetal force and cohesion have declined. Many populists have risen, politics have turned right, and social contradictions have surged. Under the general trend of gradually losing comprehensive advantages, some countries rely more on military means. After Trump came to power, he significantly increased the defense budget under the condition of tight financial resources. The budget for fiscal year 2018 was US$692 billion, an increase of more than 10%; the total amount of the Department of Defense’s proposal for fiscal year 2019 reached US$716 billion, an increase of 12% over the application for fiscal year 2018. The new US national security strategy clearly lists Russia and China as strategic competitors. Moreover, the U.S. military has a tradition of seeking absolute military superiority through technological advantages. It is currently promoting a military transformation with intelligence as the main direction. The fundamental purpose is to use artificial intelligence, a disruptive technology that “changes the future war situation”, to reshape the military system, seek to form a new generation gap, seize the initiative in future wars, obtain the “core competitiveness” of the 21st century, and ensure the absolute military superiority of the U.S. military in the next few decades. The U.S. military’s approach will inevitably stimulate the military of other countries to take preventive measures and intensify military competition. The extensive and profound development and changes in the military field must be “one of the important contents of the world’s great development, great change, and great adjustment”, providing a strong impetus for the evolution of war forms and combat methods.

A new round of industrial revolution lays a new social foundation for the evolution of contemporary warfare

The scientific and technological revolution leads to the industrial revolution, which triggers the reshaping of the material production base and social organization. War and military are human practices rooted in the social production base. The arrival of a new round of industrial revolution will provide new support for the new military revolution and the evolution of war. At present, the integration of new generation information technologies such as big data, cloud computing, and mobile Internet with robots and intelligent manufacturing technologies is accelerating, the chain of scientific and technological innovation is more flexible, technology updates and results transformation are faster, and industrial renewal is accelerating, making social production and consumption shift from industrialization to automation and intelligence. Social productivity will be greatly improved again, and labor productivity will achieve a big leap. Germany’s Industry 4.0, the United States’ “re-industrialization”, and the corresponding policies of other major countries will promote the arrival of a new round of industrial revolution and promote the comprehensive spread of scientific and technological revolution from the technical field to the entire economic field and even the entire society. In the military field, the traditional “waterfall-type” sequential R&D model of weapons and equipment will be replaced by an intelligent, real-time, personalized, and collaborative parallel R&D model, which will greatly shorten the R&D production cycle and improve efficiency. New production tools and production methods will also greatly improve the production efficiency of weapons and equipment. For example, the benefits of digital manufacturing exceed those of traditional methods by more than an order of magnitude; the raw materials required by 3D printing technology are only one-tenth of the original, the production efficiency is doubled, the cycle is doubled, and the energy consumption is far lower than the traditional method. The new round of industrial revolution will greatly improve the efficiency of research and development, production and procurement of war tools, accelerate metabolism, and provide social and material support for the rapid evolution of war forms.

Forward-looking military theories provide powerful catalysts and guidance for the evolution of contemporary warfare

Military theory and military technology are known as the “twin engines” of military development, and they are also a strong driving force for the evolution of war forms. At present, the speed of innovation of war and combat concepts in major countries in the world is accelerating, and the innovation intensity is unprecedented. They have made forward-looking outlines and designs for future war forms, guiding the development of war and the direction of military construction. The US military has always attached great importance to the guidance of military theory, and even proposed that “one theory guides one war, and one war eliminates one theory.” In recent years, the US military and academic circles have successively proposed a series of innovative strategies and combat concepts, which are dazzling. For example, in 2009, Air Force Chief of Staff Schwartz and Navy Chief of Operations Roughead jointly signed a memorandum proposing the “Air-Sea Battle” concept; in January 2015, the U.S. Department of Defense announced that it would replace the “Air-Sea Battle” concept with “Global Public Domain Intervention and Joint Mobility”; in November 2014, then-U.S. Secretary of Defense Hagel clearly proposed the “National Defense Innovation Initiative” with the third “offset strategy” as its connotation to accelerate the military transformation of the U.S. military; in 2012, the U.S. Joint Chiefs of Staff proposed the concept of “joint electromagnetic spectrum operations” in the “JP3-13.1 Joint Electronic Warfare Ordinance”; in 2014, a U.S. think tank launched “Robots on the Battlefield II – Clusters of the Future”, proposing “UAV swarm operations” ” concept; since 2013, retired US Air Force Lieutenant General DePutula and others have successively proposed a series of concepts such as “combat cloud”, “combat cloud”, “campaign cloud” and “cloud combat”; in early 2015, the US Navy surface ship force proposed the “distributed lethality” combat concept; in October 2016, the US Army Association proposed “multi-domain warfare” and officially included it in the Army’s regulations in November of the same year; in April 2017, Robert Walker, former Deputy Secretary of Defense of the United States, proposed the concept of “algorithmic warfare”, which is essentially an “intelligent +” war based on artificial intelligence… These war and combat concepts are both joint and military, both strategic and tactical and technical, and many have been incorporated into regulations, entered into practice and research and development. For example, the third “offset strategy” attaches great importance to artificial intelligence and autonomous capabilities, incorporates them into the combat network, attempts to make “unmanned and autonomous systems play a core role” and usher in “war in the robot era”, and envisions the full realization of intelligence in combat platforms, information systems and command and control by 2050, thereby forming a new overwhelming technological advantage. These innovative theories will have a strong and lasting impact on the development direction of future war forms and combat methods.

New war practices provide a stage for exploring paths for the evolution of contemporary war forms

Entering the new century, especially in recent years, some new changes have occurred in human war practice, from which we can see some clues of the evolution of future war forms. For example, on the land battlefield, cluster warfare with ground unmanned systems as the main body has entered the battlefield and has begun to show its edge. At the end of 2015, the Russian army used the “Andromeda-D” automated command system in Syria to command 6 “Platform-M” and 4 “Argo” combat robots. With the support of self-propelled artillery groups and several drones, it carried out the world’s first ground combat with combat robot clusters as the main body and successfully completed the combat mission. For example, from the evening of January 5 to the early morning of January 6, 2018, Syria time, the Russian Khmeimim Air Force Base and Tartus Naval Base in Syria were attacked by 13 drones of Syrian militants. The Russian army responded with electronic attacks and firepower strikes in time, successfully controlled 6 drones, and another 7 drones were destroyed by the Russian air defense forces. In addition, through “pre-practice”, it can also be used to rehearse and preview the future war forms and combat methods in advance. For example, in April 2017, the Defense Advanced Research Projects Agency (DARPA) of the U.S. Department of Defense jointly held the Military Academy Swarm Drone Challenge with the Air Force Academy, West Point Military Academy, and the Naval Academy, exploring and testing key technical tactics and related tactics of drone swarms. In the recent practice and pre-practice of many related wars, the embryonic form of future warfare is taking shape and growing.

國語中文:

引言

戰爭形態演進的動力是什麼,有什麼規律可循?回答好這個問題,分析當代戰爭形態演進趨勢,首先應從時代特徵出發,對推動其發展的社會動因從整體上加以把握,繼而考察各類影響因素作用的廣度、深度、幅度、烈度,從而作出科學判斷。目前,人類社會正處於科技革命、產業革命與軍事革命強勢交會的歷史時期,戰爭形態和作戰方式很可能發生顛覆性變化。

新一輪全球科技革命是當代戰爭形態演進的根本動因

科學技術是一種在歷史上起推動作用的革命性力量,也是推動戰爭發展的原始動力和認知戰爭發展的基本依據。恩格斯曾指出:「一旦技術上的進步可以用於軍事目的並且已經用於軍事目的,它們便立刻幾乎強制地,而且往往是違反指揮官的意志而引起作戰方式上的改變甚至變革。」在本世紀初,科學界就預測,自20世紀下半葉以來「科學的沉默」已達60餘年,迫近爆發技術革命的歷史週期。近年來,新一輪科技革命蓄勢待發,物質結構、宇宙演化、生命起源、意識本質等一些重大科學問題的原創性突破正在開闢新前沿新方向,一些重大顛覆性技術創新正在創造新產業新業態,資訊科技、生物技術、製造技術、新材料技術、新能源技術廣泛滲透到幾乎所有領域,帶動了以綠色、智慧、泛在為特徵的群體性重大技術變革。軍事領域是對科技發展最敏感的領域,每一次重大科技進步和創新都會引起戰爭形態和作戰方式的深刻變革。隨著新一輪科技革命的醞釀形成,新興的戰略性軍事技術特別是顛覆性軍事技術正在集中湧現,對軍事發展的推動力空前強勁。當前,物聯網技術引發的“感知革命”,雲端運算等引發的“計算革命”,大數據引發的“預測革命”,量子科技引發的“通信革命”,奈米技術引發的“材料革命”,人工智慧技術引發的“行為革命”,以及軍事航太、新型航空、電磁發射、定向能武器、深海開發、無人作戰系統、智慧彈藥等引發的“打擊革命”,協同發展、匯聚融合,正在加速作戰手段的全面重塑,展現出空前的變革性與顛覆性,成為戰爭形態與作戰方式演進的「第一推動力」。

全球戰略調整與大國競爭加劇為當代戰爭形態演進提供時代背景

目前,國際情勢正處於新的轉折點,各種戰略力量加速分化組合,國際體系進入加速演變和深刻調整的關鍵時期。新興市場國家群體性崛起,國際戰略力量對比消長加快,對西方主導的國際治理格局構成極大衝擊,霸權主義和強權政治越來越不得人心。以美國為代表的西方社會經濟和綜合國力成長緩慢,內部向心力凝聚力下降,多國民粹抬頭、政治右轉、社會矛盾激增。在綜合優勢逐漸喪失的大趨勢下,一些國家對軍事手段更加倚仗。川普上台後,在財力吃緊的情況下大幅增加國防預算。 2018年財政年度預算為6,920億美元,增幅10%以上;2019財年國防部提案總額達7,160億美元,比2018財年申請金額增加12%之多。美國新國家安全戰略,明確將俄羅斯、中國列為戰略競爭對手。而且,美軍素有透過技術優勢謀求絕對軍事優勢的傳統,目前正在推動一場以智慧化為主要方向的軍事變革,根本目的是利用人工智慧這項「改變未來戰局」的顛覆性技術重塑軍事體系,尋求形成新的代差,掌握未來戰爭主動權,獲取21世紀“核心競爭力”,確保美軍在未來幾十年內的絕對軍事優勢。美軍的做法必然刺激其他國家軍隊採取防範措施,加劇軍事競爭。軍事領域廣泛而深刻的發展變化,必然是“世界大發展、大變革、大調整的重要內容之一”,為戰爭形態和作戰方式的演進提供了強勁動力。

新一輪產業革命為當代戰爭形態演進奠定新的社會基礎

科技革命導致產業革命,產業革命引發物質生產基礎與社會組織方式的重塑。戰爭和軍事是植根於社會生產基礎的人類實踐,新一輪產業革命的到來將為新的軍事革命和戰爭演進提供新的支撐。目前,大數據、雲端運算、行動互聯網等新一代資訊科技同機器人、智慧製造技術相互融合步伐加快,科技創新鏈條更加靈巧,技術更新和成果轉化更加快捷,產業更新換代不斷加快,使社會生產和消費從工業化向自動化、智慧化轉變,社會生產力將再次大幅提高,勞動生產力將實現大躍進。德國工業4.0、美國“再工業化”,以及其他主要國家的相應政策,將促成新一輪產業革命的到來,促使科技革命由技術領域向整個經濟領域乃至整個社會的全面擴散。軍事領域,傳統的武器裝備「瀑布型」順序式研發模式,將被智慧化、即時化、個人化、協作化的平行研發模式所取代,極大縮短研發週期、提高效益。新的生產工具和生產方法也將大大提高武器裝備生產效率。例如,採用數位製造帶來的效益超出傳統手段一個數量級以上;採用3D列印技術所需原料只有原來的十分之一,生產效率成倍提高,週期成倍縮短,能源消耗也遠低於傳統方式。新一輪產業革命,將大幅提升戰爭工具的研發生產和採購效率,加速新陳代謝、騰籠換鳥速度,為戰爭形態快速演進提供社會物質支撐。

前瞻性軍事理論為當代戰爭形態演進提供強力催化引領

軍事理論與軍事技術並稱軍事發展的“雙引擎”,同樣也是推動戰爭形態演進的強勁動力。目前,世界主要國家有關戰爭和作戰概念推陳出新的速度加快,創新密集度前所未有,對未來戰爭形態進行了前瞻性勾勒設計,引導著戰爭發展走向和軍隊建設方向。美軍歷來高度重視軍事理論的引領,甚至提出「一個理論指導一場戰爭、一場戰爭淘汰一種理論」。近年來,美國軍界、學術界先後提出一系列創新戰略和作戰概念,讓人目不暇給。如2009年,美空軍參謀長施瓦茨、海軍作戰部長拉夫黑德聯合簽署備忘錄,提出「空海一體戰」作戰概念;2015年1月,美國防部又宣布以「全球公域介入和機動聯合”取代“空海一體”作戰概念;2014年11月,美時任國防部長哈格爾明確提出以第三次“抵消戰略”為內涵的“國防創新倡議”,加快推進美軍軍事變革;2012年,美參聯會在《JP3-13.1聯合電子戰條令》中提出「聯合電磁頻譜作戰」概念;2014年,美一智庫推出《戰場上的機器人Ⅱ-未來的集群》,提出「無人機蜂群作戰」概念;2013年以來,美空軍退役中將德普圖拉等人先後提出「作戰雲」「戰鬥雲」「戰役雲」「雲作戰」等系列概念;2015年初,美海軍水面艦艇部隊提出「分散式殺傷」作戰概念;2016年10月,美陸軍協會提出「多域戰」並於同年11月正式列入陸軍條令;2017年4月,美國防部原常務副部長羅伯特·沃克提出「演算法戰」概念,實質是基於人工智慧的「智慧+」戰爭……這些戰爭和作戰概念,既有聯合的也有軍兵種的,既有戰略層面也有戰術技術層面的,有許多已經納入條令、進入實務和研發環節。如,第三次“抵消戰略”高度重視人工智慧和自主能力,將其納入作戰網絡,企圖使“無人和自主系統扮演核心角色”、迎接“機器人時代的戰爭”,並設想2050年前在作戰平台、資訊系統和指揮控制方面全面實現智慧化,藉此形成新的壓倒性技術優勢。這些創新理論,將對未來戰爭形態和作戰方式發展方向產生強勁持久的引領。

新的戰爭實踐為當代戰爭形態演進提供探索路徑的舞台

進入新世紀,特別是近幾年來,人類戰爭實踐出現一些新的變化,從中可以看出未來戰爭形態演化的一些端倪。例如,在陸戰戰場,以地面無人系統為主體的集群作戰已經走上戰場並初露鋒芒。 2015年底,俄軍在敘利亞使用「仙女座-D」自動化指揮系統指揮6部「平台-M」和4部「阿爾戈」作戰機器人,在自行火砲群、數架無人機的支援下,實施了世界首次以戰鬥機器人集群為主的地面作戰,順利完成作戰任務。再如,敘利亞時間2018年1月5日晚至6日清晨,俄駐敘赫梅米姆空軍基地和塔爾圖斯海軍基地遭到敘武裝分子13架無人機的集群式攻擊,俄軍及時採取電子攻擊和火力打擊應對,成功控制6架無人機,另有7架無人機被俄防空部隊摧毀。此外,透過「預實踐」也可為未來戰爭形態和作戰方式提前彩排預演。如2017年4月,美國國防部高級研究計畫局(DARPA)與空軍學院、西點軍校、海軍學院共同舉辦了軍事院校集群無人機挑戰賽,探索試驗了無人機集群關鍵技術戰術和相關戰法。在近期許多相關戰爭的實踐與預實踐中,未來戰爭形態的萌芽正在形成壯大。

中國軍事資源:https://military.people.com.cn/n1/2019/1212/c1011-3158888.html

Chinese Military’s Three Core Focuses on Understanding Winning Mechanisms of Information Warfare

中國軍隊三大核心聚焦資訊戰制勝機制

2016-11-22 03:03

現代英語:

Naval Command College Research Group

The winning mechanism of war is the most prominent and core characteristic of war. The winning mechanism of informationized war mainly includes three core contents: winning by information advantage, winning by structural destruction and winning by joint action.

Winning with information advantage

In the information age, wars are won mainly by information. Information is the first element of modern warfare, information resources are the first resource of modern warfare, and information advantage is the first advantage of modern warfare, and it determines the victory of the war.

The core of winning with information advantage is the right to control information. War is conducted under the guidance of information, which is implemented according to the law of events turning into information, information turning into situation, situation turning into cognition, cognition turning into decision, and decision turning into action. Information supports command and control, and dominates combat operations and the course of war. Only by gaining the right to control information can we seize the initiative and freedom on the battlefield.

Ways to achieve victory with information advantage. First, information flow leads material flow and energy flow, and information advantage multiplies cognitive power, control power and attack power, thereby regulating the course, direction, target and action of war. Second, information system leads weapon platform, combat force, unit and element are in the loop, the loop is under human control, under the guidance of information system, material energy can produce geometric series “fusion” and extremely precise “energy release”, so that combat power will have a qualitative leap. Then realize long-range rapid precision strike, system structure fixed point destruction and paralysis, and multi-method comprehensive victory. Third, cyberspace is based on physical space, penetrates physical space, transcends physical space and dominates physical space. Occupying the new field and new height of cyberspace warfare will gain new means and advantages of information warfare, and then evolve new concepts, new tactics and new ways to win in combat. Fourth, advanced technology, high-tech equipment, brilliant achievements and public opinion propaganda can have a strong deterrent and striking effect on the enemy’s psychology, fully disintegrate the enemy’s political will, resistance determination and public confidence, and then achieve all-round victory.

Structural destruction wins

Modern warfare is a confrontation between systems. The essence of system confrontation is a holistic and comprehensive confrontation. The formation, development and function of any overall comprehensive capability depends on the structure of the system.

The structure of the system determines the function, and the function generates the capability. Structural damage causes the system elements to be missing and the relationships to be out of order, which destroys the technical structure and system structure, and causes the loss of the organizational structure and functional structure, making it impossible to generate system capabilities.

The core of winning by structural destruction is network control. Network energy gathering, network energy empowerment, and network energy empowerment are the major functions of the network, which are based on the inherent characteristics of the information network system and the combat system. The first is network energy gathering. Through the network, various information is gathered together, and combat forces, units and elements are integrated into an organic whole. This whole is actually a collection of information energy, energy energy, and material energy, forming a full-factor advantage of information, energy, and material. The second is network energy empowerment. The combat forces, units, and elements in the system obtain all kinds of required information and support and coordination through the network, and have capabilities that they did not originally have, thereby improving their combat effectiveness. The third is network energy empowerment. In the combat system, target information, guidance information, coordination information, and command information are distributed to combat forces and units through the network, so that they are integrated into the system from the original passive listeners and executors, and become equal participants, executors, and advisers in the system, forming a flat charge. To control the network is to destroy the foundation and remove the fuel from under the cauldron, so that the combat system cannot gather energy; to break the network is to destroy the “hub”, cut off the flow of information, and make it impossible for the combat system to empower and authorize.

The strength of a system is based on its structure, the benefits of a system depend on its structure, and the strength of a system also lies in its structure. If you knock out the key nodes, the system will collapse; if you hit the vital point, the system will collapse. First, destroy the technical structure. The technical structure refers to the network structure, data structure, and software structure in the system. By destroying the key nodes of the network structure, destroying the software system of the network, destroying the database and information nodes, the various elements in the system cannot be interconnected and become a mess. Second, destroy the system structure. The combat system based on the information network is composed of a reconnaissance and early warning system, a command and control system, a precision strike system, an information confrontation system, and an integrated support system. Destroying the reconnaissance and early warning system will make the system “blind” and “deaf”. Destroying the command and control system will knock out the “vital point”, making the system leaderless and out of order. Destroying the integrated support system will make the system lose its support and become a water without a source and a tree without roots. Third, destroy the overall structure. The power structure, organizational structure, operation structure, and functional structure are the core of the overall structure. Destroying the power structure will cause the system elements to be missing, destroying the organizational structure will cause the system to be disordered, and destroying the operation structure will cause the system to malfunction, ultimately achieving the purpose of destroying the functional structure.

Joint action wins

Joint operations are the organic integration of combat forces, units, and element functions, which maximizes the combat effectiveness of the system. There is no joint operation without war, no war without joint operation, and no victory without joint operation. This has become the basic consensus of the world’s military powers and is an inevitable trend in future wars.

The connotation of joint operations is technology + tactics, system + system, plan + autonomy, action + support, discovery + destruction. It is a vivid manifestation of 1+1>2, the combination of combat operations, the integration of combat functions, and the concentrated release of combat effectiveness.

The core of winning joint operations is force control. Mechanized warfare pursues firepower, mobility, protection and support. Informationized warfare pursues the system’s reconnaissance and early warning capabilities, command and control capabilities, precision strike capabilities, information confrontation capabilities, and comprehensive support capabilities.

The implementation of joint operations must follow the rigid requirements of combat planning and the internal logic of “situation map”, “combat process”, “combat list”, “combat planning”, “autonomous action” and “effectiveness evaluation”. The first is the situation map that concerns the overall situation. Use a picture to fully present the battlefield situation. The second is a strict combat process, that is, the action process of detection, control, attack and evaluation, the command process of target discovery, target determination and action control, and the information process of information acquisition, transmission and processing. The third is a clear combat list, that is, the task list, target list and strike list. The task list is the clarification and summary of the combat tasks of the combat forces, units and elements. The target list is the batch numbering and sorting of the enemy’s targets. The strike list is the sorting and allocation of the strike targets according to the threat level of the enemy’s targets. The fourth is a detailed combat plan, that is, force planning, firepower planning, and information planning. It is a deepening, refinement and concretization of the combat plan, and it is also a substitute for the extensive combat plan. The fifth is flexible autonomous action, that is, self-organization, self-coordination, and self-action. It is the highest realm of joint action and the development of coordinated operations and contract operations, which enables temporary groups to effectively organize and coordinate and smoothly implement joint operations. The “three selfs” are organized and implemented in strict accordance with the combat process, based on the task list and strike list, and in accordance with the combat plan. Without the above prerequisites, it is impossible to achieve a real joint action. The sixth is a complete evaluation system to conduct timely and accurate evaluation of battlefield combat effectiveness and strike effects, providing a basis for subsequent combat planning.

