Category Archives: China’s Military Infratsructure

China’s Emphasis on Accelerating the Advancement of Military Intelligence

中國重視加速軍事情報進步

現代英語:

Today, the world’s science and technology is brewing new breakthroughs. With the man-machine war as a symbol, the development of artificial intelligence has made significant progress and is accelerating its development into the military field, which will inevitably have an impact on the war situation and even a subversive impact. Therefore, our military must accelerate the promotion of military intelligence construction and accelerate the forging of an intelligent army.

Create intelligent theory. Create the basic theory of intelligent warfare, and conduct in-depth research on the concept connotation, essential characteristics, war guidance, combat style, offensive and defensive actions, winning mechanism, characteristic laws, etc. of intelligent warfare; continuously innovate the tactics of intelligent warfare, such as intelligent cluster warfare, precise second-kill warfare, cognitive control warfare, intelligent ambush warfare, etc.; study and master the basic technical theories of intelligent warfare, including the perception and understanding of highly complex battlefield environments, human-machine hybrid intelligence in human-machine collaborative operations, etc. These theories are the cornerstone of the intelligent warfare theory system. In the future, the war theory with “algorithm-centric warfare” as the core is very likely to replace the war theory with “network-centric warfare” as the core.

Reshape the intelligent form. Military organization is the link between military technology and combat theory, and is the lever for exerting the overall combat effectiveness of the army. In the future intelligent warfare, along with the pace of new military reforms, the development trend of military organization will be built and developed in the direction of “globally distributed, networked matrix” leadership and management system, “algorithm-supported, human-machine integration” combat command system, “small and flexible, modular cluster” scale structure, and “military integration, military and civilian integration, traditional forces as the main body, intelligent forces as the backbone, unmanned and adaptive” force composition. The organizational structure of future intelligent warfare will be to form small, multi-functional, intelligent, new joint combat forces of different types and purposes according to different levels of strategy, campaign, and tactics and different military services.

Develop intelligent weapons. We should focus on the dual needs of intelligent warfare system operations and intelligent weapons and equipment system construction, do a good job in top-level design and overall coordination, compile a roadmap for the development of intelligent weapons and equipment systems, and develop intelligent unmanned combat equipment systems that match operations and support, covering land, sea, air, space, and network space domains, in a planned, focused, and step-by-step manner, and with high, medium, and low-end, large, medium, and small, long, medium, and short ranges, and enhance the system integration of various services and various intelligent weapons and equipment such as operations and support. At the same time, we should focus on the needs of unmanned and anti-unmanned, intelligent and anti-intelligent operations, and focus on the research and development of weapons and equipment systems for anti-enemy intelligent unmanned operations to ensure that we can effectively conduct intelligent unmanned offensive and defensive confrontations with the enemy.

Innovate intelligent training. At present, the concept and method of intelligent combat are constantly updated, and the training mode has changed from “mechanical + information” dominated to “intelligent +” dominated. Artificial intelligence technology can create a more “real” weapon operation experience and battlefield environment, can realistically simulate the combat process, assist decision-making and command, and evaluate combat concepts. Exploring new models of intelligent training and improving intelligent combat capabilities will become an important part of future military training and preparation. In particular, intelligent warfare and unmanned combat should be included in the training outline and carried out on a regular basis.

Cultivate intelligent talents. Talent is the first resource. The cultivation of artificial intelligence talents is the foundation for strengthening the country’s intelligent infrastructure. Intelligent warfare has the characteristics of complexity, advancement, and humanization. It has the characteristics of decentralized combat command, de-division of combat processes, de-stratification of talent structure, high-end skill operation, research-based working methods, and fuzzification of the front and rear. Correspondingly, it also requires intelligent military talents to have the characteristics of talent group, advanced skills, complex knowledge, innovative thinking, and intelligent decision-making. Therefore, to build an intelligent army and win intelligent warfare, it is first necessary to have a large number of specialized technical talents and command talents in the field of artificial intelligence.

Deepen intelligent integration. Breakthroughs in the core key technologies of artificial intelligence are the “national heavy weapon” to deal with the threats and challenges of intelligent warfare. In the tide of the intelligent era, we must focus on achieving integrated breakthroughs in the following disruptive technologies: around algorithm support, develop intelligent data mining technology for massive intelligence information and intelligent planning technology; around machine combat, develop intelligent chip technology and autonomous unmanned system technology; around intelligent decision-making, develop explainable high-reliability auxiliary decision-making technology, human-computer interaction and intelligent fusion technology; around extreme combat, develop intelligent cluster combat coordination technology and energy and information intelligent confrontation technology. Therefore, the research and development of core key technologies of military intelligence should not only carry out cross-disciplinary and cross-domain collaborative innovation, but also connect the development of social intelligence with that of military intelligence, draw on the mature technologies and successful experiences of social intelligence development, vigorously strengthen the in-depth development of military-civilian integration, and promote the rapid embedding of various artificial intelligence technologies into combat elements and processes.

國語中文:

當今世界科技正醞釀著新的突破,以人機大戰為標志,人工智慧發展取得重大進展,並加速向軍事領域發展,這必將對戰爭形態產生沖擊甚至顛覆性影響。因此,我軍必須加速推進軍事智慧化建設,加速鍛造智慧化軍隊。

創建智能化理論。創造智慧化戰爭基礎理論,深入研究智能化戰爭的概念內涵、本質特徵、戰爭指導、作戰樣式、攻防行動、制勝機理、特點規律等內容;不斷創新智能化戰爭的戰法,如智能集群戰、精確秒殺戰、認知控制戰、智能伏擊戰等;研究掌握智能化戰爭的技術基礎理論,包括高復雜戰場環境的感知與理解、人機協同作戰的人機混合智能等。這些理論是智慧化戰爭理論體系的基石。未來以「演算法中心戰」為核心的戰爭理論,極有可能取代以「網絡中心戰」為核心的戰爭理論。

重塑智能化形態。軍隊組織是聯結軍事技術和作戰理論的紐帶,也是發揮軍隊整體作戰效能的槓桿。在未來智慧化戰爭中,伴隨著新軍事變革的步伐,軍隊組織的發展趨勢,將按照領導管理體制「全局分散式、網絡矩陣式」、作戰指揮體制「演算法支撐、人機融合」、規模結構「小型靈巧、模塊集群」、力量編成「軍種融合軍民一體、傳統部隊為主體、智慧部隊為骨幹的無人化、自適應」方向建設發展。未來智慧化戰爭的體制編制將依戰略、戰役、戰術不同層次和不同軍兵種,組建不同類型、不同用途的小型多能智能化新型聯合作戰部隊。

發展智能化武器。應著眼於智慧化戰爭體係作戰和智慧化武器裝備體系建設的雙重需要,搞好頂層設計和整體統籌,編制智能化武器裝備體系發展路線圖,按計劃、有重點、分步驟地研製高中低端、大中小型、遠中近程,覆蓋陸、海、空、天和網絡等空間領域,作戰與保障相配套的智能化無人作戰裝備體系,增強各軍兵種和作戰、保障等各種智能化武器裝備的體系融合度。與此同時,應著眼無人和反無人、智能與反智能作戰需要,注重研發反敵智能化無人作戰的武器裝備系統,確保能夠有效地與敵進行智能化無人攻防對抗。

創新智能化訓練。當前,智慧化作戰理念、作戰方式不斷更新,訓練模式由「機械+資訊」主導型向「智慧+」主導型轉變。人工智慧技術能夠創造出更「真實」的武器操作體驗和戰場環境,能夠逼真地演繹作戰進程、輔助決策指揮、評估作戰構想。探索智慧化訓練新模式,提升智慧化作戰能力,將成為未來練兵備戰的重要內容。特別是將智慧化戰爭和無人化作戰納入訓練大綱,常態化展開進行。

培養智能化人才。人才是第一資源。人工智慧人才的培養是加強國家智慧化基礎建設的根本。智慧化戰爭具有複雜性、超前性、類人化等特徵,存在作戰指揮去中心化、作戰過程去分工化、人才結構去分層化、技能操作高端化、工作方式研究化、前沿與後方模糊化等特點,相應也要求智慧化軍事人才具有人才群體性、技能精尖性、知識復合性、思維創新性、決策智能性等特點。因此,建設智慧化軍隊,打贏智慧化戰爭,首要是擁有一大批人工智慧領域的專門技術人才和指揮人才。

深化智能化融合。人工智慧核心關鍵技術的突破,是應對智慧化戰爭威脅和挑戰的「國之重器」。在智慧時代的浪潮中,要重點在以下顛覆性技術上取得融合突破:圍繞演算法支撐發展海量情報資訊智慧數據挖掘技術、智慧規劃技術;圍繞機器主戰發展智慧晶片技術、自主無人系統技術;圍繞智慧決策發展可解釋高可信賴輔助決策技術、人機互動與智慧融合技術;圍繞極限作戰發展智慧集群作戰協同技術、能量與資訊智慧對抗技術。因此,軍事智慧化核心關鍵技術的研發,不僅要開展跨學科、跨領域協作創新,還要使社會智能化與軍事智能化發展對接並軌,借鑒社會智能化發展的成熟技術和成功經驗,大力加強軍民融合深度發展,推動各類人工智慧技術快速嵌入作戰要素、作戰流程。

來源:解放軍報 作者:李明海 責任編輯:喬楠楠 2019-10-08 10:39:28

中國軍事資源:http://www.mod.gov.cn/gfbw/jmsd/4852388.html

Chinese Military Focus on Tactical & Operational Combat Planning

中國軍隊注重戰術和作戰規劃

現代英語:

Accurately grasp the focus of combat planning

■ Wang Dong and Xu Zhiyong

Operational planning capability is a key capability of operational command and is also the basic way to transform strategic objectives and campaign tasks into specific combat actions. With an eye on winning future wars, improving operational planning capabilities will help people seize the initiative in war and gain the advantage in winning wars.

Focus on mission science planning

The combat mission stipulates the time and space conditions of the operation, determines the type, number and scale of the participating forces, and is the basic basis for combat planning. In modern warfare, the types of combat missions are more diverse, with more constraints and greater difficulty in completion. In addition, the relationship between different missions is closer, and often one move affects the entire system.

In the process of combat planning, only by accurately understanding combat tasks, scientifically decomposing combat tasks, and reasonably allocating combat tasks can we ensure that combat planning is scientific, accurate, and efficient. Accurately understanding combat tasks emphasizes accurate and comprehensive understanding of the superior’s intentions, ensuring that combat planning is always carried out around the implementation of the superior’s intentions; scientifically decomposing combat tasks emphasizes the analysis of major combat tasks, secondary combat tasks, and implicit combat tasks, ensuring that combat planning is always focused on task completion; reasonably allocating combat tasks emphasizes the reasonable selection of force resources in combination with specific tasks, ensuring that combat planning is always carried out around the optimal allocation of combat resources.

When conducting combat planning, it is necessary to accurately understand the combat intent of superiors, take the efficient completion of combat tasks as the axis, pay close attention to the efficient use of time, space, manpower, firepower, information and other factors to design combat actions, and ensure that the combat plans and programs are detailed and feasible.

Reasonable planning based on ability

Combat capability directly affects the completion time and final effect of the mission, and is an important basis for conducting combat planning. In future integrated joint operations, combat forces will be deployed over a wide area, combat actions will be coordinated across domains, and combat capability will be aggregated across multiple domains. The systemic synergy of various combat capabilities will become the key to determining victory or defeat on the battlefield.

In the process of combat planning, combat objectives should be reasonably determined, combat forces should be scientifically organized, and combat actions should be designed as a whole to ensure that combat planning is close to reality and feasible. Scientifically determine combat objectives, emphasize the reasonable selection of combat objectives based on accurate assessment of the combat capabilities of the troops; scientifically organize combat forces, emphasize focusing on complementary advantages and functional coupling to achieve an organic combination of various combat forces; design combat actions as a whole, emphasize the effective aggregation of various combat capabilities through integrated design, and ensure that combat planning is always carried out around the efficient use of combat forces.

When conducting combat planning, we should base ourselves on existing combat strength and actual combat capabilities, comprehensively analyze various situations and relevant constraints, determine appropriate combat objectives, and use them to guide combat force deployment, combat force organization, and combat action design. We must prevent the objectives from being too high, which will lead to distortion of planning products, and from being too small, which will lead to failure of planning products, and effectively improve the practicality and feasibility of planning plans.

Aim at your opponent and plan accurately

“Know thy enemy and know thyself, and you can fight a hundred battles with no danger of defeat.” Informatized and intelligentized warfare, the characteristics of all-domain confrontation, system confrontation, and full-process confrontation are obvious. To achieve “attack others without being attacked by others”, we must insist on anticipating the enemy and responding to changes in advance.

In the face of the constant changes in the combat system, force deployment, tactics and strategies of powerful enemies, in the process of combat planning, we need to keep a close eye on the “opponent” as the target to study strategies and methods and design combat actions to ensure that combat planning is targeted and has rules to follow. We must thoroughly understand the combat opponent, emphasize accurate assessment of the enemy’s combat intentions, detailed analysis of the enemy’s combat system, and accurate grasp of the enemy’s combat focus. We must design tactics and strategies by targeting the key points in the enemy’s combat system, the weak points in force deployment, and the key points in tactics and strategies to ensure that combat planning is always carried out around defeating the enemy.

When conducting combat planning, we should accurately grasp the enemy’s combat focus, key positions and weak links, focus on selecting attack targets, carefully deploy forces, and highlight the key points, nodes and soft spots that support the enemy’s combat system to carry out force utilization and action design, improve the pertinence and accuracy of various planning results, and support the realization of flexible and autonomous asymmetric operations.

Focus on issues and coordinate planning

In future integrated joint operations, there will be more participating forces, more combat levels, a wider spatial domain, greater coordination conflicts, and various combat issues will become more complex.

In the process of combat planning, we should take the discovery of combat problems as the basis, the analysis of combat problems as the entry point, and the resolution of combat problems as the goal, and continuously enhance the thoroughness, systematicness, and completeness of combat planning. We should keep a close eye on problem-based joint planning, emphasize the support of the network information system, focus on solving the pain points, bottlenecks, and difficult problems in combat, and jointly tackle and pool wisdom among all services, fields, and levels, implement overall joint planning across all time periods, fields, and levels, and ensure that combat planning is always focused on quickly solving combat problems.

When conducting combat planning, we should adhere to the main line of efficiently solving combat problems, always focus on the realization of combat objectives, the use of combat forces, and the use of combat time and space, coordinate the joint planning of various services, levels, fields, and elements, realize the overall use of the combat forces of various services, the integrated design of campaign and tactical actions, and the cross-domain linkage of combat elements in various spatial domains, and improve the integrity of combat planning.

Focus on the situation and make rolling plans

Battlefield situation refers to the overall state and situation of the battlefield. Changes in situation are key variables that must be grasped in combat planning. The battlefield environment of modern warfare is complex and the pace of operations is accelerating. Even if the plans and programs formulated before the war are perfect, they are difficult to adapt to the rapid changes in battlefield situation.

Scientific and reasonable combat planning needs to go through a rolling iterative process, grasp the changes in the situation in a timely manner, and emphasize the real-time perception of the development and changes of the battlefield situation; accurately analyze and judge the situation, emphasize the need to base on the plan, focus on changes, and make quick decisions; continue rolling planning throughout the process, emphasize the need to respond quickly and flexibly, and continuously plan operations and decide on actions. Only in this way can the flexibility and timeliness of combat planning be continuously enhanced.

When conducting combat planning, we should focus on changes in the battlefield situation, scientifically predict the evolution of the situation, focus on repeated iterations of key planning steps such as judging the situation, implementing intentions, formulating plans, and making plans, update planning results in a timely manner, and realize the interlocking of planning and action, and move forward towards the combat objectives in a rolling manner, truly achieving “the enemy changes and I change, and I defeat the enemy first”, being one step ahead of others in planning, seizing the advantage of combat planning, and converting it into combat victory.

中文普通話語言:

準確把握作戰籌劃著力點

■王棟 許志永

作戰籌劃能力是作戰指揮的關鍵能力,也是將戰略目標、戰役任務轉化為具體作戰行動的基本途徑。著眼打贏未來戰爭,提升作戰籌劃能力有助於人們掌握戰爭主動,贏得戰爭制勝優勢。

聚焦任務科學籌劃

作戰任務規定作戰的時空條件,決定參戰力量類型、數量和規模,是進行作戰籌劃的基本依據。在現代戰爭中,作戰任務類型更加多元、約束條件更多、完成難度更大,且不同任務之間的關聯更加緊密,往往牽一發而動全身。

作戰籌劃過程中,只有精確理解作戰任務、科學分解作戰任務、合理分配作戰任務,才能確保作戰籌劃科學、準確、有效率。準確理解作戰任務,強調準確全面地理解上級意圖,確保作戰籌劃始終圍繞貫徹上級意圖展開;科學分解作戰任務,強調解析出主要作戰任務、次要作戰任務、隱含作戰任務,確保作戰籌劃始終聚焦任務完成而進行;合理分配作戰任務,強調結合具體任務合理選配力量資源,確保作戰籌劃始終圍繞作戰資源優化配置而進行。

進行作戰籌劃時,需要在準確理解上級作戰意圖的基礎上,以高效完成作戰任務為軸線,緊盯時間、空間、兵力、火力、信息等要素的高效利用進行作戰行動設計,確保作戰方案、計劃精細可行。

立足能力合理籌劃

作戰能力直接影響任務的完成時限和最終效果,是開展作戰籌劃的重要基礎。未來一體化聯合作戰中,作戰力量廣域部署、作戰行動跨域聯動、作戰能力多域聚合特徵明顯,各種作戰能力形成體系合力成為決定戰場勝負的關鍵。

作戰籌劃過程中,應合理確定作戰目標、科學編組作戰力量、整體設計作戰行動,確保作戰籌劃緊貼實際、切實可行。科學確定作戰目標,強調在準確評估部隊作戰能力的基礎上合理選擇作戰目標;科學編組作戰力量,強調聚焦優勢互補、功能耦合實現各種作戰力量的有機組合;整體設計作戰行動,強調通過一體化設計實現各種作戰能力的有效聚合,確保作戰籌劃始終圍繞著作戰力量的高效運用而展開。

進行作戰籌劃時,應立足現有作戰實力、基於實際作戰能力,綜合分析各方面情況及相關制約因素,確定適度的作戰目標,並以此牽引作戰力量部署、作戰力量編組、作戰行動設計,既要防止目標太高而導致籌劃產品失真,也要防止目標太小而導致籌劃產品失效,切實提高籌劃方案的實用性、可行性。

瞄準對手精準籌劃

「知彼知己,百戰不殆。」資訊化智能化戰爭,全局對抗、體系對抗、全程對抗特徵明顯,實現“致人而不致於人”,就要堅持料敵在先、應變在先。

面對強敵對手在作戰體系、兵力部署、戰術戰法等方面的不斷變化,在作戰籌劃過程中,需緊盯「對手」這一靶標指向來研究策略方法和設計作戰行動,確保作戰籌劃有的放矢、有章可循。吃透作戰對手,強調精準研判敵作戰企圖、精細分析敵作戰體系、準確把握敵作戰重心,瞄準敵作戰體系中的關節點、兵力部署上的薄弱點、戰術戰法上的要害點進行戰法設計,確保作戰籌劃始終圍繞克敵制勝而展開。

