Through the smoke of war, we can see that today’s war has developed from barbaric flesh-and-blood battles and battles to capture cities and territories to information-led precise beheadings and fierce competition on the intellectual battlefield. This objective fact tells us that war, as a specific complex social phenomenon, will present different war forms and winning mechanisms in different historical periods. As American futurist Toffler pointed out, “Artificial intelligence is like previous missiles and satellites. Whether you are prepared or not, it will enter the historical stage of human civilization war.” President Xi clearly pointed out: “If we do not understand the winning mechanism of modern war, then we can only look at a diorama and miss the point.” The winning mechanism of war refers to the way in which various war factors play a role in winning a war. and the laws and principles of interconnection and interaction. Compared with information-based warfare in the traditional sense, the winning mechanism of future intelligent warfare has undergone significant changes.
The method of confrontation has changed from “system confrontation” to “algorithmic game”, and algorithmic advantages dominate war advantages.
Algorithms are strategic mechanisms for solving problems. In fact, an “algorithm” is a series of clear instructions for solving a problem. It is a clear step to solve a certain type of problem according to certain rules. In future wars, the party that masters the advantages of algorithms can quickly and accurately predict battlefield situations, innovate optimal combat methods, and achieve the war goal of “victory before fighting”.
Algorithms are the key to leading intelligent warfare. First, algorithmic advantages dominate cognitive advantages. After big data is processed through high-performance and efficient algorithms, massive data is quickly converted into useful intelligence. Therefore, the party with the advantage of the algorithm can dispel the “battlefield fog” caused by the lack of timely processing of data, making the understanding more profound. Second, the algorithm advantage dominates the speed advantage. Compared with classical algorithms, quantum algorithms have achieved exponential acceleration effects. In addition, quantum computers have increased from 1 qubit in 2003 to 1,000 qubits in 2015. The computing efficiency is 100 million times faster than that of classical computers. Artificial intelligence has achieved a qualitative leap. Third, algorithmic advantages dominate decision-making advantages. Algorithms, with their high-speed and precise calculations, replace people’s “meditation” and repeated exploration, thereby accelerating knowledge iteration. Mastering super powerful algorithms can quickly propose flexible and diverse combat plans and countermeasures in response to changes in the enemy’s situation, constantly disrupting the enemy’s established intentions and deployment.
Algorithms are at the heart of the jump in war effectiveness. First, war is more efficient. With the support of algorithms, artificial intelligence can react hundreds to thousands of times faster than humans. In 2016, the “Alpha” intelligent software developed by the United States has a reaction speed 250 times faster than humans. It controlled a third-generation aircraft to defeat a manned fourth-generation aircraft in a simulated air battle. Second, the war endurance is stronger. Artificial intelligence is not limited by physiological functions and can continuously perform repetitive and mechanical tasks. In September 2016, an F-16 fighter jet reached 8 times gravity during training, causing the pilot to lose consciousness. However, before the plane hit the ground, the onboard “automatic anti-collision system” automatically pulled the plane up, avoiding the tragedy. occur. Third, the outcome of the war is better. With the support of massive data and supercomputing capabilities, artificial intelligence judgment and prediction results are more accurate. The combined use of manned and unmanned equipment in the U.S. military’s search and hunt for bin Laden is a successful example.
Combat elements are changing from “information-led” to “machine-based warfare”, and machine-based warfare reshapes the combat process
In the future, intelligent technology will penetrate into all elements and processes of war. The Internet of Things, the Internet of Intelligence, and the Internet of Brains have become the basis of war. The four domains of physical domain, information domain, cognitive domain, and social domain are deeply integrated, making the battlefield holographically transparent. There are people to control the war and no one to fight on the battlefield. Intelligent weapons and equipment will reshape the combat process “from sensor to shooter”.
“Detection” with a keen eye. “Reconnaissance” refers to intelligent intelligence reconnaissance. It can use multi-dimensional sensors such as land, sea, air, space, and electricity for virtualized collaborative networking, self-organized dynamic scheduling, automatic mining of multi-source intelligence, and order-based on-demand use to maximize information shortage or information redundancy. The “fog of war” brought about by the epidemic has opened up the “eyes” to see through intelligent warfare.
Loop “control”. “Control” refers to intelligent command and control. Focusing on the core of decision-making advantages, we use the human-machine collaboration technology of “human in the loop” and adopt three decision-making and control methods of “human in the loop”, “human in the loop” and “human outside the loop” according to the autonomous authority of the machine. , forming a comprehensive advantage with superior decision-making quality and action speed.
Smart “hit”. “Strike” refers to intelligent offensive and defensive operations. Relying on the advantages of system structure and algorithm, it mobilizes all-domain multi-dimensional, manned and unmanned combat platforms in real time, quickly couples combat forces, builds combat systems on demand, focuses on targets, independently implements “distributed” and “swarm” collaborative operations, and quickly resolves battles after they are completed. Couple and wait for the battle, so that the troops can gather and disperse randomly. At the end of 2015, Russia invested 6 tracked unmanned combat vehicles, 4 wheeled unmanned combat vehicles and 1 drone to support the Syrian government forces in storming Islamic extremist strongholds and achieved the world’s first unmanned combat victory. Victory in the tough battle dominated by cars. During the battle, about 70 extremist militants were killed, while only four Syrian government troops were injured.
The decision-making method changes from “human brain decision-making” to “intelligent decision-making”, and intelligent decision-making optimizes combat operations
With the emergence of intelligent auxiliary decision-making technology and “cloud brain”, “digital staff” and “virtual warehousing”, war decision-making has evolved from pure human brain decision-making to human-machine hybrid decision-making, cloud-brain intelligent decision-making and neural network decision-making.
Human-machine hybrid decision-making. Reasonable division of labor and interaction and collaboration between humans and machines are the best solutions to explore and solve problems. The advantages of the human brain are creativity, flexibility, and initiative; the advantages of machines are fast speed, high precision, and resistance to fatigue. Artistic tasks such as high-level decision-making are handled by the human brain, and big data calculations are completed by machines. Human-computer interaction allows machines to “listen” to understand human language, “see” human movements and expressions, “understand” human emotions and intentions, and present the calculation process and results in a way that is easy for humans to understand.
Cloud brain intelligent decision-making. In future intelligent warfare, there will be a “brain” metaphor center, and distributed combat units will be linked through the cloud brain. This cloud brain is not only a physical information, physiological information and psychological information center, but also a military command center. Cloud brain decision-making is based on the intelligent “network, cloud and terminal” system. “Net” is an intelligent combat basic network integrating intelligent battlefield perception, decision-making and weapons control systems. “Cloud” is built on the basis of “network”, with the intelligent resource service layer as the main body. It is not only a “resource pool” that integrates various combat resources, but also an “intelligent cloud” that provides intelligent services for combat operations. Due to the coupling of multiple centers, rapid networking and decision-making can be achieved even when bombarded by information. “End” refers to the combat resource end, discrete intelligence and networked intelligence in combat processes, which can not only make independent decisions, but also provide distributed intelligent resources for the war system, allowing the new war system to emerge with group intelligence.
Neural network decision-making. In July 2018, Russia developed artificial neural network fully automatic software that can destroy immediately upon discovery. The intelligent decision-making tool developed by the US military is intended to shorten the decision-making cycle and improve decision-making efficiency. The application of neural networks was once limited to tactical-level calculations, making it difficult to make qualitative analysis and decisions on strategic-level macro-complex situations. “AlphaGo” has made a breakthrough in the field of Go by simulating the working mechanism of the human brain’s neural network. In the future, the super self-evolution and strategic decision-making capabilities of deep neural networks will realize a combat cycle of “people outside the loop”.
The combat style has changed from “breaking links and breaking bodies” to “extreme operations”, which subvert traditional combat methods.
Extreme warfare breaks through the boundaries of traditional warfare, subverts traditional combat styles, dramatically increases war effectiveness, and creates a truly all-weather, all-time, all-dimensional, all-domain intelligent warfare.
Break through the limits of human physiology and thinking. First, the combat space and fields have been extremely expanded. Intelligent warfare in the future will be three-dimensional, all-dimensional, and all-domain operations. The war space will expand from the traditional space field to the polar regions, deep seas, outer space, and other extremes. It will especially penetrate into the cognitive domain, information domain, and penetrate into other fields, including combat fields. More blurry. Second, the combat process has been extremely accelerated. Unmanned autonomous warfare has greatly compressed the “observation-judgment-decision-action” cycle, developing from the “instant destruction” of information warfare to the “instant destruction” of intelligent warfare. The victory of intelligent warfare is achieved by advancing the warning time, shortening the decision-making time, and extending the combat operations forward to achieve the effect of preemptive layout and preemptive strike. Third, combat operations are extremely flexible. In intelligent warfare, artificial intelligence can propose extremely rich combat plans, and the unmanned combat platform can quickly switch between different functional roles, making combat operations more bold and adventurous, and tactics more unexpected. Even if one of the combat elements loses its function, the “decentralization” function will ensure that the function of the group is not affected.
Subvert the traditional combat style. The first is intrusive lone wolf operations. That is, a single unmanned system operates independently. The second is the manned and unmanned coordinated system attack battle. That is, based on intelligent unmanned systems, through mixed operations with and without unmanned equipment, combat objectives can be quickly achieved. The third is the independent operation of unmanned system formations. Multiple sets of unmanned systems constitute a combat unit that can perform complex tasks such as multi-target attacks. The fourth is mothership swarm operations. Using the mothership as the transportation carrier and command center, a manned and unmanned hybrid swarm combat style is formed.
It has the combat effectiveness of “nuclear power”. Intelligent warfare maximizes the characteristics and potential of intelligent robots, leading to combat effectiveness approaching the limit. First, the target is small and difficult to find. For example, miniaturized stealth robots are difficult to detect with radar and sonar. The U.S. hybrid UAV with an Optode chip embedded in the Dragonfly is smaller, lighter and more stealthy, with a battery life of up to several months. Second, confrontation is difficult and costly. For example, as long as a beetle-sized micro-drone scans a human face, it can directly hit the target’s head after data analysis and determination, and it can carry enough ammunition to penetrate the brain. Third, the cost is low and the damage is great. In the future, the use of intelligent weapons in extreme operations will have the power of nuclear weapons, especially extremely large-scale intelligent weapons and equipment, extremely low-cost robot automatic production, and extremely flexible robot swarm operations, which may exceed the maximum explosion power of nuclear weapons.
認知域作戰有一個非常重要的支撐,即主要依靠語言媒介發揮作用,主要通過語篇層面發揮影響,主要通過語篇的敘事性對認知域形成隱性效應,主要 externing influence on the cognitive domain through cultural models 通過跨文化交際所發揮的潛在作用,顯性或隱性作用。 主要體現在以下幾個方面:
Cognitive domain combat refers to the use of multi-domain means such as public opinion, psychology, and law, and the use of modern network, media, text, pictures, video, digital and other multi-dimensional technologies to carry out public opinion propaganda, psychological attack and defense, and The important forms of fighting for people’s hearts, subverting confidence, influencing beliefs, fighting for thinking, and ideological struggle are intended to compete for people’s initiative in thinking, beliefs, values, personal attitudes, emotions, identification, and judgmental tendencies. Cognitive domain warfare is a complex collection of multi-domain warfare such as traditional public opinion warfare, psychological warfare, legal warfare, trade war, diplomatic warfare, technological warfare, and ideological warfare.
At present, combat in the cognitive domain has become an important basis for military struggles and struggles in other fields between countries, and language confrontation driven by goals in the cognitive domain has become an important form of combat in the cognitive domain, which deserves great attention.
A New Frontier for Language Countermeasures to Influence on Objects of Operation
Cognitive domain combat is the accompanying result of the research and development of contemporary cognitive science. It is a new combat field created after people actively explore the cognitive activities of the brain to gain a more complex, abstract and thorough understanding of the brain. Advanced deep covert activities are the high-end form of influence on the object of action. Regardless of whether it is the object of information action, the producer of information, the content of information itself, or the channel of information, operations in the cognitive domain all run through the characteristics of cognition, and highlight actions from the cognitive level from beginning to end.
From the perspective of the recipients of the information, this cognition is aimed at the deep cognition of the opponent’s audience, including its people, the army, military commanders or important leaders, important figures in the political and business circles, and even directly including the leaders of the opponent’s country or the military. Specific important generals, etc., can also be specific groups of people or people. It can involve the cognitive preferences, cognitive shortcomings, cognitive habits, cognitive biases, cognitive misunderstandings of individuals or groups; it can also be the beliefs, values, political identity, ethnic identity, social and cultural identity and emotional attitudes of individuals and groups.
From the perspective of the information provider and content, it should be infused with the cognitive design and arrangement of the information producer, which includes the unique cognition of the text, such as the discourse mode of the text, the narrative mode of the text, the perspective of observation of things, the narrative Cognitive focus and depth, organizational form of sentences, tendencies such as value concepts of sentences, acceptability of concepts of sentences, etc.
In terms of channels for information distribution and dissemination, the form of text is closer to the multimedia multimodal form, closer to the needs of cyberspace, closer to the advantages of contemporary smartphones, and closer to the characteristics of the current emerging media era, that is, more in line with the audience The cognitive characteristics of acceptance are cognitive habits and cognitive tendencies. The form of dissemination of the text fully considers the cognitive effect in international communication, especially the cognitive communication across cultures, languages, media, and groups. In this way, the text will better influence the audience from the cognitive level.
Language confrontation responds to changes in combat styles and generates new tactics
Throughout human history, it is not difficult to find that the style of military struggle has been constantly changing. From the initial physical fight with the help of cold weapons, it has developed into a contest of mechanical power with hot weapons, and has also developed into a check and balance of information capabilities under the conditions of high-tech warfare. Every change brings about profound changes in tactics. In the current transitional stage of co-existence of mechanization, informationization and intelligence, people not only pay attention to the struggle for dominance in the physical domain and information domain of the battlefield, but also pay more attention to the control of the main body of war-human cognitive domain, that is, the way of thinking, Cognitive models and styles, values, emotional attitudes, cultural models, communication models, psychological strengths and weaknesses, cognitive preferences, cultural and knowledge maps, and ideological identity. The latter involves the basic situation of social personnel and social existence, that is, the emerging field of cognitive domain operations exerting influence, and its tactics have strong particularities.
Topic flexibility and mobility: Cognitive domain operations can select many topics in the cognitive domain to carry out flexible and mobile combat operations. According to the current situation and needs, the topic can be chosen to involve a relatively macro strategic level (such as the ideology and system of the other party’s entire society, etc.), or a medium-level campaign level (such as social issues in a local area or direction of the other party’s society: Social welfare policies or environmental protection policies, etc.), you can also choose to involve very microscopic tactical issues in society (such as the unfair, unjust, and not beautiful side of society reflected by a certain person or a specific event). The macro, meso, and micro cognitive domains are interconnected and transform into each other. It is very likely that a micro issue will also become a macro strategic issue. The question should be raised according to the relationship with the entire military operation, and the cognitive domain operation must be subordinated to the overall combat operation and serve the needs of the macro political and diplomatic situation. More importantly, the topics should be prepared in normal times, and the data of various topics should be collected in normal times, especially paying attention to various important data in the real society. Once needed, these data can be quickly transformed into arrows, bullets, and shells fired at the enemy’s cognitive domain, and even become strategic weapons that affect the overall situation.
Controllability at the combat level: The important design of cognitive warfare is that at the combat level, it is controllable and adjustable as a whole, and can be upgraded or reduced according to changes in the situation. If the strategic level is needed, the commander can enable the design and force input at the strategic level; if the campaign level is needed, it can also be controlled at the corresponding campaign level; if it is only needed at the specific small problem level, it can also be controlled at the corresponding The niche local level makes the whole operation serve the needs of the overall combat operation. The strategy, campaign and tactics here refer more to combat design and power input. Since the battlefield situation may change rapidly, some issues may also change at the level, from strategic issues to affect the effects of campaign and tactical levels; some issues, due to the particularity of tactical issues, become campaign-level issues that affect the overall situation.