In joint operations, the goal is the premise, calculation is the key, and precision is the core, and combat calculations run through the entire combat process, among which “one picture” is the preliminary calculation, “three processes” are the actuarial calculation, “three lists” are the in-depth calculation, three plans are the detailed calculation, three autonomies are the planning, and performance evaluation is the settlement.

國語中文:

海軍指揮學院主題組

戰爭制勝機理是戰爭最突出、最核心的特質。資訊化戰爭制勝機制主要包含資訊優勢制勝、結構破壞制勝和聯合行動制勝三個核心內容。

資訊優勢制勝

資訊時代的戰爭,主要靠資訊制勝。資訊是現代戰爭的第一要素,資訊資源是現代戰爭第一資源,資訊優勢是現代戰爭的第一優勢,決定戰爭勝勢。

資訊優勢制勝的核心是製資訊權。戰爭在資訊主導下進行,主導是依照事件轉化為資訊、資訊轉化為態勢、態勢轉化為認知、認知轉化為決策、決策轉化為行動的規律實施的。資訊支撐著指揮控制,主導作戰行動和戰爭進程。只有取得制資訊權,才能掌握戰場主動權、自由權。

資訊優勢制勝的實現途徑。一是以資訊流主導物質流、能量流,以資訊優勢倍增認知力、控制力和攻擊力,進而調控戰爭的進程、方向、目標和行動。二是資訊系統主導武器平台,作戰力量、單元、要素在迴路中,迴路在人的控制中,在資訊系統的引導下,使物質能產生幾何級數“聚變”和極其精準的“能量釋放” ,使戰鬥力產生質的飛躍。進而實現遠程快速精確打擊、體系結構定點毀癱、多法綜合製勝。第三是網路空間基於實體空間、滲透物理空間、超越實體空間、主導實體空間。佔領網路空間作戰這個新領域、新高點,便獲得了資訊作戰新手段、新優勢,進而演化出作戰制勝的新觀念、新戰法、新途徑。四是先進技術、高新裝備、輝煌戰果、輿論宣傳都能對敵方心理產生強大的威懾和打擊作用,充分瓦解敵方的政治意志、抵抗決心和民眾信心,進而實現全方位勝利。

結構破壞制勝

現代戰爭是體系與體系的對抗,體系對抗實質是整體性對抗、綜合性對抗,而任何一個整體綜合能力的形成、發展和發揮作用,都在於體系的結構。

體系的結構決定功能,功能產生能力。結構破壞就是造成體係要素缺失、關係失序,使技術結構、系統結構破壞,組織結構、功能結構喪失,無法產生體系能力。

結構破壞制勝的核心是製網。網能聚能、網能賦能、網能賦權,這是網路的重大作用,是基於資訊網路體系、作戰體系的內在特徵。一是網能聚能。透過網路把各種資訊聚在一起,把作戰力量、單元和要素融合為有機整體。這個整體其實就是資訊能、能量能、物質能的集合體,形成了資訊、能量、物質的全要素優勢。二是網能賦能。體系內的作戰力量、單元、要素,透過網路獲得各種所需的資訊和支援配合,具備了自身原來不具備的能力,因而提高了其作戰效能。三是網能賦權。在作戰體系內,透過網路給作戰力量、單元分配目標訊息、引導訊息、協同訊息、指令訊息,使之由原來的被動聽令者、執行者融入體系,成為體系內平等的參與者、執行者、建議者,形成扁平化的指控。制網就是破根基,釜底抽薪,使作戰體係不能聚能;破網就是毀“中樞”,切斷資訊流,使作戰體係不能賦能、賦權。

體系之堅基礎在結構,體系之利取決於結構,體系之肋也在於結構。打掉關鍵節點,體係不攻自破;打準命門,體系土崩瓦解。一是破壞技術結構。技術結構指的是體系中網路結構、資料結構和軟體結構。透過破壞網路結構的關鍵節點、毀癱網路的軟體系統、破壞資料庫和資訊節點,使體系中的各要素無法互聯互通,成為一盤散沙。二是破壞系統結構。基於資訊網路的作戰體係是由偵察預警系統、指揮控制系統、精確打擊系統、資訊對抗系統、綜合保障系統所構成的。毀癱偵察預警系統,就會使體系變成「瞎子」和「聾子」。毀癱指控系統,就打掉了“命門”,使體系群龍無首、運行失序。毀癱綜合保障系統,體係就失去了支撐,成為無源之水、無本之木。三是破壞總體結構。力量結構、組織結構、運作結構、功能結構是整體結構的內核,破壞力量結構就會使體係要素缺失,破壞組織結構就會使體系失序,破壞運作結構就會使體系運作失靈,最終達到破壞功能結構的目的。

聯合行動制勝

聯合作戰是對作戰力量、單元、要素功能的有機融合,使體係作戰效能能最大限度地釋放。無戰不聯、無聯不戰、無聯不勝,已成為世界軍事強國的基本共識,是未來戰爭的必然趨勢。

聯合行動的內涵是技術+戰術、系統+系統、計畫+自主、行動+保障、發現+摧毀,是1+1>2的生動體現,是作戰行動的聯合,是作戰功能的融合,是作戰效能集中釋放。

聯合行動制勝的核心是製力。機械化戰爭追求的是火力、機動性、防護力和保障力。資訊化戰爭追求的是體系的偵察預警能力、指揮控制能力、精確打擊能力、資訊對抗能力、綜合保障能力。

實施聯合行動必須遵循作戰規劃的剛性要求和「態勢圖」「作戰流程」「作戰清單」「作戰規劃」「自主行動」「效能評估」的內在邏輯。一是事關全局的態勢圖。用一張圖把戰場態勢全面呈現出來。二是嚴格的作戰流程,即偵、控、打、評的行動流程,目標發現、目標確定、行動控制的指控流程,資訊取得、傳遞、處理的資訊流程。三是明確的作戰清單,即任務清單、目標清單、打擊清單。任務清單是己方對作戰力量、單元、要素作戰任務的明確和匯總,目標清單是對敵方目標的分批編號和梳理,打擊清單是根據敵方目標的威脅程度,對打擊目標的排序和分配。四是詳盡的作戰規劃,即兵力規劃、火力規劃、資訊規劃。它是對作戰方案的深化、細化和具體化,也是對粗放作戰計畫的替代品。五是靈活的自主行動,即自組織、自協同、自行動,它是聯合行動的最高境界,是協同作戰、合約作戰的發展,使臨時編組進行有效的組織和協同,順利實施聯合行動。 「三自」是嚴格遵循作戰流程,依據任務清單和打擊清單,依照作戰規劃組織實施的,沒有上述的前提條件,就無法實現真正意義上的聯合行動。六是完善的評估體系,對戰場作戰效能和打擊效果進行及時且準確的評估,為後續作戰規劃提供基礎。

聯合行動,目標是前提、計算是關鍵、精準是核心,且作戰計算貫穿作戰全過程,其中「一張圖」是初算、「三個流程」是精算、「三個清單」是深算、三個規劃是細算、三個自主是謀算、效能評估是結算。

資料來源:解放軍報作者:海軍指揮學院研究小組責任編輯:菅琳

中國軍事資源:https://www.81.cn/jwzl/2016-11/22/content_73788.htm

Chinese Military: Intelligence Profoundly Affecting Future Strategic Combat Operations

中國軍事情報深刻影響未來戰略作戰行動

現代英語翻譯:

In today’s era, military intelligence is becoming a powerful driving force for a new round of military reforms after mechanization and informatization, profoundly affecting the future combat victory mechanism, combat rules, and combat methods, and increasingly pushing war into the era of intelligence. The impact of military intelligence on future combat is mainly reflected in four aspects.

First, “intelligence” will become the dominant factor in determining the outcome of future operations. Mechanized warfare can be seen as platform-centric warfare, where energy is the dominant force. Energy is used to achieve the mobility of combat platforms and firepower strikes on targets, to achieve the combat purpose of destroying the enemy, and to pursue the use of objects to carry energy and release energy. Informationized warfare can be seen as network-centric warfare, where information is the dominant force. Information does not replace energy, but through precise positioning of time and space, it multiplies the combat effectiveness of energy, thus becoming the dominant force in war, and pursues the use of networks to gather energy and release energy. Intelligent warfare can be seen as cognitive-centric warfare, in which the dominant force is “intelligence”. The combat space is further extended from the physical domain and information domain to the cognitive domain, social domain, and biological domain. The battlefield situation is more complex. War is a systemic confrontation across domains, and it pursues more empowerment and release of power with intelligence.

Second, intelligent unmanned equipment will become the main combat equipment in future operations. The development of intelligent technology has gradually separated people from weapons and equipment. Unmanned systems have shifted from assisting people in combat to replacing people in combat, completing many high-risk combat operations that are not suitable for people to perform. Intelligent combat has increasingly distinctive characteristics of “unmanned platforms, manned systems, unmanned combat, and manned command”. On the Syrian battlefield, the Russian military remotely controlled 10 combat robots to kill more than 70 Islamic State militants with “zero casualties” and seize the 754.5 high ground, becoming the first ground combat operation in military history with robots as the main force. It is expected that by 2025, the proportion of intelligent unmanned equipment in the Russian military’s weapons and equipment will reach more than 30%. The U.S. military predicts that by 2030, intelligent unmanned equipment will be able to perform tasks autonomously, and 60% of ground combat platforms will achieve unmanned intelligence. A large number of drones, unmanned ships/boats, and unmanned vehicles will become the main equipment for both sides on the intelligent battlefield, carrying out various traditional/untraditional military tasks and implementing self-organized and systematic operations.

Third, human-machine collaborative combat will become the main mode of action in future combat. Human-machine collaborative combat is a mode of combat in which manned and unmanned equipment joint formations implement coordinated attacks in a networked confrontation environment. Among them, human soldiers with battlefield decision-making and tactical control capabilities serve as the “command back end”, and intelligent unmanned equipment carrying guided weapons or various intelligence, reconnaissance and surveillance sensors serve as the “weapon front end”. With the support of information networks, human soldiers and intelligent unmanned equipment work closely together to complete actions such as situation perception, tactical decision-making, firepower guidance, weapon launch and damage assessment. According to the U.S. Army Research Laboratory, before 2035, human-machine collaborative combat will mainly take the form of autonomous combat with humans in the loop; before 2050, authorized autonomous or fully autonomous combat with humans outside the loop will be achieved, officially kicking off intelligent warfare dominated by machines.

Fourth, autonomous swarm combat will become an important attack style in future combat. The technical inspiration of swarm combat comes from the bionics research on bees. The division of labor within the bee colony is clear, there is a rich and interesting information exchange language between individuals, and the social behavior is rich, so the cluster is also called a “bee colony.” Swarm combat is an intelligent combat style that relies on artificial intelligence, data chain integration, cloud computing and other technical support, and launches dozens or even hundreds of drones at the same time. They form precise formations and precise division of labor, and perform multiple tasks and multi-target strikes at the same time. Compared with traditional combat, swarm combat has incomparable advantages and is a subversion of traditional combat styles and combat rules. After hundreds of simulation tests, the U.S. Navy found that even an advanced air defense system like the Aegis air defense system has difficulty in allocating firepower when dealing with drone swarm attacks, resulting in some drones being able to avoid interception and successfully launch attacks on ships. Data shows that when a swarm of 8 drones is used to attack ships, an average of 2.8 drones can avoid the Aegis interception system; when the number of drones increases to dozens, the number of drones that successfully avoid the interception system and achieve penetration is greater. These simulation tests fully prove that the effect of drone swarm operations is significant and poses a huge threat to the current defense system. At the same time, it also indicates that swarm-type autonomous operations will inevitably become an important offensive combat style on the future intelligent battlefield.

現代國語:

當今時代,軍事智慧化正成為繼機械化、資訊化之後新一輪軍事變革的強大驅動力,深刻影響未來作戰勝利機制、作戰規則、作戰方式,日益推動戰爭進入智慧化時代。軍事情報對未來作戰的影響主要體現在四個方面。

首先,「情報」將成為決定未來作戰勝負的主導因素。機械化戰爭可以看作是以平台為中心的戰爭,其中能源是主導力量。利用能量實現作戰平台的機動性和對目標的火力打擊,達到消滅敵人的作戰目的,追求利用物體攜帶能量和釋放能量。資訊化戰爭可視為以網路為中心的戰爭,資訊是主導力量。資訊並不是取代能源,而是透過時間和空間的精確定位,使能源的戰鬥力倍增,從而成為戰爭的主導力量,並追求利用網路聚集能源、釋放能源。智慧戰爭可以看作是以認知為中心的戰爭,其中的主導力量是「情報」。作戰空間從物理域、資訊域進一步延伸到認知域、社會域、生物域。戰場情勢更加複雜。戰爭是跨領域的系統性對抗,它追求更多的智慧賦能和權力釋放。

其次,智慧無人裝備將成為未來作戰的主要作戰裝備。智慧科技的發展,使人逐漸與武器裝備分離。無人系統已經從協助人作戰轉向代替人作戰,完成許多不適合人執行的高風險作戰行動。智慧作戰「平台無人、系統有人、作戰無人、指揮有人」的特徵日益鮮明。在敘利亞戰場上,俄軍遙控10台戰鬥機器人以「零傷亡」擊殺70多名伊斯蘭國武裝份子,奪取754.5高地,成為軍事史上首次以機器人為主力的地面作戰行動。預計2025年,智慧無人裝備在俄軍武器裝備中的比重將達到30%以上。美國軍方預測,2030年,智慧無人裝備將能夠自主執行任務,60%的地面作戰平台將實現無人智慧化。大量無人機、無人艦船、無人車輛將成為智慧戰場上雙方的主要裝備,執行各種傳統/非傳統軍事任務,實施自組織、系統化作戰。

第三,人機協同作戰將成為未來作戰的主要行動方式。人機協同作戰是有人與無人裝備聯合編隊在網路化對抗環境下實施協同攻擊的作戰方式。其中,具有戰場決策和戰術控制能力的人類士兵作為“指揮後端”,搭載制導武器或各種情報、偵察、監視感測器的智慧無人裝備作為“武器前端”。在資訊網路的支援下,人類士兵和智慧無人裝備緊密配合,完成態勢感知、戰術決策、火力引導、武器發射和毀傷評估等動作。根據美國陸軍研究實驗室預測,2035年之前,人機協同作戰將主要採取人類在環自主作戰的形式; 2050年以前,將實現與環外人類的授權自主或完全自主作戰,正式拉開機器主導的智慧戰爭的序幕。

第四,自主集群作戰將成為未來作戰的重要攻擊方式。團體作戰的技術靈感來自蜜蜂的仿生研究。蜂群內部分工明確,個體間有豐富有趣的資訊交流語言,社會行為豐富,因此集群也被稱為「蜂群」。集群作戰是依託人工智慧、數據鏈整合、雲端運算等技術支撐,同時發射數十架甚至上百架無人機的智慧化作戰方式。他們形成精確編隊、精確分工,同時執行多項任務、多目標打擊。與傳統作戰相比,集群作戰具有無可比擬的優勢,是對傳統梳子的顛覆風格和戰鬥規則。經過數百次模擬測試,美國海軍發現,即使是宙斯盾防空系統這樣先進的防空系統,在應對無人機群攻擊時也難以分配火力,導致部分無人機能夠避開攔截,成功對艦艇發動攻擊。數據顯示,使用8架無人機集群攻擊艦艇時,平均有2.8架無人機可以避開宙斯盾攔截系統;當無人機數量增加到數十架時,成功避開攔截系統並實現突防的無人機數量就更多。這些模擬測試充分證明無人機群作戰效果顯著,對目前的防禦系統構成巨大威脅。同時,也預示著集群式自主作戰必然成為未來智慧戰場上重要的進攻作戰方式。

中國軍事原文來源:http://www.mod.gov.cn/gfbw/jmsd/4858888.html

Developing the Strategy and Tactics of People’s War

軍事論壇丨發展人民戰爭戰略戰術

來源:解放軍報 作者:李銀祥 宋文超 責任編輯:劉上靖 2022-11-15

Chairman Xi Jinping clearly pointed out in his report to the 20th CPC National Congress that we should develop the strategies and tactics of people’s war. Looking back at the glorious course of the People’s Army in strengthening its military and winning victory, one of the red lines running through it is that it has always insisted on proposing and implementing a complete set of strategies and tactics of people’s war under the leadership of the Party. To win future wars, we must keep a close eye on changes in technology, warfare, and opponents, continue to carry forward the fine traditions of our army, develop the strategies and tactics of people’s war, and make the magic weapon for defeating the enemy and winning the battle powerful on the modern battlefield.

The strategy and tactics of people’s war have always been an important magic weapon for our army to defeat the enemy and win victory.

Developing the people’s war strategy and tactics is not only a profound insight into the internal laws of our army’s victory over the enemy, but also a far-reaching plan for building a strong country and a strong army. It has important strategic value for achieving the goal of building the army for the centenary as scheduled and accelerating the building of the people’s army into a world-class army.

The strategy and tactics of people’s war are the concentrated embodiment of the Marxist art of directing war. Marxism believes that the masses are the creators of history and the decisive force driving historical progress. Starting from this basic viewpoint and fundamental standpoint, the strategy and tactics of people’s war profoundly explain the basic principles of people’s war, such as soldiers and civilians are the foundation of victory, the decisive factor in victory or defeat in war is people, not things, and the need to organize, mobilize and arm the broad masses of the people. Our army was born in the flames of war. Faced with extremely cruel objective conditions, the Chinese Communists represented by Comrade Mao Zedong insisted on combining the basic principles of Marxist people’s war with the reality of China’s revolutionary war and created a people’s war strategy and tactics with flexibility as its prominent feature. Its essence is “you fight yours and I fight mine”, aiming to make the best use of strengths and attack weaknesses, and seize and master the initiative in the war. This concentratedly embodies the Marxist art of guiding war, shining with the truth of scientificity, people-orientedness, practicality and openness to development.

The strategy and tactics of the people’s war are the winning code for the party to lead the practice of all military struggles. Since our party built the people’s army, it has created a complete set of strategies and tactics of the people’s war based on the cruel reality that the enemy is strong and we are weak, and the enemy is big and we are small. From the “sixteen-character formula” during the Red Army period, to the “protracted war” during the War of Resistance Against Japanese Aggression, from the “ten military principles” during the War of Liberation, to the “piecemeal” during the War to Resist U.S. Aggression and Aid Korea, and then to the continuous adjustment of military strategic guidelines after the founding of New China. The People’s Army learned war from war, explored its laws from practice, and adhered to and developed this winning code in keeping with the times. During the war years, it created one war miracle after another in which the few defeated the many and the weak defeated the strong. In peacetime, it firmly defended national sovereignty, security and territorial integrity, and wrote a glorious chapter of continuous innovation in the art of war directing in the world’s military history.

Actively developing the strategy and tactics of people’s war is an inherent requirement for building a world-class military. “The importance of a country depends on the victory of its army.” The ultimate measure of whether an army is a world-class army is its military strength. The strategy and tactics of people’s war are both the way for our army to win and the way for it to grow stronger. To accelerate the building of a world-class military and a strong strategic deterrence system, we must adhere to and develop this unique advantage, strengthen research on opponents and the enemy, proactively understand the characteristics, laws and winning mechanisms of modern warfare, innovate the people’s war strategy and tactics in line with the times, firmly and flexibly carry out military struggle, give full play to the strategic function of military power in shaping the security situation, curbing crises and conflicts, and winning local wars, and effectively complete the mission and tasks of the new era entrusted by the Party and the people.

Developing the strategy and tactics of people’s war is the inevitable choice for our army to win future wars. The war situation is evolving rapidly, but the nature of war has not changed, and the fundamental law that the deepest root of war power lies among the people has not changed. The wars we will face in the future are mainly wars to defend national sovereignty, security, and development interests. They are in line with the fundamental interests of all Chinese people and are just actions that follow the trend of the times. They will continue to receive the support of the vast majority of the people and the people of the world. Adhering to and developing the strategy and tactics of people’s war will surely become an important way and inevitable choice for our army to win future wars and check and balance powerful enemies.

Scientifically grasp the contemporary connotations of the development of the people’s war strategy and tactics

The people’s war strategy and tactics are living theories and practices, not rigid dogmas. They must proactively adapt to the requirements of the development of the times and inject new contemporary connotations into them in order to maintain their strong vitality.

Adhere to the just war, establish the broadest united front, and fight a good political and military battle. Pay attention to guiding the war from a political perspective and consolidate the political foundation for victory. This is the basic experience of the Party in winning the war and the core of the strategy and tactics of the people’s war. In today’s era, the connection between the military and politics is closer, the relevance and integrity at the strategic level are increasing, and the influence and constraints of political factors on the war are becoming increasingly prominent. In developing the strategies and tactics of people’s war, we must always uphold the role of the Party Central Committee in coordinating the overall situation and all parties, mobilize, unite and organize the broadest masses of the people to participate in and support the war; strengthen the political and organizational functions, and strengthen the ideological, organizational and will preparation of the whole Party, the whole army and the whole people to cope with and win the war; strengthen political diplomacy and the struggle for international public opinion and law, form the broadest united front in support of a just war, firmly occupy the moral high ground, give full play to the combined effectiveness of political offensives and armed strikes, and coordinate and fight well the political and military battles.

Adhere to active defense, highlight activeness, and attach importance to offensive operations. Active defense is the product of people’s war, and practicing active defense is the fundamental requirement of the strategy and tactics of people’s war. In the future, the progress of war will accelerate, and it may be possible to achieve strategic goals in one battle or battle, and often the first battle will be the decisive battle. In developing the people’s war strategy and tactics, we must persist in organically combining defense, counterattack and offense, place greater emphasis on internal and external counterattacks at the strategic level, comprehensively utilize elite combat forces at the outset of the war, implement a resolute and powerful strategic counterattack that combines internal and external lines, form a high-pressure counterattack posture and pressure, inflict the greatest pain and fear on the enemy, and achieve the strategic objectives of using offense to assist defense, strike later but arrive first, quickly defeat the enemy, contain the enemy as quickly as possible, and win the war.