進行作戰籌劃時,應準確掌握敵作戰重心、關鍵部位和薄弱環節,注重精選打擊目標,精心佈局力量,突出打擊支撐敵作戰體系的要害、節點和軟肋等進行兵力運用和行動設計,提高各種籌劃成果的針對性與精準度,支撐實現靈活自主的非對稱作戰。

緊盯問題聯動籌劃

未來一體化聯合作戰中,涉及參戰力量更多、作戰層級更多、空間領域更廣、協同矛盾更大,各種作戰問題也將更為複雜。

在作戰籌劃過程中,應以發現作戰問題為基點、以分析作戰問題為切入、以解決作戰問題為目標,不斷增強作戰籌劃的周密性、系統性、完備性。緊盯問題聯動籌劃,強調以網絡資訊體係為支撐,聚焦解決作戰中的痛點、堵點、難點問題,各軍兵種、各領域、各層級等聯合攻關、集智共謀,實施全時段、跨領域與跨層次的整體聯動籌劃,確保作戰籌劃始終聚焦快速破解作戰問題而展開。

進行作戰籌劃時,應堅持以高效解決作戰問題為主線,始終圍繞作戰目標的實現、作戰力量的運用和作戰時空的利用,統籌協調各軍兵種、各層級、各領域、各要素進行聯動籌劃,實現各軍兵種作戰力量的整體運用、戰役戰術行動的一體設計、各空間領域作戰要素的跨域聯動,提高作戰籌劃的整體性。

著眼態勢滾動籌劃

戰場態勢是戰場的整體狀態和總體​​形勢,態勢變化是作戰規劃需要掌握的關鍵變數。現代戰爭戰場環境復雜,作戰節奏加快,戰前規劃制定的方案計畫即使再完善,也難以適應戰場態勢的快速變化。

科學合理的作戰籌劃需要經過一個滾動迭代的過程,及時掌握情況變化,強調要實時感知戰場態勢發展變化;準確分析判斷情況,強調要立足預案,著眼變化,快速決斷;全程持續滾動籌劃,強調要快速靈活反應,不間斷籌劃作戰和決定行動,這樣才能不斷增強作戰籌劃的靈活性和時效性。

進行作戰籌劃時,應著眼戰場態勢變化,科學預判態勢演變,重點對判斷情況、貫徹意圖、擬制方案、制定計劃等關鍵籌劃步驟進行反復迭代,適時更新籌劃成果,實現籌劃與行動環環相扣,滾動地向作戰目的推進,真正做到“敵變我變,制敵於先”,在籌劃上高人一籌、先人一步,奪取作戰籌劃優勢,並將其轉化為作戰勝勢。

中國軍事資源:http://www.mod.gov.cn/gfbw/jmsd/1629826988.html

Chinese Military Discussion on Integration of Intelligence into Military Command and Decision-making

中國軍隊關於情報融入軍事指揮決策的探討

中國軍網 國防部網 // 2022年6月30日 星期四

現代英語:

With the widespread use of advanced technologies such as big data, neural networks, and cloud computing, artificial intelligence is driving the transformation of decision-making thinking, models, and methods with unprecedented power. Decisions based on intuition and experience in the era of small data will give way to decisions based on full sample data in the era of intelligence, and the latter will become a new paradigm for winning on the battlefield. Accelerating the integration of artificial intelligence into modern command decision-making and better realizing the complementary advantages of human brain thinking and machine computing can promote the overall improvement of the level of military command decision-making.

Clarify the advantages of intelligent integration

The intelligent nature of future wars will continue to increase, and it is necessary to make the best decision quickly according to the changes in the enemy situation, our situation and battlefield environment. Simple human brain decision-making is no longer able to adapt to the rhythm of modern warfare. It is necessary to actively use artificial intelligence to achieve rapid and efficient military command decision-making through human-machine collaboration and complementarity. Data-driven decision-making focuses on big data resources for data mining and comprehensive analysis, discovers data associations and unknown laws, and assists commanders in making decisions based on this. Autonomous decision-making relies on the big data analysis platform, combines perception, cognition and decision support, and accurately generates and optimizes decision-making plans on the basis of ensuring timeliness. Pre-practice decision-making, by using the decision simulation system, experiments, tests, demonstrates and optimizes the combat plan before the combat decision results are converted into combat actions, and extracts the best action plan. From this point of view, artificial intelligence will become the “all-source analyst” of the battlefield. With its powerful data and algorithm advantages, it will expand the commander’s breadth and depth of cognition of the battlefield, and can achieve more accurate situation perception, more reliable battle situation judgment, and faster command and control.

Focus on integrating quasi-intelligent

Algorithms, computing power and data are both the internal driving force and core support for the development of artificial intelligence, and should be integrated into the key links of the entire command and control process. We should enhance situational awareness and provide an intelligence basis for command decision-making. We should network and connect the perception systems in the multi-dimensional battlefield, use data mining, deep learning and other technologies to process and utilize a large number of heterogeneous data streams obtained from multiple sources, extract useful battlefield intelligence, and grasp the changes in battlefield situation, so as to achieve effective transformation from information advantage to decision-making advantage. We should strengthen cognitive decision-making capabilities and provide important support for command decision-making. We should focus on the objective reality that the battlefield situation is changing rapidly and the weight of the time factor is constantly increasing. Based on data information technology and artificial intelligence technology, we should organically combine new technologies, new tactics and experience decisions, so as to combine qualitative and quantitative analysis, improve the single-loop decision-making speed of our own OODA loop, expand the breadth of parallel decision-making, and seize cognitive initiative by using speed to defeat slowness, so as to form an effect similar to dimensionality reduction strike. We should optimize coordination and control capabilities and provide solid guarantees for command decision-making. We should use big data analysis technology to explore and compare anomalies in enemy data, quickly capture opportunities for enemy confusion, errors, weaknesses, etc., change the past command model of determining the next action based on the results of the action, adjust decisions in advance, dynamically deploy troops, simulate and measure the effects of actions, and coordinate and control troops to launch troop maneuvers.

Avoiding the risks and challenges of integrating intelligence

Artificial intelligence is susceptible to defective data input, and there are problems such as “garbage in, garbage out”. At the same time, the black box nature of artificial intelligence makes it difficult for people to understand why and how the machine makes decisions, and it is difficult to identify whether the data is damaged and produces wrong results. Therefore, we must work hard on the input end of artificial intelligence. Focus on the application scenarios of artificial intelligence, identify false, forged, and low-quality data, deeply explore data relationships, and improve the integrity of information required for decision-making. Remove the false and retain the true, and increase the accuracy of training data. We must work hard on the interactive end of human-machine collaboration. The biggest dilemma of human-machine collaborative decision-making lies in the interaction between people and machines. There is uncertainty in human-machine interaction, and poor information communication may produce unpredictable and inexplicable results. It is necessary to accelerate the development of intelligent human-machine communication models. We must work hard on the operation end of machine inference. The current “machine learning”, “supervised learning” and “reinforcement learning” have been realized, but we should continue to seek breakthroughs, fully absorb various technical means, optimize model design, and improve database construction. We must work hard on the distribution end of human-machine decision-making. The human brain and machines each have their own advantages. We should focus on strengthening artificial intelligence with “human participation”, reasonably define the level, scope and degree of integration of artificial intelligence into command decision-making, intervene in human brain judgment at critical times, and control the overall safety and reliability of human-machine collaboration.

Realize efficient and orderly integration of intelligence

At present, military intelligence, with intelligence as the core, informatization as the basis, and networking as the symbol, is developing rapidly. Major countries in the world are actively exploring the advantages of artificial intelligence, hoping to make faster and better military decisions than their opponents, while creating more decision-making dilemmas for their opponents. We must keep up with the world trend, focus on top-level design, fully understand and give play to the auxiliary support role of intelligent technology in command decision-making, explore the human-machine collaborative decision-making model that conforms to the characteristics of our army, and guide the construction of the command capability system. We must adhere to systematic guidance and optimize the structure to design the human-machine collaborative path. According to the decision-making purpose and capacity requirements of strategic, campaign, and tactical combat command, distinguish between command, control, communication and other task areas, take into account the respective advantages and characteristics of “man and unmanned”, fully demonstrate the adaptability of artificial intelligence in the field of military command decision-making and possible problems, and systematically design the fields, methods and integration degree of artificial intelligence integration. We must adhere to the division of labor principles of human-led, machine-assisted, learning from each other’s strengths and weaknesses, and coordinated cooperation, design our respective exploration boundaries, and realize the transformation from auxiliary decision-making to intelligent decision-making.

國語中文:

週國輝 劉文術 張 鑑

隨著大數據、神經網路、雲端運算等先進技術的廣泛運用,人工智慧正以前所未有的力量推動決策思維、模式和方法的變革。小數據時代基於直覺和經驗的決策將讓位給智慧化時代基於全樣本數據的決策,後者將成為主導戰場制勝的新典範。加速人工智慧融入現代指揮決策,更能實現人腦思維與機器運算的優勢互補,才能推動軍事指揮決策水準的整體提升。

釐清智能化融入的優勢所在

未來戰爭的智慧化屬性將持續增強,時刻需要根據敵情、我情和戰場環境的變化快速做出最優決策。單純的人腦決策已經難以適應現代戰爭節奏,需要積極借助人工智慧,透過人機協同互補,實現軍事指揮決策的快速且高效。資料驅動式決策,著眼於大數據資源進行資料探勘與綜合研析,從中發現資料關聯、未知規律並據此輔助指揮官進行決策。自主決策依託大數據分析平台,感知、認知和決策支援結合,在確保時效性基礎上,精確產生並優選決策方案。預先實踐式決策,透過利用決策模擬系統,在作戰決策結果未轉化為作戰行動之前,先對作戰方案進行實驗、檢驗、論證與最佳化,從中萃取最佳行動方案。由此觀之,人工智慧將成為戰場的“全源分析師”,以其強大的數據和演算法優勢,拓展指揮官對戰場的認知廣度和深度,可以實現更精準的態勢感知、更可信的戰局研判、更迅速的指揮控制。

把準智能化融入的重點指向

演算法、算力以及資料既是人工智慧發展的內在動力,也是核心支撐,應融入指揮控制整個流程的關鍵環節之中。要增強態勢感知能力,為指揮決策提供情報基礎。應網路化連接多維戰場中的感知系統,借助運用資料探勘、深度學習等技術,處理並利用多源獲取的大量異質資料流,提取戰場有用情報,掌握戰場態勢變化,以實現資訊優勢到決策優勢的有效轉化。要強化認知決斷能力,為指揮決策提供重要支撐。應著眼戰場情勢瞬息萬變,時間要素權重不斷上升的客觀實際,基於數據資訊技術與人工智慧技術,有機結合新技術、新戰法與經驗決策等,使定性與定量相結合,提升己方OODA環的單環決策速度,拓展並行決策廣度,透過以快製慢,奪取認知先手,以形成近似降維打擊的效果。要優化協調控制能力,為指揮決策提供堅實保障。應藉助大數據分析技術,挖掘比對敵情資料中的異常現象,迅速捕捉敵混亂、錯誤、弱點等戰機,改變過去根據行動結果確定下一步行動的指揮模式,預先調整決策,動態調配兵力,模擬、計算行動效果,協調控制部隊展開兵力機動。

規避智慧化融入的風險挑戰

人工智慧易受缺陷資料輸入的影響,存在「垃圾進、垃圾出」等問題。同時,人工智慧的黑盒子性質,使人很難理解機器為何以及如何做出決策,難以辨識數據是否因受到損害並產生錯誤結果的情況。因此,要在人工智慧的輸入端下功夫。著眼於人工智慧應用場景,辨識虛假、偽造、劣質數據,深度挖掘數據關係,提升決策所需資訊的完整性。去偽存真,增加訓練資料的準確性。要在人機協同的互動端下功夫。人機協同決策的最大困境在於人與機器之間的交互,人機互動存在不確定性,訊息溝通不暢,可能會產生無法預料和無法解釋的結果,必須加速開發人機交流智能化模式。要在機器推論的運轉端下功夫。目前的「機器學習」「監督學習」與「強化學習」等已實現,但應不斷尋求突破,充分吸收各類技術手段,優化模型設計,完善資料庫建置。要在人機決策的分配端下功夫。人腦與機器各有優長,應著重強化「有人參與」下的人工智慧,合理界定人工智慧融入指揮決策的層級、範圍和程度,關鍵時介入人腦判斷,整體把控住人機協作的安全性和可靠性。

實現智慧化融入的高效有序

目前,以智慧化為核心、資訊化為基礎、網路化為標誌的軍事智慧化發展迅猛,世界各主要國家積極發掘人工智慧優勢,希冀做出比對手更快、更好的軍事決策,同時給對手製造更多決策困境。我們必須緊跟世界潮流,聚焦頂層設計,充分認識並發揮智慧技術對指揮決策的輔助支援作用,探索符合我軍特色的人機協同決策模式,引導指揮能力體系建構。要堅持系統指導,優化結構設計人機協同路徑。依照戰略、戰役、戰術層級作戰指揮的決策主旨、容量要求,區分指揮、控制、通訊等任務領域,兼顧「有人、無人」各自的優勢特點,充分論證人工智慧在軍事指揮決策領域中應用的適應性及可能存在的問題,系統設計人工智慧融入的領域、方式和整合程度。要堅持人為主導、機器為輔、取長補短、協同配合的分工原則,設計各自的探觸邊界,實現從輔助決策轉向智慧決策的轉變。

中國軍事原文來源:https://www.81.cn/jfjbmap/content/2022-06/30/content_318790.htm

Chinese Military: Intelligence Profoundly Affecting Future Strategic Combat Operations

中國軍事情報深刻影響未來戰略作戰行動

現代英語翻譯:

In today’s era, military intelligence is becoming a powerful driving force for a new round of military reforms after mechanization and informatization, profoundly affecting the future combat victory mechanism, combat rules, and combat methods, and increasingly pushing war into the era of intelligence. The impact of military intelligence on future combat is mainly reflected in four aspects.

First, “intelligence” will become the dominant factor in determining the outcome of future operations. Mechanized warfare can be seen as platform-centric warfare, where energy is the dominant force. Energy is used to achieve the mobility of combat platforms and firepower strikes on targets, to achieve the combat purpose of destroying the enemy, and to pursue the use of objects to carry energy and release energy. Informationized warfare can be seen as network-centric warfare, where information is the dominant force. Information does not replace energy, but through precise positioning of time and space, it multiplies the combat effectiveness of energy, thus becoming the dominant force in war, and pursues the use of networks to gather energy and release energy. Intelligent warfare can be seen as cognitive-centric warfare, in which the dominant force is “intelligence”. The combat space is further extended from the physical domain and information domain to the cognitive domain, social domain, and biological domain. The battlefield situation is more complex. War is a systemic confrontation across domains, and it pursues more empowerment and release of power with intelligence.

Second, intelligent unmanned equipment will become the main combat equipment in future operations. The development of intelligent technology has gradually separated people from weapons and equipment. Unmanned systems have shifted from assisting people in combat to replacing people in combat, completing many high-risk combat operations that are not suitable for people to perform. Intelligent combat has increasingly distinctive characteristics of “unmanned platforms, manned systems, unmanned combat, and manned command”. On the Syrian battlefield, the Russian military remotely controlled 10 combat robots to kill more than 70 Islamic State militants with “zero casualties” and seize the 754.5 high ground, becoming the first ground combat operation in military history with robots as the main force. It is expected that by 2025, the proportion of intelligent unmanned equipment in the Russian military’s weapons and equipment will reach more than 30%. The U.S. military predicts that by 2030, intelligent unmanned equipment will be able to perform tasks autonomously, and 60% of ground combat platforms will achieve unmanned intelligence. A large number of drones, unmanned ships/boats, and unmanned vehicles will become the main equipment for both sides on the intelligent battlefield, carrying out various traditional/untraditional military tasks and implementing self-organized and systematic operations.

Third, human-machine collaborative combat will become the main mode of action in future combat. Human-machine collaborative combat is a mode of combat in which manned and unmanned equipment joint formations implement coordinated attacks in a networked confrontation environment. Among them, human soldiers with battlefield decision-making and tactical control capabilities serve as the “command back end”, and intelligent unmanned equipment carrying guided weapons or various intelligence, reconnaissance and surveillance sensors serve as the “weapon front end”. With the support of information networks, human soldiers and intelligent unmanned equipment work closely together to complete actions such as situation perception, tactical decision-making, firepower guidance, weapon launch and damage assessment. According to the U.S. Army Research Laboratory, before 2035, human-machine collaborative combat will mainly take the form of autonomous combat with humans in the loop; before 2050, authorized autonomous or fully autonomous combat with humans outside the loop will be achieved, officially kicking off intelligent warfare dominated by machines.

Fourth, autonomous swarm combat will become an important attack style in future combat. The technical inspiration of swarm combat comes from the bionics research on bees. The division of labor within the bee colony is clear, there is a rich and interesting information exchange language between individuals, and the social behavior is rich, so the cluster is also called a “bee colony.” Swarm combat is an intelligent combat style that relies on artificial intelligence, data chain integration, cloud computing and other technical support, and launches dozens or even hundreds of drones at the same time. They form precise formations and precise division of labor, and perform multiple tasks and multi-target strikes at the same time. Compared with traditional combat, swarm combat has incomparable advantages and is a subversion of traditional combat styles and combat rules. After hundreds of simulation tests, the U.S. Navy found that even an advanced air defense system like the Aegis air defense system has difficulty in allocating firepower when dealing with drone swarm attacks, resulting in some drones being able to avoid interception and successfully launch attacks on ships. Data shows that when a swarm of 8 drones is used to attack ships, an average of 2.8 drones can avoid the Aegis interception system; when the number of drones increases to dozens, the number of drones that successfully avoid the interception system and achieve penetration is greater. These simulation tests fully prove that the effect of drone swarm operations is significant and poses a huge threat to the current defense system. At the same time, it also indicates that swarm-type autonomous operations will inevitably become an important offensive combat style on the future intelligent battlefield.

