Chinese People’s Liberation Army Actively Responding to the Challenge of Intelligent Warfare
In recent years, the wave of intelligence has surged and has been widely used in the military field. Major countries in the world attach great importance to the construction and application of military intelligence, and various unmanned combat platforms and intelligent weapons and equipment continue to appear, and they are installed in troops and put into actual combat. In the face of the accelerated evolution of intelligent warfare, only by seizing development opportunities, actively responding to challenges, accelerating the development of military intelligence, and accelerating the forging of intelligent combat capabilities can we seize the strategic initiative of intelligent warfare and win future intelligent warfare.
Focusing on designing wars to create intelligent theory
Military theory comes from combat practice and is used to guide combat practice. Restricted by various conditions in the past, military theory research was mostly “looking backwards”, that is, summarizing battle examples to form combat guidance. With the rapid development of modern technology, especially big data, cloud computing and other disruptive technologies, the research on combat theory has got rid of the traditional follow-up and inductive reasoning mode, and has entered a new era of experimental warfare and design warfare. New disruptive technologies in the field of intelligence have opened up new space for military theory innovation. To this end, we should create a basic theory of intelligent warfare in accordance with the idea of ”proposing concepts-needs analysis-innovating theories”, and conduct in-depth research on the concept connotation, essential characteristics, war guidance, combat styles, offensive and defensive actions, winning mechanisms, etc. of intelligent warfare. Features and laws, etc.; innovate intelligent combat methods and methods, give full play to the overall effectiveness of the intelligent combat system, strengthen research on new intelligent combat methods and methods such as man-machine collaborative intelligent combat, intelligent robot combat, and intelligent unmanned swarm combat, as well as intelligent Combat command, the process and methods of intelligent combat support, etc.; focus on effectively responding to the threat of intelligent combat, and research strategies to defeat the enemy, such as intelligent interdiction warfare and intelligent disruption warfare. These theories are the cornerstone of the theoretical system of intelligent warfare. In the future, the theory of war centered on strengthening “controlling intellectual power” and competing for “algorithm-centric warfare” will most likely replace the theory of warfare centered on “network-centric warfare.”
Focus on cross-domain interconnection and explore intelligent forms
The military organization is the link connecting military technology and combat theory, and the lever to exert the overall combat effectiveness of the military. Modern combat places more emphasis on “elite combat under the support of a large system”, that is, supported by the joint combat system, “fine front and strong back”, according to the idea of ”integrated design, modular formation, and combined application”, the formation is more precise and more accurate. The powerful combat module enables the maximum release of combat energy. The organization of the future intelligent warfare system will be based on strategies, campaigns, and tactics at different levels and different arms and arms, and will form different types and purposes of small, multi-functional and intelligent new joint combat forces. According to the requirements of reconfigurability, scalability and self-adaptation, the intelligentized combat network can seamlessly link and flexibly organize individual weapon platforms according to changes in the enemy situation and battlefield environment, and then aggregate them to form System advantages, forming a combat module integrating offense and defense. The intelligent new combat force system is a comprehensive product of the development of artificial intelligence technology, the formation of new combat capabilities, and the evolution of war forms. new growth point.
Focus on the integration of man and machine to develop intelligent weapons With the development of information technology and intelligent technology, whoever can win in the field of artificial intelligence is expected to have the initiative in future military confrontation. We should focus on the dual needs of intelligent warfare system operations and intelligent weapon equipment system construction, do a good job in top-level design and overall planning, compile a road map for the development of intelligent weapon equipment systems, and develop high, medium, low-end, low-end, and Large, medium and small, long-range and short-range, covering space fields such as land, sea, air, space, electricity, and networks, and an intelligent unmanned combat equipment system that matches combat and support, and establishes a “human-led, machine-assisted, mixed formation, joint “Operation” manned-unmanned cooperation system, enhance the system integration of various military arms and various intelligent weapons and equipment such as operations and support. Intelligent unmanned combat system is a new trend in the development of future war equipment. Its core is to aim at the requirements of “zero casualties”, “full coverage” and “fast response” in future wars, and make full use of new theories, new materials, new processes, new energy, and new technology development achievements in two aspects: man-machine collaboration and autonomous action. Continuously make breakthroughs, build a three-level unmanned equipment sys
tem of strategy, campaign, and tactics, build a new type of intelligent unmanned division on a large scale, and realize the systematic and coordinated operations of unmanned combat systems. At the same time, we should focus on the needs of unmanned and anti-unmanned, intelligent and anti-intelligent operations, and focus on the development of anti-enemy intelligent unmanned combat weaponry systems to ensure effective intelligent unmanned offensive and defensive confrontation with the enemy.
Focus on ability compound innovation intelligent training
The professional division of labor in modern warfare is becoming more and more detailed, and the entire combat system is becoming more and more complex, which promotes the transition from manpower-intensive to technology-intensive operations, requiring combatants not only to have good physical fitness, but also to have good technical literacy and intellectual advantages , to meet the needs of different combat missions, combat environments, and combat opponents. Military intelligence puts forward higher requirements on the quality of people. Correspondingly, intelligent military talents should have the characteristics of group talents, sophisticated skills, complex knowledge, innovative thinking, and intelligent decision-making. Intelligent warfare will be a war carried out by the combination of man and machine, and the combat force with the intelligent unmanned combat system as the main body will play an increasingly important role. The effective combination of high-quality personnel and intelligent weapons can maximize combat effectiveness. It is necessary to adapt to the new characteristics of the intelligent warfare force system, innovate and develop the concept of intelligent training, and explore a new model for the generation of intelligent warfare combat power. At present, artificial intelligence technology can create a more “real” weapon operation experience and battlefield environment, and can realistically interpret the combat process, assist decision-making and command, and evaluate combat concepts. To this end, adapt to the new characteristics of the intelligent warfare force system, focus on the improvement of the self-command, self-control, and self-combat capabilities of the intelligent combat system, and make full use of the characteristics of the intelligent system that can self-game and self-growth, forming a special strategy for intelligent warfare. Combat system training system, training environment and training mechanism, strengthen “human” control of intelligent system training, and explore a new training mode with “machine” as the main object. In this way, the intelligent combat system can obtain a leap in combat capability after short-term self-intensive training, so as to cope with the test of disorder, complexity and uncertainty in the future combat environment.
Focusing on Accurate and Efficient Improvement of Guarantee Mode
Intelligent battlefields and the degree of realization of comprehensive support for joint operations are important factors that directly affect the generation of combat effectiveness of troops. The development of intelligent technology will surely trigger a revolutionary change in the construction of the joint combat support system and realize intelligent comprehensive support. Comprehensive support is the foundation of combat effectiveness and a bridge that transforms national economic strength into military combat capability. With the continuous maturity of the Internet of Things technology, intelligent warfare puts more emphasis on integrated guarantee, precise guarantee, and distribution guarantee, that is, the required amount is delivered to the required place at the required time. Relying on the integrated support system, the dispersedly deployed support forces and resources are grouped according to functional modules such as supplies, supplies, maintenance, ammunition, and management, so that they cover all areas of combat service support. Relying on visualization technology, the entire process of combat supply is tracked and mastered According to the current situation, according to the real-time development of the battle situation, information control, reception and distribution of personnel flow and material flow are carried out to achieve point-to-point direct support. Through the use of technologies such as the Internet of Things, drones, smart cars, remote surgery, and 3D printing, upgrade and build an intelligent after-installation support system covering intelligent warehousing, intelligent delivery, intelligent maintenance, and intelligent medical treatment, so as to realize automatic, fast and accurate supply of after-load materials on the battlefield , Rapid diagnosis and maintenance of equipment failures, timely rescue of battlefield personnel, changing passive support into active service, and improving the overall support efficiency and effectiveness of aftermarket.
Focus on both military and
civilian use and deepen intelligent integration
Breakthroughs in the core and key technologies of artificial intelligence are the “country’s most important weapon” to deal with the threats and challenges of intelligent warfare. The rapid development of intelligent technology has become an accelerator of military intelligence. In the information age, the boundary between military technology and civilian technology is becoming more and more blurred, and the transferability is becoming stronger and stronger. Actively establish a military-civilian collaborative innovation mechanism, continuously strengthen the driving force for the innovation and development of intelligent core technologies, build an open industry-university-research collaborative innovation system for the whole society, plan forward and support investment in core cutting-edge technologies such as artificial intelligence, and give full play to the innovation power of the entire society. Promote the rapid and sustainable development of military intelligence. Accelerate technological breakthroughs in key areas. It is necessary to focus on relevant key technical fields and break the technical bottleneck that restricts the development of military intelligence. Strengthen research on the basic support fields of military intelligence, such as military big data, military Internet of Things, etc.; start from combat requirements, strengthen research on intelligent application technologies in various operational elements, especially intelligent command and decision-making, intelligent weapon platforms, Research on intelligent battlefield perception and intelligent countermeasure technology. The research and development of the core key technology of military intelligence not only requires interdisciplinary and cross-field collaborative innovation, but also integrates the development of social intelligence and military intelligence. Intelligent technology is quickly embedded in operational elements and operational processes. To accelerate the development of military intelligence, we should explore the rules of cultivating relevant talents, make full use of military and local education resources, increase the intensity of training relevant talents, and provide solid intellectual support and talent guarantee for promoting the construction of military intelligence.
Chinese Military Higher Education in the Age of Intelligent Warfare
“Military academies are born for war and built for war.” At the opening ceremony of the 2019 military academy principal training, Chairman Xi proposed the military education policy for the new era, pointing out the direction for the military academies to cultivate high-quality, professional new military talents. At present, the form of war is accelerating towards informationization and intelligence. What kind of soldiers are needed to win future intelligent wars, and how military higher education can cultivate talents suitable for intelligent warfare are major issues before us.
The form of war is accelerating towards intelligent development
The form of war is the expression form and state of war history staged mainly marked by the technical attributes of the main battle weapon. So far, after experiencing cold weapon wars, hot weapon wars, and mechanized warfare, the form of warfare is accelerating its development towards informationized and intelligentized warfare. The increasingly widespread application of advanced technologies such as big data, the Internet of Things, artificial intelligence, biotechnology, and brain science in the military field is becoming an important driver of the new military revolution, giving rise to new forms of unmanned, autonomous, and intelligent warfare, changing the Traditional war winning mechanism. In 2014, a foreign military think tank released a research report titled “20YY: War in the Robot Era”, arguing that a storm of military transformation marked by intelligent armies, autonomous equipment, and unmanned warfare is approaching. Platforms, information systems and decision support systems, as well as new weapons such as directed energy, hypersonics, bionics, genes, and nanometers, will initially establish an intelligent combat system by 2035, and will develop to an advanced stage by 2050, fully realizing combat platforms, information Systems, command and control are intelligentized and even unmanned, new weapons such as bionics, genes, and nanometers are on the battlefield, and the combat space is further expanded to biological space, nanospace, and intelligent space.
In recent years, with the continuous deepening of research on the human brain, the brain-computer interface technology is becoming more and more mature. In the future, the information exchange between human beings and the outside world will no longer be limited to the senses, and the direct information exchange between the brain and the outside world can also be realized through chips. People and people, people and things are fully interconnected, and human beings may surpass the Internet and the Internet of Things and enter the era of intelligence supported by the Internet of Brains. In the era of the Internet of Brains, soldiers’ brains are directly connected to combat platforms, information systems, and decision-making support systems, and decisions are made with the assistance of technologies such as quantum computing and cloud platforms. Information and mind merge. Some domestic experts believe that under the influence of artificial intelligence technology, the winning mechanism of future wars will change from “information dominance, system confrontation, precise strikes, and joint victory” in information warfare to “intelligence dominance, independent confrontation, and traceability” in intelligent warfare. Following the transformation of “strike, cloud and brain winning”, following matter, energy, and information, cloud intelligence that integrates man and machine has become the key to determining the outcome of a war. This transformation of the form of intelligent warfare is accelerating, and any hesitation may bring unimaginable consequences.
But it should be noted that no matter how the war develops, people are always the most fundamental element. The form of intelligent warfare will lead to changes in the functions and roles of soldiers, and will put forward higher requirements for the ability and quality of soldiers. Cognitive ability may surpass knowledge and skills and become the core ability of soldiers.
Intelligent warfare requires the upgrading and reconstruction of the comprehensive quality of soldiers.
According to the talent growth cycle, soldiers who are currently receiving higher education will become the main force of combat training in more than 10 years, and will also become the first main force to meet the challenges of intelligent warfare. At present, there are still some deficiencies in the design of personnel training goals in our military’s higher education, and insufficient attention is paid to the ability to adapt to the ever-changing intelligent battlefield in the future. There is still a certain gap between the personnel training objectives and the needs of intelligent warfare. On July 23, 2020, when Chairman Xi inspected the Air Force Aviation University, he emphasized that we must persist in cultivating people with morality, educating people for war, strengthening m
ilitary spirit education, strengthening fighting spirit, and comprehensively strengthening the ideological and political, military, scientific and cultural aspects of pilot students. , Physical and psychological quality foundation. To implement President Xi’s important instructions and meet the needs of future intelligent warfare, it is urgent to build a higher-level military talent training goal with thinking as the core, and accelerate the upgrading and reconstruction of military personnel’s comprehensive quality.
Intelligent warfare is a complex giant system integrating multiple fields. Its intelligence-based characteristics and iterative and changeable development trend are changing the role of soldiers in warfare. Soldiers may gradually move from the foreground of the war to behind the scenes, from direct face-to-face combat to man-machine collaborative combat, from front-line charging to back-end planning and design of war. In order to be competent in man-machine coordination, planning and designing wars and other functional roles, in addition to ideological, political, physical and psychological requirements, in terms of military profession and scientific culture, soldiers should focus on improving the following five aspects of knowledge, ability and quality: First, multidisciplinary integration Master the core principles of multiple disciplines related to intelligent warfare, such as nature, military, cognitive psychology, and network intelligence, and be able to integrate knowledge across disciplines to guide military practice; the second is strong cognitive ability, with logical thinking, judgment Thinking and system thinking ability, able to use scientific methods to analyze and reason to solve combat problems; the third is human-machine collaboration ability, deeply grasp the characteristics and laws of intelligent warfare, skillfully use combat platforms, command and control systems, and decision support systems, and be able to control diversified intelligent weapons The fourth is the ability to innovate, with a keen sense of technology and strong creativity, able to grasp the frontiers of science and technology, innovate combat styles, and grasp the laws of war development; the fifth is the ability to self-growth, to be able to accurately recognize oneself , rationally plan military careers, freely use information means to acquire new knowledge, new technologies, and new methods, constantly improve the knowledge structure, enhance cognitive ability, and better adapt to the complex and changeable military revolution development.
Identifying the Emphasis Points of Military Higher Education Reform
At present, the superposition of informatization and intelligentization has brought greater complexity to the personnel training work of military academies. It is necessary to meet the actual needs of informatization operations and at the same time lay the foundation for adapting to intelligent warfare. We should focus on The following work.
