Category Archives: Chinese Military Cognitive Domain Operations

Functional Orientation of the Modern Combat System with Chinese Characteristics

中國特色現代作戰體系的功能定位

2018年08月14日 xx:xx 来源:解放军报

現代英語:

Functional Orientation of the Modern Combat System with Chinese Characteristics

  Key Points

  ● The coexistence, iterative development, dynamic evolution, and integrated development of multiple generations of mechanization, informatization, and intelligentization constitute the historical context of national defense and military construction in the new era, and also represent the historical position of building a modern combat system with Chinese characteristics.

  ● Traditional and non-traditional security threats are intertwined, and various strategic directions and security fields face diverse real and potential threats of local wars. This requires our military to abandon old models such as linear warfare, traditional ground warfare, and homeland defense warfare, and accelerate the transformation to joint operations and all-domain operations.

  The report to the 19th National Congress of the Communist Party of China proposed that, standing at a new historical starting point and facing the demands of building a strong country and a strong military, “we should build a modern combat system with Chinese characteristics.” This is a strategic choice to adapt to the rapidly evolving nature of warfare, to thoroughly implement Xi Jinping’s thought on strengthening the military, to comprehensively advance the modernization of national defense and the armed forces, and to aim at building a world-class military. Among these choices, the grasp of the functional orientation of the modern combat system with Chinese characteristics greatly influences the goals, direction, and quality of its construction.

  Seize the opportunities of the times and take the integrated development of mechanization, informatization and intelligentization as the historical orientation.

  The combat system is the material foundation of war and is closely related to the form of warfare. In today’s world, a new round of technological and industrial revolution is brewing and emerging. Original and disruptive breakthroughs in some major scientific problems are opening up new frontiers and directions, prompting human society to rapidly transform towards intelligence, and accelerating the evolution of warfare towards intelligence. Currently, our military is in a stage of integrated mechanization and informatization development. Mechanization is not yet complete, informatization is being deeply advanced, and we are facing both opportunities and challenges brought about by the intelligent military revolution. The new era provides us with a rare historical opportunity to achieve innovative breakthroughs and rapid development, and also provides a rare historical opportunity for our military’s combat system construction to achieve generational leaps and leapfrog development.

  A new era and a new starting point require establishing a new coordinate system. The coexistence, iterative development, dynamic evolution, and integrated development of multiple generations of mechanization, informatization, and intelligentization constitute the historical context of national defense and military construction in the new era, and also the historical position of building a modern combat system with Chinese characteristics. We should accurately grasp the historical process of the evolution of warfare, the historical stage of the combined development of mechanization and informatization, and the historical opportunities brought about by intelligent warfare. We must prioritize the development of military intelligence, using intelligence to lead and drive mechanization and informatization, coordinating mechanization and informatization within the overall framework of intelligent construction, and completing the tasks of mechanization and informatization development within the process of intelligentization. We must focus on top-level design for military intelligence development, researching and formulating a strategic outline and roadmap for military intelligence development, clarifying key areas, core technologies, key projects, and steps for intelligent development, and accelerating the construction of a military intelligent combat system. We must achieve significant progress as soon as possible in key technologies such as deep learning, cross-domain integration, human-machine collaboration, autonomous control, and neural networks, improving the ability to materialize advanced scientific and technological forces into advanced weaponry and equipment, and providing material conditions for building a modern combat system.

  Emphasizing system-on-system confrontation, with the development of joint operations and all-domain operations capabilities as the core indicators.

  Information-based local wars are characterized by integrated joint operations as their basic form, with network support, information dominance, and system-on-system confrontation as their main features. The combat capability generation model is shifting towards a network-based information system. Currently and for some time to come, my country’s geostrategic environment remains complex, with traditional and non-traditional security threats intertwined. Various strategic directions and security domains face diverse real and potential threats of local wars. Simultaneously, with the expansion of national interests, the security of overseas interests is becoming increasingly prominent, requiring the PLA to abandon old models such as linear warfare, traditional ground warfare, and territorial defense warfare, and accelerate its transformation towards joint operations and all-domain operations.

  The report of the 19th CPC National Congress pointed out that “enhancing joint operational capabilities and all-domain operational capabilities based on network information systems” is a new summary of the PLA’s operational capabilities in the new era and a core indicator for building a modern operational system with Chinese characteristics. We should actively explore the characteristics, laws, and winning mechanisms of modern warfare, and proactively design future operational models, force application methods, and command and coordination procedures to provide advanced theoretical support for building a modern operational system with Chinese characteristics. Following the new pattern of the Central Military Commission exercising overall command, theater commands focusing on combat operations, and services focusing on force development, we should adapt to the new joint operational command system, the reform of the military’s size, structure, and force composition, highlighting the network information system as the core support, and building an operational system capable of generating powerful joint operational capabilities to fully leverage the overall power of the various services and branches. With a view to properly addressing various strategic directions and traditional and non-traditional security threats, ensuring the PLA can reliably carry out various operational missions, we should build an operational system capable of generating powerful all-domain operational capabilities, achieving overall linkage across multiple battlefields and domains, including land, sea, air, space, and cyberspace.

  Focusing on real threats, the strategic objective is to gain an asymmetric advantage over the enemy.

  The world today is at a new turning point in the international situation, with strategic competition among major powers taking on new forms and the struggle for dominance in the international and regional order becoming unprecedentedly fierce. The specter of hegemonism and power politics lingers, and some countries are intensifying their efforts to guard against and contain China. my country’s geostrategic environment is becoming increasingly complex, with multiple destabilizing factors, facing multi-directional security pressures, and an increasingly complex maritime security environment. All of these factors contribute to increasing the dangers and challenges to national security.

  Effectively responding to real military security threats is a crucial strategic task in our military preparedness and a strategic direction for building a modern combat system with Chinese characteristics. We should focus on keeping up with technological advancements, vigorously developing advanced equipment, and striving to avoid creating new technological gaps with potential adversaries. This will provide solid material support for the construction of our combat system. Simultaneously, we must emphasize leveraging the PLA’s long-standing principles of flexibility, mobility, and independent operation, capitalizing on our strengths and avoiding weaknesses, targeting the enemy’s vulnerabilities and weaknesses. We should not simply compete with the best in high-tech fields, but rather focus on deterring the enemy and preventing war. We must accelerate the development of asymmetric counterbalancing mechanisms, strengthen the construction of conventional strategic means, new concepts and mechanisms, and strategic deterrence in new domains, supporting the formation of a new combat system with new deterrent and combat capabilities. We must not fear direct confrontation, preparing for the most complex and difficult situations, and building a combat system capable of providing multiple means, forces, and methods to address diverse war threats. This will ensure that, in the event of conflict, the comprehensive effectiveness of the combat system is fully utilized, guaranteeing victory in battle and deterring further war through war.

  Promoting military-civilian integration and using the national strategic system to support winning the people’s war in the new era is a fundamental requirement.

  The deepest roots of the power of war lie within the people. The concept of people’s war is the magic weapon for our army to defeat the enemy. Modern warfare is a comprehensive confrontation of the combined strength of opposing sides, involving political, economic, military, technological, and cultural fronts. Various armed forces are closely integrated, and various forms of struggle are coordinated with each other. The role and status of civilian technology and civilian forces in war are increasingly important, which further requires integrating the national defense system into the national economic and social system and striving to win the people’s war in the new era.

  Leveraging the power of military-civilian integration to support the fight against people’s war in the new era with the national strategic system is a fundamental requirement for building a modern combat system with Chinese characteristics. We must deeply implement the national strategy of military-civilian integration, deeply integrate the construction of our military’s combat system into the national strategic system, utilize national resources and overall strength to achieve a continuous leap in combat effectiveness, and maximize the overall power of people’s war. We must focus on strengthening military-civilian integration in emerging strategic fields, actively seize the commanding heights of future military competition, and continuously create new advantages in people’s war. We must incorporate the military innovation system into the national innovation system, strengthen demand alignment and collaborative innovation, enhance independent innovation, original innovation, and integrated innovation capabilities, and proactively discover, cultivate, and utilize strategic, disruptive, and cutting-edge technologies to provide advanced technological support for building a modern combat system. We must also focus on the in-depth exploitation of civilian resources, strengthen the integration of various resources that can serve national defense and military construction, prevent duplication and waste, self-contained systems, and closed operations, and maximize the incubation effect of civilian resources on the construction of a modern combat system.

  (Author’s affiliation: Institute of War Studies, Academy of Military Sciences)

Zhang Qianyi

現代國語:

中國特色現代作戰體系的功能取向

要點提示

●機械化信息化智能化多代並存、迭代孕育、動態演進、融合發展,是新時代國防和軍隊建設的時代背景,也是中國特色現代作戰體系建設的歷史方位。

●傳統和非傳統安全威脅相互交織,各戰略方向、各安全領域面臨多樣化現實和潛在的局部戰爭威脅,要求我軍必須摒棄平麵線式戰、傳統地面戰、國土防禦戰等舊模式,加快向聯合作戰、全域作戰轉變。

黨的十九大報告提出,站在新的歷史起點上,面對強國強軍的時代要求,“構建中國特色現代作戰體系”。這是適應戰爭形態加速演變的時代要求,深入貫徹習近平強軍思想、全面推進國防和軍隊現代化、瞄準建設世界一流軍隊的戰略抉擇。其中,對中國特色現代作戰體系功能取向的把握,極大影響著體系構建的目標、方向和質量。

抓住時代機遇,以機械化信息化智能化融合發展為歷史方位

作戰體係是戰爭的物質基礎,與戰爭形態緊密關聯。當今世界,新一輪科技革命和產業革命正在孕育興起,一些重大科學問題的原創性顛覆性突破正在開闢新前沿新方向,促使人類社會向智能化快速轉型,戰爭形態向智能化加速演變。當前,我軍正處於機械化信息化複合發展階段,機械化尚未完成、信息化深入推進,又面臨智能化軍事革命帶來的機遇和挑戰。新時代為我們實現創新超越、快速發展提供了難得歷史機遇,也為我軍作戰體系建設實現跨代超越、彎道超車提供了難得歷史機遇。

新時代新起點,需要確立新的坐標系。機械化信息化智能化多代並存、迭代孕育、動態演進、融合發展,是新時代國防和軍隊建設的時代背景,也是中國特色現代作戰體系建設的歷史方位。應準確把握戰爭形態演變的歷史進程,準確把握機械化信息化複合發展的歷史階段,準確把握智能化戰爭帶來的歷史機遇,堅持把軍事智能化建設擺在優先發展位置,以智能化引領帶動機械化信息化,在智能化建設全局中統籌機械化信息化,在智能化進程中完成機械化信息化發展的任務;注重搞好軍事智能化發展的頂層設計,研究制定軍事智能化發展戰略綱要和路線圖,明確智能化發展的關鍵領域、核心技術、重點項目和步驟措施等,加快軍事智能化作戰體系建設進程;盡快在深度學習、跨界融合、人機協同、自主操控、神經網絡等關鍵技術上取得重大進展,提高先進科技力物化為先進武器裝備的能力,為構建現代作戰體系提供物質條件。

突出體係對抗,以打造聯合作戰和全域作戰能力為核心指標

信息化局部戰爭,一體化聯合作戰成為基本形式,網絡支撐、信息主導、體係對抗成為主要特徵,戰鬥力生成模式向基於網絡信息體系轉變。當前及今後一個時期,我國地緣戰略環境仍然複雜,傳統和非傳統安全威脅相互交織,各戰略方向、各安全領域面臨多樣化現實和潛在的局部戰爭威脅,同時隨著國家利益的拓展,海外利益安全問題日益凸顯,要求我軍必須摒棄平麵線式戰、傳統地面戰、國土防禦戰等舊模式,加快向聯合作戰、全域作戰轉變。

黨的十九大報告指出,“提高基於網絡信息體系的聯合作戰能力、全域作戰能力”,這是對新時代我軍作戰能力的新概括,也是中國特色現代作戰體系建設的核心指標。應積極探索現代戰爭特點規律和製勝機理,前瞻設計未來作戰行動模式、力量運用方式、指揮協同程式等,為構建中國特色現代作戰體系提供先進理論支撐;按照軍委管總、戰區主戰、軍種主建的新格局,適應聯合作戰指揮新體制、軍隊規模結構和力量編成改革,突出網絡信息體系這個核心支撐,打造能夠生成強大聯合作戰能力的作戰體系,充分發揮諸軍兵種作戰力量整體威力;著眼妥善應對各戰略方向、傳統和非傳統安全威脅,確保我軍可靠遂行各種作戰任務,打造能夠生成強大全域作戰能力的作戰體系,實現陸海空天電網多維戰場、多域戰場的整體聯動。

著眼現實威脅,以形成對敵非對稱作戰優勢為戰略指向

當今世界,國際形勢正處在新的轉折點上,大國戰略博弈呈現新態勢,圍繞國際和地區秩序主導權的鬥爭空前激烈。霸權主義和強權政治陰魂不散,一些國家加緊對華防範和遏制。我國地緣戰略環境日趨複雜,存在多重不穩定因素,面對多方向安全壓力,我海上安全環境日趨複雜等,這些都使得國家安全面臨的危險和挑戰增多。

有效應對現實軍事安全威脅,是我軍事鬥爭準備的重要戰略任務,也是中國特色現代作戰體系建設的戰略指向。應注重技術跟進,大力研發先進裝備,力避與潛在對手拉開新的技術代差,為作戰體系建設提供堅實物質支撐,同時注重發揮我軍歷來堅持的靈活機動、自主作戰原則,揚長避短,擊敵弱項、軟肋,不單純在高科技領域“與龍王比寶”,著眼懾敵止戰,加快發展非對稱制衡手段,加強常規戰略手段、新概念新機理和新型領域戰略威懾手段建設,支撐形成具有新質威懾與實戰能力的新型作戰體系;不懼直面過招,立足最複雜最困難情況,構建能夠提供多種手段、多種力量、多種方式應對多樣化戰爭威脅的作戰體系,確保一旦有事,充分發揮作戰體係綜合效能,確保戰而勝之、以戰止戰。

推進軍民融合,以國家戰略體系支撐打贏新時代人民戰爭為根本要求

戰爭偉力之最深厚根源存在於民眾之中。人民戰爭思想是我軍克敵制勝的法寶。現代戰爭是敵對雙方綜合實力的整體對抗,涉及政治、經濟、軍事、科技、文化等各條戰線,各種武裝力量緊密結合、各種鬥爭形式相互配合,民用技術和民間力量在戰爭中的地位作用日益提升,更加要求把國防體系融入國家經濟社會體系,努力打贏新時代人民戰爭。

發揮軍民融合時代偉力,以國家戰略體系支撐打贏新時代人民戰爭,是中國特色現代作戰體系建設的根本要求。要深入實施軍民融合發展國家戰略,推動我軍作戰體系建設深度融入國家戰略體系,利用國家資源和整體力量實現戰鬥力的持續躍升,最大限度發揮人民戰爭的整體威力;注重加強在新興戰略領域的軍民融合發展,積極搶占未來軍事競爭的製高點,不斷創造人民戰爭的新優勢;把軍事創新體系納入國家創新體系之中,加強需求對接、協同創新,增強自主創新、原始創新、集成創新能力,主動發現、培育和運用戰略性顛覆性前沿性技術,為構建現代作戰體系提供先進技術支撐;抓好民用資源深度挖掘,強化可服務於國防和軍隊建設的各種資源整合力度,防止重複浪費、自成體系、封閉運行,最大限度發揮民用資源對現代作戰體系構建的孵化效應。

(作者單位:軍事科學院戰爭研究院)

張謙一

中國原創軍事資源:https://www.chinanews.com.cn/mil/2018/08-14/8599617888.shtml

Chinese Military Intelligence Drives Accelerated Development of Cyberspace Warfare

中國軍事情報推動網絡空間戰爭加速發展

現代英語:

The report to the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint operational capabilities and all-domain operational capabilities based on network information systems.” Today’s *PLA Daily* published an article stating that military intelligence is a new trend and direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, while using intelligence to drive mechanization and informatization to a higher level and a higher standard. Cyberspace, as a new operational domain, is a new field with high technological content and the greatest innovative vitality. Under the impetus of military intelligence, it is ushering in a period of rapid development opportunities.Illustration: Lei Yu

Military intelligence is driving the accelerated development of cyberspace operations.

■ Respected soldiers Zhou Dewang Huang Anwei

Three key technologies support the intelligentization of cyberspace weapons.