現代國語:

當今時代,軍事智慧化正成為繼機械化、資訊化之後新一輪軍事變革的強大驅動力,深刻影響未來作戰勝利機制、作戰規則、作戰方式,日益推動戰爭進入智慧化時代。軍事情報對未來作戰的影響主要體現在四個方面。

首先,「情報」將成為決定未來作戰勝負的主導因素。機械化戰爭可以看作是以平台為中心的戰爭,其中能源是主導力量。利用能量實現作戰平台的機動性和對目標的火力打擊,達到消滅敵人的作戰目的,追求利用物體攜帶能量和釋放能量。資訊化戰爭可視為以網路為中心的戰爭,資訊是主導力量。資訊並不是取代能源,而是透過時間和空間的精確定位,使能源的戰鬥力倍增,從而成為戰爭的主導力量,並追求利用網路聚集能源、釋放能源。智慧戰爭可以看作是以認知為中心的戰爭,其中的主導力量是「情報」。作戰空間從物理域、資訊域進一步延伸到認知域、社會域、生物域。戰場情勢更加複雜。戰爭是跨領域的系統性對抗,它追求更多的智慧賦能和權力釋放。

其次,智慧無人裝備將成為未來作戰的主要作戰裝備。智慧科技的發展,使人逐漸與武器裝備分離。無人系統已經從協助人作戰轉向代替人作戰,完成許多不適合人執行的高風險作戰行動。智慧作戰「平台無人、系統有人、作戰無人、指揮有人」的特徵日益鮮明。在敘利亞戰場上,俄軍遙控10台戰鬥機器人以「零傷亡」擊殺70多名伊斯蘭國武裝份子,奪取754.5高地,成為軍事史上首次以機器人為主力的地面作戰行動。預計2025年,智慧無人裝備在俄軍武器裝備中的比重將達到30%以上。美國軍方預測,2030年,智慧無人裝備將能夠自主執行任務,60%的地面作戰平台將實現無人智慧化。大量無人機、無人艦船、無人車輛將成為智慧戰場上雙方的主要裝備,執行各種傳統/非傳統軍事任務,實施自組織、系統化作戰。

第三,人機協同作戰將成為未來作戰的主要行動方式。人機協同作戰是有人與無人裝備聯合編隊在網路化對抗環境下實施協同攻擊的作戰方式。其中,具有戰場決策和戰術控制能力的人類士兵作為“指揮後端”,搭載制導武器或各種情報、偵察、監視感測器的智慧無人裝備作為“武器前端”。在資訊網路的支援下,人類士兵和智慧無人裝備緊密配合,完成態勢感知、戰術決策、火力引導、武器發射和毀傷評估等動作。根據美國陸軍研究實驗室預測,2035年之前,人機協同作戰將主要採取人類在環自主作戰的形式; 2050年以前,將實現與環外人類的授權自主或完全自主作戰,正式拉開機器主導的智慧戰爭的序幕。

第四,自主集群作戰將成為未來作戰的重要攻擊方式。團體作戰的技術靈感來自蜜蜂的仿生研究。蜂群內部分工明確,個體間有豐富有趣的資訊交流語言,社會行為豐富,因此集群也被稱為「蜂群」。集群作戰是依託人工智慧、數據鏈整合、雲端運算等技術支撐,同時發射數十架甚至上百架無人機的智慧化作戰方式。他們形成精確編隊、精確分工,同時執行多項任務、多目標打擊。與傳統作戰相比,集群作戰具有無可比擬的優勢,是對傳統梳子的顛覆風格和戰鬥規則。經過數百次模擬測試,美國海軍發現,即使是宙斯盾防空系統這樣先進的防空系統,在應對無人機群攻擊時也難以分配火力,導致部分無人機能夠避開攔截,成功對艦艇發動攻擊。數據顯示,使用8架無人機集群攻擊艦艇時,平均有2.8架無人機可以避開宙斯盾攔截系統;當無人機數量增加到數十架時,成功避開攔截系統並實現突防的無人機數量就更多。這些模擬測試充分證明無人機群作戰效果顯著,對目前的防禦系統構成巨大威脅。同時,也預示著集群式自主作戰必然成為未來智慧戰場上重要的進攻作戰方式。

中國軍事原文來源:http://www.mod.gov.cn/gfbw/jmsd/4858888.html

China’s Military Emphasizing Research of System-based Superior Warfare: How to Fight Using Informationized Warfare? Analysis of Nine Typical Combat Styles

中國軍隊重視系統優勢戰爭研究:資訊化戰爭如何打仗?九種典型戰鬥風格解析

現代英語:

System-based superior warfare is a system-based warfare in information warfare. It is not limited to a specific combat style, but a “combination punch” or a group of combat styles composed of multiple combat styles and tactics. It emphasizes that according to the changes in combat missions, combat opponents and battlefield situations, as long as it is conducive to forming relative advantages and achieving system victory, any appropriate combat means and styles can be flexibly used to form combat advantages. In the specific implementation of system-based superior warfare, these specific combat styles and action tactics can be organized and implemented separately as part of joint full-domain operations, and more emphasis is placed on “combination punches”, multiple strategies, and overall victory.
In order to better understand its core connotation, this article lists nine typical combat styles, including overall deterrence warfare, electromagnetic interference warfare, network attack warfare, cognitive control and interference warfare, and analyzes them.

System concentration warfare – a “combination punch” that flexibly uses a variety of combat styles. Author: Academic Plus Senior Observer Dong Zhou
The main content and keywords of this article

  1. Overall deterrence warfare: emphasize multi-domain joint deterrence; the implementation of overall deterrence warfare should have three major elements; strong overall strength is the core of achieving effective deterrence
  2. Electromagnetic interference warfare: the key to competing for information advantage; in terms of combined means and methods, information empowerment is achieved through “connection + sharing”; an effective method to crack unmanned cluster warfare
  3. Network attack warfare: mainly soft killing, combining soft and hard, focusing on breaking the network and reducing energy
  4. Cognitive control and interference warfare: control the cognitive right of situational awareness, compete for information advantage; control the right to command and decision-making, compete for decision-making advantage; control the “brain” right, and seize the brain control advantage
  5. Agile mobile warfare: high-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant aggregation of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
  6. Swarm autonomous warfare: conducive to forming a system advantage to suppress the enemy; conducive to enhancing combat effectiveness; conducive to trapping the enemy in combat difficulties
  7. Precision point killing war: achieve high efficiency and cost-effectiveness in operations; hitting key node targets is an important option; large-scale system support is a basic condition; it is inseparable from accurate intelligence support
  8. Supply chain disruption war: the supply guarantee chain has a huge impact on the overall operation; the focus of attack is the key node of the enemy’s supply guarantee chain; the key is to choose the right time to use tactics
  9. System destruction and paralysis war: the combat goal is to make the enemy’s combat system disordered; hit the key nodes of the combat system with a heavy punch; implement a soft attack on the enemy’s combat system

For learning reference only, welcome to communicate and correct! The views of the article do not represent the position of this organization
The concept of operation is first proposed as a new combat style. Innovative combat style is the core content of the development of combat concepts. It can be said that system-based optimization warfare is a general term for a series of specific tactics. The following nine typical combat styles constitute the combat method system of system-based optimization warfare. They are: First, overall deterrence warfare, actively organizing static power demonstrations and deterrence actions in the system-based superiority warfare, striving to win the battle without fighting or with a small battle; second, electromagnetic interference warfare, using a variety of combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for electromagnetic spectrum advantages, seize information control, and thus win the initiative in combat; third, network attack warfare, using a variety of means such as soft strikes and hard destruction to break the enemy’s command network, intelligence network, communication network, and logistics supply network, and disrupt the enemy’s command and support; fourth, cognitive control and interference warfare. Through information attacks, public opinion attacks, and brain attacks, control advantages are formed in cognitive space; fifth, agile mobile warfare. Rapidly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; sixth, swarm autonomous warfare. Widely use unmanned combat means such as “swarms”, “wolf packs”, and “fish schools” to autonomously organize actions and distributed attacks to achieve human-machine joint victory; seventh, precision point killing warfare. Accurately obtain intelligence, implement multi-domain precision strikes, strive to hit one point to shake the overall situation, and maximize combat effectiveness; Eighth, supply chain disruption warfare. Organize elite forces to attack the enemy’s logistics and equipment supply chain, supply lines and supply bases, and destroy the enemy’s loss of supply and withdrawal from the battle; Ninth, system destruction and paralysis warfare. Comprehensively adopt a variety of means such as breaking the network, training, and hitting nodes to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system.

  1. Overall deterrence warfare
    Overall deterrence warfare refers to actively organizing static power displays and deterrence actions in system-based superior warfare, striving to defeat the enemy without fighting or fighting a small battle. Sun Tzu said: “To defeat the enemy without fighting is the best of the best.” Deterrence and war are two main forms of military activities. Deterrence is mainly to show determination and will to potential opponents by showing strength or threatening to use strong strength to deter the opponent’s actions. It can be said that the overall deterrence warfare in the system-based superior warfare is an important means or tactics to achieve “stopping” the enemy’s troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first of all, strong in general, and then strong in key parts. Modern warfare is a confrontation between systems. The overall deterrence war under the informationized local war requires not only the traditional deterrence means and capabilities of land, sea, air and space, but also new deterrence means and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence, and more importantly, the overall deterrence that demonstrates the overall strength of the country. In particular, with the rapid development of advanced technologies such as information technology, the scientific and technological revolution, industrial revolution, and military revolution are accelerating integration, and the coupling relationship between strategic competitiveness, social productivity, and military combat effectiveness is closer. Winning the informationized war is more of a contest of national will and national overall strength. If you want to contain the war, you must first deter your opponent from the overall strength.
    1.1 Emphasize multi-domain joint deterrence
    Deterrence means usually include nuclear deterrence and conventional deterrence. In the system-based superiority war, the overall deterrence war is implemented, aiming to comprehensively use the conventional deterrence means of the land, sea, air, space, and power grid in the whole domain to achieve the purpose of deterrence. In particular, with the application of information network technology and space and directed energy technology in the military, space, network, and electromagnetic weapons have become new means of deterrence. Space deterrence mainly uses rapid response electromagnetic orbital weapons, space-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, high-power microwave weapons and other equipment to threaten and attack the opponent’s space targets, forming an “interference and blocking” deterrence against the enemy’s space information. Network deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other key information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communication and other informationized weapon equipment systems to achieve deafening and blinding deterrence against the enemy. 1.2 Three elements should be possessed in the implementation of overall deterrence warfare
    To implement overall deterrence warfare and achieve the expected deterrence effect, three elements are usually required: one is strength. The deterrent party must have reliable capabilities or strength that make the opponent feel daunted and fearful; the second is determination and will. The deterrent party must dare to use this capability when necessary; the third is clear information transmission. The deterrent party must accurately and effectively let the other party know its action capability and determination.
    Historically, there are three main changes in the criteria for judging deterrence strength: first, active military strength; second, comprehensive national strength or war potential; third, the total number of main combat weapons and equipment. For a long period of history, the number of troops was deterrence, and the strength of military strength directly depended on the size of the active army, the number of important weapons and equipment, and non-material factors such as military training and organization morale. After the 20th century, with the expansion of the scale of war, deterrence strength is no longer limited to the number of troops and important weapons and equipment, but is determined by the country’s war potential, including economic strength, scientific and technological strength, energy resources, and even population size, etc. The overall deterrence war in the system-based superiority war, the formation of its deterrence strength is mainly based on the network information system, and the joint full-domain deterrence capability formed under the integration of the system.
    1.3 Strong overall strength is the core of achieving effective deterrence
    The development of information technology and its extensive penetration and application in the military field have provided favorable conditions for building overall strength and achieving overall deterrence. System-based superior warfare is supported by the network information system and makes full use of the penetration and connectivity of information technology. It not only integrates various combat forces, combat elements, and combat units into an organic whole to achieve military system combat advantages, but also connects and integrates various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, into the national war mobilization system, gathers various forces and resources to form an overall force, realizes the emergence effect of system capabilities, and shows the overall strength advantage. It forms a powerful invisible deterrent of unity and common hatred of the enemy, and creates a situation where the enemy “has power but cannot act” and “can act but has no effect”, which plays a role in containing and winning the war.
    In the overall deterrence war, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even relevant regions of the world; the mobilization time will be faster, and the mobilization and action information can be quickly transmitted to everyone and every node at the first time by using the network and information system; the action coordination and collaboration will be more consistent, and the forces distributed in various regions can act in a unified manner almost at the same time based on the same situation and the same order, greatly improving the efficiency of action coordination; the resource utilization will be more sufficient, and various war resources based on the network can quickly realize the transition from peace to war and from military to civilian, and realize the integrated and precise guarantee of the front and rear.
  2. Electromagnetic interference warfare
    Electromagnetic interference warfare refers to the flexible use of various combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantage of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat.
    2.1 The key to competing for information advantage Local information warfare is highly dependent on the electromagnetic spectrum, and the control and counter-control of electromagnetic space have become the focus of competing for the right to control information. Organizing and implementing electromagnetic interference warfare is mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. Using electromagnetic means to disrupt and destroy the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capability, and enable the enemy to ensure the rapid and effective flow of information in the scenario where the enemy has the right to control information, and drive the command flow, action flow, material flow, and energy flow through the information flow, thereby gaining the dominance and initiative of the operation.
    2.2 The basic focus is to disable and invalidate the enemy’s combat system. The implementation of electromagnetic interference warfare in the system-based superior warfare is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure the effective use of electromagnetic space by the enemy, various electronic reconnaissance, interference, attack, defense and support forces are organized to interfere with and attack the enemy’s communication network, radar network, computer network and command center, communication hub, radar station, computer network node, global navigation positioning system, space-ground integrated Internet and other space link systems, and other various frequency-using weapons and equipment, block and destroy their communication and data transmission, and destroy the “connection” and “sharing” structural center of gravity of the enemy’s combat system, and provide support for the seizure of information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities and disabling the enemy’s entire combat system.
    2.3 Effective tactics to crack unmanned swarm warfare
    Unmanned autonomous swarm warfare such as “bee swarm”, “wolf pack” and “fish pack” is an important feature of information-based local warfare with intelligent characteristics. There are a large number of various unmanned autonomous clusters, with various types and complex characteristics, and each individual can complement each other and replace each other to play a role. It will be very difficult to intercept and destroy the entire unmanned cluster. However, from a technical perspective, in order to achieve effective coordination in unmanned combat clusters, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield situation and information, and it will be difficult to coordinate actions with each other, and it will be difficult to play its due combat effectiveness. This provides an opportunity for the other party to implement communication interception and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attack on the information and communication network of unmanned clusters, and destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective coordination, thereby losing combat capability.
  3. Network attack warfare
    Network attack warfare refers to the comprehensive use of network and computer technologies and other effective means to conduct military confrontation actions around the control of information and information networks. It is a major combat style for cyberspace operations and the struggle for network control. Its main combat operations include both soft killing and hard destruction, mainly soft and hard. Among them, soft kill is mainly network attack, that is, the comprehensive use of blocking attack, virus attack and other means to block and attack the enemy’s information network, command system, weapon platform, etc., making it difficult for the enemy’s network, command information system, etc. to operate effectively or even paralyzed; hard destruction mainly uses precision firepower strikes, high-energy microwaves, electromagnetic pulses and anti-radiation attacks to paralyze the enemy’s information network physical facilities and destroy the enemy’s combat and weapon equipment entities.
    The focus is on breaking the network and reducing the ability to fail. Organizing network attack in the system concentration war is to target the weaknesses of the opponent’s military information network, take advantage of the system, organize various network attack forces, and continuously implement soft kill and hard destruction actions against the enemy’s combat command network, reconnaissance intelligence network, communication network and even logistics supply network throughout the combat process, destroy the enemy’s network system, and make the enemy’s combat system function decline or even disabled as a whole. Mainly against the enemy’s basic information network, intelligence network, command network, support network and other core targets, implement a series of combat operations such as network and electricity coordinated attack, deception confusion, link blocking, takeover and control, so that the enemy’s intelligent combat network system is disabled and ineffective, and achieve a key victory in paralyzing the enemy system.
  1. Cognitive control and disturbance warfare
    Cognitive control and disturbance warfare refers to the interference, destruction or control of enemy thinking and cognition through information attack, public opinion attack and brain attack in the system-based superiority warfare, so that the enemy cannot make correct judgments and decisions, thereby forming a control advantage over the enemy in the cognitive space.
    The cognitive domain, that is, the human thinking space and consciousness space, is a field that has a key impact on combat decisions and judgments. The development of information technology, especially artificial intelligence technology, and its wide application in the military field have expanded the competition of war from physical space and information space to cognitive space, making cognitive space a new combat domain. With the development of information and intelligent technology and their extensive and in-depth application in the military field, human-machine intelligence tends to merge, making the status of cognition in intelligent warfare operations more prominent, and the cognitive field has gradually become an important battlefield. Controlling cognitive rights has become a key factor in future battlefield control rights. Fighting for cognitive control rights has become an important combat style for winning in informationized local wars with intelligent characteristics.
    4.1 Controlling situational awareness and cognitive rights and fighting for information advantages
    In the system-based superiority warfare, information flow drives material flow and energy flow, and information advantage determines decision advantage. The rapid and accurate recognition of intelligence information and battlefield situation has an important impact on gaining command and decision-making advantages. Therefore, in order to organize and implement system-based optimization, we must make full use of intelligent technology and big data technology to analyze massive intelligence information data.

國語中文:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示與威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動;三是網絡破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通訊網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速響應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間資訊「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連結、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界相關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,以網路為基礎的各種戰爭資源,可快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2 基本著眼點是使敵作戰體系失能失效體系聚優戰中實施電磁擾阻戰,主要是針對敵方對電磁空間的依賴,同時為確保己方對電磁空間的有效利用,組織各種電子偵察、幹擾、攻擊、防禦和支援力量,對敵通信網、雷達網、電腦網和指揮中心、通信樞紐、雷達站、電腦網路節點,全球導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通訊聯絡與資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱敵指揮控制能力,使敵整個作戰體系失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊網路物理設施,摧毀敵作戰及武器裝備實體。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷與硬摧毀行動,破壞敵之網路體系,使敵作戰體系功能整體下降甚至失能。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。


4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行

中國軍事資料來源:https//www.81it.com/2022/0901/13716.html

Chinese Military and Determining A Winning Mechanism of Intelligent Warfare Strategy

中國軍隊與智慧戰爭戰略制勝機制的確定

現代英語音譯:

Through the smoke of war, we can see that today’s war has developed from barbaric flesh-and-blood battles and battles to capture cities and territories to information-led precise beheadings and fierce competition on the intellectual battlefield. This objective fact tells us that war, as a specific complex social phenomenon, will present different war forms and winning mechanisms in different historical periods. As American futurist Toffler pointed out, “Artificial intelligence is like previous missiles and satellites. Whether you are prepared or not, it will enter the historical stage of human civilization war.” President Xi clearly pointed out: “If we do not understand the winning mechanism of modern war, then we can only look at a diorama and miss the point.” The winning mechanism of war refers to the way in which various war factors play a role in winning a war. and the laws and principles of interconnection and interaction. Compared with information-based warfare in the traditional sense, the winning mechanism of future intelligent warfare has undergone significant changes.

The method of confrontation has changed from “system confrontation” to “algorithmic game”, and algorithmic advantages dominate war advantages.

Algorithms are strategic mechanisms for solving problems. In fact, an “algorithm” is a series of clear instructions for solving a problem. It is a clear step to solve a certain type of problem according to certain rules. In future wars, the party that masters the advantages of algorithms can quickly and accurately predict battlefield situations, innovate optimal combat methods, and achieve the war goal of “victory before fighting”.