Emerging media dominance: The main influence channel of the cognitive domain has shifted from traditional paper media and print media to emerging media. Traditional media mainly rely on a single medium, such as newspapers, magazines, books, leaflets, posters, etc. to convey information; the later generation of television brought three-dimensional media. In the Internet era, especially the Internet 2.0 era and the birth of smart communication devices, people rely more on multimedia, multi-modality, and short videos and texts to transmit information. The introduction of various advanced devices such as smart phones, smart tablets, and smart players, and the birth of various new social software and tools have made new media the main tool for people to communicate and communicate. Emerging media, emerging social software and tools have become an important space for various forces to compete and struggle in social security, public opinion security, ideological security, social security, and political security. Internet security, especially the ability to grasp the security of new social media, emerging social software and tools, etc., is to some extent the key to the security of a country’s cognitive domain. The information of emerging media tools and new media spaces has become the main battlefield, main position and main space for cognitive warfare in various countries. It is worth pointing out that the thoughts and theories that influence people’s cognition will become the most influential weapons at all levels of cognitive domain operations.
Language confrontation adapts to the age of intelligence, cognitive computing enhances new computing power
In the era of artificial intelligence, on the basis of big data analysis and application, supercomputing ability, intelligent computing ability, natural language processing ability, smart phone dissemination ability and new generation network communication ability, human beings have begun to be able to understand the whole society and the whole network. Carry out precise modeling and analysis of language culture, psychological cognition, group emotion, and social behavior in different domains, local groups, different local groups, and specific individuals. Especially people’s deep understanding and grasp of brain cognition, human brain thinking, thinking mode, habit preference, image schema, cognitive framework, and even neural network, human-computer collaboration, brain control technology, etc., as long as there are enough diverse dynamic data , people can calculate and simulate all people’s psychological activities, emotional activities, cognitive activities, public opinion, and behavioral patterns. Through deep calculations, actuarial calculations, and clever calculations, people can accurately grasp people’s cognitive world and form an understanding of people’s cognitive domain. fine and deep control. This aspect presents the following characteristics:
Computational all-dimensionality: As an emerging field, the cognitive domain can be digitized in all aspects and can be calculated in all directions, the whole process and the whole individual. It can collect various types of information extensively, and then can be reflected as information about Big data with diversified main factors of combat opponents, so that various calculations can be carried out for the whole, groups, groups, and individual data and between them. All kinds of activities can be completed, displayed and accurately grasped through calculation.
Computational cognition: Computation in the cognitive domain embodies strong cognition, and it can reveal more relationships between various things, events, and characters that are difficult to observe with the naked eye, and can reveal the relationship between various concepts in the same event frame. The clustering and hierarchical relationship between concepts reflects the deep cognitive connection between concepts, whether explicit or implicit, direct or indirect, and reveals the complex concept network system between concepts, allowing people to see a deep cognitive world that is completely beyond the ordinary naked eye observation. .
Computing intelligence: Computing in the cognitive domain embodies strong intelligence. This kind of intelligence is manifested in the calculation, and it will draw intelligent conclusions. For example, through the collection of a large amount of text and data mining, we can find the relationship between various themes, viewpoints, tendencies, groups of people, positions, and appeals that cannot be seen due to limited human power, so as to form a more comprehensive understanding of a certain issue. Comprehensive, in-depth, accurate and systematic understanding to make scientific and optimized decisions. This kind of decision-making may be in line with human intelligence, or it may exceed or even far exceed human intelligence. By making good use of the power of cognitive computing, especially by combining the data of the country and the opponent, we can better achieve early prevention, early warning, and early deployment, and can achieve the best, best, fastest and most accurate strikes and counterattacks. It can also better reflect efficient, powerful and targeted protection. Cognitive computing here is more about a possible macro-meso or micro-level issue that may arise in different groups of people, in different time periods, in different backgrounds, in the entire network domain or in a local network domain, or within a specific group. In particular, the analysis and inspection of the active and passive situations that may be presented by both parties when playing games with opponents, and the attack and defense of the cognitive domain, etc.
Give full play to the status of discourse subject and release the new application of discourse power
Cognitive domain combat has a very important support, that is, it mainly relies on the language medium to play its role, exerting influence mainly through the discourse level, forming a hidden effect on the cognitive domain mainly through the narrative nature of discourse, and mainly exerting influence on the cognitive domain through cultural models Potential role, overt or implicit role exerted through cross-cultural communication. It is mainly reflected in the following aspects:
Text Discourse Uniqueness: Cognitive Domains Need Information to Influence. Although the information may be displayed by relying on the special visual effects of video pictures, fundamentally speaking, the uniqueness of the integrated discourse expressed by the text becomes the main support for the cognitive impact. Among them, the mode of discourse expression, the skill of discourse expression, the main design of persuasion and appeal of discourse expression, especially the uniqueness of discourse narrative will be the key to affect people’s cognition. This may include narrative perspectives, narrative themes, styles, narrative story frameworks, narrative language innovations, narrative key sentences, narratives contain philosophy, humanities, religion, society, nature, etc., and the identities of different participants in the narrative , the diversified evaluation of narrative, the authenticity, depth and emotional temperature of narrative, the subtle influence of narrative on viewpoints, and the personal emotions, values, ideology, and position evaluation released by narrative. The uniqueness of text discourse is an important reliance on cognitive influence exerted by text in cognitive domain operations. Making full use of the complexity of texts, giving full play to the respective advantages of diverse texts, and giving full play to the implicit and explicit cognitive influences of text connotations have become the key to combat in the cognitive domain of text discourse. The most important thing is to innovate text discourse, to win readers with brand-new discourse, more novel expressions, and more unique expressions, so that readers can understand and feel the thoughts in the text subtly, and accept them silently. The thought of the text.
Potential of cultural models: To fight in the cognitive domain, we must deeply grasp the characteristics and models of different countries and national cultures. Different countries and different nationalities have different cultural models, philosophical thinking, traditional culture, religious beliefs, customs, and ways of thinking are obviously different; citizens of different cultures also have different national psychology and national cognition Models should also have typical cognitive preferences belonging to their own nation and culture, as well as corresponding shortcomings and weaknesses, and some of them obviously have a huge difference from other nationalities in their own country, and even have misunderstandings and hostility. Therefore, at the cultural level, combat in the cognitive domain is to grasp the overall cultural models of different countries, build cultural models for different groups in different countries, build different cognitive models for different things in different countries, and fully grasp a certain country’s cultural models in a series of things. The overall attitude and way of doing things on issues and issues, especially for some typical cases, cultural taboos, religious requirements, spiritual pursuits, general concepts, etc. It is necessary to use existing theories and findings to comprehensively construct the basic performance of different groups of people in the cognitive field on some typical, sensitive, and important issues, so as to provide important reference and guidance for the next step of cognitive operations. Strengthen the research on the cultural patterns of different personnel of the enemy, especially military personnel, personnel in key positions, including the research and construction of basic cultural characteristics and models of generals, officers, soldiers, etc., such as the psychological cognitive behavior of characters and cultural model portraits, It has become the core practice of cognitive domain operations. It is also of great value to analyze the cognitive patterns of ordinary people, especially ordinary citizens and citizens, as well as specific groups of people, including special NGO forces.
Cross-cultural strategic communication: Cognitive domain operations are international language and cultural communication, which need to follow the laws of international communication. To grasp the basic paradigm of international communication, to skillfully combine national stories with international expressions, to skillfully combine the other party’s language and culture with their own stories and ideas; to be good at combining different art forms, including words, pictures, paintings, music (Sound), video and other means or multi-modal means to achieve the international dissemination of information. At the same time, it is also necessary to coordinate multi-dimensional and macroscopic communication at the strategic level: use various means, rely on military-civilian integration, military-civilian coordination, and military-civilian integration to carry out communication; in addition to non-governmental organizations, especially rely on non-governmental forces, experts, opinion leaders, and ordinary people To help the military carry out cognitive domain operations; to set up issues in a unified way, to make multi-point, multi-person and multi-dimensional voices, to form a strategic communication situation, to form a good situation for emergency solutions for major actions, major issues, major crisis management and control, etc., to form a good atmosphere of public opinion, and to create Positive effects, eliminating adverse effects or extinguishing adverse effects. In particular, it is necessary to establish a capable team that is proficient in foreign languages, understands cross-cultural skills, understands the laws of international communication, and can skillfully speak out on international multi-dimensional platforms. These personnel can usually carry out extensive issue awareness, collection and discussion, establish personal connections and fan groups with the help of common or special issues; more importantly, at critical moments, through their fan groups, exert influence and complete strategic communication tasks .
At present, with the popularity of hybrid warfare, multi-domain warfare and global warfare, cognitive domain warfare has become a common method of hybridization and mixing. , The advanced stage of the development of legal warfare, the complex stage and the escalation stage. Its rise is more deceptive, ambiguous, concealed, embedded, implanted and unobservable, especially considering its deep integration with contemporary emerging media, and continuous learning and reference into multidisciplinary, Interdisciplinary and interdisciplinary new ideas, new technologies, and new methods. As a result, combat in the cognitive domain has become a form of combat that we must be highly vigilant against. (Liang Xiaobo, professor and doctoral supervisor of the College of Arts and Sciences, National University of Defense Technology)
[This article is a phased achievement of the National Social Science Fund’s major project “National Defense Language Capacity Building from the Perspective of National Defense and Military Reform”]
Original Chinese Military Source: https://military.people.com.cn/BIG5/n1/2022/0517/c1011-32423539.html
Chinese Military Perspective on the New Development Trends in Foreign Military Network Warfare
After decades of development, cyberspace has become an important field of production and life in human society, and has become the fifth-dimensional battlefield after “land, sea, air, and sky.” In recent years, the United States and other developed countries have rushed to introduce cyberspace strategies, build (expand) cyber warfare forces, and implement cyber offensive and defensive operations. The moves in the construction, development, and application of cyber warfare deserve the attention of the world.
Pay attention to cyberspace security, and accelerate the establishment of supporting strategies and regulations
Since cyberspace security is a security issue in an emerging field, most countries lack supporting strategies and systems of laws and regulations. In recent years, major countries in the world have positioned it as a major security field, and the pace of promulgating network security strategies and regulations has been significantly accelerated. For example, since the first national network security strategy was proposed in 2000, the United States has continuously formulated, expanded, and updated various policies, strategies, regulations, and regulations in the field of network security. The network strategy alone includes the “National Network Strategy”, “International Cyberspace Strategy”, ” The Cyber Strategy of the Ministry of National Defense and the cyber strategy of the military services, etc., are used to standardize and guide the development and application of cyber warfare. In October 2014, the U.S. military also issued the world’s first joint doctrine “Cyberspace Operations”, which elaborated and standardized the concepts, actions, and tasks of cyberspace operations. In response to cyber attacks by the United States and NATO, Russia announced the “Russian Federation Cyber Security Strategic Concept” in 2014, and promulgated a new version of the “Information Security Doctrine” in 2016, proposing to ensure network information security. In order to strengthen the overall guidance of network security affairs, India issued the “National Cyber Security Policy” in 2013 and plans to issue a “National Cyber Security Strategy”; the Indian military has formulated policies such as the “Army Cyber Security Policy” and “Navy Information Security Policy” regulations.
Strengthen the professional construction of cyber warfare forces, and pay attention to the use of non-governmental network forces
In recent years, the establishment, integration, and expansion of specialized cyber warfare forces have become a trend among foreign militaries. The United States was the first country to propose the concept of cyber warfare, and it was also the first country to form a professional cyber warfare force. The U.S. military established the Cyber Command in 2010, and upgraded it to a first-level joint operations command in 2018. The number of cyber task forces under its jurisdiction has reached 133, with about 6,200 personnel. Russia established a professional information warfare unit in 2013, and cyber warfare is an important function of it. The Japanese Self-Defense Force established the Cyber Defense Team in 2014, initially with more than 100 members, and has now increased to nearly 300, and plans to expand to a thousand in the future. The United Kingdom also announced in 2020 that it will soon create a national cyber force. On this basis, foreign militaries have generally carried out systematic design and layout of cyber warfare forces. In the field of cyber warfare, forces such as network attack, network defense, and network operation and maintenance are inseparable; externally, network warfare forces are integrated and integrated with information warfare forces such as signal reconnaissance and electronic warfare. For example, the commander of the U.S. Cyber Command also serves as the director of the National Security Agency, and the network attack and defense are integrated with signal intelligence and reconnaissance. The Japanese Self-Defense Force has set up a special first-level command to oversee space, network, and electronic warfare affairs.
It is worth noting that foreign military forces constitute the “regular army” of cyber warfare forces, and private cybersecurity companies, technology companies, hacker organizations, etc. have also become important cyber offensive and defensive forces and have attracted much attention. The notorious “Eye of Sauron” and “Equation Group” and other hacker organizations are inextricably linked to the US military. In recent years, Iran, Russia, and Venezuela have encountered cyber attacks, all of which have the shadow of “Equation Group”. The Indian Army is also considering absorbing its rich IT talents to form a cyber warfare reserve force to further strengthen its cyber warfare capabilities.
Actively develop and build a network arsenal, and intelligent weapon systems are beginning to emerge
Cyber weapons are special weapons used for network attack and defense. They can be viruses, loopholes, denial of service attacks, phishing attacks and other offensive and defensive technologies, or network attack and defense system platforms. Anatoly Smirnov, chairman of the International Information Security Association of the Russian Federation, disclosed in 2019 that many Western countries were developing cyber weapons; the United States, the United Kingdom, Germany, and Japan also made no secret of possessing cyber weapons. According to the disclosures of Snowden and WikiLeaks, U.S. intelligence agencies and the U.S. military have built a systematic offensive cyber arsenal, some of which can be called “weapons of mass destruction” in cyberspace. In 2020, Patrick Saunders, commander of the British Strategic Command, took the initiative to declare that the UK has developed a “destructive” cyber weapon, which can effectively kill the enemy’s power grid and other facilities and equipment.
In terms of network system platforms, the U.S. military has built the most complete network warfare system platform in the world, including accusation management systems such as joint network command and control and unified platform, basic systems for network warfare planning and execution such as the IKE project, and network warfare and network warfare systems such as “Shute”. A weapon system with integrated firepower. In terms of network monitoring and defense, India has developed and built system platforms such as a central monitoring system, network traffic analysis system, and network security monitoring and evaluation system.
Cyber weapons have a natural “kinship” with smart technology. At present, weapon systems in the fields of network situation monitoring, network attack and defense, and password deciphering have already taken shape in intelligentized countries in cyberspace dominant countries. With the development of artificial intelligence technology, the trend of intelligent network weapons will become more and more obvious.
Focus on enhancing the actual combat capabilities of network attack and defense, and innovate network training methods
In view of the reality and destructiveness of cyber threats, foreign militaries attach great importance to testing the security of information network systems and improving the cyber offensive and defensive capabilities of military and government agencies through cyber exercises and training activities in the context of actual combat.
In terms of participating forces, it covers the military, government agencies, reserves and civilian cyber forces. In the method mode, opponents are generally set to ensure the confrontation of the exercise. Some also innovatively use the method of offering rewards to attract hackers to “legally” attack specific target networks and help find network system defense loopholes. In terms of the training environment, actively build a network shooting range to simulate the information network environment of one’s own side and the opponent’s. The United States, Britain, Japan, Canada and NATO have all established professional cyber ranges. As the world’s largest multinational cyber exercise, NATO’s “Lock Shield” exercise simulated a country’s information network environment in 2019. The content of the drill includes responsiveness testing, defense vulnerability inspection, and election interference analysis. India regularly holds “Cyber Fortress” exercises. It is said that in the “Cyber Fortress-8” exercise organized in 2015, the Indian Army’s cyber brigade used remote penetration and other means to successfully obtain the administrator authority of a certain network system of the Indian Army, and found that 13 major categories of security vulnerabilities were identified. In addition, the U.S. military has begun to practice the integration of cyber warfare and operations in other fields. In the U.S. military’s “Schriever” exercise, the integration of space operations and cyber warfare is one of the important contents.