Adhere to asymmetric checks and balances, you fight yours, I fight mine, and use what we can to defeat what we cannot. This is the soul and essence of the people’s war strategy and tactics, a high-level summary and vivid description of the laws of war and war guidance, revealing the war guidance laws and combat guidance methods of defeating the enemy with superior equipment with inferior equipment, and raising the flexible and maneuverable strategy and tactics to a new level. Compared with the past, the modern war combat system is huge, with many nodes, and there are many “vital points” that are vulnerable to attack, which provides an opportunity to implement “using what we can to defeat what we cannot”. In developing the strategies and tactics of the people’s war, we must follow the winning mechanisms of modern warfare, fully recognize the inherent weaknesses of information-based and intelligent warfare, conduct in-depth research on the opponent’s weaknesses and fatal points, innovate core operational concepts, intensify the training of new-domain and new-quality operational capabilities and means, and refine tactics such as dimensionality reduction strikes and asymmetric strikes. We must not fight according to the enemy’s routines, but focus on the enemy’s weaknesses and strike according to our army’s strengths, and create new winning advantages by “using the capable to defeat the incapable.”

Adhere to the principle of accumulating small victories into big ones and be good at concentrating forces to fight and destroy. Our army has been in an overall disadvantageous position for a long time in the revolutionary war. In the local area, we use the strong against the weak and accumulate small victories into big ones, which is the key to defeating the strong enemy. Compared with the past, modern war operations are often carried out in multiple dimensions and domains, providing a broader space for the implementation of “accumulating small victories into big ones”. In developing the strategies and tactics of the people’s war, we must strengthen the concept of “dispersed in appearance but concentrated in spirit, dispersed in form but united in strength”, dynamically concentrate and unite the various combat forces distributed in the multi-dimensional battlefield, and through the fusion of efficiency and instant optimization, implement local rapid concentrated energy attacks and wide-area guerrilla raids, and carry out devastating blows and destructive attacks on key points of enemy distribution. This will not only have a heavy hammer effect, but also continuously consume the enemy, causing the opponent to gradually lose the initiative on the battlefield.

Adhere to the principle that soldiers and civilians are the foundation of victory, and consolidate and improve the integrated national strategic system and capabilities. The army wins battles with the people as its backing. At the beginning of the founding of the army, our party regarded the revolutionary war as a struggle of the masses, emphasized that only by mobilizing and relying on the masses can the war be carried out, and created a complete set of people’s war strategies and tactics, which is the winning code for the people’s army to remain invincible. The confrontation under the conditions of informatization and intelligence is more clearly manifested as a system confrontation based on the overall strength of the country. To develop the strategies and tactics of people’s war, we must constantly consolidate and improve the integrated national strategic system and capabilities, exert comprehensive efforts in multiple dimensions such as politics, military, economy, culture, and diplomacy, build a strong war capability and war potential that can achieve both strategic quick victory and strategic persistence, and plunge the enemy into the vast ocean of people’s war.

Vigorously promote the development and innovation of the people’s war strategy and tactics in the new era

In the new era, the connotation of the people’s war strategy and tactics has undergone great changes. It is necessary to strengthen the centralized and unified leadership of the Party, strengthen the implementation of the fundamental purpose, strengthen the drive for scientific and technological innovation, and strengthen simulation exercises and testing in order to gather the driving force for innovation and development.

Strengthen the centralized and unified leadership of the Party and gather the great power of the people’s war strategy and tactics. The Party’s leadership is the greatest advantage of the socialist system with Chinese characteristics and an important guarantee for the embodiment and implementation of the people’s war strategy and tactics. We must uphold the Party’s leadership and mobilize and organize the people as a whole. Actively explore the people’s war strategy and tactics in the fields of financial warfare, cyber warfare, and cognitive warfare. Organize the people to carry out intelligence warfare, harassment warfare, ambush warfare, etc. in a timely manner to flexibly contain and consume the enemy.

Strengthen the implementation of the fundamental purpose and consolidate the foundation for the development of the people’s war strategy and tactics. The secret of the victory of the people’s war lies in its sincere pursuit of the interests of the masses and winning the trust and support of the broad masses of the people. Serving the people wholeheartedly is the fundamental purpose of our army and the strategic foundation for the development of the people’s war strategy and tactics in the new era. The people’s army must stand firmly on the people’s side, always put the people first, rely closely on the people, continuously benefit the people, firmly rooted in the people, and always maintain the nature, purpose, and character of the people’s army.

Strengthen the drive of scientific and technological innovation and enhance the driving force for the development of the people’s war strategy and tactics. With the entry of high-tech such as artificial intelligence, big data, blockchain, and quantum technology into the military field, the technological content of war has undergone a qualitative leap. It is necessary to innovate and develop the people’s war strategy and tactics supported by information and intelligent technology, continue to promote the integrated development of mechanization, informationization, and intelligence, and innovate and create the “key” of “using the capable to defeat the incapable”, so that “wisdom victory” will become the main feature of the people’s war strategy and tactics in the new era, and form a new era of people’s war strategy and tactics with contemporary leadership and unique characteristics.

Strengthen simulation and exercise testing to improve the quality and effectiveness of the development of the people’s war strategy and tactics. In the information age, virtual reality technology can be used to create virtual scenes with a strong sense of three-dimensionality and reality based on the actual battlefield environment and mission background. Officers and soldiers can “experience” war several times in virtual reality before the war begins, and strengthen their understanding of the real battlefield such as equipment performance, enemy and our situation, and the rhythm of war. This provides a testing platform for whether the strategy and tactics are correct. In developing the people’s war strategy and tactics, special attention should be paid to the use of simulation, exercises and other war pre-practice means, conduct qualitative and quantitative analysis, and further improve them in practice.

國語中文:

發展人民戰爭戰略戰術

■李銀祥 宋文超

引言

習主席在黨的二十大報告中明確指出,發展人民戰爭戰略戰術。回望人民軍隊強軍制勝的光輝歷程,貫穿其中的一條紅線,就是始終堅持在黨的領導下,提出和實施一整套人民戰爭戰略戰術。打贏未來戰爭,必須緊盯科技之變、戰爭之變、對手之變,賡續傳承好我軍優良傳統,發展人民戰爭戰略戰術,讓克敵制勝的法寶顯威現代戰場。

人民戰爭戰略戰術始終是我軍克敵制勝的重要法寶

發展人民戰爭戰略戰術,既是對我軍克敵制勝內在規律的深刻洞察,也是對強國強軍的高遠謀劃,對於如期實現建軍一百年奮鬥目標,加快把人民軍隊建成世界一流軍隊具有重要的戰略價值。

人民戰爭戰略戰術是馬克思主義戰爭指導藝術的集中體現。馬克思主義認為,人民群眾是歷史的創造者,也是推動歷史進步的決定性力量。人民戰爭戰略戰術從這一基本觀點和根本立場出發,深刻闡釋了兵民是勝利之本,戰爭勝負的決定因素是人不是物,以及必須組織、動員和武裝廣大人民群眾等人民戰爭的基本原理。我軍在戰火中誕生,面對異常殘酷的客觀條件,以毛澤東同志為代表的中國共產黨人,堅持把馬克思主義人民戰爭基本原理與中國革命戰爭實際相結合,創造了以靈活機動為顯著特點的人民戰爭的戰略戰術,其精髓是“你打你的、我打我的”,旨在力求揚長擊短,奪取和掌握戰爭主動權。這集中體現了馬克思主義戰爭指導藝術,閃爍著科學性、人民性、實踐性和發展開放性的真理光芒。

人民戰爭戰略戰術是黨領導全部軍事鬥爭實踐的製勝密碼。我們黨締造人民軍隊以來,立足於敵強我弱,敵大我小的殘酷現實,創立了一整套人民戰爭的戰略戰術。從紅軍時期的“十六字訣”,到抗日戰爭時期的“持久戰”,從解放戰爭時期的“十大軍事原則”,到抗美援朝戰爭時期的“零敲牛皮糖”,再到新中國成立後軍事戰略方針的不斷調整。人民軍隊從戰爭中學習戰爭,從實踐中探索規律,與時俱進地堅持和發展這個制勝密碼,戰爭年代創造了一個又一個以少勝多、以弱勝強的戰爭奇跡,和平時期堅決捍衛國家主權、安全和領土完整,在世界軍事史上書寫了戰爭指導藝術不斷創新的光輝篇章。

積極發展人民戰爭戰略戰術是全面建成世界一流軍隊的內在要求。 「凡國之重也,必待兵之勝也。」衡量一支軍隊是不是世界一流軍隊,最終要看其軍事實力。人民戰爭戰略戰術既是我軍的製勝之道,也是發展壯大之道。加速建成世界一流軍隊、建立強大的戰略威懾體系,必須堅持和發展這一特有優勢,加強對手研究、敵情研究,前瞻認識現代戰爭特點規律和製勝機理,與時俱進創新人民戰爭戰略戰術,堅定靈活展開軍事鬥爭,充分發揮軍事力量塑造安全態勢,遏止危機沖突,打贏局部戰爭的戰略功能,切實完成好黨和人民賦予的新時代使命任務。

發展人民戰爭戰略戰術是我軍打贏未來戰爭的必然選擇。戰爭形態加速演變,但戰爭的本質沒有變,戰爭偉力之最深厚根源存在於民眾之中這一根本規律沒有改變。我們未來面對的戰爭,主要是捍衛國家主權、安全、發展利益的戰爭,符合全體中國人民的根本利益,是順應時代潮流的正義之舉,必將繼續得到最廣大人民群眾和世界人民的支持。堅持並發展人民戰爭戰略戰術,必將成為我軍打贏未來戰爭、制衡強敵的重要途徑和必然選擇。

科學掌握人民戰爭戰略戰術發展的時代內涵

人民戰爭戰略戰術,是活的理論與實踐,不是死板的教條,必須主動順應時代發展要求,注入新的時代內涵,才能維持強大旺盛的生命力。

堅持正義戰爭,建立最廣泛的統一戰線,打好政治軍仗。注重從政治高度指導戰爭,夯實制勝的政治基礎,是黨奪取戰爭勝利的基本經驗,也是人民戰爭戰略戰術的核心要義。在當今時代,軍事和政治的聯繫更加緊密,在戰略層面的相關性和整體性日益增強,政治因素對戰爭的影響和限制日益突出。發展人民戰爭戰略戰術,必須始終堅持黨中央統攬全局、協調各方的作用,動員、團結、組織最廣大人民參與、支持戰爭;增強政治功能和組織功能,強化全黨全軍全國人民應對戰爭、打贏戰爭的思想準備、組織準備、意志準備;加強政治外交和國際輿論法理鬥爭,形成支持正義戰爭的最廣泛統一戰線,牢牢佔領道義制高點,發揮政治攻勢和武裝打擊的綜合效能,統籌打好政治軍仗。

堅持積極防禦,突顯積極性,重視攻勢作戰。積極防禦是人民戰爭的產物,實行積極防禦是人民戰爭戰略戰術的根本要求。未來戰爭進程加快,可能一場戰役或戰鬥就能達成戰略目的,往往是首戰即決戰。發展人民戰爭戰略戰術,要堅持將防禦、反攻和進攻有機結合,更加強調戰略層次的內外線反擊,在戰爭伊始就綜合運用精銳作戰力量,實施內外線結合、堅決凌厲的戰略反擊,形成高壓反擊態勢和壓力,最大限度地打痛打怕敵人,達到以攻助防、後發先至,速戰制敵、盡快遏制、打贏戰爭的戰略目的。

堅持非對稱制衡,你打你的,我打我的,以能擊不能。這是人民戰爭戰略戰術的靈魂和精髓,是對戰爭規律和戰爭指導規律的高度概括和生動描述,揭示了以劣勢裝備戰勝優勢裝備之敵的戰爭指導規律、作戰指導方法,把靈活機動的戰略戰術提高到嶄新境界。相較於以往,現代戰爭作戰體系龐大、節點眾多,存在許多易受攻擊的“命門”,為實施“以能擊不能”提供了契機。發展人民戰爭戰略戰術,要遵循現代戰爭制勝機理,充分認清資訊化智能化戰爭本身的固有弱點,深入研究對手的軟肋和死穴,創新核心作戰概念,加緊鍛造新域新質作戰能力手段,錘煉降維打擊、非對稱打擊等戰法,不按敵人套路打、盯著敵人軟肋打、發揮我軍優長打,在「以能擊不能」中創造新的製勝優勢。

堅持積小勝為大勝,善於集中力量打殲滅戰。我軍在革命戰爭中長期處於全局劣勢的地位,局部上以強對弱、積小勝為大勝,是戰勝強敵的關鍵一招。相較於以往,現代戰爭作戰往往在多維多域中展開,為實施「積小勝為大勝」提供了更加廣闊空間。發展人民戰爭戰略戰術,要強化「貌散而神聚,形散而力合」的概念,將分佈在多維戰場的諸多作戰力量動態集中聯合起來,透過效能融合、即時聚優,實施局部快速聚能攻擊、廣域遊擊襲擾,對敵分佈的要點實施殲滅性打擊、破壞性襲擊,這既有重錘效應,又能不斷消耗敵人,使對手逐步喪失戰場主動權。

堅持兵民是勝利之本,鞏固提高一體化國家戰略體系與能力。軍隊打勝仗,人民是靠山。建軍伊始,我們黨就把革命戰爭視為群眾的鬥爭,強調只有動員和依靠群眾才能進行戰爭,並創造了一整套人民戰爭戰略戰術,這是人民軍隊立於不敗之地的製勝密碼。資訊化智能化條件下的對抗,更鮮明地表現為以國家整體實力為基礎的體系對抗。發展人民戰爭戰略戰術,要不斷鞏固提高一體化國家戰略體系和能力,在政治、軍事、經濟、文化、外交等多維度全面發力,構建起既能戰略速勝又能戰略持久的強大戰爭能力和戰爭潛力,陷敵於人民戰爭的汪洋大海。

大力推動新時代人民戰爭戰略戰術的發展創新

新時代,人民戰爭戰略戰術的內涵發生了很大變化,必須加強黨的集中統一領導,加強踐行根本宗旨,加強科技創新驅動,加強模擬演訓檢驗,才能匯聚起創新發展的前行力量。

加強黨的集中統一領導,匯聚人民戰爭戰略戰術磅礴偉力。黨的領導是中國特色社會主義制度的最大優勢,也是人民戰爭戰略戰術得以體現和實施的重要保證。必須堅持黨的領導,把人民群眾整體動員起來、組織起來。積極探索金融戰、網絡戰、認識域作戰等領域的人民戰爭戰略戰術。適時組織人民群眾開展情報戰、襲擾戰、伏擊戰等,靈活牽制、消耗敵人。

加強踐行根本宗旨,夯實人民戰爭戰略戰術發展根基。人民戰爭的製勝奧秘,就在於它真心實意地為群眾謀利益,贏得了廣大人民群眾的信賴和支持。全心全意為人民服務是我軍的根本宗旨,也是新時代人民戰爭戰略戰術發展的戰略根基。人民軍隊必須站穩人民立場,始終堅持人民至上,緊緊依靠人民,不斷造福人民,牢牢植根人民,永葆人民軍隊性質、宗旨、本色。

加強科技創新驅動,增強人民戰爭戰略戰術發展動力。隨著人工智慧、大數據、區塊鏈、量子科技等高新技術進入軍事領域,戰爭的科技含量已發生質的飛躍,必須創新發展以資訊化智慧化技術為支撐的人民戰爭戰略戰術,持續推進機械化資訊化智慧化融合發展,創新創造“以能擊不能”的“密鑰”,讓“智勝”成為新時代人民戰爭戰略戰術的主要特徵,形成具有時代性引領性獨特性的新時代人民戰爭戰略戰術。

加強模擬演訓檢驗,提升人民戰爭戰略戰術發展質效。在資訊時代,利用虛擬現實技術可基於實際的戰場環境,以及任務背景創造具有較強立體感和真實感的虛擬場景,官兵在戰爭開始前就可以在虛擬現實中數次「親歷」戰爭,加強對裝備性能、敵我情況、戰爭節奏等真實戰場的了解,這就給戰略戰術正確與否提供了檢驗平台。發展人民戰爭戰略戰術,應特別重視運用模擬、演習等戰爭預實踐手段,對其進行定性與定量分析,並在實務上進一步加以完善。

中國軍事資料來源:http://www.mod.gov.cn/gfbw/jmsd/4926888.html?big=fan

China’s Military Emphasizing Research of System-based Superior Warfare: How to Fight Using Informationized Warfare? Analysis of Nine Typical Combat Styles

中國軍隊重視系統優勢戰爭研究:資訊化戰爭如何打仗?九種典型戰鬥風格解析

現代英語:

System-based superior warfare is a system-based warfare in information warfare. It is not limited to a specific combat style, but a “combination punch” or a group of combat styles composed of multiple combat styles and tactics. It emphasizes that according to the changes in combat missions, combat opponents and battlefield situations, as long as it is conducive to forming relative advantages and achieving system victory, any appropriate combat means and styles can be flexibly used to form combat advantages. In the specific implementation of system-based superior warfare, these specific combat styles and action tactics can be organized and implemented separately as part of joint full-domain operations, and more emphasis is placed on “combination punches”, multiple strategies, and overall victory.
In order to better understand its core connotation, this article lists nine typical combat styles, including overall deterrence warfare, electromagnetic interference warfare, network attack warfare, cognitive control and interference warfare, and analyzes them.

System concentration warfare – a “combination punch” that flexibly uses a variety of combat styles. Author: Academic Plus Senior Observer Dong Zhou
The main content and keywords of this article

  1. Overall deterrence warfare: emphasize multi-domain joint deterrence; the implementation of overall deterrence warfare should have three major elements; strong overall strength is the core of achieving effective deterrence
  2. Electromagnetic interference warfare: the key to competing for information advantage; in terms of combined means and methods, information empowerment is achieved through “connection + sharing”; an effective method to crack unmanned cluster warfare
  3. Network attack warfare: mainly soft killing, combining soft and hard, focusing on breaking the network and reducing energy
  4. Cognitive control and interference warfare: control the cognitive right of situational awareness, compete for information advantage; control the right to command and decision-making, compete for decision-making advantage; control the “brain” right, and seize the brain control advantage
  5. Agile mobile warfare: high-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant aggregation of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
  6. Swarm autonomous warfare: conducive to forming a system advantage to suppress the enemy; conducive to enhancing combat effectiveness; conducive to trapping the enemy in combat difficulties
  7. Precision point killing war: achieve high efficiency and cost-effectiveness in operations; hitting key node targets is an important option; large-scale system support is a basic condition; it is inseparable from accurate intelligence support
  8. Supply chain disruption war: the supply guarantee chain has a huge impact on the overall operation; the focus of attack is the key node of the enemy’s supply guarantee chain; the key is to choose the right time to use tactics
  9. System destruction and paralysis war: the combat goal is to make the enemy’s combat system disordered; hit the key nodes of the combat system with a heavy punch; implement a soft attack on the enemy’s combat system

For learning reference only, welcome to communicate and correct! The views of the article do not represent the position of this organization
The concept of operation is first proposed as a new combat style. Innovative combat style is the core content of the development of combat concepts. It can be said that system-based optimization warfare is a general term for a series of specific tactics. The following nine typical combat styles constitute the combat method system of system-based optimization warfare. They are: First, overall deterrence warfare, actively organizing static power demonstrations and deterrence actions in the system-based superiority warfare, striving to win the battle without fighting or with a small battle; second, electromagnetic interference warfare, using a variety of combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for electromagnetic spectrum advantages, seize information control, and thus win the initiative in combat; third, network attack warfare, using a variety of means such as soft strikes and hard destruction to break the enemy’s command network, intelligence network, communication network, and logistics supply network, and disrupt the enemy’s command and support; fourth, cognitive control and interference warfare. Through information attacks, public opinion attacks, and brain attacks, control advantages are formed in cognitive space; fifth, agile mobile warfare. Rapidly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; sixth, swarm autonomous warfare. Widely use unmanned combat means such as “swarms”, “wolf packs”, and “fish schools” to autonomously organize actions and distributed attacks to achieve human-machine joint victory; seventh, precision point killing warfare. Accurately obtain intelligence, implement multi-domain precision strikes, strive to hit one point to shake the overall situation, and maximize combat effectiveness; Eighth, supply chain disruption warfare. Organize elite forces to attack the enemy’s logistics and equipment supply chain, supply lines and supply bases, and destroy the enemy’s loss of supply and withdrawal from the battle; Ninth, system destruction and paralysis warfare. Comprehensively adopt a variety of means such as breaking the network, training, and hitting nodes to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system.