Algorithms are the key to leading intelligent warfare. First, algorithmic advantages dominate cognitive advantages. After big data is processed through high-performance and efficient algorithms, massive data is quickly converted into useful intelligence. Therefore, the party with the advantage of the algorithm can dispel the “battlefield fog” caused by the lack of timely processing of data, making the understanding more profound. Second, the algorithm advantage dominates the speed advantage. Compared with classical algorithms, quantum algorithms have achieved exponential acceleration effects. In addition, quantum computers have increased from 1 qubit in 2003 to 1,000 qubits in 2015. The computing efficiency is 100 million times faster than that of classical computers. Artificial intelligence has achieved a qualitative leap. Third, algorithmic advantages dominate decision-making advantages. Algorithms, with their high-speed and precise calculations, replace people’s “meditation” and repeated exploration, thereby accelerating knowledge iteration. Mastering super powerful algorithms can quickly propose flexible and diverse combat plans and countermeasures in response to changes in the enemy’s situation, constantly disrupting the enemy’s established intentions and deployment.

Algorithms are at the heart of the jump in war effectiveness. First, war is more efficient. With the support of algorithms, artificial intelligence can react hundreds to thousands of times faster than humans. In 2016, the “Alpha” intelligent software developed by the United States has a reaction speed 250 times faster than humans. It controlled a third-generation aircraft to defeat a manned fourth-generation aircraft in a simulated air battle. Second, the war endurance is stronger. Artificial intelligence is not limited by physiological functions and can continuously perform repetitive and mechanical tasks. In September 2016, an F-16 fighter jet reached 8 times gravity during training, causing the pilot to lose consciousness. However, before the plane hit the ground, the onboard “automatic anti-collision system” automatically pulled the plane up, avoiding the tragedy. occur. Third, the outcome of the war is better. With the support of massive data and supercomputing capabilities, artificial intelligence judgment and prediction results are more accurate. The combined use of manned and unmanned equipment in the U.S. military’s search and hunt for bin Laden is a successful example.

Combat elements are changing from “information-led” to “machine-based warfare”, and machine-based warfare reshapes the combat process

In the future, intelligent technology will penetrate into all elements and processes of war. The Internet of Things, the Internet of Intelligence, and the Internet of Brains have become the basis of war. The four domains of physical domain, information domain, cognitive domain, and social domain are deeply integrated, making the battlefield holographically transparent. There are people to control the war and no one to fight on the battlefield. Intelligent weapons and equipment will reshape the combat process “from sensor to shooter”.

“Detection” with a keen eye. “Reconnaissance” refers to intelligent intelligence reconnaissance. It can use multi-dimensional sensors such as land, sea, air, space, and electricity for virtualized collaborative networking, self-organized dynamic scheduling, automatic mining of multi-source intelligence, and order-based on-demand use to maximize information shortage or information redundancy. The “fog of war” brought about by the epidemic has opened up the “eyes” to see through intelligent warfare.

Loop “control”. “Control” refers to intelligent command and control. Focusing on the core of decision-making advantages, we use the human-machine collaboration technology of “human in the loop” and adopt three decision-making and control methods of “human in the loop”, “human in the loop” and “human outside the loop” according to the autonomous authority of the machine. , forming a comprehensive advantage with superior decision-making quality and action speed.

Smart “hit”. “Strike” refers to intelligent offensive and defensive operations. Relying on the advantages of system structure and algorithm, it mobilizes all-domain multi-dimensional, manned and unmanned combat platforms in real time, quickly couples combat forces, builds combat systems on demand, focuses on targets, independently implements “distributed” and “swarm” collaborative operations, and quickly resolves battles after they are completed. Couple and wait for the battle, so that the troops can gather and disperse randomly. At the end of 2015, Russia invested 6 tracked unmanned combat vehicles, 4 wheeled unmanned combat vehicles and 1 drone to support the Syrian government forces in storming Islamic extremist strongholds and achieved the world’s first unmanned combat victory. Victory in the tough battle dominated by cars. During the battle, about 70 extremist militants were killed, while only four Syrian government troops were injured.

The decision-making method changes from “human brain decision-making” to “intelligent decision-making”, and intelligent decision-making optimizes combat operations

With the emergence of intelligent auxiliary decision-making technology and “cloud brain”, “digital staff” and “virtual warehousing”, war decision-making has evolved from pure human brain decision-making to human-machine hybrid decision-making, cloud-brain intelligent decision-making and neural network decision-making.

Human-machine hybrid decision-making. Reasonable division of labor and interaction and collaboration between humans and machines are the best solutions to explore and solve problems. The advantages of the human brain are creativity, flexibility, and initiative; the advantages of machines are fast speed, high precision, and resistance to fatigue. Artistic tasks such as high-level decision-making are handled by the human brain, and big data calculations are completed by machines. Human-computer interaction allows machines to “listen” to understand human language, “see” human movements and expressions, “understand” human emotions and intentions, and present the calculation process and results in a way that is easy for humans to understand.

Cloud brain intelligent decision-making. In future intelligent warfare, there will be a “brain” metaphor center, and distributed combat units will be linked through the cloud brain. This cloud brain is not only a physical information, physiological information and psychological information center, but also a military command center. Cloud brain decision-making is based on the intelligent “network, cloud and terminal” system. “Net” is an intelligent combat basic network integrating intelligent battlefield perception, decision-making and weapons control systems. “Cloud” is built on the basis of “network”, with the intelligent resource service layer as the main body. It is not only a “resource pool” that integrates various combat resources, but also an “intelligent cloud” that provides intelligent services for combat operations. Due to the coupling of multiple centers, rapid networking and decision-making can be achieved even when bombarded by information. “End” refers to the combat resource end, discrete intelligence and networked intelligence in combat processes, which can not only make independent decisions, but also provide distributed intelligent resources for the war system, allowing the new war system to emerge with group intelligence.

Neural network decision-making. In July 2018, Russia developed artificial neural network fully automatic software that can destroy immediately upon discovery. The intelligent decision-making tool developed by the US military is intended to shorten the decision-making cycle and improve decision-making efficiency. The application of neural networks was once limited to tactical-level calculations, making it difficult to make qualitative analysis and decisions on strategic-level macro-complex situations. “AlphaGo” has made a breakthrough in the field of Go by simulating the working mechanism of the human brain’s neural network. In the future, the super self-evolution and strategic decision-making capabilities of deep neural networks will realize a combat cycle of “people outside the loop”.

The combat style has changed from “breaking links and breaking bodies” to “extreme operations”, which subvert traditional combat methods.

Extreme warfare breaks through the boundaries of traditional warfare, subverts traditional combat styles, dramatically increases war effectiveness, and creates a truly all-weather, all-time, all-dimensional, all-domain intelligent warfare.

Break through the limits of human physiology and thinking. First, the combat space and fields have been extremely expanded. Intelligent warfare in the future will be three-dimensional, all-dimensional, and all-domain operations. The war space will expand from the traditional space field to the polar regions, deep seas, outer space, and other extremes. It will especially penetrate into the cognitive domain, information domain, and penetrate into other fields, including combat fields. More blurry. Second, the combat process has been extremely accelerated. Unmanned autonomous warfare has greatly compressed the “observation-judgment-decision-action” cycle, developing from the “instant destruction” of information warfare to the “instant destruction” of intelligent warfare. The victory of intelligent warfare is achieved by advancing the warning time, shortening the decision-making time, and extending the combat operations forward to achieve the effect of preemptive layout and preemptive strike. Third, combat operations are extremely flexible. In intelligent warfare, artificial intelligence can propose extremely rich combat plans, and the unmanned combat platform can quickly switch between different functional roles, making combat operations more bold and adventurous, and tactics more unexpected. Even if one of the combat elements loses its function, the “decentralization” function will ensure that the function of the group is not affected.

Subvert the traditional combat style. The first is intrusive lone wolf operations. That is, a single unmanned system operates independently. The second is the manned and unmanned coordinated system attack battle. That is, based on intelligent unmanned systems, through mixed operations with and without unmanned equipment, combat objectives can be quickly achieved. The third is the independent operation of unmanned system formations. Multiple sets of unmanned systems constitute a combat unit that can perform complex tasks such as multi-target attacks. The fourth is mothership swarm operations. Using the mothership as the transportation carrier and command center, a manned and unmanned hybrid swarm combat style is formed.

It has the combat effectiveness of “nuclear power”. Intelligent warfare maximizes the characteristics and potential of intelligent robots, leading to combat effectiveness approaching the limit. First, the target is small and difficult to find. For example, miniaturized stealth robots are difficult to detect with radar and sonar. The U.S. hybrid UAV with an Optode chip embedded in the Dragonfly is smaller, lighter and more stealthy, with a battery life of up to several months. Second, confrontation is difficult and costly. For example, as long as a beetle-sized micro-drone scans a human face, it can directly hit the target’s head after data analysis and determination, and it can carry enough ammunition to penetrate the brain. Third, the cost is low and the damage is great. In the future, the use of intelligent weapons in extreme operations will have the power of nuclear weapons, especially extremely large-scale intelligent weapons and equipment, extremely low-cost robot automatic production, and extremely flexible robot swarm operations, which may exceed the maximum explosion power of nuclear weapons.

國語音譯:

2019年01月15日08:00 | 来源:解放军报

透过战争的硝烟,我们可以看到,今天的战争已经从蒙昧野蛮的血肉之搏、攻城略地的兵戎相见发展到信息主导的精确斩首、智域疆场的激烈角逐。这一客观事实告诉我们,战争作为一种特定的复杂社会现象,在不同的历史时期会呈现出不同的战争形态与制胜机理。正如美国未来学家托夫勒指出,“人工智能就像先前的导弹、卫星一样,无论你是否有所准备都将登上人类文明战争的历史舞台”。 习主席明确指出:“如果不把现代战争的制胜机理搞清楚,那就‘只能是看西洋镜,不得要领’。”战争制胜机理,是指为赢得战争胜利,战争诸因素发挥作用的方式及相互联系、相互作用的规律和原理。未来智能化战争与传统意义上的信息化战争相比,制胜机理发生了显著变化。

对抗方式从“体系对抗”向“算法博弈”转变,算法优势主导战争优势

算法是求解问题的策略机制。实际上,“算法”是一系列解决问题的清晰指令,是按照一定规则解决某一类问题的明确步骤。未来战争掌握算法优势的一方,能快速准确预测战场态势,创新最优作战方法,实现“未战而先胜”的战争目的。

算法是主导智能化战争的关键。第一,算法优势主导认知优势。大数据通过高性能、高效率的算法进行处理后,将海量数据快速转换为有用的情报。因此,占有算法优势的一方,能驱散因数据得不到及时处理而产生的“战场迷雾”,使得认知更为深刻。第二,算法优势主导速度优势。量子算法相比于经典算法,实现了指数级的加速效果,再加上量子计算机从2003年的1位量子比特,到2015年1000位量子比特,计算效率比经典计算机快了一亿倍,使人工智能实现了质的飞跃。第三,算法优势主导决策优势。算法以其高速、精确的计算,代替人的“冥思苦想”和反复探索,从而加速知识迭代。掌握超强算法能够针对敌情变化快速提出灵活多样的作战方案与应对之策,不断打乱敌既定企图和部署。

算法是战争效能跃升的核心。一是战争效率更高。在算法的支撑下,人工智能的反应速度是人类的成百上千倍。2016年,美国研发的“阿尔法”智能软件,反应速度比人类快250倍,在模拟空战中操控三代机击败了有人驾驶的四代机。二是战争耐力更强。人工智能不受生理机能限制,可连续执行重复性、机械性任务。2016年9月,一架F-16战机在训练中达到8倍重力过载,导致飞行员失去知觉,然而,在飞机撞击地面前,机载“自动防撞系统”自动将飞机拉起,避免了悲剧发生。三是战争结局更好。在海量数据和超算能力支持下,人工智能的判断和预测结果更加准确。美军寻找和捕杀本·拉登行动,有人和无人装备的组合运用就是一个成功的战例。

作战要素从“信息主导”向“机器主战”转变,机器主战重塑作战流程

未来智能科技将渗透到战争全要素全过程。物联网、智联网与脑联网成为战争的基础,物理域、信息域、认知域、社会域四域深度融合,使战场全息透明,战争控制有人,战场交锋无人。智能化武器装备将重塑“从传感器到射手”的作战流程。

慧眼“侦”。“侦”,即智能化情报侦察。能将陆、海、空、天、电等多维传感器,进行虚拟化协同组网、自组织动态调度、多源情报自动挖掘、订单式按需使用,最大程度上拨开信息不足或信息冗余带来的“战争迷雾”,开启透视智能化战争的“慧眼”。

回路“控”。“控”,即智能化指挥控制。围绕决策优势这一核心,运用“人在回路”的人机协同技术,按照机器的自主权限,采取“人在回路中”“人在回路上”“人在回路外”三种决策与控制方式,以高敌一筹的决策质量和行动速度形成全面优势。

智能“打”。“打”,即智能化攻防作战。依托体系结构和算法优势,实时调集全域多维、有人无人作战平台,快速耦合作战力量,按需构建作战体系,聚焦目标,自主实施“分布式”“蜂群式”协同作战,交战完毕迅速解耦待战,做到兵无常势、聚散随机。2015年底,俄罗斯投入6台履带式无人战车、4台轮式无人战车和1架无人机,支援叙利亚政府军强攻伊斯兰极端势力据点,取得了世界上第一场以无人战车为主的攻坚战胜利。战斗中约70名极端势力武装分子被击毙,而叙利亚政府军只有4人受伤。

决策方式从“人脑决策”向“智能决策”转变,智能决策优化作战行动

随着智能辅助决策技术和“云端大脑”“数字参谋”“虚拟仓储”的出现,战争决策由单纯的人脑决策发展为人机混合决策、云脑智能决策和神经网络决策。

人机混合决策。人与机器的合理分工与交互协同是探索解决问题的最优方案。人脑的优势在于创造性、灵活性、主动性;机器的优势在于速度快、精度高、抗疲劳。高层决策等艺术性强的工作由人脑来处理,大数据计算由机器完成。人机交互是让机器能“听”懂人类语言、“看”懂人类动作与表情、“理解”人的情绪和意图,把计算过程和结果用人容易理解的方式呈现出来。

云脑智能决策。未来智能化战争,将有一个“大脑”的隐喻中心,分布式的作战单元将通过云大脑链接。这个云大脑既是物理信息、生理信息和心理信息中心,也是军事指控中心。云脑决策以智能“网、云、端”体系为依托。“网”,是集智能化战场感知、决策和武器控制系统于一体的智能型作战基础网络。“云”,依“网”而建,以智能型资源服务层为主体,既是融合各类作战资源的“资源池”,也是为作战行动提供智能化服务的“智能云”。由于多中心的耦合,即使遭受信息轰炸也能快速组网和决策。“端”,是指作战资源端,作战流程上的分立智能和联网智能,既能自主决策,又能为战争体系提供分布式智能资源,使新的战争体系涌现出群体智能。

神经网络决策。2018年7月,俄罗斯研制的人工神经网络全自动软件,能做到发现即摧毁。美军研发的智能化决策工具,意在缩短决策周期,提高决策效率。神经网络的应用曾局限于战术级计算,难以对战略级宏观复杂态势做出定性分析和决策。“阿尔法狗”通过模拟人脑神经网络工作机制在围棋领域取得突破。未来深度神经网络的超强自我进化和战略决策能力,将实现“人在回路外”的作战循环。

作战样式从“断链破体”向“极限作战”转变,极限作战颠覆传统作战手段

极限作战突破了传统战争的界限,颠覆了传统的作战样式,使战争效能剧增,出现了真正意义上的全天候、全时空、全方位、全领域的智能化战争。

突破人类生理和思维极限。一是作战空间和领域极度拓展。未来智能化作战是立体、全维、全领域作战,战争空间将从传统的空间领域,向极地、深海、太空等极限拓展,特别是向认知域、信息域渗透并贯穿其他领域,作战领域更加模糊。二是作战进程极度加快。无人自主作战大幅压缩“观察—判断—决策—行动”周期,从信息化战争的“瞬时摧毁”发展为智能化战争的“即时摧毁”。智能化战争的胜利,是通过预警时间提前、决策时间缩短,作战行动向前延伸,达到先手布局、先发制人的效果。三是作战行动极度灵活。智能化战争中,人工智能能够提出极为丰富的作战方案,加之无人作战平台,能够在不同功能角色之间快速切换,作战行动更为大胆冒险,战术战法更为出乎意料。即使作战要素中的某一个丧失功能,“去中心化”的功能也会确保群体功能不受影响。

颠覆传统作战样式。一是侵入式独狼作战。即单套无人系统独立作战。二是有人无人协同体系破击战。即基于智能无人系统,通过有无人装备混合作战,快速达成作战目的。三是无人系统编队独立作战。多套无人系统构成作战单元,可执行多目标攻击等复杂任务。四是母舰蜂群集群作战。以母舰为运输载体和指挥中心,形成有人无人混合集群作战样式。

具备“核威力”的作战效能。智能化战争把智能机器人的特性和潜能发挥到极致,导致作战效能接近极限。一是目标小、难发现。比如微型化隐身机器人,雷达和声呐很难发现。美国在“蜻蜓”中嵌入“光极”芯片的混合无人机,更小更轻更隐秘,续航时间高达几个月。二是对抗难,代价高。比如甲虫大小的微型无人机只要扫描到人脸景象,经数据分析和确定即可直接撞向目标头部,携带的弹药足以穿透大脑。三是造价低、破坏大。未来运用智能化武器极限作战具有核武器的威力,特别是极大体量的智能化武器装备,极低成本的机器人自动生产,极度灵活的机器人集群作战,可能会超越核武器爆炸威力的极大化。

中國政府原文來源:https://military.people.com.cn/n1/2019/0115/c1011-3053888.html

中國軍隊——揭開境外網路空間行動之謎

Chinese Military – Uncovering the Mysteries of Foreign Cyberspace Operations

原始中文國語:

隨著科學技術的不斷發展,戰爭形式已進入資訊化戰爭時代。 資訊已成為戰鬥力的主導要素。 雙方圍繞著資訊的收集、傳輸和處理展開了激烈的對抗。 網路空間是資料和資訊傳輸的通道。 現代作戰單位之間的橋樑。

美國軍方是第一個將網路空間軍事化的國家。 2008年,美國成立空軍網路司令部,將網路空間定義為整個電磁頻譜空間,將認知和實踐從狹隘的資訊域延伸到廣闊的網路域。 。 2018年1月,美國陸軍訓練與條令司令部(TRADOC)發布了《TP 525-8-6美國陸軍網路空間與電子戰作戰概念2025-2040》,描述了美國陸軍將如何在網路空間和電子戰中作戰。 在電磁頻譜中運行,以應對未來作戰環境的挑戰。 與其他傳統作戰領域相比,網路空間將對未來作戰產生哪些影響? 在未來一體化聯合作戰背景下,能為多域聯合作戰帶來哪些突破?