Intelligence is a kind of wisdom and capability; it is the perception, cognition, and application of laws by all systems with life cycles. Intelligentization is the solidification of this wisdom and capability into a state. Cyberspace weapons are weapons used to carry out combat missions in cyberspace. Their form is primarily software and code, essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:

First, there’s intelligent vulnerability discovery. Vulnerabilities are the foundation of cyber weapon design. The ransomware that spread globally this May exploited a vulnerability in the Microsoft operating system, causing a huge shock in the cybersecurity community. Vulnerabilities are expensive, with a single zero-day vulnerability costing tens to hundreds of thousands of dollars. Previously, vulnerability discovery relied mainly on experienced hackers using software tools to inspect and analyze code. However, at the International Cybersecurity Technology Competition finals held during this year’s China Internet Security Conference, participants demonstrated how intelligent robots could discover vulnerabilities on-site, then use these vulnerabilities to write network code, creating cyber weapons to breach target systems and capture the flag. This change signifies that vulnerability discovery has entered the era of intelligent technology.

Second, intelligent signal analysis and cryptography. Signals are the carriers of network data transmission, and cryptography is the last line of defense for network data security. Signal analysis and cryptography are core technologies for cyberspace warfare. Breaking through signals and cryptography is the fundamental path to entering cyberspace and a primary target of cyber weapons attacks. Intelligent signal analysis solves problems such as signal protocol analysis, modulation identification, and individual identification through technologies such as big data, cloud computing, and deep learning. Cryptography is the “crown jewel” of computational science. Intelligent cryptography, through the accumulation of cryptographic data samples, continuously learns and searches for patterns to find the key to decryption, thereby opening the last door of the network data “safe” and solving the critical links of network intrusion and access.

Thirdly, there is the design of intelligent weapon platforms. In 2009, the U.S. military proposed the “Cyber ​​Aircraft” project, providing platforms similar to armored vehicles, ships, and aircraft for cyberspace operations. These platforms can automatically conduct reconnaissance, load cyber weapons, autonomously coordinate, and autonomously attack in cyberspace. When threatened, they can self-destruct and erase traces, exhibiting a certain degree of intelligence. In the future, the weapons loaded onto “Cyber ​​Aircraft” will not be pre-written code by software engineers, but rather intelligent cyber weapons will be designed in real-time based on discovered vulnerabilities, enabling “order-based” development and significantly improving the targeting of cyberspace operations.

The trend of intelligentization in network-controlled weapons is becoming increasingly prominent.

Weapons controlled by cyberspace, or cyber-controlled weapons, are weapons that connect to a network, receive commands from cyberspace, execute cross-domain missions, and achieve combat effects in physical space. Most future combat weapon platforms will be networked, making military information networks essentially the Internet of Things (IoT). These networks connect to satellites, radars, drones, and other network entities, enabling control from perception and detection to tracking, positioning, and strike. The intelligence of cyber-controlled weapons is rapidly developing across land, sea, air, space, and cyber domains.

In 2015, Syria used a Russian robotic force to defeat militants. The operation employed six tracked robots, four wheeled robots, an automated artillery corps, several drones, and a command system. Commanders used the command system to direct drones to locate militants, and the robots then charged, supported by artillery and drone fire, inflicting heavy casualties. This small-scale battle marked the beginning of robotic “team” operations.

Network-controlled intelligent weapons for naval and air battlefields are under extensive research and development and verification. In 2014, the U.S. Navy used 13 unmanned surface vessels to demonstrate and verify the interception of enemy ships by unmanned surface vessel swarms, mainly by exchanging sensor data, and achieved good results. When tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became its prominent feature of intelligence.

The development of swarms of small, micro-sized drones for aerial combat is also rapid. In recent years, the U.S. Department of Defense has conducted multiple tests of the Partridge micro-drone, capable of deploying dozens or even hundreds at a time. By enhancing its coordination capabilities during reconnaissance missions, progress has been made in drone formation, command, control, and intelligent management.

Space-based cyber-control weapons are becoming increasingly “intelligent.” The space-based cyber-control domain primarily comprises two categories of weapons: reconnaissance and strike weapons. Satellites of various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various microsatellite constellations, satellites are exhibiting new characteristics: small size, rapid launch, large numbers, and greater intelligence. Microsatellite constellations offer greater flexibility and reliability in performing reconnaissance and communication missions, and currently, the world’s leading satellite powers are actively developing microsatellite constellation plans with broader coverage.

Various hypersonic strike weapons are cruising in the air, like a sword of Damocles hanging over people’s heads. The U.S. Air Force Research Laboratory stated that the “hypersonic strike weapon” will begin flight testing around 2018, and other countries are also actively developing similar weapons. The most prominent features of these weapons are their high speed, long range, and high level of intelligence.

Intelligent command information systems are changing traditional combat command methods.

Cyber ​​weapons and weapons controlled by cyberspace constitute the “fist” of intelligent warfare, while the command information systems that direct the use of these weapons are the “brain” of intelligent warfare. Cyberspace operational command information systems must keep pace with the process of intelligentization. Currently, almost all global command information systems face the challenge of “intelligent lag.” Future warfare requires rapid and autonomous decision-making, which places higher demands on intelligent support systems.

In 2007, the U.S. Defense Advanced Research Projects Agency (DARPA) launched the “Deep Green Program,” a research and development program for command and control systems, aiming to enable computer-aided commanders to make rapid decisions and gain a decisive advantage. This is a campaign-level command information system, developed to be embedded into the U.S. Army’s brigade-level C4ISR wartime command information system, enabling intelligent command by commanders. Even today, the U.S. military has not relaxed its development of intelligent command information systems.

In cyberspace warfare, network targets are represented by a single IP address accessing the network. Their sheer number makes efficient manual operation difficult, necessitating the support of intelligent command and information systems. Currently, intelligent command and information systems need to achieve functions such as intelligent intelligence analysis, intelligent sensing, intelligent navigation and positioning, intelligent decision support, intelligent collaboration, intelligent assessment, and intelligent unmanned combat. In particular, they must enable swarm operational control of unmanned network control systems. All of these requirements urgently demand intelligent command and information systems, necessitating accelerated research and development and application of relevant key technologies.

In conclusion, intelligent cyber weapons and network control weapons, coordinated through intelligent information systems, will form enormous combat capabilities, essentially enabling them to carry out all actions in current combat scenarios. Future warfare, from command force organization to target selection, action methods, and tactical applications, will all unfold within an intelligent context. The “gamification” of warfare will become more pronounced, and operational command methods will undergo significant changes.

In future battlefields, combat will require not only courage but also intelligence.

■ Yang Jian, Zhao Lu

Currently, artificial intelligence is entering a new stage of development and is rapidly penetrating various fields. Influenced by this process, military competition among nations surrounding intelligent technologies has begun. Our army has always been a brave and tenacious people’s army, determined to fight and win. On the future battlefield, we should continue to carry forward our glorious traditions while more broadly mastering and utilizing the latest technological achievements to develop more intelligent weapons and equipment, thereby gaining a decisive advantage on the future battlefield.

Intelligentization is a trend in human societal development, and intelligent warfare is rapidly approaching. The development of military intelligence has a solid foundation thanks to successful innovations that transcend existing computational models, the gradual popularization of nanotechnology, and breakthroughs in research on the mechanisms of the human brain. Consequently, intelligent weaponry is increasingly prominent, surpassing and even replacing human capabilities in areas such as intelligence analysis and combat response. Furthermore, intelligent weaponry offers significant advantages in terms of manpower requirements, comprehensive support, and operating costs, and is increasingly becoming the dominant force in warfare.

The development and application of intelligent weaponry have proven to expand the scope of military operations and significantly enhance the combat effectiveness of troops. In the battlefields of Afghanistan and Iraq, drones have undertaken most of the reconnaissance, intelligence, and surveillance support missions, and have been responsible for approximately one-third of the air strike missions. In the past two years, Russia has also repeatedly used highly intelligent unmanned reconnaissance aircraft and combat robots in the Syrian theater. Intelligent weaponry is increasingly demonstrating its significant value, surpassing that of traditional weapons.

In future wars, the contest of intelligent combat systems will be the key to victory in high-level competition and ultimate showdowns. As the development of technology-supported military means becomes increasingly uneven, whoever first acquires the capability to conduct intelligent warfare will be better positioned to seize the initiative on the battlefield. Those with a technological advantage will minimize the costs of war, while the weaker will inevitably suffer enormous losses and pay a heavy price. We must not only accelerate innovation in core technologies and the development of weaponry, but also research and explore organizational structures, command methods, and operational models adapted to the development of intelligent military operations. Furthermore, we must cultivate a talent pool capable of promoting intelligent military development and forging intelligent combat capabilities, fully leveraging the overall effectiveness of our military’s combat system, and winning wars in a more “intelligent” manner against our adversaries.

現代國語:

党的十九大报告指出,要“加快军事智能化发展,提高基于网络信息体系的联合作战能力、全域作战能力”。今天的《解放军报》刊发文章指出,军事智能化是机械化、信息化之后军事领域发展的新趋势和新方向,我们要在现有机械化和信息化基础上发展智能化,同时用智能化牵引机械化和信息化向更高水平、更高层次发展。网络空间作为新型作战领域,是科技含量高、最具创新活力的新领域,在军事智能化的牵引下,正在迎来快速发展的机遇期。制图:雷 煜

军事智能化牵引网络空间作战加速发展

■敬兵 周德旺 皇安伟

三大技术支撑网络空间武器智能化

智能是一种智慧和能力,是一切有生命周期的系统对规律的感应、认知与运用,智能化就是把这种智慧和能力固化下来,成为一种状态。网络空间武器是网络空间遂行作战任务的武器,其形态以软件和代码为主,本质上是一段数据。网络空间武器的智能化主要体现在以下三个方面:

一是智能化漏洞挖掘。漏洞是网络武器设计的基础,今年5月在全球范围内传播的勒索病毒软件,就是利用了微软操作系统漏洞,给网络安全界带来了巨大震动。漏洞价格昂贵,一个零日漏洞价值几万到几十万美元不等。以往漏洞的发现,主要依靠有经验的黑客,利用软件工具对代码进行检查和分析。在今年中国互联网安全大会期间举办的国际网络安全技术对抗联赛总决赛中,参赛人员演示由智能机器人现场进行漏洞挖掘,然后通过漏洞编写网络代码,形成网络武器,攻破目标系统,夺取旗帜。这一变化,意味着漏洞挖掘进入了智能化时代。

二是智能化信号分析和密码破译。信号是网络数据传输的载体,密码是网络数据安全最后的屏障,信号分析和密码破译是网络空间作战的核心技术,突破信号和密码是进入网络空间的基本路径,是网络武器攻击的首要目标。智能化信号分析将信号的协议分析、调制识别、个体识别等问题,通过大数据、云计算、深度学习等技术进行解决。密码破译是计算科学“皇冠上的明珠”,智能化密码破译通过对密码数据样本的积累,不断学习、寻找规律,能找到破译的钥匙,从而打开网络数据“保险柜”的最后一道门,解决网络入侵和接入的关键环节。

三是智能化武器平台设计。美军在2009年提出“网络飞行器”项目,为网络空间作战提供像战车、舰艇、飞机这样的平台,可以实现在网络空间里自动侦察、加载网络武器、自主协同、自主攻击,受到威胁时自我销毁、清除痕迹,具备了一定的智能化特征。未来“网络飞行器”加载的武器,不是软件人员编好的代码,而是根据侦察结果直接对发现的漏洞,现场实时进行智能化网络武器设计,实现“订购式”开发,从而极大地提高网络空间作战的针对性。

网控武器的智能化趋势愈加凸显

受网络空间控制的武器简称网控武器,是通过网络连接,接受网络空间指令,执行跨域任务,在物理空间达成作战效果的武器。未来的各种作战武器平台,大多是联网的武器平台,这样军事信息网本质上就是物联网,上联卫星、雷达、无人机等网络实体,从感知到发现、跟踪、定位、打击都可通过网络空间控制,网控武器的智能化已在陆海空天电等战场蓬勃发展。

2015年,叙利亚利用俄罗斯机器人军团击溃武装分子,行动采用了包括6个履带式机器人、4个轮式机器人、1个自动化火炮群、数架无人机和1套指挥系统。指挥员通过指挥系统调度无人机侦察发现武装分子,机器人向武装分子发起冲锋,同时伴随火炮和无人机攻击力量支援,对武装分子进行了致命打击。这仅仅是一场小规模的战斗,却开启了机器人“组团”作战的先河。

海空战场网控智能武器正在大量研发验证。2014年,美国海军使用13艘无人水面艇,演示验证无人艇集群拦截敌方舰艇,主要通过交换传感器数据,取得了不错的效果。2016年再次试验时,新增了协同任务分配、战术配合等功能,“蜂群意识”成为其智能化的显著特点。

用于空中作战的小微型无人机蜂群也在快速发展。近年来,美国国防部多次试验“山鹑”微型无人机,可一次投放数十架乃至上百架,通过提升其执行侦察任务时的协同能力,在无人机编队、指挥、控制、智能化管理等方面都取得了进展。

空天网控武器越来越“聪明”。空天领域主要包含侦察和打击两类网控武器,各种功能的卫星主要执行侦察任务,是典型的侦察传感器。随着各种小微卫星群的出现,使卫星表现出新的特征:体积小、发射快、数量多、更加智能。小微卫星群在执行侦察和通信任务时,有了更大的灵活度和可靠性,目前世界卫星强国都在积极制定覆盖范围更广的小微卫星群计划。

各种高超音速打击武器在空天巡航,仿佛悬在人们头顶的利剑。美国空军研究室称“高速打击武器”将在2018年前后启动飞行试验,其它各国也正在积极研发类似武器。这类武器最大的特点是速度快、航程远、智能化程度高。

智能化指挥信息系统改变传统作战指挥方式

网络空间武器和受网络空间控制的武器,是智能化战争的“拳头”,而指挥这些武器运用的指挥信息系统是智能化战争的“大脑”,网络空间作战指挥信息系统要同步跟上智能化的进程。当前,几乎全球的指挥信息系统都面临着“智能滞后”的难题,未来战争需要快速决策、自主决策,这对智能辅助系统提出了更高要求。

2007年,美国国防部高级研究计划局启动关于指挥控制系统的研发计划——“深绿计划”,以期能实现计算机辅助指挥员快速决策赢得制胜先机。这是一个战役战术级的指挥信息系统,其研发目的是将该系统嵌入美国陆军旅级C4ISR战时指挥信息系统中去,实现指挥员的智能化指挥。直到今天,美军也没有放松对智能化指挥信息系统的开发。

在网络空间作战中,网络目标表现为一个接入网络的IP地址,数量众多导致人工难以高效操作,作战更需要智能化指挥信息系统的辅助支撑。当前,智能化指挥信息系统需要实现智能情报分析、智能感知、智能导航定位、智能辅助决策、智能协同、智能评估、智能化无人作战等功能,尤其是实现对无人网控系统的集群作战操控,这都对智能化指挥信息系统提出了迫切需求,需要加快相应关键技术的研发和运用。

综上所述,智能化的网络武器和网控武器,通过智能化的信息系统调度,将形成巨大的作战能力,基本能遂行现行作战样式中的所有行动。未来战争,从指挥力量编组、到目标选择、行动方式、战法运用等,都将在智能化的背景下展开,战争“游戏化”的特点将更显著,作战指挥方式也将发生重大变化。

未来战场 斗勇更需斗“智”

■杨建 赵璐

当前,人工智能发展进入崭新阶段,并开始向各个领域加速渗透。受这一进程的影响,各国围绕智能化的军事竞争已拉开帷幕。我军历来是一支英勇顽强、敢打必胜的人民军队,未来战场上应继续发扬光荣传统,同时要更加广泛地掌握和利用最新的科技成果,研制出更多智能化的武器装备,在未来战场上掌握制胜先机。

智能化是人类社会发展的趋势,智能化战争正在加速到来。正是由于超越原有体系结构计算模型的成功创新、纳米制造技术的逐步普及,以及对人脑机理研究的突破性进展,军事智能化发展才拥有了坚实的基础。因此,智能化武器装备的表现日益突出,并在情报分析、战斗反应等方面开始超越并替代人类。此外,在人力需求、综合保障、运行成本等方面,智能化武器装备也具有明显的优势,正在日益成为战争的主导力量。

事实证明,智能化武器装备的发展应用,拓展了军事行动的能力范围,大幅提升了部队的作战效能。在阿富汗和伊拉克战场上,无人机已承担了大部分侦察、情报、监视等作战保障任务,并担负了约三分之一的空中打击任务。近两年,俄罗斯在叙利亚战场上也多次使用具有较高智能化程度的无人侦察机、战斗机器人等装备。智能化武器装备正在愈来愈多地展现出超越传统武器的重要价值。

未来战争中,作战体系智能化的较量将是高手过招、巅峰对决的制胜关键。随着以科技为支撑的军事手段发展的不平衡性越来越大,谁先具备实施智能化作战的能力,谁就更能掌握战场的主动权,拥有技术代差优势的强者会尽可能将战争成本降到最低,而弱者必然遭受巨大损失,付出惨重代价。我们不仅要加紧核心技术创新、武器装备研制,还要研究探索适应军事智能化发展的组织结构、指挥方式和运用模式,更要培养一支能够担起推进军事智能化发展、锻造智能化作战能力的人才队伍,充分发挥我军作战体系的整体效能,在与对手的较量中,以更加“智慧”的方式赢得战争。

中國原創軍事資源:http://www.81.cn/jwzl/2017-11/24/content_7841898885.htm

Chinese Military Development Trends & Governance Strategies of Weaponizing Artificial Intelligence

中國軍事發展趨勢與人工智能武器化治理策略

現代英語:

The weaponization of artificial intelligence (AI) is an inevitable trend in the new round of military revolution. Recent local wars have further spurred relevant countries to advance their AI weaponization strategies in order to seize the high ground in future warfare. The potential risks of AI weaponization cannot be ignored. It may intensify the arms race and disrupt the strategic balance; empower operational processes and increase conflict risks; increase accountability and collateral damage; and lower the proliferation threshold, leading to misuse and abuse. To address this, it is necessary to strengthen international strategic communication to ensure consensus and cooperation among countries on the military applications of AI; promote dialogue and coordination in the development of laws and regulations to form a unified and standardized legal framework; strengthen ethical constraints on AI to ensure that technological development conforms to ethical standards; and actively participate in global security governance cooperation to jointly maintain peace and stability in the international community.