At present, some countries have regarded some serious cyber attacks as acts of war. As the international rules of conduct in cyberspace restrict and deter cyber attacks more and more, cyber exercises may replace real network operations and become foreign military training and upgrading. The primary path to network offensive and defensive capabilities.
Emphasis on pre-emptive offensive operations, actual combat tends to integrate deterrence and multi-domain integration
The hugeness, complexity, and fragility of the network system make network defense difficult and costly. For this reason, the United States and other countries have gradually changed their network security policy and operational thinking from the initial comprehensive defense to preemptive offensive operations, emphasizing Conduct pre-emptive offensive operations in hostile networks to eliminate potential or actual threats.
Driven by offensive thinking, cyber warfare is common in international conflicts, and the targets of attacks are no longer limited to military targets. The United States is the first country to apply cyber warfare to actual combat. In 2009, the U.S. military used the “Stuxnet” virus to carry out cyber attacks on Iran’s nuclear facilities, causing more than 1,500 centrifuges to be scrapped and the Iranian nuclear process to be paused. In 2020, after the assassination of Soleimani, the U.S. military launched cyber attacks on the command and control of the Iranian Revolutionary Guard Corps, missiles, and air defense systems to deter and prevent Iran from carrying out military retaliation. Of course, the idea of offensive cyber warfare does not require absolute cyber superiority. Some non-cyber powers have also proposed the idea of using asymmetric cyber capabilities to carry out preemptive attacks on the enemy’s weaknesses, and then achieve the goal of using the small to gain the big and the weak in the network game. Mandatory.
It is worth noting that in recent international conflicts, the trend of multi-domain integration in the fields of cyber warfare and firepower warfare, electromagnetic spectrum warfare, and cognitive domain warfare has become very obvious. For example, when armed conflicts broke out between Azerbaijan and Armenia in the Naka region in 2020, the two sides launched cyber offenses and defenses in cyberspace on the one hand, and on the other hand launched fierce confrontations in the cognitive domain around international and domestic public opinion, military morale, legal principles and morals.
At present, the low-intensity and ambiguous nature of cyber warfare attracts some international actors to frequently carry out cyberspace operations regardless of the consequences, and the risk of conflict escalation out of control is constantly accumulating. To this end, all countries in the world should start consultations and negotiations on international rules of conduct in cyberspace and cyber arms control as soon as possible, jointly restrict military activities in cyberspace, create a new pattern of cybersecurity, and build a community of shared future in cyberspace.
Chinese People’s Liberation Army Actively Responding to the Challenge of Intelligent Warfare
In recent years, the wave of intelligence has surged and has been widely used in the military field. Major countries in the world attach great importance to the construction and application of military intelligence, and various unmanned combat platforms and intelligent weapons and equipment continue to appear, and they are installed in troops and put into actual combat. In the face of the accelerated evolution of intelligent warfare, only by seizing development opportunities, actively responding to challenges, accelerating the development of military intelligence, and accelerating the forging of intelligent combat capabilities can we seize the strategic initiative of intelligent warfare and win future intelligent warfare.
Focusing on designing wars to create intelligent theory
Military theory comes from combat practice and is used to guide combat practice. Restricted by various conditions in the past, military theory research was mostly “looking backwards”, that is, summarizing battle examples to form combat guidance. With the rapid development of modern technology, especially big data, cloud computing and other disruptive technologies, the research on combat theory has got rid of the traditional follow-up and inductive reasoning mode, and has entered a new era of experimental warfare and design warfare. New disruptive technologies in the field of intelligence have opened up new space for military theory innovation. To this end, we should create a basic theory of intelligent warfare in accordance with the idea of ”proposing concepts-needs analysis-innovating theories”, and conduct in-depth research on the concept connotation, essential characteristics, war guidance, combat styles, offensive and defensive actions, winning mechanisms, etc. of intelligent warfare. Features and laws, etc.; innovate intelligent combat methods and methods, give full play to the overall effectiveness of the intelligent combat system, strengthen research on new intelligent combat methods and methods such as man-machine collaborative intelligent combat, intelligent robot combat, and intelligent unmanned swarm combat, as well as intelligent Combat command, the process and methods of intelligent combat support, etc.; focus on effectively responding to the threat of intelligent combat, and research strategies to defeat the enemy, such as intelligent interdiction warfare and intelligent disruption warfare. These theories are the cornerstone of the theoretical system of intelligent warfare. In the future, the theory of war centered on strengthening “controlling intellectual power” and competing for “algorithm-centric warfare” will most likely replace the theory of warfare centered on “network-centric warfare.”
Focus on cross-domain interconnection and explore intelligent forms
The military organization is the link connecting military technology and combat theory, and the lever to exert the overall combat effectiveness of the military. Modern combat places more emphasis on “elite combat under the support of a large system”, that is, supported by the joint combat system, “fine front and strong back”, according to the idea of ”integrated design, modular formation, and combined application”, the formation is more precise and more accurate. The powerful combat module enables the maximum release of combat energy. The organization of the future intelligent warfare system will be based on strategies, campaigns, and tactics at different levels and different arms and arms, and will form different types and purposes of small, multi-functional and intelligent new joint combat forces. According to the requirements of reconfigurability, scalability and self-adaptation, the intelligentized combat network can seamlessly link and flexibly organize individual weapon platforms according to changes in the enemy situation and battlefield environment, and then aggregate them to form System advantages, forming a combat module integrating offense and defense. The intelligent new combat force system is a comprehensive product of the development of artificial intelligence technology, the formation of new combat capabilities, and the evolution of war forms. new growth point.
Focus on the integration of man and machine to develop intelligent weapons With the development of information technology and intelligent technology, whoever can win in the field of artificial intelligence is expected to have the initiative in future military confrontation. We should focus on the dual needs of intelligent warfare system operations and intelligent weapon equipment system construction, do a good job in top-level design and overall planning, compile a road map for the development of intelligent weapon equipment systems, and develop high, medium, low-end, low-end, and Large, medium and small, long-range and short-range, covering space fields such as land, sea, air, space, electricity, and networks, and an intelligent unmanned combat equipment system that matches combat and support, and establishes a “human-led, machine-assisted, mixed formation, joint “Operation” manned-unmanned cooperation system, enhance the system integration of various military arms and various intelligent weapons and equipment such as operations and support. Intelligent unmanned combat system is a new trend in the development of future war equipment. Its core is to aim at the requirements of “zero casualties”, “full coverage” and “fast response” in future wars, and make full use of new theories, new materials, new processes, new energy, and new technology development achievements in two aspects: man-machine collaboration and autonomous action. Continuously make breakthroughs, build a three-level unmanned equipment sys
tem of strategy, campaign, and tactics, build a new type of intelligent unmanned division on a large scale, and realize the systematic and coordinated operations of unmanned combat systems. At the same time, we should focus on the needs of unmanned and anti-unmanned, intelligent and anti-intelligent operations, and focus on the development of anti-enemy intelligent unmanned combat weaponry systems to ensure effective intelligent unmanned offensive and defensive confrontation with the enemy.
Focus on ability compound innovation intelligent training
The professional division of labor in modern warfare is becoming more and more detailed, and the entire combat system is becoming more and more complex, which promotes the transition from manpower-intensive to technology-intensive operations, requiring combatants not only to have good physical fitness, but also to have good technical literacy and intellectual advantages , to meet the needs of different combat missions, combat environments, and combat opponents. Military intelligence puts forward higher requirements on the quality of people. Correspondingly, intelligent military talents should have the characteristics of group talents, sophisticated skills, complex knowledge, innovative thinking, and intelligent decision-making. Intelligent warfare will be a war carried out by the combination of man and machine, and the combat force with the intelligent unmanned combat system as the main body will play an increasingly important role. The effective combination of high-quality personnel and intelligent weapons can maximize combat effectiveness. It is necessary to adapt to the new characteristics of the intelligent warfare force system, innovate and develop the concept of intelligent training, and explore a new model for the generation of intelligent warfare combat power. At present, artificial intelligence technology can create a more “real” weapon operation experience and battlefield environment, and can realistically interpret the combat process, assist decision-making and command, and evaluate combat concepts. To this end, adapt to the new characteristics of the intelligent warfare force system, focus on the improvement of the self-command, self-control, and self-combat capabilities of the intelligent combat system, and make full use of the characteristics of the intelligent system that can self-game and self-growth, forming a special strategy for intelligent warfare. Combat system training system, training environment and training mechanism, strengthen “human” control of intelligent system training, and explore a new training mode with “machine” as the main object. In this way, the intelligent combat system can obtain a leap in combat capability after short-term self-intensive training, so as to cope with the test of disorder, complexity and uncertainty in the future combat environment.
Focusing on Accurate and Efficient Improvement of Guarantee Mode
Intelligent battlefields and the degree of realization of comprehensive support for joint operations are important factors that directly affect the generation of combat effectiveness of troops. The development of intelligent technology will surely trigger a revolutionary change in the construction of the joint combat support system and realize intelligent comprehensive support. Comprehensive support is the foundation of combat effectiveness and a bridge that transforms national economic strength into military combat capability. With the continuous maturity of the Internet of Things technology, intelligent warfare puts more emphasis on integrated guarantee, precise guarantee, and distribution guarantee, that is, the required amount is delivered to the required place at the required time. Relying on the integrated support system, the dispersedly deployed support forces and resources are grouped according to functional modules such as supplies, supplies, maintenance, ammunition, and management, so that they cover all areas of combat service support. Relying on visualization technology, the entire process of combat supply is tracked and mastered According to the current situation, according to the real-time development of the battle situation, information control, reception and distribution of personnel flow and material flow are carried out to achieve point-to-point direct support. Through the use of technologies such as the Internet of Things, drones, smart cars, remote surgery, and 3D printing, upgrade and build an intelligent after-installation support system covering intelligent warehousing, intelligent delivery, intelligent maintenance, and intelligent medical treatment, so as to realize automatic, fast and accurate supply of after-load materials on the battlefield , Rapid diagnosis and maintenance of equipment failures, timely rescue of battlefield personnel, changing passive support into active service, and improving the overall support efficiency and effectiveness of aftermarket.
Focus on both military and
civilian use and deepen intelligent integration
Breakthroughs in the core and key technologies of artificial intelligence are the “country’s most important weapon” to deal with the threats and challenges of intelligent warfare. The rapid development of intelligent technology has become an accelerator of military intelligence. In the information age, the boundary between military technology and civilian technology is becoming more and more blurred, and the transferability is becoming stronger and stronger. Actively establish a military-civilian collaborative innovation mechanism, continuously strengthen the driving force for the innovation and development of intelligent core technologies, build an open industry-university-research collaborative innovation system for the whole society, plan forward and support investment in core cutting-edge technologies such as artificial intelligence, and give full play to the innovation power of the entire society. Promote the rapid and sustainable development of military intelligence. Accelerate technological breakthroughs in key areas. It is necessary to focus on relevant key technical fields and break the technical bottleneck that restricts the development of military intelligence. Strengthen research on the basic support fields of military intelligence, such as military big data, military Internet of Things, etc.; start from combat requirements, strengthen research on intelligent application technologies in various operational elements, especially intelligent command and decision-making, intelligent weapon platforms, Research on intelligent battlefield perception and intelligent countermeasure technology. The research and development of the core key technology of military intelligence not only requires interdisciplinary and cross-field collaborative innovation, but also integrates the development of social intelligence and military intelligence. Intelligent technology is quickly embedded in operational elements and operational processes. To accelerate the development of military intelligence, we should explore the rules of cultivating relevant talents, make full use of military and local education resources, increase the intensity of training relevant talents, and provide solid intellectual support and talent guarantee for promoting the construction of military intelligence.
Chinese Military Higher Education in the Age of Intelligent Warfare
“Military academies are born for war and built for war.” At the opening ceremony of the 2019 military academy principal training, Chairman Xi proposed the military education policy for the new era, pointing out the direction for the military academies to cultivate high-quality, professional new military talents. At present, the form of war is accelerating towards informationization and intelligence. What kind of soldiers are needed to win future intelligent wars, and how military higher education can cultivate talents suitable for intelligent warfare are major issues before us.
The form of war is accelerating towards intelligent development
The form of war is the expression form and state of war history staged mainly marked by the technical attributes of the main battle weapon. So far, after experiencing cold weapon wars, hot weapon wars, and mechanized warfare, the form of warfare is accelerating its development towards informationized and intelligentized warfare. The increasingly widespread application of advanced technologies such as big data, the Internet of Things, artificial intelligence, biotechnology, and brain science in the military field is becoming an important driver of the new military revolution, giving rise to new forms of unmanned, autonomous, and intelligent warfare, changing the Traditional war winning mechanism. In 2014, a foreign military think tank released a research report titled “20YY: War in the Robot Era”, arguing that a storm of military transformation marked by intelligent armies, autonomous equipment, and unmanned warfare is approaching. Platforms, information systems and decision support systems, as well as new weapons such as directed energy, hypersonics, bionics, genes, and nanometers, will initially establish an intelligent combat system by 2035, and will develop to an advanced stage by 2050, fully realizing combat platforms, information Systems, command and control are intelligentized and even unmanned, new weapons such as bionics, genes, and nanometers are on the battlefield, and the combat space is further expanded to biological space, nanospace, and intelligent space.
In recent years, with the continuous deepening of research on the human brain, the brain-computer interface technology is becoming more and more mature. In the future, the information exchange between human beings and the outside world will no longer be limited to the senses, and the direct information exchange between the brain and the outside world can also be realized through chips. People and people, people and things are fully interconnected, and human beings may surpass the Internet and the Internet of Things and enter the era of intelligence supported by the Internet of Brains. In the era of the Internet of Brains, soldiers’ brains are directly connected to combat platforms, information systems, and decision-making support systems, and decisions are made with the assistance of technologies such as quantum computing and cloud platforms. Information and mind merge. Some domestic experts believe that under the influence of artificial intelligence technology, the winning mechanism of future wars will change from “information dominance, system confrontation, precise strikes, and joint victory” in information warfare to “intelligence dominance, independent confrontation, and traceability” in intelligent warfare. Following the transformation of “strike, cloud and brain winning”, following matter, energy, and information, cloud intelligence that integrates man and machine has become the key to determining the outcome of a war. This transformation of the form of intelligent warfare is accelerating, and any hesitation may bring unimaginable consequences.
But it should be noted that no matter how the war develops, people are always the most fundamental element. The form of intelligent warfare will lead to changes in the functions and roles of soldiers, and will put forward higher requirements for the ability and quality of soldiers. Cognitive ability may surpass knowledge and skills and become the core ability of soldiers.
Intelligent warfare requires the upgrading and reconstruction of the comprehensive quality of soldiers.
According to the talent growth cycle, soldiers who are currently receiving higher education will become the main force of combat training in more than 10 years, and will also become the first main force to meet the challenges of intelligent warfare. At present, there are still some deficiencies in the design of personnel training goals in our military’s higher education, and insufficient attention is paid to the ability to adapt to the ever-changing intelligent battlefield in the future. There is still a certain gap between the personnel training objectives and the needs of intelligent warfare. On July 23, 2020, when Chairman Xi inspected the Air Force Aviation University, he emphasized that we must persist in cultivating people with morality, educating people for war, strengthening m
ilitary spirit education, strengthening fighting spirit, and comprehensively strengthening the ideological and political, military, scientific and cultural aspects of pilot students. , Physical and psychological quality foundation. To implement President Xi’s important instructions and meet the needs of future intelligent warfare, it is urgent to build a higher-level military talent training goal with thinking as the core, and accelerate the upgrading and reconstruction of military personnel’s comprehensive quality.