神秘-網路空間行動

第五大領域資訊化戰爭。 賽博空間一詞最早出現在1982年的加拿大科幻小說《全像玫瑰碎片》中,描述了網路與人類意識融合的賽博空間。 根據美國國防部軍事詞彙詞典,網路空間是資訊環境中的全球性領域,由獨立的資訊技術基礎設施網路組成,包括互聯網、電信網路、各種區域網路和電腦系統以及嵌入式處理器和控制器。 隨著網路技術的不斷發展,網路空間已從電腦網路擴展到不可見的電磁頻譜,即電磁環境中的實體場。 它不僅包括我們通常認識的電腦網絡,還包括使用各種電磁能量的所有物理系統。

此外,在現代戰爭中,網路空間是資訊戰的新領域。 已被美軍列為與陸、海、空、天同等重要、必須保持決定性優勢的五個領域之一。 涉及網路戰、資訊戰、電子戰、太空戰、指揮控制戰、C4ISR等領域。 它是超越傳統的陸、海、空、天四維戰鬥空間的第五維度戰鬥空間。 它既相對獨立又嵌入其他領域。 與傳統領域相比,網路空間具有邊界邊界模糊、覆蓋範圍廣、情勢複雜多變的特性。

網路空間作戰超越了時間和空間的限制。 由於電磁頻譜缺乏地理邊界和自然邊界,網路空間超越了地理邊界、時間和距離的限制,使得網路空間作戰幾乎可以在任何地方發生,跨越陸地、海洋、太空和空中作戰,將傳統的四種作戰方式融為一體。立體作戰空間領域,可瞬間對遠程目標進行攻擊。 由於資訊在網路空間的傳播速度接近光速,高速資訊傳輸將大幅提升作戰效率與能力,提供快速決策、指導作戰、達到預期作戰效果的能力。 更重要的是,根據作戰需要,在網路空間或透過網路空間實現軍事目標或軍事效果可以分為進攻性網路作戰和防禦性網路作戰兩種類型。

進攻性網路行動是指在網路空間預防、削弱、中斷、摧毀或欺騙敵方網絡,以確保己方在網路空間的行動自由。 其主要行動包括實施電子系統攻擊、電磁系統封鎖和攻擊、網路攻擊和基礎設施攻擊等。防禦性網路行動包括防禦、偵測、表徵、反擊和減輕網路空間威脅事件的活動,旨在保護美國國防部防禦網絡或其他友方網絡,維持被動和主動利用友方網路空間的能力,保護資料、網路和其他指定的系統能力。

網路空間電磁戰

戰略威懾,輿論制勝。 近年來,針對經濟、政治、軍事等目標的網路攻擊不斷增加。 由於具有規模大、隱蔽性好、攻擊基礎設施能力強等特點

網路攻擊已成為一些國家在政治衝突中的優勢。 優勢手段。 俄烏衝突期間,俄羅斯以網路空間為陣地,以無線電電子戰為輔助,切斷烏克蘭系統通訊,中斷烏克蘭指揮; 抵制輿論負面消息,發布正面消息; 它癱瘓了網路上的敵人。 利用敵方網站製造恐慌,然後配合部隊正面進攻,達到速勝的目的。

全球佈局,千里之外擒敵。 美國在建立以本國主導的網路空間安全框架的過程中,掌握了盟友的網路空間作戰能力,建立了全球軍事基地和網路空間互聯互通。 相關情報人員平時透過情報行動完成網路預設,例如利用網路等手段透過情報分析來監控和收集敵方網路資料。 透過網路預設,必要時可利用網路漏洞入侵敵方網路、控制系統、破壞資料等,實現「千里取敵性命」。 2010年7月,美國透過某種蠕蟲病毒入侵伊朗核電廠,並控制了其核心設備,大大拖延了伊朗的核計畫。

充分發揮非對稱作戰優勢,提高作戰效益。 「舒特」計畫是美國空軍為了壓制敵方防空能力而提出的。 它利用不對稱作戰理論來摧毀敵方的防空系統。 核心目標是入侵敵方通訊、雷達、電腦等網路電力系統。 戰爭中,「舒特」攻擊可以透過遠程無線電侵入敵方防空預警系統和通訊系統的電腦網絡,進而攻擊並癱瘓敵方防空系統,或攻擊敵方可用的電子系統和網路系統,突破敵人的網絡。 攔截,然後利用相應的專業算法(主要是“木馬”病毒)侵入敵方雷達或網絡系統,監聽或竊取相關信息,洩露敵方作戰計劃、部隊部署、武器裝備等重要信息,從而幫助調整己方的作戰計畫、作戰結構和武器配比,以最小的成本獲得最大的利益。

網路空間作戰的未來發展

各國日益重視,大力發展。 隨著各國意識的加深,發展網路能力、贏得網路戰爭已成為各國謀求軍事優勢、贏得未來戰爭的重要內容。 2015年,美軍根據「伊斯蘭國」組織成員在網路上發布的評論和照片,利用大數據分析和偵察定位,最終在22小時內摧毀了一個「伊斯蘭國」指揮所。 目前,美國已成立網路空間司令部,組成網路空間作戰部隊,深化作戰理論研究,初步形成網路空間作戰能力。 其他國家也開展了網路競賽。 為了加強網路空間作戰能力,法國成立了新的資訊系統安全局。 英國政府發布國家通訊安全戰略,宣布成立網路安全辦公室和網路安全行動中心。 日本建立了以電腦專家為主的網路戰部隊,顯示網路空間戰引起了越來越多國家的興趣。

融合多種技術,增強網路空間作戰能力。 隨著新技術的突破,大數據技術、5G技術、人工智慧技術可以應用於網路空間作戰。 大數據技術可以儲存大量數據、收集複雜類型的數據,並且可以快速計算並獲取有用的信息。 它可以加快網路空間戰爭各方面的執行速度並使其更加精準。 5G技術具有低時延、高傳輸、大容量的特點,使得網路空間戰爭在全球環境、多域協同作戰中更具威脅性。 此外,還可以利用人工智慧深度學習、推理等能力來模擬網路空間戰爭。 在這個過程中,可以發現自身武器系統的弱點並加以改進。 透過這些技術的深度融合,可以將網路空間打造為智慧化、高傳輸、高精度的網路環境,為未來資訊化聯合作戰打造智慧大腦。

並掌握未來經營的主動權。

有效推進聯合作戰。 利用跨域資訊化聯合作戰本質上是基於地理空間部署,建立穩定且有效率的網路空間資訊活動態勢,共同實現作戰目標的新型作戰形態。 聯合部隊有不同的資訊能力。 實現高度共享和深度融合,增強即時態勢感知,提高指揮效率,提高一體化戰鬥力。 網路能力不僅可以服務單一軍種或單位,還可以優先保障戰略級目標,高水準組織網路戰爭和各兵種作戰,規劃陸、海、空等網路作戰。空氣和空間維度。 戰鬥目標。

未來的戰爭將是智慧化、系統化的戰爭。 「聯合資訊環境」是實現「跨域協作」、打造「全球一體化作戰」能力的策略性舉措。 隨著科技的不斷改善與發展,網路空間作戰將成為核心作戰領域之一,將大幅提升未來系統作戰效能,為謀取資訊優勢、贏得戰爭提供重要支撐。

外文原版英文:

With the continuous development of science and technology, the form of war has entered the era of information warfare. Information has become the dominant element of combat effectiveness. Both combatants are engaged in fierce confrontation around the collection, transmission and processing of information. Cyberspace is a channel for the transmission of data and information. The bridge between modern combat units.

The U.S. military was the first to militarize cyberspace. In 2008, the United States established the Air Force Cyber ​​Command and defined cyberspace as the entire electromagnetic spectrum space, extending cognition and practice from the narrow information domain to the broad cyber domain. . In January 2018, the U.S. Army Training and Doctrine Command (TRADOC) released “TP 525-8-6 U.S. Army Cyberspace and Electronic Warfare Operational Concept 2025-2040”, which describes how the U.S. Army will operate in cyberspace and electronic warfare. operate in the electromagnetic spectrum to meet the challenges of future operational environments. Compared with other traditional combat domains, what impact will cyberspace have on future operations? In the context of future integrated joint operations, what breakthroughs can it bring to multi-domain joint operations?

Mysterious – Cyberspace Operations

The fifth major area of ​​information warfare. The term cyberspace first appeared in the 1982 Canadian science fiction novel “Fragments of the Holographic Rose”, which describes a cyberspace where the Internet and human consciousness are integrated. According to the U.S. Department of Defense Military Vocabulary Dictionary, cyberspace is a global domain within the information environment that consists of independent information technology infrastructure networks, including the Internet, telecommunications networks, various local area networks and computer systems, and embedded processors and controller. With the continuous development of network technology, cyberspace has expanded from computer networks to the invisible electromagnetic spectrum, which is a physical field in the electromagnetic environment. It includes not only computer networks as we usually recognize them, but also all physical systems that use various types of electromagnetic energy.

In addition, in modern warfare, cyberspace is a new field of information warfare. It has been listed by the US military as one of the five areas that are as important as land, sea, air and space and must maintain decisive advantages. It involves network warfare, information warfare, electronic warfare, space warfare, command and control warfare, C4ISR and other fields. It is a fifth-dimensional battle space that transcends the traditional four-dimensional battle space of land, sea, air and space. It is both relatively independent and embedded in other fields. Compared with traditional fields, cyberspace has the characteristics of blurred border boundaries, wide coverage, and complex and changeable situations.

Cyberspace operations transcend the limitations of time and space. Due to the lack of geographical boundaries and natural boundaries in the electromagnetic spectrum, cyberspace transcends the limitations of geographical boundaries, time and distance, allowing cyberspace operations to occur almost anywhere, across land, sea, space and air operations, integrating traditional In the four-dimensional combat space field, attacks on remote targets can be carried out instantly. Since the propagation speed of information in cyberspace is close to the speed of light, high-speed information transmission will greatly improve combat efficiency and capabilities, and provide the ability to make quick decisions, guide operations, and achieve expected combat effects. More importantly, according to operational needs, achieving military goals or military effects in or through cyberspace can be divided into two types: offensive cyber operations and defensive cyber operations.

Offensive cyber operations refer to preventing, weakening, interrupting, destroying or deceiving the enemy’s network in cyber space to ensure one’s own freedom of action in cyber space. Its main actions include the implementation of electronic system attacks, electromagnetic system blockade and attack , network attacks and infrastructure attacks, etc. Defensive cyber operations include activities to defend, detect, characterize, counter and mitigate cyberspace threat events, aiming to protect the U.S. Department of Defense network or other friendly networks, maintain the ability to passively and proactively exploit friendly cyberspace, and protect data , network and other specified system capabilities.

Electromagnetic warfare in cyberspace

Strategic deterrence, public opinion wins. In recent years, there have been an increasing number of cyber attacks against economic, political, military and other targets. Due to the characteristics of large scale, good concealment, and ability to attack infrastructure networks, these attacks have become an advantage for some countries in political conflicts. means of advantage. During the conflict between Russia and Ukraine, Russia used cyberspace as its position and radio-electronic warfare as assistance to cut off the Ukrainian system in communications and interrupt the Ukrainian command; it resisted negative news in public opinion and released positive news; it paralyzed the enemy on the Internet. Use the enemy’s website to create panic, and then cooperate with the frontal attack of the troops to achieve the goal of quick victory.

Global layout, capturing enemies from thousands of miles away. In the process of establishing a cyberspace security framework dominated by its own country, the United States has mastered the cyberspace operations of its allies and established global military bases and cyberspace interconnectivity. Relevant intelligence personnel complete network presets through intelligence operations in peacetime, such as using the Internet and other means to monitor and collect enemy network data through intelligence analysis. Through network presets, when necessary, network vulnerabilities can be exploited to invade the enemy’s network, control the system, destroy data, etc., to achieve “taking the enemy’s life thousands of miles away.” In July 2010, the United States invaded Iran’s nuclear power plant through a certain worm virus and took control of its core equipment, greatly delaying Iran’s nuclear program.

Give full play to the advantages of asymmetric combat and improve combat benefits. The “Shute” plan was proposed by the U.S. Air Force to suppress the enemy’s air defense capabilities. It uses asymmetric combat theory to destroy the enemy’s air defense system. The core goal is to invade the enemy’s communications, radar, computer and other network power systems. In war, the “Shute” attack can invade the computer network of the enemy’s air defense early warning system and communication system through remote radio, and then attack and paralyze the enemy’s air defense system, or attack the enemy’s available electronic systems and network systems to break through the enemy’s network. Block, and then use corresponding professional algorithms (mainly “Trojan horse” viruses) to invade the enemy’s radar or network system, monitor or steal relevant information, and leak important information about the enemy’s combat plan, troop deployment, and weapons and equipment, thereby helping Adjust the combat plan, combat structure and weapon ratio to your own side to obtain the maximum benefits at the minimum cost.

The future development of cyberspace operations

Paying increasing attention to it, countries are vigorously developing it. As countries’ understanding deepens, developing cyber capabilities and winning cyber wars have become an important part of countries seeking military advantages and winning future wars. In 2015, based on comments and photos posted online by members of an “Islamic State” organization, the U.S. military used big data analysis and reconnaissance positioning, and finally destroyed an “Islamic State” command post within 22 hours. At present, the United States has established a Cyberspace Command, organized a cyberspace combat force, deepened research on combat theory, and developed preliminary cyberspace combat capabilities. Other countries have also launched cyber competitions. In order to strengthen its cyberspace combat capabilities, France established a new Information Systems Security Agency. The British government released the National Communications Security Strategy and announced the establishment of a Cybersecurity Office and a Cybersecurity Action Center. Japan has established a cyber warfare force mainly composed of computer experts, which shows that cyber space warfare has aroused the interest of more and more countries.

Integration of multiple technologies to enhance cyberspace combat capabilities. With the breakthrough of new technologies, big data technology, 5G technology, and artificial intelligence technology can be applied to cyberspace operations. Big data technology can store large amounts of data, collect complex types of data, and can quickly calculate and obtain useful information. It can speed up the execution of all aspects of cyberspace warfare and make it more accurate. 5G technology has the characteristics of low latency, high transmission and large capacity, making cyberspace warfare more threatening in a global environment and multi-domain coordinated operations. In addition, artificial intelligence deep learning, reasoning and other capabilities can be used to simulate cyberspace warfare. In the process, the weaknesses of one’s own weapon systems can be found and improved. Through the deep integration of these technologies, cyberspace can be built into an intelligent A network environment with high transmission and precision can create an intelligent brain for future information-based joint operations and grasp the initiative in future operations.

Effectively promote joint operations. The use of cross-domain information-based joint operations is essentially a new combat form that jointly achieves operational goals by establishing a stable and efficient cyberspace information activity situation based on the deployment of geographical space. The joint forces have different information capabilities. Achieve a high degree of sharing and deep integration to enhance real-time situational awareness, improve command efficiency, and improve integrated combat effectiveness. Cyber ​​capabilities can not only serve a single service branch or unit, but can also prioritize the protection of strategic-level goals, organize cyber wars and operations of various arms with a high overall level, and plan cyber operations in land, sea, air, and space dimensions. battle target.

Future wars will be intelligent and systematic wars. The “joint information environment” is a strategic move to achieve “cross-domain collaboration” and build “global integrated operations” capabilities. With the continuous improvement and development of technology, cyberspace Operations will become one of the core operational domains, which will greatly improve the effectiveness of future systematic operations and provide important support for seeking information advantages and winning wars.

2020 年 8 月 31 日 | 來源:人民網-軍事頻道

https://military.people.com.cn/n1/2020/0831/c1011-3184888z.html

中國軍用反衛星武器研製

Chinese Military Anti-Satellite Weapons Development

2021-06-24來源:政協

神舟十二號伸出機械臂的相關圖片傳出後,美媒隨即對相關信息進行了新一輪的報導,同時指出“這可能與神舟十二號的指揮官所言相同”。 美國太空軍之前就說過,中國可以俘虜美軍,衛星也是一樣,早在今年4月,美國太空軍司令部司令詹姆斯·迪金森將軍就在媒體鏡頭前公開宣稱,中國已經研製出 一顆配備大型機械臂的衛星,而中國正試圖將這顆衛星用於軍事目的,用來“抓取”美軍衛星。

那麼,什麼是反衛星技術?

理論上,哪裡有衛星,哪裡就有反衛星技術。 人造衛星分為三種,一種是科學衛星,一種是技術實驗衛星,第三種是應用衛星。 按用途可分為民用衛星和軍用衛星,軍用衛星又分為通信、氣象、偵察、導航、大地測量、攔截衛星等。

反衛星的原因

在現代戰爭中,天空對地面始終保持著巨大的作戰優勢。 人造衛星的出現,將這種優勢延伸到了外層空間。 在未來的戰爭中,誰能控制太空,誰就擁有戰爭的主動權。 成為各國軍事競爭的焦點。

人造衛星,特別是軍用人造衛星,由於速度快,每秒可飛行七八公里,90分鐘可繞地球一圈; 他們視野開闊,視野開闊,同樣的視角是飛機觀察的數万倍; 限制很少,可以自由飛越地球上的任何區域,在給己方帶來極大便利的同時,也給敵方帶來了巨大的潛在威脅。

因此,自1960年代以來,以美俄為代表的世界軍事強國都致力於研製“帶導反衛星”、“帶衛星反衛星”、“反衛星”等反衛星武器。 與能量”。 將其作為控制空間、消除威脅、奪取制空權的重要武器。

反衛星技術

反衛星技術是指從地面、空中或外太空攻擊敵方衛星的軍事技術。 目前,反衛星技術主要有核能反衛星技術、直升式動能反衛星技術、定向能反衛星技術和同軌反衛星技術。 核能反衛星技術殺傷距離大,技術門檻低,但因其產生的附帶傷害巨大,實用價值不大。 直升式動能反衛星技術可以看作是反導技術的延伸,是軍事強國廣泛採用的具有精確制導技術的反衛星手段。

以激光武器為代表的定向能反衛星技術和俘虜同軌反衛星技術不易產生空間碎片,可將低、中、高軌道衛星全部納入攻擊範圍, 具有很大的作戰應用潛力,已經獲得。 世界各國受寵,競相發展。 與此同時,電子對抗、網絡攻擊等隱蔽、隱形的衛星軟殺傷技術也逐漸顯現出鋒芒。

反衛星戰術

一般來說,反衛星戰術有四種:同軌、直升、定向能和電磁干擾。 主要通過反衛星衛星和反衛星導彈以及反衛星電子乾擾站來實現。

共軌反衛星武器發射到目標衛星的軌道上,對其進行跟踪,然後利用動能或核爆將其摧毀。 其作用距離遠,殺傷半徑大,即使在武器本身製導精度較差的情況下也能摧毀目標。 但它的缺點是精度低,反應慢,從發射到銷毀需要數天時間; 另外,核彈的附加殺傷效果大,容易對己方衛星造成威脅; 而且一旦使用,就有引發核戰爭的危險。

直升式反衛星導彈是指反衛星導彈不進入目標衛星軌道,僅依靠導彈上的小型跟踪器在目標衛星進入時直接發現目標衛星。

掠過長空,直接將其毀滅。

定向能反衛星是指利用激光、粒子束、高功率微波束等武器,以高能激光束、粒子束、微波束照射目標衛星,使其完全毀壞或使敏感電子元器件失效 並失去工作能力。 .

