Chinese Military Perspective on the New Development Trends in Foreign Military Network Warfare
After decades of development, cyberspace has become an important field of production and life in human society, and has become the fifth-dimensional battlefield after “land, sea, air, and sky.” In recent years, the United States and other developed countries have rushed to introduce cyberspace strategies, build (expand) cyber warfare forces, and implement cyber offensive and defensive operations. The moves in the construction, development, and application of cyber warfare deserve the attention of the world.
Pay attention to cyberspace security, and accelerate the establishment of supporting strategies and regulations
Since cyberspace security is a security issue in an emerging field, most countries lack supporting strategies and systems of laws and regulations. In recent years, major countries in the world have positioned it as a major security field, and the pace of promulgating network security strategies and regulations has been significantly accelerated. For example, since the first national network security strategy was proposed in 2000, the United States has continuously formulated, expanded, and updated various policies, strategies, regulations, and regulations in the field of network security. The network strategy alone includes the “National Network Strategy”, “International Cyberspace Strategy”, ” The Cyber Strategy of the Ministry of National Defense and the cyber strategy of the military services, etc., are used to standardize and guide the development and application of cyber warfare. In October 2014, the U.S. military also issued the world’s first joint doctrine “Cyberspace Operations”, which elaborated and standardized the concepts, actions, and tasks of cyberspace operations. In response to cyber attacks by the United States and NATO, Russia announced the “Russian Federation Cyber Security Strategic Concept” in 2014, and promulgated a new version of the “Information Security Doctrine” in 2016, proposing to ensure network information security. In order to strengthen the overall guidance of network security affairs, India issued the “National Cyber Security Policy” in 2013 and plans to issue a “National Cyber Security Strategy”; the Indian military has formulated policies such as the “Army Cyber Security Policy” and “Navy Information Security Policy” regulations.
Strengthen the professional construction of cyber warfare forces, and pay attention to the use of non-governmental network forces
In recent years, the establishment, integration, and expansion of specialized cyber warfare forces have become a trend among foreign militaries. The United States was the first country to propose the concept of cyber warfare, and it was also the first country to form a professional cyber warfare force. The U.S. military established the Cyber Command in 2010, and upgraded it to a first-level joint operations command in 2018. The number of cyber task forces under its jurisdiction has reached 133, with about 6,200 personnel. Russia established a professional information warfare unit in 2013, and cyber warfare is an important function of it. The Japanese Self-Defense Force established the Cyber Defense Team in 2014, initially with more than 100 members, and has now increased to nearly 300, and plans to expand to a thousand in the future. The United Kingdom also announced in 2020 that it will soon create a national cyber force. On this basis, foreign militaries have generally carried out systematic design and layout of cyber warfare forces. In the field of cyber warfare, forces such as network attack, network defense, and network operation and maintenance are inseparable; externally, network warfare forces are integrated and integrated with information warfare forces such as signal reconnaissance and electronic warfare. For example, the commander of the U.S. Cyber Command also serves as the director of the National Security Agency, and the network attack and defense are integrated with signal intelligence and reconnaissance. The Japanese Self-Defense Force has set up a special first-level command to oversee space, network, and electronic warfare affairs.
It is worth noting that foreign military forces constitute the “regular army” of cyber warfare forces, and private cybersecurity companies, technology companies, hacker organizations, etc. have also become important cyber offensive and defensive forces and have attracted much attention. The notorious “Eye of Sauron” and “Equation Group” and other hacker organizations are inextricably linked to the US military. In recent years, Iran, Russia, and Venezuela have encountered cyber attacks, all of which have the shadow of “Equation Group”. The Indian Army is also considering absorbing its rich IT talents to form a cyber warfare reserve force to further strengthen its cyber warfare capabilities.
Actively develop and build a network arsenal, and intelligent weapon systems are beginning to emerge
Cyber weapons are special weapons used for network attack and defense. They can be viruses, loopholes, denial of service attacks, phishing attacks and other offensive and defensive technologies, or network attack and defense system platforms. Anatoly Smirnov, chairman of the International Information Security Association of the Russian Federation, disclosed in 2019 that many Western countries were developing cyber weapons; the United States, the United Kingdom, Germany, and Japan also made no secret of possessing cyber weapons. According to the disclosures of Snowden and WikiLeaks, U.S. intelligence agencies and the U.S. military have built a systematic offensive cyber arsenal, some of which can be called “weapons of mass destruction” in cyberspace. In 2020, Patrick Saunders, commander of the British Strategic Command, took the initiative to declare that the UK has developed a “destructive” cyber weapon, which can effectively kill the enemy’s power grid and other facilities and equipment.
In terms of network system platforms, the U.S. military has built the most complete network warfare system platform in the world, including accusation management systems such as joint network command and control and unified platform, basic systems for network warfare planning and execution such as the IKE project, and network warfare and network warfare systems such as “Shute”. A weapon system with integrated firepower. In terms of network monitoring and defense, India has developed and built system platforms such as a central monitoring system, network traffic analysis system, and network security monitoring and evaluation system.
Cyber weapons have a natural “kinship” with smart technology. At present, weapon systems in the fields of network situation monitoring, network attack and defense, and password deciphering have already taken shape in intelligentized countries in cyberspace dominant countries. With the development of artificial intelligence technology, the trend of intelligent network weapons will become more and more obvious.
Focus on enhancing the actual combat capabilities of network attack and defense, and innovate network training methods
In view of the reality and destructiveness of cyber threats, foreign militaries attach great importance to testing the security of information network systems and improving the cyber offensive and defensive capabilities of military and government agencies through cyber exercises and training activities in the context of actual combat.
In terms of participating forces, it covers the military, government agencies, reserves and civilian cyber forces. In the method mode, opponents are generally set to ensure the confrontation of the exercise. Some also innovatively use the method of offering rewards to attract hackers to “legally” attack specific target networks and help find network system defense loopholes. In terms of the training environment, actively build a network shooting range to simulate the information network environment of one’s own side and the opponent’s. The United States, Britain, Japan, Canada and NATO have all established professional cyber ranges. As the world’s largest multinational cyber exercise, NATO’s “Lock Shield” exercise simulated a country’s information network environment in 2019. The content of the drill includes responsiveness testing, defense vulnerability inspection, and election interference analysis. India regularly holds “Cyber Fortress” exercises. It is said that in the “Cyber Fortress-8” exercise organized in 2015, the Indian Army’s cyber brigade used remote penetration and other means to successfully obtain the administrator authority of a certain network system of the Indian Army, and found that 13 major categories of security vulnerabilities were identified. In addition, the U.S. military has begun to practice the integration of cyber warfare and operations in other fields. In the U.S. military’s “Schriever” exercise, the integration of space operations and cyber warfare is one of the important contents.
At present, some countries have regarded some serious cyber attacks as acts of war. As the international rules of conduct in cyberspace restrict and deter cyber attacks more and more, cyber exercises may replace real network operations and become foreign military training and upgrading. The primary path to network offensive and defensive capabilities.
Emphasis on pre-emptive offensive operations, actual combat tends to integrate deterrence and multi-domain integration
The hugeness, complexity, and fragility of the network system make network defense difficult and costly. For this reason, the United States and other countries have gradually changed their network security policy and operational thinking from the initial comprehensive defense to preemptive offensive operations, emphasizing Conduct pre-emptive offensive operations in hostile networks to eliminate potential or actual threats.
Driven by offensive thinking, cyber warfare is common in international conflicts, and the targets of attacks are no longer limited to military targets. The United States is the first country to apply cyber warfare to actual combat. In 2009, the U.S. military used the “Stuxnet” virus to carry out cyber attacks on Iran’s nuclear facilities, causing more than 1,500 centrifuges to be scrapped and the Iranian nuclear process to be paused. In 2020, after the assassination of Soleimani, the U.S. military launched cyber attacks on the command and control of the Iranian Revolutionary Guard Corps, missiles, and air defense systems to deter and prevent Iran from carrying out military retaliation. Of course, the idea of offensive cyber warfare does not require absolute cyber superiority. Some non-cyber powers have also proposed the idea of using asymmetric cyber capabilities to carry out preemptive attacks on the enemy’s weaknesses, and then achieve the goal of using the small to gain the big and the weak in the network game. Mandatory.
It is worth noting that in recent international conflicts, the trend of multi-domain integration in the fields of cyber warfare and firepower warfare, electromagnetic spectrum warfare, and cognitive domain warfare has become very obvious. For example, when armed conflicts broke out between Azerbaijan and Armenia in the Naka region in 2020, the two sides launched cyber offenses and defenses in cyberspace on the one hand, and on the other hand launched fierce confrontations in the cognitive domain around international and domestic public opinion, military morale, legal principles and morals.
At present, the low-intensity and ambiguous nature of cyber warfare attracts some international actors to frequently carry out cyberspace operations regardless of the consequences, and the risk of conflict escalation out of control is constantly accumulating. To this end, all countries in the world should start consultations and negotiations on international rules of conduct in cyberspace and cyber arms control as soon as possible, jointly restrict military activities in cyberspace, create a new pattern of cybersecurity, and build a community of shared future in cyberspace.
Chinese Military Exploring the Strategy of Winning Superiority in Information Warfare
來源:中國國防報
In the era of information warfare, due to changes in the mechanism of winning wars, the strategy of winning with the inferior to the superior has also changed accordingly. Under the new situation, exploring the new characteristics, new laws, and new strategies of informatization warfare to win the war with the inferior has very important practical significance for winning future wars.
Information has become the dominant factor in winning a war, and the victory of the inferior is concentrated in seizing information superiority
As information technology is widely used in the military field, informationized weapons and equipment have become the main weapons on the battlefield. Information flow will determine material flow, force flow and energy flow, and become the dominant element of combat effectiveness, penetrating every corner of the battlefield. Competing for information superiority and linking multidimensional forces such as land, sea, air, space, and electricity have become the focus of confrontation in informationized warfare. Taking the information combat system as the primary target of using troops, finding the weak parts of the opponent’s information system, concentrating on destroying them, and making the opponent’s intelligence information system and command and control system paralyzed or unable to operate normally has become an important way for the inferior equipment to defeat the strong enemy. By striking information targets, one hair can affect the whole body and even directly achieve the purpose of war.
The more the party has the advantage of information technology, the more afraid the disadvantaged party will adopt asymmetric means of confrontation. As someone pointed out: our practice of using information as the focus of operations can become our strength, but it is also easy to become a vulnerable weakness. Therefore, aim at the weaknesses and weaknesses of the powerful enemy’s informationized combat platform, concentrate elite weapons and trumpet weapons and equipment, avoid the enemy’s sharp edge, take a slanted sword, and attack its weak links, such as comprehensively using information attack, navigation countermeasures, photoelectric interference and other means to destroy enemy information Even if only one or two of the network system, reconnaissance and early warning system, command and control system, and navigation and positioning system are successful, it can disrupt its overall structure and combat order, effectively paralyze its combat system, and finally achieve the effect of four or two.
System confrontation has become the basic law of victory in war, and the superiority of the inferior is highlighted by the weakening and deprivation of the enemy’s systematic combat advantages
In informationized warfare, the integration, complementarity, and interdependence of the various services and arms have increased, and the confrontation between the combat systems of the two hostile parties has become increasingly prominent. War is no longer a confrontation of single functions between combat units, but a systemic confrontation based on the comprehensive integration of various combat units and combat elements. The overall function of the combat system has a major impact on the success or failure of a war. In the face of an enemy with systemic advantages, it is very difficult to rely on a single force and a single means to achieve victory over the superior. Whether it can weaken and deprive the combat advantages of a powerful enemy system has become a key link in information warfare to achieve victory over the superior.
The practice of several local wars in recent years has proved that the party with inferior equipment can effectively destroy the key targets of the enemy’s combat system by developing and using some advanced weapons and combining them with other weapons and equipment when there is a “generational difference” in the overall combat capability. It is entirely possible to cause a powerful enemy’s overall operational dysfunction or paralysis. The larger and more sophisticated the combat system of a strong enemy in information technology, the easier it is to expose its vulnerable side. Once it is destroyed, it will often cause serious consequences. During the Iraq war, the U.S. military was shocked by the fact that GPS precision-guided weapons lost their accuracy after being interfered by the Iraqi army’s GPS jammers. During the Kosovo War, the soldiers and civilians of Yugoslavia used flexible and diverse computer network warfare, which also caused NATO’s computer network system to be attacked and paralyzed many times.
Quick decision has become the basic requirement for winning a war, and more emphasis is placed on immediate linkage to form a local advantage over the enemy by using the inferior to win the superior
The depreciation of the space factor and the sharp increase in the value of the time factor in the informationized battlefield lead to the acceleration of the combat rhythm, the shortening of the duration of the war, and the significant enhancement of the quick decision of the war. Although the basic combat procedures and information flow have not undergone fundamental changes, the processes of discovering targets, making decisions, issuing orders, and troop actions are carried out almost simultaneously in real time. The U.S. military’s book “Awe and Fear–The Way to Quickly Conquer the Enemy” pointed out that when talking about the quick victory of information warfare: “From a technical point of view, the speed here includes the formulation of combat plans, combat determination, and deployment and use of troops. Everything requires the troops to respond quickly in the shortest possible time.” In the Afghan war, it took about 19 minutes for the U.S. military to go from the “discovery-location-aiming-attack-assessment” kill chain, while it only took 10 minutes in the 2003 Iraq war about.
At the same time, various information-based weapons can carry out rapid and deadly long-range precision strikes, making the disadvantaged party form a passive situation where they cannot be seen, relied on, grasped, or hit. In exchange for room for maneuver in battles and battles; through long-term local gathering of superior forces and annihilating the enemy, accumulating small victories into big victories, it becomes more difficult to finally realize the growth and decline of the enemy and our forces. We must pay attention to the function of network aggregation, select and deploy new quality and elite forces, adopt modular organization, building block combination, task combination and other force formation methods, use multi-dimensional distribution, network chain combat configuration, and use link cycle linkage and leapfrog Response methods such as direct linkage, synchronous parallel linkage, sequential connection linkage, etc., realize network aggregation efficiency, system linkage, and multi-dimensional response to obtain local strength advantages against the enemy.
Technological factors are becoming more and more important in war, and the victory of the inferior depends on the close integration of people and technology
Information technology, especially disruptive technology, has triggered revolutionary changes in weaponry, organizational structure, and combat styles, and has become a direct driving force for the transformation of information warfare. Information warfare relies on the combination and application advantages of weapon platforms to realize domain linkage and cross-domain control. The proportion of technology-intensive arms and new-quality combat forces continues to increase. The concept of inferior superiority is facing challenges. However, information-based weapons and equipment put forward higher requirements for the quality of personnel. The organic combination of information-based weapons and equipment and high-quality personnel has become a key factor in winning a war. When the disadvantaged party confronts a strong enemy, it is even more necessary to do more in terms of human subjective initiative. enough articles.