Intelligent warfare is a complex giant system integrating multiple fields. Its intelligence-based characteristics and iterative and changeable development trend are changing the role of soldiers in warfare. Soldiers may gradually move from the foreground of the war to behind the scenes, from direct face-to-face combat to man-machine collaborative combat, from front-line charging to back-end planning and design of war. In order to be competent in man-machine coordination, planning and designing wars and other functional roles, in addition to ideological, political, physical and psychological requirements, in terms of military profession and scientific culture, soldiers should focus on improving the following five aspects of knowledge, ability and quality: First, multidisciplinary integration Master the core principles of multiple disciplines related to intelligent warfare, such as nature, military, cognitive psychology, and network intelligence, and be able to integrate knowledge across disciplines to guide military practice; the second is strong cognitive ability, with logical thinking, judgment Thinking and system thinking ability, able to use scientific methods to analyze and reason to solve combat problems; the third is human-machine collaboration ability, deeply grasp the characteristics and laws of intelligent warfare, skillfully use combat platforms, command and control systems, and decision support systems, and be able to control diversified intelligent weapons The fourth is the ability to innovate, with a keen sense of technology and strong creativity, able to grasp the frontiers of science and technology, innovate combat styles, and grasp the laws of war development; the fifth is the ability to self-growth, to be able to accurately recognize oneself , rationally plan military careers, freely use information means to acquire new knowledge, new technologies, and new methods, constantly improve the knowledge structure, enhance cognitive ability, and better adapt to the complex and changeable military revolution development.
Identifying the Emphasis Points of Military Higher Education Reform
At present, the superposition of informatization and intelligentization has brought greater complexity to the personnel training work of military academies. It is necessary to meet the actual needs of informatization operations and at the same time lay the foundation for adapting to intelligent warfare. We should focus on The following work.
Restructure the curriculum system. The curriculum system supports the formation of talent knowledge structure. In order to cultivate military talents that meet the needs of intelligent warfare and achieve the training goals of military majors, science and culture, it is necessary to break the practice of designing a curriculum system with a single major as the background and establish a curriculum system of “general education + direction”. The general education course is based on the existing natural science and public courses, adding courses such as mathematical logic, mathematical modeling, critical thinking, network foundation, artificial intelligence, cognitive neuroscience, system engineering, etc., to establish cross-field and interdisciplinary courses System, expand the knowledge of students, build a knowledge structure urgently needed for intelligent warfare, and lay a broad knowledge foundation for their lifelong growth. Orientation courses are to establish a discipline and professional direction, set up a vertical curriculum system of mathematical science, professional foundation, and professional positions, build a solid professional background, and cultivate students’ ability to use professional theories to solve complex combat training problems. The curriculum system of “General Education + Orientation” helps build a “T”-shaped knowledge structure and meets the needs of military personnel to adapt to diverse and intelligent warfare.
Deepen classroom reform. Educational neuroscience believes that education is the reshaping of students’ brains, and the classroom is the main position for reshaping students’ neural networks, especially for the formation of high-level cognitive abilities required for intelligent warfare. Continuously deepening classroom reform is the key to military Critical tasks for higher education today. It should be seen that a classroom with only knowledge and understanding is far from a good classroom. All human behaviors, though
ts and emotions are all controlled by the brain, and every knowledge, thought and emotion corresponds to a specific neural network of the brain. Therefore, classroom reform should center on students’ learning, follow the cognitive laws of the human brain, and Attract and maintain attention as the starting point, establish a scientific thinking framework, and mobilize students to think proactively. Usually, teaching methods aimed at higher-level abilities have a general model—problem-driven heuristic teaching, and the commonly used problem-based teaching methods, project-based teaching methods, and inquiry-based teaching methods all belong to this model. Therefore, the main path to promote classroom reform is to develop unknown, novel, and interesting questions and stories for students, design a thinking framework that points to logical reasoning, critical thinking, reflection, creativity, and learning ability, and inspire students under the guidance of the framework. Active thinking, supplemented by the output process of speaking and writing, finally achieves the goal of internalizing knowledge understanding and forming high-level abilities.
Promote comprehensive education. Modern educational theory not only regards the classroom as an important position of education, but also regards all time and space outside the classroom as an important resource for cultivating students. The time and space outside the classroom not only support classroom teaching and promote the formation of knowledge and ability, but also an important place to cultivate non-intellectual ability. Colleges and universities should make full use of these time and space, clarify specific training objectives, focus on going deep into the army, close to actual combat, highlighting practicality and creativity, and scientifically design education and training programs. Focus on giving full play to the advantages of military academies in management and education, explore the establishment of a student management model, and promote the cultivation of students’ leadership and management capabilities; continue to enrich the second classroom, build an innovative platform, create more opportunities for independent practice, and improve students’ innovation capabilities; make full use of various Large-scale activities to cultivate students’ competition awareness and teamwork ability; strengthen the construction of management cadres, improve scientific management and training capabilities, and effectively guide students to carry out time management, goal management, emotional management, psychological adjustment, habit formation, etc., to help students improve self-management and self-learning ability.
All in all, education is a systematic project. The above are only three aspects to break through the shortcomings of talent training in the era of intelligence. To truly solve the problem, military academies need to carry out systematic reforms, such as strategic planning, quality management, personnel quality, teaching conditions, etc. All aspects can effectively support the achievement of the goal of personnel training, and this requires us to continuously explore and innovate, continuously improve the level of running schools and educating people, and strive to create a new situation in the construction and development of military academies.
Chinese Military Perspective on the Evolution of the Winning Mechanisms of Intelligent Warfare
Military theorists have often said that victory tends to smile to those who can foresee changes in the character of warfare, rather than to those who wait for changes to occur before adapting. In recent years, disruptive technologies represented by artificial intelligence have developed rapidly and are widely used in the military field, accelerating the evolution of warfare to intelligence, and correspondingly, the concept of warfare is also undergoing changes. Only by discovering changes in time, actively responding to changes, and actively adapting to changes can we be invincible in future wars.
From “fighting the weak with the strong” to “controlling the clumsy with wisdom”
“The strong win the weak and the weak lose” is a law of victory in war with certain universality. Even those battles in which the weak defeated the strong often had to form a strength advantage against the enemy at a local and specific period of time in order to truly win. In the era of intelligent warfare, the contribution rate of intelligence superiority to combat effectiveness is much higher than that of other factors.
In the confrontation of intelligent warfare, human intelligence widely penetrates into the combat field and is transplanted into weapon systems. Global multi-dimensional and various types of intelligent combat platforms can quickly couple combat forces, build a combat system according to mission requirements, and independently implement coordinated operations. After the end, it quickly returned to the standby state, showing the trend of intelligence and autonomy. The side with a higher and stronger level of intelligence can better develop and use the mechanism of “controlling stupidity with wisdom”, and even design wars based on this, dominate the development of the battle situation, and win the final victory. It should also be noted that in the era of intelligent warfare, there are likely to be multiple stages of development from low to high. Try to keep yourself at an advanced stage, and attack your opponent so that it is at a low-dimensional stage. use.
From “destroying power” to “destroying cognition”
With the accelerated evolution of warfare to intelligence, the combat space has gradually expanded from the physical domain and the information domain to the cognitive domain, from the tangible battlefield to the invisible battlefield. The cognitive space composed of people’s spiritual and psychological activities has become a new combat space. Different from the main purpose of destroying the enemy’s vital forces in traditional warfare, intelligent warfare will pay more attention to weakening the enemy’s morale, disintegrating the enemy’s will, and destroying the enemy’s cognition.
Through the intelligent analysis of the opponent’s personality preferences, psychological characteristics, and decision-making habits, deterrent information can be “tailored” in a targeted manner, and the advantages of cutting-edge technologies such as intelligence can be used to show the opponent’s powerful strength in a vivid way, so that anxiety, suspicion, etc. , panic and other emotions continue to ferment inside it, which eventually leads to its self-defeating. Known as the “new oil”, big data not only enriches intelligence sources, but also becomes an important “weapon” that acts on the opponent’s cognition. By processing big data and deliberately “leaking” it to the opponent, it will create a new “fog of war” for it, and make it fall into a situation of cognitive confusion. In an intelligent war, the game of struggle will be more intense, and the party with a cognitive advantage will be ahead of the opponent, and it will be easier to grasp the initiative and opportunities.
From “people-oriented” to “human-machine collaboration”
In traditional warfare, the organization and use of military power are dominated by people. With the widespread application of intelligent technology, the proportion of unmanned equipment continues to increase. In intelligent warfare, combat tasks will be completed by man-machine collaboration, and the two will achieve organic integration and complement each other’s advantages. The third “offset strategy” proposed by the foreign military regards human-machine cooperation as a key technology for key development, and its successively proposed concepts such as “loyal wingman” are also aimed at exploring the realization of manned/unmanned coordinated operations. It is foreseeable that human-machine collaboration will play an important role in future warfare.
Using unmanned reconnaissance forces to carry out three-dimensional and multi-dimensional battlefield situational awareness can provide real-time intelligence support for manned combat forces; use unmanned platforms to carry relay loads to continuously provide communication relay support for manned combat forces; use
unmanned combat forces to go deep into the front battlefield, It can attract the enemy to attack, force the enemy to expose its position, and provide target guidance and fire support for manned combat forces; use unmanned transport equipment to provide supplies for the front line, which can improve the efficiency of logistics support, reduce transportation costs, and reduce unnecessary casualties. With the assistance of artificial intelligence, manned combat forces and unmanned combat forces will realize scientific division of labor and reasonable collocation in terms of quantity, scale and function, so as to maximize the overall effectiveness.
From “eat the small with the big” to “eat the slow with the fast”
In traditional warfare, it is often necessary to make up for shortcomings in equipment performance and other aspects by increasing the number of troops. The rapid development of military intelligence has greatly improved the speed of information transmission and the accuracy of weapon strikes, greatly reduced the time for reconnaissance and early warning, intelligence processing, command decision-making, firepower strikes, and damage assessment, and accelerated the OODA kill chain cycle. , making “find and destroy” possible.
Hypersonic missiles, laser weapons, microwave weapons, electromagnetic pulse weapons and other new rapid-kill weapons have further pushed the rhythm of war to “second kill”. In the Gulf War, the loop time of the OODA loop required 3 days; in the Iraq War, the loop time has been shortened to less than 10 minutes; and in the Syrian War, the loop has almost achieved near real-time. In intelligent warfare, the use of an unmanned platform for surveillance and attack to quickly target high-value targets such as the enemy’s core command post and high-level commanders will cause the opponent to suffer heavy losses before they can react, and even face the danger of paralysis. It can be seen that victory does not necessarily favor the side with a large military force, and the side that moves quickly and accurately will be more likely to win the battlefield. According to statistics, the reaction time required by artificial intelligence to respond to changes in the battlefield is more than 400 times faster than that of humans. In the face of the rapidly changing battlefield situation, people will be more inclined to use artificial intelligence technology to realize the adaptive planning and autonomous decision-making of the command and control system, so that the command and control mode will be changed from “people on the loop” to “people outside the loop”, so as to reduce the While shouldering the burden of commanding personnel, it can improve combat efficiency and the success rate of mission execution.
From “Integrated Winning” to “Cluster Winning”
The traditional concept of equipment development is to invest a lot of money in the research and development of highly integrated high-precision weapon platforms, in order to achieve dimensionality reduction strikes on the enemy by virtue of intergenerational advantages and performance advantages in war. However, developing and deploying a multi-functional high-end platform not only takes a lot of time and money, but when multiple software and hardware modules are integrated into a single weapon platform, there may be incompatibility among them. Once the platform is destroyed, it will cause heavy losses. The military application of disruptive technologies such as artificial intelligence has led to the rapid development of unmanned swarms. Unmanned swarms have the advantages of large scale, low comprehensive cost, and decentralization. Unmanned platforms coordinate with each other, divide labor and cooperate, and can make independent decisions and carry out combat tasks in an organized manner. Even if some unmanned platforms are destroyed, it will not affect the overall operation. efficacy. Combat concepts such as “decision-making center warfare” and “mosaic warfare” proposed by foreign militaries focus on the use of unmanned swarms to complete combat tasks. In intelligent warfare, by dispersing functions such as reconnaissance and surveillance, information communication, command and control, and fire strikes into a large number of single-function unmanned combat units, a highly robust and highly elastic “kill net” is constructed, and then Adjusting the combination method will make it emerge a powerful group intelligence, creating great uncertainty for the opponent, and then trap the opponent in the judgment link of the OODA loop, unable to make effective decisions. In addition, due to the large number of unmanned swarms, the opponent’s detection, tracking, and interception capabilities can be quickly saturated, and the opponent has to face the dilemma of fortification failure because it cannot destroy all unmanned platforms in the swarm.
From “Military Dominance” to “Multiple Mixture”
Traditional warfare mainly relies on violent means to make the enemy submit to one’s own will, and usually has a strong war intensity, with clear boundaries between peacetime and wartime. With the continuous expansion of the field of military struggle to new fields such as space, network, and intelligence, and the increasingly prominent role of economic, cultural, diplomatic, and legal means in warfare, intelligent warfare will be carried out in many fields represented by the “grey zone”. Developed in the form of “multi-pronged approach”. The intensity of war may be weakened, and the boundary between peace and war will become more blurred. Whether in 2019, half of Saudi Arabia’s oil fields were attacked by drones and half of its oil production was shut down, or in 2021, the largest oil pipeline in the United States was hit by cyber attacks and caused a large-scale oil shortage. The far-reaching impact of various new attack methods cannot be ignored underestimate.
With the development and maturity of intelligent technology, the comprehensive use of various means to attack opponents’ industrial, transportation, financial, communication, energy, medical and other facilities and networks will become more common. The threshold of intelligent warfare will show a downward trend, and the warring parties may adopt the method of undeclared war to launch a hybrid war that integrates economic warfare, diplomatic warfare, cyber warfare, public opinion warfare, psychological warfare, legal warfare, etc., so that the opponent is exhausted. Handle.
From “actual combat inspection” to “experimental exercise”
Under traditional conditions, due to the lack of scientific simulation and evaluation tools, the true capabilities of the army can only be tested in actual combat. Under intelligent conditions, using virtual reality technology can create a virtual scene with a strong sense of three-dimensional and realism based on the actual battlefield environment and task background. This scene can not only restore objective things such as weapons and equipment from multiple dimensions such as sound, appearance, and performance, but also simulate various severe weather such as heavy fog, heavy rain, and snowstorm, and display the terrain, meteorology, hydrology, etc. of the battlefield in a visualized form. Electromagnetic, nuclear and other information, close to the real situation of the battlefield.
Set the imaginary enemy in the virtual environment according to the characteristics of the enemy in reality, and carry out intelligent simulation of the possible trend of the battle situation, so that officers and soldiers can “experience” the war in virtual reality several times before the official war, so as to improve the equipment performance, The rhythm of the war and the situation of the enemy and the enemy are all clear, and it will be easier to perform realistic tasks. Before the outbreak of the Iraq War, the U.S. military secretly developed a computer game that simulated the combat environment in Baghdad. Among the personnel dispatched to Iraq to perform missions, the survival rate of those trained in the game was as high as 90%. With the continuous enrichment and improvement of data collected in reality, the construction of virtual battlefields will be more realistic, the prediction of the battlefield situation will be more accurate, and the comprehensive evaluation of exercises will be more credible. If the outcome of the war is known in advance, there may be a situation where “surrender the enemy” without a fight or a small fight.