電磁干擾反衛星是利用衛星電子乾擾技術,阻止衛星與地面站之間的通信,從而達到使衛星失效的目的。 這是最早、最常見、最基本的反衛星戰術。

我國的反衛星技術

蘇聯是最早研製衛星技術的國家,美國是最早研製反衛星技術的國家。 世界反衛星技術史基本上就是兩國之間的一場較量。

我國從2005年開始進行反衛星試驗,前期主要以測試武器的功能為主。 雖然起步較晚,但並沒有落後。 在反衛星導彈和人造衛星方面取得了顯著成果。

2007年1月11日,我國在西昌衛星發射中心發射了一枚SC-19,又名DN-1。 導彈攜帶一枚動能彈頭,以每秒8公里的速度摧毀軌道高度。 長863公里、重750公斤的“風雲一號”氣象衛星已經報廢。 這是我國首次成功攔截人造衛星。 從此,我國正式進入反衛星技術領域。

隨後,我國先後研製了二代DN-2和三代DN-3兩種新型反衛星導彈,並分別於2013年5月和2017年7月23日進行了兩次成功試驗。DN的研製成功 -1、DN-2、DN-3反衛星導彈已實現低、中、高軌道全覆蓋,人造衛星基本在我國反衛星導彈的打擊範圍內。 技術已進入世界一流水平。

除了反衛星導彈,我國還研製了一顆衛星用於反衛星實驗。 衛星配備機械臂,可以改變軌道,對其他衛星進行全方位探測。 應用方便靈活。 技術開發的最新成果。

反衛星趨勢

為爭奪太空優勢和保障國家安全,反衛星武器和衛星防御之爭將愈演愈烈。 目前,反衛星技術主要在以下幾個方面發展:反衛星與反導相結合,發展導彈防禦系統,進一步提高動能武器的反衛星能力。

彈道導彈防禦系統與動能反衛星武器有著密不可分的關係,因為能夠在大氣層外攔截彈道導彈的武器都具有一定的反衛星能力。 導彈技術的發展推動反衛星技術的發展是當前國際反衛星的趨勢之一。

發展微型衛星,發揮反衛星能力。 現代微型衛星研製週期短、建設成本低、系統投資少、抗毀壞能力強、設備更新快。 它可以移動到地球同步軌道上的任意位置,甚至可以圍繞其他衛星進行近距離作戰和發動攻擊。 它有很大的潛力。

目前,以美國為首的軍事強國在反衛星武器研製上已經從裝載普通炸藥的“殺手”衛星和“微型尋的導彈”轉變為新概念武器。 定向能武器已經成為反衛星武器。 武器是新利器,其中激光反衛星武器是最具威懾力和最有效的武器。 激光反衛星武器的發展重點是陸基和天基反衛星技術。 軟硬結合,更加註重電子對抗等軟殺傷手段的運用。 傳統電子乾擾等軟殺傷技術的創新、發展和應用,通過研製可逆非物理反衛星武器,在一定時間內乾擾、欺騙或阻止目標衛星執行有效功能。 時間。 國家高度重視並不斷開發該領域。

目前,自主進近、交會對接等複雜航天技術已

適用於反衛星武器。 交會對接技術解決了這個問題。

(作者係全國政協委員、北方戰區某部總工程師

Modern English Translation:

2021-06-24Source: People’s Political Consultative Conference

After the related picture of Shenzhou 12 extending its mechanical arm came out, the US media immediately carried out a new round of reports on the relevant information, and pointed out at the same time that “this may be the same as what the commander of the US space force said before. China can capture the US military. The same is true for satellites. As early as April this year, General James Dickinson, commander of the U.S. Space Force Command, publicly declared in front of media cameras that China has developed a satellite equipped with a large robotic arm, and China is trying to use this satellite for military purposes. Used to “grab and capture” US military satellites.

So, what is anti-satellite technology?

In theory, where there are satellites, there is anti-satellite technology. There are three types of artificial satellites, one is scientific satellites, the other is technology experiment satellites, and the third is application satellites. According to the purpose, it can be divided into civilian satellites and military satellites, and military satellites are divided into communication, meteorology, reconnaissance, navigation, geodetic, interception satellites, etc.

The reason for anti-satellite

In modern warfare, the sky has always maintained a huge combat advantage over the ground. The emergence of artificial satellites has extended this advantage to outer space. In future wars, whoever can control space will have the initiative in war. It has become the focus of military competition among various countries.

Artificial satellites, especially military artificial satellites, fly seven or eight kilometers per second because of their fast speed, and can circle the earth in 90 minutes; they have a wide field of vision and a wide field of vision, and the same viewing angle is tens of thousands of times that of aircraft observation; there are few restrictions and they can fly over freely Any area on the earth, while bringing great convenience to one’s own side, also brings huge potential threats to the enemy.

Therefore, since the 1960s, the world’s military powers represented by the United States and Russia have been committed to the development of anti-satellite weapons such as “anti-satellite with guides”, “anti-satellite with satellites” and “anti-satellite with energy”. Take it as an important weapon for controlling space, eliminating threats, and seizing control of the sky.

Anti-satellite technology

Anti-satellite technology refers to military technology that attacks enemy satellites from the ground, air or outer space. At present, anti-satellite technologies mainly include nuclear energy anti-satellite, direct-ascent kinetic energy anti-satellite, directed energy anti-satellite, and co-orbit anti-satellite technology. Nuclear energy anti-satellite technology has a large killing distance and low technical threshold, but because of the huge collateral damage it produces, its practical value is not great. The direct-ascent kinetic energy anti-satellite technology can be regarded as an extension of the anti-missile technology, and it is an anti-satellite method widely used by military powers with precision guidance technology.

The directed energy anti-satellite technology represented by laser weapons and the captive co-orbit anti-satellite technology are not easy to generate space debris, and can include all low-, medium-, and high-orbit satellites in the attack range, which has great potential for combat application and has been obtained. Countries all over the world are favored and competing for development. At the same time, hidden and invisible satellite soft-killing technologies such as electronic countermeasures and network attacks are also gradually showing their edge.

Anti-satellite tactics

Generally speaking, there are four types of anti-satellite tactics: co-orbit, direct ascent, directed energy, and electromagnetic interference. It is mainly realized by anti-satellite satellites and anti-satellite missiles and anti-satellite electronic jamming stations.

Co-orbital anti-satellite weapons are launched into the orbit of the target satellite, track it, and then use kinetic energy or nuclear explosion to destroy it. It has a long range of action and a large killing radius, and it can still destroy the target even when the guidance accuracy of the weapon itself is poor. But its disadvantages are low accuracy, slow response, and it takes several days from launch to destruction; in addition, the additional damage effect of nuclear bombs is large, and it is easy to pose a threat to one’s own satellite; and once used, there is a danger of triggering a nuclear war .

The direct-ascent anti-satellite missile means that the anti-satellite missile does not enter the orbit of the target satellite, but only relies on the small tracker on the missile to directly find the target satellite when the target satellite passes over the sky, and directly destroys it.

Directed energy anti-satellite refers to the use of weapons such as lasers, particle beams, and high-power microwave beams to irradiate target satellites with high-energy laser beams, particle beams, and microwave beams to completely destroy them or disable sensitive electronic components and lose their ability to work. .

Electromagnetic interference anti-satellite is the use of satellite electronic interference technology to prevent communication between satellites and ground stations, thereby achieving the purpose of invalidating satellites. This is the earliest, most common, and most basic anti-satellite tactic.

my country’s anti-satellite technology

The Soviet Union was the first country to develop satellite technology, and the United States was the first country to develop anti-satellite technology. The history of world anti-satellite technology is basically a battle between the two countries.

my country started to conduct anti-satellite tests in 2005. In the early stage, it mainly focused on testing the functions of weapons. Although it started late, it did not lag behind. Remarkable results have been achieved in anti-satellite missiles and satellites.

On January 11, 2007, my country launched an SC-19, also known as DN-1, at the Xichang Satellite Launch Center. The missile carried a kinetic energy warhead and destroyed the orbital altitude at a speed of 8 kilometers per second. The “Fengyun-1” meteorological satellite, which is 863 kilometers long and weighs 750 kilograms, has been scrapped. This is the first time that my country has successfully intercepted an artificial satellite. Since then, my country has officially entered the field of anti-satellite technology.

Afterwards, my country successively developed two new anti-satellite missiles, the second-generation DN-2 and the third-generation DN-3, and conducted two successful tests in May 2013 and July 23, 2017. The successful research and development of DN-1, DN-2 and DN-3 anti-satellite missiles have fully covered low, medium and high orbits, and artificial satellites are basically within the strike range of my country’s anti-satellite missiles. Technology has entered the world-class level.

In addition to anti-satellite missiles, my country has also developed a satellite for anti-satellite experiments. The satellite is equipped with a mechanical arm, which can change orbits and perform all-round detection of other satellites. It is convenient and flexible in application. The latest achievements in technological development.

Anti-satellite trends

In order to compete for space superiority and ensure national security, the struggle for anti-satellite weapons and satellite defense will intensify. At present, anti-satellite technology is mainly developed in the following aspects: the combination of anti-satellite and anti-missile, and the development of missile defense system to further improve the anti-satellite capability of kinetic energy weapons.

There is an inseparable relationship between ballistic missile defense systems and kinetic energy anti-satellite weapons, because weapons capable of intercepting ballistic missiles outside the atmosphere all have anti-satellite capabilities to a certain extent. The development of missile technology to promote the development of anti-satellite technology is one of the current international anti-satellite trends.

Develop micro-satellites and exert their anti-satellite capabilities. Modern micro-satellites have a short development cycle, low construction costs, low system investment, strong anti-destruction capabilities, and fast equipment updates. It can move to any position on the geosynchronous orbit, and can even perform close operations around other satellites and launch attacks. It has great potential.

At present, the military powers headed by the United States have changed from the idea of ​​”killer” satellites loaded with ordinary explosives and “miniature homing missiles” to new concept weapons in the development of anti-satellite weapons. Directed energy weapons have become anti-satellite weapons. Weapons are new sharp weapons, and among them, laser anti-satellite weapons are the most deterrent and most effective weapons. The development of laser anti-satellite weapons focuses on ground-based and space-based anti-satellite technologies. Combine soft and hard, and pay more attention to the use of electronic countermeasures and other soft killing methods. The innovation, development, and application of traditional electronic jamming and other soft-kill technologies, through the development of reversible non-physical anti-satellite weapons, can interfere with, deceive, or prevent target satellites from performing effective functions within a certain period of time. Countries attach great importance to and continue to develop field of.

At present, complex aerospace technologies such as autonomous approach and rendezvous and docking have been applied to anti-satellite weapons. Rendezvous and docking technology solves this problem.

(The author is a member of the National Committee of the Chinese People’s Political Consultative Conference and the chief engineer of a certain department in the northern theater)

Original Chinese Source: http://www.cppcc.gov.cn/zxww/2021/06/24/ARTI1624501659719410.shtml

中國軍隊聚焦認知域戰是主攻戰場對抗的新著力點

Chinese Military Focus on Cognitive Domain Warfare is the New Focus of Main Effort for Battlefield Confrontation

來源:人民網
認知域作戰是指運用輿論、心理、法律等多域手段,運用現代網絡、媒體、文字、圖片、視頻、數字等多維技術開展輿論宣傳。 、心理攻防,以及爭奪人心、顛覆信心、影響信仰、爭奪思想、意識形態鬥爭等重要形式,旨在爭奪人們在思想、信仰、價值觀、個人態度、情感、認同、 和判斷傾向。 認知領域戰是傳統輿論戰、心理戰、法律戰、貿易戰、外交戰、科技戰、意識形態戰等多領域戰的複雜集合。

目前,認知域作戰已經成為國家間軍事鬥爭和其他領域鬥爭的重要基礎,認知域目標驅動的語言對抗成為認知域作戰的重要形式,值得高度重視。 .

影響作戰對象的語言對策新前沿

認知領域作戰是當代認知科學研究和發展的伴隨成果。 它是人們積極探索大腦的認知活動,以期對大腦有更複雜、更抽象、更透徹的認識而產生的新戰場。 高級深度隱蔽活動是對行動對象影響的高端形式。 無論是信息行動的對象、信息的生產者、信息的內容本身,還是信息的傳播渠道,認知域中的操作都貫穿著認知的特徵,從一開始就突出認知層面的行動 結束。

從信息接收者的角度來看,這種認知是針對對手受眾的深度認知,包括其人民、軍隊、軍方指揮官或重要領導人、政商界重要人物,甚至直接包括 對方國家或軍隊的領導人。 具體的重要將領等,也可以是具體的人群或人群。 它可以涉及個人或群體的認知偏好、認知缺陷、認知習慣、認知偏見、認知誤解; 它還可以是個人和群體的信仰、價值觀、政治認同、族裔認同、社會和文化認同以及情感態度。

從信息提供者和內容的角度來看,應該融入信息生產者的認知設計和安排,包括對文本的獨特認知,如文本的話語方式、文本的敘述方式、 觀察事物的視角、敘述的認知重點和深度、句子的組織形式、句子的價值觀念傾向、句子概念的可接受性等。

在信息發布和傳播的渠道上,文本形式更接近多媒體多模態形式,更接近網絡空間的需要,更接近當代智能手機的優勢,更接近當前新興媒體時代的特徵,即 是,更符合受眾接受的認知特徵,即認知習慣和認知傾向。 文本的傳播形式充分考慮了國際傳播中的認知效應,尤其是跨文化、跨語言、跨媒體、跨群體的認知傳播。 這樣,文本會更好地從認知層面影響受眾。

語言對抗應對戰鬥風格的變化並產生新的戰術

縱觀人類歷史,不難發現,軍事鬥爭的風格一直在不斷變化。 從最初借助冷兵器的肉搏戰,發展到機械力與熱兵器的較量,也發展到高科技戰爭條件下信息能力的製衡。 每一次變化都帶來戰術上的深刻變化。 在當前機械化、信息化、智能化並存的過渡階段,人們不僅關注戰場物理域和信息域的主導權爭奪,更關注對戰場主體的控制。 戰爭-人類認知領域,即思維方式、認知模式和風格、價值觀、情感態度、文化模式、溝通模式、心理優勢和劣勢、認知偏好、文化和知識圖譜以及意識形態認同。 後者涉及基本情況

對社會人事和社會存在的影響,即認知領域運作的新興領域,其策略具有很強的特殊性。

話題靈活性和機動性:認知域作戰可以在認知域中選擇多個話題進行靈活機動的作戰行動。 根據現狀和需要,選題可以選擇涉及比較宏觀的戰略層面(比如對方整個社會的意識形態和製度等),或者中等層面的運動層面(比如社會問題) 在對方社會的局部或方向:社會福利政策或環保政策等),也可以選擇涉及社會中非常微觀的戰術問題(比如社會不公平、不公正、不美好的一面) 由某個人或特定事件反映)。 宏觀、中觀和微觀認知領域相互聯繫、相互轉化。 很可能一個微觀問題也會成為一個宏觀的戰略問題。 要根據與整個軍事行動的關係提出問題,認知域作戰要服從整體作戰行動,服務於宏觀政治外交形勢的需要。 更重要的是平時要準備好選題,平時要收集各種選題的數據,尤其要關注現實社會中的各種重要數據。 一旦需要,這些數據可以迅速轉化為箭矢、子彈、砲彈射向敵人的認知領域,甚至成為影響全局的戰略武器。

作戰層面的可控性:認知戰的重要設計是在作戰層面整體可控可調,可以根據形勢變化進行升級或縮減。 如果需要戰略層面,指揮員可以啟用戰略層面的設計和兵力投入; 如果需要campaign級別,也可以在相應的campaign級別進行控制; 如果只是在特定的小問題層面需要,也可以控制在相應的小眾局部層面,讓整個操作為整體作戰操作的需要服務。 這裡的戰略、戰役和戰術,更多的是指作戰設計和力量投入。 由於戰場態勢瞬息萬變,一些問題在層面上也可能發生變化,從戰略問題到影響戰役和戰術層面的效果; 有些問題,由於戰術問題的特殊性,成為影響全局的戰役層面的問題。

新興媒體主導:認知領域的主要影響渠道已經從傳統的紙質媒體和平面媒體轉向新興媒體。 傳統媒體主要依靠單一的媒介,如報紙、雜誌、書籍、傳單、海報等來傳遞信息; 後來的電視帶來了三維媒體。 在互聯網時代,尤其是互聯網2.0時代和智能通訊設備的誕生,人們更多地依賴多媒體、多模態、短視頻和文字來傳遞信息。 智能手機、智能平板、智能播放器等各種先進設備的問世,各種新型社交軟件和工具的誕生,使新媒體成為人們交流、溝通的主要工具。 新興媒體、新興社交軟件和工具已經成為各種力量在社會保障、輿論保障、意識形態保障、社會保障、政治保障等方面較量和鬥爭的重要空間。 互聯網安全,尤其是對新興社交媒體、新興社交軟件和工具等的安全把握能力,某種程度上是一個國家認知領域安全的關鍵。 新興媒體工具和新媒體空間的信息化已經成為各國認知戰的主戰場、主陣地和主空間。 值得指出的是,影響人們認知的思想和理論,將成為認知域運作各個層次上最具影響力的武器。

語言對抗適應智能時代,認知計算提升新算力

人工智能時代,在大數據分析與應用、超級計算能力、智能計算能力、自然語言處理能力、智能手機傳播能力和新一代網絡通信能力的基礎上,人類開始能夠理解 整個社會和整個網絡。 對不同領域、地域群體、不同地域群體、特定個體的語言文化、心理認知、群體情感、社會行為進行精準建模與分析。 尤其是人的內心深處

對大腦認知、人腦思維、思維方式、習慣偏好、圖像圖式、認知框架,甚至神經網絡、人機協作、腦控技術等的理解和掌握,只要有足夠多樣的動態數據, 人們可以計算和模擬所有人的心理活動、情感活動、認知活動、輿論和行為模式。 通過深算、精算、巧算,準確把握人的認知世界,形成對人認知領域的理解。 精細而深入的控制。 這一方面呈現出以下特點:

計算全維性:認知領域作為一個新興領域,可以全方位數字化,可以全方位、全過程、全個體進行計算。 它可以廣泛收集各種類型的信息,然後將其反映為作戰對手多樣化主要因素的大數據信息,從而可以對整體、組、組、個體數據以及它們之間進行各種計算。 各種活動都可以通過計算完成、顯示和準確掌握。

計算認知:認知領域的計算體現了很強的認知能力,能夠揭示更多肉眼難以觀察到的各種事物、事件、人物之間的關係,能夠揭示同一事件框架下各種概念之間的關係。 概念之間的聚類和層次關係反映了概念之間或顯性或隱性、直接或間接的深層認知聯繫,揭示了概念之間複雜的概念網絡系統,讓人看到一個完全超越普通肉眼的深層認知世界 觀察。 .