Restructure the curriculum system. The curriculum system supports the formation of talent knowledge structure. In order to cultivate military talents that meet the needs of intelligent warfare and achieve the training goals of military majors, science and culture, it is necessary to break the practice of designing a curriculum system with a single major as the background and establish a curriculum system of “general education + direction”. The general education course is based on the existing natural science and public courses, adding courses such as mathematical logic, mathematical modeling, critical thinking, network foundation, artificial intelligence, cognitive neuroscience, system engineering, etc., to establish cross-field and interdisciplinary courses System, expand the knowledge of students, build a knowledge structure urgently needed for intelligent warfare, and lay a broad knowledge foundation for their lifelong growth. Orientation courses are to establish a discipline and professional direction, set up a vertical curriculum system of mathematical science, professional foundation, and professional positions, build a solid professional background, and cultivate students’ ability to use professional theories to solve complex combat training problems. The curriculum system of “General Education + Orientation” helps build a “T”-shaped knowledge structure and meets the needs of military personnel to adapt to diverse and intelligent warfare.
Deepen classroom reform. Educational neuroscience believes that education is the reshaping of students’ brains, and the classroom is the main position for reshaping students’ neural networks, especially for the formation of high-level cognitive abilities required for intelligent warfare. Continuously deepening classroom reform is the key to military Critical tasks for higher education today. It should be seen that a classroom with only knowledge and understanding is far from a good classroom. All human behaviors, though
ts and emotions are all controlled by the brain, and every knowledge, thought and emotion corresponds to a specific neural network of the brain. Therefore, classroom reform should center on students’ learning, follow the cognitive laws of the human brain, and Attract and maintain attention as the starting point, establish a scientific thinking framework, and mobilize students to think proactively. Usually, teaching methods aimed at higher-level abilities have a general model—problem-driven heuristic teaching, and the commonly used problem-based teaching methods, project-based teaching methods, and inquiry-based teaching methods all belong to this model. Therefore, the main path to promote classroom reform is to develop unknown, novel, and interesting questions and stories for students, design a thinking framework that points to logical reasoning, critical thinking, reflection, creativity, and learning ability, and inspire students under the guidance of the framework. Active thinking, supplemented by the output process of speaking and writing, finally achieves the goal of internalizing knowledge understanding and forming high-level abilities.
Promote comprehensive education. Modern educational theory not only regards the classroom as an important position of education, but also regards all time and space outside the classroom as an important resource for cultivating students. The time and space outside the classroom not only support classroom teaching and promote the formation of knowledge and ability, but also an important place to cultivate non-intellectual ability. Colleges and universities should make full use of these time and space, clarify specific training objectives, focus on going deep into the army, close to actual combat, highlighting practicality and creativity, and scientifically design education and training programs. Focus on giving full play to the advantages of military academies in management and education, explore the establishment of a student management model, and promote the cultivation of students’ leadership and management capabilities; continue to enrich the second classroom, build an innovative platform, create more opportunities for independent practice, and improve students’ innovation capabilities; make full use of various Large-scale activities to cultivate students’ competition awareness and teamwork ability; strengthen the construction of management cadres, improve scientific management and training capabilities, and effectively guide students to carry out time management, goal management, emotional management, psychological adjustment, habit formation, etc., to help students improve self-management and self-learning ability.
All in all, education is a systematic project. The above are only three aspects to break through the shortcomings of talent training in the era of intelligence. To truly solve the problem, military academies need to carry out systematic reforms, such as strategic planning, quality management, personnel quality, teaching conditions, etc. All aspects can effectively support the achievement of the goal of personnel training, and this requires us to continuously explore and innovate, continuously improve the level of running schools and educating people, and strive to create a new situation in the construction and development of military academies.
Chinese Military Perspective on the Evolution of the Winning Mechanisms of Intelligent Warfare
Military theorists have often said that victory tends to smile to those who can foresee changes in the character of warfare, rather than to those who wait for changes to occur before adapting. In recent years, disruptive technologies represented by artificial intelligence have developed rapidly and are widely used in the military field, accelerating the evolution of warfare to intelligence, and correspondingly, the concept of warfare is also undergoing changes. Only by discovering changes in time, actively responding to changes, and actively adapting to changes can we be invincible in future wars.
From “fighting the weak with the strong” to “controlling the clumsy with wisdom”
“The strong win the weak and the weak lose” is a law of victory in war with certain universality. Even those battles in which the weak defeated the strong often had to form a strength advantage against the enemy at a local and specific period of time in order to truly win. In the era of intelligent warfare, the contribution rate of intelligence superiority to combat effectiveness is much higher than that of other factors.
In the confrontation of intelligent warfare, human intelligence widely penetrates into the combat field and is transplanted into weapon systems. Global multi-dimensional and various types of intelligent combat platforms can quickly couple combat forces, build a combat system according to mission requirements, and independently implement coordinated operations. After the end, it quickly returned to the standby state, showing the trend of intelligence and autonomy. The side with a higher and stronger level of intelligence can better develop and use the mechanism of “controlling stupidity with wisdom”, and even design wars based on this, dominate the development of the battle situation, and win the final victory. It should also be noted that in the era of intelligent warfare, there are likely to be multiple stages of development from low to high. Try to keep yourself at an advanced stage, and attack your opponent so that it is at a low-dimensional stage. use.
From “destroying power” to “destroying cognition”
With the accelerated evolution of warfare to intelligence, the combat space has gradually expanded from the physical domain and the information domain to the cognitive domain, from the tangible battlefield to the invisible battlefield. The cognitive space composed of people’s spiritual and psychological activities has become a new combat space. Different from the main purpose of destroying the enemy’s vital forces in traditional warfare, intelligent warfare will pay more attention to weakening the enemy’s morale, disintegrating the enemy’s will, and destroying the enemy’s cognition.
Through the intelligent analysis of the opponent’s personality preferences, psychological characteristics, and decision-making habits, deterrent information can be “tailored” in a targeted manner, and the advantages of cutting-edge technologies such as intelligence can be used to show the opponent’s powerful strength in a vivid way, so that anxiety, suspicion, etc. , panic and other emotions continue to ferment inside it, which eventually leads to its self-defeating. Known as the “new oil”, big data not only enriches intelligence sources, but also becomes an important “weapon” that acts on the opponent’s cognition. By processing big data and deliberately “leaking” it to the opponent, it will create a new “fog of war” for it, and make it fall into a situation of cognitive confusion. In an intelligent war, the game of struggle will be more intense, and the party with a cognitive advantage will be ahead of the opponent, and it will be easier to grasp the initiative and opportunities.
From “people-oriented” to “human-machine collaboration”
In traditional warfare, the organization and use of military power are dominated by people. With the widespread application of intelligent technology, the proportion of unmanned equipment continues to increase. In intelligent warfare, combat tasks will be completed by man-machine collaboration, and the two will achieve organic integration and complement each other’s advantages. The third “offset strategy” proposed by the foreign military regards human-machine cooperation as a key technology for key development, and its successively proposed concepts such as “loyal wingman” are also aimed at exploring the realization of manned/unmanned coordinated operations. It is foreseeable that human-machine collaboration will play an important role in future warfare.
Using unmanned reconnaissance forces to carry out three-dimensional and multi-dimensional battlefield situational awareness can provide real-time intelligence support for manned combat forces; use unmanned platforms to carry relay loads to continuously provide communication relay support for manned combat forces; use
unmanned combat forces to go deep into the front battlefield, It can attract the enemy to attack, force the enemy to expose its position, and provide target guidance and fire support for manned combat forces; use unmanned transport equipment to provide supplies for the front line, which can improve the efficiency of logistics support, reduce transportation costs, and reduce unnecessary casualties. With the assistance of artificial intelligence, manned combat forces and unmanned combat forces will realize scientific division of labor and reasonable collocation in terms of quantity, scale and function, so as to maximize the overall effectiveness.
From “eat the small with the big” to “eat the slow with the fast”
In traditional warfare, it is often necessary to make up for shortcomings in equipment performance and other aspects by increasing the number of troops. The rapid development of military intelligence has greatly improved the speed of information transmission and the accuracy of weapon strikes, greatly reduced the time for reconnaissance and early warning, intelligence processing, command decision-making, firepower strikes, and damage assessment, and accelerated the OODA kill chain cycle. , making “find and destroy” possible.
Hypersonic missiles, laser weapons, microwave weapons, electromagnetic pulse weapons and other new rapid-kill weapons have further pushed the rhythm of war to “second kill”. In the Gulf War, the loop time of the OODA loop required 3 days; in the Iraq War, the loop time has been shortened to less than 10 minutes; and in the Syrian War, the loop has almost achieved near real-time. In intelligent warfare, the use of an unmanned platform for surveillance and attack to quickly target high-value targets such as the enemy’s core command post and high-level commanders will cause the opponent to suffer heavy losses before they can react, and even face the danger of paralysis. It can be seen that victory does not necessarily favor the side with a large military force, and the side that moves quickly and accurately will be more likely to win the battlefield. According to statistics, the reaction time required by artificial intelligence to respond to changes in the battlefield is more than 400 times faster than that of humans. In the face of the rapidly changing battlefield situation, people will be more inclined to use artificial intelligence technology to realize the adaptive planning and autonomous decision-making of the command and control system, so that the command and control mode will be changed from “people on the loop” to “people outside the loop”, so as to reduce the While shouldering the burden of commanding personnel, it can improve combat efficiency and the success rate of mission execution.
From “Integrated Winning” to “Cluster Winning”
The traditional concept of equipment development is to invest a lot of money in the research and development of highly integrated high-precision weapon platforms, in order to achieve dimensionality reduction strikes on the enemy by virtue of intergenerational advantages and performance advantages in war. However, developing and deploying a multi-functional high-end platform not only takes a lot of time and money, but when multiple software and hardware modules are integrated into a single weapon platform, there may be incompatibility among them. Once the platform is destroyed, it will cause heavy losses. The military application of disruptive technologies such as artificial intelligence has led to the rapid development of unmanned swarms. Unmanned swarms have the advantages of large scale, low comprehensive cost, and decentralization. Unmanned platforms coordinate with each other, divide labor and cooperate, and can make independent decisions and carry out combat tasks in an organized manner. Even if some unmanned platforms are destroyed, it will not affect the overall operation. efficacy. Combat concepts such as “decision-making center warfare” and “mosaic warfare” proposed by foreign militaries focus on the use of unmanned swarms to complete combat tasks. In intelligent warfare, by dispersing functions such as reconnaissance and surveillance, information communication, command and control, and fire strikes into a large number of single-function unmanned combat units, a highly robust and highly elastic “kill net” is constructed, and then Adjusting the combination method will make it emerge a powerful group intelligence, creating great uncertainty for the opponent, and then trap the opponent in the judgment link of the OODA loop, unable to make effective decisions. In addition, due to the large number of unmanned swarms, the opponent’s detection, tracking, and interception capabilities can be quickly saturated, and the opponent has to face the dilemma of fortification failure because it cannot destroy all unmanned platforms in the swarm.
From “Military Dominance” to “Multiple Mixture”
Traditional warfare mainly relies on violent means to make the enemy submit to one’s own will, and usually has a strong war intensity, with clear boundaries between peacetime and wartime. With the continuous expansion of the field of military struggle to new fields such as space, network, and intelligence, and the increasingly prominent role of economic, cultural, diplomatic, and legal means in warfare, intelligent warfare will be carried out in many fields represented by the “grey zone”. Developed in the form of “multi-pronged approach”. The intensity of war may be weakened, and the boundary between peace and war will become more blurred. Whether in 2019, half of Saudi Arabia’s oil fields were attacked by drones and half of its oil production was shut down, or in 2021, the largest oil pipeline in the United States was hit by cyber attacks and caused a large-scale oil shortage. The far-reaching impact of various new attack methods cannot be ignored underestimate.
With the development and maturity of intelligent technology, the comprehensive use of various means to attack opponents’ industrial, transportation, financial, communication, energy, medical and other facilities and networks will become more common. The threshold of intelligent warfare will show a downward trend, and the warring parties may adopt the method of undeclared war to launch a hybrid war that integrates economic warfare, diplomatic warfare, cyber warfare, public opinion warfare, psychological warfare, legal warfare, etc., so that the opponent is exhausted. Handle.
From “actual combat inspection” to “experimental exercise”
Under traditional conditions, due to the lack of scientific simulation and evaluation tools, the true capabilities of the army can only be tested in actual combat. Under intelligent conditions, using virtual reality technology can create a virtual scene with a strong sense of three-dimensional and realism based on the actual battlefield environment and task background. This scene can not only restore objective things such as weapons and equipment from multiple dimensions such as sound, appearance, and performance, but also simulate various severe weather such as heavy fog, heavy rain, and snowstorm, and display the terrain, meteorology, hydrology, etc. of the battlefield in a visualized form. Electromagnetic, nuclear and other information, close to the real situation of the battlefield.
Set the imaginary enemy in the virtual environment according to the characteristics of the enemy in reality, and carry out intelligent simulation of the possible trend of the battle situation, so that officers and soldiers can “experience” the war in virtual reality several times before the official war, so as to improve the equipment performance, The rhythm of the war and the situation of the enemy and the enemy are all clear, and it will be easier to perform realistic tasks. Before the outbreak of the Iraq War, the U.S. military secretly developed a computer game that simulated the combat environment in Baghdad. Among the personnel dispatched to Iraq to perform missions, the survival rate of those trained in the game was as high as 90%. With the continuous enrichment and improvement of data collected in reality, the construction of virtual battlefields will be more realistic, the prediction of the battlefield situation will be more accurate, and the comprehensive evaluation of exercises will be more credible. If the outcome of the war is known in advance, there may be a situation where “surrender the enemy” without a fight or a small fight.
Chinese Military to focus on the integration and development of mechanization, informationization and intelligence
Adhere to the integration and development of mechanization, informationization and intelligence
——Conscientiously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China
■Chinese People’s Liberation Army Unit 66011
The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informationization and intelligence. This important exposition endows the modernization of national defense and the armed forces with new connotations of the times, and further points out the development direction and path for accelerating the modernization of national defense and the armed forces. We must seize the opportunity, based on the status quo, insist on promoting the integrated development of mechanization, informationization and intelligence with systematic thinking, coordinate the development of various fields, especially key areas, realize the positive interaction of the three, and promote the overall improvement of national defense and military modernization.
Engels pointed out: “Human beings fight in the same way as they produce.” At present, the new military revolution in the world is developing rapidly, the degree of informatization in modern warfare is constantly improving, and the characteristics of intelligence are becoming increasingly apparent. Especially under the influence of the new round of scientific and technological revolution, the concepts, elements and methods of winning war are undergoing major changes. Judging from the recent local wars and armed conflicts in the world, a large number of high-tech weapons and equipment have been used in actual combat, and intelligent technology, unmanned equipment, and data information have become new growth points for combat effectiveness. In the face of increasingly fierce military competition, only by standing at the forefront of war and technology, and adhering to the integration of mechanization, information, and intelligence, can we seize the opportunity and win the initiative in military strategic competition.
“Everything must come, and it is a matter of course.” Mechanization, informatization, and intelligence are superimposed, interpenetrated, and mutually supported. Among them, mechanization is the material basis and carrier for the development of informatization and intelligence; informatization plays a connecting role between mechanization and intelligence; intelligence represents advanced combat effectiveness and is the development direction of future military construction. Without the previous “transformation” as the premise and foundation, there would be no emergence and development of the latter “transformation”.
Adhering to the integration and development of mechanization, informationization and intelligence is in line with the reality of our military construction and development, and is the only way for the modernization of national defense and the military in the future. Our army has basically achieved mechanization, and the construction of informatization has made significant progress but has not yet been completed. If the intelligentization is carried out after completing the informatization step by step, it will open up a new generation gap with the armed forces of developed countries; if the construction focus is fully shifted to intelligentization, it is unrealistic to expect to be in place in one step.