Chinese Military to focus on the integration and development of mechanization, informationization and intelligence
Adhere to the integration and development of mechanization, informationization and intelligence
——Conscientiously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China
■Chinese People’s Liberation Army Unit 66011
The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informationization and intelligence. This important exposition endows the modernization of national defense and the armed forces with new connotations of the times, and further points out the development direction and path for accelerating the modernization of national defense and the armed forces. We must seize the opportunity, based on the status quo, insist on promoting the integrated development of mechanization, informationization and intelligence with systematic thinking, coordinate the development of various fields, especially key areas, realize the positive interaction of the three, and promote the overall improvement of national defense and military modernization.
Engels pointed out: “Human beings fight in the same way as they produce.” At present, the new military revolution in the world is developing rapidly, the degree of informatization in modern warfare is constantly improving, and the characteristics of intelligence are becoming increasingly apparent. Especially under the influence of the new round of scientific and technological revolution, the concepts, elements and methods of winning war are undergoing major changes. Judging from the recent local wars and armed conflicts in the world, a large number of high-tech weapons and equipment have been used in actual combat, and intelligent technology, unmanned equipment, and data information have become new growth points for combat effectiveness. In the face of increasingly fierce military competition, only by standing at the forefront of war and technology, and adhering to the integration of mechanization, information, and intelligence, can we seize the opportunity and win the initiative in military strategic competition.
“Everything must come, and it is a matter of course.” Mechanization, informatization, and intelligence are superimposed, interpenetrated, and mutually supported. Among them, mechanization is the material basis and carrier for the development of informatization and intelligence; informatization plays a connecting role between mechanization and intelligence; intelligence represents advanced combat effectiveness and is the development direction of future military construction. Without the previous “transformation” as the premise and foundation, there would be no emergence and development of the latter “transformation”.
Adhering to the integration and development of mechanization, informationization and intelligence is in line with the reality of our military construction and development, and is the only way for the modernization of national defense and the military in the future. Our army has basically achieved mechanization, and the construction of informatization has made significant progress but has not yet been completed. If the intelligentization is carried out after completing the informatization step by step, it will open up a new generation gap with the armed forces of developed countries; if the construction focus is fully shifted to intelligentization, it is unrealistic to expect to be in place in one step.
Science and technology are the core combat capability and the most active and revolutionary factor in military development. The key to adhering to the integrated development of mechanization, informationization and intelligence lies in promoting technological innovation. We should vigorously implement the strategy of strengthening the army through science and technology, actively promote self-reliance and self-improvement in high-level science and technology, accelerate the breakthrough of key core technologies, accelerate the development of strategic, cutting-edge, and disruptive technologies, and realize the transformation from following and running to leading and running as soon as possible. Persist in seeking combat effectiveness from scientific and technological innovation, improve scientific and technological cognition, innovation, and application capabilities, speed up the resolution of “stuck neck” problems, and firmly grasp the lifeline of our army’s development in our own hands.
Wars change with the times, and preparations for wars should not be conservative or rigid. To promote war preparations in the new era, we must focus on winning the new requirements of information-based and intelligent warfare. The construction of our army’s combat effectiveness has accelerated transformation, overall reshaping, and leapfrog development to ensure that it can attack and defend freely and win opportunities in future wars.
Chinese Spying Operations – Games Chinese Spooks Play
From 國家安全部 ‘Guójiā ānquán bù’ to 新華社 ‘Xinhua’, how China’s espionage network operates in shadows.
China has systemically set up one of the quietest but most lethal espionage networks across the world.
As the world continues to debate over the spy balloons allegedly sent by China for espionage in the United States, probably it is missing the big picture. The real threat to global security comes from China’s spy network which is a complex web of many agencies, most of whom have successfully remained in the shadows. This multipart series would unravel the lesser known as well the unknown details about the Chinese espionage network.
The Chinese spy network has successfully remained in the shadows for decades. The Chinese Communist Party had built its spy network much before it came to power in China in 1949 turning a republic into a communist dictatorship. Since then, China has systematically set up one of the quietest but one of the most lethal espionage networks across the world.
The information regarding the Chinese spy network is scant and so scattered that it makes it difficult for even keen China watchers to paint the big and the real picture.
Ministry of State for Security
Ministry of State for Security (MSS) is China’s premier intelligence agency. It is also known as 國家安全部 ‘Guójiā ānquán bù’. MSS is largely responsible for operations outside China. The domestic intelligence and surveillance is looked after by the Ministry of Public Security (MPS). In addition, Chinese defence forces have their own intelligence agencies which conduct operations all over the globe.
Peter Mattis, one of the foremost authorities on Chinese intelligence operations, explains the Chinese military intelligence network (A Guide to Chinese Intelligence Operations, August 18, 2015), “Within the People’s Liberation Army (PLA), intelligence organizations fall under the General Staff Department (the Second and Third Departments, or, respectively, China’s DIA and NSA equivalents); the General Political Department for intelligence and covert influence operations; the PLA Navy, Air Force, and Second Artillery headquarters; and technical reconnaissance bureaus in the military regions. Much of the military intelligence infrastructure is based in China, but defence attachés and clandestine collectors do operate abroad, including from the service intelligence elements.”
New China News Agency (Xinhua)
Founded in 1931 by the Chinese Communist Party, Xinhua is the official news agency of China and a major facilitator for China’s intelligence gathering. According to an investigative report in Greek media outlet Pentapostagma published in April 2021, “Xinhua is primarily the eyes, ears, and voice of China. It is one of the important arms of the Chinese Intelligence agency in gathering information. Its prime objective is to promote positive news/narrative about CCP leadership/Chinese government and to marginalize, demonize, or entirely suppress anti-CCP voices, incisive political commentary and exposes that present the Chinese Government/CCP leadership in a negative light. It owns more than 20 newspapers and a dozen magazines and prints in eight languages: Chinese, English, Spanish, French, Russian, Portuguese, Arabic and Japanese It has established 107 bureaus in foreign countries including eight sub offices or editorial offices in Hong Kong, New York, Mexico, Nairobi, Cairo, Paris, Moscow, and Rio de Janeiro and currently employs more than 10,000 people.”
The report explained the standard operating procedure of gathering intelligence by this Chinese agency which has been operating in India also for several years, “Xinhua covers all news and developments/events in foreign countries which have meaning, or which could be of any significance for China. It then forwards reports/articles to China’s Ministry of State Security which directly handles the information inflow from Xinhua. The reports/articles are uploaded in a secured web system. Those that contain intelligence value are treated as classified and forwarded to CCP leadership for their consumption. Xinhua journalists are trained to be able to identify news/articles that are suitable for the CCP leaders and not for the public.”
According to this investigative report, “The agency (Xinhua) maintains a huge database of experts across the world and contacts favorable pro-Chinese contacts/assets in foreign countries and forwards their articles/reports to concerned departments back in Beijing.”
United Front Work Department (UFWD)
Set up in 1942, UFWD is the blue-eyed boy of the Communist Party Chinese (CPC). President Xi Jinping has further strengthened it ever since he came to power in 2012 and now it plays a significant role in China’s overall espionage network as well foreign policy framework. According to a research report published in August 2018 by the US-China Economic and Security Review Commission, “The United Front strategy uses a range of methods to influence overseas Chinese communities, foreign governments, and other actors to take actions or adopt positions supportive of Beijing’s preferred policies.”
‘Several official and quasi-official entities conduct overseas activities guided or funded by the United Front including Chinese government and military organizations, cultural and “friendship” associations, and overseas academic groups such as Chinese Students and Scholars Associations (CSSAs) and Confucius Institutes. The UFWD also oversees influence operations targeting Taiwan, Hong Kong, and Macau that aim to suppress independence movements, undermine local identity, and promote support for Beijing’s political system.
In all these cases, United Front work serves to promote Beijing’s preferred global narrative, pressure individuals living in free and open societies to self-censor and avoid discussing issues unfavorable to the CPC and harass or undermine groups critical of Beijing’s policies.’
Ryan Fedasiuk, a research Analyst at Georgetown University’s Center for Security and Emerging Technology (CSET) meticulously calculated the budget for UFWD in his essay ‘How China Mobilizes Funding for United Front Work (China Brief Volume: 20 Issue: 16). This indicates the priority given to this agency by the Chinese government and the CCP.
There is no direct budget for UFWD but there are several government and quasi-government bodies which fund it. That include Chinese People’s Political Consultative Conference, State Ethnic Affairs Commission, State Administration of Religious Affairs, Overseas Chinese Affairs Office of the State Council and All-China Federation of Industry and Commerce. The current annual budget for UFWD allocated through these bodies stands at not less than $1.4 billion.
“Chinese officials maintain that the United Front system is a benign network of administrative organizations, and that the PRC’s foreign policy is based on “mutual respect and non-interference in each other’s internal affairs” (PRC Embassy in Sweden, August 2019; ABC, June 2020). If this really were the case, regional governments probably would not classify their united front spending as secret 秘密資助 (Mìmì zīzhù) or refuse to disclose the structure of government offices ostensibly reserved for public diplomacy,” says Fedasiuk.
He further adds, “That regional governments in China budget nearly as much for united front work ($1.3 billion annually) as they do for CPC propaganda indicates how highly the Party values the united front as a tool for both domestic and foreign influence’.”
Overseas Chinese Affairs Office (OCAO)
This department /office is a front for keeping tabs on the Chinese communities abroad. It works closely with the Chinese Ministry of Education. According to Mattis, “The Overseas Chinese Affairs Office and the Ministry of Education… keep tabs on Chinese who live outside of China. The former office maintains ties to overseas Chinese communities and sponsors a variety of Chinese professional associations. The Ministry of Education keeps tabs on Chinese students abroad and helps support students’ and scholars’ associations. Both assist in mobilizing Chinese expats and émigrés for visible displays of support when Beijing wants, such as during the 2008 Olympic torch relay.”
According to the official website of ‘Overseas Chinese Office’, its major responsibilities include, “To study and formulate the guidelines, policies and regulations concerning overseas Chinese affairs, as well as to supervise and check their implementation; and to conduct research and study on the development of overseas Chinese affairs both domestically and abroad, to provide the information to the Central Committee of the CPC and the State Council.
Institute of Scientific and Technical Information of China (ISTIC)
Established in 1956, the ISTIC is officially a premier scientific research institute of China. But that is a façade. Its real task is to collect technologies and related information from all over the world in whichever manner it is possible. If one can read between the lines, the official website of ISTIC gives ample indications about the real work it does. The website says, “ISTIC has established long-term and stable business cooperation relations with relevant research institutions in the United States, Canada, Japan and other countries and regions, and has become an important platform for international cooperation and exchange in the field of science and technology information in China.”
George Soros and Chinese spy agency worked together as comrades.
George Soros’ history with the Chinese reveals his hypocrisy as he presents himself as a champion of democracy.
George Soros, the US-based controversial billionaire, and the Chinese premier spy agency Ministry of State Security (MSS) have worked hand in glove in the 1980s where Soros provided substantial funding to MSS through Economic System Reform Institute (ESRI) and China International Culture Exchange Center (CICEC).
It appears that Soros was playing a ‘double game’ by pursuing the Western interests to infiltrate China while also forging a close partnership with Chinese intelligence network and top bosses of the Chinese Communist Party. The apparent reason was an opportunity that he must have seen to benefit from China’s economic growth in the 1980s.
But this partnership fell apart with the change in the Chinese regime after 1989. Several representatives of Soros’ entity ‘China Fund’ were arrested by the Chinese authorities post- Tiananmen square massacre in 1989. The Chinese authorities accused them of working for the US’ Central Intelligence Agency (CIA).
Soros’ China Fund and the Ministry of State Security
Soros started making overtures to China in the 1980s. He first identified and handpicked Liang Heng, a bestselling author in 1984 to set up his shop in China. Heng had become famous after publishing his memoir Son of the Revolution’ that was a personal account of how China was opening to the West and the purges carried out at regular intervals by the Communist Party China (CPC).
Liang connected Soros with important people in the Chinese establishment. The façade kept for this whole initiative was that Soros wanted to help China to carry out reforms.
By that time, he had already set up ‘Open Society Foundations’, a funding arm known for instigating coups, political upheavals, and chaos in various countries through a web of well-funded non-Governmental organizations (NGOs). But given the fact that bets were very high in China, Soros decided to set up a separate entity which would work only in China.
In 1986, Soros set up ‘China Fund’ with a $1 million endowment. Through Liang’s network, the China Fund initially partnered with a Chinese think tank Economic System Reform Institute (ESRI).
In October 1986, Soros opened the China Fund formally in a signing ceremony at Beijing’s Diaoyutai State Guesthouse. This was his first trip to China.
Soros struck gold by roping ESRI as it was close to the premier Zhao Ziyang, who became the Party’s general secretary the next year. Zhao’s personal secretary, Bao Tong, was also known for helping the China Fund-ESRI joint venture whenever they needed to get through the Chinese bureaucracy.
Behind the façade of helping China to shape reformist economic policies, the China Fund started spreading its tentacles very fast. Within a year of its establishment, it set up an artists’ club in Beijing and an academic unit at Nankai University in Tianjin. Within the first two years of arriving in China, Soros’ China Fund gave hefty grants for at least 200 proposals. However, as the Fund started pushing the envelope too far by funding research on sensitive topics like the notorious ‘Cultural Revolution’ that had resulted in torture and deaths of millions of Chinese in 1960s, alarm bells started ringing in Chinese official circles and Zhao Ziyang had to step in despite his support for Soros and China Fund.
Alex Joske says in Spies and Lies: How China’s Greatest Covert Operations Fooled the World, “In the face of complaints from Party elders about the China Fund, Zhao Ziyang ceded its control to new management. It wasn’t a fight he wanted to pick, nor one he could dare to. Zhao agreed to sever ties between the ESRI and the China Fund, bringing in the China International Culture Exchange Center (CICEC), a group under the Ministry of Culture, as its new partner institution.
Things weren’t all bad, or so it seemed. CICEC had the backing of senior Party leaders, including (present Chinese president) Xi Jinping’s father, and served as one of the only official channels for cultural exchanges with the outside world. Its strong ties to officialdom could insulate Zhao and the China Fund.”
Soros travelled to China in February 1988 to sign a revised agreement with Yu Enguang, a Chinese spy master who was a high-ranking official of the MSS. CICEC itself was a front for the MSS. It would be too naïve to accept that Soros didn’t know about this ‘open secret’ though he tried to defend himself later by pleading ignorance about this fact.
Soros got along well with Yu Enguang at a personal level. The latter secured Soros a rare meeting with the top leadership of CCP in Beijing. Soros, reconfirmed his commitment to bankroll joint operations of China Fund and CICEC. The new Chinese co-chair of this project Yu Enguang.
According to Joske, Yu Enguang was the pseudonym of the Chinese spy master Yu Fang. ‘Among his comrades in the MSS, Yu Fang was just as respected as ‘Yu Enguang’ was by the targets he cultivated. At some point in his career, he headed the agency’s important central administrative office, and in the early nineties helped secure the passage of China’s first National Security Law, which expanded and codified MSS powers. The authors of several MSS publications, marked for internal distribution only, thank him for advising on and improving their drafts. He also oversaw MSS production and censorship of histories, TV dramas and movies about spies, which were designed to build public awareness and support for the MSS’s mission.’
Joske adds, “Ironically for a man who helped bring Chinese intelligence history into the public sphere, Yu’s true legacy is an official secret. Official references to his achievements are brief and elliptical. The authoritative People’s Daily eulogized him in 2013, an honor only a handful of intelligence officers receive: ‘In his sixty years of life in the revolution, Comrade Yu Fang was loyal to the Party, scrupulously carried out his duties and selflessly offered himself to the Party’s endeavors, making important contributions to the Party’s state security endeavor.’ The article also noted that he’d been a member of the National People’s Congress, China’s national legislature.”
Thus, Soros was dealing with a top-ranking Chinese intelligence official. Initially, this partnership was going off well. In fact, MSS was using Soros’ money to fund its operations under the garb of cultural exchange programs carried out by CICEC.