In the man-machine system composed of man and weapon, the scientific and technological content of weapons and equipment is increasing day by day, and the trend of intelligence is becoming more and more obvious. The political, theoretical, military and technological literacy of commanders has become the key factor for winning an information war. General Sullivan of the U.S. Army once said: “Even in the information age, it is still people who dominate war operations. Changes in technology, equipment, and force structure will not lead to the disappearance of courage, selflessness, camaraderie, and leadership. “Information warfare has not changed that people are the decisive factor in the outcome of a war. How to make full use of strengths and avoid weaknesses for the party with inferior weapons and equipment, give full play to the effective combination of people and technology, and make up for technological disadvantages has become a key factor in defeating an enemy with superior equipment.
The contest of intelligence and strategy has become an important aspect of winning a war, and the strategy of using the inferior to win the superior exists in the active role
If a weak army wants to defeat a strong enemy, simply competing in military strength is tantamount to hitting a rock with an egg – there is no advantage at all; simply competing in equipment technology is tantamount to using its own strengths to defeat the enemy’s strengths – always being passive; Competing with external support is tantamount to discarding the decisive role of internal factors-willing to seek defeat with inferiority. What ultimately depends on the inferior to the superior? Relying on the active role of self-consciousness, relying on intelligence and strategic competition, this is the fundamental factor to realize the transformation from weak to strong, and the inferior to the superior.
Subjective initiative is manifested in many aspects for “surviving the superior with the inferior”. Although the “potential” here has a certain relationship with the strength of the opposing sides, it still depends on the degree of the commander’s subjective initiative. Those who plan well gain power, and those who do not plan lose power. The second is to actively plan a series of strategies to actively seize the advantages of opportunities. War is a vigorous confrontation between two sides fighting wits and courage. If the weaker side can make a superior move and make a living in a row, it will surely win the first opportunity. The third is to actively create local advantages and actively establish overall victory. Global strength does not mean local overall superiority, and overall global weakness does not mean local overall inferiority. Concentrating forces to form local advantages will eventually break the comparison of advantages and disadvantages and lay the foundation for overall victory. The fourth is to make the best use of the situation and actively innovate and adapt tactics. Water is impermanent, and soldiers are impermanent. According to changes in the enemy’s situation, we can flexibly innovate and change our own tactics, and constantly change the situation of both the enemy and ourselves, so as to gradually provide conditions for our own side to change from weak to strong.
Chinese People’s Liberation Army Actively Responding to the Challenge of Intelligent Warfare
In recent years, the wave of intelligence has surged and has been widely used in the military field. Major countries in the world attach great importance to the construction and application of military intelligence, and various unmanned combat platforms and intelligent weapons and equipment continue to appear, and they are installed in troops and put into actual combat. In the face of the accelerated evolution of intelligent warfare, only by seizing development opportunities, actively responding to challenges, accelerating the development of military intelligence, and accelerating the forging of intelligent combat capabilities can we seize the strategic initiative of intelligent warfare and win future intelligent warfare.
Focusing on designing wars to create intelligent theory
Military theory comes from combat practice and is used to guide combat practice. Restricted by various conditions in the past, military theory research was mostly “looking backwards”, that is, summarizing battle examples to form combat guidance. With the rapid development of modern technology, especially big data, cloud computing and other disruptive technologies, the research on combat theory has got rid of the traditional follow-up and inductive reasoning mode, and has entered a new era of experimental warfare and design warfare. New disruptive technologies in the field of intelligence have opened up new space for military theory innovation. To this end, we should create a basic theory of intelligent warfare in accordance with the idea of ”proposing concepts-needs analysis-innovating theories”, and conduct in-depth research on the concept connotation, essential characteristics, war guidance, combat styles, offensive and defensive actions, winning mechanisms, etc. of intelligent warfare. Features and laws, etc.; innovate intelligent combat methods and methods, give full play to the overall effectiveness of the intelligent combat system, strengthen research on new intelligent combat methods and methods such as man-machine collaborative intelligent combat, intelligent robot combat, and intelligent unmanned swarm combat, as well as intelligent Combat command, the process and methods of intelligent combat support, etc.; focus on effectively responding to the threat of intelligent combat, and research strategies to defeat the enemy, such as intelligent interdiction warfare and intelligent disruption warfare. These theories are the cornerstone of the theoretical system of intelligent warfare. In the future, the theory of war centered on strengthening “controlling intellectual power” and competing for “algorithm-centric warfare” will most likely replace the theory of warfare centered on “network-centric warfare.”
Focus on cross-domain interconnection and explore intelligent forms
The military organization is the link connecting military technology and combat theory, and the lever to exert the overall combat effectiveness of the military. Modern combat places more emphasis on “elite combat under the support of a large system”, that is, supported by the joint combat system, “fine front and strong back”, according to the idea of ”integrated design, modular formation, and combined application”, the formation is more precise and more accurate. The powerful combat module enables the maximum release of combat energy. The organization of the future intelligent warfare system will be based on strategies, campaigns, and tactics at different levels and different arms and arms, and will form different types and purposes of small, multi-functional and intelligent new joint combat forces. According to the requirements of reconfigurability, scalability and self-adaptation, the intelligentized combat network can seamlessly link and flexibly organize individual weapon platforms according to changes in the enemy situation and battlefield environment, and then aggregate them to form System advantages, forming a combat module integrating offense and defense. The intelligent new combat force system is a comprehensive product of the development of artificial intelligence technology, the formation of new combat capabilities, and the evolution of war forms. new growth point.
Focus on the integration of man and machine to develop intelligent weapons With the development of information technology and intelligent technology, whoever can win in the field of artificial intelligence is expected to have the initiative in future military confrontation. We should focus on the dual needs of intelligent warfare system operations and intelligent weapon equipment system construction, do a good job in top-level design and overall planning, compile a road map for the development of intelligent weapon equipment systems, and develop high, medium, low-end, low-end, and Large, medium and small, long-range and short-range, covering space fields such as land, sea, air, space, electricity, and networks, and an intelligent unmanned combat equipment system that matches combat and support, and establishes a “human-led, machine-assisted, mixed formation, joint “Operation” manned-unmanned cooperation system, enhance the system integration of various military arms and various intelligent weapons and equipment such as operations and support. Intelligent unmanned combat system is a new trend in the development of future war equipment. Its core is to aim at the requirements of “zero casualties”, “full coverage” and “fast response” in future wars, and make full use of new theories, new materials, new processes, new energy, and new technology development achievements in two aspects: man-machine collaboration and autonomous action. Continuously make breakthroughs, build a three-level unmanned equipment sys
tem of strategy, campaign, and tactics, build a new type of intelligent unmanned division on a large scale, and realize the systematic and coordinated operations of unmanned combat systems. At the same time, we should focus on the needs of unmanned and anti-unmanned, intelligent and anti-intelligent operations, and focus on the development of anti-enemy intelligent unmanned combat weaponry systems to ensure effective intelligent unmanned offensive and defensive confrontation with the enemy.
Focus on ability compound innovation intelligent training
The professional division of labor in modern warfare is becoming more and more detailed, and the entire combat system is becoming more and more complex, which promotes the transition from manpower-intensive to technology-intensive operations, requiring combatants not only to have good physical fitness, but also to have good technical literacy and intellectual advantages , to meet the needs of different combat missions, combat environments, and combat opponents. Military intelligence puts forward higher requirements on the quality of people. Correspondingly, intelligent military talents should have the characteristics of group talents, sophisticated skills, complex knowledge, innovative thinking, and intelligent decision-making. Intelligent warfare will be a war carried out by the combination of man and machine, and the combat force with the intelligent unmanned combat system as the main body will play an increasingly important role. The effective combination of high-quality personnel and intelligent weapons can maximize combat effectiveness. It is necessary to adapt to the new characteristics of the intelligent warfare force system, innovate and develop the concept of intelligent training, and explore a new model for the generation of intelligent warfare combat power. At present, artificial intelligence technology can create a more “real” weapon operation experience and battlefield environment, and can realistically interpret the combat process, assist decision-making and command, and evaluate combat concepts. To this end, adapt to the new characteristics of the intelligent warfare force system, focus on the improvement of the self-command, self-control, and self-combat capabilities of the intelligent combat system, and make full use of the characteristics of the intelligent system that can self-game and self-growth, forming a special strategy for intelligent warfare. Combat system training system, training environment and training mechanism, strengthen “human” control of intelligent system training, and explore a new training mode with “machine” as the main object. In this way, the intelligent combat system can obtain a leap in combat capability after short-term self-intensive training, so as to cope with the test of disorder, complexity and uncertainty in the future combat environment.
Focusing on Accurate and Efficient Improvement of Guarantee Mode
Intelligent battlefields and the degree of realization of comprehensive support for joint operations are important factors that directly affect the generation of combat effectiveness of troops. The development of intelligent technology will surely trigger a revolutionary change in the construction of the joint combat support system and realize intelligent comprehensive support. Comprehensive support is the foundation of combat effectiveness and a bridge that transforms national economic strength into military combat capability. With the continuous maturity of the Internet of Things technology, intelligent warfare puts more emphasis on integrated guarantee, precise guarantee, and distribution guarantee, that is, the required amount is delivered to the required place at the required time. Relying on the integrated support system, the dispersedly deployed support forces and resources are grouped according to functional modules such as supplies, supplies, maintenance, ammunition, and management, so that they cover all areas of combat service support. Relying on visualization technology, the entire process of combat supply is tracked and mastered According to the current situation, according to the real-time development of the battle situation, information control, reception and distribution of personnel flow and material flow are carried out to achieve point-to-point direct support. Through the use of technologies such as the Internet of Things, drones, smart cars, remote surgery, and 3D printing, upgrade and build an intelligent after-installation support system covering intelligent warehousing, intelligent delivery, intelligent maintenance, and intelligent medical treatment, so as to realize automatic, fast and accurate supply of after-load materials on the battlefield , Rapid diagnosis and maintenance of equipment failures, timely rescue of battlefield personnel, changing passive support into active service, and improving the overall support efficiency and effectiveness of aftermarket.
Focus on both military and
civilian use and deepen intelligent integration
Breakthroughs in the core and key technologies of artificial intelligence are the “country’s most important weapon” to deal with the threats and challenges of intelligent warfare. The rapid development of intelligent technology has become an accelerator of military intelligence. In the information age, the boundary between military technology and civilian technology is becoming more and more blurred, and the transferability is becoming stronger and stronger. Actively establish a military-civilian collaborative innovation mechanism, continuously strengthen the driving force for the innovation and development of intelligent core technologies, build an open industry-university-research collaborative innovation system for the whole society, plan forward and support investment in core cutting-edge technologies such as artificial intelligence, and give full play to the innovation power of the entire society. Promote the rapid and sustainable development of military intelligence. Accelerate technological breakthroughs in key areas. It is necessary to focus on relevant key technical fields and break the technical bottleneck that restricts the development of military intelligence. Strengthen research on the basic support fields of military intelligence, such as military big data, military Internet of Things, etc.; start from combat requirements, strengthen research on intelligent application technologies in various operational elements, especially intelligent command and decision-making, intelligent weapon platforms, Research on intelligent battlefield perception and intelligent countermeasure technology. The research and development of the core key technology of military intelligence not only requires interdisciplinary and cross-field collaborative innovation, but also integrates the development of social intelligence and military intelligence. Intelligent technology is quickly embedded in operational elements and operational processes. To accelerate the development of military intelligence, we should explore the rules of cultivating relevant talents, make full use of military and local education resources, increase the intensity of training relevant talents, and provide solid intellectual support and talent guarantee for promoting the construction of military intelligence.
Chinese Military Higher Education in the Age of Intelligent Warfare
“Military academies are born for war and built for war.” At the opening ceremony of the 2019 military academy principal training, Chairman Xi proposed the military education policy for the new era, pointing out the direction for the military academies to cultivate high-quality, professional new military talents. At present, the form of war is accelerating towards informationization and intelligence. What kind of soldiers are needed to win future intelligent wars, and how military higher education can cultivate talents suitable for intelligent warfare are major issues before us.
The form of war is accelerating towards intelligent development
The form of war is the expression form and state of war history staged mainly marked by the technical attributes of the main battle weapon. So far, after experiencing cold weapon wars, hot weapon wars, and mechanized warfare, the form of warfare is accelerating its development towards informationized and intelligentized warfare. The increasingly widespread application of advanced technologies such as big data, the Internet of Things, artificial intelligence, biotechnology, and brain science in the military field is becoming an important driver of the new military revolution, giving rise to new forms of unmanned, autonomous, and intelligent warfare, changing the Traditional war winning mechanism. In 2014, a foreign military think tank released a research report titled “20YY: War in the Robot Era”, arguing that a storm of military transformation marked by intelligent armies, autonomous equipment, and unmanned warfare is approaching. Platforms, information systems and decision support systems, as well as new weapons such as directed energy, hypersonics, bionics, genes, and nanometers, will initially establish an intelligent combat system by 2035, and will develop to an advanced stage by 2050, fully realizing combat platforms, information Systems, command and control are intelligentized and even unmanned, new weapons such as bionics, genes, and nanometers are on the battlefield, and the combat space is further expanded to biological space, nanospace, and intelligent space.
In recent years, with the continuous deepening of research on the human brain, the brain-computer interface technology is becoming more and more mature. In the future, the information exchange between human beings and the outside world will no longer be limited to the senses, and the direct information exchange between the brain and the outside world can also be realized through chips. People and people, people and things are fully interconnected, and human beings may surpass the Internet and the Internet of Things and enter the era of intelligence supported by the Internet of Brains. In the era of the Internet of Brains, soldiers’ brains are directly connected to combat platforms, information systems, and decision-making support systems, and decisions are made with the assistance of technologies such as quantum computing and cloud platforms. Information and mind merge. Some domestic experts believe that under the influence of artificial intelligence technology, the winning mechanism of future wars will change from “information dominance, system confrontation, precise strikes, and joint victory” in information warfare to “intelligence dominance, independent confrontation, and traceability” in intelligent warfare. Following the transformation of “strike, cloud and brain winning”, following matter, energy, and information, cloud intelligence that integrates man and machine has become the key to determining the outcome of a war. This transformation of the form of intelligent warfare is accelerating, and any hesitation may bring unimaginable consequences.