Science and technology are the core combat capability and the most active and revolutionary factor in military development. The key to adhering to the integrated development of mechanization, informationization and intelligence lies in promoting technological innovation. We should vigorously implement the strategy of strengthening the army through science and technology, actively promote self-reliance and self-improvement in high-level science and technology, accelerate the breakthrough of key core technologies, accelerate the development of strategic, cutting-edge, and disruptive technologies, and realize the transformation from following and running to leading and running as soon as possible. Persist in seeking combat effectiveness from scientific and technological innovation, improve scientific and technological cognition, innovation, and application capabilities, speed up the resolution of “stuck neck” problems, and firmly grasp the lifeline of our army’s development in our own hands.
Wars change with the times, and preparations for wars should not be conservative or rigid. To promote war preparations in the new era, we must focus on winning the new requirements of information-based and intelligent warfare. The construction of our army’s combat effectiveness has accelerated transformation, overall reshaping, and leapfrog development to ensure that it can attack and defend freely and win opportunities in future wars.
The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informationization and intelligence. From the perspective of the relationship between mechanization, informatization and intelligence, mechanization is the foundation of informatization, and intelligence is the sublimation of informatization. Without mechanization, there will be no informatization, and without sufficient informatization, it is impossible to achieve a major breakthrough in intelligence. At present, to vigorously promote military intelligence, we must first lay a solid foundation for informatization construction, and strive to improve the level of army informatization.
Lay a solid material foundation. Make bricks without straw. In order to shorten the “system gap” with powerful enemies, informatization construction should closely follow missions and tasks, keep up with cutting-edge technology, do a good job in top-level design, and promote peacetime and wartime integration. First, upgrade and improve various information systems. It is necessary to focus on the construction of the command and control center, use the information infrastructure as a platform, coordinate the construction of sub-systems and the linkage construction of various systems, promote the construction of command and control with all elements and a system, and realize the integration of information networks in various sub-domains, command and control real-time. Second, build and use the combat database well. In accordance with the principle of “integration of peacetime and wartime, overall planning, and classified implementation”, a comprehensive operational database will be established to achieve information sharing, data support, and decision-making assistance, and “information flow” to support the “chain of command.” Again, a backup mobile command post is preset. Actively learn from the beneficial practices of foreign militaries, vigorously strengthen civil air defense projects, and form a mobile command capability with multi-point layout, dynamic and static complementarity, and rapid deployment.
Build a strong team. Building a strong information force team is an important guarantee for winning an informationized local war with intelligent features. On the whole, we should focus on cultivating four types of talents: First, information command talents. Front-line mid-level and senior commanders should study information and data like they study soldiers, study the construction of information systems like they study the breakthroughs of battles, and study the use of electromagnetic spectrum like they study the performance of ammunition. The second is information warfare personnel. Cultivate a group of intelligent staff, combat planning, cognitive operations and other talents who are competent in information-based operations. The third is information security personnel. Focusing on the personnel of the information assurance department and the information assurance operation and maintenance professional technical team as the main target, continue to increase professional training efforts to improve network management, system use, inspection and maintenance capabilities. The fourth is information research and development personnel. Take the method of inviting in and going out, let go of the burden and hand over tasks, cultivate a group of expert technical talents with strong system research and development capabilities, establish a mobile station for high-end informatization talents, and form a “not for me, but for me” “A virtuous circle.
Change the concept of command. Modern warfare is all about the system, and joint combat command is a key part of it. In order to cope with the challenges of real threats, it is necessary to establish a new concept of command that is compatible with future warfare. The first is to firmly establish the concept of integrated command. Overcome the narrow command concept of a single service and arms, comprehensively coordinate multi-dimensional battlefield operations such as land, sea, air, space, electricity, and network, comprehensively integrate various combat elements, and effectively improve the combat effectiveness of overall and joint victory. The second is to firmly establish the concept of digital command. Transform from extensive to precise command, specify and refine task division, force use, time-space division, and target determination, standardize the command procedures, command methods, and command content of joint combat forces, and integrate reconnaissance intelligence, weapons Platforms, command and control, etc. are networked and real-time, shortening the command process and improving command timeliness. The third is to firmly establish the concept of intelligent command. Actively explore the systematic application of artificial intelligence technology, accelerate the development and application of new technologies such as intelligent decision-making, digital twins, big data, and cloud computing, improve the level of complex information processing on the battlefield, and enable commanders to control combat units and various weapons with the support of intelligent cloud brains. Platform mission command.
Promote innovative practices. In order to adapt to changes in technology, changes in warfare, and changes in opponents, we should speed up the construction of the “three systems” to win the information war. The first is to innovate the tactical system. In-depth research on the real tactics of defending against enemy information attacks, resisting enemy information interference, and counterattacking enemy information under the circumstances of all-round information strikes and hard fire destruction by powerful enemies, and strive to achieve precise control of the enemy. The second is to innovate the training system. Focusing on powerful enemies and combat missions, set up an information warfare environment, conduct in-depth research on topics such as command coordination, tactical application, system construction, and comprehensive support, and promote actual combat deployment and application. The third is the innovation management system. Adhere to the integration of peacetime and wartime management and the combination of virtual reality and real situation, establish a demand traction mechanism led by war, a plan-led mechanism, and an inspection and evaluation mechanism to create independent and controllable industrial chains, supply chains, and guarantee chains to ensure that “peacetime management” and “wartime management” “Use” seamless connection to help the continuous improvement of informationized combat capabilities.
Chinese Spying Operations – Games Chinese Spooks Play
From 國家安全部 ‘Guójiā ānquán bù’ to 新華社 ‘Xinhua’, how China’s espionage network operates in shadows.
China has systemically set up one of the quietest but most lethal espionage networks across the world.
As the world continues to debate over the spy balloons allegedly sent by China for espionage in the United States, probably it is missing the big picture. The real threat to global security comes from China’s spy network which is a complex web of many agencies, most of whom have successfully remained in the shadows. This multipart series would unravel the lesser known as well the unknown details about the Chinese espionage network.
The Chinese spy network has successfully remained in the shadows for decades. The Chinese Communist Party had built its spy network much before it came to power in China in 1949 turning a republic into a communist dictatorship. Since then, China has systematically set up one of the quietest but one of the most lethal espionage networks across the world.
The information regarding the Chinese spy network is scant and so scattered that it makes it difficult for even keen China watchers to paint the big and the real picture.
Ministry of State for Security
Ministry of State for Security (MSS) is China’s premier intelligence agency. It is also known as 國家安全部 ‘Guójiā ānquán bù’. MSS is largely responsible for operations outside China. The domestic intelligence and surveillance is looked after by the Ministry of Public Security (MPS). In addition, Chinese defence forces have their own intelligence agencies which conduct operations all over the globe.
Peter Mattis, one of the foremost authorities on Chinese intelligence operations, explains the Chinese military intelligence network (A Guide to Chinese Intelligence Operations, August 18, 2015), “Within the People’s Liberation Army (PLA), intelligence organizations fall under the General Staff Department (the Second and Third Departments, or, respectively, China’s DIA and NSA equivalents); the General Political Department for intelligence and covert influence operations; the PLA Navy, Air Force, and Second Artillery headquarters; and technical reconnaissance bureaus in the military regions. Much of the military intelligence infrastructure is based in China, but defence attachés and clandestine collectors do operate abroad, including from the service intelligence elements.”
New China News Agency (Xinhua)
Founded in 1931 by the Chinese Communist Party, Xinhua is the official news agency of China and a major facilitator for China’s intelligence gathering. According to an investigative report in Greek media outlet Pentapostagma published in April 2021, “Xinhua is primarily the eyes, ears, and voice of China. It is one of the important arms of the Chinese Intelligence agency in gathering information. Its prime objective is to promote positive news/narrative about CCP leadership/Chinese government and to marginalize, demonize, or entirely suppress anti-CCP voices, incisive political commentary and exposes that present the Chinese Government/CCP leadership in a negative light. It owns more than 20 newspapers and a dozen magazines and prints in eight languages: Chinese, English, Spanish, French, Russian, Portuguese, Arabic and Japanese It has established 107 bureaus in foreign countries including eight sub offices or editorial offices in Hong Kong, New York, Mexico, Nairobi, Cairo, Paris, Moscow, and Rio de Janeiro and currently employs more than 10,000 people.”
The report explained the standard operating procedure of gathering intelligence by this Chinese agency which has been operating in India also for several years, “Xinhua covers all news and developments/events in foreign countries which have meaning, or which could be of any significance for China. It then forwards reports/articles to China’s Ministry of State Security which directly handles the information inflow from Xinhua. The reports/articles are uploaded in a secured web system. Those that contain intelligence value are treated as classified and forwarded to CCP leadership for their consumption. Xinhua journalists are trained to be able to identify news/articles that are suitable for the CCP leaders and not for the public.”
According to this investigative report, “The agency (Xinhua) maintains a huge database of experts across the world and contacts favorable pro-Chinese contacts/assets in foreign countries and forwards their articles/reports to concerned departments back in Beijing.”
United Front Work Department (UFWD)
Set up in 1942, UFWD is the blue-eyed boy of the Communist Party Chinese (CPC). President Xi Jinping has further strengthened it ever since he came to power in 2012 and now it plays a significant role in China’s overall espionage network as well foreign policy framework. According to a research report published in August 2018 by the US-China Economic and Security Review Commission, “The United Front strategy uses a range of methods to influence overseas Chinese communities, foreign governments, and other actors to take actions or adopt positions supportive of Beijing’s preferred policies.”
‘Several official and quasi-official entities conduct overseas activities guided or funded by the United Front including Chinese government and military organizations, cultural and “friendship” associations, and overseas academic groups such as Chinese Students and Scholars Associations (CSSAs) and Confucius Institutes. The UFWD also oversees influence operations targeting Taiwan, Hong Kong, and Macau that aim to suppress independence movements, undermine local identity, and promote support for Beijing’s political system.
In all these cases, United Front work serves to promote Beijing’s preferred global narrative, pressure individuals living in free and open societies to self-censor and avoid discussing issues unfavorable to the CPC and harass or undermine groups critical of Beijing’s policies.’
Ryan Fedasiuk, a research Analyst at Georgetown University’s Center for Security and Emerging Technology (CSET) meticulously calculated the budget for UFWD in his essay ‘How China Mobilizes Funding for United Front Work (China Brief Volume: 20 Issue: 16). This indicates the priority given to this agency by the Chinese government and the CCP.
There is no direct budget for UFWD but there are several government and quasi-government bodies which fund it. That include Chinese People’s Political Consultative Conference, State Ethnic Affairs Commission, State Administration of Religious Affairs, Overseas Chinese Affairs Office of the State Council and All-China Federation of Industry and Commerce. The current annual budget for UFWD allocated through these bodies stands at not less than $1.4 billion.
“Chinese officials maintain that the United Front system is a benign network of administrative organizations, and that the PRC’s foreign policy is based on “mutual respect and non-interference in each other’s internal affairs” (PRC Embassy in Sweden, August 2019; ABC, June 2020). If this really were the case, regional governments probably would not classify their united front spending as secret 秘密資助 (Mìmì zīzhù) or refuse to disclose the structure of government offices ostensibly reserved for public diplomacy,” says Fedasiuk.
He further adds, “That regional governments in China budget nearly as much for united front work ($1.3 billion annually) as they do for CPC propaganda indicates how highly the Party values the united front as a tool for both domestic and foreign influence’.”
Overseas Chinese Affairs Office (OCAO)
This department /office is a front for keeping tabs on the Chinese communities abroad. It works closely with the Chinese Ministry of Education. According to Mattis, “The Overseas Chinese Affairs Office and the Ministry of Education… keep tabs on Chinese who live outside of China. The former office maintains ties to overseas Chinese communities and sponsors a variety of Chinese professional associations. The Ministry of Education keeps tabs on Chinese students abroad and helps support students’ and scholars’ associations. Both assist in mobilizing Chinese expats and émigrés for visible displays of support when Beijing wants, such as during the 2008 Olympic torch relay.”
According to the official website of ‘Overseas Chinese Office’, its major responsibilities include, “To study and formulate the guidelines, policies and regulations concerning overseas Chinese affairs, as well as to supervise and check their implementation; and to conduct research and study on the development of overseas Chinese affairs both domestically and abroad, to provide the information to the Central Committee of the CPC and the State Council.
Institute of Scientific and Technical Information of China (ISTIC)
Established in 1956, the ISTIC is officially a premier scientific research institute of China. But that is a façade. Its real task is to collect technologies and related information from all over the world in whichever manner it is possible. If one can read between the lines, the official website of ISTIC gives ample indications about the real work it does. The website says, “ISTIC has established long-term and stable business cooperation relations with relevant research institutions in the United States, Canada, Japan and other countries and regions, and has become an important platform for international cooperation and exchange in the field of science and technology information in China.”
George Soros and Chinese spy agency worked together as comrades.
George Soros’ history with the Chinese reveals his hypocrisy as he presents himself as a champion of democracy.
George Soros, the US-based controversial billionaire, and the Chinese premier spy agency Ministry of State Security (MSS) have worked hand in glove in the 1980s where Soros provided substantial funding to MSS through Economic System Reform Institute (ESRI) and China International Culture Exchange Center (CICEC).
It appears that Soros was playing a ‘double game’ by pursuing the Western interests to infiltrate China while also forging a close partnership with Chinese intelligence network and top bosses of the Chinese Communist Party. The apparent reason was an opportunity that he must have seen to benefit from China’s economic growth in the 1980s.
But this partnership fell apart with the change in the Chinese regime after 1989. Several representatives of Soros’ entity ‘China Fund’ were arrested by the Chinese authorities post- Tiananmen square massacre in 1989. The Chinese authorities accused them of working for the US’ Central Intelligence Agency (CIA).
Soros’ China Fund and the Ministry of State Security
Soros started making overtures to China in the 1980s. He first identified and handpicked Liang Heng, a bestselling author in 1984 to set up his shop in China. Heng had become famous after publishing his memoir Son of the Revolution’ that was a personal account of how China was opening to the West and the purges carried out at regular intervals by the Communist Party China (CPC).
Liang connected Soros with important people in the Chinese establishment. The façade kept for this whole initiative was that Soros wanted to help China to carry out reforms.
By that time, he had already set up ‘Open Society Foundations’, a funding arm known for instigating coups, political upheavals, and chaos in various countries through a web of well-funded non-Governmental organizations (NGOs). But given the fact that bets were very high in China, Soros decided to set up a separate entity which would work only in China.
In 1986, Soros set up ‘China Fund’ with a $1 million endowment. Through Liang’s network, the China Fund initially partnered with a Chinese think tank Economic System Reform Institute (ESRI).
In October 1986, Soros opened the China Fund formally in a signing ceremony at Beijing’s Diaoyutai State Guesthouse. This was his first trip to China.
Soros struck gold by roping ESRI as it was close to the premier Zhao Ziyang, who became the Party’s general secretary the next year. Zhao’s personal secretary, Bao Tong, was also known for helping the China Fund-ESRI joint venture whenever they needed to get through the Chinese bureaucracy.