  1. Overall deterrence warfare
    Overall deterrence warfare refers to actively organizing static power displays and deterrence actions in system-based superior warfare, striving to defeat the enemy without fighting or fighting a small battle. Sun Tzu said: “To defeat the enemy without fighting is the best of the best.” Deterrence and war are two main forms of military activities. Deterrence is mainly to show determination and will to potential opponents by showing strength or threatening to use strong strength to deter the opponent’s actions. It can be said that the overall deterrence warfare in the system-based superior warfare is an important means or tactics to achieve “stopping” the enemy’s troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first of all, strong in general, and then strong in key parts. Modern warfare is a confrontation between systems. The overall deterrence war under the informationized local war requires not only the traditional deterrence means and capabilities of land, sea, air and space, but also new deterrence means and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence, and more importantly, the overall deterrence that demonstrates the overall strength of the country. In particular, with the rapid development of advanced technologies such as information technology, the scientific and technological revolution, industrial revolution, and military revolution are accelerating integration, and the coupling relationship between strategic competitiveness, social productivity, and military combat effectiveness is closer. Winning the informationized war is more of a contest of national will and national overall strength. If you want to contain the war, you must first deter your opponent from the overall strength.
    1.1 Emphasize multi-domain joint deterrence
    Deterrence means usually include nuclear deterrence and conventional deterrence. In the system-based superiority war, the overall deterrence war is implemented, aiming to comprehensively use the conventional deterrence means of the land, sea, air, space, and power grid in the whole domain to achieve the purpose of deterrence. In particular, with the application of information network technology and space and directed energy technology in the military, space, network, and electromagnetic weapons have become new means of deterrence. Space deterrence mainly uses rapid response electromagnetic orbital weapons, space-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, high-power microwave weapons and other equipment to threaten and attack the opponent’s space targets, forming an “interference and blocking” deterrence against the enemy’s space information. Network deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other key information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communication and other informationized weapon equipment systems to achieve deafening and blinding deterrence against the enemy. 1.2 Three elements should be possessed in the implementation of overall deterrence warfare
    To implement overall deterrence warfare and achieve the expected deterrence effect, three elements are usually required: one is strength. The deterrent party must have reliable capabilities or strength that make the opponent feel daunted and fearful; the second is determination and will. The deterrent party must dare to use this capability when necessary; the third is clear information transmission. The deterrent party must accurately and effectively let the other party know its action capability and determination.
    Historically, there are three main changes in the criteria for judging deterrence strength: first, active military strength; second, comprehensive national strength or war potential; third, the total number of main combat weapons and equipment. For a long period of history, the number of troops was deterrence, and the strength of military strength directly depended on the size of the active army, the number of important weapons and equipment, and non-material factors such as military training and organization morale. After the 20th century, with the expansion of the scale of war, deterrence strength is no longer limited to the number of troops and important weapons and equipment, but is determined by the country’s war potential, including economic strength, scientific and technological strength, energy resources, and even population size, etc. The overall deterrence war in the system-based superiority war, the formation of its deterrence strength is mainly based on the network information system, and the joint full-domain deterrence capability formed under the integration of the system.
    1.3 Strong overall strength is the core of achieving effective deterrence
    The development of information technology and its extensive penetration and application in the military field have provided favorable conditions for building overall strength and achieving overall deterrence. System-based superior warfare is supported by the network information system and makes full use of the penetration and connectivity of information technology. It not only integrates various combat forces, combat elements, and combat units into an organic whole to achieve military system combat advantages, but also connects and integrates various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, into the national war mobilization system, gathers various forces and resources to form an overall force, realizes the emergence effect of system capabilities, and shows the overall strength advantage. It forms a powerful invisible deterrent of unity and common hatred of the enemy, and creates a situation where the enemy “has power but cannot act” and “can act but has no effect”, which plays a role in containing and winning the war.
    In the overall deterrence war, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even relevant regions of the world; the mobilization time will be faster, and the mobilization and action information can be quickly transmitted to everyone and every node at the first time by using the network and information system; the action coordination and collaboration will be more consistent, and the forces distributed in various regions can act in a unified manner almost at the same time based on the same situation and the same order, greatly improving the efficiency of action coordination; the resource utilization will be more sufficient, and various war resources based on the network can quickly realize the transition from peace to war and from military to civilian, and realize the integrated and precise guarantee of the front and rear.
  2. Electromagnetic interference warfare
    Electromagnetic interference warfare refers to the flexible use of various combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantage of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat.
    2.1 The key to competing for information advantage Local information warfare is highly dependent on the electromagnetic spectrum, and the control and counter-control of electromagnetic space have become the focus of competing for the right to control information. Organizing and implementing electromagnetic interference warfare is mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. Using electromagnetic means to disrupt and destroy the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capability, and enable the enemy to ensure the rapid and effective flow of information in the scenario where the enemy has the right to control information, and drive the command flow, action flow, material flow, and energy flow through the information flow, thereby gaining the dominance and initiative of the operation.
    2.2 The basic focus is to disable and invalidate the enemy’s combat system. The implementation of electromagnetic interference warfare in the system-based superior warfare is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure the effective use of electromagnetic space by the enemy, various electronic reconnaissance, interference, attack, defense and support forces are organized to interfere with and attack the enemy’s communication network, radar network, computer network and command center, communication hub, radar station, computer network node, global navigation positioning system, space-ground integrated Internet and other space link systems, and other various frequency-using weapons and equipment, block and destroy their communication and data transmission, and destroy the “connection” and “sharing” structural center of gravity of the enemy’s combat system, and provide support for the seizure of information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities and disabling the enemy’s entire combat system.
    2.3 Effective tactics to crack unmanned swarm warfare
    Unmanned autonomous swarm warfare such as “bee swarm”, “wolf pack” and “fish pack” is an important feature of information-based local warfare with intelligent characteristics. There are a large number of various unmanned autonomous clusters, with various types and complex characteristics, and each individual can complement each other and replace each other to play a role. It will be very difficult to intercept and destroy the entire unmanned cluster. However, from a technical perspective, in order to achieve effective coordination in unmanned combat clusters, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield situation and information, and it will be difficult to coordinate actions with each other, and it will be difficult to play its due combat effectiveness. This provides an opportunity for the other party to implement communication interception and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attack on the information and communication network of unmanned clusters, and destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective coordination, thereby losing combat capability.
  3. Network attack warfare
    Network attack warfare refers to the comprehensive use of network and computer technologies and other effective means to conduct military confrontation actions around the control of information and information networks. It is a major combat style for cyberspace operations and the struggle for network control. Its main combat operations include both soft killing and hard destruction, mainly soft and hard. Among them, soft kill is mainly network attack, that is, the comprehensive use of blocking attack, virus attack and other means to block and attack the enemy’s information network, command system, weapon platform, etc., making it difficult for the enemy’s network, command information system, etc. to operate effectively or even paralyzed; hard destruction mainly uses precision firepower strikes, high-energy microwaves, electromagnetic pulses and anti-radiation attacks to paralyze the enemy’s information network physical facilities and destroy the enemy’s combat and weapon equipment entities.
    The focus is on breaking the network and reducing the ability to fail. Organizing network attack in the system concentration war is to target the weaknesses of the opponent’s military information network, take advantage of the system, organize various network attack forces, and continuously implement soft kill and hard destruction actions against the enemy’s combat command network, reconnaissance intelligence network, communication network and even logistics supply network throughout the combat process, destroy the enemy’s network system, and make the enemy’s combat system function decline or even disabled as a whole. Mainly against the enemy’s basic information network, intelligence network, command network, support network and other core targets, implement a series of combat operations such as network and electricity coordinated attack, deception confusion, link blocking, takeover and control, so that the enemy’s intelligent combat network system is disabled and ineffective, and achieve a key victory in paralyzing the enemy system.
  1. Cognitive control and disturbance warfare
    Cognitive control and disturbance warfare refers to the interference, destruction or control of enemy thinking and cognition through information attack, public opinion attack and brain attack in the system-based superiority warfare, so that the enemy cannot make correct judgments and decisions, thereby forming a control advantage over the enemy in the cognitive space.
    The cognitive domain, that is, the human thinking space and consciousness space, is a field that has a key impact on combat decisions and judgments. The development of information technology, especially artificial intelligence technology, and its wide application in the military field have expanded the competition of war from physical space and information space to cognitive space, making cognitive space a new combat domain. With the development of information and intelligent technology and their extensive and in-depth application in the military field, human-machine intelligence tends to merge, making the status of cognition in intelligent warfare operations more prominent, and the cognitive field has gradually become an important battlefield. Controlling cognitive rights has become a key factor in future battlefield control rights. Fighting for cognitive control rights has become an important combat style for winning in informationized local wars with intelligent characteristics.
    4.1 Controlling situational awareness and cognitive rights and fighting for information advantages
    In the system-based superiority warfare, information flow drives material flow and energy flow, and information advantage determines decision advantage. The rapid and accurate recognition of intelligence information and battlefield situation has an important impact on gaining command and decision-making advantages. Therefore, in order to organize and implement system-based optimization, we must make full use of intelligent technology and big data technology to analyze massive intelligence information data.

國語中文:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示與威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動;三是網絡破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通訊網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速響應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間資訊「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連結、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界相關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,以網路為基礎的各種戰爭資源,可快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2 基本著眼點是使敵作戰體系失能失效體系聚優戰中實施電磁擾阻戰,主要是針對敵方對電磁空間的依賴,同時為確保己方對電磁空間的有效利用,組織各種電子偵察、幹擾、攻擊、防禦和支援力量,對敵通信網、雷達網、電腦網和指揮中心、通信樞紐、雷達站、電腦網路節點,全球導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通訊聯絡與資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱敵指揮控制能力,使敵整個作戰體系失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊網路物理設施,摧毀敵作戰及武器裝備實體。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷與硬摧毀行動,破壞敵之網路體系,使敵作戰體系功能整體下降甚至失能。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。


4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行

中國軍事資料來源:https//www.81it.com/2022/0901/13716.html

Chinese Military Training and the Metaverse: Challenges & Opportunities Coexist

中國軍事訓練與虛擬世界:挑戰與機會並存

現代英語:

 In the field of military training, the basic technology of the Metaverse has long been used as a virtual resource by the military to varying degrees. It must be acknowledged that the value and potential of the Metaverse in military training is immeasurable and is the focus of current and future military competition. However, due to the immaturity of the development of Metaverse-related technologies and their application in military training, the bright prospects are accompanied by potential risks.

1. The past and present of the military training metaverse
       
 The metaverse relies on a technology group with virtual reality technology as its core. In its early form in the military field, it is also called virtual simulation or simulated Internet. It can be said that virtual simulation training is very close to today’s concept of the metaverse and is the primary form of the military training metaverse. From ancient times to the present, the progress that has brought great influence in the field of science and technology is generally for winning wars or maintaining combat effectiveness. As the leading technology of the third scientific and technological revolution, the metaverse is used for military training in different forms of basic metaverses in the global military field.
      The US military began to deploy the “Military Metaverse” plan very early. In 1978, Jack Thorpe, a captain of the US Air Force, proposed the idea of ​​a military simulator network in his paper, hoping to establish a distributed or networked military modeling system to facilitate training. In 1983, the Advanced Research Projects Agency (DARPA) of the US Department of Defense developed the Virtual Battlefield Network Simulator (SIMNET Simulator), which uses computers to generate virtual battlefields, simulate the situation of fighting between the two sides, and summarize errors and failures. Replacing field exercises in this way saves costs to a certain extent and improves the effectiveness of training. Although the SIMNET simulator, as the earliest version, was still at a lower level of battlefield simulation, it pioneered distributed or networked modeling and simulation. By the end of the 1980s, the project reached its peak, and eventually more than 200 simulated interconnected tank and aircraft simulators based on local area networks and wide area networks were formed across the United States and across Europe, and used for large-scale training and exercises. The distributed interactive simulation (DIS) protocol developed at that time is still in use today, and through more advanced high-level architectures, different military simulations can be linked to provide a richer collective training or mission preparation experience. It can be said that the SIMNET simulator project directly or indirectly promoted the development of many key technologies of the current metaverse. Today, the US military is very interested in the metaverse that has sprung up like mushrooms after rain. The newly established military branch, the United States Space Force (USSF), wants to create a military-specific metaverse for collaborative operations, training, and mission execution. Its chief technology officer, Lisa Costa, declared: “Soldiers cannot go to space in person. The only way they can experience their own combat territory is through visual data display. The virtual reality environment will provide them with situational awareness and understand their options in order to make decisions.”
       In recent years, virtual reality and augmented reality technologies of the metaverse have been incorporated into the regular military training of the US military. In 2014, the BlueShark project developed by the Office of Naval Research and the Institute for Creative Technologies at the University of Southern California allowed soldiers to collaborate in a virtual environment to conduct driving technology training; in 2018, the US Army and Microsoft cooperated to develop an integrated visual enhancement system IVAS for soldiers to conduct regular training; in 2020, the US Navy launched the Avengers Project to conduct flight course training through virtual reality, artificial intelligence and biometric technology; in 2021, Boeing created a military aircraft training system that enables maintenance personnel to use AR technology for related simulated maintenance drills; on May 10, 2022, two US fighter pilots took a jet and completed a high-altitude prototype metaverse experiment over the California desert. Refueling operations were performed using a virtual tanker through a specially designed augmented reality display connected to a computer system that displayed a glowing image of a virtual refueling aircraft.

 (I) The US military uses virtual reality technology for military training on a large scale
       
 . At the same time, Russia is also a leader in the development of virtual training systems. Almost all of its advanced weapons and equipment are equipped with corresponding virtual training systems, and are developing in the direction of universalization and embeddedness. For example, the Sound M universal virtual training system is a universal virtual training equipment for combat personnel of surface-to-air missile weapon systems. The Tor M1 surface-to-air missile system is also equipped with a special virtual training vehicle, which can complete battlefield simulation training while searching for targets and conducting weapon operations.

 (II) The Tor M1 surface-to-air missile system is also equipped with a dedicated virtual training vehicle.
        
 In addition, other countries have also begun to explore the combination of metaverse technology and military training. The British Army has been committed to studying the use of extended reality technology, which can put more than 30 soldiers in the same virtual training scene. The British Ministry of Defense’s “Single Synthetic Environment” has used this technology in soldier training. In South Korea, a developer and supplier of a military training simulator called “Optimus Prime” completed the development of the DEIMOS military training system based on metaverse technology in 2019 and applied it to the training of the armed forces. The system can create various environments for professional military training, including precision shooting training, tactical behavior training and observation training.

       2. The inherent advantages of the metaverse in military training Military training
       
is a commonplace in the military, specifically referring to the military theory and related professional knowledge education, combat skills training and military operations exercises conducted by the armed forces and other trainees. The continuous innovation of technologies such as artificial intelligence and virtual reality has accelerated the trend of intelligentization in future wars. Single actual combat exercises in traditional forms will be difficult to meet the combat requirements under the new situation. As a huge group of new technologies, the metaverse plays an increasingly important role in military training. If training is an important support for combat effectiveness, then the primary use of the metaverse in military training is as an important “enabler” for simulation training.       Immersive experience can improve the effectiveness of battlefield environment simulation. As a practical science, military training is centered on experience and the key to training is immersion. The virtual space created by the metaverse makes people feel a “common sense of embodied presence”, allowing trainees to fully immerse themselves in the virtual space and experience a war close to reality. Battlefield environment simulation uses virtual reality technology to process battlefield element data such as battlefield terrain, battlefield personnel, weapons and equipment through computer systems, and finally creates a realistic three-dimensional battlefield environment. Soldiers are immersed in digital environments such as deserts, mountains or plateaus. Each environment has different tactics, techniques and procedures, and soldiers can constantly practice tasks. Even if the soldiers are not in the actual battlefield environment, this technology is enough to restore the authenticity of the environment. More importantly, through battlefield simulation training, not only can soldiers become familiar with the battlefield environment and obtain information to the greatest extent, but they can also improve their ability to observe things from multiple angles and solve emergencies. The US military has developed a virtual reality system called a laser sand table, which can identify and convert photos and videos sent back by satellites, and turn them into realistic three-dimensional maps, presenting the battlefield environment thousands of miles away to commanders. Before the wars in Afghanistan and Iraq, the US military used virtual reality technology to create real war scenes, including battlefield conditions, personnel appearances, etc., in order to allow soldiers to adapt to the environment in advance and improve their combat capabilities.

 (II) On the eve of the wars in Afghanistan and Iraq, the U.S. military used virtual reality technology to create real war scenes
        
. Open interconnection better supports synthetic training. The various parts of the Metaverse ecosystem can be interconnected and operated, and information can be transmitted across platforms and across the world (between virtual worlds or between the virtual world and the real world) without hindrance. Synthetic training uses the open interconnection advantage of Metaverse technology to supplement actual combat training. According to statistics, since 2015, the number of non-combat deaths in the U.S. military has exceeded the number of deaths in actual military operations each year, and many of the deaths in non-combat operations are caused by conventional military training. Therefore, the U.S. Army has begun to use Metaverse to carry out synthetic training in an attempt to establish a virtual synthetic training environment (STE) to reduce casualties in training. From urban warfare to mountain warfare, the “synthetic training environment” integrates “real-time, virtual and constructive training environments into a single synthetic training environment, and provides training functions to ground, transport and air platforms and command posts where needed.” Practice has proved that the synthetic training environment built by the metaverse, with the help of multi-sensory simulation and restoration, can help soldiers break through the limitations of theoretical learning and cognition, and improve the quality and ability of team combat coordination, injury treatment and safe evacuation. On the eve of the Iraq War, the US military stationed in Kuwait conducted synthetic training on Iraq’s urban conditions, which enhanced the soldiers’ urban combat capabilities while minimizing casualties in actual combat. The
      imaginative space stimulates innovation in military training thinking to the greatest extent. War exercises have been valued by military strategists since ancient times. During the Warring States Period, Mozi and Gongshu Ban’s deduction games of “untying belts to make a city” and “wooden pieces to make weapons” rehearsed the real situation on the battlefield, thus avoiding fighting between the two armies. In the deep scene era opened by the future metaverse, the military system will become highly intelligent, and the two sides of the war may be able to conduct war deductions in the battlefield metaverse, and even compete in the virtual world. Based on the information obtained in the virtual world, the two sides of the deduction capture and predict the changes in the battlefield through thinking processes such as association, reasoning and logical judgment, which is not only conducive to learning more war laws, but also can exercise the soldiers’ logical deduction ability. In the Gulf War of 1991, the U.S. military conducted war games based on the training level of the troops, the possible course of the war, and the time required for actual combat before implementing Operation Desert Storm. Practice has proved that the U.S. military used the problems found in this war game to transform the combat concept into an actual action plan and ultimately won. This also fully demonstrates that the real battlefield is full of uncertainties, so it is necessary to be fully prepared through continuous war exercises. Undoubtedly, it is almost impossible for the enemy and us to conduct coordinated deductions in the real world, but if the deployment of the enemy and us can be made public to a certain extent by their respective satellites, air and ground reconnaissance equipment, then at a certain time point, between two or more parties about to break out a military crisis, it is expected that the deployment of troops in the metaverse can be carried out first, and the actual military conflict can be resolved.
      The application of metaverse technology in military training can not only avoid accidental casualties during training, but also allow a single or many trainees to complete training tasks in different virtual environments without leaving home and without actual contact. And this kind of non-contact training plays a more obvious role in the regular form of the new crown epidemic.
       3. Potential risks of the metaverse in military training
      
Although the metaverse provides technical support for military training to a large extent, it should never be simply understood as a training program or considered as a means of conducting training. Even if the metaverse technology brings convenience and innovation to military training, the technology itself and its accompanying challenges and uncertainties cannot be ignored.
      The development of metaverse technology may cause security issues. The metaverse is a huge technology group. Its system architecture, core algorithms and immersive technology are still in a stage of continuous development. The supporting industry, value consensus, management standards, etc. have not yet been reached. In general, the metaverse is still a new thing, and its application in military training is even more so. Although the use of virtual training systems can reduce casualties to a certain extent, it is worth thinking about whether such training can be truly used in combat sites. It is still an unknown. And whether the technology is safe enough in operation is also an urgent problem to be solved. James Crowley of Virtual City Training Experts pointed out that computer power may be the most influential part of it. Unless the delay can be reduced to a level that does not make people uncomfortable and feels real, and unless the movement and communication data between different people can be stored in different simulators, it will not be able to provide practical training tools. At the same time, another challenge is the security issue of mutual contact between the armies of different countries in the open virtual world of the Metaverse.
      Virtual training environments are prone to cognitive illusions. Military training in the Metaverse world is the result of a contest between human intelligence and technology. War simulations and military training conducted in a virtual environment can have a powerful deterrent effect on future wars, just like “nuclear weapons”. Although it makes up for the limited senses of people at the physiological level, it also brings psychological cognitive illusions to trainees. Taking unmanned combat military training as an example, long-term combat training under a virtual system will cause the operator to have a gaming mentality. Because the audiovisual senses are out of touch with the real battlefield situation, they are alienated from the real people and society, and have a numb mentality towards the behavior of depriving others of their lives. With the continuous maturity of Metaverse technology, the interaction between the virtual world and the real world will become closer and closer, forming a mixed world that is difficult to distinguish between the real and the virtual. By then, it will not only cause a distinction dilemma for the cognitive psychology of soldiers, but also a major challenge for future military training. The
      “decentralization” of the Metaverse deviates from the traditional military training structure. In the world of the metaverse, all parties involved are virtual entities with equal status after computer processing and digitization. They can act autonomously in the metaverse, so they pursue “decentralization”. However, the traditional military training organizational structure is highly centralized and hierarchical management from top to bottom, which is contrary to the value needs of the metaverse. The US military has made a lot of efforts in pursuing “decentralized” operations, such as the “network-centric warfare” proposed in the 1990s, and the current distributed lethality and mosaic warfare. However, the traditional military training structure and thinking inertia are still obstacles to “decentralization”, and this situation is common in the armies of various countries.
     Yuval Noah Harari said in “Sapiens: A Brief History of Humankind” that humans conquer the world by relying on the ability of fiction and imagination. The metaverse gives us the ability to fiction and imagine, and at the same time, the uncertainty of the metaverse in the field of military training also increases the element of fear. Therefore, we must pay attention to innovative scientific and technological theories, develop cutting-edge metaverse technologies, continuously stimulate the potential of the military training metaverse, and at the same time improve relevant laws, regulations and moral and ethical regulations to make advance preparations for winning future intelligent wars.