But it should be noted that no matter how the war develops, people are always the most fundamental element. The form of intelligent warfare will lead to changes in the functions and roles of soldiers, and will put forward higher requirements for the ability and quality of soldiers. Cognitive ability may surpass knowledge and skills and become the core ability of soldiers.
Intelligent warfare requires the upgrading and reconstruction of the comprehensive quality of soldiers.
According to the talent growth cycle, soldiers who are currently receiving higher education will become the main force of combat training in more than 10 years, and will also become the first main force to meet the challenges of intelligent warfare. At present, there are still some deficiencies in the design of personnel training goals in our military’s higher education, and insufficient attention is paid to the ability to adapt to the ever-changing intelligent battlefield in the future. There is still a certain gap between the personnel training objectives and the needs of intelligent warfare. On July 23, 2020, when Chairman Xi inspected the Air Force Aviation University, he emphasized that we must persist in cultivating people with morality, educating people for war, strengthening m
ilitary spirit education, strengthening fighting spirit, and comprehensively strengthening the ideological and political, military, scientific and cultural aspects of pilot students. , Physical and psychological quality foundation. To implement President Xi’s important instructions and meet the needs of future intelligent warfare, it is urgent to build a higher-level military talent training goal with thinking as the core, and accelerate the upgrading and reconstruction of military personnel’s comprehensive quality.
Intelligent warfare is a complex giant system integrating multiple fields. Its intelligence-based characteristics and iterative and changeable development trend are changing the role of soldiers in warfare. Soldiers may gradually move from the foreground of the war to behind the scenes, from direct face-to-face combat to man-machine collaborative combat, from front-line charging to back-end planning and design of war. In order to be competent in man-machine coordination, planning and designing wars and other functional roles, in addition to ideological, political, physical and psychological requirements, in terms of military profession and scientific culture, soldiers should focus on improving the following five aspects of knowledge, ability and quality: First, multidisciplinary integration Master the core principles of multiple disciplines related to intelligent warfare, such as nature, military, cognitive psychology, and network intelligence, and be able to integrate knowledge across disciplines to guide military practice; the second is strong cognitive ability, with logical thinking, judgment Thinking and system thinking ability, able to use scientific methods to analyze and reason to solve combat problems; the third is human-machine collaboration ability, deeply grasp the characteristics and laws of intelligent warfare, skillfully use combat platforms, command and control systems, and decision support systems, and be able to control diversified intelligent weapons The fourth is the ability to innovate, with a keen sense of technology and strong creativity, able to grasp the frontiers of science and technology, innovate combat styles, and grasp the laws of war development; the fifth is the ability to self-growth, to be able to accurately recognize oneself , rationally plan military careers, freely use information means to acquire new knowledge, new technologies, and new methods, constantly improve the knowledge structure, enhance cognitive ability, and better adapt to the complex and changeable military revolution development.
Identifying the Emphasis Points of Military Higher Education Reform
At present, the superposition of informatization and intelligentization has brought greater complexity to the personnel training work of military academies. It is necessary to meet the actual needs of informatization operations and at the same time lay the foundation for adapting to intelligent warfare. We should focus on The following work.
Restructure the curriculum system. The curriculum system supports the formation of talent knowledge structure. In order to cultivate military talents that meet the needs of intelligent warfare and achieve the training goals of military majors, science and culture, it is necessary to break the practice of designing a curriculum system with a single major as the background and establish a curriculum system of “general education + direction”. The general education course is based on the existing natural science and public courses, adding courses such as mathematical logic, mathematical modeling, critical thinking, network foundation, artificial intelligence, cognitive neuroscience, system engineering, etc., to establish cross-field and interdisciplinary courses System, expand the knowledge of students, build a knowledge structure urgently needed for intelligent warfare, and lay a broad knowledge foundation for their lifelong growth. Orientation courses are to establish a discipline and professional direction, set up a vertical curriculum system of mathematical science, professional foundation, and professional positions, build a solid professional background, and cultivate students’ ability to use professional theories to solve complex combat training problems. The curriculum system of “General Education + Orientation” helps build a “T”-shaped knowledge structure and meets the needs of military personnel to adapt to diverse and intelligent warfare.
Deepen classroom reform. Educational neuroscience believes that education is the reshaping of students’ brains, and the classroom is the main position for reshaping students’ neural networks, especially for the formation of high-level cognitive abilities required for intelligent warfare. Continuously deepening classroom reform is the key to military Critical tasks for higher education today. It should be seen that a classroom with only knowledge and understanding is far from a good classroom. All human behaviors, though
ts and emotions are all controlled by the brain, and every knowledge, thought and emotion corresponds to a specific neural network of the brain. Therefore, classroom reform should center on students’ learning, follow the cognitive laws of the human brain, and Attract and maintain attention as the starting point, establish a scientific thinking framework, and mobilize students to think proactively. Usually, teaching methods aimed at higher-level abilities have a general model—problem-driven heuristic teaching, and the commonly used problem-based teaching methods, project-based teaching methods, and inquiry-based teaching methods all belong to this model. Therefore, the main path to promote classroom reform is to develop unknown, novel, and interesting questions and stories for students, design a thinking framework that points to logical reasoning, critical thinking, reflection, creativity, and learning ability, and inspire students under the guidance of the framework. Active thinking, supplemented by the output process of speaking and writing, finally achieves the goal of internalizing knowledge understanding and forming high-level abilities.
Promote comprehensive education. Modern educational theory not only regards the classroom as an important position of education, but also regards all time and space outside the classroom as an important resource for cultivating students. The time and space outside the classroom not only support classroom teaching and promote the formation of knowledge and ability, but also an important place to cultivate non-intellectual ability. Colleges and universities should make full use of these time and space, clarify specific training objectives, focus on going deep into the army, close to actual combat, highlighting practicality and creativity, and scientifically design education and training programs. Focus on giving full play to the advantages of military academies in management and education, explore the establishment of a student management model, and promote the cultivation of students’ leadership and management capabilities; continue to enrich the second classroom, build an innovative platform, create more opportunities for independent practice, and improve students’ innovation capabilities; make full use of various Large-scale activities to cultivate students’ competition awareness and teamwork ability; strengthen the construction of management cadres, improve scientific management and training capabilities, and effectively guide students to carry out time management, goal management, emotional management, psychological adjustment, habit formation, etc., to help students improve self-management and self-learning ability.
All in all, education is a systematic project. The above are only three aspects to break through the shortcomings of talent training in the era of intelligence. To truly solve the problem, military academies need to carry out systematic reforms, such as strategic planning, quality management, personnel quality, teaching conditions, etc. All aspects can effectively support the achievement of the goal of personnel training, and this requires us to continuously explore and innovate, continuously improve the level of running schools and educating people, and strive to create a new situation in the construction and development of military academies.
Chinese Military Perspective on the Evolution of the Winning Mechanisms of Intelligent Warfare
Military theorists have often said that victory tends to smile to those who can foresee changes in the character of warfare, rather than to those who wait for changes to occur before adapting. In recent years, disruptive technologies represented by artificial intelligence have developed rapidly and are widely used in the military field, accelerating the evolution of warfare to intelligence, and correspondingly, the concept of warfare is also undergoing changes. Only by discovering changes in time, actively responding to changes, and actively adapting to changes can we be invincible in future wars.
From “fighting the weak with the strong” to “controlling the clumsy with wisdom”
“The strong win the weak and the weak lose” is a law of victory in war with certain universality. Even those battles in which the weak defeated the strong often had to form a strength advantage against the enemy at a local and specific period of time in order to truly win. In the era of intelligent warfare, the contribution rate of intelligence superiority to combat effectiveness is much higher than that of other factors.
In the confrontation of intelligent warfare, human intelligence widely penetrates into the combat field and is transplanted into weapon systems. Global multi-dimensional and various types of intelligent combat platforms can quickly couple combat forces, build a combat system according to mission requirements, and independently implement coordinated operations. After the end, it quickly returned to the standby state, showing the trend of intelligence and autonomy. The side with a higher and stronger level of intelligence can better develop and use the mechanism of “controlling stupidity with wisdom”, and even design wars based on this, dominate the development of the battle situation, and win the final victory. It should also be noted that in the era of intelligent warfare, there are likely to be multiple stages of development from low to high. Try to keep yourself at an advanced stage, and attack your opponent so that it is at a low-dimensional stage. use.
From “destroying power” to “destroying cognition”
With the accelerated evolution of warfare to intelligence, the combat space has gradually expanded from the physical domain and the information domain to the cognitive domain, from the tangible battlefield to the invisible battlefield. The cognitive space composed of people’s spiritual and psychological activities has become a new combat space. Different from the main purpose of destroying the enemy’s vital forces in traditional warfare, intelligent warfare will pay more attention to weakening the enemy’s morale, disintegrating the enemy’s will, and destroying the enemy’s cognition.
Through the intelligent analysis of the opponent’s personality preferences, psychological characteristics, and decision-making habits, deterrent information can be “tailored” in a targeted manner, and the advantages of cutting-edge technologies such as intelligence can be used to show the opponent’s powerful strength in a vivid way, so that anxiety, suspicion, etc. , panic and other emotions continue to ferment inside it, which eventually leads to its self-defeating. Known as the “new oil”, big data not only enriches intelligence sources, but also becomes an important “weapon” that acts on the opponent’s cognition. By processing big data and deliberately “leaking” it to the opponent, it will create a new “fog of war” for it, and make it fall into a situation of cognitive confusion. In an intelligent war, the game of struggle will be more intense, and the party with a cognitive advantage will be ahead of the opponent, and it will be easier to grasp the initiative and opportunities.
From “people-oriented” to “human-machine collaboration”
In traditional warfare, the organization and use of military power are dominated by people. With the widespread application of intelligent technology, the proportion of unmanned equipment continues to increase. In intelligent warfare, combat tasks will be completed by man-machine collaboration, and the two will achieve organic integration and complement each other’s advantages. The third “offset strategy” proposed by the foreign military regards human-machine cooperation as a key technology for key development, and its successively proposed concepts such as “loyal wingman” are also aimed at exploring the realization of manned/unmanned coordinated operations. It is foreseeable that human-machine collaboration will play an important role in future warfare.
Using unmanned reconnaissance forces to carry out three-dimensional and multi-dimensional battlefield situational awareness can provide real-time intelligence support for manned combat forces; use unmanned platforms to carry relay loads to continuously provide communication relay support for manned combat forces; use
unmanned combat forces to go deep into the front battlefield, It can attract the enemy to attack, force the enemy to expose its position, and provide target guidance and fire support for manned combat forces; use unmanned transport equipment to provide supplies for the front line, which can improve the efficiency of logistics support, reduce transportation costs, and reduce unnecessary casualties. With the assistance of artificial intelligence, manned combat forces and unmanned combat forces will realize scientific division of labor and reasonable collocation in terms of quantity, scale and function, so as to maximize the overall effectiveness.
From “eat the small with the big” to “eat the slow with the fast”
In traditional warfare, it is often necessary to make up for shortcomings in equipment performance and other aspects by increasing the number of troops. The rapid development of military intelligence has greatly improved the speed of information transmission and the accuracy of weapon strikes, greatly reduced the time for reconnaissance and early warning, intelligence processing, command decision-making, firepower strikes, and damage assessment, and accelerated the OODA kill chain cycle. , making “find and destroy” possible.
Hypersonic missiles, laser weapons, microwave weapons, electromagnetic pulse weapons and other new rapid-kill weapons have further pushed the rhythm of war to “second kill”. In the Gulf War, the loop time of the OODA loop required 3 days; in the Iraq War, the loop time has been shortened to less than 10 minutes; and in the Syrian War, the loop has almost achieved near real-time. In intelligent warfare, the use of an unmanned platform for surveillance and attack to quickly target high-value targets such as the enemy’s core command post and high-level commanders will cause the opponent to suffer heavy losses before they can react, and even face the danger of paralysis. It can be seen that victory does not necessarily favor the side with a large military force, and the side that moves quickly and accurately will be more likely to win the battlefield. According to statistics, the reaction time required by artificial intelligence to respond to changes in the battlefield is more than 400 times faster than that of humans. In the face of the rapidly changing battlefield situation, people will be more inclined to use artificial intelligence technology to realize the adaptive planning and autonomous decision-making of the command and control system, so that the command and control mode will be changed from “people on the loop” to “people outside the loop”, so as to reduce the While shouldering the burden of commanding personnel, it can improve combat efficiency and the success rate of mission execution.
From “Integrated Winning” to “Cluster Winning”
The traditional concept of equipment development is to invest a lot of money in the research and development of highly integrated high-precision weapon platforms, in order to achieve dimensionality reduction strikes on the enemy by virtue of intergenerational advantages and performance advantages in war. However, developing and deploying a multi-functional high-end platform not only takes a lot of time and money, but when multiple software and hardware modules are integrated into a single weapon platform, there may be incompatibility among them. Once the platform is destroyed, it will cause heavy losses. The military application of disruptive technologies such as artificial intelligence has led to the rapid development of unmanned swarms. Unmanned swarms have the advantages of large scale, low comprehensive cost, and decentralization. Unmanned platforms coordinate with each other, divide labor and cooperate, and can make independent decisions and carry out combat tasks in an organized manner. Even if some unmanned platforms are destroyed, it will not affect the overall operation. efficacy. Combat concepts such as “decision-making center warfare” and “mosaic warfare” proposed by foreign militaries focus on the use of unmanned swarms to complete combat tasks. In intelligent warfare, by dispersing functions such as reconnaissance and surveillance, information communication, command and control, and fire strikes into a large number of single-function unmanned combat units, a highly robust and highly elastic “kill net” is constructed, and then Adjusting the combination method will make it emerge a powerful group intelligence, creating great uncertainty for the opponent, and then trap the opponent in the judgment link of the OODA loop, unable to make effective decisions. In addition, due to the large number of unmanned swarms, the opponent’s detection, tracking, and interception capabilities can be quickly saturated, and the opponent has to face the dilemma of fortification failure because it cannot destroy all unmanned platforms in the swarm.
From “Military Dominance” to “Multiple Mixture”
Traditional warfare mainly relies on violent means to make the enemy submit to one’s own will, and usually has a strong war intensity, with clear boundaries between peacetime and wartime. With the continuous expansion of the field of military struggle to new fields such as space, network, and intelligence, and the increasingly prominent role of economic, cultural, diplomatic, and legal means in warfare, intelligent warfare will be carried out in many fields represented by the “grey zone”. Developed in the form of “multi-pronged approach”. The intensity of war may be weakened, and the boundary between peace and war will become more blurred. Whether in 2019, half of Saudi Arabia’s oil fields were attacked by drones and half of its oil production was shut down, or in 2021, the largest oil pipeline in the United States was hit by cyber attacks and caused a large-scale oil shortage. The far-reaching impact of various new attack methods cannot be ignored underestimate.