計算智能:認知領域的計算體現了強智能。 這種智能表現在計算上,會得出智能的結論。 例如,通過大量文本的收集和數據挖掘,我們可以找到由於人力有限而無法看到的各種主題、觀點、傾向、人群、立場和訴求之間的關係,從而 對某個問題形成更全面的認識。 全面、深入、準確、系統的認識,做出科學優化的決策。 這種決策可能符合人類智能,也可能超過甚至遠遠超過人類智能。 利用好認知計算的力量,特別是結合本國和對手的數據,可以更好地做到早預防、早預警、早部署,可以做到最好、最好、最快、最準的打擊 和反擊。 也更能體現高效、有力、針對性的保障。 這裡的認知計算更多的是一個可能出現在不同人群、不同時間段、不同背景、整個網絡域或局部網絡域、特定特定網絡域內的宏觀-中觀或微觀層面的問題。 團體。 特別是對與對手對局時雙方可能呈現的主動和被動情況的分析和考察,以及認知域的攻防等。

發揮話語主體地位釋放話語權新應用

認知域作戰有一個非常重要的支撐,即主要依靠語言媒介發揮作用,主要通過語篇層面發揮影響,主要通過語篇的敘事性對認知域形成隱性效應,主要 externing influence on the cognitive domain through cultural models 通過跨文化交際所發揮的潛在作用,顯性或隱性作用。 主要體現在以下幾個方面:

文本話語唯一性:認知領域需要信息來影響。 雖然信息可能依靠視頻畫面的特殊視覺效果來展現,但從根本上說,文本所表達的整合話語的獨特性成為認知衝擊的主要支撐。 其中,話語表達的方式、話語表達的技巧、話語表達的說服力和感染力的主要設計,尤其是話語敘事的獨特性,將是影響人們認知的關鍵。 這可能包括敘事視角、敘事主題、風格、敘事故事框架、敘事語言創新、敘事關鍵句,敘事包含哲學、人文、宗教、社會、自然等,以及敘事中不同參與者的身份,多樣化的內容。 評價敘事、真實性、深度和情感

敘事的溫度,敘事對觀點的潛移默化影響,以及敘事所釋放的個人情感、價值觀、意識形態和立場評價。 文本語篇的獨特性是文本在認知域操作中發揮認知影響的重要依托。 充分利用文本的複雜性,發揮不同文本各自的優勢,充分發揮文本內涵的隱性和顯性認知影響,已成為文本話語認知領域作戰的關鍵。 最重要的是創新文本話語,以全新的話語、更新穎的表達方式、更獨特的表達方式贏得讀者,讓讀者潛移默化地理解和感受文本中的思想,並默默接受。 文字的思想。

文化模式的潛能:要在認知領域作戰,必須深入把握不同國家、民族文化的特點和模式。 不同的國家、不同的民族有著不同的文化模式、哲學思維、傳統文化、宗教信仰、風俗習慣、思維方式等明顯不同; 不同文化的公民也有不同的民族心理和民族認知模式,也應該有屬於自己民族和文化的典型認知偏好,以及相應的缺點和弱點,其中一些明顯與其他民族在本民族中存在巨大差異 國,甚至產生誤解和敵意。 因此,在文化層面,認知領域的作戰,就是把握不同國家的整體文化模式,為不同國家的不同群體建立文化模式,為不同國家的不同事物建立不同的認知模式,全面掌握某一國家的文化模式。 一系列事物中的文化模式。 對問題和問題的整體態度和做事方式,特別是對一些典型案例、文化禁忌、宗教要求、精神追求、一般觀念等,需要利用已有的理論和發現,綜合建構不同的基本表現 對一些典型的、敏感的、重要的問題進行認知領域的群體研究,從而為下一步的認知操作提供重要的參考和指導。 加強對敵不同人員特別是軍人、要職人員文化模式的研究,包括將軍、官兵等基本文化特徵和模型的研究與構建,如心理認知行為 人物和文化模型畫像,已經成為認知域操作的核心實踐。 分析普通民眾,尤其是普通公民和公民,以及特定人群,包括特殊NGO力量的認知模式也具有重要價值。

跨文化戰略傳播:認知域操作是國際語言文化傳播,需要遵循國際傳播規律。 掌握國際傳播的基本範式,將本國故事與國際表達巧妙結合,將對方的語言文化與自己的故事和思想巧妙結合; 善於結合不同的藝術形式,包括文字、圖片、繪畫、音樂(聲音)、視頻等手段或多模態手段,實現信息的國際傳播。 同時,還要在戰略層面統籌多維度、宏觀溝通:運用多種手段,依托軍民融合、軍民協同、軍民融合開展溝通; 除了非政府組織,特別是依靠非政府力量、專家、意見領袖和普通民眾來幫助軍隊開展認知域作戰; 統一設置議題,發出多方位、多人、多方位的聲音,形成戰略溝通態勢,形成重大行動、重大問題、重大危機處置和應急處置的良好局面。 控制等,形成良好的輿論氛圍,產生積極影響,消除不利影響或消除不利影響。 尤其要建立一支精通外語、通曉跨文化、通曉國際交流規律、能在國際多維平台上暢所欲言的精幹團隊。 這些人員通常可以藉助常見或特殊問題進行廣泛的問題認知、收集和討論,建立人脈和粉絲群; 更重要的是,在關鍵時刻,通過自己的粉絲團,發揮影響力,完成戰略傳播任務。

目前,隨著混合戰、多域戰和全球戰的普及,認知域戰已經成為一種常見的混戰方式。 、法律戰發展的高級階段、複雜階段和升級階段。 它的興起更具欺騙性、曖昧性、隱蔽性、嵌入性、植入性和不可觀察性,特別是考慮到它與當代新興媒體的深度融合,不斷學習和借鑒多學科、跨學科、交叉的新思想、新技術、新方法。 於是,認知領域的戰鬥成為我們必須高度警惕的戰斗形式。 (國防科技大學文理學院教授、博士生導師 梁曉波)

【本文為國家社科基金重大項目《國防和軍隊改革視角下的國防語言能力建設》的階段性成果】

Modern English Version:

Source: 

People’s Daily Online

Cognitive domain combat refers to the use of multi-domain means such as public opinion, psychology, and law, and the use of modern network, media, text, pictures, video, digital and other multi-dimensional technologies to carry out public opinion propaganda, psychological attack and defense, and The important forms of fighting for people’s hearts, subverting confidence, influencing beliefs, fighting for thinking, and ideological struggle are intended to compete for people’s initiative in thinking, beliefs, values, personal attitudes, emotions, identification, and judgmental tendencies. Cognitive domain warfare is a complex collection of multi-domain warfare such as traditional public opinion warfare, psychological warfare, legal warfare, trade war, diplomatic warfare, technological warfare, and ideological warfare.

At present, combat in the cognitive domain has become an important basis for military struggles and struggles in other fields between countries, and language confrontation driven by goals in the cognitive domain has become an important form of combat in the cognitive domain, which deserves great attention.

A New Frontier for Language Countermeasures to Influence on Objects of Operation

Cognitive domain combat is the accompanying result of the research and development of contemporary cognitive science. It is a new combat field created after people actively explore the cognitive activities of the brain to gain a more complex, abstract and thorough understanding of the brain. Advanced deep covert activities are the high-end form of influence on the object of action. Regardless of whether it is the object of information action, the producer of information, the content of information itself, or the channel of information, operations in the cognitive domain all run through the characteristics of cognition, and highlight actions from the cognitive level from beginning to end.

From the perspective of the recipients of the information, this cognition is aimed at the deep cognition of the opponent’s audience, including its people, the army, military commanders or important leaders, important figures in the political and business circles, and even directly including the leaders of the opponent’s country or the military. Specific important generals, etc., can also be specific groups of people or people. It can involve the cognitive preferences, cognitive shortcomings, cognitive habits, cognitive biases, cognitive misunderstandings of individuals or groups; it can also be the beliefs, values, political identity, ethnic identity, social and cultural identity and emotional attitudes of individuals and groups.

From the perspective of the information provider and content, it should be infused with the cognitive design and arrangement of the information producer, which includes the unique cognition of the text, such as the discourse mode of the text, the narrative mode of the text, the perspective of observation of things, the narrative Cognitive focus and depth, organizational form of sentences, tendencies such as value concepts of sentences, acceptability of concepts of sentences, etc.

In terms of channels for information distribution and dissemination, the form of text is closer to the multimedia multimodal form, closer to the needs of cyberspace, closer to the advantages of contemporary smartphones, and closer to the characteristics of the current emerging media era, that is, more in line with the audience The cognitive characteristics of acceptance are cognitive habits and cognitive tendencies. The form of dissemination of the text fully considers the cognitive effect in international communication, especially the cognitive communication across cultures, languages, media, and groups. In this way, the text will better influence the audience from the cognitive level.

Language confrontation responds to changes in combat styles and generates new tactics

Throughout human history, it is not difficult to find that the style of military struggle has been constantly changing. From the initial physical fight with the help of cold weapons, it has developed into a contest of mechanical power with hot weapons, and has also developed into a check and balance of information capabilities under the conditions of high-tech warfare. Every change brings about profound changes in tactics. In the current transitional stage of co-existence of mechanization, informationization and intelligence, people not only pay attention to the struggle for dominance in the physical domain and information domain of the battlefield, but also pay more attention to the control of the main body of war-human cognitive domain, that is, the way of thinking, Cognitive models and styles, values, emotional attitudes, cultural models, communication models, psychological strengths and weaknesses, cognitive preferences, cultural and knowledge maps, and ideological identity. The latter involves the basic situation of social personnel and social existence, that is, the emerging field of cognitive domain operations exerting influence, and its tactics have strong particularities.

Topic flexibility and mobility: Cognitive domain operations can select many topics in the cognitive domain to carry out flexible and mobile combat operations. According to the current situation and needs, the topic can be chosen to involve a relatively macro strategic level (such as the ideology and system of the other party’s entire society, etc.), or a medium-level campaign level (such as social issues in a local area or direction of the other party’s society: Social welfare policies or environmental protection policies, etc.), you can also choose to involve very microscopic tactical issues in society (such as the unfair, unjust, and not beautiful side of society reflected by a certain person or a specific event). The macro, meso, and micro cognitive domains are interconnected and transform into each other. It is very likely that a micro issue will also become a macro strategic issue. The question should be raised according to the relationship with the entire military operation, and the cognitive domain operation must be subordinated to the overall combat operation and serve the needs of the macro political and diplomatic situation. More importantly, the topics should be prepared in normal times, and the data of various topics should be collected in normal times, especially paying attention to various important data in the real society. Once needed, these data can be quickly transformed into arrows, bullets, and shells fired at the enemy’s cognitive domain, and even become strategic weapons that affect the overall situation.

Controllability at the combat level: The important design of cognitive warfare is that at the combat level, it is controllable and adjustable as a whole, and can be upgraded or reduced according to changes in the situation. If the strategic level is needed, the commander can enable the design and force input at the strategic level; if the campaign level is needed, it can also be controlled at the corresponding campaign level; if it is only needed at the specific small problem level, it can also be controlled at the corresponding The niche local level makes the whole operation serve the needs of the overall combat operation. The strategy, campaign and tactics here refer more to combat design and power input. Since the battlefield situation may change rapidly, some issues may also change at the level, from strategic issues to affect the effects of campaign and tactical levels; some issues, due to the particularity of tactical issues, become campaign-level issues that affect the overall situation.

Emerging media dominance: The main influence channel of the cognitive domain has shifted from traditional paper media and print media to emerging media. Traditional media mainly rely on a single medium, such as newspapers, magazines, books, leaflets, posters, etc. to convey information; the later generation of television brought three-dimensional media. In the Internet era, especially the Internet 2.0 era and the birth of smart communication devices, people rely more on multimedia, multi-modality, and short videos and texts to transmit information. The introduction of various advanced devices such as smart phones, smart tablets, and smart players, and the birth of various new social software and tools have made new media the main tool for people to communicate and communicate. Emerging media, emerging social software and tools have become an important space for various forces to compete and struggle in social security, public opinion security, ideological security, social security, and political security. Internet security, especially the ability to grasp the security of new social media, emerging social software and tools, etc., is to some extent the key to the security of a country’s cognitive domain. The information of emerging media tools and new media spaces has become the main battlefield, main position and main space for cognitive warfare in various countries. It is worth pointing out that the thoughts and theories that influence people’s cognition will become the most influential weapons at all levels of cognitive domain operations.

Language confrontation adapts to the age of intelligence, cognitive computing enhances new computing power

In the era of artificial intelligence, on the basis of big data analysis and application, supercomputing ability, intelligent computing ability, natural language processing ability, smart phone dissemination ability and new generation network communication ability, human beings have begun to be able to understand the whole society and the whole network. Carry out precise modeling and analysis of language culture, psychological cognition, group emotion, and social behavior in different domains, local groups, different local groups, and specific individuals. Especially people’s deep understanding and grasp of brain cognition, human brain thinking, thinking mode, habit preference, image schema, cognitive framework, and even neural network, human-computer collaboration, brain control technology, etc., as long as there are enough diverse dynamic data , people can calculate and simulate all people’s psychological activities, emotional activities, cognitive activities, public opinion, and behavioral patterns. Through deep calculations, actuarial calculations, and clever calculations, people can accurately grasp people’s cognitive world and form an understanding of people’s cognitive domain. fine and deep control. This aspect presents the following characteristics:

Computational all-dimensionality: As an emerging field, the cognitive domain can be digitized in all aspects and can be calculated in all directions, the whole process and the whole individual. It can collect various types of information extensively, and then can be reflected as information about Big data with diversified main factors of combat opponents, so that various calculations can be carried out for the whole, groups, groups, and individual data and between them. All kinds of activities can be completed, displayed and accurately grasped through calculation.

Computational cognition: Computation in the cognitive domain embodies strong cognition, and it can reveal more relationships between various things, events, and characters that are difficult to observe with the naked eye, and can reveal the relationship between various concepts in the same event frame. The clustering and hierarchical relationship between concepts reflects the deep cognitive connection between concepts, whether explicit or implicit, direct or indirect, and reveals the complex concept network system between concepts, allowing people to see a deep cognitive world that is completely beyond the ordinary naked eye observation. .

Computing intelligence: Computing in the cognitive domain embodies strong intelligence. This kind of intelligence is manifested in the calculation, and it will draw intelligent conclusions. For example, through the collection of a large amount of text and data mining, we can find the relationship between various themes, viewpoints, tendencies, groups of people, positions, and appeals that cannot be seen due to limited human power, so as to form a more comprehensive understanding of a certain issue. Comprehensive, in-depth, accurate and systematic understanding to make scientific and optimized decisions. This kind of decision-making may be in line with human intelligence, or it may exceed or even far exceed human intelligence. By making good use of the power of cognitive computing, especially by combining the data of the country and the opponent, we can better achieve early prevention, early warning, and early deployment, and can achieve the best, best, fastest and most accurate strikes and counterattacks. It can also better reflect efficient, powerful and targeted protection. Cognitive computing here is more about a possible macro-meso or micro-level issue that may arise in different groups of people, in different time periods, in different backgrounds, in the entire network domain or in a local network domain, or within a specific group. In particular, the analysis and inspection of the active and passive situations that may be presented by both parties when playing games with opponents, and the attack and defense of the cognitive domain, etc.

Give full play to the status of discourse subject and release the new application of discourse power

Cognitive domain combat has a very important support, that is, it mainly relies on the language medium to play its role, exerting influence mainly through the discourse level, forming a hidden effect on the cognitive domain mainly through the narrative nature of discourse, and mainly exerting influence on the cognitive domain through cultural models Potential role, overt or implicit role exerted through cross-cultural communication. It is mainly reflected in the following aspects:

Text Discourse Uniqueness: Cognitive Domains Need Information to Influence. Although the information may be displayed by relying on the special visual effects of video pictures, fundamentally speaking, the uniqueness of the integrated discourse expressed by the text becomes the main support for the cognitive impact. Among them, the mode of discourse expression, the skill of discourse expression, the main design of persuasion and appeal of discourse expression, especially the uniqueness of discourse narrative will be the key to affect people’s cognition. This may include narrative perspectives, narrative themes, styles, narrative story frameworks, narrative language innovations, narrative key sentences, narratives contain philosophy, humanities, religion, society, nature, etc., and the identities of different participants in the narrative , the diversified evaluation of narrative, the authenticity, depth and emotional temperature of narrative, the subtle influence of narrative on viewpoints, and the personal emotions, values, ideology, and position evaluation released by narrative. The uniqueness of text discourse is an important reliance on cognitive influence exerted by text in cognitive domain operations. Making full use of the complexity of texts, giving full play to the respective advantages of diverse texts, and giving full play to the implicit and explicit cognitive influences of text connotations have become the key to combat in the cognitive domain of text discourse. The most important thing is to innovate text discourse, to win readers with brand-new discourse, more novel expressions, and more unique expressions, so that readers can understand and feel the thoughts in the text subtly, and accept them silently. The thought of the text.

Potential of cultural models: To fight in the cognitive domain, we must deeply grasp the characteristics and models of different countries and national cultures. Different countries and different nationalities have different cultural models, philosophical thinking, traditional culture, religious beliefs, customs, and ways of thinking are obviously different; citizens of different cultures also have different national psychology and national cognition Models should also have typical cognitive preferences belonging to their own nation and culture, as well as corresponding shortcomings and weaknesses, and some of them obviously have a huge difference from other nationalities in their own country, and even have misunderstandings and hostility. Therefore, at the cultural level, combat in the cognitive domain is to grasp the overall cultural models of different countries, build cultural models for different groups in different countries, build different cognitive models for different things in different countries, and fully grasp a certain country’s cultural models in a series of things. The overall attitude and way of doing things on issues and issues, especially for some typical cases, cultural taboos, religious requirements, spiritual pursuits, general concepts, etc. It is necessary to use existing theories and findings to comprehensively construct the basic performance of different groups of people in the cognitive field on some typical, sensitive, and important issues, so as to provide important reference and guidance for the next step of cognitive operations. Strengthen the research on the cultural patterns of different personnel of the enemy, especially military personnel, personnel in key positions, including the research and construction of basic cultural characteristics and models of generals, officers, soldiers, etc., such as the psychological cognitive behavior of characters and cultural model portraits, It has become the core practice of cognitive domain operations. It is also of great value to analyze the cognitive patterns of ordinary people, especially ordinary citizens and citizens, as well as specific groups of people, including special NGO forces.

Cross-cultural strategic communication: Cognitive domain operations are international language and cultural communication, which need to follow the laws of international communication. To grasp the basic paradigm of international communication, to skillfully combine national stories with international expressions, to skillfully combine the other party’s language and culture with their own stories and ideas; to be good at combining different art forms, including words, pictures, paintings, music (Sound), video and other means or multi-modal means to achieve the international dissemination of information. At the same time, it is also necessary to coordinate multi-dimensional and macroscopic communication at the strategic level: use various means, rely on military-civilian integration, military-civilian coordination, and military-civilian integration to carry out communication; in addition to non-governmental organizations, especially rely on non-governmental forces, experts, opinion leaders, and ordinary people To help the military carry out cognitive domain operations; to set up issues in a unified way, to make multi-point, multi-person and multi-dimensional voices, to form a strategic communication situation, to form a good situation for emergency solutions for major actions, major issues, major crisis management and control, etc., to form a good atmosphere of public opinion, and to create Positive effects, eliminating adverse effects or extinguishing adverse effects. In particular, it is necessary to establish a capable team that is proficient in foreign languages, understands cross-cultural skills, understands the laws of international communication, and can skillfully speak out on international multi-dimensional platforms. These personnel can usually carry out extensive issue awareness, collection and discussion, establish personal connections and fan groups with the help of common or special issues; more importantly, at critical moments, through their fan groups, exert influence and complete strategic communication tasks .