國語中文:

在軍事訓練領域,元宇宙的基本技術其實早就作為一種虛擬資源,在不同程度上為軍方使用。必須承認,元宇宙在軍事訓練中的價值潛力不可估量,是當下和未來軍事領域爭鋒的焦點。但由於元宇宙相關技術的發展及其在軍事訓練中的應用尚不成熟,美好前景背後也伴隨著潛在風險。
一、軍事訓練元宇宙的前世今生
元宇宙依賴的是以虛擬實境技術為核心的技術群,在軍事領域的早期形態又稱為虛擬模擬或模擬互聯網。可以說,虛擬模擬訓練已經非常接近今天的元宇宙概念,是軍事訓練元宇宙的初級形態。從古至今,科技領域帶來巨大影響力的進步普遍都是為了贏得戰爭或保持戰鬥力。作為第三次科技革命的領導技術,元宇宙在全球軍事領域,以不同形式的基本元宇宙被用於軍事訓練。
美軍很早就開始部署「軍事元宇宙」計畫。 1978年,美空軍上尉傑克·索普在自己的論文中提出了軍事模擬器網路的構想,希望建立一個分散式或網路化的軍事建模系統方便訓練。 1983年美國防部高級研究計畫局(DARPA),開發了虛擬戰場網路模擬器(SIMNET模擬器),以電腦生成虛擬戰場,模擬雙方交戰的情形進行推演,總結錯誤和失敗。用這樣的方式取代實地演習,一定程度上節省了成本,也提高了訓練的效果。雖然SIMNET模擬器作為最早的版本仍處於較低階的戰場仿真,但卻開闢了分散式或網路化建模仿真的先河。到了20世紀80年代末,該計畫達到頂峰,最終落地形成200多個遍布美國、橫跨歐洲,基於區域網路和廣域網路的模擬互聯坦克和飛機模擬器,並用於大規模訓練與演習。而當時開發的分散式互動式模擬(DIS)協議,至今仍在使用,並且透過更先進的高階體系結構,可以連結不同的軍事模擬,以提供更豐富的集體訓練或任務準備體驗。可以說SIMNET模擬器專案直接或間接推動了當前元宇宙的許多關鍵技術的發展。時至今日,美軍對如雨後春筍般崛起的元宇宙興趣正濃,新成立的軍種——美國太空部隊(USSF)欲打造軍事專用元宇宙,用於協同作戰、訓練、執行任務。其技術主管利薩·科斯塔宣稱:「軍人們並不能親自上太空,他們體驗自身作戰疆域的唯一途徑就是視覺數據顯示,虛擬現實環境會為他們提供態勢感知,並了解自己的選項,以便做出決策。
近年來,元宇宙的虛擬實境和擴增實境技術已納入美軍的常規軍事訓練。 2014年,南加州大學海軍研究辦公室和創意技術研究所開發的BlueShark項目,讓士兵在虛擬環境中協作配合,進行駕駛技術訓練;2018年,美陸軍與微軟合作開發了一款集成視覺增強系統IVAS ,供士兵進行常規訓練;2020年,美海軍又推出了復仇者計劃,透過虛擬現實、人工智慧以及生物識別技術,開展飛行課程培訓;2021年,波音公司打造了一個軍用飛機培訓系統,使維修人員利用AR技術進行相關模擬維修演練;2022年5月10日,兩名美軍戰鬥機飛行員乘坐噴射機,在加州沙漠上空完成了一次高空原型元宇宙實驗。透過特製的擴增實境顯示器,連接到一個虛擬加油飛機發光影像的電腦系統,使用虛擬加油機進行了加油操作。
(一)美軍大量採用虛擬實境技術進行軍事訓練
同時,俄羅斯在虛擬訓練系統的開發上也是領先者,其先進武器裝備幾乎都配有相應的虛擬訓練系統,並且正在朝著通用化和嵌入式的方向發展。如音色M通用虛擬訓練系統就是用於地對空飛彈武器系統作戰人員的通用虛擬訓練裝備。道爾M1型地對空飛彈系統也配備有專用虛擬訓練車,可在目標搜尋和武器作戰的同時完成戰地模擬訓練。

(二)道爾M1型地空飛彈系統也配備有專用虛擬訓練車
此外,其他國家也紛紛開始探索元宇宙技術與軍事訓練的結合。英陸軍一直致力於研究擴展實境技術的使用,可以讓30多名士兵處於相同的虛擬訓練場景。英國防部的「單一合成環境」已經在士兵訓練中使用了這項技術。在韓國,一家名為「擎天柱」的軍事訓練模擬器的開發商和供應商,在2019年完成了基於元宇宙技術的DEIMOS軍事訓練系統研發並應用於武裝部隊的訓練。該系統能夠為專業軍事訓練創造各種環境,包括精準射擊訓練、戰術行為訓練和觀察訓練。
二、軍事訓練元宇宙的內在優勢
軍事訓練乃是兵家常事,具體指武裝力量及其他受訓對象所進行的軍事理論及相關專業知識教育、作戰技能教練和軍事行動演練的活動。人工智慧、虛擬實境等技術的不斷革新,加速了未來戰爭的智慧化趨勢。傳統形式下的單一實戰演練將難以滿足新情勢下的作戰要求。而元宇宙作為一個龐大的新技術群,在軍事訓練中扮演越來越重要的角色。如果說訓練是戰鬥效能的重要支撐,那麼元宇宙在軍事訓練中的首要用途便是作為模擬訓練重要的「賦能器」。
沉浸式體驗能夠提升戰場環境模擬效能。軍事訓練作為實踐科學,訓練的核心在體驗,訓練的關鍵在沉浸。元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”,讓受訓者完全沉浸虛擬空間,體驗一場接近真實的戰爭。戰場環境模擬正是利用虛擬實境技術,透過電腦系統對取得的戰場要素資料如戰場地形、戰場人員、武器裝備等進行處理,最終創設出逼真的立體戰場環境。士兵們沉浸在沙漠、山區或高原的數位環境中,每個環境都有不同的戰術、技術和程序,士兵們可以不斷地演練任務。即便士兵不是在實際的戰場環境中,但這項技術足以還原環境的真實度,更重要的是透過戰場模擬訓練,不僅能夠讓士兵熟悉戰場環境,最大程度獲取信息,而且還能提升其多角度觀察事物、解決突發狀況的能力。美軍目前已研發出一款被稱為雷射沙盤的虛擬實境系統,能夠辨識和轉換衛星發回的照片和錄像,並將其轉變成逼真的立體地圖,將遠在千里外的戰場環境呈現給指揮員。在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術來打造真實的戰爭場景,包括戰地狀況、人員樣貌等。旨在讓士兵提前適應環境,提升作戰能力。

(一)元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”

(二)在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術打造真實的戰爭場景
開放式互聯較能支撐合成訓練開展。元宇宙生態系統各部分之間可以實現相互連接和操作,資訊可以暢通無阻地實現跨平台和跨世界傳輸(在虛擬世界之間或虛擬世界與現實世界之間)。合成訓練正是利用元宇宙技術的這一開放式互聯優勢,來實現實戰訓練的補充。根據統計,從2015年開始,美軍每年的非戰鬥死亡人數超出了在實際軍事行動中犧牲的人數,而在非戰鬥行動中喪生的人員很多是由常規軍事訓練造成的。因此,美陸軍已經開始採用元宇宙進行合成訓練,試圖建立虛擬合成訓練環境(STE)來減少訓練中的傷亡。從城市作戰到山地作戰,「合成訓練環境」將「即時、虛擬和建設性的訓練環境整合到一個單一的合成訓練環境中,並在有需要的地方向地面、運載和空中平台以及指揮所提供訓練功能」。實務證明,透過元宇宙建構的合成訓練環境,藉助多感官模擬還原,能夠幫助戰士突破理論學習和認知局限,提升團隊作戰協同、傷情處置和安全撤離等素質和能力。伊拉克戰爭前夕,駐紮在科威特的美軍就對伊拉克的城市狀況進行了合成訓練,增強了士兵城市作戰能力的同時,把實戰中的傷亡降到了最低。
想像性空間最大程度激發軍事訓練思維創新。戰爭演習自古就受到兵家重視,戰國時期墨子和公輸班「解帶為城」「木片為械」的推演遊戲將戰場上的真實情況演練出來,從而避免了兩軍交戰。在未來元宇宙開啟的深度場景時代,軍事體系將走向高度智慧化,作戰雙方或許能在戰場元宇宙進行戰爭推演,甚至在虛擬世界一決高下。推演雙方根據虛擬世界獲取的信息,透過聯想、推理和邏輯判斷等思維過程,對戰場風雲變化進行捕捉和預判,不僅有利於習得更多戰爭規律,還能夠鍛鍊士兵的邏輯推演能力。 1991年的海灣戰爭中,美軍就在實施「沙漠風暴」行動前,根據部隊的訓練水準和可能的戰爭進程,以及實際作戰所需時間進行了兵棋推演。實踐證明,美軍借助這次兵棋推演發現的問題,將作戰設想轉化為實際行動方案,最終取得勝利。這也充分說明了真實的戰場充滿了種種不確定性,因此需要透過不斷進行戰爭演習來做好充分準備。毋庸置疑,敵我雙方在現實世界中進行協同推演幾乎是不可能的,但若敵我雙方的兵力部署可以被各自的衛星、空中和地面偵查設備進行一定程度的公開,那麼在某個時間節點,在即將爆發軍事危機的雙方或多方之間,先在元宇宙中進行排兵布陣,可以化解現實的軍事衝突則有望實現。
元宇宙技術在軍事訓練中的應用不僅可以避免訓練中的人員意外傷亡,還可以讓單一或眾多參訓者在足不出戶,無需實際接觸便可在不同虛擬環境下完成訓練任務。而這種非接觸式訓練在新冠疫情的常規化形態下,所扮演的角色更加明顯。
三、軍事訓練元宇宙的潛在風險
元宇宙在很大程度上雖然為軍事訓練提供技術支撐,但絕不能僅僅將其簡單地理解為一種訓練項目,或者被認為是一種開展訓練的手段。即使元宇宙技術為軍事訓練帶來便利和創新,也不能忽視科技本身及其伴生的挑戰和不確定性。
元宇宙技術發展或引發安全問題。元宇宙是一個龐大的技術群,其體系架構、核心演算法和沈浸技術等尚處於不斷開發的階段,配套產業、價值共識、管理標準等還沒有達成,總的來說,元宇宙還是一個新事物,在軍事訓練中的應用更是如此。儘管使用虛擬訓練系統能夠在一定程度上減少傷亡,但值得思考的是這樣的訓練是否能夠真正用於作戰現場,目前仍是一個未知數。而技術在運作中是否夠安全也是一個亟待解決的問題。虛擬城市訓練專家公司的詹姆斯·克勞利指出,電腦能力可能是其中最有影響力的部分,除非可以將延遲降低到不會讓人不適並且感覺真實的程度,除非可以在不同的模擬器中儲存不同人之間的行動和通訊數據,否則將無法提供實用的訓練工具。同時,另一個擺在眼前的挑戰則是在開放的元宇宙虛擬世界中,不同國家軍隊之間相互接觸的安全問題。
虛擬訓練環境易造成認知錯覺。元宇宙世界裡的軍事訓練是人類智力和技術較量的結果,在虛擬環境下進行的戰爭推演、軍事訓練等對未來戰爭的作用,如同「核武」一般,不用動用實槍實彈也能起到強大的威懾效果。儘管在生理層面彌補了人的有限感官,同時也帶來了受訓者在心理上的認知錯覺。以無人作戰的軍事訓練為例,長期在虛擬系統下進行作戰訓練,將會造成操縱者的遊戲心態。由於視聽感官與真實戰場情況脫節,而疏離了現實的人與社會,對於剝奪他人生命的行為產生麻木心態。隨著元宇宙技術的不斷成熟,虛擬世界、現實世界的互動將會越來越緊密,形成虛實難分的混合世界。到那時,不僅對士兵的認知心理造成區分困境,對於未來的軍事訓練也是重大挑戰。
元宇宙「去中心化」與傳統軍事訓練結構相背離。在元宇宙的世界中,參與各方都是經過電腦處理、資料化後產生的地位平等的虛擬主體,可以在元宇宙中自主活動,因而其追求「去中心化」。但傳統的軍事訓練組織結構則是高度集中、自上而下的分層化管理,這一方面與元宇宙的價值需求是背離的。美軍在追求“去中心化”作戰上做出了很多努力,如20世紀90年代提出的“網絡中心戰”,以及當前的分散式殺傷以及馬賽克戰等。但傳統的軍事訓練結構和思維慣性仍然是「去中心化」的阻力,而這種情況普遍存在於各國軍隊。
尤瓦爾·赫拉利在《人類簡史》中談道,人類靠著的是虛構和想像的能力征服世界。元宇宙給了我們虛構和想像的能力,同時元宇宙在軍事訓練領域的不確定性也增加了恐懼的成分。因此,我們必須關注創新科技理論、發展元宇宙前沿科技,不斷激發軍事訓練元宇宙的潛力,同時完善相關法律法規和道德倫理規約,為打贏未來智慧化戰爭做好超前準備。
版權聲明:本文刊於2023年1期《軍事文摘》雜誌,作者:張愷悅、李傑春,如需轉載請務必註明「轉自《軍事文摘》」。

中國軍事原文來源:https//www.81it.com/2023/0321/14167.html

China’s Military Unveils the Metaverse

中國軍隊推出虛擬宇宙

現代英語翻譯:

As if overnight, “metaverse” suddenly became a hot word, and related concepts formed many hot topics.

With the development of technologies such as extended reality, digital twins, 3D rendering, cloud computing, artificial intelligence, high-speed networks, blockchain, and the iteration of terminal equipment, the construction and evolution of the “metaverse” may far exceed people’s expectations, and a new Internet form of multi-dimensional, full-sensory, immersive human-computer interaction will hopefully become a reality.

What is the Metaverse?

“Metaverse” is a term that comes from the 1992 science fiction novel Snow Crash. In the novel, humans live in a virtual three-dimensional world through “Avatar” (digital virtual avatar), and the author calls this space “Metaverse”.

From science fiction to reality, people have not yet reached an absolute consensus on “what is the metaverse”. Due to the evolution of the times and technological changes, the “metaverse” is still an evolving concept. “There are a thousand Hamlets in the eyes of a thousand people”. Different participants are constantly enriching its definition in their own way, and the possibilities of the characteristics and forms of the “metaverse” are also constantly changing. However, we can explore a little through the existing presentation of the “metaverse”.

At present, “Metaverse” concept products are mainly concentrated in online games, VR/AR, social networking and other fields.

Online games are generally considered by the industry to be the most likely field to realize the “metaverse” because they have virtual scenes and players’ virtual avatars. Today, game functions have gone beyond the game itself, and the boundaries of games are expanding, and they are no longer just games.

A well-known singer held a virtual concert with his virtual image in the game “Fortnite”, which attracted more than 12 million players from all over the world to participate, breaking the boundary between entertainment and games; due to the impact of the epidemic, the University of California, Berkeley and the School of Animation and Digital Studies of Communication University of China coincidentally rebuilt their campuses in the sandbox game “Minecraft”. Students gathered together with virtual avatars to complete the “cloud graduation ceremony”, realizing the integration of virtual games and real social interactions.

The new generation of “VR social (virtual offline social)” has gradually developed and become popular. It is a fusion of offline social (face-to-face in reality) and online social (through social software such as WeChat). Some well-known VR social platforms provide a free community environment, which not only becomes a place for players’ online activities and virtual face-to-face gatherings, but also becomes a social and cultural phenomenon closely related to the current concept of “metaverse”.

The above-mentioned “metaverse slices” are all important explorations into the construction of the “metaverse”, and they explain in a variety of visible and tangible ways how the “metaverse” will change our real life.

In common research, the following consensus has been formed: “Metaverse” is a new type of Internet application and social form that integrates multiple new technologies and integrates virtual and real. It provides immersive experience based on extended reality technology, generates virtual and real scenes based on digital twins and 3D rendering technology, builds basic software and hardware services based on cloud computing, artificial intelligence and high-speed networks, and builds an economic system based on blockchain technology, closely integrating the virtual world with the real world in economic system, social system and identity system. At the same time, it allows each user to produce and edit content, and has complete self-driving and iteration capabilities.

The development direction of the “metaverse”

Today’s mobile Internet is actually still in a flat information interaction state, presented on mobile terminals through text, sound, pictures, and videos. Although news information, e-commerce, social chat, live video, etc. meet people’s needs for using the Internet, it is obviously impossible to achieve the effect of face-to-face communication and full sensory experience in real life through the mobile phone screen. With the development of society, people need more original and rich experience and interaction.

The COVID-19 pandemic has forced people to move their daily lives from offline to online. This forced transformation has led to more thinking, discussion and attention on the “metaverse”. In particular, the core feature of the “metaverse” is the immersive experience, which can turn a plane into a three-dimensional, multi-dimensional, real-time interactive space, greatly enriching and restoring the real physical world and various human relationships. Therefore, people have high hopes for the “metaverse”.

Looking back at the development of information technology and media, humans have continuously changed the way they perceive the world, and later began to consciously transform and reshape the world. From the newspaper era, the radio and television era, to the Internet era, and the mobile Internet era, the tools and platforms under the concept of “metaverse” are becoming increasingly complete, and the path to the “metaverse” is gradually becoming clearer.

Since 2020, Internet giants in various countries have been closely deploying cutting-edge technologies such as extended reality, digital twins, 3D rendering, cloud computing, artificial intelligence, high-speed networks and blockchain, and the door to the ultimate closed-loop ecosystem of the “metaverse” has been opened little by little. Today, when the “bonus” of mobile Internet users has peaked, many experts and scholars have stated that the “metaverse” will be the ultimate form of the next generation of the Internet.

Just as it was difficult to accurately predict the development of the Internet 20 years ago, people cannot accurately predict the future form of the “metaverse”. However, combined with the development trends of related industries today, we can see that: the Internet has changed human life and digitized communication between people, and the “metaverse” will digitize the relationship between people and society; the technologies related to the “metaverse” will show gradual development, single-point technological innovations will continue to appear and merge, and all aspects of the industry will move closer to the ultimate form of the “metaverse”; the “metaverse” will emerge with a large amount of user-generated content, and at the same time, the value of digital assets will be revealed.

In general, the “metaverse” will profoundly change the organization and operation of the existing society through the integration of the virtual and the real, form a new lifestyle with both virtual and real poles, give birth to a new social relationship that integrates online and offline, and give new vitality to the real economy from the virtual dimension.

The future physical “metaverse” will be similar to the scene described in the science fiction movie “Ready Player One”: one day in the future, people can switch identities anytime and anywhere, freely shuttle between the real world and the virtual world, and study, work, make friends, shop, travel, etc. in the “metaverse”. Through immersive experience, the virtual world will be closer to and integrated into the real world.

In this virtual world, there will be self-evolving content and economic systems that will always remain safe and stable to meet the social needs of individuals.

The mediating role of the “metaverse”

“Imagine the ‘metaverse’ as a physical Internet, where you are not just watching content, but you are fully immersed in it.” This is a vivid description. However, as far as the current situation is concerned, the content of these “metaverses” that allow “full immersion” is relatively scarce. It needs more content that can be independently written, self-iterated, and multi-dimensionally attract users to participate in the experience and even participate in the creation.

The “metaverse” is bound to become a brand-new platform for media content production. Content producers can transform the “small universe” into the “big universe” through rich content production. In the short term, the breakthrough of the “metaverse” is immersive content. With the development and penetration of the concept of “metaverse”, the integration of immersive virtual content (such as games, cartoons, etc.) and immersive physical content (such as media, social networking, film and television, etc.) will become higher and higher. In other words, the “metaverse” will play a greater role as a medium.

In September this year, Yu Guoming, a professor at the School of Journalism and Communication of Beijing Normal University, pointed out at the release conference of the “2020-2021 “Metaverse” Development Research Report”: “Today, the role of the media is generally to provide cognitive information, but the role of the media is completing a process from providing cognition to providing experience. The entire media and technology has undergone a huge transformation from cognitive development to experience. Once the goal of “Metaverse” is established, it will play a directional role in communication technology, communication forms, communication methods and even communication effects.” If the “Metaverse” is the ultimate form of the next generation of the Internet, then it is a super media channel that will show the ultimate form of media convergence and provide the best immersive experience.

Theoretically, the best communication experience must be based on real scenes. For example, when watching a football game, the ideal situation is to watch it in person on the field. In the “metaverse”, with the development of display interaction, high-speed communication and computing technology, it will become a reality to construct a communication scene that is infinitely close to reality. Users can become “witnesses” and “on-site observers” of news events in a three-dimensional, multi-sensory reception situation.

Therefore, the “metaverse” media can achieve true “multimedia”, and various human senses such as vision, smell, hearing, taste, touch, etc. can play a role, and even fully unfold and cooperate with each other to achieve “immersive” media applications.

Today’s media content is constantly evolving and innovating, and its development trend seems to be moving closer to the concept of “metaverse”. Media content will no longer be limited to flat presentation methods such as TV, computer, and mobile phone screens. Media content production will consider holographic presentation more, pay attention to creating an on-site environment atmosphere, and make users feel immersive. Social interaction will no longer be limited to text messages and comments. Feelings can be expressed instantly with voice and body movements, and face-to-face communication can be virtualized on the spot.

Imagine if news reports could restore the war scene and create a “battlefield metaverse”, making people feel as if they were there and feel in real time the tremendous trauma that war has caused to human civilization. This shock would further stimulate human society’s desire and yearning for peace, and media content would have a stronger influence and dissemination power.