With the development and maturity of intelligent technology, the comprehensive use of various means to attack opponents’ industrial, transportation, financial, communication, energy, medical and other facilities and networks will become more common. The threshold of intelligent warfare will show a downward trend, and the warring parties may adopt the method of undeclared war to launch a hybrid war that integrates economic warfare, diplomatic warfare, cyber warfare, public opinion warfare, psychological warfare, legal warfare, etc., so that the opponent is exhausted. Handle.
From “actual combat inspection” to “experimental exercise”
Under traditional conditions, due to the lack of scientific simulation and evaluation tools, the true capabilities of the army can only be tested in actual combat. Under intelligent conditions, using virtual reality technology can create a virtual scene with a strong sense of three-dimensional and realism based on the actual battlefield environment and task background. This scene can not only restore objective things such as weapons and equipment from multiple dimensions such as sound, appearance, and performance, but also simulate various severe weather such as heavy fog, heavy rain, and snowstorm, and display the terrain, meteorology, hydrology, etc. of the battlefield in a visualized form. Electromagnetic, nuclear and other information, close to the real situation of the battlefield.
Set the imaginary enemy in the virtual environment according to the characteristics of the enemy in reality, and carry out intelligent simulation of the possible trend of the battle situation, so that officers and soldiers can “experience” the war in virtual reality several times before the official war, so as to improve the equipment performance, The rhythm of the war and the situation of the enemy and the enemy are all clear, and it will be easier to perform realistic tasks. Before the outbreak of the Iraq War, the U.S. military secretly developed a computer game that simulated the combat environment in Baghdad. Among the personnel dispatched to Iraq to perform missions, the survival rate of those trained in the game was as high as 90%. With the continuous enrichment and improvement of data collected in reality, the construction of virtual battlefields will be more realistic, the prediction of the battlefield situation will be more accurate, and the comprehensive evaluation of exercises will be more credible. If the outcome of the war is known in advance, there may be a situation where “surrender the enemy” without a fight or a small fight.
Chinese Military to focus on the integration and development of mechanization, informationization and intelligence
Adhere to the integration and development of mechanization, informationization and intelligence
——Conscientiously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China
■Chinese People’s Liberation Army Unit 66011
The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informationization and intelligence. This important exposition endows the modernization of national defense and the armed forces with new connotations of the times, and further points out the development direction and path for accelerating the modernization of national defense and the armed forces. We must seize the opportunity, based on the status quo, insist on promoting the integrated development of mechanization, informationization and intelligence with systematic thinking, coordinate the development of various fields, especially key areas, realize the positive interaction of the three, and promote the overall improvement of national defense and military modernization.
Engels pointed out: “Human beings fight in the same way as they produce.” At present, the new military revolution in the world is developing rapidly, the degree of informatization in modern warfare is constantly improving, and the characteristics of intelligence are becoming increasingly apparent. Especially under the influence of the new round of scientific and technological revolution, the concepts, elements and methods of winning war are undergoing major changes. Judging from the recent local wars and armed conflicts in the world, a large number of high-tech weapons and equipment have been used in actual combat, and intelligent technology, unmanned equipment, and data information have become new growth points for combat effectiveness. In the face of increasingly fierce military competition, only by standing at the forefront of war and technology, and adhering to the integration of mechanization, information, and intelligence, can we seize the opportunity and win the initiative in military strategic competition.
“Everything must come, and it is a matter of course.” Mechanization, informatization, and intelligence are superimposed, interpenetrated, and mutually supported. Among them, mechanization is the material basis and carrier for the development of informatization and intelligence; informatization plays a connecting role between mechanization and intelligence; intelligence represents advanced combat effectiveness and is the development direction of future military construction. Without the previous “transformation” as the premise and foundation, there would be no emergence and development of the latter “transformation”.
Adhering to the integration and development of mechanization, informationization and intelligence is in line with the reality of our military construction and development, and is the only way for the modernization of national defense and the military in the future. Our army has basically achieved mechanization, and the construction of informatization has made significant progress but has not yet been completed. If the intelligentization is carried out after completing the informatization step by step, it will open up a new generation gap with the armed forces of developed countries; if the construction focus is fully shifted to intelligentization, it is unrealistic to expect to be in place in one step.
Science and technology are the core combat capability and the most active and revolutionary factor in military development. The key to adhering to the integrated development of mechanization, informationization and intelligence lies in promoting technological innovation. We should vigorously implement the strategy of strengthening the army through science and technology, actively promote self-reliance and self-improvement in high-level science and technology, accelerate the breakthrough of key core technologies, accelerate the development of strategic, cutting-edge, and disruptive technologies, and realize the transformation from following and running to leading and running as soon as possible. Persist in seeking combat effectiveness from scientific and technological innovation, improve scientific and technological cognition, innovation, and application capabilities, speed up the resolution of “stuck neck” problems, and firmly grasp the lifeline of our army’s development in our own hands.
Wars change with the times, and preparations for wars should not be conservative or rigid. To promote war preparations in the new era, we must focus on winning the new requirements of information-based and intelligent warfare. The construction of our army’s combat effectiveness has accelerated transformation, overall reshaping, and leapfrog development to ensure that it can attack and defend freely and win opportunities in future wars.
The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informationization and intelligence. From the perspective of the relationship between mechanization, informatization and intelligence, mechanization is the foundation of informatization, and intelligence is the sublimation of informatization. Without mechanization, there will be no informatization, and without sufficient informatization, it is impossible to achieve a major breakthrough in intelligence. At present, to vigorously promote military intelligence, we must first lay a solid foundation for informatization construction, and strive to improve the level of army informatization.
Lay a solid material foundation. Make bricks without straw. In order to shorten the “system gap” with powerful enemies, informatization construction should closely follow missions and tasks, keep up with cutting-edge technology, do a good job in top-level design, and promote peacetime and wartime integration. First, upgrade and improve various information systems. It is necessary to focus on the construction of the command and control center, use the information infrastructure as a platform, coordinate the construction of sub-systems and the linkage construction of various systems, promote the construction of command and control with all elements and a system, and realize the integration of information networks in various sub-domains, command and control real-time. Second, build and use the combat database well. In accordance with the principle of “integration of peacetime and wartime, overall planning, and classified implementation”, a comprehensive operational database will be established to achieve information sharing, data support, and decision-making assistance, and “information flow” to support the “chain of command.” Again, a backup mobile command post is preset. Actively learn from the beneficial practices of foreign militaries, vigorously strengthen civil air defense projects, and form a mobile command capability with multi-point layout, dynamic and static complementarity, and rapid deployment.
Build a strong team. Building a strong information force team is an important guarantee for winning an informationized local war with intelligent features. On the whole, we should focus on cultivating four types of talents: First, information command talents. Front-line mid-level and senior commanders should study information and data like they study soldiers, study the construction of information systems like they study the breakthroughs of battles, and study the use of electromagnetic spectrum like they study the performance of ammunition. The second is information warfare personnel. Cultivate a group of intelligent staff, combat planning, cognitive operations and other talents who are competent in information-based operations. The third is information security personnel. Focusing on the personnel of the information assurance department and the information assurance operation and maintenance professional technical team as the main target, continue to increase professional training efforts to improve network management, system use, inspection and maintenance capabilities. The fourth is information research and development personnel. Take the method of inviting in and going out, let go of the burden and hand over tasks, cultivate a group of expert technical talents with strong system research and development capabilities, establish a mobile station for high-end informatization talents, and form a “not for me, but for me” “A virtuous circle.
Change the concept of command. Modern warfare is all about the system, and joint combat command is a key part of it. In order to cope with the challenges of real threats, it is necessary to establish a new concept of command that is compatible with future warfare. The first is to firmly establish the concept of integrated command. Overcome the narrow command concept of a single service and arms, comprehensively coordinate multi-dimensional battlefield operations such as land, sea, air, space, electricity, and network, comprehensively integrate various combat elements, and effectively improve the combat effectiveness of overall and joint victory. The second is to firmly establish the concept of digital command. Transform from extensive to precise command, specify and refine task division, force use, time-space division, and target determination, standardize the command procedures, command methods, and command content of joint combat forces, and integrate reconnaissance intelligence, weapons Platforms, command and control, etc. are networked and real-time, shortening the command process and improving command timeliness. The third is to firmly establish the concept of intelligent command. Actively explore the systematic application of artificial intelligence technology, accelerate the development and application of new technologies such as intelligent decision-making, digital twins, big data, and cloud computing, improve the level of complex information processing on the battlefield, and enable commanders to control combat units and various weapons with the support of intelligent cloud brains. Platform mission command.
Promote innovative practices. In order to adapt to changes in technology, changes in warfare, and changes in opponents, we should speed up the construction of the “three systems” to win the information war. The first is to innovate the tactical system. In-depth research on the real tactics of defending against enemy information attacks, resisting enemy information interference, and counterattacking enemy information under the circumstances of all-round information strikes and hard fire destruction by powerful enemies, and strive to achieve precise control of the enemy. The second is to innovate the training system. Focusing on powerful enemies and combat missions, set up an information warfare environment, conduct in-depth research on topics such as command coordination, tactical application, system construction, and comprehensive support, and promote actual combat deployment and application. The third is the innovation management system. Adhere to the integration of peacetime and wartime management and the combination of virtual reality and real situation, establish a demand traction mechanism led by war, a plan-led mechanism, and an inspection and evaluation mechanism to create independent and controllable industrial chains, supply chains, and guarantee chains to ensure that “peacetime management” and “wartime management” “Use” seamless connection to help the continuous improvement of informationized combat capabilities.
Chinese Spying Operations – Games Chinese Spooks Play
From 國家安全部 ‘Guójiā ānquán bù’ to 新華社 ‘Xinhua’, how China’s espionage network operates in shadows.
China has systemically set up one of the quietest but most lethal espionage networks across the world.
As the world continues to debate over the spy balloons allegedly sent by China for espionage in the United States, probably it is missing the big picture. The real threat to global security comes from China’s spy network which is a complex web of many agencies, most of whom have successfully remained in the shadows. This multipart series would unravel the lesser known as well the unknown details about the Chinese espionage network.
The Chinese spy network has successfully remained in the shadows for decades. The Chinese Communist Party had built its spy network much before it came to power in China in 1949 turning a republic into a communist dictatorship. Since then, China has systematically set up one of the quietest but one of the most lethal espionage networks across the world.
The information regarding the Chinese spy network is scant and so scattered that it makes it difficult for even keen China watchers to paint the big and the real picture.
Ministry of State for Security
Ministry of State for Security (MSS) is China’s premier intelligence agency. It is also known as 國家安全部 ‘Guójiā ānquán bù’. MSS is largely responsible for operations outside China. The domestic intelligence and surveillance is looked after by the Ministry of Public Security (MPS). In addition, Chinese defence forces have their own intelligence agencies which conduct operations all over the globe.
Peter Mattis, one of the foremost authorities on Chinese intelligence operations, explains the Chinese military intelligence network (A Guide to Chinese Intelligence Operations, August 18, 2015), “Within the People’s Liberation Army (PLA), intelligence organizations fall under the General Staff Department (the Second and Third Departments, or, respectively, China’s DIA and NSA equivalents); the General Political Department for intelligence and covert influence operations; the PLA Navy, Air Force, and Second Artillery headquarters; and technical reconnaissance bureaus in the military regions. Much of the military intelligence infrastructure is based in China, but defence attachés and clandestine collectors do operate abroad, including from the service intelligence elements.”
New China News Agency (Xinhua)
Founded in 1931 by the Chinese Communist Party, Xinhua is the official news agency of China and a major facilitator for China’s intelligence gathering. According to an investigative report in Greek media outlet Pentapostagma published in April 2021, “Xinhua is primarily the eyes, ears, and voice of China. It is one of the important arms of the Chinese Intelligence agency in gathering information. Its prime objective is to promote positive news/narrative about CCP leadership/Chinese government and to marginalize, demonize, or entirely suppress anti-CCP voices, incisive political commentary and exposes that present the Chinese Government/CCP leadership in a negative light. It owns more than 20 newspapers and a dozen magazines and prints in eight languages: Chinese, English, Spanish, French, Russian, Portuguese, Arabic and Japanese It has established 107 bureaus in foreign countries including eight sub offices or editorial offices in Hong Kong, New York, Mexico, Nairobi, Cairo, Paris, Moscow, and Rio de Janeiro and currently employs more than 10,000 people.”
The report explained the standard operating procedure of gathering intelligence by this Chinese agency which has been operating in India also for several years, “Xinhua covers all news and developments/events in foreign countries which have meaning, or which could be of any significance for China. It then forwards reports/articles to China’s Ministry of State Security which directly handles the information inflow from Xinhua. The reports/articles are uploaded in a secured web system. Those that contain intelligence value are treated as classified and forwarded to CCP leadership for their consumption. Xinhua journalists are trained to be able to identify news/articles that are suitable for the CCP leaders and not for the public.”
According to this investigative report, “The agency (Xinhua) maintains a huge database of experts across the world and contacts favorable pro-Chinese contacts/assets in foreign countries and forwards their articles/reports to concerned departments back in Beijing.”
United Front Work Department (UFWD)
Set up in 1942, UFWD is the blue-eyed boy of the Communist Party Chinese (CPC). President Xi Jinping has further strengthened it ever since he came to power in 2012 and now it plays a significant role in China’s overall espionage network as well foreign policy framework. According to a research report published in August 2018 by the US-China Economic and Security Review Commission, “The United Front strategy uses a range of methods to influence overseas Chinese communities, foreign governments, and other actors to take actions or adopt positions supportive of Beijing’s preferred policies.”
‘Several official and quasi-official entities conduct overseas activities guided or funded by the United Front including Chinese government and military organizations, cultural and “friendship” associations, and overseas academic groups such as Chinese Students and Scholars Associations (CSSAs) and Confucius Institutes. The UFWD also oversees influence operations targeting Taiwan, Hong Kong, and Macau that aim to suppress independence movements, undermine local identity, and promote support for Beijing’s political system.
In all these cases, United Front work serves to promote Beijing’s preferred global narrative, pressure individuals living in free and open societies to self-censor and avoid discussing issues unfavorable to the CPC and harass or undermine groups critical of Beijing’s policies.’