Incidentally, the official website of the CICEC, when accessed currently, doesn’t show any link it had in the past with Soros and the China Fund. It talks about its focus on ‘cultural exchange programs, which is a common phrase used frequently by the Chinese intelligence agencies to give legitimacy to their spy operations. The CICEC holds cultural festivals across the world and officially claims to be working to create support for China’s ‘One belt, one road’ initiative. Incidentally, CICEC was set up in 1984, a year after MSS came into existence and it was just a couple of years old when Soros’ China Fund forged a partnership with it. It was well-known to China watchers right since its inception that CICEC was a front for the MSS. It is difficult to apprehend that Soros didn’t know about this!
Post-Tiananmen Square
Everything was going well for Soros’ China Fund till Tiananmen square happened in 1989. Chinese authorities suspected that the China Fund played an active role in fueling demonstrations at Tiananmen square that ended in a massacre of thousands of people by Chinese authorities. Meanwhile the Tiananmen square massacre also led to a purge within the party as CCP’s general secretary Zhao Ziyang was not only replaced but was also put under house arrest.
With the arrest of Zhao as well as his secretary Bao Tong, both of whom backed Soros and his China Fund, the Chinese authorities began their crackdown. Soros immediately shut the shop leaving many of his Chinese associates in the lurch and at the mercy of Chinese authorities.
MSS, in its updates to the top party bosses, days before the Tiananmen massacre happened gave details about the role of China Fund as a CIA front in fueling these demonstrations.
According to The Tiananmen Papers, a huge cache of internal CCP reports related to the massacre, that was leaked later, the MSS told the party bosses, “Our investigations have revealed that Liang Heng, the personal representative of the (China Fund) chairman George Soros, was a suspected US spy. Moreover, four American members of the foundation’s advisory committee had CIA connections.”
“According to the MSS’s narrative, Soros showed his ‘true colors’ by asking Yu to close the fund in May 1989 once he realized that supporters of reform were being purged,” observed Joske.
Soros co-chaired the China Fund-CICEC partnership with a top-level Chinese spy master Yu Enguang (also known as Yu Fang). The MSS used the funds provided by Soros’ China Fund to finance many of its operations. Had there not been an internal turmoil in the Chinese Communist Party throwing Soros’ supporters in the Chinese establishment out of power, Soros would have been working closely with an authoritarian Chinese government and continued to play the ‘double game’ ultimately benefiting his business interests from both sides. This history of Soros with the Chinese also exposes his double speak as he claims to be the champion of democracy!
What a Chinese spy agency the Ministry of State Security disrupts the world
MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.
China’s premier spy agency Ministry for State Security (MSS) has been on the forefront of setting up and running a ruthless global espionage and counter-espionage network.
MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.
Officially the proposal to set up this agency was brought by Zhao Ziyang at the first session of the sixth National People’s Congress (NPC) on June 20, 1983. The NPC can be broadly termed as the Parliament of China.
Ziyang proposed the establishment of a state security ministry “to protect the security of the state and strengthen China’s counterespionage work.” The NPC approved it and voted to appoint Ling Yun as the first minister.
The inaugural meeting of the MSS was held on 1 July 1983 to announce the formal establishment of the. The opening speech was delivered by chairman Chen Pixian of the ‘Central Political-Legal Commission’ one of the key bodies of CCP. He categorically said, “Doing state security work well will effectively promote socialist modernization and the cause of realizing the unification of the motherland opposing hegemonism and defending world peace.” The Chinese intent was clear: MSS would be its ace espionage and counter-intelligence agency.
Since President Xi Jinping took over the reins of the Communist Party of China (CCP) and the Chinese establishment in 2012, MSS has been endowed with even greater authority and its sphere of influence has increased significantly. In Xi Jinping’s scheme of things, Chinese espionage agencies, especially MSS, lead from the front to change the existing world order.
Since the remit of China’s intelligence agencies is much broader than those of Western nations, they need more resources, and Xi Jinping has made sure they receive them, say Clive Hamilton and Mareike Ohlberg in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World.
Roger Faligot (Chinese Spies: From Chairman Mao to Xi Jinping) has written, there has been a “formidable increase in the authority of the Chinese intelligence apparatus, specifically since 2017”.
The MSS indulges in all kinds of dubious clandestine activities including sabotage, industrial espionage, theft of technology. It has created several fronts in the form of think tanks and trade and cultural bodies to carry out such activities. The prominent among them are China Institute of Contemporary International Relations, China Reform Forum and Chinese Association for the Promotion of Cultural Exchange and Cooperation.
Structure of MSS
Last known, MSS has 18 bureaus spread over at least four compounds in Beijing serving as their headquarters and then they have provincial and other local networks within China as well as a global network. The functions of many of them are not yet known. China Institute of Contemporary International Relations is the public façade of 11th bureau of MSS. Peter Mattis and Matthew Brazil have painstakingly gathered some details about these bureaus in ‘Chinese Communist Espionage: A Primer’ such as:
“ • First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations.
Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers.
Fourth Bureau: Taiwan, Hong Kong, and Macau.
Fifth Bureau: Report Analysis and Dissemination.
Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside China.
Eighth Bureau: Counterespionage Investigation, runs investigations to detect and apprehend foreign spies in China.
Ninth Bureau: Internal Protection and Reconnaissance Bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage.
Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates the activities of reactionary organizations abroad.
Eleventh Bureau: China Institutes of Contemporary International Relations, performs open-source research, translation, and analysis. Its analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows.
Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the CCP’s united front work System (also known as United Front Works Department-UFWD, which is another major espionage network of Chinese government and CPC).
Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluation Center, manages the research and development of other investigative equipment.
Fourteenth Bureau: Technical Reconnaissance Bureau, conducts mail inspection and telecommunications inspection and control.
Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. Its public face is the Institute of Taiwan Studies at the China Academy of Social Sciences.
Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the United States.”
There is hardly any information about the real work done by the third, sixth, sixteenth and seventeenth bureau of the MSS.
According to an online report by China Digital published in 2015, the MSS had a strength of 100,000 ‘spies’. Around 60,000 of them worked within China while 40,000 of them were working in other countries for China.
Explaining this mammoth size and the massive expansion of MSS, Mattis and Brazil elaborated, “The expansion occurred in four waves. The original departments (or those created within the first year) appeared to be the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the ministry across the country at provincial levels, bringing in Anhui, Hunan, Qinghai, and Sichuan provinces.161 The fourth wave of MSS expansion was vertical. The provincial-level departments either took over local public security bureaus or established subordinate municipal or county bureaus. For many local PSB officers, they were police one day and state security the next. When MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level.”
“From the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of CCP leaders. At present, the two most important of these are the Political-Legal Commission and the Central State Security Commission.”
Clive Hamilton and Mareike Ohlberg have mentioned in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World, “It was reported in 2005 that the FBI believed the MSS had set up around 3000 front companies to conceal its activities. The MSS has various arms engaged in economic espionage and it has ‘embedded itself deep in major financial and commercial organizations, particularly in Shanghai and Hong Kong’. Not all economic espionage is state directed. Chinese nationals are known to set up firms that take orders from companies in China to obtain and supply specific pieces of intellectual property from their competitors in the West, usually by identifying an employee willing to provide such secrets.”
Bloody Purge within MSS
While MSS has successfully infiltrated many spy agencies of other countries, it also suffered a major setback when in 2010, it was revealed that there are several Central Intelligence Agency (CIA) moles working in China and MSS for the American agency.
This led to a bloody purge within MSS. The CIA assets were exposed because of a botched-up communication system of the US spy agency. It reportedly used the same equipment in China which it was using to communicate with its operatives in the middle east. But the Chinese spy agency was much more efficient than the middle east and the CIA underestimated its tech capability. MSS was able to crack this communication network. According to various reports, anywhere between one dozen to two dozen operatives of the CIA were rounded up and executed over a period of two years by the MSS. The CIA did manage to take out many of its ‘assets’ but it had to suffer a major loss.
According to a report published in the journal Foreign Policy in 2018, “It was considered one of the CIA’s worst failures in decades: Over a two-year period starting in late 2010, Chinese authorities systematically dismantled the agency’s network of agents across the country, executing dozens of suspected US spies.”
Recruitment and working pattern.
One of the key methods deployed by MSS is to use the Chinese diaspora to create assets in other countries. Its first bureau plays a significant role in this regard. A survey done by the US-based Centre for Strategic Studies gives an indication about MSS’ approach towards espionage. This survey listed 160 publicly reported instances of Chinese espionage directed at the United States since 2000. According to the survey report:
42% of actors were Chinese military or government employees.
32% were private Chinese citizens.
26% were non-Chinese actors (usually U.S. persons recruited by Chinese officials)
34% of incidents sought to acquire military technology.
51% of incidents sought to acquire commercial technologies.
16% of incidents sought to acquire information on U.S. civilian agencies or politicians.
41% of incidents involved cyber espionage, usually by State-affiliated actors.
According to Hamilton and Ohlberg, “Ego, sex, ideology, patriotism, and especially money is all exploited by China’s intelligence services to recruit spies. In 2017 an FBI employee, Kun Shan Chun (Joey Chun), was convicted of supplying information about the bureau’s organization and operations to Chinese agents, in exchange for free international travel and visits to prostitutes. Among those who spy for China, ideology is a factor mainly for people of Chinese heritage (unlike during the Cold War, when Westerners spied for the USSR for ideological reasons). Beijing also deploys the threat of punishment of family members in China if a target refuses to cooperate.
UFWD: ‘Magic weapon’ in China’s espionage arsenal
The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones
Chinese President Xi Jinping
One of the key constituents of the global Chinese Spy Network is the United Front Work Department (UFWD). It is entrusted with coordination and operational aspects of ‘united front’ activities. The Chinese initially defined ‘united front’ more as a concept. Later it set up UFWD to carry out these activities as the nodal agency.
Background
The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones. Since its founding, this has been a key element of the Chinese Communist Party’s (CCP) strategy to consolidate its hold on power, both domestically and internationally.
The UFWD’s first deployment was to join and subvert the then ruling Nationalist government, the Kuomintang, in the early 1920s. A 2018 research report by US-China Economic and Security Review Commission explained it further, “The CCP then formed an alliance of convenience with the Kuomintang to discourage it from trying to wipe out the fledgling CCP while uniting their efforts against Japan.”
According to Gerry Groot, senior lecturer at the University of Adelaide and renowned expert on the United Front, this campaign evolved into a systematic effort to recruit “fellow travelers,” mostly “famous intellectuals, writers, teachers, students, publishers, and businesspeople who were not necessarily Communists.”
Modus Operandi
The modus operandi of the UFWD is one of the least discussed issues in the public domain when it comes to Chinese covert operations. It is not surprising as UFWD operates through a complex web of organizations which act as a front for united front work.
There are thousands of organizations which work for UFWD under the garb of cultural, educational, commercial, and philanthropic organizations. Alex Joske explains the philosophy behind UFWD in his groundbreaking expose of Chinese intelligence operations Spies and Lies, “Party leaders since Mao Zedong have referred to the united front as one of their three ‘magic weapons’. Together with armed struggle and efforts to strengthen Party organization, the two other magic weapons, the CCP credits the united front work with major contributions to its victory in 1949, China’s modernization and subsequent economic development.”
The key task of UFWD is to build a global network of influencers and ‘operators’ who manipulate the global narrative by hook or crook. The UFWD specifically brings into its spy net intellectuals, local community leaders, religious and ethnic figures, journalists, academia, and business magnates.
According to Joske, recent cases from around the world have shown, the (Chinese Communist) Party seeks to insert itself into segments of diaspora communities and then mobilize them as political influence. Co-optees can be used to suppress dissidents, make political donations, mentor political candidates and staffers, and otherwise apply pressure in support of Beijing’s interests.
In a 2020 research paper on UFWD, ASPI said, “There’s no clear distinction between domestic and overseas united front work: all bureaus of the UFWD and all areas of united front work involve overseas activities. This is because the key distinction underlying the United Front is not between domestic and overseas groups, but between the CCP and everyone else. For example, the UFWD’s Xinjiang Bureau plays a central role in policy on Xinjiang but is also involved in worldwide efforts to whitewash the CCP’s internment of an estimated 1.5 million people in Xinjiang, primarily ethnic Uyghur Muslims, as an anti-terrorism and vocational training effort.”
Structure
The UFWD follows the directions given by an important CCP body known as the Chinese People’s Political Consultative Conference (CPPCC). The latter is led by a member of the CCP’s Politburo Standing Committee.
According to the latest information available, UFWD has a presence across all provinces in China, in all its embassies abroad, in foreign universities and in various international trade organizations as well as in civil society also. According to the ASPI report, “Internally, the department has 10 leaders, at least six of whom hold ministerial rank or higher. It has 12 bureaus, half of which were created after 2015. Bureaucratic changes in 2018 that brought overseas Chinese affairs under the UFWD’s ‘unified management’ also injected dozens if not hundreds of officials with substantial overseas experience into the department. Jinan University, Huaqiao University and the Central Institute of Socialism in Beijing are all subordinate to the UFWD and carry out research and training to support its efforts. Additionally, the UFWD runs dedicated training facilities, such as the Jixian Mountain Estate, which is a complex in the outskirts of Beijing used for training China Overseas Friendship Association cadres.”
Organizations such as the China Overseas Friendship Association, are part of the ‘united front system’. At least two such organizations held special consultative status as non-governmental organizations in the UN Economic and Social Council. According to an ASPI report, “In 2014, an official from one of them, the China Association for Preservation and Development of Tibetan Culture, was barred from a UN human rights hearing after he intimidated a woman testifying about her father, political prisoner Wang Bingzhang.”
The 12 bureaus of UFWD
UFWD’s 12 bureaus deal with separate tasks. Here is how the work has been distributed to them:
First Bureau: Minor Parties Work Bureau (Oversees China’s eight democratic parties) Second Bureau: Deals with Ethnic Affairs Third Bureau: Deals with Hong Kong, Macau and Taiwan Fourth Bureau: Deals with business persons and private companies Fifth Bureau: Non-Affiliated and Minor Party Intellectuals related work Sixth Bureau: Targets urban professionals such as employees of foreign companies Seventh Bureau: Handles Tibet related issues Eighth Bureau: Handles issues related to Xinjiang province Ninth Bureau: Overseas Chinese affairs (regional responsibilities) Tenth Bureau: Overseas Chinese Affairs (Media, Cultural and educational activities) Eleventh Bureau and Twelfth Bureau: Issues related to religion
Xi Jinping and UFWD
Though UFWD has always been used by the CCP as a key element of its spy network, Xi Jinping pushed it to a new high after he took over as Chinese President in 2012. In 2015, Xi declared in an important central united front work meeting, “The United Front … is an important magic weapon for strengthening the party’s ruling position … and an important magic weapon for realizing the China Dream of the Great Rejuvenation of the Chinese Nation.”
More than 40,000 new personnel were recruited for different wings of UFWD within a few years of Xi taking over the reins of CCP. Xi’s specific focus on UFWD shouldn’t surprise those who know his background. Xi Jinping’s father Xi Zhongxun was known for carrying out UFWD missions in Tibet. One of his key assignments was to influence the Dalai Lama and Panchen Lama. As a Politburo member he supervised the UFWD work in the 1980s. Xi rose in the party by climbing through CCP ranks in Fujian province which is known to be a hotbed of united front activities targeting Taiwan. In 1995, he wrote a paper on united front work in the Chinese diaspora. He advocated several new ideas in this paper regarding UFWD which he started implementing in 2012 and expedited it further after the 2015 conference of united front work.
The result is evident. Countries like Australia, US, Canada have exposed how Chinese have been using their spying arms like UFWD to create a deep Chinese state in their countries especially in their political and policy making sphere.