    [Keywords] Artificial intelligence, military applications, security risks, security governance [Chinese Library Classification Number] F113 [Document Code] A

    The weaponization of artificial intelligence (AI) refers to the application of AI-related technologies, platforms, and services to the military field, making them a crucial driving force for military operations and thereby enhancing their efficiency, precision, and autonomy. With the widespread application of AI technology in the military, major powers and military leaders have increased their strategic and resource investment, accelerating research and application. The frequent regional conflicts in recent years have further stimulated the battlefield application of AI, profoundly shaping the nature of warfare and the future direction of military transformation.

    It cannot be ignored that artificial intelligence, as a rapidly developing technology, inherently carries potential risks due to its immature technology, inaccurate scenario matching, and incomplete supporting conditions. Furthermore, human misuse, abuse, or even malicious use can easily bring various risks and challenges to the military and even international security fields. To earnestly implement the global security initiatives proposed by General Secretary Xi Jinping, we must directly confront the global trend of weaponizing artificial intelligence, deeply analyze the potential security risks arising from the weaponization of AI, and consider scientifically feasible governance approaches and measures.

    Current trend of weaponization of artificial intelligence

    In recent years, the application of artificial intelligence in the military field is fundamentally reshaping the future form of warfare, changing future combat systems, and influencing the future direction of military transformation. Major military powers have regarded artificial intelligence as a disruptive key technology that will change the rules of future warfare, and have invested heavily in the research and development and application of AI weapons.

    The weaponization of artificial intelligence is an inevitable trend in military transformation.

    With the rapid development of science and technology, the necessity and urgency of military transformation are becoming increasingly prominent. Artificial intelligence, by simulating human thought processes, extends human mental and physical capabilities, enabling rapid information processing, analysis, and decision-making. It can also develop increasingly complex unmanned weapon system platforms, thereby providing unprecedented intelligent support for military operations.

    First, it provides intelligent support for military intelligence reconnaissance and analysis. Traditional intelligence reconnaissance methods are constrained by multiple factors such as manpower and time, making it difficult to effectively cope with the demands of large-scale, high-speed, and highly complex intelligence processing. The introduction of artificial intelligence (AI) technology has brought innovation and breakthroughs to the field of intelligence reconnaissance. In military infrastructure, the application of AI technology can build intelligent monitoring systems, providing high-precision, real-time intelligence perception services. In the field of intelligence reconnaissance, AI technology has the ability to process multiple “information streams” in real time, thereby greatly improving analysis efficiency. ① By using technologies such as deep learning, it is also possible to “see through the phenomena to the essence,” uncovering the deep-seated connections and causal relationships within various fragmented intelligence information, rapidly transforming massive amounts of fragmented data into usable intelligence, thereby improving the quality and efficiency of intelligence analysis.

    Secondly, it provides data support for combat command and decision-making. Artificial intelligence provides strong support for combat command and military decision-making in terms of battlefield situational awareness. Its advantage lies in its ability to perform key tasks such as data mining, data fusion, and predictive analysis. In informationized and intelligent warfare, the battlefield environment changes rapidly, and the amount of intelligence information is enormous, requiring rapid and accurate decision-making responses. Therefore, advanced computer systems have become important tools to assist commanders in managing intelligence data, assessing the enemy situation, proposing operational plans, and formulating plans and orders. For example, the US military’s ISTAR (Intelligence, Surveillance, Target Identification and Tracking) system, developed by Raytheon Technologies Corporation, encompasses intelligence gathering, surveillance, target identification, and tracking functions. It can aggregate data from diverse information sources such as satellites, ships, aircraft, and ground stations, and perform in-depth analysis and processing. This not only significantly improves the speed at which commanders acquire information but also provides data support through intelligent analysis systems, making decision-making faster, more efficient, and more accurate.

    Third, it provides crucial support for unmanned combat systems. Unmanned combat systems are a new type of weapon system capable of independently completing military missions without direct human control. They primarily consist of intelligent unmanned combat platforms, intelligent munitions, and intelligent combat command and control systems, possessing significant autonomy and intelligence. As a technological equipment leading the transformation of future warfare, unmanned combat systems have become a crucial bargaining chip in inter-state military competition. This system achieves adaptability to different battlefield environments and operational spaces by utilizing key technologies such as autonomous navigation, target recognition, and path planning. With the help of advanced algorithms such as deep learning and reinforcement learning, unmanned combat systems can independently complete navigation tasks and achieve precise target strikes. The design philosophy of this system is “unmanned platform, manned system,” essentially an intelligent extension of manned combat systems. For example, the MQM-57 Falconer unmanned aerial vehicle developed by the U.S. Defense Advanced Research Projects Agency (DARPA) employs advanced artificial intelligence technology and possesses highly autonomous target recognition and tracking capabilities.

    Fourth, it provides technical support for military logistics and equipment support. In the context of information warfare, the pace of war has accelerated, mobility has increased, and combat consumption has significantly risen. The traditional “overstocking” support model is no longer adequate to meet the rapidly changing needs of the modern battlefield. Therefore, higher demands are placed on combat troops to provide timely, location-appropriate, demand-based, and precise rapid and precise logistical support. Artificial intelligence, as a technology with spillover and cross-integration characteristics, is merging with cutting-edge technologies such as the Internet of Things, big data, and cloud computing. This has enabled AI knowledge, technology, and industry clusters to fully penetrate the military logistics field, significantly enhancing logistical equipment support capabilities.

    Major countries are actively developing military applications of artificial intelligence.

    To enhance their global competitiveness in the field of artificial intelligence, major powers such as the United States, Russia, and Japan are accelerating their strategic deployments for the military applications of AI. First, they are updating and adjusting their top-level strategic plans in the field of AI to provide clear guidance for future development. Second, in response to the needs of future warfare, they are accelerating the deep integration of AI technology with the military field, promoting the intelligent, autonomous, and unmanned development of equipment systems. Furthermore, they are actively innovating operational concepts to drive innovation in combat forces, thereby enhancing combat effectiveness and competitive advantage.

    First, strategic planning is being developed. Driven by a strategic obsession with pursuing military, political, and economic hegemony through technological dominance, the United States is accelerating its military intelligence process. In November 2023, the U.S. Department of Defense released the “Data, Analytics, and Artificial Intelligence Adoption Strategy,” aiming to expand the advanced capabilities of the entire Department of Defense system to gain a lasting military decision-making advantage. The Russian military issued what is known as “Version 3.0,” the “Russian Armaments Development Program for 2024-2033,” designed to guide weapons development over the next decade. The program emphasizes continued advancement in nuclear and conventional weapons development, with a focus on research into artificial intelligence and robotics, hypersonic weapons, and other strike weapons based on new physical principles.

    Second, the development of advanced equipment systems. Since 2005, the U.S. military has released a “Roadmap for Unmanned Systems” every few years to envision and design unmanned system platforms in various fields, including air, ground, and surface/underwater, connecting the development chain of unmanned weapons and equipment from research and development to production, testing, training, combat, and support. Currently, more than 70 countries worldwide are capable of developing unmanned system platforms, and various types of drones, unmanned vehicles, unmanned boats (vessels), and unmanned underwater vehicles are emerging rapidly. On July 15, 2024, former Chairman of the Joint Chiefs of Staff Mark Milley stated in an interview with *Defense News* that by 2039, one-third of the U.S. military force will be composed of robots. The Russian military’s Platform-M combat robot, the “Lancet” suicide drone, and the S-70 “Hunter” heavy drone have already been deployed in combat.

    Third, innovate future operational concepts. Operational concepts are forward-looking studies of future warfare styles and methods, often guiding new force organization and leapfrog development of weaponry. In recent years, the US military has proposed operational concepts such as “distributed lethality,” “multi-domain warfare,” and “mosaic warfare,” attempting to guide the direction of military transformation. Taking “mosaic warfare” as an example, this concept treats various sensors, communication networks, command and control systems, and weapon platforms as “mosaic fragments.” These “fragment” units, empowered by artificial intelligence technology, can be dynamically linked, autonomously planned, and collaboratively combined through network information systems, forming an on-demand integrated, highly flexible, and mobile lethality network. In March 2022, the US Department of Defense released the “Joint All-Domain Command and Control (JADC2) Strategic Implementation Plan,” which aims to expand multi-domain operations to an all-domain operations concept, connecting sensors from various services to a unified “Internet of Things” and using artificial intelligence algorithms to help improve operational command decisions. ③

    War and conflict have spurred the weaponization of artificial intelligence.

    In recent years, local conflicts such as the Libyan conflict, the Nagorno-Karabakh conflict, the Ukraine crisis, and the Kazakh-Israeli conflict have continued, further stimulating the development of the weaponization of artificial intelligence.

    In the Libyan conflict, both sides employed various types of drones for reconnaissance and combat missions. A report by the UN Group of Experts on Libya noted that the Turkish-made Kargu-2 drone conducted a “pursuit and long-range engagement” operation in Libya in 2020, autonomously attacking retreating enemy soldiers. This event marked the first use of a lethal autonomous weapon system in actual combat. As American scholar Zachary Callenburn stated, if anyone were to die in such an autonomous attack, it would likely be the first known instance of an AI-powered autonomous weapon being used for killing. In the 2020 Nagorno-Karabakh conflict, Azerbaijan successfully penetrated Armenian air defenses using a formation of Turkish-made TB2 “Standard” drones and Israeli-made Harop drones, gaining air superiority and the initiative. The significant success of Azerbaijani drone warfare largely stemmed from the Armenian army’s underestimation of the enemy’s capabilities and insufficient understanding of the importance and threat posed by drones in modern warfare. Secondly, from the perspective of offensive strategy, the Azerbaijani army has made bold innovations in drone warfare. They have flexibly utilized advanced equipment such as reconnaissance and strike drones and loitering munitions, which has not only improved combat efficiency but also greatly enhanced the surprise and lethality of the battles. ⑤

    During the 2022 Ukraine crisis, both Russia and Ukraine extensively used military-grade and commercial drones for reconnaissance, surveillance, artillery targeting, and strike missions. The Ukrainian army, through the use of the TB2 “Standard” drone and the US-supplied “Switchblade” series of suicide drones, conducted precision strikes and achieved high kill rates, becoming a notorious “battlefield killer.” In the Israeli-Kazakhstan conflict, the Israeli military was accused of using an artificial intelligence system called “Lavender” to identify and lock onto bombing targets in Gaza, marking as many as 37,000 Palestinians in Gaza as suspected “militants” and identifying them as targets for direct assassination. This Israeli military action drew widespread international attention and condemnation.

    Security risks arising from the weaponization of artificial intelligence

    From automated command systems to intelligent unmanned combat platforms, and then to intelligent decision-making systems in cyber defense, the application of artificial intelligence (AI) technology in the military field is becoming increasingly widespread and has become an indispensable part of modern warfare. However, with the trend of weaponizing AI, its misuse, abuse, and even malicious use will also bring significant risks and challenges to international security.

    It intensifies the arms race and disrupts the strategic balance.

    In the information and intelligent era, the disruptive potential of artificial intelligence is irresistible to major military powers, who are all focusing on the development and application of AI military capabilities, fearing that falling behind in this field will result in missing strategic opportunities. Deepening the military application of artificial intelligence can achieve “asymmetric advantages” in a lower cost and with higher efficiency.

    First, countries are vying for “first-mover advantage.” When a country achieves a technological lead in the development of intelligent weapon systems, it signifies that the country possesses more advanced artificial intelligence and related application capabilities, giving it a first-mover advantage in weapon system development, control, and contingency response. This advantage includes higher autonomy, intelligence, and adaptability, thereby increasing the country’s military strength and strategic competitive advantage. At the same time, the military advantage of a first-mover can become a security threat to competitors, leading to a competitive race among countries to advance the military application of advanced technologies. ⑦ In August 2023, U.S. Deputy Secretary of Defense Kathleen Hicks announced the “Replicator initiative,” which aims to deploy thousands of “autonomous weapon systems” in the Indo-Pacific region in less than two years. ⑧

    Secondly, the lack of transparency in the development of AI-based military equipment by various countries may exacerbate the arms race. This is mainly due to two reasons: First, AI technology is an “enabling technology” that can be used to design a variety of applications. This means that verifying the specific military applications of AI is extremely difficult, unlike nuclear weapons, where monitoring uranium, centrifuges, and weapon and delivery systems can help determine whether a country is developing or deploying nuclear weapons. The differences between semi-autonomous and fully autonomous weapon systems are primarily due to differences in computer software algorithms, making it difficult to verify treaty compliance through physical means. Second, to maintain their strategic advantage, countries often keep details of the military applications of advanced technologies secret, preventing adversaries from discerning their strategic intentions. In the current international environment, this lack of transparency not only intensifies the arms race but also sows the seeds for future escalation of conflict.

    Third, the uncertainty of national strategic intentions also exacerbates the arms race. The impact of artificial intelligence on strategic stability, nuclear deterrence, and the escalation of war largely depends on other countries’ perception of its capabilities, rather than its actual capabilities. As American scholar Thomas Schelling pointed out, international relations often feature risk competition, testing courage more than force. The relationship between major adversaries is determined by which side is ultimately willing to invest more power, or to make it appear as if it is about to invest more power.⁹ An actor’s perception of the capabilities of others, whether true or false, significantly influences the progress of the arms race. If a country vigorously develops intelligent weapon systems, competitors, uncertain of the other’s intentions, will become suspicious of the competitor’s military capabilities and the intentions behind their military development, often taking reciprocal measures, namely, developing their own military to meet their own security needs. It is this ambiguity of intention that stimulates technological accumulation, exacerbates the instability of weapons deployment, and ultimately leads to a vicious cycle.

    Empowering operational processes increases the risk of conflict.

    Empowered by big data and artificial intelligence technologies, traditional combat processes will undergo intelligent restructuring, shifting from “situational awareness—command and decision-making—offensive and defensive coordination—comprehensive support” to “intelligent situational awareness across the entire domain—human-machine integrated hybrid decision-making—manned/unmanned autonomous coordination—proactive and on-demand precise support.” However, while this intelligent restructuring of combat processes improves operational efficiency and accuracy, it also increases the risk of conflict and miscalculation.

    First, wars that break out at “machine speed” will increase the risk of hasty action. Artificial intelligence weapon systems demonstrate formidable capabilities in precision and reaction speed, making future wars likely to erupt at “machine speed.”⑩ However, excessively rapid warfare will also increase the risk of conflict. In areas that emphasize autonomy and reaction speed, such as missile defense, autonomous weapon systems, and cyberspace, faster reaction times will bring significant strategic advantages. At the same time, they will drastically reduce the time window for the defending side to react to military actions, placing commanders and decision-makers under immense “time pressure,” exacerbating the risk of “hasty action,” and increasing the possibility of unexpected escalation of the crisis.

    Second, relying on system autonomy may increase the probability of misjudgment under pressure. The U.S. Department of Defense believes that “highly autonomous artificial intelligence systems can autonomously select and execute corresponding operations based on dynamic changes in mission parameters, efficiently achieving human-preset goals. Increased autonomy not only significantly reduces reliance on human labor and improves overall operational efficiency, but is also regarded by defense planners as a key element in maintaining tactical leadership and ensuring battlefield advantage.” ⑪ However, because human commanders cannot react quickly enough, they may gradually delegate control to autonomous systems, increasing the probability of misjudgment. In March 2003, the U.S. Patriot missile system mistakenly identified a friendly Tornado fighter jet as an anti-radiation missile. Under pressure with only a few seconds to react, the commanders chose to launch the missile, resulting in the deaths of two pilots.⑫

    Third, it weakens the effectiveness of crisis termination mechanisms. During the Cold War, the US and the Soviet Union spearheaded a series of restrictive measures to curb the escalation of crises and prevent them from evolving into large-scale nuclear war. In these measures, humans played a crucial “monitoring” role, able to initiate termination measures within sufficient time to avert large-scale humanitarian catastrophes should a risk of spiraling out of control. However, with the increasing computing power of artificial intelligence systems and their deep integration with machine learning, combat responses have become more rapid, precise, and destructive, potentially weakening human intervention mechanisms for crisis termination.