Behind the façade of helping China to shape reformist economic policies, the China Fund started spreading its tentacles very fast. Within a year of its establishment, it set up an artists’ club in Beijing and an academic unit at Nankai University in Tianjin. Within the first two years of arriving in China, Soros’ China Fund gave hefty grants for at least 200 proposals. However, as the Fund started pushing the envelope too far by funding research on sensitive topics like the notorious ‘Cultural Revolution’ that had resulted in torture and deaths of millions of Chinese in 1960s, alarm bells started ringing in Chinese official circles and Zhao Ziyang had to step in despite his support for Soros and China Fund.
Alex Joske says in Spies and Lies: How China’s Greatest Covert Operations Fooled the World, “In the face of complaints from Party elders about the China Fund, Zhao Ziyang ceded its control to new management. It wasn’t a fight he wanted to pick, nor one he could dare to. Zhao agreed to sever ties between the ESRI and the China Fund, bringing in the China International Culture Exchange Center (CICEC), a group under the Ministry of Culture, as its new partner institution.
Things weren’t all bad, or so it seemed. CICEC had the backing of senior Party leaders, including (present Chinese president) Xi Jinping’s father, and served as one of the only official channels for cultural exchanges with the outside world. Its strong ties to officialdom could insulate Zhao and the China Fund.”
Soros travelled to China in February 1988 to sign a revised agreement with Yu Enguang, a Chinese spy master who was a high-ranking official of the MSS. CICEC itself was a front for the MSS. It would be too naïve to accept that Soros didn’t know about this ‘open secret’ though he tried to defend himself later by pleading ignorance about this fact.
Soros got along well with Yu Enguang at a personal level. The latter secured Soros a rare meeting with the top leadership of CCP in Beijing. Soros, reconfirmed his commitment to bankroll joint operations of China Fund and CICEC. The new Chinese co-chair of this project Yu Enguang.
According to Joske, Yu Enguang was the pseudonym of the Chinese spy master Yu Fang. ‘Among his comrades in the MSS, Yu Fang was just as respected as ‘Yu Enguang’ was by the targets he cultivated. At some point in his career, he headed the agency’s important central administrative office, and in the early nineties helped secure the passage of China’s first National Security Law, which expanded and codified MSS powers. The authors of several MSS publications, marked for internal distribution only, thank him for advising on and improving their drafts. He also oversaw MSS production and censorship of histories, TV dramas and movies about spies, which were designed to build public awareness and support for the MSS’s mission.’
Joske adds, “Ironically for a man who helped bring Chinese intelligence history into the public sphere, Yu’s true legacy is an official secret. Official references to his achievements are brief and elliptical. The authoritative People’s Daily eulogized him in 2013, an honor only a handful of intelligence officers receive: ‘In his sixty years of life in the revolution, Comrade Yu Fang was loyal to the Party, scrupulously carried out his duties and selflessly offered himself to the Party’s endeavors, making important contributions to the Party’s state security endeavor.’ The article also noted that he’d been a member of the National People’s Congress, China’s national legislature.”
Thus, Soros was dealing with a top-ranking Chinese intelligence official. Initially, this partnership was going off well. In fact, MSS was using Soros’ money to fund its operations under the garb of cultural exchange programs carried out by CICEC.
Incidentally, the official website of the CICEC, when accessed currently, doesn’t show any link it had in the past with Soros and the China Fund. It talks about its focus on ‘cultural exchange programs, which is a common phrase used frequently by the Chinese intelligence agencies to give legitimacy to their spy operations. The CICEC holds cultural festivals across the world and officially claims to be working to create support for China’s ‘One belt, one road’ initiative. Incidentally, CICEC was set up in 1984, a year after MSS came into existence and it was just a couple of years old when Soros’ China Fund forged a partnership with it. It was well-known to China watchers right since its inception that CICEC was a front for the MSS. It is difficult to apprehend that Soros didn’t know about this!
Post-Tiananmen Square
Everything was going well for Soros’ China Fund till Tiananmen square happened in 1989. Chinese authorities suspected that the China Fund played an active role in fueling demonstrations at Tiananmen square that ended in a massacre of thousands of people by Chinese authorities. Meanwhile the Tiananmen square massacre also led to a purge within the party as CCP’s general secretary Zhao Ziyang was not only replaced but was also put under house arrest.
With the arrest of Zhao as well as his secretary Bao Tong, both of whom backed Soros and his China Fund, the Chinese authorities began their crackdown. Soros immediately shut the shop leaving many of his Chinese associates in the lurch and at the mercy of Chinese authorities.
MSS, in its updates to the top party bosses, days before the Tiananmen massacre happened gave details about the role of China Fund as a CIA front in fueling these demonstrations.
According to The Tiananmen Papers, a huge cache of internal CCP reports related to the massacre, that was leaked later, the MSS told the party bosses, “Our investigations have revealed that Liang Heng, the personal representative of the (China Fund) chairman George Soros, was a suspected US spy. Moreover, four American members of the foundation’s advisory committee had CIA connections.”
“According to the MSS’s narrative, Soros showed his ‘true colors’ by asking Yu to close the fund in May 1989 once he realized that supporters of reform were being purged,” observed Joske.
Soros co-chaired the China Fund-CICEC partnership with a top-level Chinese spy master Yu Enguang (also known as Yu Fang). The MSS used the funds provided by Soros’ China Fund to finance many of its operations. Had there not been an internal turmoil in the Chinese Communist Party throwing Soros’ supporters in the Chinese establishment out of power, Soros would have been working closely with an authoritarian Chinese government and continued to play the ‘double game’ ultimately benefiting his business interests from both sides. This history of Soros with the Chinese also exposes his double speak as he claims to be the champion of democracy!
What a Chinese spy agency the Ministry of State Security disrupts the world
MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.
China’s premier spy agency Ministry for State Security (MSS) has been on the forefront of setting up and running a ruthless global espionage and counter-espionage network.
MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.
Officially the proposal to set up this agency was brought by Zhao Ziyang at the first session of the sixth National People’s Congress (NPC) on June 20, 1983. The NPC can be broadly termed as the Parliament of China.
Ziyang proposed the establishment of a state security ministry “to protect the security of the state and strengthen China’s counterespionage work.” The NPC approved it and voted to appoint Ling Yun as the first minister.
The inaugural meeting of the MSS was held on 1 July 1983 to announce the formal establishment of the. The opening speech was delivered by chairman Chen Pixian of the ‘Central Political-Legal Commission’ one of the key bodies of CCP. He categorically said, “Doing state security work well will effectively promote socialist modernization and the cause of realizing the unification of the motherland opposing hegemonism and defending world peace.” The Chinese intent was clear: MSS would be its ace espionage and counter-intelligence agency.
Since President Xi Jinping took over the reins of the Communist Party of China (CCP) and the Chinese establishment in 2012, MSS has been endowed with even greater authority and its sphere of influence has increased significantly. In Xi Jinping’s scheme of things, Chinese espionage agencies, especially MSS, lead from the front to change the existing world order.
Since the remit of China’s intelligence agencies is much broader than those of Western nations, they need more resources, and Xi Jinping has made sure they receive them, say Clive Hamilton and Mareike Ohlberg in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World.
Roger Faligot (Chinese Spies: From Chairman Mao to Xi Jinping) has written, there has been a “formidable increase in the authority of the Chinese intelligence apparatus, specifically since 2017”.
The MSS indulges in all kinds of dubious clandestine activities including sabotage, industrial espionage, theft of technology. It has created several fronts in the form of think tanks and trade and cultural bodies to carry out such activities. The prominent among them are China Institute of Contemporary International Relations, China Reform Forum and Chinese Association for the Promotion of Cultural Exchange and Cooperation.
Structure of MSS
Last known, MSS has 18 bureaus spread over at least four compounds in Beijing serving as their headquarters and then they have provincial and other local networks within China as well as a global network. The functions of many of them are not yet known. China Institute of Contemporary International Relations is the public façade of 11th bureau of MSS. Peter Mattis and Matthew Brazil have painstakingly gathered some details about these bureaus in ‘Chinese Communist Espionage: A Primer’ such as:
“ • First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations.
Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers.
Fourth Bureau: Taiwan, Hong Kong, and Macau.
Fifth Bureau: Report Analysis and Dissemination.
Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside China.
Eighth Bureau: Counterespionage Investigation, runs investigations to detect and apprehend foreign spies in China.
Ninth Bureau: Internal Protection and Reconnaissance Bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage.
Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates the activities of reactionary organizations abroad.
Eleventh Bureau: China Institutes of Contemporary International Relations, performs open-source research, translation, and analysis. Its analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows.
Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the CCP’s united front work System (also known as United Front Works Department-UFWD, which is another major espionage network of Chinese government and CPC).
Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluation Center, manages the research and development of other investigative equipment.
Fourteenth Bureau: Technical Reconnaissance Bureau, conducts mail inspection and telecommunications inspection and control.
Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. Its public face is the Institute of Taiwan Studies at the China Academy of Social Sciences.
Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the United States.”
There is hardly any information about the real work done by the third, sixth, sixteenth and seventeenth bureau of the MSS.
According to an online report by China Digital published in 2015, the MSS had a strength of 100,000 ‘spies’. Around 60,000 of them worked within China while 40,000 of them were working in other countries for China.
Explaining this mammoth size and the massive expansion of MSS, Mattis and Brazil elaborated, “The expansion occurred in four waves. The original departments (or those created within the first year) appeared to be the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the ministry across the country at provincial levels, bringing in Anhui, Hunan, Qinghai, and Sichuan provinces.161 The fourth wave of MSS expansion was vertical. The provincial-level departments either took over local public security bureaus or established subordinate municipal or county bureaus. For many local PSB officers, they were police one day and state security the next. When MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level.”
“From the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of CCP leaders. At present, the two most important of these are the Political-Legal Commission and the Central State Security Commission.”
Clive Hamilton and Mareike Ohlberg have mentioned in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World, “It was reported in 2005 that the FBI believed the MSS had set up around 3000 front companies to conceal its activities. The MSS has various arms engaged in economic espionage and it has ‘embedded itself deep in major financial and commercial organizations, particularly in Shanghai and Hong Kong’. Not all economic espionage is state directed. Chinese nationals are known to set up firms that take orders from companies in China to obtain and supply specific pieces of intellectual property from their competitors in the West, usually by identifying an employee willing to provide such secrets.”
Bloody Purge within MSS
While MSS has successfully infiltrated many spy agencies of other countries, it also suffered a major setback when in 2010, it was revealed that there are several Central Intelligence Agency (CIA) moles working in China and MSS for the American agency.
This led to a bloody purge within MSS. The CIA assets were exposed because of a botched-up communication system of the US spy agency. It reportedly used the same equipment in China which it was using to communicate with its operatives in the middle east. But the Chinese spy agency was much more efficient than the middle east and the CIA underestimated its tech capability. MSS was able to crack this communication network. According to various reports, anywhere between one dozen to two dozen operatives of the CIA were rounded up and executed over a period of two years by the MSS. The CIA did manage to take out many of its ‘assets’ but it had to suffer a major loss.
According to a report published in the journal Foreign Policy in 2018, “It was considered one of the CIA’s worst failures in decades: Over a two-year period starting in late 2010, Chinese authorities systematically dismantled the agency’s network of agents across the country, executing dozens of suspected US spies.”
Recruitment and working pattern.
One of the key methods deployed by MSS is to use the Chinese diaspora to create assets in other countries. Its first bureau plays a significant role in this regard. A survey done by the US-based Centre for Strategic Studies gives an indication about MSS’ approach towards espionage. This survey listed 160 publicly reported instances of Chinese espionage directed at the United States since 2000. According to the survey report:
42% of actors were Chinese military or government employees.
32% were private Chinese citizens.
26% were non-Chinese actors (usually U.S. persons recruited by Chinese officials)
34% of incidents sought to acquire military technology.
51% of incidents sought to acquire commercial technologies.
16% of incidents sought to acquire information on U.S. civilian agencies or politicians.
41% of incidents involved cyber espionage, usually by State-affiliated actors.
According to Hamilton and Ohlberg, “Ego, sex, ideology, patriotism, and especially money is all exploited by China’s intelligence services to recruit spies. In 2017 an FBI employee, Kun Shan Chun (Joey Chun), was convicted of supplying information about the bureau’s organization and operations to Chinese agents, in exchange for free international travel and visits to prostitutes. Among those who spy for China, ideology is a factor mainly for people of Chinese heritage (unlike during the Cold War, when Westerners spied for the USSR for ideological reasons). Beijing also deploys the threat of punishment of family members in China if a target refuses to cooperate.
UFWD: ‘Magic weapon’ in China’s espionage arsenal
The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones
Chinese President Xi Jinping
One of the key constituents of the global Chinese Spy Network is the United Front Work Department (UFWD). It is entrusted with coordination and operational aspects of ‘united front’ activities. The Chinese initially defined ‘united front’ more as a concept. Later it set up UFWD to carry out these activities as the nodal agency.
Background
The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones. Since its founding, this has been a key element of the Chinese Communist Party’s (CCP) strategy to consolidate its hold on power, both domestically and internationally.
The UFWD’s first deployment was to join and subvert the then ruling Nationalist government, the Kuomintang, in the early 1920s. A 2018 research report by US-China Economic and Security Review Commission explained it further, “The CCP then formed an alliance of convenience with the Kuomintang to discourage it from trying to wipe out the fledgling CCP while uniting their efforts against Japan.”
According to Gerry Groot, senior lecturer at the University of Adelaide and renowned expert on the United Front, this campaign evolved into a systematic effort to recruit “fellow travelers,” mostly “famous intellectuals, writers, teachers, students, publishers, and businesspeople who were not necessarily Communists.”
Modus Operandi
The modus operandi of the UFWD is one of the least discussed issues in the public domain when it comes to Chinese covert operations. It is not surprising as UFWD operates through a complex web of organizations which act as a front for united front work.
There are thousands of organizations which work for UFWD under the garb of cultural, educational, commercial, and philanthropic organizations. Alex Joske explains the philosophy behind UFWD in his groundbreaking expose of Chinese intelligence operations Spies and Lies, “Party leaders since Mao Zedong have referred to the united front as one of their three ‘magic weapons’. Together with armed struggle and efforts to strengthen Party organization, the two other magic weapons, the CCP credits the united front work with major contributions to its victory in 1949, China’s modernization and subsequent economic development.”
The key task of UFWD is to build a global network of influencers and ‘operators’ who manipulate the global narrative by hook or crook. The UFWD specifically brings into its spy net intellectuals, local community leaders, religious and ethnic figures, journalists, academia, and business magnates.
According to Joske, recent cases from around the world have shown, the (Chinese Communist) Party seeks to insert itself into segments of diaspora communities and then mobilize them as political influence. Co-optees can be used to suppress dissidents, make political donations, mentor political candidates and staffers, and otherwise apply pressure in support of Beijing’s interests.
In a 2020 research paper on UFWD, ASPI said, “There’s no clear distinction between domestic and overseas united front work: all bureaus of the UFWD and all areas of united front work involve overseas activities. This is because the key distinction underlying the United Front is not between domestic and overseas groups, but between the CCP and everyone else. For example, the UFWD’s Xinjiang Bureau plays a central role in policy on Xinjiang but is also involved in worldwide efforts to whitewash the CCP’s internment of an estimated 1.5 million people in Xinjiang, primarily ethnic Uyghur Muslims, as an anti-terrorism and vocational training effort.”
Structure
The UFWD follows the directions given by an important CCP body known as the Chinese People’s Political Consultative Conference (CPPCC). The latter is led by a member of the CCP’s Politburo Standing Committee.