現代國語:

彷彿在一夜之間,「元宇宙」突然成為熱詞,相關概念形成許多熱門話題。

隨著擴展現實、數位孿生、3D渲染、雲端運算、人工智慧、高速網路、區塊鏈等技術的發展及終端設備的迭代,「元宇宙」建設和演變可能遠超人們的預期,多維度、全感官、沉浸式的人機互動新網路形態,將有望成為現實。

何為“元宇宙”

“元宇宙”,英文為“Metaverse”。此字出自1992年的科幻小說《雪崩》。小說中,人類透過“Avatar”(數位虛擬化身),在一個虛擬三維世界中生活,作者稱這個空間為“Metaverse”,即“元宇宙”。

從科幻走進現實,人們對「元宇宙是什麼」還未能達成一個絕對標準的共識。因為時代的演變、技術的變革,“元宇宙”仍是一個不斷發展的概念,“一千個人眼中就有一千個哈姆雷特”,不同參與者以自己的方式不斷豐富著它的定義,“元宇宙」特徵和形態的可能性也在不斷變化。不過,我們可透過「元宇宙」現有的呈現形態來探討一二。

目前,「元宇宙」概念產品主要集中在網路遊戲、VR/AR、社交等領域。

網路遊戲被業界普遍認為是最有可能實現「元宇宙」的領域,因為它本身就具有虛擬場景和玩家的虛擬化身。如今,遊戲功能已超越遊戲本身,遊戲邊界正在擴展,甚至不只是遊戲了。

知名歌手在遊戲《要塞英雄》中,以虛擬形象舉辦一場虛擬演唱會,吸引了全球超過1200萬玩家參與其中,打破了娛樂與遊戲的邊界;因為疫情影響,美國加州大學柏克萊分校、中國傳媒大學動畫與數位學院不約而同地在沙盤遊戲《我的世界》裡重建校園,學生們以虛擬化身齊聚一堂,完成“雲畢業典禮”,實現了虛擬遊戲和現實社交的融合。

新一代「VR社交(虛擬線下社交)」已在逐漸發展和流行。它是線下社交(現實面對面)、線上社交(透過微信等社群軟體)的融合產物。一些知名VR社交平台,提供自由的社區環境,不僅成為玩家線上活動與虛擬面對面聚會的場所,也成了一種與目前「元宇宙」概念密切相關的社會文化現象。

以上這些“元宇宙切片”,都是對建構“元宇宙”的重要探索,用多種看得見、摸得著的方式,詮釋了“元宇宙”將會如何改變我們的現實生活。

在通常研究中,一般形成了這樣的共識:「元宇宙」是整合多種新技術而產生的新型虛實融合的網路應用和社會形態。它基於擴展現實技術提供沉浸式體驗,基於數位孿生和3D渲染技術生成虛實場景,基於雲端運算、人工智慧和高速網路建立基礎軟體硬體服務,基於區塊鏈技術建立經濟體系,將虛擬世界與現實世界在經濟系統、社交系統、身分系統上密切融合。同時,允許每個使用者進行內容生產和編輯,具備完整的自我驅動和迭代能力。

「元宇宙」發展走向

現今的行動互聯網,其實仍是平面資訊互動狀態,透過文字、聲音、圖片、視訊方式在行動終端進行呈現。新聞資訊、電子商務、社群聊天、視訊直播等型態,雖然滿足了人們使用網路的需求,但隔著手機螢幕,顯然無法達到現實生活中面對面交流、全感官體驗所能達到的效果。隨著社會發展,人們需要更原生、更豐富的體驗與互動。

新冠疫情讓人們生活場景從線下更多地移到線上。這種被迫的轉變,讓大家對「元宇宙」有了更多思考、討論和關注。特別是「元宇宙」最核心的特徵,在於沉浸式體驗,它可將一個平面變成一個立體、多維、即時的互動空間,極大地豐富、還原真實物理世界和人類各種關係。因此,「元宇宙」被人們寄予厚望。

縱觀過往資訊科技和媒介的發展歷程,人類不斷改變認知世界的方法,乃至於後來開始有意識地改造和重塑世界。從報業時代、廣播電視時代,到網路時代、行動網路時代,「元宇宙」概念下的工具和平台日益完備,通往「元宇宙」的路徑逐漸清晰。

自2020年以來,各國網路大廠圍繞著擴展實境、數位孿生、3D渲染、雲端運算、人工智慧、高速網路和區塊鏈等前沿科技,展開緊密佈局,通往「元宇宙」終極閉環生態的大門被一點點打開。在行動網路用戶「紅利」已經見頂的今天,不少專家學者表示,「元宇宙」將是下一代網路的終極形態。

如同20年前難以精準預測網路的發展一樣,人們也無法精準預判未來「元宇宙」的形態。但是,結合當今相關產業發展趨勢可以看到:互聯網改變人類生活,將人與人交流數位化,而「元宇宙」將把人與社會關係數位化;「元宇宙」相關技術將呈現漸進式發展,單點技術創新將不斷出現與融合,從產業各方面向「元宇宙」終極形態靠近;「元宇宙」將湧現海量用戶創作內容,同時顯現數位資產價值問題。

概括地說,「元宇宙」將以虛實融合的方式,深刻改變現有社會的組織與運作,形成虛、實兩極的新型生活方式,催生線上、線下一體的新型社會關係,並從虛擬維度賦予實體經濟新的活力。

未來實體化的“元宇宙”,將類似於科幻電影《頭號玩家》裡描述的場景:在未來的某一天,人們可隨時隨地切換身份,自由穿梭於現實世界和虛擬世界,在“元宇宙”中學習、工作、交友、購物、旅遊等。透過沉浸式體驗,讓虛擬世界進一步接近並融入現實世界。

在這個虛擬世界裡,將有自我不斷發展的內容和經濟系統,並且始終保持安全穩定運行,滿足個體的社會需求。

「元宇宙」的媒介作用

「把『元宇宙』想像為一個實體互聯網,你在那裡不只是觀看內容,整個人都身在其中。」這是一個圖像描述。可就現狀而言,這些能讓“整個人都身在其中”的“元宇宙”,內容是相對匱乏的。它需要更多可以獨立成篇、自我迭代、多維立體地吸引使用者參與體驗甚至參與創作的內容。

「元宇宙」勢必成為媒體內容生產的嶄新平台。內容生產者透過豐富的內容生產,可將「小宇宙」演變成「大宇宙」。短期內,「元宇宙」的突破口是沉浸式內容。隨著「元宇宙」概念的發展與滲透,沉浸式虛擬內容(如遊戲、卡通等)與沉浸式實體內容(如媒體、社交、影視等)的融合程度將會越來越高。換句話說,「元宇宙」將發揮更大的媒介作用。

今年9月,北京師範大學新聞與傳播學院教授喻國明在《2020-2021年「元宇宙」發展研究報告》發布會議上指出:「如今媒介所扮演的角色大體上都是認知方面的訊息給予,但媒介的角色正在完成一個從給予認知到給予體驗的過程。甚至傳播效果,都能起到一個定向作用。體驗。

從理論上講,最好的傳播體驗必然是基於真實場景。如看球賽,理想情形是在球場上親身觀看。在「元宇宙」裡,隨著顯示互動、高速通訊和運算技術的發展,建構無限逼近真實的傳播場景將成為現實,使用者能在立體化、多感官接收情境中,成為新聞事件的「目擊者」和「實地觀察者」。

因而,“元宇宙”媒體可實現真正的“多媒體化”,人類的各種感官如視覺、嗅覺、聽覺、味覺、觸覺等,都能發揮作用,甚至完全展開、相互配合,實現“沉浸式”的媒體應用。

當今媒體內容不斷進化和創​​新,其發展趨勢也似乎正在向「元宇宙」概念靠攏。媒體內容將不再侷限於電視、電腦、手機螢幕等平面式的呈現方式,媒體內容製作將更考慮全像化呈現,重視營造現場環境氛圍,使用戶有身臨其境之感。社交也將不再侷限於文字留言評論,可即時用語音、肢體動作來抒發感受,現場虛擬化面對面交流。

設想一下,如果新聞報道能還原戰爭現場,打造“戰場元宇宙”,使人如身臨其境,實時感受到戰爭對於人類文明造成的巨大創傷,這份震撼會更能刺激人類社會對於和平的渴望與嚮往,媒體內容將具備更強大的影響力與傳播力。

中國軍事資料來源:https://www.81.cn/jfjbmap/content/2021-11/26/content_303888.htm

Chinese Military Analysis of Japan’s Space and Cyberspace Deterrence Strategy

中國對日本太空和網路空間威懾戰略的軍事分析

現代英語:

The development of new military forces is changing the style of warfare. After years of development, space (also known as outer space) and cyberspace (hereinafter referred to as cyberspace) forces have transformed from conceptual forces to real forces. How to use these two new forces has become a key research topic for major powers in the world. In March 2024, the Security Research Group of the Sasakawa Peace Foundation of Japan released a research report entitled “War 3.0: Fundamental Changes in War” (hereinafter referred to as the “Report”), which explored how to use space and cyberspace to achieve strategic deterrence from the perspective of maintaining Japan’s national security. It also proposed a typical scenario of cyberspace confrontation against the background of an emergency in the Taiwan Strait, showing Japan’s thinking on the use of combat forces in emerging fields. The main contents are summarized as follows for readers.

1

War 3.0 is coming

The report believes that during the Cold War, the boundaries between civilians, the state and the military were clear, and the economic dependence between the two sides was low. This was the era of War 1.0. After the Cold War, globalization accelerated, and in 2001, the era of the war on terror began. The main body of the confrontation became state and non-state actors, which was the era of War 2.0. Around 2010, the confrontation between major powers reappeared. Due to the high degree of economic globalization, “war” occurred more in dimensions other than military. The conflict between Russia and Ukraine shows that in modern warfare, other means are becoming as important as military means. At the same time, commercial companies are also more involved in the research and development and use of emerging military technologies, and the government’s control over military power has been weakened. Since then, a new concept can be used to describe modern warfare, namely War 3.0.

As long as war occurs in the context of globalization, the characteristics of War 3.0 will appear. In the era of War 3.0, the target of deterrence is mainly state actors, but the specific form of conflict may be similar to hybrid warfare or conventional warfare. When formulating deterrence strategies in the space and cyberspace domains, both types of conflict should be taken into account. It is necessary to recognize that emerging domain capabilities are multipliers of traditional capabilities. The significance of competing for control in emerging domains lies in enhancing one’s own physical forces such as land, sea, and air forces or weakening the physical forces of opponents.

The report points out that using emerging field forces to carry out attacks can cause no tangible physical damage, is conducive to conflict management, and is the best tool for gray zone operations. Japan currently faces two main problems. One is that the emerging field forces owned by law enforcement agencies are not in line with mission requirements. The other is that it needs to consider how to use emerging field forces to achieve effective conflict management.

2

Strategic Deterrence in Emerging Fields

The report uses traditional deterrence theory for analysis and concludes that space and cyberspace have five common characteristics: difficult situational awareness, high defense difficulty, low attack threshold, mixed actors, and lack of international codes of conduct. Easy to attack and difficult to defend are the common characteristics of these two fields, so it is difficult to achieve effective strategic deterrence. In this regard, action should be taken in four aspects: First, improve situational awareness capabilities so that when problems occur, the cause of the failure can be quickly determined, the attacker can be identified, and the damage effect can be evaluated when counterattacked. Second, improve resilience to ensure that the loss of some functions will not cause the entire system to become disabled. Third, strengthen offensive capabilities, which can be used to attack in a certain field, or to use means in other fields to conduct cross-domain attacks. Fourth, achieve arms control cooperation between countries and build trust, formulate codes of conduct, etc.

3

Strengthening deterrence in air and space

1. The connotation of air and space control continues to be enriched

The report believes that the air and space can control the entire battlefield. In order to compete for air and space dominance, various types of equipment are constantly updated, combat systems are becoming more and more complex, and the scope of operations is becoming wider and wider. In combat, both sides often focus on the “find, locate, track, decide, engage, and assess (Find Fix Track Targeting Engage Assess, F2T2EA)” full kill chain, and simultaneously confront in emerging fields such as space, cyberspace, and electromagnetic space, which greatly expands the connotation of traditional dominance. In future high-end wars, the side with a higher level of space, cyberspace, and electromagnetic space capabilities may have an overwhelming advantage in overall combat capabilities.

2. How to exert the deterrent function of space power

The report emphasizes that space systems play an important role in intelligence collection, surveillance and reconnaissance (ISR), communications, positioning, navigation and timing (PNT), missile warning, environmental monitoring, etc., and also provide increasingly important support for the use of nuclear and conventional forces. In order to form a strong space deterrence, first, we must possess and demonstrate the corresponding capabilities, mainly the resilience, defense, counter-retaliation and situational awareness capabilities of the space system. Second, we must show the enemy our determination to use retaliatory capabilities. Third, we must form a cross-domain deterrence to ensure the security of the entire space system. In addition, systems in other fields such as land, sea and air must be able to supplement some of the functions of the space system. In the face of enemy attacks on our satellites, we must retaliate not only from space, but also through land, sea, air and cyberspace.

As space systems play an increasingly important role in Japan’s national defense, we will further enhance our deterrence against hostile offensive actions. While improving the resilience of space assets, we will attach great importance to the effective use of commercial space services.

3. How to enhance the deterrent effect of Japan’s aerospace power

The report points out that Japan should attach importance to cross-domain coordination of sea, land, air and space forces, especially to strengthen cooperation with the United States. It is necessary to closely monitor the surrounding airspace, use aircraft to perform denial missions when the situation escalates, and take active defense measures to prevent missile attacks. It is necessary to strengthen the construction of Self-Defense Force bases and realize the mutual use of air bases between Japan and the United States. Japan is surrounded by the sea, and it is necessary to attach importance to developing the ability to use air means to strike maritime targets to ensure the security of the homeland.

Faced with the vast Indo-Pacific region, it is difficult for Japan to accurately grasp the regional situation by relying solely on its own aerospace power. It is necessary to share intelligence information through multilateral cooperation and build a Common Operational Picture (COP) in the Indo-Pacific region to accurately and comprehensively grasp the regional situation and have a deterrent effect on potential enemies. It is necessary to strengthen cooperation with countries other than the United States, especially Australia. Japan, the United States and Australia should establish joint ammunition and fuel depots in their respective countries. In the field of space, Japan will expand cooperation in hosting payloads. If it can cooperate with European countries, then future attacks on Japanese satellites can be regarded as attacks on multiple countries. It is becoming increasingly important to make full use of the power of allies and use their aerospace power to achieve deterrence goals.

4

Strengthening Deterrence in Cyberspace

1. Characteristics of Cyberspace Operations

The report believes that cyberspace has an increasing impact on the course of war, and cyberspace combat capabilities can even deter the occurrence of an entire conflict. Cyberspace security plays an important role in protecting various systems from cyber attacks, ensuring that confidential information is not leaked, and ensuring the normal operation of other systems such as critical infrastructure. It is also of great significance for cognitive domain protection.

There are two main characteristics of cyberspace at present. First, the boundary between military and civilian is blurred. The potential of military application of Internet is constantly emerging. In the conflict between Russia and Ukraine, the artillery combat management system (GIS Art for Artillery, GIS ARTA) used by Ukraine is to send data through drones and smartphones to determine the target location and launch attacks, which is very effective. Second, the security concept based on closed system is outdated. Even with physical isolation, it is impossible to completely prevent attacks. Cyberspace is easy to attack but difficult to defend, and the offense and defense are asymmetric. In addition, cyberspace operations can control the rhythm of conflict escalation in a low-intensity form, and can also be upgraded to a powerful weapon with high-intensity offensiveness after the official outbreak of military conflict.

2. Developing emerging technologies to enhance cyber warfare capabilities

The report points out that the development of emerging technologies will continue to change the rules of warfare, and the Japanese Ministry of Defense has begun to study the use of cloud computing to build a basic computing environment. It plans to build a diversified network environment, use Starlink satellites and 5G networks to provide Internet services, and consider enabling the new Internet communication protocol QUIC (Quick UDP Internet Connection). The first quantum computer has been developed, and related research on anti-quantum cryptography has been carried out. At the same time, it also pays close attention to the specific ways of combining artificial intelligence with cyber warfare.

3. Ways to strengthen cyber deterrence

The report emphasizes that the development of artificial intelligence technology and the adjustment of the network component supply chain are two uncertain factors. Japan should focus on improving its cyber warfare capabilities from the following aspects: (1) vigorously promote intelligence information sharing; (2) build active defense systems; (3) introduce zero trust and risk management frameworks; (4) establish the ability to attack adversary networks; (5) accelerate legislation in the field of cybersecurity; (6) expand the scale of talent training and increase support for commercial enterprises. By carrying out the above work, Japan can achieve early detection and response to cyber attacks. Even if it encounters a cyber attack, it can be discovered, processed and recovered at an early stage to ensure the resilience of the system to continue to operate. In addition, when Japan is attacked, it should coordinate actions with the US military. In peacetime, joint training should be strengthened so that it can carry out joint operations with the Cyber ​​Mission Force (CMF) composed of relevant forces of the US Cyber ​​Command.

Responsible for directing, coordinating and conducting cyber operations

5

Conception of cyberspace combat scenarios

The report describes a basic scenario of cyber warfare between the Red and Blue sides, with the Taiwan Strait incident as the background, and puts forward the following important viewpoints: First, when the Blue side has an absolute advantage, the Blue side should focus on taking defensive actions to achieve deterrence. When the forces of the two sides tend to be balanced, the Blue side should actively take offensive actions to seize the initiative. Second, the Blue side can launch cyber attacks around the Red side’s observation, adjustment, decision-making, and action (OODA) links to weaken the Red side’s military capabilities, especially its maritime and landing combat capabilities, and carry out “anti-military cyber attack missions.” When necessary, strike the Red side’s social infrastructure to weaken its overall strength. At the same time, take cyber attacks to induce and divide public opinion, weaken the Red side’s willingness to take action, and carry out “anti-value cyber attack missions.” Third, in the anti-military cyber attack mission, the Blue side can attack the Red side’s aircraft, and can also take measures such as data pollution, deception cloud, and communication network interruption to attack the Red side’s command and control system. In the action of attacking the civilian network system, cyber attacks can be carried out on key entities of railway and ship operations in the Red coastal areas and key infrastructure such as the power grid in coastal metropolises that support social and economic systems. There are also options for attacking Red Team financial systems, media servers, and water and gas supply networks.

In order to deal with possible cyber attacks from the Red side in the event of an emergency in the Taiwan Strait, Japan should do the following: First, adopt an active defense strategy, require commercial operators to share information with the government, and introduce artificial intelligence to improve cyber situational awareness and network resilience. Second, introduce a large-scale data forensics platform to identify the authenticity of massive image data and counter false information. Third, give priority to countermeasures against domestic cyber attacks, effectively defend the networks of defense, government departments, law enforcement agencies and private enterprises through various active cyber defense measures, and deal with cognitive domain actions against the Japanese public.

6

Conclusion

The report proposed the concept of War 3.0 and launched a series of discussions on achieving cyberspace and space deterrence. While suggesting strengthening its own relevant capacity building, it repeatedly emphasized the need to strengthen cooperation with the United States, especially with countries related to the Quadrilateral Security Dialogue (QUAD) and AUKUS. With Japan’s application to join AUKUS on April 25, 2024, the Asia-Pacific version of the “mini-NATO” alliance has taken shape, and regional peace and stability will be severely impacted.

Disclaimer: This article is reprinted from Military High-Tech Online, the original author is Shi Honglin. The content of the article is the original author’s personal opinion. This public account is translated/reprinted only for sharing and conveying different opinions. If you have any objections, please contact us!

Reprinted from Military High-Tech Online

Author: Shi Honglin

Introduction to the Institute

The International Institute of Technology and Economics (IITE) was established in November 1985. It is a non-profit research institution affiliated to the Development Research Center of the State Council. Its main functions are to study major policy, strategic and forward-looking issues in my country’s economic, scientific and technological social development, track and analyze the development trends of world science and technology and economy, and provide decision-making consulting services to the central government and relevant ministries. “Global Technology Map” is the official WeChat account of the International Institute of Technology and Economics, dedicated to delivering cutting-edge technology information and technological innovation insights to the public.

Address: Block A, Building 20, Xiaonanzhuang, Haidian District, Beijing

Tel: 010-82635522

繁體中文國語:

新領域軍事力量的發展正在改變戰爭樣式,其中太空(也稱為外層空間)和網路空間(以下簡稱網空)力量經過多年的發展,已由概念力量轉變為現實力量。如何利用這兩種新質力量,已成為世界各主要強國重點研究的內容。 2024年3月日本笹川和平財團安全研究小組發布研究報告《戰爭3.0:戰爭的根本變化》(以下簡稱《報告》),從維護日本國家安全的角度出發,探討如何利用太空和網空實現戰略威懾等問題,並以台海突發事件為背景,提出了一個網空對抗的典型場景,展示了日本在運用新興領域作戰力量上的思考。現將其主要內容整理如下,以颯讀者。

01

戰爭3.0時代到來

《報告》認為,在冷戰時期,平民、國家和軍隊之間的界線很清晰,對峙雙方經濟依賴度較低,此時是戰爭1.0時代。冷戰後全球化加速發展,2001年進入反恐戰爭時代,對抗的主體變成國家與非國家行為體,此時是戰爭2.0時代。 2010年前後大國對抗再次出現,由於經濟全球化發展程度較高,「戰爭」較多發生在軍事以外的維度。俄烏衝突顯示在現代戰爭中,其他手段正變得與軍事手段同等重要。同時,商業公司也更參與新興軍事技術的研發和使用,政府對軍事力量的控製程度受到了削弱。自此可以用一個新的概念來描述現代戰爭,即戰爭3.0。

只要戰爭在全球化背景下發生,就會出現戰爭3.0所包含的特徵。進入戰爭3.0時代,威懾的目標主要是國家行為體,但具體衝突形式可能類似混合戰爭,也可能是常規戰爭。在製定太空和網空領域威懾戰略時,要同時考慮這兩類衝突形式。要體認到新興領域能力是傳統能力的倍增器,爭奪新興領域制權的意義,在於提升己方陸、海、空軍等實體力量或削弱對手的實體力量。

《報告》指出,運用新興領域力量實施攻擊,可以不造成有形的物理破壞,有利於管控衝突,是在灰色地帶行動的最佳工具。日本當前主要面臨兩個問題,一是執法機構擁有的新興領域力量和任務需求不相適應。二是需要考慮具體如何運用新興領域力量,以達到衝突的有效管控。

02

新興領域的戰略威懾

《報告》利用傳統威懾理論進行分析,得出太空和網空具有五個共同特徵:態勢感知難、防禦難度大、攻擊門檻低、行動主體混雜、缺乏國際行為準則。易攻難守是這兩個領域的共同特點,因此較難實現有效的戰略威懾。對此,應從四個方面採取行動:一是提高態勢感知能力,以便在出現問題後,能夠迅速確定故障原因,識別攻擊者,並在反擊時評估毀傷效果。二是提升復原力,確保喪失部分功能不會導致整個系統失能。三是強化進攻能力,可在某一領域進行攻擊,也可利用其他領域手段進行跨域攻擊。四是實現國家間軍備控制合作並建立信任,制定行為準則等。

03

加強空中和太空的威懾

(一)空天制權的內涵不斷豐富

《報告》認為,空中和太空可以瞰整個戰場,為爭奪空天制權,各類裝備不斷更新,作戰系統越來越複雜,作戰範圍也越來越寬廣。在作戰中,雙方往往會圍繞「發現、定位、追蹤、決策、交戰、評估(Find Fix Track Targeting Engage Assess,F2T2EA)」全殺傷鏈各環節,在太空、網空、電磁空間等新興領域同時進行對抗,大大拓展了傳統制權的內涵。在未來高端戰爭中,利用太空、網空和電磁空間能力水準較高的一方,可能會在整體作戰能力上擁有壓倒性的優勢。
(二)如何發揮太空力量的嚇阻功能