    Accountability for war is difficult, and collateral damage is increased.

    Artificial intelligence weapon systems make it more difficult to define responsibility in war. In traditional warfare, weapon systems are controlled by humans, and if errors or crises occur, the human operator or the developer of the operating system bears the corresponding responsibility. Artificial intelligence technology itself weakens human agency and control, making the attribution of responsibility for technical actions unclear.

    First, there’s the “black box” problem of artificial intelligence. While AI has significant advantages in processing and analyzing data, its internal operating principles and causal logic are often difficult for humans to understand and explain. This makes it challenging for programmers to correct erroneous algorithms, a problem often referred to as the “black box” of algorithmic models. If an AI-powered weapon system poses a security threat, the “algorithm black box” could become a convenient excuse for those responsible to shirk accountability. Those seeking accountability would face generalized blame-shifting and deflection, ultimately pointing the finger at the AI ​​weapon system. In practice, the inability to understand and explain the decision-making process of AI can lead to a series of problems, such as decision-making errors, trust crises, and information misuse.

    Secondly, there is the issue of delineating human-machine responsibility in military operations. When an AI system malfunctions or makes a decision-making error, should it be treated as an independent entity and held responsible? Or should it be considered a tool, with human operators bearing all or part of the responsibility? The complexity of this responsibility delineation lies not only in the technical aspects but also in the ethical and legal ones. On the one hand, although AI systems can make autonomous decisions, their decision-making process is still limited by human-preset programs and algorithms, therefore their responsibility cannot be completely independent of humans. On the other hand, in certain situations, AI systems may exceed the pre-set limits of humans and make independent decisions; how to define their responsibility in such cases also becomes a difficult problem in the field of arms control.

    Thirdly, there is the issue of the allocation of decision-making power between humans and AI weapon systems. Depending on the level of machine autonomy, AI systems can execute tasks in three decision-making and control modes: semi-autonomous, supervised autonomy, and fully autonomous. In semi-autonomous systems, human decision-making power rests with the user; in supervised autonomy, humans supervise and intervene when necessary; in fully autonomous operations, humans do not participate in the process. As the military application of AI deepens, the role of humans in combat systems is gradually shifting from the traditional “human-in-the-loop” model to “human-on-the-loop,” evolving from direct controllers within the system to external supervisors. However, this shift also raises new questions. How to ensure that AI weapon systems adhere to human ethics and values ​​while operating independently is a major challenge currently facing the field of AI weapon development.

    Lowering the threshold for dissemination leads to misuse and abuse.

    Traditional strategic competition typically involves large-scale weapons system development and procurement, requiring substantial financial and technological support. With the maturation and diffusion of artificial intelligence (AI) technology, its accessibility and low cost make it possible for even small and medium-sized countries to develop advanced intelligent weapons systems. Currently, strategic competition in the field of military AI is primarily concentrated among major military powers such as the US and Russia. However, in the long run, the proliferation of AI technology will broaden the scope of strategic competition, posing a disruptive threat to the existing strategic balance. Once smaller countries possessing AI technology achieve relatively strong competitiveness, their willingness to confront threats from major powers may increase.

    First, artificial intelligence (AI) facilitates the development of lightweight and agile combat methods, encouraging smaller states and non-state actors to engage in small-scale, opportunistic military adventures to achieve their strategic objectives at a lower cost and with more diverse means. Second, the rapid development of AI has led to the increasing prominence of new forms of warfare such as cyber warfare and electronic warfare. In a highly competitive battlefield environment, malicious third-party actors can manipulate information to influence military planning and strategic deterrence, leading to escalation. The 2022 Ukraine crisis saw numerous instances of online disinformation used to confuse the public. Third, the widespread application of AI technology has also reduced strategic transparency. Traditional military strategies often rely on extensive intelligence gathering, analysis, and prediction; however, with the assistance of AI, operational planning and decision-making processes become more complex and unpredictable. This lack of transparency can lead to misunderstandings and misjudgments, thereby increasing the risk of conflict escalation.

    Governance Path of Artificial Intelligence Weaponization Security Risks

    To ensure the safe development of artificial intelligence and avoid the potential harm caused by its weaponization, we should strengthen international communication on governance strategies, seek consensus and cooperation among countries on the military applications of artificial intelligence, promote dialogue and coordination on laws and regulations to form a unified and standardized legal framework, strengthen ethical constraints on artificial intelligence to ensure that technological development conforms to ethical standards, and actively participate in global security governance cooperation to jointly safeguard the peace and stability of the international community.

    We attach great importance to strategic communication at the international level.

    Artificial intelligence governance is a global issue that requires concerted efforts from all countries to resolve. On the international stage, the interests of nations are intertwined yet conflicting; therefore, addressing global issues through effective communication channels is crucial for maintaining world peace and development.

    On the one hand, it is essential to accurately grasp the challenges of international governance of artificial intelligence. This involves understanding the consensus among nations on the weaponization of AI, while also closely monitoring policy differences among countries regarding the security governance of AI weaponized applications. Through consultation and cooperation, relevant initiatives should be aligned with the UN agenda to effectively prevent the misuse of AI for military purposes and promote its peaceful application.

    On the other hand, it is crucial to encourage governments to reach relevant agreements and build strategic mutual trust through official or semi-official dialogues. Compared to the “Track 1 dialogue” at the government level, “Track 1.5 dialogue” refers to dialogues involving both government officials and civilians, while “Track 2 dialogue” is a non-official dialogue conducted by academics, retired officials, and others. These two forms of dialogue offer greater flexibility and serve as important supplements and auxiliary means to official intergovernmental dialogues. Through diverse dialogue methods, officials and civilians can broadly discuss possible paths to arms control, share experiences and expertise, and avoid escalating the arms race and worsening tensions. These dialogue mechanisms will provide countries with a continuous platform for communication and cooperation, helping to enhance mutual understanding, strengthen strategic mutual trust, and jointly address the challenges posed by the militarization of artificial intelligence.

    Scientifically formulate laws and ethical guidelines for artificial intelligence.

    Artificial intelligence (AI) technology itself is neither right nor wrong, good nor evil. However, there are certainly distinctions of good and evil intentions in the design, research and development, manufacturing, use, operation, and maintenance of AI. The weaponization of AI has sparked widespread ethical concerns. Under the framework of international law, can autonomous weapon systems accurately distinguish between combatants and civilians on complex battlefields? Furthermore, if AI weapon systems cause unintended harm, how should liability be determined? Is entrusting life-or-death decision-making power to machines in accordance with ethical standards? These concerns highlight the necessity of strengthening ethical constraints on AI.

    On the one hand, it is essential to prioritize ethics and integrate the concept of “intelligent for good” from the very source of technology. In the design of AI military systems, values ​​such as human-centeredness and intelligent for good should be embedded within the system. The aim is to prevent potential indiscriminate killing and harm caused by AI at the source, control its excessive destructive power, and prevent accidental damage, thereby limiting the extent of damage caused by AI weapon systems to the smallest possible range. Currently, nearly a hundred institutions and government departments both domestically and internationally have published various AI ethics principles documents, and the academic and industrial communities have reached a consensus on basic AI ethical principles. In 2022, China’s “Position Paper on Strengthening Ethical Governance of Artificial Intelligence,” submitted to the United Nations, provided an important reference for the development of global AI ethics regulation. The document explicitly emphasizes that AI ethics regulation should be promoted through measures such as institutional construction, risk management, and collaborative governance.

    On the other hand, it is necessary to improve relevant laws and regulations and clarify the boundaries of rights and responsibilities of artificial intelligence entities. Strict technical review standards should be established to ensure the safety and reliability of AI systems. Comprehensive testing should be conducted before AI systems are deployed to ensure they do not negatively impact human life and social order. The legal responsibilities of developers, users, maintainers, and other parties throughout the entire lifecycle of AI systems should be clearly defined, and corresponding accountability mechanisms should be established.

    We will pragmatically participate in international cooperation on artificial intelligence security governance.

    The strategic risks posed by the military applications of artificial intelligence further highlight the importance of pragmatic international security cooperation. It is recommended to focus on three key areas:

    First, we should promote the formulation of guidelines for the application of artificial intelligence in the military field. Developing codes of conduct for the military application of artificial intelligence is an important responsibility of all countries in regulating its military use, and a necessary measure to promote international consensus and comply with international regulations. In 2021, the Chinese government submitted its “Position Paper on Regulating the Military Application of Artificial Intelligence” to the UN Convention on Certain Conventional Weapons Conference, and in 2023, it released the “Global Artificial Intelligence Governance Initiative,” both of which provide constructive references for improving the codes of conduct for regulating the military application of artificial intelligence.

    Second, it is essential to establish a suitable regulatory framework. The dual-use nature of artificial intelligence (AI) involves numerous stakeholders, making the role of non-state actors such as NGOs, technical communities, and technology companies increasingly prominent in the global governance of AI, thus becoming a crucial force in building a regulatory framework for the military application of AI. Technical regulatory measures that countries can adopt include: clarifying the scope of AI technology use, responsible parties, and penalties for violations; strengthening technological research and development to improve the security and controllability of the technology; and establishing regulatory mechanisms to monitor the entire process of technology research and development and application, promptly identifying and resolving problems.

    Third, we will jointly develop technologies and solutions for AI security. We encourage the inclusion of bilateral or multilateral negotiations between governments and militaries in the dialogue options for military AI applications, and promote extensive exchanges on military AI security technologies, operating procedures, and practical experience. We will also promote the sharing and reference of relevant risk management technical standards and usage norms, and continuously inject new stabilizing factors into the international security and mutual trust mechanism in the context of the militarization of AI.

    (The author is the director and researcher of the National Defense Science and Technology Strategy Research Think Tank at the National University of Defense Technology, and a doctoral supervisor; Liu Hujun, a master’s student at the School of Foreign Languages ​​of the National University of Defense Technology, also contributed to this article.)

現代國語:

朱啟超
《人民論壇》(2025年02月05日 第 02版)

【摘要】人工智能武器化是新一輪軍事變革的必然趨勢,近年來的局部戰爭衝突進一步刺激相關國家推進人工智能武器化戰略部署,搶占未來戰爭制高點。人工智能武器化的潛在風險不容忽視,將可能加劇軍備競賽,打破戰略平衡;賦能作戰流程,加大衝突風險;提升問責難度,增加附帶傷亡;降低擴散門檻,導致誤用濫用。對此,應加強國際間戰略溝通,確保各國在人工智能軍事應用上的共識與協作;推進法律法規建設的對話與協調,以形成統一規範的法律框架;加強人工智能倫理約束,確保技術發展符合道德標準;積極參與全球安全治理合作,共同維護國際社會的和平與穩定。

【關鍵詞】人工智能 軍事應用 安全風險 安全治理 【中圖分類號】F113 【文獻標識碼】A

人工智能武器化,是將人工智能相關技術、平台與服務應用到軍事領域,使其成為賦能軍事行動的重要驅動力量,進而提升軍事行動的效率、精準度和自主性。隨著人工智能技術在軍事領域的廣泛應用,各主要大國和軍事強國紛紛加大戰略與資源投入,加快研發應用步伐。近年來頻發的地區戰爭衝突也進一步刺激了人工智能的戰場運用,並深刻形塑戰爭形態以及軍事變革的未來走向。

不容忽視的是,人工智能作為一類快速發展中的技術,其本身由於內在技術的不成熟、場景匹配的不准確、支持條件的不完備,可能存在潛在風險,而由於人為的誤用、濫用甚至惡意使用,也容易給軍事領域乃至國際安全領域帶來多種風險挑戰。認真貫徹落實習近平總書記提出的全球安全倡議,必須直面世界範圍內人工智能武器化的發展趨勢,深入分析人工智能武器化應用可能帶來的安全風險,並思考科學可行的治理思路與舉措。

當前人工智能武器化的發展趨勢

近年來,人工智能在軍事領域的應用,正在從根本上重塑未來戰爭形態、改變未來作戰體系,影響軍事變革的未來走向。主要軍事大國已將人工智能視為改變未來戰爭規則的顛覆性關鍵技術,紛紛挹注大量資源,推進人工智能武器的研發與應用。

人工智能武器化是軍事變革的必然趨勢。

隨著科學技術的飛速發展,軍事變革的必要性與緊迫性愈發凸顯。人工智能通過模擬人類的思維過程,延展人類的腦力與體力,可實現信息快速處理、分析和決策,可研發日益複雜的無人化武器系統平台,從而為軍事行動提供前所未有的智能化支持。

一是為軍事情報偵察與分析提供智能支持。傳統的情報偵察方式受到人力和時間等多重因素制約,難以有效應對大規模、高速度和高複雜度的情報處理需求。人工智能技術的引入,為情報偵察領域帶來革新和突破。在軍事基礎設施中,應用人工智能技術,可構建智能監測系統,提供高精度實時的情報感知服務。在情報偵察領域,人工智能技術具備對多個“信息流”進行實時處理的能力,從而極大地提高分析效率。 ①通過使用深度學習等技術工具,還可以“透過現像看本質”,挖掘出各類碎片化情報信息中的深層脈絡與因果聯繫,將海量碎片化數據快速轉變為可以利用的情報,從而提升情報分析的質效。

二是為作戰指揮與決策提供數據支持。人工智能在戰場態勢感知方面為作戰指揮和軍事決策提供有力支持。 ②其優勢在於能夠進行數據挖掘、數據融合以及預測分析等關鍵任務。在信息化智能化戰爭中,戰場環境瞬息萬變,情報信息量龐大,要求決策響應迅速且準確。因此,先進的計算機系統就成為協助指揮人員管理情報數據、進行敵情判斷、提出作戰方案建議以及擬制計劃與命令的重要工具。以美軍為例,美國雷神技術公司(Raytheon Technologies Corporation)研製的ISTAR(情報、監視、目標識別和跟踪)系統,涵蓋了情報採集、監視、目標識別及跟踪功能,可匯聚來自衛星、艦船、飛機及地面站等多元信息源的數據,並對其進行深度分析與處理。這不僅顯著提高了指揮官獲取信息的速度,而且可藉助智能分析系統提供數據支持,使決策更加快速、高效和精準。

三是為無人作戰系統提供重要支撐。無人作戰系統是一種無需人類直接操縱,便可獨立完成軍事任務的新型武器裝備系統,主要包括智能化無人作戰平台、智能化彈藥和智能化作戰指揮控制系統等組成部分,具備顯著的自主性和智能化特徵。無人作戰系統,作為引領未來戰爭形態變革的技術裝備,已成為國家間軍事競爭的重要籌碼。該系統通過運用自主導航、目標識別、路徑規劃等關鍵技術,實現了不同戰場環境及作戰空間的適應能力。借助深度學習、強化學習等先進算法,無人作戰系統能夠獨立完成導航任務,並實現精準打擊目標。這種系統的設計理念是“平台無人,系統有人”,其本質是對有人作戰系統的智能化延伸。例如,美國國防部高級研究計劃局(DARPA)研發的“MQM-57獵鷹者”無人機,就採用了先進的人工智能技術,具備高度自主的目標識別和追踪功能。

四是為軍事後勤與裝備保障提供技術支持。在信息化戰爭的背景下,戰爭進程加快、機動性提升、作戰消耗顯著增加。傳統的“超量預儲”保障模式已無法適應現代戰場快速變化的需求,因此,對作戰部隊進行適時、適地、適需、適量的快速精確後裝保障提出了更高的要求。人工智能作為一種具有溢出帶動和交叉融合特性的技術,與物聯網、大數據、雲計算等前沿技術相互融合,使得人工智能知識群、技術群和產業群全面滲透到軍事後裝領域,顯著提升了後勤裝備保障能力。

主要國家紛紛佈局人工智能軍事應用。

為增強在人工智能領域的全球競爭力,美國、俄羅斯、日本等主要大國加緊對人工智能軍事應用的戰略佈局。首先,通過更新和調整人工智能領域的頂層戰略規劃,為未來的發展提供明確指導;其次,針對未來戰爭需求,加快人工智能技術與軍事領域的深度融合,推動裝備系統的智能化、自主化和無人化發展;此外,積極創新作戰概念,以驅動作戰力量創新,進而提升作戰效能和競爭優勢。