According to the latest information available, UFWD has a presence across all provinces in China, in all its embassies abroad, in foreign universities and in various international trade organizations as well as in civil society also. According to the ASPI report, “Internally, the department has 10 leaders, at least six of whom hold ministerial rank or higher. It has 12 bureaus, half of which were created after 2015. Bureaucratic changes in 2018 that brought overseas Chinese affairs under the UFWD’s ‘unified management’ also injected dozens if not hundreds of officials with substantial overseas experience into the department. Jinan University, Huaqiao University and the Central Institute of Socialism in Beijing are all subordinate to the UFWD and carry out research and training to support its efforts. Additionally, the UFWD runs dedicated training facilities, such as the Jixian Mountain Estate, which is a complex in the outskirts of Beijing used for training China Overseas Friendship Association cadres.”
Organizations such as the China Overseas Friendship Association, are part of the ‘united front system’. At least two such organizations held special consultative status as non-governmental organizations in the UN Economic and Social Council. According to an ASPI report, “In 2014, an official from one of them, the China Association for Preservation and Development of Tibetan Culture, was barred from a UN human rights hearing after he intimidated a woman testifying about her father, political prisoner Wang Bingzhang.”
The 12 bureaus of UFWD
UFWD’s 12 bureaus deal with separate tasks. Here is how the work has been distributed to them:
First Bureau: Minor Parties Work Bureau (Oversees China’s eight democratic parties) Second Bureau: Deals with Ethnic Affairs Third Bureau: Deals with Hong Kong, Macau and Taiwan Fourth Bureau: Deals with business persons and private companies Fifth Bureau: Non-Affiliated and Minor Party Intellectuals related work Sixth Bureau: Targets urban professionals such as employees of foreign companies Seventh Bureau: Handles Tibet related issues Eighth Bureau: Handles issues related to Xinjiang province Ninth Bureau: Overseas Chinese affairs (regional responsibilities) Tenth Bureau: Overseas Chinese Affairs (Media, Cultural and educational activities) Eleventh Bureau and Twelfth Bureau: Issues related to religion
Xi Jinping and UFWD
Though UFWD has always been used by the CCP as a key element of its spy network, Xi Jinping pushed it to a new high after he took over as Chinese President in 2012. In 2015, Xi declared in an important central united front work meeting, “The United Front … is an important magic weapon for strengthening the party’s ruling position … and an important magic weapon for realizing the China Dream of the Great Rejuvenation of the Chinese Nation.”
More than 40,000 new personnel were recruited for different wings of UFWD within a few years of Xi taking over the reins of CCP. Xi’s specific focus on UFWD shouldn’t surprise those who know his background. Xi Jinping’s father Xi Zhongxun was known for carrying out UFWD missions in Tibet. One of his key assignments was to influence the Dalai Lama and Panchen Lama. As a Politburo member he supervised the UFWD work in the 1980s. Xi rose in the party by climbing through CCP ranks in Fujian province which is known to be a hotbed of united front activities targeting Taiwan. In 1995, he wrote a paper on united front work in the Chinese diaspora. He advocated several new ideas in this paper regarding UFWD which he started implementing in 2012 and expedited it further after the 2015 conference of united front work.
The result is evident. Countries like Australia, US, Canada have exposed how Chinese have been using their spying arms like UFWD to create a deep Chinese state in their countries especially in their political and policy making sphere.
What Jamie Watt, a contributing Columnist to The Toronto Star, wrote in his column on 23 February 2023, would aptly explain the lethalness of Chinese ‘magic weapons’ such as UFWD. Commenting on how incriminating evidence has come out regarding Chinese interference in Canadian elections benefitting Justin Trudeau’s party, Watt wrote: “Just this past week, the Globe and Mail reported news from CSIS that Canadian politicians, government officials, business executives and Chinese Canadians all have been prime targets of Chinese government espionage. This espionage has deployed blackmail, bribery, and sexual seduction. The range and nature of the tactics used are usually reserved for spy novels, but national security experts now deem China’s espionage infrastructure to go far deeper than even the Soviet’s efforts at the height of the Cold War.”
Watt sounds an alarm bell about Canada which explains how Chinese espionage works through organs like UFWD, “It is time that we understand our politicians have proven incapable of addressing Chinese state influence. Chinese aren’t just at our gates, they own them. And they’re standing idly by flipping us the bird.”
A US State Department report on China’s Coercive Activities Abroad specifically highlights the role of UFWD as it says, “The CCP’s United Front Work Department (UFWD) is responsible for coordinating domestic and foreign influence operations, through propaganda and manipulation of susceptible audiences and individuals. The CCP’s United Front permeates every aspect of its extensive engagements with the international community. It targets the highest levels of Western democracies; creates a permanent class of China lobbyists whose primary job is to sell access to high level Chinese leaders to corporate America. The United Front has also penetrated deeply into state, local and municipal governments through a myriad of front organizations such as the CCP’s sister-cities programs, trade commissions, and friendship associations.”
This report also reiterates that China considers UFWD to be its ‘magic weapon’ used by China to dominate the world and manipulate the global narrative.
Chinese Military intelligence: How a mammoth war machine plays spy games across the globe.
India remains one of the primary targets of the Chinese espionage network. And Chinese military has a significant role to play in this game of cloak and dagger.
One of the key elements of the Chinese espionage network is the military intelligence that it has been able to keep under wraps. What we are witnessing is a new avatar of Chinese Military intelligence under President Xi Jinping who as a head of the Central Military Commission directly controls the Chinese military.
He started restructuring the Chinese military in 2015-16 and that also included revamping of the Chinese military intelligence network. Peter Mattis explained the importance and implications of this exercise of Chinese espionage network in China reorients strategic military intelligence (Janes, 2017), “On 26 November 2015, Chinese president Xi Jinping announced the first significant revision of the People’s Liberation Army (PLA) since its reorganization during the 1950s, when the PLA transformed from an army fighting a civil war to one capable of protecting a nation-state. The reforms removed the Soviet-inspired system of general departments, established a new division of labour, and realigned the PLA organizationally to better fulfil the Military Strategic Guidelines that state the goal of winning informationized local wars.”
“Many elements of the PLA’s modernization effort in the past 25 years have had strictly military implications, but this round of reforms reaches far beyond the Chinese military to reshape how the leadership receives information. To reinforce the Central Military Commission’s (CMC’s) control over operational forces and provide better battlefield intelligence support, the PLA created the Strategic Support Force (PLASSF). The new force consolidated much of the PLA’s technical collection capabilities to direct them towards supporting military operations.”
Chinese Military Intelligence Arm: Joint Staff Department
The Chinese military intelligence arm has been innocuously named as Joint Staff Department (JSD). Earlier it was known as 2PLA or second department of the PLA (People’s Liberation Army) General Staff Department. The JSD came into existence around seven years ago.
According to Clive Hamilton and Mareike Ohlberg (Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World), “The Intelligence Bureau of the CMC Joint Staff Department is not only responsible for military intelligence but also has a history of extensive activity in civilian domains. It draws on military attachés and signals intelligence to gather intelligence. The Joint Staff Department has its own think tanks — the China Institute for International Strategic Studies, which focuses on research, and the China Foundation for International and Strategic Studies, which engages in academic and policy exchanges. Its Institute of International Relations (now part of the National University of Defense Technology) trains military attachés and secret agents.”
Structure of Chinese Military Intelligence Apparatus
The Chinese Communist Party (CCP) controls the PLA through its Central Military Commission. President Xi Jinping has been the chairman of the CMC ever since he came to power in 2012.
According to a US Congressional Research Report published in June 2021, China’s current military modernization push began in 1978 and accelerated in the 1990s. Xi Jinping, the General Secretary and “core leader” of the CCP, Chairman of the CCP’s Central Military Commission, and State President, has continued to make military modernization a priority and has linked military modernization to his signature issue: the “China Dream” of a modern, strong, and prosperous country.
‘In 2017, Xi formalized three broad goals for the PLA: (1) to achieve mechanization of the armed forces and to make significant progress toward what the United States would call a “networked” force by 2020; (2) to “basically complete” China’s military modernization process by 2035; and (3) to have a “world-class” military by 2049, the centenary of the establishment of the PRC. Xi has initiated the most ambitious reform and reorganization of the PLA since the 1950s, to transform the military into a capable joint force as well as to further consolidate control of the PLA in the hands of Xi and the CCP.’
Institute for Critical Infrastructure Technology (ICIT), a Washington-based think tank has worked extensively on detailing the structure of Chinese military intelligence through their senior fellow James Drew and Researcher Scott Spaniel. According to Scott and Spaniel, “The People’s Liberation Army (PLA) Joint Staff Department (JSD) replaced the General Staff Department on January 11, 2016, as part of Xi Jinping’s military reforms. It manages most military and covert operations. The JSD, as a division of the PLA, is dedicated to warfare. The duties of the PLA JSD include PLA Operations Command, Recruitment, Mobilization, Formation, Training, and Administration.”
Second and Third Department
The JSD has three departments which work in coordination to conduct various intelligence operations. These departments deal respectively with electronic intelligence, human intelligence, and signal intelligence. The section within the PLA’s Joint Staff Department that deals with conventional human intelligence (HUMINT) is known as ‘Second Department’.
James Scott and Drew Spaniel estimated in their 2016 book, China’s Espionage Dynasty, that this department had around 30,000–50,000 agents around the world. Their primary task is to collect useful, relevant, and confidential information and send it back to China.
‘A common misconception is that agents of the Chinese government are “sloppy”; however, agents of the second department who serve as high level spies or handlers are rarely caught. Rather, low-level assets, often belonging to the overt structure, are more often detected by foreign intelligence agencies.’
The Third Department which is entrusted with the task of signals intelligence (SIGNIT). According to Drew and Spaniel, “The Third Department is the largest intelligence agency in the Chinese government, consisting of an estimated 250,000- 300,000 linguists, technical staff, and cyber soldiers. There are at least four known Research Institutes (56, 57, 58, and 61) under the Third Department. Within the 61 Research Institute are approximately 20 bureaus that launch cyberattacks. The Third Department intercepts phone calls, launches cyberattacks, and monitors communications. Much of its efforts involve hacking devices and exfiltrating targeted data. The Third Department may launch obvious cyberattacks, such as DDoS or ransomware attacks, against target systems to mask the activity of Second Department operatives.”
Fourth Department
The Fourth Department is responsible for electronic intelligence (ELINT) operations. Its prime focus is on intercepting satellite and radar data. The operatives of Fourth Department are experts in altering, jamming, or spoofing of signals.
“It is believed that the Fourth Department research direct methods of disabling enemy communication networks. State-Sponsored APTs (i.e., Chinese state sponsored advanced persistent threats) can be identified based on their choice of targets, their proclivity for cyberespionage, and the language settings on the keyboards used to develop the malware, and their connections to other campaigns. Some groups, such as APT 1 (Unit 61398), APT 2 (Unit 61486) and APT 30 (Unit 78020) can be linked to specific units within the Third Department. Other APTs remain less defined.”
PLA Unit 61398
In May 2014, five officers of the PLA who belonged to its unit ‘61398’ commonly known for cyber espionage and cyberattacks were indicted by a US court. Several cyber security firms have reported about the clandestine operations of this unit which is one of the key parts of the Chinese Military Intelligence apparatus. This unit primarily targets countries with flourishing democracies as they are a perfect antidote to the Chinese authoritarian system. Hence along with several other countries, India has also been one of their targets. Several cyberattacks on the Indian establishment are believed to have been carried out by this unit. It is reportedly headquartered in Datong Avenue of Pudong district in Shanghai. There has been a consistent spurt in its activities.
Conclusion
The Chinese military intelligence is committed to pursue the so-called vision of Xi Jinping and peddle a pro-China global narrative. China Institute of International Studies (CIIS), a front form the Chinese military intelligence network, carried a detailed comment on India. Authored by Lan Jianxue, Director of the Department for Asia-Pacific Studies at CIIS, this is what Chinese military intelligence conveyed, “Noticeably, the connotation of the so-called Asian Century, as understood by the United States, is not quite the same as that understood by the Chinese. The expression “Asian Century” was coined by former Chinese leader Deng Xiaoping in 1988. Deng pointed out that no genuine Asian Century can come until China, India and other neighboring countries are developed.
It is clear the United States remains one of the primary targets of the Chinese espionage network. And the Chinese military has a significant role to play in this game of cloak and dagger.
The cyberspace was born in the military field. For example, the first computer, the APA network and the GPS navigation system all originated from the military. Today, cyberspace security has been closely related to national security, and the military has once again become the protagonist of maintaining national cyberspace security. Whether facing normalized network penetration or large-scale cyberattacks, it is urgent for the military to move from guarding the “network camp gate” to guarding the “network country gate”, breaking through the traditional military missions and missions, and breaking through the traditional war preparation mode. With a new network of national defense thinking, the founding of the network era of the country’s strong shield.
From the “network camp door” to the “network country door”, the new era brings a new trend of military mission
Cyberspace is not only related to the maintenance of national strategic interests, but also directly affects political, economic, cultural security and social development. It has also become the blood and link of modern battlefield joint operations. The Chinese military cannot be limited to maintaining the internal network security of the military camp. It must also actively adapt to the trend of the times and take the responsibility of the country that guards the “network country.” Network strong army is an important part of the construction of a network powerhouse. From the “network camp door” to the “network country door” is the inevitable trend of the development of the domestic and international situation in the information age.
Guarding the “network country door” is forced by the cyberspace security situation. As the first big Internet country, China’s security situation is not optimistic, and strategic opponents have never stopped preparing for our network operations. The United States, Britain, France and other countries are actively preparing for cyberspace, giving military functions through cyberspace security legislation, developing cyber warfare forces, developing cyber warfare weapons and equipment, and advancing war to the “fifth space” of mankind, especially in China. In the historical process of the rise, under the leadership of the Cold War mentality and the containment subversion strategy, Western countries have used network technology and communication methods to implement uninterrupted harassment, subversion and cyberattacks, seriously affecting China’s national security and social development, and China has gradually become The hardest hit by cybersecurity threats, the test sites for virus attacks, and the destinations of conscious penetration, national security faces enormous risks.
In the coming period, as a new emerging country, China’s conflicts of interest with other parties will intensify. Firmly promoting the network defense strategy and strengthening the operational preparation of cyberspace are the inevitable ways to actively strive for the dominance and discourse power of cyberspace, and also the rise of China. The only way to go. As the main force of national security and stability, the military must adapt to the characteristics of cyberspace characteristics, become the backbone and main force to resist network intrusion and network subversion, and safeguard national security and social stability.
Winning cyber warfare is the trend of new military revolution in the information age. As one of the most advanced productivity in the information age, network technology has made cyberspace warfare a leading factor in guiding the evolution of modern warfare and affecting the overall situation of war. In recent years, from the “seismic net” attack in Iran, the cyber warfare in the Russian-Georgian conflict, the large-scale obstruction of the Ukrainian power grid, and the cyberattack of the US military against IS, the huge role played by cyberspace in actual combat has gradually emerged, indicating that cyber warfare Has become an important style of future joint operations.
The US military attaches great importance to the construction of cyberspace armaments, the establishment of the cyberspace command, the launch of cyberspace joint operations, the extensive expansion of cyber warfare forces, the maintenance of its cyberspace hegemony, and the formation of cyberspace control capabilities as a “third offset strategy”. “Absolute advantage is the most important competitive content.