《報告》強調,太空系統在情報收集、監視和偵察(Intelligence, Surveillance, and Reconnaissance,ISR),通信,定位、導航和授時(Positioning, Navigation and Timing, PNT),導彈預警,環境監測等方面發揮著重要作用,也為使用核武力量和常規力量提供越來越重要的支持。為了形成強大的太空威懾,一要擁有並展現對應能力,主要是太空系統的復原力、防禦力、反制報復能力以及態勢感知能力。二要向敵方展示使用報復能力的決心。三要形成跨域威懾以確保太空全系統安全。此外,陸海空等其他領域系統要能補充太空系統的部分功能,面對敵方對己方衛星的攻擊,不僅要從太空報復,還要透過陸海空和網空進行報復。

由於太空系統在日本國防中的作用越來越大,所以要進一步提升對敵對進攻行為的威懾。在提升太空資產復原力的同時,要高度重視商業太空服務的有效運用。

(三)如何增強日本空天肌力嚇阻效果

《報告》指出,日本應重視海陸空天力量的跨域協同,特別是加強與美國的合作。若要緊密監視週邊空域,在局勢升級時使用飛機執行拒止任務,採取主動防禦措施,防止遭遇飛彈攻擊。要加強自衛隊基地建設,實現日美兩國空軍基地的互相使用。日本四面環海,要重視發展使用空中手段打擊海上目標的能力,以確保本土安全。

面對廣袤的印太地區,日本僅靠自身的空天力量,難以準確掌握區域態勢,要透過多邊合作分享情報訊息,建構印太地區通用作戰態勢圖(Common Operational Picture, COP),以精準全面地掌握地區態勢,對潛在敵人產生嚇阻效果。要加強與美國以外的國家,特別是澳洲的合作。日本、美國和澳洲應在各自國家建立聯合彈藥和燃料庫。在太空領域,日本將拓展託管有效載荷合作,如能和歐洲國家合作,那麼未來攻擊日本衛星的行為,將可以被視為對多個國家的攻擊。要充分借助盟友力量,利用其空天力量達成威懾目的,這一點正變得越來越重要。

04

加強網空的威懾

(一)網空作戰的特點

《報告》認為,網空對戰爭進程的影響越來越大,而網空作戰能力甚至可以嚇阻整個衝突的發生。網空安全對於保護自身各類系統免受網路攻擊、確保機密資訊不會外洩、確保關鍵基礎設施等其他系統正常運作發揮重要作用,對於認知域防護也有著十分重大的意義。

目前網空主要有兩個特點,一是軍民界線模糊。網路的軍事應用潛力不斷顯現,在俄烏衝突中,烏克蘭使用的砲兵作戰管理系統(GIS Art for Artillery, GIS ARTA),就是透過無人機和智慧型手機,發送資料確定目標位置並發動攻擊,且非常有效。二是基於封閉系統的安全觀念已經過時。即便是進行物理隔離,也不可能完全防止被攻擊,網空易攻難守,攻防呈現不對稱特徵。此外,網空作戰既可以低強度形式控制衝突升級的節奏,也可以在正式爆發軍事衝突後,升級為具有高強度攻擊性的強大武器。
(二)發展新興科技提升網路戰能力

《報告》指出,新興技術的發展將持續改變作戰規則,日本防衛省已開始研究使用雲端運算建構基本運算環境。計畫建置多樣化網路環境,使用「星鏈」衛星和5G網路提供網路服務,考慮啟用新的網路通訊協定QUIC(Quick UDP Internet Connection)。已研發首台量子計算機,並進行反量子密碼的相關研究。同時,也高度關注人工智慧與網路戰結合的具體方式。

(三)強化網空威懾的辦法

《報告》強調,人工智慧技術的發展和網路部件供應鏈的調整是兩個不確定的影響因素。日本應著重從以下幾點提升網路戰能力:(1)大力促進情報資訊共享;(2)建構主動防禦系統;(3)引入零信任和風險管理框架;(4)建立攻擊對手網路的能力; (5)加速網路安全領域立法;(6)擴大人才培育規模,增加對商業企業的支持。透過進行以上工作,日本可以實現提前發現和應對網路攻擊。即使遭遇網路攻擊,也可在早期階段發現、處理和恢復,確保系統繼續運作的彈性。此外,當日本受到攻擊時,要與美軍協調行動。平時要加強聯合訓練,以便能夠與由美國網路司令部相關部隊組成網路任務部隊(The Cyber​​ Mission Force, CMF)實施聯合行動。
負責指導、協調和執行網路行動

05

對網空作戰場景的構想

《報告》以台海突發事件為背景,描述了一個紅藍雙方網路戰的基本場景,提出了以下幾個重要觀點:一是當藍方擁有絕對優勢時,藍方應側重於採取防禦行動實現威懾。當雙方力量趨於平衡時,藍方則應積極採取攻擊行動以爭取主動權。二是藍方可以圍繞紅方觀察、調整、決策、行動(Observe Orient Decide Act, OODA)的各環節展開網絡攻擊,削弱紅方軍事能力,特別是海上作戰和登陸作戰能力,開展「反軍事網絡攻擊任務」。在必要時候打擊紅方社會基礎設施,削弱其整體實力。同時,採取網路攻擊誘導和分裂公眾輿論,削弱紅方採取行動的意願,進行「反價值網路攻擊任務」。第三是在反軍事網路攻擊任務中,藍方可以攻擊紅方飛機,還可以採取資料污染、欺騙雲以及通訊網路中斷等措施,攻擊紅方指控系統。在攻擊民用網路系統的行動中,可以對紅方沿海地區鐵路和船舶運營的關鍵實體以及支持社會和經濟系統的沿海大城市電網等關鍵基礎設施進行網路攻擊。還可以選擇攻擊紅方金融系統、媒體伺服器以及供水和天然氣供應網路。

為因應台海突發事件發生時紅方可能的網路攻擊,日本應做好以下幾點:一是採取主動防禦策略,要求商業業者要與政府分享訊息,引入人工智慧以提高網空態勢感知和網路彈性。二是引進大規模資料取證平台以辨識海量影像資料的真實性,反制假資訊。第三是優先採取針對本國網路攻擊的反制措施,透過各種積極網路防禦措施有效保衛防衛、政府部門、執法機構和私人企業的網絡,並處理針對日本公眾的認知域行動。
06

結語

該報告提出了戰爭3.0的概念,圍繞實現網空和太空威懾展開了一系列論述,在建議加強自身相關能力建設的同時,多次強調要加強與美國,特別是四方安全對話(Quadrilateral Security Dialogue, QUAD)和奧庫斯(AUKUS)相關國家的合作。隨著2024年4月25日日本申請加入“奧庫斯”,亞太版的“小北約”聯盟已現雛形,地區和平穩定將受到嚴重衝擊。

免責聲明:本文轉自軍事高科技在線,原作者史宏林。文章內容係原作者個人觀點,本公眾號編譯/轉載僅為分享、傳達不同觀點,如有任何異議,歡迎聯絡我們!

轉自丨軍事高科技在線

作者丨史宏林

研究所簡介

國際技術經濟研究所(IITE)成立於1985年11月,是隸屬於國務院發展研究中心的非營利研究機構,主要功能是研究我國經濟、科技社會發展中的重大政策性、策略性、前瞻性問題,追蹤分析世界科技、經濟發展態勢,為中央和相關部會提供決策諮詢服務。 「全球技術地圖」為國際技術經濟研究所官方微信帳號,致力於向大眾傳遞尖端技術資訊與科技創新洞見。

地址:北京市海淀區小南莊20號樓A座

中文原文來源:https://www.163.com/dy/article/J5UO0ID90514R8DE.html

Chinese Military Values Attack & Defense as the Important Focus of Combat in Cognitive Domain Operations

中國軍隊把攻防當作認知域作戰作戰的重要著力點

現代英語翻譯:

Value attack and defense is an important way to conduct cognitive domain operations from a strategic level. Usually, value attack and defense is achieved by intervening in people’s thinking, beliefs, values, etc., in order to achieve the purpose of disintegrating the enemy’s consensus, destroying the enemy’s will, and then gaining comprehensive control over the battlefield. Accurately grasping the characteristics, mechanisms, and means of value attack and defense is crucial to gaining future cognitive domain combat advantages.

Characteristics of the cognitive domain of value attack and defense

Value attack and defense refers to the intervention and influence on relatively stable cognitive results by inducing deep logical thinking and value judgment changes of individuals or groups, in order to reconstruct people’s cognitive abilities such as will, thinking, psychology, and emotions. Value attack and defense mainly has the following characteristics:

Soft confrontation. Traditional warfare mainly relies on violent means to weaken and disintegrate the enemy’s military capabilities, and usually has a high intensity of war. Cognitive domain warfare will no longer be limited to hard confrontations such as siege and conquest, but will focus more on infiltration and counter-infiltration, attack and counter-attack, control and counter-control around value positions. By competing for the dominance of cognitive domain confrontation, the combat effectiveness of the physical domain and information domain will be further stimulated, thereby seizing the initiative on the battlefield and even achieving the effect of defeating the enemy without fighting. In practice, value offense and defense often focus on the cultural traditions, values ​​and social psychology of a country or nation, and ultimately achieve the purpose of destroying the enemy’s will, cognitive manipulation, and mental control.

Full-dimensional release. Modern warfare is increasingly characterized by being holistic, multi-domain, and all-time. Cognitive domain warfare aims to influence battlefield effects by intervening in human consciousness, and the relative stability of consciousness determines that people’s worldviews, beliefs, and other values ​​are generally relatively stable. Therefore, value offense and defense need to be carried out in a long-term, uninterrupted, holographic, and full-dimensional manner. From a temporal perspective, value offense and defense blurs the boundaries between peace and war, and is always at war, constantly accumulating and gradually releasing combat effectiveness; from a spatial perspective, value offense and defense blurs the boundaries between the front and rear of combat, and is carried out in all directions in tangible and intangible spaces; from a field perspective, value offense and defense blurs the boundaries between military and non-military, and occurs not only in the military field, but also in the political, economic, diplomatic, and cultural fields, showing the characteristics of full-domain coverage.

Empowered by science and technology. Cognitive domain warfare is a technology-intensive and complex system engineering. The full-process penetration of emerging technologies such as artificial intelligence, brain science, and quantum computing is triggering iterative upgrades and profound changes in cognitive domain warfare. Intelligent tools fundamentally enhance the ability of cognitive domain combatants to manipulate and interfere with the opponent’s thinking. Human-machine hybrid as a new means and new style of combat power will change the main body of future wars. Autonomous confrontation and cloud brain victory may become the mainstream attack and defense mode. In recent years, NATO has launched cognitive electronic warfare equipment aimed at changing the opponent’s value cognition and behavior through information attack and defense. Technological development has also triggered a cognitive revolution. The rapid spread of information has further accelerated the differences in public value cognition. Cognitive islands have exacerbated the value gap between different subjects. The social structure changes brought about by intelligence are profoundly changing the political and cultural pattern. From this point of view, in future cognitive domain warfare, it is crucial to grasp the “bull’s nose” of scientific and technological innovation and master key core technologies to seize the initiative on the battlefield.

The mechanism of cognitive domain of value attack and defense

Value attack and defense is a high-level confrontation in cognitive domain operations, and the target of action is people’s deep cognition. Consciousness is the reflection of social existence in the brain. The regulation of social existence, the guidance of public consciousness and the change of human brain function can strengthen or reverse human consciousness. If you want to win the opponent in the attack and defense confrontation, you must follow the laws of thinking and cognition and grasp the winning mechanism of value attack and defense.

Impacting the value “protection zone”. Occupying the commanding heights of values ​​is the logical starting point for conducting value offense and defense. Social consciousness is often composed of relatively stable core values ​​and peripheral auxiliary theories. Various theories such as economy, politics, religion, and culture can be constructed and adapted to protect core values ​​from external shocks, and therefore also bear the impact and challenge of other values. In the eyes of foreign militaries, value offense and defense is to continuously impact the “protection zone” of the opponent’s ideology through cultural infiltration, religious conflict, strategic communication and other means, in conjunction with actions in the physical and information domains. This often requires seizing the values, political attitudes, religious beliefs, etc. that affect the opponent’s cognition, disrupting their social group psychology, inducing value confusion, shaking their will to fight, destroying cultural identity, and even changing and disintegrating their original cognitive system, so as to instill or implant new values ​​that are beneficial to themselves in order to achieve combat objectives.

Ignite the “trigger point” of conflict. Cognitive domain warfare involves multiple categories such as history and culture, political system, national sentiment, and religious beliefs. The main body of the war has also expanded from simple military personnel to ordinary people. It will become an important means of cognitive domain warfare to stimulate cognitive conflicts among ordinary people by hyping up topic disputes and public events. In recent local conflicts, it is not uncommon for the warring parties to ignite national sentiments through purposeful narratives, trigger political crises and thus affect the war situation. In future wars, some countries will use hot and sensitive events to detonate public opinion, rely on network technology to gather, absorb, mobilize, accurately manipulate and induce ordinary people, thereby promoting general conflicts to rise to disputes of beliefs, disputes of systems, and disputes of values. It will become the norm.

Control the cognitive “fracture surface”. Cognitive space, as an existence at the conceptual level, is composed of the superposition of the subjective cognitive spaces of all combat individuals. It is a collection of differentiated, differentiated, and even conflicting values. However, ideology has a “suturing” function. Through cognitive shaping and discourse construction, it can effectively “suturing” the broken cognition, condense the scattered values, and form a relatively stable cognitive system. After World War II, France had carried out effective cognitive “suturing” on the trauma of defeat. It used a whole set of independent narrative logic to explain how the war provided France with “new opportunities”, which greatly condensed the political identity of the French people with the government. In the battle for value positions in cognitive domain operations, we should focus on the cognitive fracture surface within the enemy, find the cognitive connection points between the enemy and us, and “suturing” the cognition, so as to unite the forces of all parties to the greatest extent and isolate and disintegrate the enemy.

The main means of cognitive domain in value attack and defense

Value attack and defense expands cognitive confrontation from public opinion, psychology and other levels to thinking space, and from the military field to the overall domain, thus achieving a blow to the enemy’s deep political identity. At present, the world’s military powers are strengthening strategic pre-positioning, aiming at the profound changes in target subjects and tactics, changing combat thinking, and actively controlling the initiative of cognitive domain operations.

Aiming at deep destruction. Cognitive domain warfare directly affects people’s brain cognition, and is easier to achieve deep strategic intentions than physical domain warfare. In particular, once the “high-level cognition” of people’s language level, thinking level, and cultural level is broken through, it will help to strategically reverse the battlefield situation and achieve the political purpose of the war. Based on this, cognitive domain warfare often begins before the war, by intervening in the opponent’s internal and foreign affairs, shaking its ideological and value foundations, etc.; during war, it focuses on influencing the enemy’s war decision-making, campaign command, and combat implementation. The value judgment, attack or weaken the decision-making ability and resistance will of combatants, etc. All hostile parties try to “maintain their own world while increasing the destructive pressure of the opponent” in order to achieve decision-making advantages by competing for cognitive advantages, and then achieve the goal of action advantages.

Centered on ordinary individuals. In the future, the subjects of cognitive domain operations will no longer be limited to military personnel. Broadly speaking, individuals who can communicate and disseminate information may become participating forces. Compared with elites in the social field, ordinary people are more likely to accept and disseminate diverse values, and their cognitive space is more likely to be manipulated. At present, online media is becoming the main channel for information exchange and dissemination in the social field, and the purpose of cognitive shaping can be achieved through targeted information guidance and information delivery. Foreign military practices have proved that with the help of cognitive shaping of ordinary individuals, progressive infiltration and cognitive interference can be caused from bottom to top, causing a deviation in the consciousness and ideas between ordinary people and social decision-makers, and failing to reach an effective consensus in key actions.

In the form of protracted warfare. Unlike the direct attack and destruction of “hard” targets in the physical domain military struggle, the potential target of cognitive domain warfare is human cognition. The value attack and defense is aimed at changing the concepts, beliefs, will, emotions, etc. of the combat targets, which often requires subtle influence and step-by-step operations. Effective cognitive offense is generally launched in the combat preparation stage and runs through the entire war. By collecting the opponent’s cognitive situation, decision-making habits, thinking patterns, etc., targeted actions such as creating a situation and changing the atmosphere are carried out. Therefore, cognitive domain warfare needs to strengthen the overall design, especially focusing on coordinating multiple forces, and strengthening pre-positioned preparations in multiple positions such as public opinion field creation and diplomacy, so as to form an overall combat force.

現代國語:

價值攻防是從戰略層面進行認知域作戰的重要方式,通常價值攻防是透過幹預人的思維、信念、價值觀等,以達成瓦解敵方共識,摧毀敵方意志,進而掌控戰場綜合控制權的目的。精確掌握價值攻防的特性、機制、手段,對奪取未來認知域作戰優勢至關重要。

價值攻防作用認知域的特點

價值攻防是指透過引發個體或群體的深層邏輯思辨、價值判斷改變,完成其對相對穩定的認知結果的干預和影響,以期重構人的意志、思維、心理、情感等認知能力。價值攻防主要有以下幾個特點:

軟性對抗。傳統戰爭主要依賴暴力手段來削弱瓦解敵方的軍事能力,通常具有較強的戰爭強度。認知域作戰將不再侷限於攻城略地等硬性對抗,而更著重於圍繞價值陣地展開滲透與逆滲透、攻擊與反攻擊、控制與反控制,透過爭奪認知域對抗的主導權,進一步激發物理域和資訊域的作戰效能,從而奪取戰場主動,甚至達到不戰而屈人之兵的效果。在實踐中,價值攻防往往著眼於一個國家、民族的文化傳統、價值觀念和社會心理展開,最終達到對敵方意志摧毀、認知操縱、精神控制的目的。

全維度釋放。現代戰爭日益呈現總體性、多域性、全時性特徵。認知域作戰旨在透過幹預人的意識進而影響戰場效果,而意識的相對穩定決定了人的世界觀、信仰等價值觀念一般情況下往往較為穩固,因此價值攻防需要長期的、不間斷的、全息全維度地進行。從時間上看,價值攻防模糊了平戰邊界,常態在戰、隨時在戰,持續積累、逐步釋放作戰效能;從空間上看,價值攻防模糊了作戰前後方界限,在有形空間與無形空間全方位展開;從領域上看,價值攻防模糊了軍事與非軍事的界限,不僅發生在軍事領域,也存在於政治、經濟、外交、文化等領域,呈現出全局覆蓋的特徵。

科技賦能。認知域作戰是一項技術密集的複雜系統工程。人工智慧、腦科學、量子運算等新興技術手段全流程滲透,正在引發認知域作戰的迭代升級與深刻變革。智慧化工具從根本上增強了認知域作戰人員操縱對手思想和乾預對手思維的能力,人機混合作為作戰力量新手段新樣式將改變未來戰爭主體,自主對抗、雲腦制勝或成為主流攻防模式。近年來,北約推出的認知電子戰設備,旨在透過資訊攻防來改變對手價值認知及行為。科技發展也引發了認知革命,資訊的快速傳播進一步加速了大眾價值認知差異,認知孤島加劇了不同主體之間的價值鴻溝,智能化帶來的社會結構變遷則深刻改變著政治文化格局。從這點出發,在未來認知域作戰中,牽住科技創新的“牛鼻子”,掌握關鍵核心技術,對於奪取戰場主動至關重要。

價值攻防作用認知域的機理

價值攻防是認知域作戰的高階對抗,作用對象指向的是人的深層認知。意識是社會存在在大腦中的反映,對社會存在的調節、對大眾意識的引導和人腦作用的改變,都能強化或扭轉人的意識。要在攻防對抗中製勝對手,就要遵循思考認知規律,掌握價值攻防制勝機理。

衝擊價值「保護帶」。佔領價值制高點是開展價值攻防的邏輯起點。社會意識往往由相對穩定的核心價值觀念和外圍的輔助性理論所構成,經濟、政治、宗教、文化等各種理論都能被建構調適以用來保護核心價值觀念免受外來衝擊,因此也承受著其他價值觀的衝擊挑戰。在外軍看來,價值攻防就是要透過文化滲透、宗教衝突、戰略傳播等手段,配合物理域和資訊域的行動,不斷衝擊對手意識形態的「保護帶」領域。這往往需要抓住影響對手認知的價值觀念、政治態度、宗教信仰等,透過擾亂其社會群體心理,誘發價值困惑,動搖作戰意志,摧毀文化認同,甚至改變瓦解其原有的認知體系,從而灌輸或植入新的、於己有利的價值觀念,以實現作戰目的。

點燃衝突“引爆點”。認知域作戰涉及歷史文化、政治制度、民族情感、宗教信仰等多個範疇,戰爭主體也從單純軍事人員拓展到一般民眾。透過炒作話題爭端、公共事件,激發一般民眾的認知衝突,將成為認知領域作戰的重要手段。在近幾場局部衝突中,交戰各方透過有目的性的敘事點燃國家民族情緒,引發政治危機進而影響戰局已屢見不鮮。未來戰爭,一些國家利用熱點敏感事件引爆輿論,依托網路技術對一般民眾進行聚攏吸附、煽動動員、精準操控和誘導塑造,從而推動一般性衝突上升為信仰之爭、制度之爭、價值之爭將成為常態。

控制認知「斷裂面」。認知空間作為觀念層面的存在,由全部作戰個體的主觀認知空間疊加而成,是分化的、差異性的乃至衝突性的價值集合體。然而,意識形態具有「縫合」功能,透過認知塑造、話語建構,可以把斷裂的認知有效地「縫合」起來,把分散的價值凝聚起來,形成相對穩固的認知體系。二戰後法國對戰敗創傷曾進行過有效的認知“縫合”,其運用一整套獨立敘事邏輯,闡述戰爭如何為法國提供了“新的機會”,極大地凝聚了法國人民對政府的政治認同。在認知域作戰中開展價值陣地爭奪,應注重敵方內部的認知斷裂面,尋找敵我之間的認知連接點進行認知“縫合”,最大限度地團結各方力量,孤立瓦解敵人。

價值攻防作用認知域的主要手段

價值攻防使認知對抗從輿論、心理等層面拓展到思維空間,從軍事領域拓展到整體全局,從而實現了對敵方深層的政治認同的打擊。當前世界軍事強國都在加強戰略預置,瞄準目標主體、戰法手段的深刻變化,變革作戰思維,積極掌控認知域作戰的主動權。

以深層摧毀為目標。認知域作戰直接作用於人的大腦認知,相較於物理域作戰,更容易實現深層的戰略意圖。特別是人的語言層級、思維層級和文化層級的「高階認知」一旦被突破,有助於從戰略上扭轉戰場態勢,實現戰爭的政治目的。基於此,認知域作戰往往始於未戰,透過幹預對手內政外交,動搖其意識形態和價值觀基礎等;戰時則注重影響敵方戰爭決策、戰役指揮、戰鬥實施的價值判斷,打擊或削弱作戰人員的決策能力和抵抗意誌等。敵對各方都試圖做到“維繫自己的世界,同時增加對手的破壞性壓力”,以通過爭奪認知優勢實現決策優勢,進而取得行動優勢的目標。

以普通個體為中心。未來認知域作戰的主體將不再局限於軍事人員,廣義上講,可以進行資訊交流傳播的個體都可能成為參戰力量。相較於社會領域的精英,一般民眾更容易接受和傳播多元價值,其認知空間被操縱的機率更大。目前,網路媒體正成為社會領域資訊交流傳播的主要管道,透過有針對性的訊息引導、訊息傳遞,進而達到認知塑造的目的。外軍實踐證明,借助對一般個體的認知塑造,可以造成從下到上的遞進滲透和認知幹擾,使一般民眾與社會決策層之間的意識觀念產生背離,在關鍵行動中無法達成有效共識。

以持久作戰為形式。與物理域軍事鬥爭直接打擊摧毀「硬」目標不同,認知域作戰的潛在目標為人的認知,價值攻防指向的是改變作戰對象的觀念、信念、意志、情感等,往往需要潛移默化、步步為營。有效的認知進攻一般在作戰準備階段就發起,並貫穿戰爭始末,透過收集對手的認知態勢、決策習慣、思考模式等情況,有針對性地進行營造態勢、改變氛圍等行動。因此,認知域作戰更需要加強整體設計,尤其要注重協調多方力量,在輿論場營造、外交等多個陣地多點強化預置準備,進而形成整體作戰合力。

中國軍事資源:https://www.163.com/dy/article/HDOT8JIM0511DV4H888.html

China’s “War of Annihilation” from the Perspective of Modern Warfare

現代戰爭視角下的中國“殲滅戰”

現代英語:

“Based on the evolution of war, grasp the “cautious first battle””

  Written in front

  In the history of our army, fighting a war of annihilation is one of the most distinctive and important guiding ideas for operations. As early as the Agrarian Revolutionary War, based on the war purpose of “preserving ourselves and destroying the enemy”, our army clearly proposed that the basic policy in operations was to fight a war of annihilation. Since then, in different historical periods, according to different environments, situations and tasks, our army has maintained a high degree of flexibility and maneuverability in combat guidance, and has resolutely implemented the principle of fighting a war of annihilation, continuously enriched and developed combat theories, and wrote classic examples of the weak defeating the strong in the history of world wars.