一是製定戰略規劃。基於技術霸權追求軍事霸權、政治霸權、經濟霸權的戰略偏執,美國正加快自身軍事智能化進程。 2023年11月,美國國防部發布《數據、分析與人工智能採用戰略》,旨在擴展整個國防部體系的先進能力,以獲得持久的軍事決策優勢。俄軍頒布被稱為“3.0版本”的《2024年至2033年俄羅斯武器裝備發展綱要》,旨在為未來10年武器裝備發展提供指導,綱要強調繼續推進核武器和常規武器建設,並重點研究人工智能和機器人技術、高超音速武器和其他基於新物理原理的打擊兵器。

二是研發先進裝備系統。美軍自2005年開始每隔幾年都會發布一版“無人系統路線圖”,以展望並設計空中、地面、水面/水下等各領域無人系統平台,貫通研發—生產—測試—訓練—作戰—保障等無人化武器裝備發展鏈路。目前,世界上已有70多個國家可以研發無人化系統平台,各種類型的無人機、無人車、無人船(艇)、無人潛航器如雨後春筍般不斷出現。 2024年7月15日,美軍參聯會前主席馬克·米利接受《美國防務新聞》採訪時稱,到2039年,三分之一的美軍部隊將由機器人組成。俄軍研發的平台-M作戰機器人、“柳葉刀”自殺式無人機和S70“獵人”重型無人機等,已投入實戰檢驗。

三是創新未來作戰概念。作戰概念是對未來戰爭樣式與作戰方式進行的前瞻性研究,往往可牽引新的作戰力量編組及武器裝備跨越發展。美軍近年來先後提出“分佈式殺傷”“多域戰”“馬賽克戰”等作戰概念,試圖引領軍事變革的發展方向。以“馬賽克戰”為例,該作戰概念將各種傳感器、通信網絡、指揮控制系統、武器平台等視為“馬賽克碎片”,這些“碎片”單元在人工智能技術賦能支持下,通過網絡信息系統可動態鏈接、自主規劃、協同組合,從而形成一個按需集成、極具彈性、靈活機動的殺傷網。 2022年3月,美國國防部發布《聯合全域指揮控制(JADC2)戰略實施計劃》,該計劃旨在將多域作戰向全域作戰概念拓展,將各軍種傳感器連接到一個統一“物聯網”中,利用人工智能算法幫助改善作戰指揮決策。 ③

戰爭衝突刺激人工智能武器化進程。

近年來,利比亞衝突、納卡衝突、烏克蘭危機、哈以沖突等局部衝突不斷,進一步刺激了人工智能武器化的發展進程。

在利比亞衝突中,交戰雙方採用多種型號無人機執行偵察和作戰任務。據聯合國利比亞問題專家小組發布的報告指出,土耳其製造的“卡古-2”(Kargu-2)無人機2020年在利比亞執行了“追捕並遠程交戰”行動,可自主攻擊撤退中的敵方士兵。這一事件標誌著致命性自主武器系統在實戰中的首次運用。如美國學者扎卡里·卡倫伯恩所述,若有人在此類自主攻擊中不幸喪生,這極有可能是歷史上首個已知的人工智能自主武器被用於殺戮的例子。在2020年納卡衝突中,阿塞拜疆運用土耳其生產的“旗手”TB2無人機編隊和以色列生產的“哈洛普”無人機成功突破了亞美尼亞防空系統,掌握了戰場製空權和主動權。 ④ 阿塞拜疆軍隊無人機作戰的顯著成效,在很大程度上源於亞美尼亞軍隊的“輕敵”心態,對無人機在現代戰爭中的重要性和威脅性認識不足。其次,從進攻策略的角度來看,阿塞拜疆軍隊在無人機戰法上進行了大膽的創新。他們靈活運用察打一體無人機和巡飛彈等先進裝備,不僅提升了作戰效率,也大大增強了戰鬥的突然性和致命性。 ⑤

在2022年爆發的烏克蘭危機中,俄羅斯和烏克蘭都廣泛使用軍用級和商用無人機執行偵察監視、火砲瞄準和打擊任務。烏克蘭軍隊通過使用“旗手”TB2無人機以及美國援助的“彈簧刀”系列自殺式無人機,實施精確打擊和高效殺傷,成為令世界矚目的“戰場殺手”。在哈以沖突中,以色列軍方被指控使用名為“薰衣草”(Lavender)的人工智能係統來識別並鎖定加沙境內的轟炸目標,曾將多達3.7萬名加沙巴勒斯坦人標記為“武裝分子”嫌疑對象,並將其認定為可直接“暗殺”的目標,以軍行動引發了國際社會廣泛關注和譴責。 ⑥

人工智能武器化帶來的​​安全風險

從自動化指揮系統到智能無人作戰平台,再到網絡防禦中的智能決策系統,人工智能技術在軍事領域的應用正變得愈發普遍,已成為現代戰爭不可或缺的一部分。然而,人工智能武器化的趨勢下,其誤用、濫用甚至惡意使用,也將給國際安全帶來不可忽視的風險挑戰。

加劇軍備競賽,打破戰略平衡。

在信息化智能化時代,人工智能所具有的顛覆性潛力讓軍事大國都難以抗拒,紛紛聚焦人工智能軍事能力的開發和運用,唯恐在這一領域落後而喪失戰略機遇。深化人工智能軍事應用,則能夠以更低成本、更高效率的方式獲得“非對稱優勢”。

一是各國紛紛搶抓“先行者優勢”。當一個國家在智能武器系統開發領域取得技術領先地位時,意味著該國具備更高級的人工智能和相關應用能力,使其在武器系統開發、控制和應急響應等方面具有先發優勢。這種優勢包括更高的自主性、智能化程度和自適應能力,從而增加了該國的軍事實力和戰略競爭優勢。與此同時,先行者的軍事優勢可能會成為競爭對手的安全威脅,導致各國在先進技術的軍事應用上呈現出你爭我趕的態勢。 ⑦ 2023年8月,美國國防部副部長凱瑟琳·希克斯宣布了“複製者計劃”(Replicator initiative),該倡議力求在不到兩年的時間內在印太地區部署數千個“自主武器系統”。 ⑧

二是各國人工智能軍備建設的不透明性可能加劇軍備競賽。這主要有兩個方面的原因:一是人工智能技術是一種可用於設計多種應用的“使能技術”,這意味著人工智能軍事應用具體情況核查難度較高,難以像核武器可以通過對鈾、離心機以及武器和運載系統的監測來判斷一個國家是否在進行核武器的開發或部署。半自主、完全自主武器系統之間的差別主要是由於計算機軟件算法不同導致的,很難通過物理核查手段來對各國的條約執行情況進行核查。二是各國為了保持己方的戰略優勢,往往對先進技術的軍事應用相關細節採取保密措施,從而使對手無法探知其戰略意圖。在當前國際環境中,這種不透明性不僅僅加劇了軍備競賽,更為未來衝突升級埋下了伏筆。

三是各國戰略意圖的不確定性也會加劇軍備競賽。人工智能對於戰略穩定、核威懾和戰爭升級的影響,很大程度上取決於他國對於其能力的感知,而非其實質能力。正如美國學者托馬斯·謝林指出,國際關係常常具有風險競爭的特徵,更多的是對勇氣而不是武力的考驗,主要對手之間的關係是由哪一方最終願意投入更大的力量,或者使之看起來即將投入更大的力量來決定的。 ⑨ 一個行為體對於他者能力的感知,無論真假,都會在很大程度上影響軍備競賽進程。如果一個國家大力發展智能武器系統,競爭對手在不確定對方意圖的情況下,會對競爭對手的軍備能力及發展軍備的意圖產生猜忌,往往採取對等措施,即通過發展軍備來滿足自身安全需求。正是這種意圖的模糊性刺激了技術積累,加劇武器部署的不穩定性,最終導致惡性循環。

賦能作戰流程,加大衝突風險。

在大數據和人工智能技術賦能下,傳統作戰流程將實現智能化再造,即由“態勢感知—指揮決策—攻防協同—綜合保障”向“全域態勢智能認知—人機一體混合決策—有人/無人自主協同—主動按需精准保障”轉變。然而,作戰流程的智能化再造雖然提高了作戰的效率和精確性,但也提升了衝突和誤判的風險。

一是以“機器速度”爆發的戰爭將增加倉促行動的風險。人工智能武器系統在精確度和反應速度上表現出強大的能力,使得未來戰爭將以“機器速度”爆發。 ⑩ 但戰爭速度過快也將升高衝突風險。在導彈防禦、自主武器系統和網絡空間等重視自主性以及反應速度的領域,更快的反應速度將帶來巨大的戰略優勢,同時也極大地壓縮了防禦方對軍事行動作出反應的時間窗口,導致作戰指揮員和決策者置身於巨大的“時間壓力”之下,加劇了“倉促行動”的風險,並增加了危機意外升級的可能性。

二是依賴系統自主性可能增加壓力下的誤判機率。美國國防部認為,“高度自主化的人工智能係統,能夠根據任務參數的動態變化,自主選擇並執行相應操作,高效實現人類預設的目標。自主性的增加不僅大幅減少了對人力的依賴,提高了整體操作效率,更被國防規劃者視為保持戰術領先、確保戰場優勢的關鍵要素。”⑪然而,由於人類指揮官無法作出足夠快的反應,可能逐漸將控制權下放給自主系統,增加誤判機率。 2003年3月,美國“愛國者”導彈系統曾錯誤地將友軍的“龍捲風”戰鬥機標記為反輻射導彈,指揮人員在只有幾秒鐘反應時間的壓力狀態下,選擇發射導彈,造成了兩名飛行員的死亡。 ⑫

三是削弱了危機終止機制的有效性。冷戰時期,美蘇主導構建了一系列限制性措施來遏制危機的升級,避免其演化為大規模的核戰爭。在這些措施中,人類扮演著至關重要的“監督者”角色,在可能出現風險失控時,能夠在充足的時間內啟動終止措施,避免大規模人道主義災難發生。但是,隨著人工智能係統運算能力的提升及其與機器學習的深度融合,作戰響應變得更為迅捷、精確和具有破壞性,人類對於危機的終止干預機制將可能被削弱。

戰爭問責困難,增加附帶傷亡。

人工智能武器系統使得戰爭責任更難界定。在傳統作戰模式下,由人類控制武器系統,一旦造成失誤或危機,人類操作員或者操作系統的研發者將承擔相應的責任。人工智能技術本身弱化了人類的能動性和控制能力,致使技術性行為的責任歸屬變得模糊不清。

一是人工智能“黑箱”問題。儘管人工智能在處理和分析數據方面有著顯著優勢,但是其內部運行規律和因果邏輯卻常常難以被人類理解和解釋,這使得程序員難以對錯誤算法進行糾偏除誤,這一問題常常被稱為算法模型的“黑箱”。一旦人工智能武器系統產生安全危害,“算法黑箱”可能成為相關責任方推卸責任的合理化藉口,追責者只能面臨泛化的卸責與推諉,並將責任矛頭指向人工智能武器系統。在實踐中,如果無法理解並解釋人工智能的決策過程,可能會引發一系列的問題,如決策失誤、信任危機、信息濫用等。

二是軍事行動中人機責任劃分問題。當人工智能係統出現故障或者決策失誤時,是否應將其視為一種獨立的實體來承擔責任?或者,是否應該將其視為一種工具,由人類操作者承擔全部或部分責任?這種責任劃分的複雜性不僅在於技術層面,更在於倫理和法律層面。一方面,人工智能係統雖然能夠自主決策,但其決策過程仍然受到人類預設的程序和算法限制,因此其責任不能完全獨立於人類。另一方面,人工智能係統在某些情況下可能會超越人類的預設範圍,作出獨立的決策,此時其責任又該如何界定,也成為軍控領域的難題。

三是人與人工智能武器系統的決策權分配問題。按照機器自主權限的不同,人工智能係統能夠以半自主、有監督式自主以及完全自主三種決策與控制方式執行任務。在半自主系統中,行動的決策權由人類掌控;在有監督式自主行動中,人類實施監督並在必要時干預;在完全自主行動中,人類不參與行動過程。隨著人工智能軍事應用程度的逐漸加深,人在作戰系統中的角色正經歷由傳統的“人在迴路內”模式逐步向“人在迴路上”轉變,人類從系統內部的直接操控者演化為系統外部的監督者。然而,這一轉變也引發了新的問題。如何確保人工智能武器系統在獨立運作時仍能遵循人類倫理和價值觀,這是當前人工智能武器研發領域面臨的重大挑戰。

降低擴散門檻,導致誤用濫用。

傳統的戰略競爭通常涉及大規模的武器系統研發和採購,需要大量資金和技術支持。人工智能技術成熟擴散後,具有易獲取且價格低廉等優勢,即便是中小國家也可能具備開發先進智能武器系統的能力。當前,軍用人工智能領域的戰略競爭主要集中在美俄等軍事大國之間。但長遠來看,人工智能技術的擴散將擴大戰略競爭的範圍,對現有的戰略平衡構成破壞性威脅。一旦掌握人工智能技術的較小規模國家擁有相對較強的競爭力,這些國家在面臨大國威脅時發起對抗的意願可能就會增強。

一是人工智能有助於發展一些輕便靈巧的作戰手段,從而鼓勵一些中小國家或者非國家行為體利用其開展小型的、機會主義的軍事冒險,以更低廉的成本和更豐富的途徑來達到其戰略目地。二是人工智能的快速發展使得網絡戰、電子戰等新型戰爭形態日益凸顯。在競爭激烈的戰場環境中,惡意的第三方行為體可以通過操縱信息來影響軍事規劃和戰略威懾,導致局勢升級。在2022年爆發的烏克蘭危機中,就有眾多網絡虛假信息傳播混淆視聽。三是人工智能技術的廣泛應用還降低了戰略透明度。傳統的軍事戰略往往依賴於大量的情報收集、分析和預測,而在人工智能技術的輔助下,作戰計劃和決策過程變得更加複雜和難以預測。這種不透明性可能導致誤解和誤判,從而增加了衝突升級的風險。

人工智能武器化安全風險的治理路徑

為確保人工智能安全發展,避免其武器化帶來的​​潛在危害,應加強國際間的治理戰略溝通,尋求各國在人工智能軍事應用方面的共識與協作;推進法律法規對話協調,以形成統一規範的法律框架;加強人工智能倫理的約束,確保技術發展符合道德標準;積極參與全球安全治理合作,共同維護國際社會的和平與穩定。

高度重視國際層面戰略溝通。

人工智能治理是一個全球性問題,需要各國通力合作,共同解決。在國際舞台上,各國利益交融與利益衝突並存,因此,通過有效的溝通渠道來處理全球性問題成為維護世界和平與發展的關鍵。

一方面,要準確把握人工智能國際治理挑戰。既要把握各國對人工智能武器化發展的共識,也要密切關注各國在人工智能武器化應用安全治理方面的政策差異,通過協商合作,使相關倡議與聯合國議程相協調,從而有效防止人工智能在軍事上的濫用,推動人工智能用於和平目的。

另一方面,推動各國政府通過官方或半官方對話,達成相關協議,建立戰略互信。相較於政府層面的“1軌對話”,“1.5軌對話”指的是政府官員與民間人士共同參與的對話,而“2軌對話”則是由學者、退休官員等進行的民間非官方形式的對話。這兩種對話形式具有更高的靈活性,是政府間官方對話的重要補充和輔助手段。通過多樣化的對話交流方式,官方和民間人士可以廣泛磋商軍備控制的可能實現路徑,分享經驗和專業知識,以避免軍備競賽的升級和緊張局勢的惡化。這些對話機制將為各國提供持續的溝通與合作平台,有助於增進相互理解、加強戰略互信,共同應對人工智能軍事化應用帶來的挑戰。

科學制定人工智能法律和倫理規約。

人工智能技術本身並無對錯善惡之分,但對於人工智能的設計、研發、製造、使用、運行以及維護確有善惡意圖之別。人工智能武器化引發了廣泛的倫理關注。國際法框架下,自主武器系統是否能夠在復雜戰場上精準區分戰鬥人員與平民?此外,若人工智能武器系統導致非預期的傷害,其責任歸屬如何界定?將關乎生死的決策權交付於機器,這一做法是否符合道德倫理標準?這些擔憂凸顯了加強人工智能倫理約束的必要性。

一方面,要堅持倫理先行,從技術源頭上融入“智能向善”的理念。在人工智能軍事系統的設計過程中,將以人為本、智能向善等價值觀內嵌於系統中。其目的是從源頭上杜絕人工智能可能引發的濫殺濫傷行為,控制其過度殺傷力,防範意外毀傷的發生,從而將人工智能武器系統所帶來的毀傷程度限制在盡可能小的範圍內。目前,國內外已有近百家機構或政府部門發佈各類人工智能倫理原則文件,學術界和產業界亦就人工智能基本倫理原則達成共識。 2022年,中國向聯合國遞交的《關於加強人工智能倫理治理的立場文件》為全球人工智能倫理監管的發展提供了重要參考。文件明確強調,應通過制度建設、風險管控、協同共治等多方面的措施來推進人工智能倫理監管。

另一方面,要完善相關法律法規,明確人工智能主體的權責邊界。制定嚴格的技術審核標準,確保人工智能係統的安全性和可靠性。在人工智能係統上線前進行全面的測試,確保其不會對人類生活和社會秩序造成負面影響。明確開發者、使用者、維護者等各方在人工智能係統全生命週期中的法律責任,以及建立相應的追責機制。

務實參與人工智能安全治理國際合作。

人工智能軍事應用所帶來的戰略風險,更加凸顯出國際安全務實合作的重要性。建議重點從三個方面著手:

一是推動制定人工智能在軍事領域的運用準則。制定人工智能軍事應用的行為準則,是各國規範人工智能軍事應用的重要責任,也是推動國際共識和遵守國際法規的必要舉措。中國政府2021年向聯合國《特定常規武器公約》大會提交了《中國關於規範人工智能軍事應用的立場文件》,2023年發布《全球人工智能治理倡議》,這些都為完善規範人工智能軍事應用的行為準則提供了建設性參考。

二是建立適用的監管框架。人工智能軍民兩用性使其涉及眾多利益攸關方,一些非國家行為體如非政府組織、技術社群、科技企業在人工智能全球治理進程中的作用將更加突出,成為人工智能軍事應用監管框架建設的重要力量。各國可採取的技術監管措施包括:明確人工智能技術的使用範圍、責任主體和違規處罰措施;加強技術研發,提高技術的安全性和可控性;建立監管機制,對技術的研發和應用進行全程監管,及時發現和解決問題。

三是共同研發人工智能安全防範技術和解決方案。鼓勵將政府間和軍隊間的雙邊或多邊談判納入軍用人工智能應用的對話選項,就軍用人工智能安全防範技術、操作規程及實踐經驗廣泛交流,推動相關風險管理技術標準和使用規範的分享借鑒,為人工智能軍事化背景下的國際安全互信機制不斷注入新的穩定因素。

(作者為國防科技大學國防科技戰略研究智庫主任、研究員,博導;國防科技大學外國語學院碩士研究生劉胡君對本文亦有貢獻)

【註釋】

①Katz B. Analytic edge: Leveraging emerging technologies to

transform intelligence analysis [R]. Washington D.C.: Center for

Strategic and International Studies, 2020.