Ryan Fedasiuk, a research Analyst at Georgetown University’s Center for Security and Emerging Technology (CSET) meticulously calculated the budget for UFWD in his essay ‘How China Mobilizes Funding for United Front Work (China Brief Volume: 20 Issue: 16). This indicates the priority given to this agency by the Chinese government and the CCP.
There is no direct budget for UFWD but there are several government and quasi-government bodies which fund it. That include Chinese People’s Political Consultative Conference, State Ethnic Affairs Commission, State Administration of Religious Affairs, Overseas Chinese Affairs Office of the State Council and All-China Federation of Industry and Commerce. The current annual budget for UFWD allocated through these bodies stands at not less than $1.4 billion.
“Chinese officials maintain that the United Front system is a benign network of administrative organizations, and that the PRC’s foreign policy is based on “mutual respect and non-interference in each other’s internal affairs” (PRC Embassy in Sweden, August 2019; ABC, June 2020). If this really were the case, regional governments probably would not classify their united front spending as secret 秘密資助 (Mìmì zīzhù) or refuse to disclose the structure of government offices ostensibly reserved for public diplomacy,” says Fedasiuk.
He further adds, “That regional governments in China budget nearly as much for united front work ($1.3 billion annually) as they do for CPC propaganda indicates how highly the Party values the united front as a tool for both domestic and foreign influence’.”
Overseas Chinese Affairs Office (OCAO)
This department /office is a front for keeping tabs on the Chinese communities abroad. It works closely with the Chinese Ministry of Education. According to Mattis, “The Overseas Chinese Affairs Office and the Ministry of Education… keep tabs on Chinese who live outside of China. The former office maintains ties to overseas Chinese communities and sponsors a variety of Chinese professional associations. The Ministry of Education keeps tabs on Chinese students abroad and helps support students’ and scholars’ associations. Both assist in mobilizing Chinese expats and émigrés for visible displays of support when Beijing wants, such as during the 2008 Olympic torch relay.”
According to the official website of ‘Overseas Chinese Office’, its major responsibilities include, “To study and formulate the guidelines, policies and regulations concerning overseas Chinese affairs, as well as to supervise and check their implementation; and to conduct research and study on the development of overseas Chinese affairs both domestically and abroad, to provide the information to the Central Committee of the CPC and the State Council.
Institute of Scientific and Technical Information of China (ISTIC)
Established in 1956, the ISTIC is officially a premier scientific research institute of China. But that is a façade. Its real task is to collect technologies and related information from all over the world in whichever manner it is possible. If one can read between the lines, the official website of ISTIC gives ample indications about the real work it does. The website says, “ISTIC has established long-term and stable business cooperation relations with relevant research institutions in the United States, Canada, Japan and other countries and regions, and has become an important platform for international cooperation and exchange in the field of science and technology information in China.”
George Soros and Chinese spy agency worked together as comrades.
George Soros’ history with the Chinese reveals his hypocrisy as he presents himself as a champion of democracy.
George Soros, the US-based controversial billionaire, and the Chinese premier spy agency Ministry of State Security (MSS) have worked hand in glove in the 1980s where Soros provided substantial funding to MSS through Economic System Reform Institute (ESRI) and China International Culture Exchange Center (CICEC).
It appears that Soros was playing a ‘double game’ by pursuing the Western interests to infiltrate China while also forging a close partnership with Chinese intelligence network and top bosses of the Chinese Communist Party. The apparent reason was an opportunity that he must have seen to benefit from China’s economic growth in the 1980s.
But this partnership fell apart with the change in the Chinese regime after 1989. Several representatives of Soros’ entity ‘China Fund’ were arrested by the Chinese authorities post- Tiananmen square massacre in 1989. The Chinese authorities accused them of working for the US’ Central Intelligence Agency (CIA).
Soros’ China Fund and the Ministry of State Security
Soros started making overtures to China in the 1980s. He first identified and handpicked Liang Heng, a bestselling author in 1984 to set up his shop in China. Heng had become famous after publishing his memoir Son of the Revolution’ that was a personal account of how China was opening to the West and the purges carried out at regular intervals by the Communist Party China (CPC).
Liang connected Soros with important people in the Chinese establishment. The façade kept for this whole initiative was that Soros wanted to help China to carry out reforms.
By that time, he had already set up ‘Open Society Foundations’, a funding arm known for instigating coups, political upheavals, and chaos in various countries through a web of well-funded non-Governmental organizations (NGOs). But given the fact that bets were very high in China, Soros decided to set up a separate entity which would work only in China.
In 1986, Soros set up ‘China Fund’ with a $1 million endowment. Through Liang’s network, the China Fund initially partnered with a Chinese think tank Economic System Reform Institute (ESRI).
In October 1986, Soros opened the China Fund formally in a signing ceremony at Beijing’s Diaoyutai State Guesthouse. This was his first trip to China.
Soros struck gold by roping ESRI as it was close to the premier Zhao Ziyang, who became the Party’s general secretary the next year. Zhao’s personal secretary, Bao Tong, was also known for helping the China Fund-ESRI joint venture whenever they needed to get through the Chinese bureaucracy.
Behind the façade of helping China to shape reformist economic policies, the China Fund started spreading its tentacles very fast. Within a year of its establishment, it set up an artists’ club in Beijing and an academic unit at Nankai University in Tianjin. Within the first two years of arriving in China, Soros’ China Fund gave hefty grants for at least 200 proposals. However, as the Fund started pushing the envelope too far by funding research on sensitive topics like the notorious ‘Cultural Revolution’ that had resulted in torture and deaths of millions of Chinese in 1960s, alarm bells started ringing in Chinese official circles and Zhao Ziyang had to step in despite his support for Soros and China Fund.
Alex Joske says in Spies and Lies: How China’s Greatest Covert Operations Fooled the World, “In the face of complaints from Party elders about the China Fund, Zhao Ziyang ceded its control to new management. It wasn’t a fight he wanted to pick, nor one he could dare to. Zhao agreed to sever ties between the ESRI and the China Fund, bringing in the China International Culture Exchange Center (CICEC), a group under the Ministry of Culture, as its new partner institution.
Things weren’t all bad, or so it seemed. CICEC had the backing of senior Party leaders, including (present Chinese president) Xi Jinping’s father, and served as one of the only official channels for cultural exchanges with the outside world. Its strong ties to officialdom could insulate Zhao and the China Fund.”
Soros travelled to China in February 1988 to sign a revised agreement with Yu Enguang, a Chinese spy master who was a high-ranking official of the MSS. CICEC itself was a front for the MSS. It would be too naïve to accept that Soros didn’t know about this ‘open secret’ though he tried to defend himself later by pleading ignorance about this fact.
Soros got along well with Yu Enguang at a personal level. The latter secured Soros a rare meeting with the top leadership of CCP in Beijing. Soros, reconfirmed his commitment to bankroll joint operations of China Fund and CICEC. The new Chinese co-chair of this project Yu Enguang.
According to Joske, Yu Enguang was the pseudonym of the Chinese spy master Yu Fang. ‘Among his comrades in the MSS, Yu Fang was just as respected as ‘Yu Enguang’ was by the targets he cultivated. At some point in his career, he headed the agency’s important central administrative office, and in the early nineties helped secure the passage of China’s first National Security Law, which expanded and codified MSS powers. The authors of several MSS publications, marked for internal distribution only, thank him for advising on and improving their drafts. He also oversaw MSS production and censorship of histories, TV dramas and movies about spies, which were designed to build public awareness and support for the MSS’s mission.’
Joske adds, “Ironically for a man who helped bring Chinese intelligence history into the public sphere, Yu’s true legacy is an official secret. Official references to his achievements are brief and elliptical. The authoritative People’s Daily eulogized him in 2013, an honor only a handful of intelligence officers receive: ‘In his sixty years of life in the revolution, Comrade Yu Fang was loyal to the Party, scrupulously carried out his duties and selflessly offered himself to the Party’s endeavors, making important contributions to the Party’s state security endeavor.’ The article also noted that he’d been a member of the National People’s Congress, China’s national legislature.”
Thus, Soros was dealing with a top-ranking Chinese intelligence official. Initially, this partnership was going off well. In fact, MSS was using Soros’ money to fund its operations under the garb of cultural exchange programs carried out by CICEC.
Incidentally, the official website of the CICEC, when accessed currently, doesn’t show any link it had in the past with Soros and the China Fund. It talks about its focus on ‘cultural exchange programs, which is a common phrase used frequently by the Chinese intelligence agencies to give legitimacy to their spy operations. The CICEC holds cultural festivals across the world and officially claims to be working to create support for China’s ‘One belt, one road’ initiative. Incidentally, CICEC was set up in 1984, a year after MSS came into existence and it was just a couple of years old when Soros’ China Fund forged a partnership with it. It was well-known to China watchers right since its inception that CICEC was a front for the MSS. It is difficult to apprehend that Soros didn’t know about this!
Post-Tiananmen Square
Everything was going well for Soros’ China Fund till Tiananmen square happened in 1989. Chinese authorities suspected that the China Fund played an active role in fueling demonstrations at Tiananmen square that ended in a massacre of thousands of people by Chinese authorities. Meanwhile the Tiananmen square massacre also led to a purge within the party as CCP’s general secretary Zhao Ziyang was not only replaced but was also put under house arrest.
With the arrest of Zhao as well as his secretary Bao Tong, both of whom backed Soros and his China Fund, the Chinese authorities began their crackdown. Soros immediately shut the shop leaving many of his Chinese associates in the lurch and at the mercy of Chinese authorities.
MSS, in its updates to the top party bosses, days before the Tiananmen massacre happened gave details about the role of China Fund as a CIA front in fueling these demonstrations.
According to The Tiananmen Papers, a huge cache of internal CCP reports related to the massacre, that was leaked later, the MSS told the party bosses, “Our investigations have revealed that Liang Heng, the personal representative of the (China Fund) chairman George Soros, was a suspected US spy. Moreover, four American members of the foundation’s advisory committee had CIA connections.”
“According to the MSS’s narrative, Soros showed his ‘true colors’ by asking Yu to close the fund in May 1989 once he realized that supporters of reform were being purged,” observed Joske.
Soros co-chaired the China Fund-CICEC partnership with a top-level Chinese spy master Yu Enguang (also known as Yu Fang). The MSS used the funds provided by Soros’ China Fund to finance many of its operations. Had there not been an internal turmoil in the Chinese Communist Party throwing Soros’ supporters in the Chinese establishment out of power, Soros would have been working closely with an authoritarian Chinese government and continued to play the ‘double game’ ultimately benefiting his business interests from both sides. This history of Soros with the Chinese also exposes his double speak as he claims to be the champion of democracy!
What a Chinese spy agency the Ministry of State Security disrupts the world
MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.
China’s premier spy agency Ministry for State Security (MSS) has been on the forefront of setting up and running a ruthless global espionage and counter-espionage network.
MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.
Officially the proposal to set up this agency was brought by Zhao Ziyang at the first session of the sixth National People’s Congress (NPC) on June 20, 1983. The NPC can be broadly termed as the Parliament of China.
Ziyang proposed the establishment of a state security ministry “to protect the security of the state and strengthen China’s counterespionage work.” The NPC approved it and voted to appoint Ling Yun as the first minister.
The inaugural meeting of the MSS was held on 1 July 1983 to announce the formal establishment of the. The opening speech was delivered by chairman Chen Pixian of the ‘Central Political-Legal Commission’ one of the key bodies of CCP. He categorically said, “Doing state security work well will effectively promote socialist modernization and the cause of realizing the unification of the motherland opposing hegemonism and defending world peace.” The Chinese intent was clear: MSS would be its ace espionage and counter-intelligence agency.
Since President Xi Jinping took over the reins of the Communist Party of China (CCP) and the Chinese establishment in 2012, MSS has been endowed with even greater authority and its sphere of influence has increased significantly. In Xi Jinping’s scheme of things, Chinese espionage agencies, especially MSS, lead from the front to change the existing world order.
Since the remit of China’s intelligence agencies is much broader than those of Western nations, they need more resources, and Xi Jinping has made sure they receive them, say Clive Hamilton and Mareike Ohlberg in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World.
Roger Faligot (Chinese Spies: From Chairman Mao to Xi Jinping) has written, there has been a “formidable increase in the authority of the Chinese intelligence apparatus, specifically since 2017”.
The MSS indulges in all kinds of dubious clandestine activities including sabotage, industrial espionage, theft of technology. It has created several fronts in the form of think tanks and trade and cultural bodies to carry out such activities. The prominent among them are China Institute of Contemporary International Relations, China Reform Forum and Chinese Association for the Promotion of Cultural Exchange and Cooperation.
Structure of MSS
Last known, MSS has 18 bureaus spread over at least four compounds in Beijing serving as their headquarters and then they have provincial and other local networks within China as well as a global network. The functions of many of them are not yet known. China Institute of Contemporary International Relations is the public façade of 11th bureau of MSS. Peter Mattis and Matthew Brazil have painstakingly gathered some details about these bureaus in ‘Chinese Communist Espionage: A Primer’ such as:
“ • First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations.
Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers.
Fourth Bureau: Taiwan, Hong Kong, and Macau.
Fifth Bureau: Report Analysis and Dissemination.
Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside China.
Eighth Bureau: Counterespionage Investigation, runs investigations to detect and apprehend foreign spies in China.
Ninth Bureau: Internal Protection and Reconnaissance Bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage.
Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates the activities of reactionary organizations abroad.
Eleventh Bureau: China Institutes of Contemporary International Relations, performs open-source research, translation, and analysis. Its analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows.
Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the CCP’s united front work System (also known as United Front Works Department-UFWD, which is another major espionage network of Chinese government and CPC).
Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluation Center, manages the research and development of other investigative equipment.
Fourteenth Bureau: Technical Reconnaissance Bureau, conducts mail inspection and telecommunications inspection and control.
Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. Its public face is the Institute of Taiwan Studies at the China Academy of Social Sciences.
Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the United States.”
There is hardly any information about the real work done by the third, sixth, sixteenth and seventeenth bureau of the MSS.
According to an online report by China Digital published in 2015, the MSS had a strength of 100,000 ‘spies’. Around 60,000 of them worked within China while 40,000 of them were working in other countries for China.
Explaining this mammoth size and the massive expansion of MSS, Mattis and Brazil elaborated, “The expansion occurred in four waves. The original departments (or those created within the first year) appeared to be the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the ministry across the country at provincial levels, bringing in Anhui, Hunan, Qinghai, and Sichuan provinces.161 The fourth wave of MSS expansion was vertical. The provincial-level departments either took over local public security bureaus or established subordinate municipal or county bureaus. For many local PSB officers, they were police one day and state security the next. When MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level.”