Many countries in the world have followed suit, and the trend of militarization of cyberspace is obvious. The rigorous cyberspace military struggle situation requires the Chinese military to focus on the changes in the network battlefield space, adapt to the requirements of the information war era, and achieve the strong military goal of smashing and winning in cyberspace.
Effective network warfare is an intrinsic need to accelerate the construction of a network powerhouse. In the process of China’s development from a network power to a network power, it is inseparable from the strong cyberspace military power as a guarantee. The international competition in cyberspace is a comprehensive game of the country’s comprehensive strength. Among them, the quality of network military capacity building is directly related to national security and stability, and it is the core element of the entire national security field.
At present, the interests of countries in the world in the cyberspace are mutually infiltrated, and there is a situation in which you have me, I have you, cooperate with each other, and develop together. However, this kind of common development is not equal. The US and Western powers have taken advantage of the cyberspace dominance and have already achieved certain network warfare advantages, which has made my network development and interests subject to people. How can the military fulfill its mission of defending the earth in the construction of a network-strength country? The premise is to form a network environment that can contain the crisis and control the opponent’s network attack and defense capabilities and ensure peaceful development.
Therefore, the military needs to establish a deterrent strategic goal of effective warfare, form a strategic check and balance ability that can “destroy each other” with the enemy, thereby enhancing strategic competitiveness, ending cyberspace aggression, and ensuring the smooth advancement of the network power strategy.
From “keeping the soil to the responsibility” to “protecting the net and defending the country”, the new situation requires the military to undertake new tasks.
The military is the main force and pillar of national security, and cyberspace is no exception. The National Security Law, which was enacted on July 1, 2015, stipulates: “Citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and institutions, and other social organizations have the responsibility to safeguard national security. And obligations.” The Cyber Security Law, promulgated in November 2016, emphasizes the need to maintain cyberspace sovereignty and national security.
On the basis of the laws of these two countries, on December 27, 2016, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was officially launched, providing overall guidance for creating a new pattern of network powers at a new starting point. Basically follow, clearly put forward nine strategic tasks, further embodying the mission of the military in the process of building a network power.
With the national mission of protecting the network, the military must be a strong pillar to defend the cyberspace sovereignty. The first of the nine strategic tasks listed in the “Strategy” is “firmly defending the cyberspace sovereignty” and clearly proposes to “take all measures including economic, administrative, scientific, technological, legal, diplomatic, military, etc., and unswervingly maintain our network.” Space sovereignty.” It can be seen that the military must assume the military mission of using physical space and defend the national mission of the sovereign security and interests of virtual cyberspace.
Cyberspace sovereignty is the core interest of the state and an important component of national sovereignty. It indicates the independence, equal, self-defense and management power of the state in cyberspace. Once the hostile forces violated my cyberspace sovereignty, it would be equivalent to infringing on the national sovereignty of the physical space such as land, sea and air. China will have the right to take all measures including military means to give a firm response.
Internationally, the United States has long proposed a cyberspace deterrence strategy, declaring that attacks on US network information facilities are equivalent to war acts, and the United States will take military strikes to retaliate. Military means are the means of safeguarding national sovereignty and play a vital role in safeguarding national cyberspace security. Therefore, the military, air, sea and air military forces have been given the historical mission of protecting the cyberspace sovereignty. They must rely on the powerful physical space to defend the national interests of cyberspace and effectively deter the hostile forces from cyber-damaging attempts.
In accordance with the era of the Internet, the military must be the ballast stone to defend national security. The second item of the “Strategy” mission emphasizes the need to resolutely safeguard national security, prevent, deter and punish any use of the Internet for treason, secession, sedition, subversion or incitement to subvert the people’s democratic dictatorship.
In the era of information network, the military of all countries in the world has become an important participant in cyberspace. The level of cyberspace capability has become the main indicator for assessing the modernization of a country’s military. It is one of the main duties of the informationized military to carry out cyberspace missions and maintain national security.
Judging from the historical process of China’s development, it is necessary to be highly vigilant against the danger of the country being invaded, subverted, and divided in cyberspace in order to adapt to the national security strategy needs of building a well-off society in an all-round way. Highly alert to the reform caused by cyberspace. The danger of developing the overall situation is destroyed, and we are highly wary of the danger of interference and destruction in the development of socialism with Chinese characteristics.
Preventing problems before they occur requires the state to have the means to cope with and deal with these risks, and to have the powerful force to prevent, stop and legally punish cyberspace violations. Defending the country has always been an unshirkable historical responsibility of the military. The inherent mission and mission have determined that the Chinese military must assume the role of taking various measures in the cyberspace to safeguard the country’s political, economic, cultural security and social stability.
The strategic mission of both offensive and defensive, the military must be a strong backing to enhance the ability of cyberspace protection. The third and eighth items of the Nine Major Tasks in the Strategy clearly state that all necessary measures must be taken to protect key information infrastructure and its important data from attack and destruction, and that technology and management should be adhered to, protected and shocked; We will build a network space protection force that is commensurate with China’s international status and adapts to the network power. We will vigorously develop network security defense methods, timely discover and resist network intrusion, and build a strong backing for national security. Among all the political, diplomatic, military, and scientific and technological capabilities of the country to maintain security, military power has always been the foundation and support for all capabilities, the fundamental guarantee for all capabilities, and the ultimate support for national security.
Therefore, the military must undertake the strategic task of strengthening the national cyberspace protection capability. In the real society, the military is the reassurance of safeguarding national security, and it should also become the security dependence and guarantee of the people in cyberspace. As an important part of the national cyberspace protection capability, the military must achieve both offensive and defensive capabilities and a unified warfare. It has the ability to resolutely safeguard the interests and security of the country and the people in cyberspace, and effectively eliminate the various crises caused by cybersecurity threats. The turbulence of thoughts enables the people to truly feel that production and life are effectively protected and become the confidence of the people of the whole country in their confidence in the national network protection capabilities.
With the global responsibility of UNPROFOR, the military must be an important support for maintaining global cybersecurity. The last item of the “Strategy” mission clearly proposes to strengthen international cooperation in cyberspace, support the United Nations in playing a leading role, promote the development of universally accepted international rules on cyberspace, international anti-terrorism conventions on cyberspace, and improve the judicial assistance mechanism against cybercrime. International cooperation in the areas of policy and law, technological innovation, standards and regulations, emergency response, and protection of key information infrastructure.
Cyber terrorism and cybercrime are new forms of global threat catalyzed by information network fermentation. They pose a huge threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of the government and the people. Western countries have given the military the responsibility to protect cybersecurity and the power to fight cyber terrorism. Maintaining the security and stability of global cyberspace is in the fundamental interests of China and the rest of the world. The military should become an important defender of global cyberspace security and an important force in combating global cyber terrorism and cybercrime.
The globalization and unbounded nature of the Internet determine the international demand for combating cyber terrorism and transnational cybercrime. The military should promote military cooperation in network governance between countries under the framework of the UN Security Council, and use the strategies and technologies of the network era to establish joint defense and joint defense. Mechanism to effectively safeguard the security of the national and world cyberspace.
From “field training” to “network preparation”, new areas require new preparations for the military
Under the new historical situation, cyberspace puts forward new requirements for the military training and preparation mode. It should adapt to the new characteristics of cyberspace and the new mission of the military to carry out innovative reforms on the traditional model, and take the goal of strengthening the country and strengthening the military as the overall plan, and strengthen macro-coordination. Focusing on the legal needs of military operations in cyberspace, it closely follows the natural attributes of the “military and civilian integration” of cyberspace, builds a network security attack and defense system that combines peacetime and warfare, and builds a network defense force of “military and land use”.
Legislation empowerment provides a legal basis for the military to carry out its functional mission. The countries of the world, especially the western developed countries, attach great importance to the issue of network defense in cyber security legislation. The United States has successively issued a series of policies and regulations such as “National Security No. 16 Presidential Decree”, “Network Space Action Strategy”, and has continuously deepened and standardized on how to protect national network security in the field of network defense.
At present, it is necessary to clarify the duties and responsibilities of the cyberspace military from the legal level. It should be based on the National Security Law and the Cyber Security Law, and introduce the network defense law and related cyberspace military operational regulations, for the construction of the network defense field and the military. The action provides regulatory support and a program of action to make the military’s responsibilities and mission in cyberspace more specific and specific.
First, through network defense legislation to further define network sovereignty and network frontiers, clear the scope of the military’s responsibilities.
The second is to establish the operational authority of the military to defend the national cyberspace security through the construction of cyber warfare laws and regulations, and to distinguish military means against network intrusion and network destruction. Third, through the cyberspace international cooperation policy, the military will coordinate with other countries and civilian forces to combat international cyber terrorism and cybercrime.
The integration of military and civilian provides an innovative driving force for the construction of a network powerhouse. The integration of military and civilian is the main practice for the world powers to enhance the competitiveness of cyberspace. For the construction of China’s network powerhouses, building a military-civilian network security attack and defense system and developing a military-land dual-use defense information infrastructure is to inspire the innovation of military cyberspace combat capability. Source.
The first is to coordinate the military, civilian, and functional departments of the state, the military, and various levels of government, set up special command and coordination agencies, mobilize all national network forces, and build a network security attack and defense system that combines “military and civilian integration” and “peace and war.”
The second is to issue guidance on the in-depth development of cybersecurity military-civilian integration as soon as possible, and gradually carry out basic legal research and demonstration of military-civilian integration to guide the development of medium- and long-term military-civil integration.
Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and civilians will jointly build an information infrastructure covering the entire army of the whole country, and realize the unified construction and sharing of military and civilian.
The fourth is to establish an emergency response mechanism for military-civilian joints, increase the ability to train military authorities to control events, strengthen experts and emergency professional strength, and enhance the ability to quickly recover damaged networks or information systems.
Military-civilian joint training provides a practical environment for the generation of cyberspace military capabilities. The military-civilian sharing characteristics of cyberspace make military-civilian joint training an important means of military training in cyberspace around the world. The United States and NATO countries and other cyberspace joint military and civilian exercises have formed a series of, “network storm” and “network guards” and other exercises have attracted the participation of the government, enterprises, research institutions and even civilian hackers. Our military cyberspace military strength training also needs to attract a wide range of civil forces to participate.
First, do a good job in military and political cooperation, establish a military-civilian joint offensive and defensive drill mechanism, learn from the red-blue confrontation training methods in cyber warfare drills in developed countries such as the United States, actively build a “national network shooting range”, plan a series of joint exercises of the government and non-government organizations, and enhance the integration of military and civilian. The level of attack and defense of the network of the government and the people.
The second is to do a good job in military-enterprise cooperation, relying on net-based enterprises to set up a training field on the Internet, to promote the ability of the military and civilians to attack and defend, and jointly improve the ability to prevent unknown risks.
The third is to organize private network security companies and hacker talents, carry out network security competitions and other activities, and verify each other to jointly improve the level of network security protection technology and tactics.
The network reserve service provides a source of strength for building a powerful network army. As a backup supplement to the national defense force, reserve service has both military and civilian characteristics and is a powerful measure to realize the organic unification of cyberspace economic development and national defense construction.
First, it is led by the national security department, and overall planning is carried out according to national interests. A series of laws and regulations conducive to the construction of the network national defense reserve are introduced. From the top level, the main division of labor, promotion strategy, interest coordination, etc. of the military and civilian construction in the network defense reserve construction are solved. problem.
The second is to innovate the reserve organization and comprehensive coordination mechanism, and plan to integrate the reserve construction into all levels and fields of national network information development.
The third is to focus on the reform of the military and local management modes. Based on the management mechanisms of the provincial and municipal governments, the military, and local enterprises and institutions, establish a network of national defense reserve personnel to jointly cultivate and use the mechanism, improve the national emergency mobilization mechanism, and establish a national network defense special talent. The database will include the construction of network militia and reserve forces into the scope of mobilization of the people’s armed forces. In normal times, they will be incorporated into the militia emergency detachment for training. In an emergency, select the capable personnel to participate in the non-war military operations missions, and the wartime will be recruited according to the requirements. To transform the national defense potential into national defense strength.
Strategic support forces are not logistical support or more powerful than the Rockets. Three tears on, how effective has China’s SSF become in the realm of cyber warfare?
Abstract: On December 31, 2015, the PLA Army Leadership, Rocket Army, and Strategic Support Forces were established. Xi Jinping, General Secretary of the CPC Central Committee, President of the State Council, and Chairman of the Central Military Commission, awarded the newly established three major units. The major steps marking the reform of the PLA’s army are beginning to be gradually implemented. Among the three new units, the strategic support force is definitely a brand new name, which naturally raises many questions. What kind of force is this?
Strategic support is not logistical support
The newly established three units, the Army’s leading body is also the Army’s headquarters. The former PLA has always been the army’s boss. The mainland’s thinking is deeply rooted. Therefore, only the navy and air force headquarters, and no army command, the top leaders of the army are all from The army, the head of the navy and air force ranks among the members of the Central Military Commission, and it is more symbolic. The establishment of the Army Headquarters now means that the status of the Army will gradually be lowered and will be consistent with other services. This will lay the foundation for the model of the highest military leadership in the rotation of the heads of the Western military in the future, and further strengthen the synergy for the various services. The conditions.
The Rockets are no strangers to military fans. They are the former Second Artillery Corps, which is essentially a strategic missile force. The strategic missile unit of the former Soviet Union was called the Strategic Rocket Army. When the PLA established the strategic missile force, the international situation was surging. For the sake of low-key restraint, Zhou Enlai proposed the name of the Second Artillery. Now renamed the Rocket Army, the name is more prestige, more directly strengthen the significance of strategic deterrence.
Relative to the above two units, for those concerned about national defense construction, the strategic support force will be much more strange. When many people hear this name, the first reaction is the logistics support force, which is a big mistake! The strategic support force is actually a genuine combat force. It is nominally supportive. In many cases, it is the first open-minded pioneer to fight, even to enter the battlefield earlier than the land, sea, air force and rocket forces. According to the spokesman of the Ministry of National Defense, the strategic support force is a new type of combat force for safeguarding national security and an important growth point for our military’s new combat capability. It is mainly a strategic, basic, and supportive type. The support force is formed after the functional integration.
Specifically, the strategic support force will include five parts: intelligence reconnaissance, satellite management, electronic countermeasures, cyber offense and defense, and psychological warfare. It is a combination of the most advanced corps, the net army, and other battlefields on the battlefield. More specifically, it is a combat force dedicated to the soft kill mission.
This is also the adjustment of the military reform at the military level. The PLA is divided into the traditional land, sea and air force, the strategic deterrent and the attacking rocket army and the most modern “sky-net” army. The three levels of division of labor are clear, and they can strengthen each other. The synergy between the two, to maximize the advantages of the overall war, is undoubtedly the highlight of this military reform.
Five major parts highlight high-tech content
Let’s take a closer look at the five major components of the Strategic Support Army. First, intelligence reconnaissance. This is not a spy war in the traditional sense. It is not like the old movie “The Crossing River Scout”, which disguise itself as a deep enemy. More is technical reconnaissance. With the increasing popularity of modern equipment, the leakage of various technical information is difficult to avoid, such as radio signals, electromagnetic signals, infrared signals, etc., through the collection and analysis of these signals, a large amount of valuable information can be obtained, strategic support forces The reconnaissance is mainly the technical reconnaissance in this respect, which can be carried out through modern equipment such as reconnaissance satellites, reconnaissance planes, drones, and sensors.