②Paul McLeary. Pentagon’s Big AI Program, Maven, Already

Hunts Data in Middle East, Africa[N]. Breaking Defense, May 1, 2018.

③唐新華:《美國綜合威懾戰略中的技術互操作性》,《太平洋學報》, 2022年第12期,第15-25頁。

aijan’s Drones Owned the Battlefield in

Nagorno-Karabakh—and Showed Future of Warfare[N]. The

Washington Post, November 11, 2020.

⑤朱啟超、陳曦、龍坤:《無人機作戰與納卡衝突》,《中國國際戰略評論》,2020年第2期,第167-183頁。

⑥The Verge Report: Israel used AI to identify bombing targets in

Gaza [EB/OL].[2024-04-05].

artificial-intelligence-gaza-ai#:~:text.

⑦羅易煊、李彬:《軍用人工智能競爭中的先行者優勢》,《國際政治科學》, 2022第3期,第1-33頁。

⑧U.S. Department of Defense. Deputy Secretary of Defense

Kathleen Hicks Keynote Address: The Urgency to Innovate (As

Delivered) [EB/OL]. [2023-08-28]. https://www.defense.gov/News/Speeches/Speech/Article/3507156/deputy-

secretary-of-defense-kathleen-hicks-keynote-address-the-urgency-

to-innov/.

⑨[美]托馬斯·謝林著,毛瑞鵬譯:《軍備及其影響》,上海:上海人民出版社,2017年,第81頁。

⑩Rautenbach P. Keeping Humans in the Loop is Not Enough to

Make AI Safe for Nuclear Weapons[EB/OL],

enough-to-make-ai-safe-for-nuclear-weapons/,2023-02-16/2024-01-

09.

⑪Mayer M. The new killer drones: understanding the strategic

implications of next-generation unmanned combat aerial vehicles[J],

International Affairs, 2015,91(04):771.

⑫[美]保羅·沙瑞爾著,朱啟超、王姝、龍坤譯:《無人軍隊:自主武器與未來戰爭》,北京:世界知識出版社,2019年,第153-156頁。

中國原創軍事資源:https://paper.people.com.cn/rmlt/pc/content/202502/05/content_30058889349.html

Chinese Military Exclusive Requirements for Strategies & Tactics of People’s War in The New Era

新時代中國軍隊對人民戰爭戰略戰術的獨特要求

現代英語:

Looking back on its glorious combat history, the People’s Army has consistently adhered to the absolute leadership of the Party, proposing and implementing a comprehensive set of strategies and tactics for people’s war. These strategies and tactics are a crucial weapon for the People’s Army to defeat the strong with the weak and to conquer the enemy. Over the past 98 years, with the changing times and evolving forms of warfare, the specific content and manifestations of the strategies and tactics for people’s war have continuously evolved. To confront the challenges of information-based and intelligent warfare, we must firmly grasp the essential requirements and value orientations of the strategies and tactics for people’s war amidst the rapidly evolving global trends and practices, unifying the inherently unchanging laws of conduct with the external realities of change, and continuously innovating and developing the strategies and tactics for people’s war in the new era.

President Xi Jinping emphasized that no matter how the situation develops, the magic weapon of people’s war must never be lost. However, we must grasp the new characteristics and new requirements of people’s war in the new era, innovate its content, methods and approaches, and unleash its overall power. Currently, facing profound challenges brought about by changes in science and technology, warfare, and our adversaries, we must not only inherit and carry forward the fine traditions of people’s war, but also be sensitive to changes, actively respond to them, and proactively seek change. We must accurately grasp the inherent requirements of the strategies and tactics of people’s war in the new era, consciously update our thinking and concepts, and innovate strategic guidance, so that this magic weapon of defeating the enemy can be demonstrated on future battlefields.

Adhere to relying on the people and deeply rooted

In the long practice of revolutionary war, the people are the most profound force for victory. The people are the primary force behind the strategies and tactics of people’s war, a magic weapon for victory. People’s war has its roots deeply rooted in the people, and its confidence comes from the people. Regardless of how the times change or how the war evolves, relying closely on the people and fully mobilizing them will always be the fundamental condition and the only way to carry out people’s war. Developing the strategies and tactics of people’s war in the new era requires adhering to the mass perspective of history and the fundamental requirement that soldiers and civilians are the foundation of victory. We must integrate the traditional strategic advantages of people’s war with the mass line, broaden the sources of vitality for the strategies and tactics of people’s war, draw strategic wisdom and tactical methods from the people, and develop an intellectual advantage for people’s war in the new era. We must solidly carry out national defense education throughout the nation, continuously foster a strong sense of patriotism, inspire patriotism, strengthen awareness of potential dangers, and enhance national defense awareness. We must guide the masses to actively care about and support national defense, thereby infusing powerful spiritual strength into people’s war in the new era. We must focus on promoting high-quality population development, comprehensively improve the cultural, scientific, and innovative qualities of the entire population, accelerate the development of a modern human resource base of high quality, sufficient in volume, optimized in structure, and rationally distributed, and promote the shift of the dominant force in people’s war from quantitative to qualitative. Further improve the national defense mobilization system and mechanism, promote the establishment of a rapid response system that is connected with the national emergency response mechanism and integrated with the joint combat system, fully tap and gather the unlimited war potential contained in the people, and give full play to the resource aggregation and value-added effect.

Focus on overall planning and full-area offense and defense

In the long-term practice of revolutionary warfare, the strategies and tactics of people’s war require the comprehensive mobilization of diverse forces and resources in the political, economic, cultural, diplomatic, and military sectors, and the integrated use of various forms of struggle and methods of operation. This holistic approach compensates for local deficiencies and disadvantages, ultimately defeating powerful adversaries. Modern warfare is not only a fierce confrontation in the military sphere, but also a comprehensive struggle in the political, economic, and diplomatic spheres, exhibiting the distinct characteristics of hybrid warfare. To develop the strategies and tactics of people’s war in the new era, we must establish a broad systemic mindset, relying on the national strategic system and supported by the joint operations system, explore the implementation methods of people’s war strategies and tactics, and win the total war of people’s war in the new era. We should fully leverage the advantages of the new national system, relying on the integrated national strategic system and capabilities, efficiently aggregate superior resources across the board, fully activate the country’s national defense potential, and weave various forces and resources into a network. We should integrate and plan the subsystems of people’s war, including leadership, organization, personnel, command, technology, equipment, and support, to maximize the effectiveness of holistic linkage and systemic operation, and achieve the maximum benefits of all-round effort and multiplied energy. We must strengthen comprehensive coordination across the physical, information, and social domains, focusing on seeking breakthroughs in new domains and new qualities, and making achievements in new dimensions such as unmanned warfare, human-machine collaborative warfare, network and electronic warfare, space and deep-sea warfare, and intelligent and autonomous warfare. Military and non-military means must be coordinated, integrating various forms of struggle, including political, economic, diplomatic, public opinion, and military. Comprehensive measures must be implemented to effectively wage diplomatic offensive and defensive battles, financial and trade battles, psychological defense battles, and public opinion and legal battles. We must leverage the combined effectiveness of political offensives and armed strikes to effectively fight the political and military battles.

Strengthen active defense and take the initiative

Through the long practice of revolutionary warfare, the People’s Army has developed a comprehensive strategic philosophy of active defense, emphasizing, for example, the unity of strategic defense and offensive action in campaigns and battles, the principles of defense, self-defense, and preemptive strike, and the principle of “if no one offends me, I will not offend; if someone offends me, I will certainly offend.” Active defense is fundamentally defensive, its essence lies in activeness, and its inherent characteristic is proactiveness. Currently, profound changes have taken place in the international, national, and Party, military, and political landscapes. The strategies and tactics of people’s war in the new era generally adhere to the fundamental principle of defense and are not aimed at hegemony, aggression, or oppression of other countries. Consequently, they will win the support and endorsement of the vast majority of the Chinese people, as well as the understanding and assistance of peace-loving and justice-loving countries and peoples around the world. Developing the strategies and tactics of people’s war in the new era must adapt to the times and circumstances. We must adhere to a defensive national defense policy, implement the military strategic guidelines of the new era, excel at observing and analyzing issues from a political perspective, and be adept at considering and applying strategies from regional and global perspectives to consolidate the political foundation for victory in people’s war. We must persist in neither provoking trouble nor fearing it, strengthen the regular and diversified use of military force, firmly and flexibly carry out military struggle, and while adhering to the strategic preemptive strike, we must not give up campaign and combat offensives under favorable conditions and when necessary. We must advance steadily, make progress within stability, and be proactive within stability, effectively shape the security situation, contain crises and conflicts, and firmly grasp the initiative in the struggle.

Highlight new quality dominance and technological empowerment

In the long practice of revolutionary warfare, while emphasizing that victory in war is primarily determined by people, not objects, the People’s Army has also placed great emphasis on the research and development of advanced military technology, particularly weaponry. Comrade Mao Zedong once emphasized that without modern equipment, it would be impossible to defeat the armies of imperialism. The technological content of modern warfare has undergone a qualitative leap, with advanced technologies and new weaponry such as artificial intelligence, big data, quantum computing, unmanned aerial vehicles, and brain control being widely applied in the military. While the people remain the decisive force in determining victory in war, the manifestation of this power has undergone significant changes. Science and technology are core combat power, and People’s War will place greater emphasis on the application of scientific and technological means and rely even more heavily on the wisdom and creativity of the people. Developing the strategies and tactics of People’s War in the new era should prioritize winning information-based and intelligent warfare. We should deeply study the essential characteristics, winning mechanisms, and strategies and tactics of high-end warfare, accelerate the shift from “winning by numbers” to “winning by talent,” and from “winning by manpower” to “winning by intelligence,” effectively enhance our ability to win through scientific and technological empowerment and digital intelligence, and truly unleash the crucial role of science and technology and talent in People’s War in the new era. We will accelerate the development of high-tech industries, vigorously strengthen the construction of new forces in new domains such as ocean, space, cyberspace, artificial intelligence, and quantum technology, increase military-civilian collaboration in high-tech fields, accelerate the transformation and application of new productive forces into new combat capabilities, and promote the expansion of war potential reserves into emerging fields and the focus on new forces. We will integrate and coordinate military and civilian scientific and technological advantages, shifting the focus from traditional support and guarantee elements such as human and material resources to new support and guarantee elements such as information, technology, and intelligence. We will build information, resource, and technology pools with profound foundations and rich reserves, actively cultivate capable, strong, and professional professional support units, and continuously expand the breadth and depth of people’s participation in the war and scientific and technological support.

Emphasis on flexibility, maneuverability, innovation and checks and balances

In the long-term practice of revolutionary warfare, the strategies and tactics of People’s War are highly flexible and maneuverable. Their most essential requirement is to prioritize self-reliance, attacking the enemy without being attacked by them. Based on the actual situation of both sides, we fight the battles based on our weapons, against the enemy, and at the right time and place. We identify the enemy’s weaknesses and vulnerabilities, leverage our strengths and advantages, and defeat the enemy with our own strengths, always seizing the initiative on the battlefield. Flexible and maneuverable strategies and tactics are the magic weapon for defeating an enemy with superior equipment with inferior equipment. “You fight yours, I fight mine” is a summary and generalization of the long-term experience of China’s revolutionary war and the soul and essence of the strategies and tactics of People’s War. Developing the strategies and tactics of People’s War in the new era must grasp the methodological requirements of asymmetric checks and balances, leverage innovative operational concepts, adhere to the mechanisms of victory in modern warfare, and continuously develop practical and effective tactics to defeat the enemy. We must proceed from the actual circumstances of both sides, gaining a deep understanding of operational missions, adversaries, and the evolving operational environment. We must thoroughly grasp the concepts, elements, and methods of victory, objectively analyze and study the strengths and weaknesses, advantages and disadvantages of both sides, know the enemy and ourselves, adapt to the situation, and flexibly utilize various combat forces and methods, striving to achieve maximum results at the lowest cost. We must adhere to the principle of “attacking the enemy without being attacked by them,” capitalize on strengths and avoid weaknesses, avoid the real and attack the weak, attack where the enemy is least prepared, and attack where they must be defended. We must proactively create opportunities, flexibly maneuver the enemy, and fight wherever we are most advantageous and wherever we are most skilled. We must adhere to the principle of “using what we can to defeat what we cannot,” advancing the research and application of military theory, operational guidance, tactics, and training methods in a timely manner, innovating core operational concepts, and developing new types of combat methods. We must fight against the enemy’s tactics, targeting their weaknesses, and leveraging our military’s strengths, thus creating new winning advantages in people’s war through asymmetric checks and balances.

Emphasis on accumulating small things into big things and focusing on unity of purpose

Throughout the long practice of revolutionary warfare, our army has been at an overall disadvantage for considerable periods. Therefore, the strategies and tactics of people’s war emphasize leveraging strength against weakness locally, persisting in accumulating small victories into larger ones, and concentrating forces to wage annihilation campaigns. This has become a key strategy for the people’s army to defeat powerful foes. Compared to previous eras, modern warfare often unfolds across multiple dimensions and domains, providing greater scope for implementing this strategy of “accumulating small victories into larger ones.” Developing the strategies and tactics of people’s war in the new era requires strengthening the concept of “dispersed in appearance, yet focused in spirit; dispersed in form, yet united in strength.” This involves dynamically consolidating and uniting the numerous combat forces distributed across the multidimensional battlefield. Through the fusion of capabilities and immediate optimization, we can launch rapid localized focused-energy attacks, wide-area guerrilla harassment, and deliver annihilating and destructive strikes against key enemy locations. This not only creates a hammering effect, but also continuously wears down the enemy, gradually depriving them of the initiative on the battlefield. This highly integrated distributed warfare emphasizes the wide-area dispersion of troop deployment and the discrete distribution of capabilities. Based on the needs of achieving operational intent, objectives, and missions, it prioritizes the best operational elements, units, and forces. Through the integration of operational capabilities and the accumulation of operational impacts, it aggregates optimal operational effects, unleashes maximum operational potential, maximizes operational effectiveness, and achieves optimal operational results. This distributed warfare has evolved from “geographical dispersion” to “dynamic coupling across all domains and dimensions”: no longer limited to the physical dispersion of personnel and equipment, it extends to multi-dimensional battlefields such as cyber, electromagnetic, and cognitive. Relying on data links, artificial intelligence, and distributed command systems to achieve cross-domain collaboration, it significantly enhances battlefield survivability and multiplies strike effectiveness.