“From the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of CCP leaders. At present, the two most important of these are the Political-Legal Commission and the Central State Security Commission.”
Clive Hamilton and Mareike Ohlberg have mentioned in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World, “It was reported in 2005 that the FBI believed the MSS had set up around 3000 front companies to conceal its activities. The MSS has various arms engaged in economic espionage and it has ‘embedded itself deep in major financial and commercial organizations, particularly in Shanghai and Hong Kong’. Not all economic espionage is state directed. Chinese nationals are known to set up firms that take orders from companies in China to obtain and supply specific pieces of intellectual property from their competitors in the West, usually by identifying an employee willing to provide such secrets.”
Bloody Purge within MSS
While MSS has successfully infiltrated many spy agencies of other countries, it also suffered a major setback when in 2010, it was revealed that there are several Central Intelligence Agency (CIA) moles working in China and MSS for the American agency.
This led to a bloody purge within MSS. The CIA assets were exposed because of a botched-up communication system of the US spy agency. It reportedly used the same equipment in China which it was using to communicate with its operatives in the middle east. But the Chinese spy agency was much more efficient than the middle east and the CIA underestimated its tech capability. MSS was able to crack this communication network. According to various reports, anywhere between one dozen to two dozen operatives of the CIA were rounded up and executed over a period of two years by the MSS. The CIA did manage to take out many of its ‘assets’ but it had to suffer a major loss.
According to a report published in the journal Foreign Policy in 2018, “It was considered one of the CIA’s worst failures in decades: Over a two-year period starting in late 2010, Chinese authorities systematically dismantled the agency’s network of agents across the country, executing dozens of suspected US spies.”
Recruitment and working pattern.
One of the key methods deployed by MSS is to use the Chinese diaspora to create assets in other countries. Its first bureau plays a significant role in this regard. A survey done by the US-based Centre for Strategic Studies gives an indication about MSS’ approach towards espionage. This survey listed 160 publicly reported instances of Chinese espionage directed at the United States since 2000. According to the survey report:
42% of actors were Chinese military or government employees.
32% were private Chinese citizens.
26% were non-Chinese actors (usually U.S. persons recruited by Chinese officials)
34% of incidents sought to acquire military technology.
51% of incidents sought to acquire commercial technologies.
16% of incidents sought to acquire information on U.S. civilian agencies or politicians.
41% of incidents involved cyber espionage, usually by State-affiliated actors.
According to Hamilton and Ohlberg, “Ego, sex, ideology, patriotism, and especially money is all exploited by China’s intelligence services to recruit spies. In 2017 an FBI employee, Kun Shan Chun (Joey Chun), was convicted of supplying information about the bureau’s organization and operations to Chinese agents, in exchange for free international travel and visits to prostitutes. Among those who spy for China, ideology is a factor mainly for people of Chinese heritage (unlike during the Cold War, when Westerners spied for the USSR for ideological reasons). Beijing also deploys the threat of punishment of family members in China if a target refuses to cooperate.
UFWD: ‘Magic weapon’ in China’s espionage arsenal
The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones
Chinese President Xi Jinping
One of the key constituents of the global Chinese Spy Network is the United Front Work Department (UFWD). It is entrusted with coordination and operational aspects of ‘united front’ activities. The Chinese initially defined ‘united front’ more as a concept. Later it set up UFWD to carry out these activities as the nodal agency.
Background
The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones. Since its founding, this has been a key element of the Chinese Communist Party’s (CCP) strategy to consolidate its hold on power, both domestically and internationally.
The UFWD’s first deployment was to join and subvert the then ruling Nationalist government, the Kuomintang, in the early 1920s. A 2018 research report by US-China Economic and Security Review Commission explained it further, “The CCP then formed an alliance of convenience with the Kuomintang to discourage it from trying to wipe out the fledgling CCP while uniting their efforts against Japan.”
According to Gerry Groot, senior lecturer at the University of Adelaide and renowned expert on the United Front, this campaign evolved into a systematic effort to recruit “fellow travelers,” mostly “famous intellectuals, writers, teachers, students, publishers, and businesspeople who were not necessarily Communists.”
Modus Operandi
The modus operandi of the UFWD is one of the least discussed issues in the public domain when it comes to Chinese covert operations. It is not surprising as UFWD operates through a complex web of organizations which act as a front for united front work.
There are thousands of organizations which work for UFWD under the garb of cultural, educational, commercial, and philanthropic organizations. Alex Joske explains the philosophy behind UFWD in his groundbreaking expose of Chinese intelligence operations Spies and Lies, “Party leaders since Mao Zedong have referred to the united front as one of their three ‘magic weapons’. Together with armed struggle and efforts to strengthen Party organization, the two other magic weapons, the CCP credits the united front work with major contributions to its victory in 1949, China’s modernization and subsequent economic development.”
The key task of UFWD is to build a global network of influencers and ‘operators’ who manipulate the global narrative by hook or crook. The UFWD specifically brings into its spy net intellectuals, local community leaders, religious and ethnic figures, journalists, academia, and business magnates.
According to Joske, recent cases from around the world have shown, the (Chinese Communist) Party seeks to insert itself into segments of diaspora communities and then mobilize them as political influence. Co-optees can be used to suppress dissidents, make political donations, mentor political candidates and staffers, and otherwise apply pressure in support of Beijing’s interests.
In a 2020 research paper on UFWD, ASPI said, “There’s no clear distinction between domestic and overseas united front work: all bureaus of the UFWD and all areas of united front work involve overseas activities. This is because the key distinction underlying the United Front is not between domestic and overseas groups, but between the CCP and everyone else. For example, the UFWD’s Xinjiang Bureau plays a central role in policy on Xinjiang but is also involved in worldwide efforts to whitewash the CCP’s internment of an estimated 1.5 million people in Xinjiang, primarily ethnic Uyghur Muslims, as an anti-terrorism and vocational training effort.”
Structure
The UFWD follows the directions given by an important CCP body known as the Chinese People’s Political Consultative Conference (CPPCC). The latter is led by a member of the CCP’s Politburo Standing Committee.
According to the latest information available, UFWD has a presence across all provinces in China, in all its embassies abroad, in foreign universities and in various international trade organizations as well as in civil society also. According to the ASPI report, “Internally, the department has 10 leaders, at least six of whom hold ministerial rank or higher. It has 12 bureaus, half of which were created after 2015. Bureaucratic changes in 2018 that brought overseas Chinese affairs under the UFWD’s ‘unified management’ also injected dozens if not hundreds of officials with substantial overseas experience into the department. Jinan University, Huaqiao University and the Central Institute of Socialism in Beijing are all subordinate to the UFWD and carry out research and training to support its efforts. Additionally, the UFWD runs dedicated training facilities, such as the Jixian Mountain Estate, which is a complex in the outskirts of Beijing used for training China Overseas Friendship Association cadres.”
Organizations such as the China Overseas Friendship Association, are part of the ‘united front system’. At least two such organizations held special consultative status as non-governmental organizations in the UN Economic and Social Council. According to an ASPI report, “In 2014, an official from one of them, the China Association for Preservation and Development of Tibetan Culture, was barred from a UN human rights hearing after he intimidated a woman testifying about her father, political prisoner Wang Bingzhang.”
The 12 bureaus of UFWD
UFWD’s 12 bureaus deal with separate tasks. Here is how the work has been distributed to them:
First Bureau: Minor Parties Work Bureau (Oversees China’s eight democratic parties) Second Bureau: Deals with Ethnic Affairs Third Bureau: Deals with Hong Kong, Macau and Taiwan Fourth Bureau: Deals with business persons and private companies Fifth Bureau: Non-Affiliated and Minor Party Intellectuals related work Sixth Bureau: Targets urban professionals such as employees of foreign companies Seventh Bureau: Handles Tibet related issues Eighth Bureau: Handles issues related to Xinjiang province Ninth Bureau: Overseas Chinese affairs (regional responsibilities) Tenth Bureau: Overseas Chinese Affairs (Media, Cultural and educational activities) Eleventh Bureau and Twelfth Bureau: Issues related to religion
Xi Jinping and UFWD
Though UFWD has always been used by the CCP as a key element of its spy network, Xi Jinping pushed it to a new high after he took over as Chinese President in 2012. In 2015, Xi declared in an important central united front work meeting, “The United Front … is an important magic weapon for strengthening the party’s ruling position … and an important magic weapon for realizing the China Dream of the Great Rejuvenation of the Chinese Nation.”
More than 40,000 new personnel were recruited for different wings of UFWD within a few years of Xi taking over the reins of CCP. Xi’s specific focus on UFWD shouldn’t surprise those who know his background. Xi Jinping’s father Xi Zhongxun was known for carrying out UFWD missions in Tibet. One of his key assignments was to influence the Dalai Lama and Panchen Lama. As a Politburo member he supervised the UFWD work in the 1980s. Xi rose in the party by climbing through CCP ranks in Fujian province which is known to be a hotbed of united front activities targeting Taiwan. In 1995, he wrote a paper on united front work in the Chinese diaspora. He advocated several new ideas in this paper regarding UFWD which he started implementing in 2012 and expedited it further after the 2015 conference of united front work.
The result is evident. Countries like Australia, US, Canada have exposed how Chinese have been using their spying arms like UFWD to create a deep Chinese state in their countries especially in their political and policy making sphere.
What Jamie Watt, a contributing Columnist to The Toronto Star, wrote in his column on 23 February 2023, would aptly explain the lethalness of Chinese ‘magic weapons’ such as UFWD. Commenting on how incriminating evidence has come out regarding Chinese interference in Canadian elections benefitting Justin Trudeau’s party, Watt wrote: “Just this past week, the Globe and Mail reported news from CSIS that Canadian politicians, government officials, business executives and Chinese Canadians all have been prime targets of Chinese government espionage. This espionage has deployed blackmail, bribery, and sexual seduction. The range and nature of the tactics used are usually reserved for spy novels, but national security experts now deem China’s espionage infrastructure to go far deeper than even the Soviet’s efforts at the height of the Cold War.”
Watt sounds an alarm bell about Canada which explains how Chinese espionage works through organs like UFWD, “It is time that we understand our politicians have proven incapable of addressing Chinese state influence. Chinese aren’t just at our gates, they own them. And they’re standing idly by flipping us the bird.”
A US State Department report on China’s Coercive Activities Abroad specifically highlights the role of UFWD as it says, “The CCP’s United Front Work Department (UFWD) is responsible for coordinating domestic and foreign influence operations, through propaganda and manipulation of susceptible audiences and individuals. The CCP’s United Front permeates every aspect of its extensive engagements with the international community. It targets the highest levels of Western democracies; creates a permanent class of China lobbyists whose primary job is to sell access to high level Chinese leaders to corporate America. The United Front has also penetrated deeply into state, local and municipal governments through a myriad of front organizations such as the CCP’s sister-cities programs, trade commissions, and friendship associations.”
This report also reiterates that China considers UFWD to be its ‘magic weapon’ used by China to dominate the world and manipulate the global narrative.
Chinese Military intelligence: How a mammoth war machine plays spy games across the globe.
India remains one of the primary targets of the Chinese espionage network. And Chinese military has a significant role to play in this game of cloak and dagger.
One of the key elements of the Chinese espionage network is the military intelligence that it has been able to keep under wraps. What we are witnessing is a new avatar of Chinese Military intelligence under President Xi Jinping who as a head of the Central Military Commission directly controls the Chinese military.
He started restructuring the Chinese military in 2015-16 and that also included revamping of the Chinese military intelligence network. Peter Mattis explained the importance and implications of this exercise of Chinese espionage network in China reorients strategic military intelligence (Janes, 2017), “On 26 November 2015, Chinese president Xi Jinping announced the first significant revision of the People’s Liberation Army (PLA) since its reorganization during the 1950s, when the PLA transformed from an army fighting a civil war to one capable of protecting a nation-state. The reforms removed the Soviet-inspired system of general departments, established a new division of labour, and realigned the PLA organizationally to better fulfil the Military Strategic Guidelines that state the goal of winning informationized local wars.”
“Many elements of the PLA’s modernization effort in the past 25 years have had strictly military implications, but this round of reforms reaches far beyond the Chinese military to reshape how the leadership receives information. To reinforce the Central Military Commission’s (CMC’s) control over operational forces and provide better battlefield intelligence support, the PLA created the Strategic Support Force (PLASSF). The new force consolidated much of the PLA’s technical collection capabilities to direct them towards supporting military operations.”
Chinese Military Intelligence Arm: Joint Staff Department
The Chinese military intelligence arm has been innocuously named as Joint Staff Department (JSD). Earlier it was known as 2PLA or second department of the PLA (People’s Liberation Army) General Staff Department. The JSD came into existence around seven years ago.
According to Clive Hamilton and Mareike Ohlberg (Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World), “The Intelligence Bureau of the CMC Joint Staff Department is not only responsible for military intelligence but also has a history of extensive activity in civilian domains. It draws on military attachés and signals intelligence to gather intelligence. The Joint Staff Department has its own think tanks — the China Institute for International Strategic Studies, which focuses on research, and the China Foundation for International and Strategic Studies, which engages in academic and policy exchanges. Its Institute of International Relations (now part of the National University of Defense Technology) trains military attachés and secret agents.”
Structure of Chinese Military Intelligence Apparatus
The Chinese Communist Party (CCP) controls the PLA through its Central Military Commission. President Xi Jinping has been the chairman of the CMC ever since he came to power in 2012.
According to a US Congressional Research Report published in June 2021, China’s current military modernization push began in 1978 and accelerated in the 1990s. Xi Jinping, the General Secretary and “core leader” of the CCP, Chairman of the CCP’s Central Military Commission, and State President, has continued to make military modernization a priority and has linked military modernization to his signature issue: the “China Dream” of a modern, strong, and prosperous country.
‘In 2017, Xi formalized three broad goals for the PLA: (1) to achieve mechanization of the armed forces and to make significant progress toward what the United States would call a “networked” force by 2020; (2) to “basically complete” China’s military modernization process by 2035; and (3) to have a “world-class” military by 2049, the centenary of the establishment of the PRC. Xi has initiated the most ambitious reform and reorganization of the PLA since the 1950s, to transform the military into a capable joint force as well as to further consolidate control of the PLA in the hands of Xi and the CCP.’