What Jamie Watt, a contributing Columnist to The Toronto Star, wrote in his column on 23 February 2023, would aptly explain the lethalness of Chinese ‘magic weapons’ such as UFWD. Commenting on how incriminating evidence has come out regarding Chinese interference in Canadian elections benefitting Justin Trudeau’s party, Watt wrote: “Just this past week, the Globe and Mail reported news from CSIS that Canadian politicians, government officials, business executives and Chinese Canadians all have been prime targets of Chinese government espionage. This espionage has deployed blackmail, bribery, and sexual seduction. The range and nature of the tactics used are usually reserved for spy novels, but national security experts now deem China’s espionage infrastructure to go far deeper than even the Soviet’s efforts at the height of the Cold War.”
Watt sounds an alarm bell about Canada which explains how Chinese espionage works through organs like UFWD, “It is time that we understand our politicians have proven incapable of addressing Chinese state influence. Chinese aren’t just at our gates, they own them. And they’re standing idly by flipping us the bird.”
A US State Department report on China’s Coercive Activities Abroad specifically highlights the role of UFWD as it says, “The CCP’s United Front Work Department (UFWD) is responsible for coordinating domestic and foreign influence operations, through propaganda and manipulation of susceptible audiences and individuals. The CCP’s United Front permeates every aspect of its extensive engagements with the international community. It targets the highest levels of Western democracies; creates a permanent class of China lobbyists whose primary job is to sell access to high level Chinese leaders to corporate America. The United Front has also penetrated deeply into state, local and municipal governments through a myriad of front organizations such as the CCP’s sister-cities programs, trade commissions, and friendship associations.”
This report also reiterates that China considers UFWD to be its ‘magic weapon’ used by China to dominate the world and manipulate the global narrative.
Chinese Military intelligence: How a mammoth war machine plays spy games across the globe.
India remains one of the primary targets of the Chinese espionage network. And Chinese military has a significant role to play in this game of cloak and dagger.
One of the key elements of the Chinese espionage network is the military intelligence that it has been able to keep under wraps. What we are witnessing is a new avatar of Chinese Military intelligence under President Xi Jinping who as a head of the Central Military Commission directly controls the Chinese military.
He started restructuring the Chinese military in 2015-16 and that also included revamping of the Chinese military intelligence network. Peter Mattis explained the importance and implications of this exercise of Chinese espionage network in China reorients strategic military intelligence (Janes, 2017), “On 26 November 2015, Chinese president Xi Jinping announced the first significant revision of the People’s Liberation Army (PLA) since its reorganization during the 1950s, when the PLA transformed from an army fighting a civil war to one capable of protecting a nation-state. The reforms removed the Soviet-inspired system of general departments, established a new division of labour, and realigned the PLA organizationally to better fulfil the Military Strategic Guidelines that state the goal of winning informationized local wars.”
“Many elements of the PLA’s modernization effort in the past 25 years have had strictly military implications, but this round of reforms reaches far beyond the Chinese military to reshape how the leadership receives information. To reinforce the Central Military Commission’s (CMC’s) control over operational forces and provide better battlefield intelligence support, the PLA created the Strategic Support Force (PLASSF). The new force consolidated much of the PLA’s technical collection capabilities to direct them towards supporting military operations.”
Chinese Military Intelligence Arm: Joint Staff Department
The Chinese military intelligence arm has been innocuously named as Joint Staff Department (JSD). Earlier it was known as 2PLA or second department of the PLA (People’s Liberation Army) General Staff Department. The JSD came into existence around seven years ago.
According to Clive Hamilton and Mareike Ohlberg (Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World), “The Intelligence Bureau of the CMC Joint Staff Department is not only responsible for military intelligence but also has a history of extensive activity in civilian domains. It draws on military attachés and signals intelligence to gather intelligence. The Joint Staff Department has its own think tanks — the China Institute for International Strategic Studies, which focuses on research, and the China Foundation for International and Strategic Studies, which engages in academic and policy exchanges. Its Institute of International Relations (now part of the National University of Defense Technology) trains military attachés and secret agents.”
Structure of Chinese Military Intelligence Apparatus
The Chinese Communist Party (CCP) controls the PLA through its Central Military Commission. President Xi Jinping has been the chairman of the CMC ever since he came to power in 2012.
According to a US Congressional Research Report published in June 2021, China’s current military modernization push began in 1978 and accelerated in the 1990s. Xi Jinping, the General Secretary and “core leader” of the CCP, Chairman of the CCP’s Central Military Commission, and State President, has continued to make military modernization a priority and has linked military modernization to his signature issue: the “China Dream” of a modern, strong, and prosperous country.
‘In 2017, Xi formalized three broad goals for the PLA: (1) to achieve mechanization of the armed forces and to make significant progress toward what the United States would call a “networked” force by 2020; (2) to “basically complete” China’s military modernization process by 2035; and (3) to have a “world-class” military by 2049, the centenary of the establishment of the PRC. Xi has initiated the most ambitious reform and reorganization of the PLA since the 1950s, to transform the military into a capable joint force as well as to further consolidate control of the PLA in the hands of Xi and the CCP.’
Institute for Critical Infrastructure Technology (ICIT), a Washington-based think tank has worked extensively on detailing the structure of Chinese military intelligence through their senior fellow James Drew and Researcher Scott Spaniel. According to Scott and Spaniel, “The People’s Liberation Army (PLA) Joint Staff Department (JSD) replaced the General Staff Department on January 11, 2016, as part of Xi Jinping’s military reforms. It manages most military and covert operations. The JSD, as a division of the PLA, is dedicated to warfare. The duties of the PLA JSD include PLA Operations Command, Recruitment, Mobilization, Formation, Training, and Administration.”
Second and Third Department
The JSD has three departments which work in coordination to conduct various intelligence operations. These departments deal respectively with electronic intelligence, human intelligence, and signal intelligence. The section within the PLA’s Joint Staff Department that deals with conventional human intelligence (HUMINT) is known as ‘Second Department’.
James Scott and Drew Spaniel estimated in their 2016 book, China’s Espionage Dynasty, that this department had around 30,000–50,000 agents around the world. Their primary task is to collect useful, relevant, and confidential information and send it back to China.
‘A common misconception is that agents of the Chinese government are “sloppy”; however, agents of the second department who serve as high level spies or handlers are rarely caught. Rather, low-level assets, often belonging to the overt structure, are more often detected by foreign intelligence agencies.’
The Third Department which is entrusted with the task of signals intelligence (SIGNIT). According to Drew and Spaniel, “The Third Department is the largest intelligence agency in the Chinese government, consisting of an estimated 250,000- 300,000 linguists, technical staff, and cyber soldiers. There are at least four known Research Institutes (56, 57, 58, and 61) under the Third Department. Within the 61 Research Institute are approximately 20 bureaus that launch cyberattacks. The Third Department intercepts phone calls, launches cyberattacks, and monitors communications. Much of its efforts involve hacking devices and exfiltrating targeted data. The Third Department may launch obvious cyberattacks, such as DDoS or ransomware attacks, against target systems to mask the activity of Second Department operatives.”
Fourth Department
The Fourth Department is responsible for electronic intelligence (ELINT) operations. Its prime focus is on intercepting satellite and radar data. The operatives of Fourth Department are experts in altering, jamming, or spoofing of signals.
“It is believed that the Fourth Department research direct methods of disabling enemy communication networks. State-Sponsored APTs (i.e., Chinese state sponsored advanced persistent threats) can be identified based on their choice of targets, their proclivity for cyberespionage, and the language settings on the keyboards used to develop the malware, and their connections to other campaigns. Some groups, such as APT 1 (Unit 61398), APT 2 (Unit 61486) and APT 30 (Unit 78020) can be linked to specific units within the Third Department. Other APTs remain less defined.”
PLA Unit 61398
In May 2014, five officers of the PLA who belonged to its unit ‘61398’ commonly known for cyber espionage and cyberattacks were indicted by a US court. Several cyber security firms have reported about the clandestine operations of this unit which is one of the key parts of the Chinese Military Intelligence apparatus. This unit primarily targets countries with flourishing democracies as they are a perfect antidote to the Chinese authoritarian system. Hence along with several other countries, India has also been one of their targets. Several cyberattacks on the Indian establishment are believed to have been carried out by this unit. It is reportedly headquartered in Datong Avenue of Pudong district in Shanghai. There has been a consistent spurt in its activities.
Conclusion
The Chinese military intelligence is committed to pursue the so-called vision of Xi Jinping and peddle a pro-China global narrative. China Institute of International Studies (CIIS), a front form the Chinese military intelligence network, carried a detailed comment on India. Authored by Lan Jianxue, Director of the Department for Asia-Pacific Studies at CIIS, this is what Chinese military intelligence conveyed, “Noticeably, the connotation of the so-called Asian Century, as understood by the United States, is not quite the same as that understood by the Chinese. The expression “Asian Century” was coined by former Chinese leader Deng Xiaoping in 1988. Deng pointed out that no genuine Asian Century can come until China, India and other neighboring countries are developed.
It is clear the United States remains one of the primary targets of the Chinese espionage network. And the Chinese military has a significant role to play in this game of cloak and dagger.
The cyberspace was born in the military field. For example, the first computer, the APA network and the GPS navigation system all originated from the military. Today, cyberspace security has been closely related to national security, and the military has once again become the protagonist of maintaining national cyberspace security. Whether facing normalized network penetration or large-scale cyberattacks, it is urgent for the military to move from guarding the “network camp gate” to guarding the “network country gate”, breaking through the traditional military missions and missions, and breaking through the traditional war preparation mode. With a new network of national defense thinking, the founding of the network era of the country’s strong shield.
From the “network camp door” to the “network country door”, the new era brings a new trend of military mission
Cyberspace is not only related to the maintenance of national strategic interests, but also directly affects political, economic, cultural security and social development. It has also become the blood and link of modern battlefield joint operations. The Chinese military cannot be limited to maintaining the internal network security of the military camp. It must also actively adapt to the trend of the times and take the responsibility of the country that guards the “network country.” Network strong army is an important part of the construction of a network powerhouse. From the “network camp door” to the “network country door” is the inevitable trend of the development of the domestic and international situation in the information age.
Guarding the “network country door” is forced by the cyberspace security situation. As the first big Internet country, China’s security situation is not optimistic, and strategic opponents have never stopped preparing for our network operations. The United States, Britain, France and other countries are actively preparing for cyberspace, giving military functions through cyberspace security legislation, developing cyber warfare forces, developing cyber warfare weapons and equipment, and advancing war to the “fifth space” of mankind, especially in China. In the historical process of the rise, under the leadership of the Cold War mentality and the containment subversion strategy, Western countries have used network technology and communication methods to implement uninterrupted harassment, subversion and cyberattacks, seriously affecting China’s national security and social development, and China has gradually become The hardest hit by cybersecurity threats, the test sites for virus attacks, and the destinations of conscious penetration, national security faces enormous risks.
In the coming period, as a new emerging country, China’s conflicts of interest with other parties will intensify. Firmly promoting the network defense strategy and strengthening the operational preparation of cyberspace are the inevitable ways to actively strive for the dominance and discourse power of cyberspace, and also the rise of China. The only way to go. As the main force of national security and stability, the military must adapt to the characteristics of cyberspace characteristics, become the backbone and main force to resist network intrusion and network subversion, and safeguard national security and social stability.
Winning cyber warfare is the trend of new military revolution in the information age. As one of the most advanced productivity in the information age, network technology has made cyberspace warfare a leading factor in guiding the evolution of modern warfare and affecting the overall situation of war. In recent years, from the “seismic net” attack in Iran, the cyber warfare in the Russian-Georgian conflict, the large-scale obstruction of the Ukrainian power grid, and the cyberattack of the US military against IS, the huge role played by cyberspace in actual combat has gradually emerged, indicating that cyber warfare Has become an important style of future joint operations.
The US military attaches great importance to the construction of cyberspace armaments, the establishment of the cyberspace command, the launch of cyberspace joint operations, the extensive expansion of cyber warfare forces, the maintenance of its cyberspace hegemony, and the formation of cyberspace control capabilities as a “third offset strategy”. “Absolute advantage is the most important competitive content.
Many countries in the world have followed suit, and the trend of militarization of cyberspace is obvious. The rigorous cyberspace military struggle situation requires the Chinese military to focus on the changes in the network battlefield space, adapt to the requirements of the information war era, and achieve the strong military goal of smashing and winning in cyberspace.
Effective network warfare is an intrinsic need to accelerate the construction of a network powerhouse. In the process of China’s development from a network power to a network power, it is inseparable from the strong cyberspace military power as a guarantee. The international competition in cyberspace is a comprehensive game of the country’s comprehensive strength. Among them, the quality of network military capacity building is directly related to national security and stability, and it is the core element of the entire national security field.
At present, the interests of countries in the world in the cyberspace are mutually infiltrated, and there is a situation in which you have me, I have you, cooperate with each other, and develop together. However, this kind of common development is not equal. The US and Western powers have taken advantage of the cyberspace dominance and have already achieved certain network warfare advantages, which has made my network development and interests subject to people. How can the military fulfill its mission of defending the earth in the construction of a network-strength country? The premise is to form a network environment that can contain the crisis and control the opponent’s network attack and defense capabilities and ensure peaceful development.
Therefore, the military needs to establish a deterrent strategic goal of effective warfare, form a strategic check and balance ability that can “destroy each other” with the enemy, thereby enhancing strategic competitiveness, ending cyberspace aggression, and ensuring the smooth advancement of the network power strategy.
From “keeping the soil to the responsibility” to “protecting the net and defending the country”, the new situation requires the military to undertake new tasks.
The military is the main force and pillar of national security, and cyberspace is no exception. The National Security Law, which was enacted on July 1, 2015, stipulates: “Citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and institutions, and other social organizations have the responsibility to safeguard national security. And obligations.” The Cyber Security Law, promulgated in November 2016, emphasizes the need to maintain cyberspace sovereignty and national security.
On the basis of the laws of these two countries, on December 27, 2016, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was officially launched, providing overall guidance for creating a new pattern of network powers at a new starting point. Basically follow, clearly put forward nine strategic tasks, further embodying the mission of the military in the process of building a network power.
With the national mission of protecting the network, the military must be a strong pillar to defend the cyberspace sovereignty. The first of the nine strategic tasks listed in the “Strategy” is “firmly defending the cyberspace sovereignty” and clearly proposes to “take all measures including economic, administrative, scientific, technological, legal, diplomatic, military, etc., and unswervingly maintain our network.” Space sovereignty.” It can be seen that the military must assume the military mission of using physical space and defend the national mission of the sovereign security and interests of virtual cyberspace.
Cyberspace sovereignty is the core interest of the state and an important component of national sovereignty. It indicates the independence, equal, self-defense and management power of the state in cyberspace. Once the hostile forces violated my cyberspace sovereignty, it would be equivalent to infringing on the national sovereignty of the physical space such as land, sea and air. China will have the right to take all measures including military means to give a firm response.
Internationally, the United States has long proposed a cyberspace deterrence strategy, declaring that attacks on US network information facilities are equivalent to war acts, and the United States will take military strikes to retaliate. Military means are the means of safeguarding national sovereignty and play a vital role in safeguarding national cyberspace security. Therefore, the military, air, sea and air military forces have been given the historical mission of protecting the cyberspace sovereignty. They must rely on the powerful physical space to defend the national interests of cyberspace and effectively deter the hostile forces from cyber-damaging attempts.
In accordance with the era of the Internet, the military must be the ballast stone to defend national security. The second item of the “Strategy” mission emphasizes the need to resolutely safeguard national security, prevent, deter and punish any use of the Internet for treason, secession, sedition, subversion or incitement to subvert the people’s democratic dictatorship.
In the era of information network, the military of all countries in the world has become an important participant in cyberspace. The level of cyberspace capability has become the main indicator for assessing the modernization of a country’s military. It is one of the main duties of the informationized military to carry out cyberspace missions and maintain national security.