現代國語:

編者按

回望輝煌戰鬥歷程,人民軍隊始終堅持在黨的絕對領導下,提出並實施了一整套人民戰爭戰略戰術,這是人民軍隊以弱勝強、克敵制勝的重要法寶。 98年來,隨著時代變遷和戰爭形態演變,人民戰爭戰略戰術的具體內容和表現形式不斷發展變化。直面資訊化智慧化戰爭挑戰,我們要在快速變化發展的世界大勢和實踐樣態中,牢牢把握人民戰爭戰略戰術的本質要求和價值取向,把內在不變的規律性特徵與外在變化的現實性特徵統一起來,不斷創新發展新時代人民戰爭戰略戰術。

習主席強調指出,無論形勢如何發展,人民戰爭這個法寶永遠不能丟,但要把握新的時代條件下人民戰爭的新特點新要求,創新內容和方式方法,充分發揮人民戰爭的整體威力。當前,面對科技之變、戰爭之變、對手之變帶來的深刻挑戰,我們既要繼承發揚人民戰爭優良傳統,也要敏銳識變、積極應變、主動求變,準確把握新時代人民戰爭戰略戰術內在要求,自覺更新思維理念,創新戰略指導,讓克敵制勝的法寶顯威未來戰場。

堅持依靠人民、深根基

在長期革命戰爭實踐中,人民群眾是戰爭勝利最深厚的偉力。人民戰爭戰略戰術,人民是構成這一制勝法寶的主體,人民戰爭的根基深植於人民、底氣來自於人民,無論時代如何發展、戰爭如何演進,緊緊依靠人民、充分動員群眾,永遠是開展人民戰爭的基礎條件和不二法門。新時代條件下發展人民戰爭戰略戰術,必須堅持群眾史觀和兵民是勝利之本的根本要求,把人民戰爭的傳統謀略優勢和群眾路線結合起來,拓展人民戰爭戰略戰術的源頭活水,從人民群眾中汲取戰略智慧和策略方法,形成新時代人民戰爭的智力優勢。札實開展全民防衛教育,不斷厚植家國情懷,激發愛國動力,強化憂患意識,增強國防觀念,引導廣大群眾主動關心國防事業、支持國防建設,為新時代人民戰爭注入強大精神力量。聚力推進人口高品質發展,全面提升全民文化素質、科技素質和創新能力,加速塑造素質優良、總量充裕、結構優化、分佈合理的現代化人力資源,推動人民戰爭主體由數量優勢向質量優勢轉變。進一步完善國防動員體制機制,推動建立與國家應急響應機制相銜接、與聯合作戰體系相融合的快速響應制度,把內含於人民群眾中的無限戰爭潛力充分挖掘出來、聚攏起來,充分發揮資源集聚增值效應。

注重整體運籌、全域攻防

在長期革命戰爭實踐中,人民戰爭戰略戰術要求整體動員政治、經濟、文化、外交、軍事等多方面的力量資源,綜合運用多種鬥爭形式和作戰方式,以整體合力彌補局部的不足和劣勢,從而戰勝強大對手。現代戰爭既是軍事領域的激烈對抗,也是政治、經濟、外交等領域的全面角力,整體呈現混合戰爭的鮮明特徵。新時代條件下發展人民戰爭戰略戰術,必須確立大體系思維模式,以國家戰略體係為依托,以聯合作戰體係為支撐,探索人民戰爭戰略戰術的實現形式,打贏新時代人民戰爭總體戰。應充分發揮新型舉國體制優勢,依託一體化國家戰略體系與能力,高效能聚合全域優勢資源,全方位激活國家國防潛力,將各種力量資源擰線成繩、結繩成網,把人民戰爭的領導要素、組織要素、人員要素、指揮要素、技術要素、裝備要素、保障要素等分系統結合起來,統合、統合方式要加強物理域、資訊域、社會域等領域全面統籌,重點在新域新質上尋求突破,在無人作戰、人機協同作戰、網電作戰、太空深海作戰、智慧自主作戰等新維度有所作為。軍事與非軍事手段相互配合,把政治、經濟、外交、輿論和軍事鬥爭等多種形式結合起來,綜合施策著力打好外交攻防戰、金融貿易戰、心理防護戰、輿論法理戰等,發揮政治攻勢和武裝打擊的綜合效能,統籌打好政治軍事仗。

強化積極防禦、主動進取

在長期革命戰爭實踐中,人民軍隊形成了一整套積極防禦戰略思想,如堅持戰略上防禦與戰役戰斗上進攻的統一,堅持防禦、自衛、後發製人的原則,堅持“人不犯我,我不犯人;人若犯我,我必犯人”,等等。積極防禦,根本在防禦、要義在積極,主動進取是其內在特質。當前,世情國情黨情軍情發生深刻變化,新時代人民戰爭的戰略戰術在總體上堅持防禦性的根本原則,不以霸道霸權和侵略欺壓他國為目的,因此也會贏得國內最廣大人民群眾擁護和支持以及世界上愛好和平與正義的國家和人民的理解和幫助。新時代條件下發展人民戰爭戰略戰術,須應時而變、應勢而動。堅持奉行防禦性國防政策,貫徹落實新時代軍事戰略方針,善於從政治高度出發觀察和分析問題,善於從地區和全球視角來思考和運用策略,夯實人民戰爭制勝的政治基礎。堅持不惹事也不怕事,加強軍事力量常態化多樣化運用,堅定靈活開展軍事鬥爭,在堅持戰略上後發製人的同時,不放棄有利條件下和必要時的戰役戰鬥進攻,穩紮穩打、穩中有進、穩中有為,有效塑造安全態勢,遏止危機沖突,牢牢把握爭鬥主動權。

突顯新質主導、科技賦能

在長期革命戰爭實踐中,人民軍隊在強調決定戰爭勝負的主要因素是人而不是物的同時,同樣高度重視對先進軍事技術特別是武器裝備的研發。毛澤東同志就曾強調,沒有現代的裝備,要戰勝帝國主義的軍隊是不可能的。現代戰爭的科技含量發生了質的飛躍,人工智慧、大數據、量子計算、無人自主、腦控等高新技術與新型武器裝備廣泛應用於軍事領域。雖然人民群眾依然是戰爭勝負的決定性力量,但是這種力量的表現形式發生了重要變化。科技是核心戰鬥力,人民戰爭將更重視科技手段的運用,更依賴人民群眾的智慧和創造力。新時代條件下發展人民戰爭戰略戰術,應把打贏資訊化智能化戰爭作為戰爭準備的著眼點,深研高端戰爭的本質特徵、制勝機理、戰略戰法,加速推動從「人多製勝」向「人才制勝」、從「人力製勝」向「智力製勝」轉變,切實提高新科技賦能、數智者發揮勝利能力、數智性的科技人才、新人民主義中的關鍵人民發揮作用。加速推進高新產業發展,大力加強海洋、太空、網路空間、人工智慧、量子科技等新域新質力量建設,加大高新技術領域軍地協作力度,加速新質生產力向新質戰鬥力轉化運用,推動戰爭潛力儲備向新興領域拓展、向新質力量聚焦。聚合協同軍地科技優勢,由聚焦人力物力等傳統支撐保障要素向聚焦資訊、技術、智慧等新質支撐保障要素轉變,建設底蘊深厚、儲備豐富的資訊池、資源池、技術池,積極打造精幹強能、專業性強的專業支前分隊,不斷拓展人民參戰與科技支前的廣度與深度。

講究靈活機動、創新制衡

在長期革命戰爭實踐中,人民戰爭戰略戰術是高度靈活機動的戰略戰術,最本質的要求是堅持以我為主,致人而不致於人,根據敵我雙方的實際情況,有什麼武器打什麼仗,對什麼敵人打什麼仗,在什麼時間地點打什麼時間地點的仗,找準敵之弱點和軟肋,發揚我之長主動和優勢,能永遠不能掌握戰場。靈活機動的戰略戰術是以劣勢裝備戰勝優勢裝備之敵的致勝法寶。 “你打你的、我打我的”,是中國革命戰爭長期經驗的總結和概括,是人民戰爭戰略戰術的靈魂和精髓。新時代條件下發展人民戰爭戰略戰術,必須掌握非對稱制衡的方法論要求,以作戰概念創新為抓手,遵循現代戰爭制勝機理,不斷推出實用管用的克敵制勝招法。堅持一切從敵我雙方的實際情況出發,深刻洞悉作戰任務、作戰對手、作戰環境變化,深刻把握制勝觀念、制勝要素、制勝方式發展,客觀分析研究敵我雙方的強弱、優劣,知彼知己、因勢而變,靈活運用各種作戰力量和作戰方法,努力以最小代價取得最大戰果。堅持“致人而不致於人”,揚長避短、避實就虛,出其不趨、攻其必救,主動創造戰機,靈活調動敵人,怎麼有利就怎麼打,怎麼擅長就怎麼打。堅持“以能擊不能”,與時俱進推進軍事理論、作戰指導、戰法訓法研究運用,創新核心作戰概念,發展新質作戰手段,不按敵人套路打、盯著敵人軟肋打、發揮我軍優長打,在非對稱制衡中創造人民戰爭新的製勝優勢。

重視積小為大、神聚力合

在長期革命戰爭實踐中,我軍在相當長的時間內都是處於全局上的劣勢地位,所以人民戰爭戰略戰術重視局部上以強對弱,堅持積小勝為大勝,集中力量打殲滅戰,這成為人民軍隊戰勝強敵的關鍵一招。相較於以往,現代戰爭作戰往往在多維多域中展開,為實施「積小勝為大勝」提供了更加廣闊空間。新時代條件下發展人民戰爭戰略戰術,要強化「貌散而神聚,形散而力合」的理念,將分佈在多維戰場的諸多作戰力量動態集中聯合起來,通過效能融合、即時聚優,實施局部快速聚能攻擊、廣域遊擊襲擾,對敵分佈的要點實施殲這種神聚力合的分散式作戰更強調兵力部署廣域分散、能力狀態離散分佈,根據實現作戰企圖、達成作戰目的、遂行作戰任務需要,優選最佳作戰要素、單元、力量,通過作戰能力融合、行動作用累積,聚合最優作戰效應,激發最大作戰潛能,實現作戰效益最大化,達成最佳作戰效果。這種分散式作戰已經從「地理空間的分散」上升為「全局全維的動態耦合」:不再局限於人員裝備在物理空間的分散,而是拓展到網絡、電磁、認知等多維戰場;依託數據鏈、人工智能和分佈式指揮系統實現跨域協同,既極大提升了戰場生存力,又倍增了打擊效能。

中國原創軍事資源:http://www.81.cn/szb_223187/szbxq/index.html?paperName=jfjb&paperDate=2025-08-01&paperNumber=07&articleid=960384888

Military Intelligence Drives Accelerated Development of Chinese Army Cyberspace Operations

軍事情報推動中國軍隊網路空間作戰加速發展

現代英語:

The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.

Military intelligence leads to accelerated development of cyberspace operations

■Respect the soldiers Zhou Dewang and Huang Anwei

Three major technologies support the intelligence of cyberspace weapons

Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:

First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.

Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.

Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.

The intelligent trend of network-controlled weapons has become increasingly prominent

Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.

In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.

Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.

Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.

Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.

Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.

Intelligent command information system changes traditional combat command methods

Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.

In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.

In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.

To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.

In the future battlefield, fighting courage requires more fighting “wisdom”

■Yang Jian and Zhao Lu

At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.

Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.

It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.

In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.

現代國語:

資料來源:中國軍網綜合作者:敬兵 周德旺 皇安偉 等責任編輯:胡雪珂

黨的十九大報告指出,要「加速軍事智慧化發展,提升基於網路資訊體系的聯合作戰能力、全域作戰能力」。今天的《解放軍報》刊發文章指出,軍事智能化是機械化、資訊化之後軍事領域發展的新趨勢和新方向,我們要在現有機械化和資訊化基礎上發展智能化,同時用智能化牽引機械化和信息化向更高水平、更高層次發展。網路空間作為新型作戰領域,是科技含量高、最具創新活力的新領域,在軍事智慧化的牽引下,正迎來快速發展的機會期。

軍事智慧化牽引網路空間作戰加速發展

■敬兵 週德旺 皇安偉

三大技術支撐網路空間武器智慧化

智能是一種智慧和能力,是一切有生命週期的系統對規律的感應、認知與運用,智能化就是把這種智慧和能力固化下來,成為一種狀態。網路空間武器是網路空間遂行作戰任務的武器,其形態以軟體和程式碼為主,本質上是一段資料。網路空間武器的智慧化主要體現在以下三個方面:

一是智慧化漏洞挖掘。漏洞是網路武器設計的基礎,今年5月在全球傳播的勒索病毒軟體,就是利用了微軟作業系統漏洞,為網路安全界帶來了巨大震動。漏洞價格昂貴,零日漏洞價值幾萬到幾十萬美元不等。過去漏洞的發現,主要依靠有經驗的駭客,利用軟體工具對程式碼進行檢查和分析。今年中國網路安全大會期間舉辦的國際網路安全技術對抗聯賽總決賽中,參賽人員示範由智慧機器人現場進行漏洞挖掘,然後透過漏洞編寫網路程式碼,形成網路武器,攻破目標系統,奪取旗幟。這項變化,意味著漏洞挖掘進入了智慧化時代。

二是智能化訊號分析和密碼破譯。訊號是網路資料傳輸的載體,密碼是網路資料安全的最後屏障,訊號分析和密碼破解是網路空間作戰的核心技術,突破訊號和密碼是進入網路空間的基本路徑,也是網路武器攻擊的首要目標。智慧化訊號分析將訊號的協定分析、調變辨識、個體辨識等問題,透過大數據、雲端運算、深度學習等技術來解決。密碼破解是計算科學“皇冠上的明珠”,智能化密碼破譯通過對密碼數據樣本的積累,不斷學習、尋找規律,能找到破譯的鑰匙,從而打開網絡數據“保險櫃”的最後一扇門,解決網絡入侵和接入的關鍵環節。

三是智慧化武器平台設計。美軍在2009年提出「網路飛行器」項目,為網路空間作戰提供像戰車、艦艇、飛機這樣的平台,可以實現在網路空間裡自動偵察、載入網路武器、自主協同、自主攻擊,受到威脅時自我銷毀、清除痕跡,具備了一定的智慧化特徵。未來「網路飛行器」載入的武器,不是軟體人員編好的程式碼,而是根據偵察結果直接對發現的漏洞,現場即時進行智慧化網路武器設計,實現「訂購式」開發,從而大大提高網路空間作戰的針對性。

網控武器的智慧化趨勢愈加凸顯

受網路空間控制的武器簡稱網路武器,是透過網路連接,接受網路空間指令,執行跨域任務,在實體空間達成作戰效果的武器。未來的各種作戰武器平台,大多是聯網的武器平台,這樣軍事資訊網本質上就是物聯網,上聯衛星、雷達、無人機等網路實體,從感知到發現、追蹤、定位、打擊都可透過網路空間控制,網控武器的智慧化已在陸海空天電等戰場蓬勃發展。

2015年,敘利亞利用俄羅斯機器人軍團擊潰武裝分子,行動採用了包括6個履帶式機器人、4個輪式機器人、1個自動化火砲群、數架無人機和1套指揮系統。指揮官透過指揮系統調度無人機偵察發現武裝分子,機器人向武裝分子發動衝鋒,同時伴隨火砲和無人機攻擊力量支援,對武裝分子進行了致命打擊。這只是一場小規模的戰鬥,卻開啟了機器人「組團」作戰的先河。

海空戰場網控智慧武器正在大量研發驗證。 2014年,美國海軍使用13艘無人水面艇,示範驗證無人艇集群攔截敵方艦艇,主要透過交換感測器數據,取得了不錯的效果。 2016年再次試驗時,新增了協同任務分配、戰術配合等功能,「蜂群意識」成為其智慧化的顯著特徵。

用於空中作戰的小微型無人機蜂群也正在快速發展。近年來,美國國防部多次試驗「山銻」微型無人機,可一次投放數十架乃至上百架,透過提升其執行偵察任務時的協同能力,在無人機編隊、指揮、控制、智慧化管理等方面都取得了進展。

空天網控武器越來越「聰明」。空天領域主要包含偵察和打擊兩類網控武器,各種功能的衛星主要執行偵察任務,是典型的偵察感測器。隨著各種小微衛星群的出現,使衛星表現出新的特徵:體積小、發射快、數量多、更聰明。小微衛星群在執行偵察和通訊任務時,有了更大的彈性和可靠性,目前世界衛星強國都在積極制定覆蓋範圍更廣的小微衛星群計畫。

各種高超音速打擊武器在空天巡航,彷彿懸在人們頭頂的利劍。美國空軍研究室稱「高速打擊武器」將在2018年前後啟動飛行試驗,其它各國也正積極研發類似武器。這類武器最大的特色是速度快、航程遠、智能化程度高。