Institute for Critical Infrastructure Technology (ICIT), a Washington-based think tank has worked extensively on detailing the structure of Chinese military intelligence through their senior fellow James Drew and Researcher Scott Spaniel. According to Scott and Spaniel, “The People’s Liberation Army (PLA) Joint Staff Department (JSD) replaced the General Staff Department on January 11, 2016, as part of Xi Jinping’s military reforms. It manages most military and covert operations. The JSD, as a division of the PLA, is dedicated to warfare. The duties of the PLA JSD include PLA Operations Command, Recruitment, Mobilization, Formation, Training, and Administration.”
Second and Third Department
The JSD has three departments which work in coordination to conduct various intelligence operations. These departments deal respectively with electronic intelligence, human intelligence, and signal intelligence. The section within the PLA’s Joint Staff Department that deals with conventional human intelligence (HUMINT) is known as ‘Second Department’.
James Scott and Drew Spaniel estimated in their 2016 book, China’s Espionage Dynasty, that this department had around 30,000–50,000 agents around the world. Their primary task is to collect useful, relevant, and confidential information and send it back to China.
‘A common misconception is that agents of the Chinese government are “sloppy”; however, agents of the second department who serve as high level spies or handlers are rarely caught. Rather, low-level assets, often belonging to the overt structure, are more often detected by foreign intelligence agencies.’
The Third Department which is entrusted with the task of signals intelligence (SIGNIT). According to Drew and Spaniel, “The Third Department is the largest intelligence agency in the Chinese government, consisting of an estimated 250,000- 300,000 linguists, technical staff, and cyber soldiers. There are at least four known Research Institutes (56, 57, 58, and 61) under the Third Department. Within the 61 Research Institute are approximately 20 bureaus that launch cyberattacks. The Third Department intercepts phone calls, launches cyberattacks, and monitors communications. Much of its efforts involve hacking devices and exfiltrating targeted data. The Third Department may launch obvious cyberattacks, such as DDoS or ransomware attacks, against target systems to mask the activity of Second Department operatives.”
Fourth Department
The Fourth Department is responsible for electronic intelligence (ELINT) operations. Its prime focus is on intercepting satellite and radar data. The operatives of Fourth Department are experts in altering, jamming, or spoofing of signals.
“It is believed that the Fourth Department research direct methods of disabling enemy communication networks. State-Sponsored APTs (i.e., Chinese state sponsored advanced persistent threats) can be identified based on their choice of targets, their proclivity for cyberespionage, and the language settings on the keyboards used to develop the malware, and their connections to other campaigns. Some groups, such as APT 1 (Unit 61398), APT 2 (Unit 61486) and APT 30 (Unit 78020) can be linked to specific units within the Third Department. Other APTs remain less defined.”
PLA Unit 61398
In May 2014, five officers of the PLA who belonged to its unit ‘61398’ commonly known for cyber espionage and cyberattacks were indicted by a US court. Several cyber security firms have reported about the clandestine operations of this unit which is one of the key parts of the Chinese Military Intelligence apparatus. This unit primarily targets countries with flourishing democracies as they are a perfect antidote to the Chinese authoritarian system. Hence along with several other countries, India has also been one of their targets. Several cyberattacks on the Indian establishment are believed to have been carried out by this unit. It is reportedly headquartered in Datong Avenue of Pudong district in Shanghai. There has been a consistent spurt in its activities.
Conclusion
The Chinese military intelligence is committed to pursue the so-called vision of Xi Jinping and peddle a pro-China global narrative. China Institute of International Studies (CIIS), a front form the Chinese military intelligence network, carried a detailed comment on India. Authored by Lan Jianxue, Director of the Department for Asia-Pacific Studies at CIIS, this is what Chinese military intelligence conveyed, “Noticeably, the connotation of the so-called Asian Century, as understood by the United States, is not quite the same as that understood by the Chinese. The expression “Asian Century” was coined by former Chinese leader Deng Xiaoping in 1988. Deng pointed out that no genuine Asian Century can come until China, India and other neighboring countries are developed.
It is clear the United States remains one of the primary targets of the Chinese espionage network. And the Chinese military has a significant role to play in this game of cloak and dagger.
People’s Republic of China’s Practice of Network Power //
中華人民共和國網絡權力實踐
People’s Daily (April 19, 2018 01 edition)
In today’s world, the information technology revolution is changing with each passing day.
In contemporary China, the development of the network business has advanced by leaps and bounds.
From mobile payment everywhere to new high-level online transaction volume; from the nationwide e-government system to the booming big data industry… General Secretary Xi Jinping’s important speech on network security and informationization work published two years ago, China’s online letter With the rapid and healthy development of the business, the Internet has increasingly become an important driving force for national development, and the digital field has continuously achieved leap-forward development.
Under the guidance of the strategic blueprint for the “two hundred years” struggle goal, China, which is opening a new era, is striding towards a new journey of network power.
Looking ahead and judging the situation, the Party Central Committee with Comrade Xi Jinping as the core points the way forward for building a network power
In March 2018, the “Deepening the Party and State Institutional Reform Plan” issued by the Central Committee of the Communist Party of China opened a new chapter in the national network letter business – the Central Cyber Security and Informatization Leading Group was changed to the Central Cyber Security and Informatization Committee, responsible for Top-level design, overall layout, overall coordination, overall promotion, and supervision and implementation of major work in this field.
This is the far-sightedness of the Party Central Committee with Comrade Xi Jinping as the core of the national network letter, and it is also the implementation of the important speech delivered by General Secretary Xi Jinping at the symposium on cybersecurity and informationization.
Since the 18th National Congress of the Communist Party of China, General Secretary Xi Jinping has accurately grasped the general trend of the times, actively responded to the requirements of practice, deeply examined the major changes in the main social contradictions, and issued a series of important speeches on the development of the network business, clearly proposing the strategic thinking of the network power.
”To develop a network business, we must implement a people-centered development thinking.”
——According to the ups and downs of Internet technology changes, General Secretary Xi Jinping always puts the people at the highest position, clearly defining “to adapt to people’s expectations and needs, speed up the popularization of information services, reduce application costs, and provide them with affordable and affordable The well-used information service has enabled hundreds of millions of people to gain more sense of sharing Internet development results.”
“Big data is a new stage in the development of information technology.”
——In the face of the information-based competitive environment that you chase after me, General Secretary Xi Jinping made a keen judgment to “understand the current status and trends of big data development and its impact on economic and social development, and analyze the achievements of China’s big data development and Problems exist to promote the implementation of the national big data strategy.”
”Building a community of cyberspace destiny.”
——Investigating the profound changes in the global Internet governance system, General Secretary Xi Jinping proposed “four principles” and “five points of proposition”, calling for “the Internet is invisible, but the people who use the Internet are tangible, and the Internet is the common home of mankind. It is the common responsibility of the international community to make this home more beautiful, cleaner and safer.
……
New ideas lead new practices, and new strategies open up new journeys. Under the strong leadership of the Party Central Committee with Comrade Xi Jinping as the core, a colorful network of powerful powers is slowly unfolding.
One-point deployment, nine-point implementation, a series of new policies and new measures for the reform and development of the network letter business are turning into new achievements and new changes
”Party committees and governments at all levels should strengthen Internet thinking, be good at using the advantages of the Internet, and focus on integrating, sharing, facilitating, and security, promoting scientific decision-making in government, refining social governance, and improving the efficiency of public services. Perceive the social situation, open communication channels, assist decision-making and governance, and facilitate the masses to do things.
On April 13, 2018, General Secretary Xi Jinping made important instructions during the inspection of the Hainan Provincial Government Affairs Data Center, once again in order to speed up the development of big data and use information technology to point the way.
Without informatization, there is no modernization.
General Secretary Xi Jinping’s important speech on cybersecurity and informatization work has been published for two years. All localities and departments have kept pace with the times, pioneering and innovating, and introduced a series of new policies and new measures to promote the cause of major strategic opportunities in the network letter industry and usher in new Development, new leap.
——Continuously strengthen the top-level design, and the information development will add institutional guarantee.
The Outline of the National Informatization Development Strategy was published, which depicts the development of digital China’s construction in the next 10 years, and clearly sets a clear timetable and roadmap for the construction of a network power. The “13th Five-Year National Informationization Plan” was released. It is proposed to achieve significant results in the construction of digital China as the overall goal of China’s informatization development.
In the past two years, the informatization development strategy, the national big data strategy, and the “Internet +” action plan have been frequently deployed, and the foundation of the network is solid.
——The infrastructure is more perfect, and the digital development paves the way.
In 2017, the length of new optical cable lines in China was 7.05 million kilometers. The total length of national optical cable lines reached 37.47 million kilometers, an increase of 23.2% over the previous year; the number of Internet broadband access ports reached 779 million, an increase of 9.3%.
The Action Plan for Promoting the Scale Deployment of the Internet Protocol Version 6 (IPv6) was issued and implemented, and the scale of IPv6 deployment was comprehensively improved. As of December 31, 2017, the total number of IPv6 address allocations in China was 23,430 (/32).
In the past two years, the quality and coverage of mobile network services have continued to improve, and the development of next-generation Internet has shown great prospects.
– Internet innovative social governance tools, e-government work into the fast lane.
At the Taxation Hall of the State Taxation Bureau of Jinjiang City, Fujian Province, the financial manager Shi Jinxing received dozens of special value-added tax invoices through the self-service terminal. He felt that “it took a half-day to become a few minutes, and the government service became more and more convenient. Efficient.”
Innovative services to benefit the people. The data shows that the current total number of government websites in the country is nearly 32,000; the new government media has become a new channel for communication between the public and the public.
In December 2017, the Central Network Information Office and other departments jointly launched a two-year national e-government comprehensive pilot project in eight provinces including Beijing, Shanghai and Jiangsu to explore the development of e-government development experience that can be used for promotion, and more convenient and efficient e-government experience. Just around the corner.
Take the matter at any time, make meritorious deeds from the capital, and profit from the power of all things.
The 19th National Congress of the Communist Party of China formulated a blueprint for the development of a new era, and proposed to build a network power, digital China, and a smart society, promote the deep integration of the Internet, big data, artificial intelligence and the real economy, develop the digital economy, share the economy, and foster new growth. Point, form new kinetic energy.
In Zhejiang, the digital economy, which is dominated by software services, Internet of Things, cloud computing, and big data, has exceeded 10 trillion yuan for three consecutive years. In Guizhou, where poverty alleviation is the main battlefield, big data has become one of the three development strategies. Its economic growth rate has been in the forefront of the country for seven consecutive years.
A series of data and an item of results reflect a series of historical achievements and historic changes in the digital development of China in recent years.
Let hundreds of millions of people gain more sense of sharing the Internet development achievements, and build a strong power for building a network power.
At the end of each course, Zhang Fan, an online training teacher, will carefully review the “Magic Mirror System” analysis of the students’ class status and adjust and optimize the teaching plan accordingly.
Through this system, the camera captures the classroom state, such as raising hands, practicing, listening to classes, speaking, etc., and even facial expression changes at any time. Through multi-dimensional measurement of data, a unique learning report for each student is generated.
With the help of digital technology, the goal of “there is no education, teaching students in accordance with their aptitudes”, which is the sage of the past dynasties, is now entering an ordinary life.
No longer just online shopping, sharing bicycles, today, digital technology represented by big data, cloud computing, artificial intelligence is increasingly infiltrating into every aspect of Chinese life: the construction of cancer big data portraits makes health dreams clearer; The guardian platform gives the minors a clearer cyberspace; the 5G “super speed” makes the screen “flashing” words become history…
New products from the Internet have emerged, and digital technology has turned people’s imagined new life into reality. From the introduction of the network security law to the new stage of legal governance, to the digital economy, the “big artery” is more smooth… The world of the people of the world is more colorful because of the Internet, and the lives of the people are more abundant because of the Internet.
Promoting the development of the Internet and making good use of the power of the Internet are the basic projects that promote social progress and enhance people’s well-being.
Liuyu Village is located in the selenium-rich area of southern Meizhou, Guangdong Province, and has a long history of growing tea. However, due to the remote location, poor traffic and information, the sales of tea has not been opened.
Since the staying tea has been stationed in the Guangdong mobile e-commerce informationization poverty alleviation platform to achieve online sales, the problem of slow sales of tea has been solved. In the past year, the tea sold by the “Lingnan Life” platform has reached 6,000 kilograms, and the single-day sales order has reached a maximum of 1423.
Statistics show that in 2017, China’s digital economy reached 27.2 trillion yuan, accounting for 32.9% of GDP; e-commerce and online retail continued to grow, e-commerce promoted the steady expansion of rural consumption, and rural consumer infrastructure such as logistics, telecommunications, and transportation. further improvement.
”Adhere to the people as the center”, digital development is constantly satisfying people’s yearning for a better life, and the people have more sense of gaining in sharing the development of the Internet.
“The way of benefit, and the time.”
In just over 20 years, starting from a network cable with a network speed of only 64 kilobits per second, China now has 700 million netizens and more than 4 million websites. It has built the world’s largest 4G network, and the scale of online retail transactions has jumped. The world’s first… a series of “great”, witnessed a slap in the face of a network power to the network power.
In just two years, from the speed increase and decrease of the network to the implementation of the Cyber Security Law, from the continuous hosting of the four World Internet Conferences to the Alibaba Cloud Data Center, which covers the major Internet markets in the world, a series of “big-handed” highlights China’s move to a network powerhouse. Determination and confidence.
In December 2017, General Secretary Xi Jinping emphasized in the second collective study of the Political Bureau of the 19th Central Committee that “the situation will be judged, carefully planned, advanced, and proactive” “accelerate the construction of digital China and better serve China’s economic and social development and people. Life improvement.”
The construction of digital China is an important measure to implement the internship General Secretary General Ping Ping’s strategic thinking on network power. It is an effective way to adhere to the people-centered development thinking and continuously enhance the people’s sense of acquisition. It is an inevitable requirement for seizing development opportunities and accelerating the modernization process.
This is an urgent call for the new era, and it is a firm declaration of China in the new era.
Under the strong leadership of the Party Central Committee with Comrade Xi Jinping as the core, the development of China’s network information industry will surely take greater steps in the construction of a network powerhouse, and create a more awkward innovation for the Chinese dream of building a well-off society in an all-round way and realizing the great rejuvenation of the nation. power.
The cyberspace was born in the military field. For example, the first computer, the APA network and the GPS navigation system all originated from the military. Today, cyberspace security has been closely related to national security, and the military has once again become the protagonist of maintaining national cyberspace security. Whether facing normalized network penetration or large-scale cyberattacks, it is urgent for the military to move from guarding the “network camp gate” to guarding the “network country gate”, breaking through the traditional military missions and missions, and breaking through the traditional war preparation mode. With a new network of national defense thinking, the founding of the network era of the country’s strong shield.