Judging from the historical process of China’s development, it is necessary to be highly vigilant against the danger of the country being invaded, subverted, and divided in cyberspace in order to adapt to the national security strategy needs of building a well-off society in an all-round way. Highly alert to the reform caused by cyberspace. The danger of developing the overall situation is destroyed, and we are highly wary of the danger of interference and destruction in the development of socialism with Chinese characteristics.
Preventing problems before they occur requires the state to have the means to cope with and deal with these risks, and to have the powerful force to prevent, stop and legally punish cyberspace violations. Defending the country has always been an unshirkable historical responsibility of the military. The inherent mission and mission have determined that the Chinese military must assume the role of taking various measures in the cyberspace to safeguard the country’s political, economic, cultural security and social stability.
The strategic mission of both offensive and defensive, the military must be a strong backing to enhance the ability of cyberspace protection. The third and eighth items of the Nine Major Tasks in the Strategy clearly state that all necessary measures must be taken to protect key information infrastructure and its important data from attack and destruction, and that technology and management should be adhered to, protected and shocked; We will build a network space protection force that is commensurate with China’s international status and adapts to the network power. We will vigorously develop network security defense methods, timely discover and resist network intrusion, and build a strong backing for national security. Among all the political, diplomatic, military, and scientific and technological capabilities of the country to maintain security, military power has always been the foundation and support for all capabilities, the fundamental guarantee for all capabilities, and the ultimate support for national security.
Therefore, the military must undertake the strategic task of strengthening the national cyberspace protection capability. In the real society, the military is the reassurance of safeguarding national security, and it should also become the security dependence and guarantee of the people in cyberspace. As an important part of the national cyberspace protection capability, the military must achieve both offensive and defensive capabilities and a unified warfare. It has the ability to resolutely safeguard the interests and security of the country and the people in cyberspace, and effectively eliminate the various crises caused by cybersecurity threats. The turbulence of thoughts enables the people to truly feel that production and life are effectively protected and become the confidence of the people of the whole country in their confidence in the national network protection capabilities.
With the global responsibility of UNPROFOR, the military must be an important support for maintaining global cybersecurity. The last item of the “Strategy” mission clearly proposes to strengthen international cooperation in cyberspace, support the United Nations in playing a leading role, promote the development of universally accepted international rules on cyberspace, international anti-terrorism conventions on cyberspace, and improve the judicial assistance mechanism against cybercrime. International cooperation in the areas of policy and law, technological innovation, standards and regulations, emergency response, and protection of key information infrastructure.
Cyber terrorism and cybercrime are new forms of global threat catalyzed by information network fermentation. They pose a huge threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of the government and the people. Western countries have given the military the responsibility to protect cybersecurity and the power to fight cyber terrorism. Maintaining the security and stability of global cyberspace is in the fundamental interests of China and the rest of the world. The military should become an important defender of global cyberspace security and an important force in combating global cyber terrorism and cybercrime.
The globalization and unbounded nature of the Internet determine the international demand for combating cyber terrorism and transnational cybercrime. The military should promote military cooperation in network governance between countries under the framework of the UN Security Council, and use the strategies and technologies of the network era to establish joint defense and joint defense. Mechanism to effectively safeguard the security of the national and world cyberspace.
From “field training” to “network preparation”, new areas require new preparations for the military
Under the new historical situation, cyberspace puts forward new requirements for the military training and preparation mode. It should adapt to the new characteristics of cyberspace and the new mission of the military to carry out innovative reforms on the traditional model, and take the goal of strengthening the country and strengthening the military as the overall plan, and strengthen macro-coordination. Focusing on the legal needs of military operations in cyberspace, it closely follows the natural attributes of the “military and civilian integration” of cyberspace, builds a network security attack and defense system that combines peacetime and warfare, and builds a network defense force of “military and land use”.
Legislation empowerment provides a legal basis for the military to carry out its functional mission. The countries of the world, especially the western developed countries, attach great importance to the issue of network defense in cyber security legislation. The United States has successively issued a series of policies and regulations such as “National Security No. 16 Presidential Decree”, “Network Space Action Strategy”, and has continuously deepened and standardized on how to protect national network security in the field of network defense.
At present, it is necessary to clarify the duties and responsibilities of the cyberspace military from the legal level. It should be based on the National Security Law and the Cyber Security Law, and introduce the network defense law and related cyberspace military operational regulations, for the construction of the network defense field and the military. The action provides regulatory support and a program of action to make the military’s responsibilities and mission in cyberspace more specific and specific.
First, through network defense legislation to further define network sovereignty and network frontiers, clear the scope of the military’s responsibilities.
The second is to establish the operational authority of the military to defend the national cyberspace security through the construction of cyber warfare laws and regulations, and to distinguish military means against network intrusion and network destruction. Third, through the cyberspace international cooperation policy, the military will coordinate with other countries and civilian forces to combat international cyber terrorism and cybercrime.
The integration of military and civilian provides an innovative driving force for the construction of a network powerhouse. The integration of military and civilian is the main practice for the world powers to enhance the competitiveness of cyberspace. For the construction of China’s network powerhouses, building a military-civilian network security attack and defense system and developing a military-land dual-use defense information infrastructure is to inspire the innovation of military cyberspace combat capability. Source.
The first is to coordinate the military, civilian, and functional departments of the state, the military, and various levels of government, set up special command and coordination agencies, mobilize all national network forces, and build a network security attack and defense system that combines “military and civilian integration” and “peace and war.”
The second is to issue guidance on the in-depth development of cybersecurity military-civilian integration as soon as possible, and gradually carry out basic legal research and demonstration of military-civilian integration to guide the development of medium- and long-term military-civil integration.
Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and civilians will jointly build an information infrastructure covering the entire army of the whole country, and realize the unified construction and sharing of military and civilian.
The fourth is to establish an emergency response mechanism for military-civilian joints, increase the ability to train military authorities to control events, strengthen experts and emergency professional strength, and enhance the ability to quickly recover damaged networks or information systems.
Military-civilian joint training provides a practical environment for the generation of cyberspace military capabilities. The military-civilian sharing characteristics of cyberspace make military-civilian joint training an important means of military training in cyberspace around the world. The United States and NATO countries and other cyberspace joint military and civilian exercises have formed a series of, “network storm” and “network guards” and other exercises have attracted the participation of the government, enterprises, research institutions and even civilian hackers. Our military cyberspace military strength training also needs to attract a wide range of civil forces to participate.
First, do a good job in military and political cooperation, establish a military-civilian joint offensive and defensive drill mechanism, learn from the red-blue confrontation training methods in cyber warfare drills in developed countries such as the United States, actively build a “national network shooting range”, plan a series of joint exercises of the government and non-government organizations, and enhance the integration of military and civilian. The level of attack and defense of the network of the government and the people.
The second is to do a good job in military-enterprise cooperation, relying on net-based enterprises to set up a training field on the Internet, to promote the ability of the military and civilians to attack and defend, and jointly improve the ability to prevent unknown risks.
The third is to organize private network security companies and hacker talents, carry out network security competitions and other activities, and verify each other to jointly improve the level of network security protection technology and tactics.
The network reserve service provides a source of strength for building a powerful network army. As a backup supplement to the national defense force, reserve service has both military and civilian characteristics and is a powerful measure to realize the organic unification of cyberspace economic development and national defense construction.
First, it is led by the national security department, and overall planning is carried out according to national interests. A series of laws and regulations conducive to the construction of the network national defense reserve are introduced. From the top level, the main division of labor, promotion strategy, interest coordination, etc. of the military and civilian construction in the network defense reserve construction are solved. problem.
The second is to innovate the reserve organization and comprehensive coordination mechanism, and plan to integrate the reserve construction into all levels and fields of national network information development.
The third is to focus on the reform of the military and local management modes. Based on the management mechanisms of the provincial and municipal governments, the military, and local enterprises and institutions, establish a network of national defense reserve personnel to jointly cultivate and use the mechanism, improve the national emergency mobilization mechanism, and establish a national network defense special talent. The database will include the construction of network militia and reserve forces into the scope of mobilization of the people’s armed forces. In normal times, they will be incorporated into the militia emergency detachment for training. In an emergency, select the capable personnel to participate in the non-war military operations missions, and the wartime will be recruited according to the requirements. To transform the national defense potential into national defense strength.
Strategic support forces are not logistical support or more powerful than the Rockets. Three tears on, how effective has China’s SSF become in the realm of cyber warfare?
Abstract: On December 31, 2015, the PLA Army Leadership, Rocket Army, and Strategic Support Forces were established. Xi Jinping, General Secretary of the CPC Central Committee, President of the State Council, and Chairman of the Central Military Commission, awarded the newly established three major units. The major steps marking the reform of the PLA’s army are beginning to be gradually implemented. Among the three new units, the strategic support force is definitely a brand new name, which naturally raises many questions. What kind of force is this?
Strategic support is not logistical support
The newly established three units, the Army’s leading body is also the Army’s headquarters. The former PLA has always been the army’s boss. The mainland’s thinking is deeply rooted. Therefore, only the navy and air force headquarters, and no army command, the top leaders of the army are all from The army, the head of the navy and air force ranks among the members of the Central Military Commission, and it is more symbolic. The establishment of the Army Headquarters now means that the status of the Army will gradually be lowered and will be consistent with other services. This will lay the foundation for the model of the highest military leadership in the rotation of the heads of the Western military in the future, and further strengthen the synergy for the various services. The conditions.
The Rockets are no strangers to military fans. They are the former Second Artillery Corps, which is essentially a strategic missile force. The strategic missile unit of the former Soviet Union was called the Strategic Rocket Army. When the PLA established the strategic missile force, the international situation was surging. For the sake of low-key restraint, Zhou Enlai proposed the name of the Second Artillery. Now renamed the Rocket Army, the name is more prestige, more directly strengthen the significance of strategic deterrence.
Relative to the above two units, for those concerned about national defense construction, the strategic support force will be much more strange. When many people hear this name, the first reaction is the logistics support force, which is a big mistake! The strategic support force is actually a genuine combat force. It is nominally supportive. In many cases, it is the first open-minded pioneer to fight, even to enter the battlefield earlier than the land, sea, air force and rocket forces. According to the spokesman of the Ministry of National Defense, the strategic support force is a new type of combat force for safeguarding national security and an important growth point for our military’s new combat capability. It is mainly a strategic, basic, and supportive type. The support force is formed after the functional integration.
Specifically, the strategic support force will include five parts: intelligence reconnaissance, satellite management, electronic countermeasures, cyber offense and defense, and psychological warfare. It is a combination of the most advanced corps, the net army, and other battlefields on the battlefield. More specifically, it is a combat force dedicated to the soft kill mission.
This is also the adjustment of the military reform at the military level. The PLA is divided into the traditional land, sea and air force, the strategic deterrent and the attacking rocket army and the most modern “sky-net” army. The three levels of division of labor are clear, and they can strengthen each other. The synergy between the two, to maximize the advantages of the overall war, is undoubtedly the highlight of this military reform.
Five major parts highlight high-tech content
Let’s take a closer look at the five major components of the Strategic Support Army. First, intelligence reconnaissance. This is not a spy war in the traditional sense. It is not like the old movie “The Crossing River Scout”, which disguise itself as a deep enemy. More is technical reconnaissance. With the increasing popularity of modern equipment, the leakage of various technical information is difficult to avoid, such as radio signals, electromagnetic signals, infrared signals, etc., through the collection and analysis of these signals, a large amount of valuable information can be obtained, strategic support forces The reconnaissance is mainly the technical reconnaissance in this respect, which can be carried out through modern equipment such as reconnaissance satellites, reconnaissance planes, drones, and sensors.
Satellite management is the so-called “Heavenly Army”. This is a new type of force that has emerged with the rapid development of space technology, especially satellite information reconnaissance, tracking and surveillance, guided navigation and aerospace weapons. The United States established the National Space Command in 1985, marking the birth of the world’s first heavenly army. Russia subsequently separated the military space force and the space missile defense force from the strategic rocket army and established a space force with a total strength of about 90,000 people. Then with the military reform of the People’s Liberation Army, the “Heavenly Army” under the strategic support force was formally formed and became a force dedicated to space operations in the future. The significance is significant.
The history of electronic confrontation is much longer than that of the Tianjun. As early as in the First World War, both sides have had the information of the other party and the communication of the other party. To the Second World War, the means of electronic confrontation. Both the scale and the scale have been greatly developed. In July 1943, the British army used metal foil strips to interfere with the German radar in the bombing of Hamburg, Germany, which was considered the beginning of modern electronic confrontation. During the Middle East War in the 1960s, electronic confrontation played a decisive role. Under today’s technical conditions, there is no need to spend more on electronic countermeasures.
Network attack and defense is also called cyber warfare. It is the rise of the network, exploiting the loopholes and security flaws of the network to attack and destroy the data in the hardware, software and systems of the network system. In 2001, there was a large-scale civil hacking incident between China and the United States, which stimulated the United States to a certain extent. By 2009, the world’s first cyber command was established. Through the opportunity of military reform, China has set up a specialized cyber warfare force and began systematically investing and developing in the fields of information construction and network attack and defense. This is a milestone for the future war, which is bound to spread to the network. meaningful.
In the end, it is psychological warfare, that is, by applying the principle principle of psychology, taking human psychology as the battlefield, and systematically adopting various means, including the means of communication, such as the Internet, television, and broadcasting, which cannot be separated from modern life. Cognitive, emotional, and will exert influence, mentally disintegrating enemy military and civilian fighting spirits or eliminating the influence of enemy propaganda, thus combating the enemy’s mind, in exchange for the greatest victory and benefits at the least cost. Psychological warfare sounds very mysterious. In fact, as mentioned in “Sun Tzu’s Art of War·The Tactics”: “It is the victorious battle, the good ones who are not good, the soldiers who do not fight and the good, and the good ones.” The “war without a war” is the ultimate goal of today’s psychological war. In the Battle of Normandy in the Second World War, the Allies used a large number of psychological warfare methods, which seriously affected the judgment of the German commander-in-chief and made great contributions to the victory of the battle. Since then, from the Korean War, the Vietnam War, to today’s Iraq War and the Afghan War, the US military has had professional psychological warfare troops to participate in the war. Therefore, this is the most easily overlooked military means, but it is a high level of military struggle, and even more efficient and effective than advanced aircraft cannons.
Therefore, it can be said that the strategic support force is the highest in the five major services after the reform of the PLA’s army. It can even be said to be completely different from the traditional war style of the past, and it is more characterized by ultra-modern flow.
Soft killing
According to the strategy disclosed on the network, the armbands are supported on the network. The above is the eight-and-five-pointed star. Below is the triangular arrow and the electronic cloud orbit. Surrounded by the surrounding wheat ears, it can be seen from this pattern that the strategic support force is not a traditional one. In the sense of steel contest, you can’t see the scene of the smoke, and there is no such thing as a nuclear weapon to destroy the horror of the sea, but the soft kill of the soldiers. In a sense, soft killing is no less inferior than hard killing, and even playing a role is more important than hard killing.
In contrast, until today, the US military has only independent scattered Tianjun, Net Army and psychological warfare units, but the PLA Strategic Support Forces have integrated these units directly in the preparation, and they are able to cooperate and play the greatest combat effectiveness. . It can be said that this major reform of the military, especially the establishment of the strategic support force, is definitely a major improvement in the system.
Imagine that without the strategic support force’s satellites accurately positioned and navigated, without the electronic escaping forces and cyber warfare forces escorting, the Rocket’s strategic missiles will be difficult to function; if there is no strategic support for the technical reconnaissance intelligence support, Satellite communication links, then the land, sea and air forces on the vast battlefield are blind and deaf, and the combat effectiveness is greatly reduced. Therefore, the strategic support forces will play a major role in the invisible four-dimensional and five-dimensional battlefield space.