Satellite management is the so-called “Heavenly Army”. This is a new type of force that has emerged with the rapid development of space technology, especially satellite information reconnaissance, tracking and surveillance, guided navigation and aerospace weapons. The United States established the National Space Command in 1985, marking the birth of the world’s first heavenly army. Russia subsequently separated the military space force and the space missile defense force from the strategic rocket army and established a space force with a total strength of about 90,000 people. Then with the military reform of the People’s Liberation Army, the “Heavenly Army” under the strategic support force was formally formed and became a force dedicated to space operations in the future. The significance is significant.
The history of electronic confrontation is much longer than that of the Tianjun. As early as in the First World War, both sides have had the information of the other party and the communication of the other party. To the Second World War, the means of electronic confrontation. Both the scale and the scale have been greatly developed. In July 1943, the British army used metal foil strips to interfere with the German radar in the bombing of Hamburg, Germany, which was considered the beginning of modern electronic confrontation. During the Middle East War in the 1960s, electronic confrontation played a decisive role. Under today’s technical conditions, there is no need to spend more on electronic countermeasures.
Network attack and defense is also called cyber warfare. It is the rise of the network, exploiting the loopholes and security flaws of the network to attack and destroy the data in the hardware, software and systems of the network system. In 2001, there was a large-scale civil hacking incident between China and the United States, which stimulated the United States to a certain extent. By 2009, the world’s first cyber command was established. Through the opportunity of military reform, China has set up a specialized cyber warfare force and began systematically investing and developing in the fields of information construction and network attack and defense. This is a milestone for the future war, which is bound to spread to the network. meaningful.
In the end, it is psychological warfare, that is, by applying the principle principle of psychology, taking human psychology as the battlefield, and systematically adopting various means, including the means of communication, such as the Internet, television, and broadcasting, which cannot be separated from modern life. Cognitive, emotional, and will exert influence, mentally disintegrating enemy military and civilian fighting spirits or eliminating the influence of enemy propaganda, thus combating the enemy’s mind, in exchange for the greatest victory and benefits at the least cost. Psychological warfare sounds very mysterious. In fact, as mentioned in “Sun Tzu’s Art of War·The Tactics”: “It is the victorious battle, the good ones who are not good, the soldiers who do not fight and the good, and the good ones.” The “war without a war” is the ultimate goal of today’s psychological war. In the Battle of Normandy in the Second World War, the Allies used a large number of psychological warfare methods, which seriously affected the judgment of the German commander-in-chief and made great contributions to the victory of the battle. Since then, from the Korean War, the Vietnam War, to today’s Iraq War and the Afghan War, the US military has had professional psychological warfare troops to participate in the war. Therefore, this is the most easily overlooked military means, but it is a high level of military struggle, and even more efficient and effective than advanced aircraft cannons.
Therefore, it can be said that the strategic support force is the highest in the five major services after the reform of the PLA’s army. It can even be said to be completely different from the traditional war style of the past, and it is more characterized by ultra-modern flow.
Soft killing
According to the strategy disclosed on the network, the armbands are supported on the network. The above is the eight-and-five-pointed star. Below is the triangular arrow and the electronic cloud orbit. Surrounded by the surrounding wheat ears, it can be seen from this pattern that the strategic support force is not a traditional one. In the sense of steel contest, you can’t see the scene of the smoke, and there is no such thing as a nuclear weapon to destroy the horror of the sea, but the soft kill of the soldiers. In a sense, soft killing is no less inferior than hard killing, and even playing a role is more important than hard killing.
In contrast, until today, the US military has only independent scattered Tianjun, Net Army and psychological warfare units, but the PLA Strategic Support Forces have integrated these units directly in the preparation, and they are able to cooperate and play the greatest combat effectiveness. . It can be said that this major reform of the military, especially the establishment of the strategic support force, is definitely a major improvement in the system.
Imagine that without the strategic support force’s satellites accurately positioned and navigated, without the electronic escaping forces and cyber warfare forces escorting, the Rocket’s strategic missiles will be difficult to function; if there is no strategic support for the technical reconnaissance intelligence support, Satellite communication links, then the land, sea and air forces on the vast battlefield are blind and deaf, and the combat effectiveness is greatly reduced. Therefore, the strategic support forces will play a major role in the invisible four-dimensional and five-dimensional battlefield space.
China’s New Military Strategy : An Analysis from Asia Cyber Warfare is a Force Multiplier //
中國的新軍事戰略:亞洲網絡戰的分析是力量倍增器
Author ; HongAn
View photo
The theory of war can last for a long time because the book is based on the two pillars of “research and observation” and “philosophy and experience”. They complement each other and make war theory in philosophical dialectic, logic, and theoretical reality and effectiveness. More contemporary. The primitive violence, political nature, and the interaction between the government, the people, and the military in the observation of the nature of the Krupp War are mainly oriented to examine China’s national defense strategy and its political influence and planning in the modern war.
Since Tsai Ing-wen came to power, he requested the Ministry of National Defense to propose the adjustment of the military strategy in the emergence stage. The author believes that it must be formulated from the overall thinking of the national security strategy. The preparations for the establishment of the national army are based on the “10-year military conception” as the basis for the reconstruction of the military. The author has led the plan to report on the national defense strategy (imaginary) of the Republic of China from 1995 to 104. At present, in the face of the development of the CCP’s military aircraft carrier and the military aircraft flying over the central line of the strait, the balance of power between the two sides of the strait has been broken. How to adjust the new military strategic view, facing the threat of war in a new situation, the strategic concept should also be adjusted.
View photo
20161231 – China’s “Liaoning” aircraft carrier broke through the first island chain in the Pacific Ocean and conducted cross-sea area training missions. The Chinese Navy released photos on the official Weibo. The picture shows the Liaoning and five destroyers. (taken from the Chinese Navy to publish Weibo)
The author believes that the current development of the CCP’s military aircraft carrier and the military aircraft flying over the central line of the strait have broken the balance of power between the two sides of the strait, how to adjust the new military strategic view, face the threat of war in a new situation, and the strategic concept should also be adjusted. . The picture shows the Chinese “Liaoning” aircraft carrier. (taken from the Chinese Navy to publish Weibo)
Deterrence strategy for the purpose of war prevention
Defending and defending is a war act, and effective deterrence is the prevention of war behavior. In the case of the Taiwan defensive warfare, “deterring” the enemy’s military operations “war”, “prevention” means preventing the use of force by the enemy. If the defeat is defeated, the war will erupt. The use of military force in the deterrent strategy is to prevent the enemy from using military force. Therefore, the deterrent theory is skillful nonuse of military forces, so deterrence must go beyond military skills. It is “stunned”. The purpose of deterrence is not to destroy the enemy when the enemy invades, but to make the enemy realize that if he really takes action, he will be eliminated.
As far as China’s new military strategic changes are concerned, Taiwan’s defense operations are of a defensive nature. As far as the defense strategy is concerned, there are only two options: defense and active defense; as far as tactical level considerations are concerned, it is just like defensive operations, only position defense and mobile defense, or both.
The People’s Liberation Army’s force development and strategic deterrence
The Chinese People’s Liberation Army’s development of force has emphasized the “joint overall war.” It is familiar with the internal forces of the Communists and the people on the two sides of the strait. They are constantly launching strategic deterrence against the CCP. To some extent, the CCP has made military, economic, diplomatic, and political organizations. Comprehensive integration. The CCP’s overall national defense transformation has surpassed the scope of military strategy. It not only combines the strategic thinking of “winning local wars under the conditions of information” and “active defense”, but also enhances the “combined operations of the arms and services” and promotes the “harmonious world”. The diplomatic strategy of the “new security concept” continues to use the “three wars” and “anti-secession laws” to integrate into a new “joint overall warfare” strategy.
View photo
The People’s Liberation Army Navy’s South Navy, the missile destroyer “Hefei Ship” officers and men looking for targets (AP)
The CCP’s overall national defense transformation has surpassed the scope of military strategy. It not only combines the strategic thinking of “winning partial wars under information conditions” and “active defense”, but also enhances the ability of “combined operations of arms and services.” The picture shows the naval naval performance of the PLA Navy. (Information, Associated Press)
On November 25th and December 11th, 2016, the Communists twice rounded Taiwan for half a month. On December 11th, the mainland warplanes moved more than 10 fighters across the Miyako Strait and also bypassed the eastern Taiwanese waters! The People’s Liberation Army Air Force fighters flew out of the “first island chain” while crossing the bus strait and the Miyako Strait. After the CCP’s military aircraft detoured to Taiwan, the CCP’s Liaoning aircraft carrier formation also appeared in the outer seas of my east. According to the recent development of the situation, the CCP has been moving frequently, and the political meaning is greater than the military meaning. Especially after the call of Chuan Cai on December 2, 2016, Trump challenged Beijing’s “one China” policy. Of course, Beijing will not show weakness on core interests. Sending military aircraft to bypass Taiwan and dispatching aircraft carriers through the eastern waters of Taiwan is aimed at announcing that the Taiwan issue is a matter of internal affairs to the United States. It also declares that its armed forces can extinguish the Taiwan independence forces themselves, and never It will repeat the events of 1996.
In addition, the Chinese People’s Liberation Army’s iron boxing force can be said to be the rapid response force established by the People’s Liberation Army in response to the 21st century. The iron boxing force basically includes the People’s Liberation Army’s air force airborne 15th Army, the Military Commission, or the rapid reaction force directly under the military region. The special military battalion directly under the military region and the Chinese Marine Corps have four major fists. According to sources, the General Staff of the People’s Liberation Army, which was established in early 2016 and completed a large division of theaters, held a cross-strait military affairs report, confirming that Chinese national leader Xi Jinping has formally signed important instructions. This is internally called “No. 41″. The military order has authorized the PLA General Staff to add and complete the 16th Airborne Airborne Forces by the end of 2018. It has two fast airborne divisions, the 69th Division Airborne and the 71st Airborne Division. The newly established Airborne Sixteenth Army will assemble elite field divisions from the Nanjing Military Region and the Jinan Military Region, and will be equipped and trained to become part of the Air Force. It will be equipped with special military and missile units to become a professional force”.
View photo
In 2017, China’s “two sessions” (National People’s Congress, Political Consultative Conference) debuted in Beijing, the 5th meeting of the 12th National People’s Congress, the People’s Liberation Army Representative (AP)
The military commander inside the People’s Liberation Army called “Order No. 41” has authorized the PLA General Staff to add and complete the 16th Airborne Air Force before the end of 2018 and become a “professional force” against Taiwan. The picture shows the representatives of the People’s Congress and the People’s Liberation Army of the Political Consultative Conference. (Information, Associated Press)
If combined with the rapid reaction force that has been completed, that is, the Airborne 15th Army, it is based on the 3rd Airborne Infantry Divisions of the 43rd Division, 44th Division, and 45th Division, and is independent of the Air Force’s 13th Airlift and the 13th Airborne. The regiment has more than 90 large and small transport aircraft, as well as some independent helicopter regiments (Brigades) belonging to the Army Aviation. Together, they can maintain a 60% combat capability and are ready to go on-board to “can fly at any time, and can drop and drop at any time.” Hit the “iron bones” of the attack mission. The General Staff of the People’s Liberation Army has officially issued a formation order. This is also a major role played by the US military in the US-Iraq war, the powerful projection force of the US military and the visual field-distance force, which led to the reform of the traditional forces. It is also impossible for the CCP to surrender to the United States forever. At least, in the East Asian region, it is hoped that it will be equal to the United States and jointly handle the status of Asia-Pacific affairs.
How can a failing strategy and a hundred percent of combat power be played!
Definition of strategic concept: After the judgment of the strategic situation, the action plan adopted should generally consider five major factors: namely, purpose, strength, time, place and means. The so-called military strategy is built under the national (security) strategy and must follow and support the national defense policy. Military strategy is not only a rationale for thinking, but also a strategic concept. It also covers the overall consideration of force design and force building. In other words, military objectives and strategic ideas are the guidance of force planning (construction), and force building is a concrete practice, and the military design combines the above two parties into a complete strategic thinking.
The military strategic adjustment of China’s various stages is a transformation from the past offensive strategy, offensive and defensive integration, defense defense or offensive defensive strategy. The process is closely related to the US global strategy, the Asia-Pacific situation and cross-strait relations. Its purpose is to ensure Taiwan’s security and maintain national sovereignty and territorial integrity. At this stage, the author believes that “preventing war, maintaining the status quo, and safeguarding homeland security.” The Department also focused on the interception of the “defense and defense, deep suppression” to effectively curb the enemy.
View photo
Table I
Table I
Multi-task goal is means, heavy layer interception force is joint operation deployment
Purpose and means can not cooperate (multiple deterrence is passive defense, heavy deterrence is active defense)?
According to the “multiple deterrence” that the Secretary of Defense, Mr. Feng Shikuan, has recently proposed, the difference between the “repeated resistance” and the “definitely deterrent” is that the “multiple deterrence” tends to be passive defense, that is, the defense operation limited to Taiwan’s main island; It is an active defense. It is based on the island and pushes the defense network layer by layer. The two have passive and active differences. As far as the author has been engaged in strategic teaching experience for many years, there is no passive or active distinction between the so-called “multiple deterrence” and “repeated resistance”.
View photo
20170302 Legislative Yuan. Minister of National Defense Feng Shikuan attended the report of the Foreign Affairs and Defense Commission and answered questions (photo by Chen Mingren)
The difference between the “multiple deterrence” proposed by the Secretary of Defense Feng Shikuan and the “repeated resistance” of the final case is that “multiple deterrence” tends to passive defense. (Photo, photo by Chen Mingren)
The author believes that the reason why China has adjusted “defense and obstruction” to “effectively deterring, defending and defending” should be “effectively deterring, defending and defending”, that is, the spirit of offensive and defensive. The choice of multi-task targets is only a means, and the interception of multi-tasking is a joint strategy deployment. The strategic concept of failing to cooperate with the purpose and means is a strategy that fails. It is no longer a defensive, it is a layer. Eliminate, so there is no focus on the war of war, how much money we can play.
Has Taiwan been deterred and prepared? If the CCP attacks the national army will not be defensive again!
When the Defense Minister Feng Shikuan made a reply in the Legislative Yuan, he pointed out that the military strategy of the National Army will be adjusted to “repeated the obstacles” because the weapons developed now are more advanced than before. “Some missiles have developed well”, which can make Taiwan better. Defensive forces; if the CCP launches an attack against Taiwan, the national army will no longer be a defensive, and the “respective deterrence” will begin to turn into “active defense.” At the same time, the national army has multiple, multi-party, multi-capacity capabilities. Through the enemy’s half-crossing, beach battle, and position defense, the sea and air forces could not successfully reach the purpose of landing on the island of Taiwan (quoted from Wu Mingjie, March 13, 2017, Feng Media).
In reply to the question of the Democratic Progressive Party legislator Liu Shifang, he said that if the missile command headquarters moved to the Air Force, it would meet the requirements of the deterrent strategy. The four stages of the Flying Finger Division belonged to different units, and the combat strength continued to increase. Command unity and unity of affairs can be time-honored in the first place. The Air Force Operations Command has this power. And Feng Shikuan said that “some missiles have developed well” and “not a layer of defense, it is a layer of elimination, rejection”, which refers to the deployment and mass production of the male E E cruise missile, Wan Jian bomb, Xiong San missile and patriotic The missiles, such as missiles, intercepted and annihilated the missiles, warplanes, and warships that had come to the enemy, and then began to conduct defensive operations after the troops were projected onto Taiwan’s main island.