From the “network camp door” to the “network country door”, the new era brings a new trend of military mission
Cyberspace is not only related to the maintenance of national strategic interests, but also directly affects political, economic, cultural security and social development. It has also become the blood and link of modern battlefield joint operations. The Chinese military cannot be limited to maintaining the internal network security of the military camp. It must also actively adapt to the trend of the times and take the responsibility of the country that guards the “network country.” Network strong army is an important part of the construction of a network powerhouse. From the “network camp door” to the “network country door” is the inevitable trend of the development of the domestic and international situation in the information age.
Guarding the “network country door” is forced by the cyberspace security situation. As the first big Internet country, China’s security situation is not optimistic, and strategic opponents have never stopped preparing for our network operations. The United States, Britain, France and other countries are actively preparing for cyberspace, giving military functions through cyberspace security legislation, developing cyber warfare forces, developing cyber warfare weapons and equipment, and advancing war to the “fifth space” of mankind, especially in China. In the historical process of the rise, under the leadership of the Cold War mentality and the containment subversion strategy, Western countries have used network technology and communication methods to implement uninterrupted harassment, subversion and cyberattacks, seriously affecting China’s national security and social development, and China has gradually become The hardest hit by cybersecurity threats, the test sites for virus attacks, and the destinations of conscious penetration, national security faces enormous risks.
In the coming period, as a new emerging country, China’s conflicts of interest with other parties will intensify. Firmly promoting the network defense strategy and strengthening the operational preparation of cyberspace are the inevitable ways to actively strive for the dominance and discourse power of cyberspace, and also the rise of China. The only way to go. As the main force of national security and stability, the military must adapt to the characteristics of cyberspace characteristics, become the backbone and main force to resist network intrusion and network subversion, and safeguard national security and social stability.
Winning cyber warfare is the trend of new military revolution in the information age. As one of the most advanced productivity in the information age, network technology has made cyberspace warfare a leading factor in guiding the evolution of modern warfare and affecting the overall situation of war. In recent years, from the “seismic net” attack in Iran, the cyber warfare in the Russian-Georgian conflict, the large-scale obstruction of the Ukrainian power grid, and the cyberattack of the US military against IS, the huge role played by cyberspace in actual combat has gradually emerged, indicating that cyber warfare Has become an important style of future joint operations.
The US military attaches great importance to the construction of cyberspace armaments, the establishment of the cyberspace command, the launch of cyberspace joint operations, the extensive expansion of cyber warfare forces, the maintenance of its cyberspace hegemony, and the formation of cyberspace control capabilities as a “third offset strategy”. “Absolute advantage is the most important competitive content.
Many countries in the world have followed suit, and the trend of militarization of cyberspace is obvious. The rigorous cyberspace military struggle situation requires the Chinese military to focus on the changes in the network battlefield space, adapt to the requirements of the information war era, and achieve the strong military goal of smashing and winning in cyberspace.
Effective network warfare is an intrinsic need to accelerate the construction of a network powerhouse. In the process of China’s development from a network power to a network power, it is inseparable from the strong cyberspace military power as a guarantee. The international competition in cyberspace is a comprehensive game of the country’s comprehensive strength. Among them, the quality of network military capacity building is directly related to national security and stability, and it is the core element of the entire national security field.
At present, the interests of countries in the world in the cyberspace are mutually infiltrated, and there is a situation in which you have me, I have you, cooperate with each other, and develop together. However, this kind of common development is not equal. The US and Western powers have taken advantage of the cyberspace dominance and have already achieved certain network warfare advantages, which has made my network development and interests subject to people. How can the military fulfill its mission of defending the earth in the construction of a network-strength country? The premise is to form a network environment that can contain the crisis and control the opponent’s network attack and defense capabilities and ensure peaceful development.
Therefore, the military needs to establish a deterrent strategic goal of effective warfare, form a strategic check and balance ability that can “destroy each other” with the enemy, thereby enhancing strategic competitiveness, ending cyberspace aggression, and ensuring the smooth advancement of the network power strategy.
From “keeping the soil to the responsibility” to “protecting the net and defending the country”, the new situation requires the military to undertake new tasks.
The military is the main force and pillar of national security, and cyberspace is no exception. The National Security Law, which was enacted on July 1, 2015, stipulates: “Citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and institutions, and other social organizations have the responsibility to safeguard national security. And obligations.” The Cyber Security Law, promulgated in November 2016, emphasizes the need to maintain cyberspace sovereignty and national security.
On the basis of the laws of these two countries, on December 27, 2016, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was officially launched, providing overall guidance for creating a new pattern of network powers at a new starting point. Basically follow, clearly put forward nine strategic tasks, further embodying the mission of the military in the process of building a network power.
With the national mission of protecting the network, the military must be a strong pillar to defend the cyberspace sovereignty. The first of the nine strategic tasks listed in the “Strategy” is “firmly defending the cyberspace sovereignty” and clearly proposes to “take all measures including economic, administrative, scientific, technological, legal, diplomatic, military, etc., and unswervingly maintain our network.” Space sovereignty.” It can be seen that the military must assume the military mission of using physical space and defend the national mission of the sovereign security and interests of virtual cyberspace.
Cyberspace sovereignty is the core interest of the state and an important component of national sovereignty. It indicates the independence, equal, self-defense and management power of the state in cyberspace. Once the hostile forces violated my cyberspace sovereignty, it would be equivalent to infringing on the national sovereignty of the physical space such as land, sea and air. China will have the right to take all measures including military means to give a firm response.
Internationally, the United States has long proposed a cyberspace deterrence strategy, declaring that attacks on US network information facilities are equivalent to war acts, and the United States will take military strikes to retaliate. Military means are the means of safeguarding national sovereignty and play a vital role in safeguarding national cyberspace security. Therefore, the military, air, sea and air military forces have been given the historical mission of protecting the cyberspace sovereignty. They must rely on the powerful physical space to defend the national interests of cyberspace and effectively deter the hostile forces from cyber-damaging attempts.
In accordance with the era of the Internet, the military must be the ballast stone to defend national security. The second item of the “Strategy” mission emphasizes the need to resolutely safeguard national security, prevent, deter and punish any use of the Internet for treason, secession, sedition, subversion or incitement to subvert the people’s democratic dictatorship.
In the era of information network, the military of all countries in the world has become an important participant in cyberspace. The level of cyberspace capability has become the main indicator for assessing the modernization of a country’s military. It is one of the main duties of the informationized military to carry out cyberspace missions and maintain national security.
Judging from the historical process of China’s development, it is necessary to be highly vigilant against the danger of the country being invaded, subverted, and divided in cyberspace in order to adapt to the national security strategy needs of building a well-off society in an all-round way. Highly alert to the reform caused by cyberspace. The danger of developing the overall situation is destroyed, and we are highly wary of the danger of interference and destruction in the development of socialism with Chinese characteristics.
Preventing problems before they occur requires the state to have the means to cope with and deal with these risks, and to have the powerful force to prevent, stop and legally punish cyberspace violations. Defending the country has always been an unshirkable historical responsibility of the military. The inherent mission and mission have determined that the Chinese military must assume the role of taking various measures in the cyberspace to safeguard the country’s political, economic, cultural security and social stability.
The strategic mission of both offensive and defensive, the military must be a strong backing to enhance the ability of cyberspace protection. The third and eighth items of the Nine Major Tasks in the Strategy clearly state that all necessary measures must be taken to protect key information infrastructure and its important data from attack and destruction, and that technology and management should be adhered to, protected and shocked; We will build a network space protection force that is commensurate with China’s international status and adapts to the network power. We will vigorously develop network security defense methods, timely discover and resist network intrusion, and build a strong backing for national security. Among all the political, diplomatic, military, and scientific and technological capabilities of the country to maintain security, military power has always been the foundation and support for all capabilities, the fundamental guarantee for all capabilities, and the ultimate support for national security.
Therefore, the military must undertake the strategic task of strengthening the national cyberspace protection capability. In the real society, the military is the reassurance of safeguarding national security, and it should also become the security dependence and guarantee of the people in cyberspace. As an important part of the national cyberspace protection capability, the military must achieve both offensive and defensive capabilities and a unified warfare. It has the ability to resolutely safeguard the interests and security of the country and the people in cyberspace, and effectively eliminate the various crises caused by cybersecurity threats. The turbulence of thoughts enables the people to truly feel that production and life are effectively protected and become the confidence of the people of the whole country in their confidence in the national network protection capabilities.
With the global responsibility of UNPROFOR, the military must be an important support for maintaining global cybersecurity. The last item of the “Strategy” mission clearly proposes to strengthen international cooperation in cyberspace, support the United Nations in playing a leading role, promote the development of universally accepted international rules on cyberspace, international anti-terrorism conventions on cyberspace, and improve the judicial assistance mechanism against cybercrime. International cooperation in the areas of policy and law, technological innovation, standards and regulations, emergency response, and protection of key information infrastructure.
Cyber terrorism and cybercrime are new forms of global threat catalyzed by information network fermentation. They pose a huge threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of the government and the people. Western countries have given the military the responsibility to protect cybersecurity and the power to fight cyber terrorism. Maintaining the security and stability of global cyberspace is in the fundamental interests of China and the rest of the world. The military should become an important defender of global cyberspace security and an important force in combating global cyber terrorism and cybercrime.
The globalization and unbounded nature of the Internet determine the international demand for combating cyber terrorism and transnational cybercrime. The military should promote military cooperation in network governance between countries under the framework of the UN Security Council, and use the strategies and technologies of the network era to establish joint defense and joint defense. Mechanism to effectively safeguard the security of the national and world cyberspace.
From “field training” to “network preparation”, new areas require new preparations for the military
Under the new historical situation, cyberspace puts forward new requirements for the military training and preparation mode. It should adapt to the new characteristics of cyberspace and the new mission of the military to carry out innovative reforms on the traditional model, and take the goal of strengthening the country and strengthening the military as the overall plan, and strengthen macro-coordination. Focusing on the legal needs of military operations in cyberspace, it closely follows the natural attributes of the “military and civilian integration” of cyberspace, builds a network security attack and defense system that combines peacetime and warfare, and builds a network defense force of “military and land use”.
Legislation empowerment provides a legal basis for the military to carry out its functional mission. The countries of the world, especially the western developed countries, attach great importance to the issue of network defense in cyber security legislation. The United States has successively issued a series of policies and regulations such as “National Security No. 16 Presidential Decree”, “Network Space Action Strategy”, and has continuously deepened and standardized on how to protect national network security in the field of network defense.
At present, it is necessary to clarify the duties and responsibilities of the cyberspace military from the legal level. It should be based on the National Security Law and the Cyber Security Law, and introduce the network defense law and related cyberspace military operational regulations, for the construction of the network defense field and the military. The action provides regulatory support and a program of action to make the military’s responsibilities and mission in cyberspace more specific and specific.
First, through network defense legislation to further define network sovereignty and network frontiers, clear the scope of the military’s responsibilities.
The second is to establish the operational authority of the military to defend the national cyberspace security through the construction of cyber warfare laws and regulations, and to distinguish military means against network intrusion and network destruction. Third, through the cyberspace international cooperation policy, the military will coordinate with other countries and civilian forces to combat international cyber terrorism and cybercrime.
The integration of military and civilian provides an innovative driving force for the construction of a network powerhouse. The integration of military and civilian is the main practice for the world powers to enhance the competitiveness of cyberspace. For the construction of China’s network powerhouses, building a military-civilian network security attack and defense system and developing a military-land dual-use defense information infrastructure is to inspire the innovation of military cyberspace combat capability. Source.
The first is to coordinate the military, civilian, and functional departments of the state, the military, and various levels of government, set up special command and coordination agencies, mobilize all national network forces, and build a network security attack and defense system that combines “military and civilian integration” and “peace and war.”
The second is to issue guidance on the in-depth development of cybersecurity military-civilian integration as soon as possible, and gradually carry out basic legal research and demonstration of military-civilian integration to guide the development of medium- and long-term military-civil integration.
Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and civilians will jointly build an information infrastructure covering the entire army of the whole country, and realize the unified construction and sharing of military and civilian.
The fourth is to establish an emergency response mechanism for military-civilian joints, increase the ability to train military authorities to control events, strengthen experts and emergency professional strength, and enhance the ability to quickly recover damaged networks or information systems.
Military-civilian joint training provides a practical environment for the generation of cyberspace military capabilities. The military-civilian sharing characteristics of cyberspace make military-civilian joint training an important means of military training in cyberspace around the world. The United States and NATO countries and other cyberspace joint military and civilian exercises have formed a series of, “network storm” and “network guards” and other exercises have attracted the participation of the government, enterprises, research institutions and even civilian hackers. Our military cyberspace military strength training also needs to attract a wide range of civil forces to participate.
First, do a good job in military and political cooperation, establish a military-civilian joint offensive and defensive drill mechanism, learn from the red-blue confrontation training methods in cyber warfare drills in developed countries such as the United States, actively build a “national network shooting range”, plan a series of joint exercises of the government and non-government organizations, and enhance the integration of military and civilian. The level of attack and defense of the network of the government and the people.
The second is to do a good job in military-enterprise cooperation, relying on net-based enterprises to set up a training field on the Internet, to promote the ability of the military and civilians to attack and defend, and jointly improve the ability to prevent unknown risks.
The third is to organize private network security companies and hacker talents, carry out network security competitions and other activities, and verify each other to jointly improve the level of network security protection technology and tactics.
The network reserve service provides a source of strength for building a powerful network army. As a backup supplement to the national defense force, reserve service has both military and civilian characteristics and is a powerful measure to realize the organic unification of cyberspace economic development and national defense construction.
First, it is led by the national security department, and overall planning is carried out according to national interests. A series of laws and regulations conducive to the construction of the network national defense reserve are introduced. From the top level, the main division of labor, promotion strategy, interest coordination, etc. of the military and civilian construction in the network defense reserve construction are solved. problem.
The second is to innovate the reserve organization and comprehensive coordination mechanism, and plan to integrate the reserve construction into all levels and fields of national network information development.
The third is to focus on the reform of the military and local management modes. Based on the management mechanisms of the provincial and municipal governments, the military, and local enterprises and institutions, establish a network of national defense reserve personnel to jointly cultivate and use the mechanism, improve the national emergency mobilization mechanism, and establish a national network defense special talent. The database will include the construction of network militia and reserve forces into the scope of mobilization of the people’s armed forces. In normal times, they will be incorporated into the militia emergency detachment for training. In an emergency, select the capable personnel to participate in the non-war military operations missions, and the wartime will be recruited according to the requirements. To transform the national defense potential into national defense strength.