At present, with the popularity of hybrid warfare, multi-domain warfare and global warfare, cognitive domain warfare has become a common method of hybridization and mixing. , The advanced stage of the development of legal warfare, the complex stage and the escalation stage. Its rise is more deceptive, ambiguous, concealed, embedded, implanted and unobservable, especially considering its deep integration with contemporary emerging media, and continuous learning and reference into multidisciplinary, Interdisciplinary and interdisciplinary new ideas, new technologies, and new methods. As a result, combat in the cognitive domain has become a form of combat that we must be highly vigilant against. (Liang Xiaobo, professor and doctoral supervisor of the College of Arts and Sciences, National University of Defense Technology)

[This article is a phased achievement of the National Social Science Fund’s major project “National Defense Language Capacity Building from the Perspective of National Defense and Military Reform”]

Original Chinese Military Source: https://military.people.com.cn/BIG5/n1/2022/0517/c1011-32423539.html

中國軍方看外軍網絡戰發展新動向

Chinese Military Perspective on the New Development Trends in Foreign Military Network Warfare

After decades of development, cyberspace has become an important field of production and life in human society, and has become the fifth-dimensional battlefield after “land, sea, air, and sky.” In recent years, the United States and other developed countries have rushed to introduce cyberspace strategies, build (expand) cyber warfare forces, and implement cyber offensive and defensive operations. The moves in the construction, development, and application of cyber warfare deserve the attention of the world.

Pay attention to cyberspace security, and accelerate the establishment of supporting strategies and regulations

Since cyberspace security is a security issue in an emerging field, most countries lack supporting strategies and systems of laws and regulations. In recent years, major countries in the world have positioned it as a major security field, and the pace of promulgating network security strategies and regulations has been significantly accelerated. For example, since the first national network security strategy was proposed in 2000, the United States has continuously formulated, expanded, and updated various policies, strategies, regulations, and regulations in the field of network security. The network strategy alone includes the “National Network Strategy”, “International Cyberspace Strategy”, ” The Cyber ​​Strategy of the Ministry of National Defense and the cyber strategy of the military services, etc., are used to standardize and guide the development and application of cyber warfare. In October 2014, the U.S. military also issued the world’s first joint doctrine “Cyberspace Operations”, which elaborated and standardized the concepts, actions, and tasks of cyberspace operations. In response to cyber attacks by the United States and NATO, Russia announced the “Russian Federation Cyber ​​Security Strategic Concept” in 2014, and promulgated a new version of the “Information Security Doctrine” in 2016, proposing to ensure network information security. In order to strengthen the overall guidance of network security affairs, India issued the “National Cyber ​​Security Policy” in 2013 and plans to issue a “National Cyber ​​Security Strategy”; the Indian military has formulated policies such as the “Army Cyber ​​Security Policy” and “Navy Information Security Policy” regulations.

Strengthen the professional construction of cyber warfare forces, and pay attention to the use of non-governmental network forces

In recent years, the establishment, integration, and expansion of specialized cyber warfare forces have become a trend among foreign militaries. The United States was the first country to propose the concept of cyber warfare, and it was also the first country to form a professional cyber warfare force. The U.S. military established the Cyber ​​Command in 2010, and upgraded it to a first-level joint operations command in 2018. The number of cyber task forces under its jurisdiction has reached 133, with about 6,200 personnel. Russia established a professional information warfare unit in 2013, and cyber warfare is an important function of it. The Japanese Self-Defense Force established the Cyber ​​Defense Team in 2014, initially with more than 100 members, and has now increased to nearly 300, and plans to expand to a thousand in the future. The United Kingdom also announced in 2020 that it will soon create a national cyber force. On this basis, foreign militaries have generally carried out systematic design and layout of cyber warfare forces. In the field of cyber warfare, forces such as network attack, network defense, and network operation and maintenance are inseparable; externally, network warfare forces are integrated and integrated with information warfare forces such as signal reconnaissance and electronic warfare. For example, the commander of the U.S. Cyber ​​Command also serves as the director of the National Security Agency, and the network attack and defense are integrated with signal intelligence and reconnaissance. The Japanese Self-Defense Force has set up a special first-level command to oversee space, network, and electronic warfare affairs.

It is worth noting that foreign military forces constitute the “regular army” of cyber warfare forces, and private cybersecurity companies, technology companies, hacker organizations, etc. have also become important cyber offensive and defensive forces and have attracted much attention. The notorious “Eye of Sauron” and “Equation Group” and other hacker organizations are inextricably linked to the US military. In recent years, Iran, Russia, and Venezuela have encountered cyber attacks, all of which have the shadow of “Equation Group”. The Indian Army is also considering absorbing its rich IT talents to form a cyber warfare reserve force to further strengthen its cyber warfare capabilities.

Actively develop and build a network arsenal, and intelligent weapon systems are beginning to emerge

Cyber ​​weapons are special weapons used for network attack and defense. They can be viruses, loopholes, denial of service attacks, phishing attacks and other offensive and defensive technologies, or network attack and defense system platforms. Anatoly Smirnov, chairman of the International Information Security Association of the Russian Federation, disclosed in 2019 that many Western countries were developing cyber weapons; the United States, the United Kingdom, Germany, and Japan also made no secret of possessing cyber weapons. According to the disclosures of Snowden and WikiLeaks, U.S. intelligence agencies and the U.S. military have built a systematic offensive cyber arsenal, some of which can be called “weapons of mass destruction” in cyberspace. In 2020, Patrick Saunders, commander of the British Strategic Command, took the initiative to declare that the UK has developed a “destructive” cyber weapon, which can effectively kill the enemy’s power grid and other facilities and equipment.

In terms of network system platforms, the U.S. military has built the most complete network warfare system platform in the world, including accusation management systems such as joint network command and control and unified platform, basic systems for network warfare planning and execution such as the IKE project, and network warfare and network warfare systems such as “Shute”. A weapon system with integrated firepower. In terms of network monitoring and defense, India has developed and built system platforms such as a central monitoring system, network traffic analysis system, and network security monitoring and evaluation system.

Cyber ​​weapons have a natural “kinship” with smart technology. At present, weapon systems in the fields of network situation monitoring, network attack and defense, and password deciphering have already taken shape in intelligentized countries in cyberspace dominant countries. With the development of artificial intelligence technology, the trend of intelligent network weapons will become more and more obvious.

Focus on enhancing the actual combat capabilities of network attack and defense, and innovate network training methods

In view of the reality and destructiveness of cyber threats, foreign militaries attach great importance to testing the security of information network systems and improving the cyber offensive and defensive capabilities of military and government agencies through cyber exercises and training activities in the context of actual combat.

In terms of participating forces, it covers the military, government agencies, reserves and civilian cyber forces. In the method mode, opponents are generally set to ensure the confrontation of the exercise. Some also innovatively use the method of offering rewards to attract hackers to “legally” attack specific target networks and help find network system defense loopholes. In terms of the training environment, actively build a network shooting range to simulate the information network environment of one’s own side and the opponent’s. The United States, Britain, Japan, Canada and NATO have all established professional cyber ranges. As the world’s largest multinational cyber exercise, NATO’s “Lock Shield” exercise simulated a country’s information network environment in 2019. The content of the drill includes responsiveness testing, defense vulnerability inspection, and election interference analysis. India regularly holds “Cyber ​​Fortress” exercises. It is said that in the “Cyber ​​Fortress-8” exercise organized in 2015, the Indian Army’s cyber brigade used remote penetration and other means to successfully obtain the administrator authority of a certain network system of the Indian Army, and found that 13 major categories of security vulnerabilities were identified. In addition, the U.S. military has begun to practice the integration of cyber warfare and operations in other fields. In the U.S. military’s “Schriever” exercise, the integration of space operations and cyber warfare is one of the important contents.

At present, some countries have regarded some serious cyber attacks as acts of war. As the international rules of conduct in cyberspace restrict and deter cyber attacks more and more, cyber exercises may replace real network operations and become foreign military training and upgrading. The primary path to network offensive and defensive capabilities.

Emphasis on pre-emptive offensive operations, actual combat tends to integrate deterrence and multi-domain integration

The hugeness, complexity, and fragility of the network system make network defense difficult and costly. For this reason, the United States and other countries have gradually changed their network security policy and operational thinking from the initial comprehensive defense to preemptive offensive operations, emphasizing Conduct pre-emptive offensive operations in hostile networks to eliminate potential or actual threats.

Driven by offensive thinking, cyber warfare is common in international conflicts, and the targets of attacks are no longer limited to military targets. The United States is the first country to apply cyber warfare to actual combat. In 2009, the U.S. military used the “Stuxnet” virus to carry out cyber attacks on Iran’s nuclear facilities, causing more than 1,500 centrifuges to be scrapped and the Iranian nuclear process to be paused. In 2020, after the assassination of Soleimani, the U.S. military launched cyber attacks on the command and control of the Iranian Revolutionary Guard Corps, missiles, and air defense systems to deter and prevent Iran from carrying out military retaliation. Of course, the idea of ​​offensive cyber warfare does not require absolute cyber superiority. Some non-cyber powers have also proposed the idea of ​​using asymmetric cyber capabilities to carry out preemptive attacks on the enemy’s weaknesses, and then achieve the goal of using the small to gain the big and the weak in the network game. Mandatory.

It is worth noting that in recent international conflicts, the trend of multi-domain integration in the fields of cyber warfare and firepower warfare, electromagnetic spectrum warfare, and cognitive domain warfare has become very obvious. For example, when armed conflicts broke out between Azerbaijan and Armenia in the Naka region in 2020, the two sides launched cyber offenses and defenses in cyberspace on the one hand, and on the other hand launched fierce confrontations in the cognitive domain around international and domestic public opinion, military morale, legal principles and morals.

At present, the low-intensity and ambiguous nature of cyber warfare attracts some international actors to frequently carry out cyberspace operations regardless of the consequences, and the risk of conflict escalation out of control is constantly accumulating. To this end, all countries in the world should start consultations and negotiations on international rules of conduct in cyberspace and cyber arms control as soon as possible, jointly restrict military activities in cyberspace, create a new pattern of cybersecurity, and build a community of shared future in cyberspace.

Original Mandarin Chinese:

經過幾十年的發展,網絡空間已經成為人類社會生產生活的重要領域,成為繼“陸、海、空、天”之後的第五維戰場。 近年來,美國等發達國家紛紛出台網絡空間戰略,建設(壯大)網絡戰力量,實施網絡攻防作戰。 網絡戰建設、發展和應用的動向值得世人關注。

關注網絡空間安全,加快建立配套戰略法規

由於網絡空間安全是一個新興領域的安全問題,大多數國家缺乏配套的戰略和法律法規體系。 近年來,世界主要國家將其定位為重大安全領域,出台網絡安全戰略和法規的步伐明顯加快。 例如,自2000年第一個國家網絡安全戰略提出以來,美國不斷制定、擴充和更新網絡安全領域的各種政策、戰略、規章制度。 僅網絡戰略就有《國家網絡戰略》、《國際網絡空間戰略》、《國防部網絡戰略》和《軍種網絡戰略》等,用於規範和指導發展 2014年10月,美軍還發布了世界上第一個聯合條令“網絡空間作戰”,對網絡空間作戰的概念、行動和任務進行了闡述和規範。 北約、俄羅斯2014年公佈《俄羅斯聯邦網絡安全戰略構想》,2016年頒布新版《信息安全條令》,提出保障網絡信息安全。為加強網絡安全統籌指導 事務方面,印度2013年出台《國家網絡安全政策》,併計劃出台《國家網絡安全戰略》;印度軍方制定了《陸軍網絡安全政策》、《海軍信息安全政策》等政策 安全策略”的規定。

加強網絡戰力量專業化建設,重視利用民間網絡力量

近年來,網絡戰專業化力量的建立、整合和壯大成為外軍發展趨勢。 美國是最早提出網絡戰概念的國家,也是最早組建專業網絡戰部隊的國家。 美軍於2010年成立網絡司令部,2018年升格為一級聯合作戰司令部,下轄的網絡特遣部隊已達133個,人員約6200人。 俄羅斯於2013年成立專業信息戰部隊,網絡戰是其重要職能。 日本自衛隊在2014年成立了網絡防衛隊,最初有100多名成員,現在已經增加到近300人,未來還計劃擴大到千人。 英國也在2020年宣布將很快創建一支國家網絡部隊。 在此基礎上,外軍普遍進行了網絡戰力量的系統化設計和佈局。 在網絡戰領域,網絡攻擊、網絡防禦、網絡運維等力量密不可分; 對外,網絡戰力量與信號偵察、電子戰等信息戰力量融合融合。 比如美國網絡司令部司令兼任國家安全局局長,網絡攻防與信號情報偵察相結合。 日本自衛隊設立了專門的一級司令部,負責監管太空、網絡和電子戰事務。

值得注意的是,外國軍隊構成了網絡戰力量的“正規軍”,民間網絡安全公司、科技公司、黑客組織等也成為重要的網絡攻防力量,備受關注。 臭名昭著的“索倫之眼”和“方程組”等黑客組織都與美軍有著千絲萬縷的聯繫。 近年來,伊朗、俄羅斯、委內瑞拉等國都遭遇過網絡攻擊,都有“方程組”的影子。 印度陸軍也在考慮吸納其豐富的IT人才,組建網絡戰後備力量,進一步加強網絡戰能力。

積極發展建設網絡化武庫,智能武器系統初現端倪

網絡武器是用於網絡的特殊武器

攻防。 它們可以是病毒、漏洞、拒絕服務攻擊、釣魚攻擊等攻防技術,也可以是網絡攻防系統平台。 俄羅斯聯邦國際信息安全協會主席阿納托利·斯米爾諾夫在2019年透露,許多西方國家正在研發網絡武器; 美國、英國、德國和日本也毫不掩飾擁有網絡武器。 根據斯諾登和維基解密的披露,美國情報機構和美國軍方已經建立了一個系統的進攻性網絡武器庫,其中一些武器堪稱網絡空間的“大規模殺傷性武器”。 2020年,英國戰略司令部司令帕特里克桑德斯主動宣稱,英國已經研製出“破壞性”網絡武器,可以有效殺傷敵方電網等設施設備。

在網絡系統平台方面,美軍建成了世界上最完備的網絡戰系統平台,包括聯合網絡指揮控制、統一平台等指控管理系統,IKE等網絡戰規劃與執行基礎系統。 項目,以及“樹特”等網絡戰和網絡戰系統。 具有綜合火力的武器系統。 在網絡監控防禦方面,印度開發建設了中央監控系統、網絡流量分析系統、網絡安全監控評估系統等系統平台。

網絡武器與智能技術有著天然的“親緣關係”。 目前,網絡態勢監測、網絡攻防、密碼破譯等領域的武器系統在網絡空間主導國家的智能化國家已經形成。 隨著人工智能技術的發展,網絡化武器的智能化趨勢將越來越明顯。

著力提升網絡攻防實戰能力,創新網絡訓練方式

鑑於網絡威脅的真實性和破壞性,外軍十分重視通過實戰背景下的網絡演習和訓練活動,檢驗信息網絡系統的安全性,提高軍政機構的網絡攻防能力。

在參與力量方面,它涵蓋了軍隊、政府機構、預備役和民間網絡力量。 在方法模式中,一般都會設置對手,以保證練習的對抗性。 有的還創新性地採用懸賞的方式,吸引黑客“合法”攻擊特定目標網絡,幫助尋找網絡系統防禦漏洞。 在訓練環境方面,積極建設網絡靶場,模擬己方和對方的信息網絡環境。 美國、英國、日本、加拿大和北約都建立了專業的網絡靶場。 作為全球規模最大的多國網絡演習,北約“鎖盾”演習模擬了2019年一個國家的信息網絡環境,演練內容包括響應能力測試、防禦漏洞檢查、選舉干擾分析等。 印度定期舉行“網絡堡壘”演習。 據稱,在2015年組織的“網絡堡壘-8”演習中,印陸軍網絡旅利用遠程滲透等手段,成功獲取了印軍某網絡系統的管理員權限,並發現13 確定了主要類別的安全漏洞。 此外,美軍也開始實踐網絡戰與其他領域作戰的融合。 在美軍的“施里弗”演習中,太空作戰與網絡戰的融合是重要內容之一。

目前,一些國家已將一些嚴重的網絡攻擊行為視為戰爭行為。 隨著網絡空間國際行為準則對網絡攻擊的約束和威懾越來越強,網絡演習有可能取代真正的網絡作戰,成為外國軍事訓練和升級。 網絡攻防能力的主要途徑。

強調先發製人的進攻作戰,實戰趨向綜合威懾和多域融合

網絡系統的龐大性、複雜性和脆弱性使得網絡防禦難度大、成本高。 為此,美國等國逐漸將網絡安全政策和作戰思路從最初的全面防禦轉變為先發製人的進攻作戰,強調在敵對網絡中進行先發製人的進攻作戰,以消除潛在或實際的威脅。

在進攻性思維的驅使下,網絡戰在國際衝突中屢見不鮮,

攻擊目標不再局限於軍事目標。 美國是第一個將網絡戰應用到實戰中的國家。 2009年,美軍利用“震網”病毒對伊朗核設施進行網絡攻擊,導致1500多台離心機報廢,伊朗核進程暫停。 2020年,蘇萊曼尼遇刺後,美軍對伊朗革命衛隊的指揮控制、導彈、防空系統等發起網絡攻擊,以威懾和阻止伊朗進行軍事報復。 當然,進攻性網絡戰的思路並不需要絕對的網絡優勢。 一些非網絡大國也提出了利用非對稱網絡能力對敵方弱點進行先發製人攻擊的想法,進而在網絡博弈中達到以小博大、以弱勝強的目的。 強制的。

值得注意的是,在近期的國際衝突中,網絡戰與火力戰、電磁頻譜戰、認知域戰等領域的多域融合趨勢十分明顯。 例如,2020年阿塞拜疆與亞美尼亞在納卡地區爆發武裝衝突,雙方一方面在網絡空間展開網絡攻防,另一方面圍繞國際國內展開認知領域的激烈交鋒。 民意、軍隊士氣、法理和道德。

當前,網絡戰的低烈度和模糊性,吸引了一些國際行為體不顧後果地頻繁開展網絡空間作戰,衝突失控升級的風險不斷累積。 為此,世界各國應盡快啟動網絡空間國際行為規則和網絡軍控磋商談判,共同製約網絡空間軍事活動,打造網絡安全新格局,構建網絡空間共享共同體。 網絡空間的未來。

Chinese Military Source: https://www.81.cn/jfjbmap/content/2021-04/08/content_XXXXX.htm