  With the advent of the information age, the form of warfare, battlefield environment, military technology, and warfare mechanisms have undergone major changes. How the traditional theory of annihilation warfare can adapt to the changes of the times, give full play to our strengths, attack the enemy’s weaknesses, and innovate and develop is a question of the times that our generation of soldiers must answer well.

  Depriving the enemy of its combat power is the key to winning a war of annihilation

  In the long-term practice of revolutionary wars, our army is often at a disadvantage in terms of quantity, scale and equipment. In order to dampen the enemy’s spirit, seize the initiative and defeat the enemy, while emphasizing the cautiousness of the first battle, we pay great attention to planning and fighting a war of annihilation to quickly weaken the enemy’s strategic advantage. Therefore, “it is better to cut off one finger than to injure ten fingers”, completely depriving the enemy of its combat capability, avoiding a war of attrition or a war of defeat, has also become a key indicator for measuring the success or failure of a war of annihilation and the comprehensive effectiveness of combat. Combat under traditional conditions is often the physical superposition of troops and weapons in the same time and space, emphasizing hard killing as the main method, and the strength of combat effectiveness is mainly manifested through parameters such as mobility, firepower, and protection. Correspondingly, quickly and effectively eliminating the enemy’s living forces has become the most effective means of winning hearts and minds and disintegrating the enemy.

  Entering the information age, information power has driven the displacement of combat effectiveness measurement standards in an exponential manner. While becoming the dominant factor in the informationized battlefield, it has strongly promoted the organic integration of combat power with early warning detection, reconnaissance intelligence, command and control, and rear-end support. The warring parties are showing a trend of full-system and full-factor confrontation. The informationized battlefield no longer simply emphasizes the spatial and temporal concentration of troops and weapons to suppress and attack the enemy, but focuses on relying on the network information system to seize information space and compete for information advantages, so that the enemy “cannot see clearly, cannot connect, and cannot hit accurately”, thereby completely depriving the enemy of its combat effectiveness. In the Kosovo War, after suffering 78 days of continuous air strikes by NATO, although the Yugoslav army did not suffer major losses in its manpower, it was always in a passive position because the material basis of the war and the reconnaissance and early warning, command and control, air defense and anti-missile systems were destroyed and paralyzed by the enemy, and was forced to sign a humiliating treaty.

  In today’s era, destroying the enemy’s key war support elements, depriving it of the objective material basis for continuous combat, and undermining its will to wage war are not only important options for annihilation warfare to pursue deterrence effects and deprive the enemy of its combat effectiveness, but also a necessary way for annihilation warfare to achieve combat intentions and defeat the opponent.

  Attacking the key points and breaking the system is the key to winning a war of annihilation

  For a long time, pulling teeth out of a tiger’s mouth and striking the enemy’s vital points have been important indicators for testing the courage and command art of commanders and fighters, and are also effective means to defeat the enemy and achieve the goal of annihilation warfare. During the Hujia Wopeng Battle of the Liaoshen Campaign during the War of Liberation, the 3rd Column of the Northeast Field Army first destroyed the Liao Yaoxiang Corps Command through bold penetration, infiltration, and division, and quickly trapped the enemy in a state of collapse and defeat. But at the same time, we should also see that due to the constraints of military technology level and the effectiveness of weapons and equipment, in traditional operations, there are often many practical difficulties in accurately striking core targets such as enemy command organizations and key defense positions, and there is a lack of effective means to “go straight to Huanglong”. It can be said that traditional annihilation warfare is still more about annihilating the opponent’s living forces. This also makes it an important factor in designing the combat process and considering the success or failure of operations in traditional operations to measure and compare the number and scale of troops and weapons of both sides.

  In the information age, on the one hand, the environmental situation and war thinking have undergone profound changes. The necessity and possibility of expanding the size of the army in exchange for improved combat effectiveness and then winning the war by annihilating a large number of enemy heavy troops are becoming less and less; on the other hand, new weapons and equipment such as precision guidance and unmanned intelligence, with the support of powerful information networks and aerospace reconnaissance capabilities, can implement “decapitation operations” and “targeted elimination” more quickly and accurately, and quickly achieve the goal of annihilation warfare. The combat mode of seizing the key nodes and parts of the enemy’s combat system, carrying out precise strikes and structural destruction, paralyzing the enemy’s combat system while reducing collateral damage and achieving combat objectives is becoming more and more respected. As a result, command centers, communication hubs, radar positions, network nodes, etc. have become sensitive parts that the warring parties focus on protecting and the key points of attacking. In the Iraq War, the US military launched a comprehensive structural paralysis operation against the Iraqi army. By implementing “decapitation operations” against Iraqi military and political leaders and “targeted elimination” of the Iraqi army’s communication command and air defense systems, the Iraqi army was placed in a completely passive position throughout the process, and the war process was accelerated.

  In today’s era, with the rapid development of information technology and war practice, “system destruction” is becoming a keyword in modern combat theory, and is gradually promoting the overall transformation of combat modes. It has not only become a new way and means to win wars, but also an important way to win modern annihilation wars.

  Controlling operational control is the key to winning a war of annihilation

  In previous war practices, the combat environment faced by our army was relatively simple, and the battlefield was mainly carried out on land. Although our army is often at a disadvantage compared to the opponent’s weapons and equipment, it can often defeat the strong with the weak and defeat the enemy by exploring its own advantages, exploiting the enemy’s weaknesses, and actively looking for opportunities. In the second battle of the War to Resist U.S. Aggression and Aid Korea, the volunteer army adopted the combat strategy of internal operations, luring the enemy deep into the enemy, and defeating them one by one. They made full use of the darkness of night and terrain to secretly engage the enemy, dared to cut off the enemy’s retreat, interspersed attacks, and divided and surrounded the enemy, giving the enemy an annihilating blow, and finally won the battle and reversed the entire situation in one fell swoop. This shows that for a party that is temporarily unable to seize comprehensive control of the battlefield in combat, as long as it is good at exploiting the enemy’s weaknesses and cleverly reducing the enemy’s sharp attack momentum, it can still seek the initiative to win in difficult and difficult situations and achieve the goal of annihilation warfare.

  In the information age, wars are fought on vast battlefields, both visible and invisible. In addition to the traditional battlefields of land, sea and air, they are also further extended to deep sea, space, electromagnetic, network, intelligence, biology and other space fields, presenting a complex situation. The armies of the world’s powerful countries have taken the seizure of comprehensive control and the initiative in war as important indicators and necessary ways to build their army and defeat their opponents. Dimensionality reduction strikes have become a must-have in battlefield confrontations. In recent years, the US military’s foreign aggression has relied on the battlefield comprehensive control dominated by the advantages of air and space control and information control. However, we must also see that no matter how powerful the opponent is, there will be fatal weaknesses. Even if it is difficult for the party with relatively backward weapons and equipment to fully seize the battlefield comprehensive control, it can still “attack the incapable with the capable” in the local battlefield, seek local combat initiative, and thus win the local annihilation war, and use the local initiative to drive the overall initiative, and use asymmetric single control to help seize local comprehensive control and achieve final victory.

  In today’s era, we must accelerate the construction of all aspects of the military and step up the forging of capabilities and means to seize comprehensive control and take the initiative on the battlefield. We must also follow the winning mechanism of modern warfare, flexibly use “total war”, “cognitive war”, “cross-domain war”, “intelligent war” and other tactics, use dimensionality reduction strikes, asymmetric strikes and other tactics, turn disadvantages into advantages, turn passivity into initiative, control combat control by “attacking the incapable with the able”, and win the war of annihilation.

  Accurately releasing energy is the key to winning a war of annihilation

  Traditional warfare is restricted by factors such as command and communication, mobility, firepower speed, and weather conditions. The use of forces is often limited to a certain combat area. There is little change in combat command and troop actions, and offensive and defensive actions are relatively clear. In the past, annihilation warfare was more often achieved through echelon (group) deployment, continuous attack (resistance), layer-by-layer capture (defense), combined with interspersed detours, segmentation and encirclement, and cutting off the enemy’s flanks. For this reason, “concentrating superior forces and annihilating the enemy one by one” often becomes the fundamental principle and important way to plan annihilation warfare.

  In the information age, the combat force structure has undergone major changes. With the emergence of space combat, intelligent combat, stealth combat forces, as well as a large number of new weaponry and equipment such as hypersonic aircraft and kinetic weapons, the military’s information power, mobility, and strike power have unprecedentedly increased, and the effectiveness of unmanned intelligent combat has become increasingly prominent. Although quantity and scale are still important criteria for measuring the combat effectiveness of an army, “newer, faster, more accurate, and smarter” has begun to become an important indicator for measuring an army’s ability to adapt to modern warfare. Correspondingly, scientifically and rationally organizing combat forces and focusing on the best to release combat effectiveness have become important links in winning modern annihilation wars.

  Structural strength determines combat effectiveness, and advanced and applicable structural formation is an important prerequisite for multi-functional and powerful combat effectiveness. In the information age, only by jointly using new and old combat forces, realizing the organic integration of new quality capabilities and traditional capabilities, and then building a new force formation that integrates multiple capabilities, can we promote the overall optimization of the combat system and the aggregation of advantages, and accurately control the combat rhythm, combat time and space, combat operations and combat process. In the 2020 Nagorno-Karabakh conflict, Azerbaijan adopted a flexible formation mode for manned and unmanned combat forces, using low-cost An-2 drones to lure the Armenian air defense system to open fire, and followed up with Habib-2 anti-radar drones and TB-2 reconnaissance and strike drones to destroy more than a dozen air defense systems on the Armenian side in one fell swoop, and then calmly defeated the Armenian ground armored forces.

  In today’s era, as the status and role of combat operations such as network and electronic warfare, air and space attacks, and unmanned combat become more prominent, more attention should be paid to scientific design and rational organization of troops and weapons, so as to achieve the effect of clenching fingers into a fist through the accumulation of quality and integration of efficiency, and fight a war of annihilation that is quick to strike and quick to retreat, and wins with precision.

現代國語(繁體):

《立足戰爭演變把握「慎重初戰」》

寫在前面

在我軍戰史上,打殲滅戰是最鮮明、最重要的作戰指導思想之一。早在土地革命戰爭時期,基於「保存自己,消滅敵人」這場戰爭目的,我軍明確提出作戰中基本的方針是打殲滅戰。此後在不同歷史時期,根據環境、情勢和任務的不同,我軍在作戰指導上既保持了高度的靈活機動,又堅決貫徹打殲滅戰的原則,不斷對作戰理論予以豐富發展,在世界戰爭史上寫下了一個以弱勝強的經典戰例。

進入資訊時代,戰爭形態、戰場環境、軍事科技和戰爭機理等已發生重大變化,傳統的殲滅戰理論如何適應時代之變,揚我之長、擊敵之短並創新發展,是我們這代軍人必須回答好的時代課題。

剝奪敵方戰力是打好殲滅戰的關鍵

在長期革命戰爭實踐中,我軍在數量、規模和裝備上常常處於劣勢。為挫敵銳氣、奪取主動、克敵制勝,在強調慎重初戰的同時,十分注重籌劃和打好殲滅戰,以迅速削弱敵方戰略優勢。由此,“傷其十指,不如斷其一指”,徹底剝奪敵方作戰能力,力避打成消耗戰、擊潰戰,也成為衡量殲滅戰成敗和作戰綜合效益的關鍵指標。傳統條件下的作戰,往往是兵力兵器在同一時空的物理疊加,強調以硬殺傷為主要方式,戰鬥力強弱主要透過機動、火力、防護等參數表現。與之相應,迅速有效消滅敵有生力量,成為攻心奪志、瓦解敵方最有效的手段。

進入資訊時代,資訊力以指數級方式推動戰鬥力衡量標準發生位移,在一躍成為資訊化戰場主導要素的同時,強力推動作戰力量與預警探測、偵察情報、指揮控制、後裝保障等要素有機融合,交戰雙方呈現全系統全要素對抗之勢。資訊化戰場不再單純強調兵力兵器時空集中以壓制打擊敵方,而是注重依托網路資訊體系,透過搶佔資訊空間、爭奪資訊優勢,使敵“看不清、聯不上、打不準”,進而全盤剝奪敵方戰力。在科索沃戰爭中,在遭受北約78天持續空中打擊後,南聯盟軍隊有生力量儘管沒有遭受重大損失,但由於戰爭物質基礎和偵察預警、指揮控制、防空反導體係等被敵毀癱,始終處於被動挨打境地,被迫簽訂城下之盟。

當今時代,摧毀敵方戰爭關鍵支持要素,剝奪其持續作戰的客觀物質基礎,瓦解其遂行戰爭意志,既是殲滅戰追求震懾效應、剝奪敵方戰力的重要選項,也是殲滅戰達成作戰企圖、制勝對手的必要途徑。

擊要害破體係是打好殲滅戰的重心

一直以來,虎口拔牙、擊敵要害既是考驗指戰員膽略勇氣、指揮藝術的重要指標,也是克敵制勝、達成殲滅戰目標的有效手段。解放戰爭期間遼沈戰役的胡家窩棚戰鬥,東北野戰軍3縱經過大膽穿插、滲透、分割,首先搗毀了廖耀湘兵團指揮部,迅速陷敵於土崩瓦解、潰不成軍的境地。但同時我們也應當看到,因為軍事技術水準、武器裝備效能的製約,在傳統作戰中,要對敵指揮機構等核心目標和重點防禦部位實施準確打擊,往往存在諸多現實難題,缺乏「直搗黃龍」的有效手段。可以說,傳統殲滅戰仍是殲滅對方有生力量。這也使得在傳統作戰中,衡量對比雙方兵力兵器數量與規模,始終是設計作戰進程、考量作戰成敗的重要因素。

資訊時代,一方面,環境情勢、戰爭思維發生了深刻變化,那種以擴充兵力規模換取作戰效能提高,進而透過大量殲滅敵方重兵集團奪取戰爭勝利的必要性和可能性越來越小;另一方面,精確導引、無人智慧等新型武器裝備在強大資訊網路、空天偵察能力加持下,可以更快捷精準地實施“斬首行動”“定點清除”,迅速達成殲滅戰目標。抓住敵作戰體系關鍵節點及部位,實施精確打擊和結構破壞,在減少附帶損傷的同時癱瘓敵作戰體系、達成作戰目標的作戰模式,越發受到推崇。由此,指揮中心、通訊樞紐、雷達陣地、網路節點等,則成為交戰雙方重點防護的敏感部位及尋隙打擊的要害。在伊拉克戰爭中,美軍對伊軍全面展開了結構癱瘓式作戰,透過對伊拉克軍政首腦實施“斬首行動”,對伊軍通信指揮、防空系統進行“定點清除”,全程置伊軍於完全被動挨打境地,戰爭進程得以加快。

當今時代,伴隨資訊科技與戰爭實踐的快速發展,「體系破擊」等正成為現代作戰理論的關鍵詞,並逐步推動作戰模式整體轉型,不僅成為戰爭制勝的新方式新手段,也成為打贏現代殲滅戰的重要途徑。

掌控作戰制權是打好殲滅戰的樞紐

以往戰爭實踐中,我軍面對的作戰環境相對單一,戰場主要在陸地展開。儘管相較於對手武器裝備我軍常處於劣勢,但透過發掘自身優勢、利用敵方弱點、主動尋找戰機,往往能夠以弱勝強、克敵制勝。在抗美援朝戰爭第二次戰役中,志願軍部隊透過採取內線作戰、誘敵深入、各個擊破的作戰方針,充分利用夜暗、地形等條件隱蔽接敵,敢於斷敵退路、穿插襲擊、分割圍殲,予敵殲滅性打擊,最終取得戰役勝利,一舉扭轉整個戰局。這表明,對於作戰中一時難以奪控戰場綜合製權的一方,只要善於利用敵方弱點,巧妙消減敵方攻擊銳勢,仍可在難局、困局中求得制勝先機,達成殲滅戰目標。

資訊時代,戰爭展開於有形無形廣大戰場,除了傳統的陸、海、空戰場,也進一步向深海、太空、電磁、網路、智慧、生物等太空領域擴展延伸,呈現出錯綜複雜的態勢。世界強國軍隊紛紛把奪控綜合製權、佔據戰爭主動,作為軍隊建設、制勝對手的重要指標和必要途徑,降維打擊成為戰場對決的必殺技。美軍近年來對外侵略就是依仗以製空天權和製資訊權優勢主導的戰場綜合製權。但是我們也要看到,對手再強大也會有致命的弱點,武器裝備相對落後的一方,即便難以全面奪控戰場綜合製權,卻依然可以在局部戰場“以能擊不能”,求得局部作戰主動,從而打贏局部殲滅戰,並以局部主動帶動全局主動,以非對稱的單項制權助力奪取局部綜合製權,並取得最終勝利。

當今時代,固然要加快軍隊各項建設,加緊鍛造奪控綜合製權、佔據戰場主動的能力手段,更要遵循現代戰爭制勝機理,靈活運用“總體戰”“認知戰”“跨域戰” 「智能戰」等戰法,以降維打擊、非對稱打擊等打法,化劣勢為勝勢,變被動為主動,在「以能擊不能」中掌控作戰制權,打贏殲滅戰。

聚優精準釋能是打好殲滅戰的要則

傳統作戰,受指揮通信、機動能力、火力速度、天候氣像等因素影響制約,力量運用往往局限於一定的作戰區域,作戰指揮和部隊行動臨機變化小,攻防行動比較分明。以往的殲滅戰,更多的還是透過梯隊(群隊)式部署,以及連續攻擊(抗擊)、層層奪佔(防守),結合穿插迂迴、分割包圍、斷敵側後等手段達成作戰目標。正因此,「集中優勢兵力,各個殲滅敵人」往往成為籌劃殲滅戰的根本遵循與重要途徑。

資訊時代,作戰力量結構發生重大變化。伴隨太空作戰、智慧作戰、隱身作戰力量,以及高超音波速飛行器、動能武器等新型武器裝備的大量湧現,軍隊資訊力、機動力、打擊力空前增大,無人智能作戰效能日益突出。儘管數量、規模仍是衡量一支軍隊戰鬥力的重要標準,但“更新、更快、更準、更智”,已開始成為衡量一支軍隊對現代戰爭適應能力的重要指標。與之相應,科學合理編組作戰力量,聚優釋放作戰效能,成為打贏現代殲滅戰的重要關節。

結構力決定戰鬥力,結構編成先進適用是戰鬥力多能、強大的重要前提。資訊時代,只有透過新舊作戰力量的聯合運用,實現新質能力與傳統能力的有機融合,進而建構集多種能力於一體的新型力量編組,才能促進作戰體系整體優化與優勢聚合,精準控製作戰節奏、作戰時空、作戰行動和作戰過程。在2020年的納卡衝突中,阿塞拜疆對有人和無人作戰力量採取了靈活編組模式,用價格低廉的安-2無人機引誘亞美尼亞防空系統開火,用哈比-2反雷達無人機和TB -2察打一體無人機跟進打擊,一舉摧毀亞方十餘套防空系統,進而從容打掉亞方地面裝甲部隊。

當今時代,隨著網電作戰、空天襲擊、無人作戰等作戰行動地位作用的進一步凸顯,更應注重科學設計、合理編組兵力兵器,透過質量累加、效能融合,達到攥指成拳的效果,打好快打快收、精打製勝的殲滅戰。

中國軍事資源:https://military.cctv.com/2022/07/07/ARTIWv2oVWmzfSsX9KKVoDPW220888.shtml

來源:解放軍報 | 2022年07月07日 08:OO