View photo
Table II
Table II
Constructing a multi-layer interception joint warfare missile defense capability is the focus
The National Army’s self-developed warplanes, Tianjian-1 and II missiles, and Tiangong’s first, second and third missiles have all been deployed or mass-produced, and preparatory energy and position deployment work has been prepared. Secondly, the R&D plan of high-resolution radar, electronic warfare equipment, multi-barrel rockets and other weapon systems will be carried out to effectively improve the overall combat strength of the national army. How to improve the defense warfare early warning capability, radar performance and coverage, and strengthen the development and deployment of radar signal processing, electronic defense technology, and mobile radar. We will continue to establish an early warning control mechanism and information link construction, integrate the three-armed referral system, and accurately control the relationship between the military and the various stations.
View photo
20160811 – Hualien Air Force Base was opened to local residents and the media on the 11th. The picture shows the IDF through the national warplane. (photo by Yan Linyu)
The National Army’s self-developed warplanes have been deployed or entered into mass production, and preparatory energy and position deployment work has been prepared. (Photo, photo by Yan Linyu)
The author believes that the missile defense capability is the key to the joint strategic deployment of constructing heavy-layer interception, especially the ability to recover from war damage is the key to the battle; the CCP’s flight vehicles (missile, patrol missiles and unmanned vehicles, etc.) have a precise impact, and their After the first strike, the national army’s war damage and resilience were the key factors affecting my combat schedule and the CCP’s follow-up battle plan. The national army should consider the ability of independent control after the destruction of the management system and strengthen the ability of attracting, electric warfare and defensive counter-measures; only effective source anti-production warfare can reduce the enemy’s attack firepower.
The concept of “fighting how to fight” – “defense, deep defense”
What kind of war the National Army wants to fight, the National Defense Construction Army wants to build a plan based on “playing, loading, editing, and training,” and secondly, it is a comprehensive national strength to build a deterrent. The strategic concept of “defending and defending” is based on the policy guidance of “training for war, unity of war and training”, and planning the “national military annual major training flow path” for the concept of “how to fight”. The military exercises are divided into four categories: “combat, mobilization, nuclearization, and training.” In order to strengthen the ability of “outside islands and ship joints to attack targets at sea” and “three-armed joint air defense training”, the number of training should be increased to enhance The combined military training capability of the three armed forces.
As a national security indicator, comprehensive national strength has two meanings. Internally, national defense construction needs to be balanced with economic development. Externally, understanding what the enemy cares most is helpful for the formation of the “deep deterrence” program. The “deep deterrence method” can be interpreted as: “The emphasis is on an unbearable revenge for the enemy, rather than the ability to emphasize actual combat and win the war.” For example, in the “Exceeding the Limits”, the war mark is no longer limited to military It is a new trend of war type and military thinking.
According to Wu Mingjie, the wind media, from the perspective of the distance, the future defense circle of the National Army usually includes the island, the east line of the Taiwan Strait, and the ADIZ air defense identification zone. However, during the war, it will be extrapolated to the coastal air and sea bases on the mainland, and even more. Inland missile bases and combat command centers, and the eastern defense range will be extrapolated to areas outside ADIZ. In addition, after the establishment of the fourth service in the future, there is no distance limit for network information warfare. These are the future threats of the national army. The scope of defense. (Wu Mingjie, March 13, 2017, Wind Media). However, this study proposes that “depth suppression” is the distance between non-linear lines. The so-called deep combat, in short, includes the depth of the three-dimensional space warfare. As the PLA calls “land, sea, air, sky, electricity”, the “National Army Defense Operations Guide” edited by the author has divided the defense operations into five. Space, namely space, air, ground, water, underwater combat guidance. At present, what we lack most is the search for space and underwater power. It must rely on international cooperation and exchange of interests.
View photo
20170118-The second day of the National Army’s Spring Festival to strengthen the war preparations tour, came to the naval left camp base. The picture shows the Navy’s classmate seal submarine on display. (photo by Su Zhongying)
The future defense circle of the National Army usually includes the island and the east line of the Taiwan Strait and the ADIZ air defense identification zone. However, during the war, it will be extrapolated to the coastal air and sea bases on the mainland, and even more inland missile bases and operational command centers. The eastern defense range will also be extrapolated to areas outside the ADIZ. The picture shows the Navy’s classmate seal submarine. (Photo, photo by Su Zhongzhen)
Integration of forces in a network-centric overall operation
The idea of joint military operations of the three armed forces of the Chinese army has gradually entered the hearts of the people and adapted to the development of high-tech warfare with the main form of joint operations of the three armed forces. In the construction of military power, it will avoid Taiwan’s C4ISR capability to enter the arms race with the CCP and establish a parasitic and symbiotic relationship, and participate extensively in multinational military R&D and cooperation. Pursuing a reasonable defense space in national defense security, the force is integrated into a network-centric overall operation. In short: “To turn your own army into a company, and to pull the enemy from the mountains and waters into my vision.” Therefore, in light of the above viewpoints, the author suggests that the current military strategy should be better. The better strategic concept is to “defend and defend, deepen the deterrence”, and adhere to the policy of “preventing war”, “maintaining the status quo”, and “defending homeland security”. The combination of strategic and strategic deployment, combined with multi-layer defense guidance, combined with the national defense mobilization force, strive for “strategic lasting” time, create opportunities, destroy enemy and ensure national security.
Conclusion: National security is the common responsibility of all people
In fact, the author observes the 12 national defense blueprints published before the Democratic Progressive Party elections, and the new government-driven national defense policies, such as research and development of military strategy, national shipbuilding, national machine building, improved military recruitment, weekend warriors, and military uniforms. Can not be too demanding, the new government’s national defense policy concept, in the blue book can find clues. In the face of the CCP’s asymmetric military development, and gradually locking into the “safety dilemma” dilemma, it is necessary to maintain a calm observation and thinking plan, the most favorable security strategy for survival and development, national defense policy, and military preparation. I can’t have the mind of being big and small, then I should play the depth of being small and wise.
View photo
The state-made T75-20 cannon was drilled on the “Ilan Ship” of the Sea Guard. (photo by Yan Linyu)
The defense policy promoted by the new government, such as the national shipbuilding and other national propaganda, the new government’s national defense policy concept can be found in the blue book. The picture shows the state-built T75-20 cannon exercise on the “Ilan Ship” of the Sea Guard. (Photo, photo by Yan Linyu)
Defence is too negative, and lack of nuclear weapons is effective in deterring and incapable. There is no cheap national defense in the world, and national security is the common responsibility of the whole people. There is no distinction between political parties and blue and green. The key issue in the preparation of the army is the cultivation of talents. As for the new government’s annuity reform plan, there are no reasons for the military to be included in the reform, and the difficulties in the recruitment system are even more difficult. How can Taiwan implement the reforms under the quality of grassroots personnel and the lack of cadres? Deterring the fighting power.
防衛固守是戰爭行為,有效嚇阻是戰爭行為的預防。就台澎防衛作戰言,「嚇阻」敵國軍事行動「戰爭」,「預防」即在防止敵國使用武力的行為,若嚇阻失敗,戰爭便爆發。嚇阻戰略中軍事武力的運用,就是阻止敵人使用軍事武力。因此嚇阻理論,就是技巧性的不使用軍事武力(skillful nonuse of military forces),因此嚇阻必須超越了軍事上的技巧。就被「嚇阻」,嚇阻的目的並非是在敵人入侵時消滅敵人,而是使敵人確實認知到假如他真的採取行動,則一定會被消滅掉。
US Army issued the “cyberspace and electronic warfare operations” doctrine// 中國軍事評論美國陸軍頒布《網絡空間與電子戰行動》條令
The field command FM3-12 provides instructions and guidance for the Army to implement cyberspace and electronic warfare operations using cyberspace electromagnetic activity in joint ground operations. The Fields Act FM3-12 defines the Army’s cyberspace operations, electronic warfare, roles, relationships, responsibilities, and capabilities, and provides an understanding of this to support Army and joint operations. It details how Army forces protect Army networks and data, and explains when commanders must integrate custom cyberspace and electronic warfare capabilities within military operations.
”
On the basis of the 2006 National Cyberspace Operations Military Strategy (NMS-CO), the US Joint Chiefs of Staff announced the joint publication JP 3-12 in February 2013 as an internal document. October 21, 2014 The published document for public release is Joint Publication JP 3-12(R). The order states that “the global reliance on cyberspace is increasing, and careful control of offensive cyberspace operations is required, requiring national-level approval.” This requires commanders to recognize changes in national network policies that are mandated by operations. Potential impact. On April 11, 2017, the US Army issued the field command FM3-12 “Network Space and Electronic Warfare Action” on this basis. The field war said that in the past decade of conflict, the US Army has deployed the most powerful communication system in its history. In Afghanistan and Iraq, enemies lacking technological capabilities challenge the US military’s advantages in cyberspace, and the US military has taken the lead in cyberspace and electromagnetic spectrum (EMS) operations. However, regional rivals have demonstrated impressive capabilities in a mixed-operational environment that threatens the US Army’s dominance in cyberspace and the electromagnetic spectrum. Therefore, the Order states that the integration of cyberspace electromagnetic activity at all stages of combat operations is the key to acquiring and maintaining freedom of maneuver in the cyberspace and electromagnetic spectrum, while preventing the enemy from doing so. Cyberspace electromagnetic activity can synchronize capabilities across a variety of domains and operational functions, and maximize synergies within and through the cyberspace and electromagnetic spectrum. Intelligence, signal, information operations (IO), cyberspace, space and firepower operations are critical to planning, synchronizing, and implementing cyberspace and electronic warfare operations.
The Fields Order FM3-12 supports the Joint Cyberspace and Electronic Warfare Act and the Army Doctrine Reference Publication ADRP3-0, Combat, and provides a background to define the Army’s doctrine reference publication ADRP5-0 “Operational Process” and Cyberspace and The relationship between electronic warfare operations. In order to understand the basic principles of integration and synchronization of cyberspace and electronic warfare operations, you must first read the Army’s doctrine publication ADP2-0, the Army’s doctrine reference publication ADRP2-0, the Army doctrine publication ADP3-0, and the Army doctrine reference publication ADRP3. -0, Army doctrine publication ADP5-0, Army doctrine reference publication ADRP5-0, Army doctrine publication ADP6-0, Army doctrine reference publication ADRP6-0, Army technical publication ATP2-01.3, field bar FM3-13 And FM6-0. By planning, integrating, and synchronizing cyberspace and electronic warfare operations, cyberspace electromagnetic activities can integrate functions and capabilities across operational functions, defend networks, and provide critical capabilities to commanders at all levels during joint ground operations. Cyberspace and electronic warfare operations affect all combat functions and are also affected by them.
Network space visualization operating environment of electromagnetic spectrum
The field battles present detailed tactics and procedures for Army cyberspace and electronic warfare operations. The field command replaced the field title FM3-38 dated February 2014. The Fields Order FM3-12 is an Army cyberspace and electronic warfare campaign advocacy publication. The field battles contain the basic principles and guiding principles of cyberspace operations, electronic warfare, and cyberspace electromagnetic activities in a single publication. It provides a comprehensive account of how they support and achieve action, and how to support the missions and functions of the various levels of force. The field battles laid the foundation for subordinate Army technical publications.
Cyberspace and e-war operations incorporate established joint and Army processes into operations such as intelligence processes, targeting processes, and military decision-making processes (MDMPs). The field battles explain the basic ideas of the Army’s cyberspace and electronic warfare operations. Content includes staff responsibilities, contributions to military decision-making processes, cyberspace and target work in the electromagnetic spectrum, and reliance on intelligence and operational environment readiness (OPE) in cyberspace.
The field battles describe the relationship between cyberspace operations, missions, operations, electronic warfare, electromagnetic spectrum, and each other’s actions. This elaboration also includes cyberspace electromagnetic activity, providing compliance for military forces and the following combat forces planning, integration, and simultaneous electromagnetic activities.
Schematic diagram of electromagnetic spectrum
The first chapter provides an understanding of cyberspace, cyberspace operations, missions, actions, and effects. It describes cyberspace and situational understanding, situational awareness, threats, risks, vulnerabilities, and their relationship to information and operational environments. The level and characteristics of cyberspace confirm the legal authorization applicable to cyberspace and cyberspace operations, and discuss the basic information and spectrum management functions of electronic warfare related to cyberspace and electronic warfare operations.
Chapter 2 provides information on the use of cyberspace operations and tasks, rather than day-to-day operations, pointing out that information operations, intelligence, space operations, and targeted work can affect cyberspace, electromagnetic spectrum, cyberspace operations, and electronic warfare operations. Commanders and staff officers have integrated and synchronized all of these aspects of cyberspace and electronic warfare operations.
The third chapter expounds the Army’s cyberspace electromagnetic activity and mission-style command, the role of the commander, the cyberspace with combat functions and the electronic warfare action, and discusses how to incorporate the planning elements of cyberspace and electronic warfare operations into the operational process. This includes planning, preparation, implementation, evaluation, and targeting. The discussion of the operational environment is combined with the military decision-making process, followed by an overview of the preparation requirements, implementation tactics, and how to assess cyberspace and electronic warfare operations.
Appendix A discusses cyberspace operations and various joint operations partners.
Appendix B highlights the location of cyberspace operational information in the Combat Command and Appendix 12 to Annex C. This appendix includes an example of Appendix 12 to Annex C, which describes the types of information contained in this appendix and sections.
Appendix C contains the procedures for handling cyberspace operations requests from military, military, and military units, as well as fields and information for the Cyber Operations Application Form (CERF). Blank copies of the cyber operations application form and field explanations are all part of the process.
Appendix D includes fields and information for the Electronic Attack Request Form (EARF). A blank copy of the electronic attack application form and a five-line brief with field interpretation are part of the program.
Cyberspace and Electronic Warfare Actions Directory
Preface
preface
Chapter 1 Network Space and the Basic Principles of Electronic Warfare Action
Section 1 Overview of Cyberspace and Electromagnetic Spectrum
First, the network space domain
Second, combat operations and cyberspace domain
Third, cyberspace tasks and actions
Section 2 Understanding Network Space and Environment
1. Network space and electromagnetic spectrum
Second, cyberspace and information environment
Third, the network space level
Fourth, the characteristics of cyberspace
5. Cyberspace as part of the operational environment
Sixth, risk in cyberspace
Seven, authorization
Section III Electronic Warfare Action
First, the electromagnetic spectrum action
Second, electronic warfare
Third, the application of matters needing attention
Fourth, spectrum management
Chapter 2 Relationship with Cyberspace and Electromagnetic Spectrum
I. Interdependence
Second, information operations
Third, intelligence
Fourth, space operations
V. Target determination
Chapter III Electromagnetic Activities in Cyberspace in Operation
First, the basic principle
Second, matters needing attention
Third, the role of the commander
Fourth, empower resources
V. Planning work and cyberspace electromagnetic activities
Sixth, network effect application form and target determination activities
Appendix A Integration with Unified Action Partners
Appendix B Cyberspace in Combat Commands
Appendix C Network Effect Application Form
Appendix D Electronic Attack Application Form
Thanks for compiling/reviewing: Shen Song
Article source: Zhiyuan Strategy and Defense Research Institute