智慧化指揮資訊系統改變傳統作戰指揮方式

網路空間武器和受網路空間控制的武器,是智慧化戰爭的“拳頭”,而指揮這些武器運用的指揮資訊系統是智慧化戰爭的“大腦”,網路空間作戰指揮資訊系統要同步跟上智慧化的進程。目前,幾乎全球的指揮資訊系統都面臨著「智慧滯後」的難題,未來戰爭需要快速決策、自主決策,這對智慧輔助系統提出了更高要求。

2007年,美國國防部高級研究計劃局啟動關於指揮控制系統的研發計劃——“深綠色計劃”,以期能實現計算機輔助指揮官快速決策贏得制勝先機。這是一個戰役戰術級的指揮資訊系統,其研發目的是將該系統嵌入美國陸軍旅級C4ISR戰時指揮資訊系統中去,實現指揮官的智慧化指揮。直到今天,美軍也沒有放鬆對智慧化指揮資訊系統的發展。

在網路空間作戰中,網路目標表現為一個接取網路的IP位址,數量眾多導致人工難以有效率操作,作戰更需要智慧化指揮資訊系統的輔助支撐。目前,智慧化指揮資訊系統需要實現智慧情報分析、智慧感知、智慧導航定位、智慧輔助決策、智慧協同、智慧評估、智慧化無人作戰等功能,尤其是實現對無人網控系統的集群作戰操控,這都對智慧化指揮資訊系統提出了迫切需求,需要加快相應關鍵技術的研發和運用。

綜上所述,智慧化的網路武器和網路控制武器,透過智慧化的資訊系統調度,將形成巨大的作戰能力,基本能遂行現行作戰樣式中的所有行動。未來戰爭,從指揮力量編組、到目標選擇、行動方式、戰法運用等,都將在智能化的背景下展開,戰爭「遊戲化」的特徵將更顯著,作戰指揮方式也將發生重大變化。

未來戰場 鬥勇更需鬥“智”

■楊建 趙璐

目前,人工智慧發展進入嶄新階段,並開始向各個領域加速滲透。受此一進程的影響,各國圍繞智慧化的軍事競爭已揭開序幕。我軍歷來是一支英勇頑強、敢打必勝的人民軍隊,未來戰場上應繼續發揚光榮傳統,同時要更加廣泛地掌握和利用最新的科技成果,研製出更多智能化的武器裝備,在未來戰場上掌握制勝先機。

智慧化是人類社會發展的趨勢,智慧化戰爭正加速到來。正是由於超越原有體系結構計算模型的成功創新、奈米製造技術的逐步普及,以及對人腦機制研究的突破性進展,軍事智慧化發展才擁有了堅實的基礎。因此,智慧化武器裝備的表現日益突出,並在情報分析、戰鬥反應等方面開始超越並取代人類。此外,在人力需求、綜合保障、運作成本等方面,智慧化武器裝備也具有明顯的優勢,日益成為戰爭的主導力量。

事實證明,智慧化武器裝備的發展應用,拓展了軍事行動的能力範圍,大幅提升了部隊的作戰效能。在阿富汗和伊拉克戰場上,無人機已承擔了大部分偵察、情報、監視等作戰保障任務,並承擔了約三分之一的空中打擊任務。近兩年,俄羅斯在敘利亞戰場上也曾多次使用較高智慧化程度的無人偵察機、戰鬥機器人等裝備。智慧化武器裝備正愈來愈地展現出超越傳統武器的重要價值。

未來戰爭中,作戰體系智能化的較量將是高手過招、巔峰對決的勝利關鍵。隨著以科技為支撐的軍事手段發展的不平衡性越來越大,誰先具備實施智能化作戰的能力,誰就更能掌握戰場的主動權,擁有技術代差優勢的強者會盡可能將戰爭成本降到最低,而弱者必然遭受巨大損失,付出慘重代價。我們不僅要加緊核心技術創新、武器裝備研製,還要研究探索適應軍事智能化發展的組織結構、指揮方式和運用模式,更要培養一支能夠擔起推進軍事智能化發展、鍛造智能化作戰能力的人才隊伍,充分發揮我軍作戰體系的整體效能,在與對手的較量中,以更加“智慧”的方式贏得戰爭。

中國原創軍事資源:http://www.81.cn/jwzl/2017-11/24/content_7841895888.htm

Chinese Military Deciphering Cognitive Warfare Codes Capability Based on Operational Decision Chains

中國軍隊基於作戰決策鏈破解認知戰密碼的能力

現代英語:

Cognition is the basis for operational decisions and operations. Cognitive warfare is a confrontation activity carried out in the cognitive domain. The purpose is to attack the enemy’s knowledge system, social consciousness, people’s morale, etc., disrupt its judgment and decision-making, and cause it to lose its decision-making advantage and action advantage. To deepen the research on cognitive warfare and decipher the cognitive warfare code, the key is to embed the combat decision-making chain and explore how to influence and interfere with the cognitive activities of the enemy’s decision-making chain, causing the enemy to form false observations, wrong judgments and poor decisions, so as to fully control Cognitive initiative.

Seeing is false, changing the facts

Observation is the starting point of cognition. No matter what kind of war, when facing any opponent, the first step is observation. The observation here is a broad concept and is about all activities to obtain all relevant information about the hostile party. Just as people perceive external things through sensory organs, observation relies on the battlefield perception system to obtain relevant data and information from the battlefield environment according to the needs of the subject, providing “ source material ” for judgment and decision-making. Observation uses intelligence, reconnaissance, surveillance and other activities to obtain as much factual information and materials from all aspects of the enemy as possible and convert them into text, images, audio, video and sensor signals.

The history of war at home and abroad in ancient and modern times shows that the essence of command is the endless pursuit of certainty, including the status and intentions of enemy troops, various factors affecting the combat environment such as weather and terrain, as well as the status and actions of one’s own troops. Therefore, efficient command consists in clarifying each element and then coordinating it as a whole to achieve the best combat effect. Human judgment and decision-making are easily disturbed by information uncertainty. In the observation stage, the key to cognitive warfare is to make the enemy unable to clearly observe, incompletely observe, and distort the information of their own combat elements, and lack real information or accurate understanding, thereby weakening the enemy’s decision-making on combat at the source. The pursuit of certainty.

Measures for observing cognitive warfare, in addition to common information warfare methods, such as disguise, interference, deception, silence, etc., should also pay attention to the following aspects: First, create complex situations. War is inherently full of complexity. By creating complexity, it increases the fog and resistance on the battlefield, making it impossible for the enemy to observe the real specific situation. For example, by creating various events and operations in multi-dimensional combat areas such as land, sea, air, sky, and network, and making irregular changes, it can effectively increase the difficulty of enemy observation. The second is to interfere with observation and cognition. Observation is not aimless. It is carried out based on a certain cognition. Cognition determines what information needs to be observed, what kind of reconnaissance activities need to be carried out, etc. For example, during observation activities, by interfering with operations, the enemy’s attention in observation activities is affected, causing it to lose the ability to focus on essential issues and key issues, thereby making it unable to obtain key information. The third is to shape the factual narrative. Shaping factual narratives is to reformulate, combine, arrange, and reconstruct facts according to the needs of cognitive warfare. These facts are either created out of nothing, highlight certain details in the facts, or are difficult to verify and test, making their observation materials Mixed with fictional facts, the observed facts are far from objective facts. The fourth is to protect specific knowledge. Knowledge protection is an important aspect of cognitive warfare. The main contents include: commander’s decision-making style, combat theory reasoning process, premises and assumptions, key tactical ideas and combat principles, key decision-making procedures, mechanisms and methods, information analysis methods, especially some algorithms, passwords, etc.

Targeting the judgment, misleading the judgment

On the battlefield, simple observation and data collection do not make much sense. Only by analyzing these data “ by looking at the essence of the phenomenon, and then drawing various judgments, will we promote the formation of operational decisions. For example, during the Battle of Moscow in World War II, the Soviet Union had a lot of and messy information about the Japanese Kwantung Army. Finally, after careful analysis, it was concluded that “ the Soviet Union could be considered safe in the Far East, and the threat from Japan had been ruled out ” After the judgment, it was decided to transfer troops from the Far East to Moscow to participate in the Battle of Moscow. Judgment is the corresponding conclusion reached by analyzing and reasoning the observation results, which mainly includes: first, factual judgment, usually expressed in descriptive language, such as the current situation, enemy battlefield deployment, battlefield posture, etc.; second, value and relationship judgment, usually Expressed in evaluative language, such as threat assessment, correlation analysis, trend prediction, etc.

Judgment cognitive warfare is actually a game surrounding judgment. Normally, judgments arise on the basis of a judgment, without which there would be no conclusion of judgment. Whether a person has high blood pressure or diabetes is often based on some medical indicators, and these indicators are the criteria. The premises and assumptions of reasoning are actually based on judgments. “ Persian cat story ” circulated in World War I. Judging from the location of the command post from a Persian cat, it contains a series of judgments: there is no village around, and it cannot be a cat raised by ordinary civilians; the sound of artillery on the battlefield is rumbling, and it cannot be It is a wild cat that is cautious and avoids people; Persian cats are a valuable breed, and the position of cat owners is not low; cats appear at fixed times every day, and the command post should be near cats. Therefore, interfering with judgment is to target the judgment to design and produce information products so that the facts obtained do not match the judgment, or to minimize the leakage of information related to the judgment, so that the enemy cannot judge or make wrong judgments.

The main contents of the interference criterion are: First, the interference is based on experience. Based on enemy experience, create “ virtual facts ” to make errors in judgment. For example, in the Battle of Maling, Sun Bin halved the stove to lure Pang Juan, which is a typical example. Because according to experience, the number of stoves is directly proportional to the number of troops. Halving the number of stoves every day means that the number of people is decreasing. The possibility of reduction is that the soldiers have suffered greater casualties, which leads to the judgment of weakening combat power. The second is to interfere with the judgment based on the knowledge system. Such knowledge includes the enemy’s common sense, concepts, principles and some assumptions. For example, in the Fourth Middle East War that broke out in October 1973, Israel’s initial defeat was a misjudgment of the war situation. It believed that as long as its air force was still in an advantageous position, the other side would never dare to attack. However, Egypt began to adopt new military technology and used mobile surface-to-air missiles to support an air defense network, partially offsetting Israel’s air superiority. The third is to interfere with judgments based on universal culture. That is, design corresponding information and actions based on the enemy’s cultural characteristics so that they can be misjudged due to cultural differences. According to foreign information, during the Cold War, the United States studied the root causes of “ Soviet behavior, so it started from culture and behavior to induce the Soviet Union to make strategic misjudgments. The fourth is to interfere with methodological-based judgments. Generalizations, analogies, etc. are the basic methods of judgment. Cognitive interference based on methodology makes it difficult for the other party to understand facts and cannot be compared with known facts; complicating the causal relationship and confusing factual cause and effect, psychological cause and effect, conditional cause and effect, social cause and effect, etc., making it impossible to implement causal judgment; reducing possible signs and phenomena, making it impossible to see through the essence and make accurate judgments.

Focus on the process and influence decision-making

Operational decision-making is based on combat purposes and intentions. After observation and judgment, various factors are combined to derive the optimal solution to the problem. War or conflict behavior has game, competition and confrontation attributes, so decision-making is a game. Decisions address key issues such as whether to do it, how to do it, what purpose to achieve, or the state of termination. In information-based local wars, action-centeredness gradually replaces planning-centeredness, requiring an increase from data center warfare, information center warfare, and knowledge center warfare to decision-making center warfare. Combat decision-making has become one of the main areas of competition between the enemy and ourselves.

Decision-making cognitive warfare is to target enemy cognition and interfere with the decision-making process to affect the quality and efficiency of decision-making. Decision-making is affected by the knowledge structure of the decision-maker himself. If cognition is paranoid or the knowledge reserve is outdated, even if the judgment is correct, good decisions will still not be made. The decision-making process includes the application and change process of knowledge structure, which mainly involves procedural knowledge and conceptual principled knowledge. The former includes decision-making procedures and methods, decision-making mechanisms and evaluation methods, etc., while the latter includes understanding of battlefield posture, winning mechanism, combat concepts, combat rules, and weapons and equipment performance. Therefore, cognitive attacks on the decision-making process will greatly affect its decision-making speed and quality.

The main ways to influence cognitive warfare in decision-making are: First, squeezing the cognitive decision-making space. When watching tennis matches, commentary on non-forced errors and forced mistakes are often heard, with forced mistakes being those caused by putting pressure on the opponent. Interfering with the cognitive decision-making environment is to put pressure on the enemy’s cognitive decisions, thereby squeezing the cognitive space and weakening cognition to force the enemy to make mistakes in decision-making. For example, through virtual and real decision-making activities and actions, the opponent is trapped in decision-making difficulties, which increases the probability of low-level decision-making. The second is to attack rational cognition. Including: First, interfering with the understanding of threats and opportunities. Many examples of failures in military history are caused by misjudgment of threats and opportunities on the battlefield. Whether you despise the enemy or overestimate the enemy, you will form decision-making expectations that are different from objective reality, leading to adverse action results. Second, attack combat theory and doctrine. For example, by proposing the theory of mutual restraint, deliberately exaggerating the loopholes in the enemy’s doctrine, and amplifying the adverse effects of the enemy’s combat operations, the enemy can arouse doubts about its own theory and doctrine. Third, for procedural knowledge. Including decision-making mechanisms, procedures and methods, plan evaluation and combat evaluation methods, auxiliary decision-making systems, algorithms, thinking, etc. Attacking the weaknesses present will also cause decision-making errors. The third is to interfere with irrational factors. The use of irrational factors often creates decision-making traps, such as groupthink traps, conceit traps, etc., which have a significant impact on decision-making. The strategic deception successfully implemented by the Allied forces many times during World War II was to use the enemy’s ambiguous and misleading analysis to increase the probability that the wrong decision would win.

現代國語:

來源:中國軍網-解放軍報 作者:吳中和 朱小寧 責任編輯:王韻
2022-09-13 06:48:xx
吳中和 朱小寧

引言

認知是作戰決策與行動的基礎。認知戰是在認知域進行的對抗活動,目的是攻擊敵知識體系、社會意識、民心士氣等,打亂其判斷與決策,使其失去決策優勢與行動優勢。深化認知戰研究,破譯認知戰密碼,關鍵是嵌入作戰決策鏈,探究如何影響和乾擾敵決策鏈的認知活動,致敵形成不真實的觀察、錯誤的判斷和糟糕的決策,從而充分掌控認知主動權。

眼見為虛,改變事實

觀察是認知的起點。無論何種戰爭,面對任何對手,首先要做的第一步就是為觀察。這裡的觀察是一個廣義概念,是關於獲得敵對方所有相關資訊的一切活動。正如人類透過感覺器官感知外界事物一樣,觀察依托戰場感知系統,根據主體需要從戰場環境中獲得相關數據與訊息,為判斷和決策提供「原始材料」。觀察通過情報、偵察、監視等活動,盡可能多地獲取敵對方各方面的事實信息與材料,並將其轉化為文本、圖像、音頻、視頻和傳感器信號等。

古今中外的戰爭史表明,指揮的本質是對確定性的無盡追求,包括敵軍部隊狀態和意圖,天候、地形等影響作戰環境的種種因素,以及己方部隊的狀態和行動。因而,高效率的指揮在於廓清每個要素,然後將其整體協調起來行動,以達成最佳作戰效果。而人的判斷決策,很容易受資訊的不確定性幹擾。在觀察階段,認知戰的關鍵就在於,使敵人對己方各種作戰要素觀察不清、觀察不全、觀察的信息失真混亂,缺乏真實信息或準確理解,從而從源頭上削弱敵方對作戰決策確定性的追求。

觀察認知戰的措施,除了通常的資訊戰方法,如偽裝、幹擾、欺騙、靜默等,還應注意以下方面:一是製造復雜局面。戰爭本來就充滿複雜性,通過製造複雜性,增加戰場的迷霧和阻力,使敵人無法觀察到真實具體情況。如,透過在陸、海、空、天、網絡等多維作戰域製造各種事件與行動,並作無規則變動,可有效增加敵方觀察的難度。二是乾擾觀察認知。觀察不是毫無目的的,是基於某種認知進行的,認知決定需要觀察哪些資訊、採取何種偵察活動等。如,在觀察活動中,透過幹擾行動,影響敵方觀察活動的注意力,使其失去聚焦本質問題、關鍵問題的觀察能力,進而使其始終無法獲得關鍵資訊。三是塑造事實敘事。塑造事實敘事,就是根據認知戰需要,重新表述、組合、編排、再建構事實,這些事實要麼是無中生有,要麼是突出事實中的某些細節、要麼是難以查實和檢驗等,使其觀察材料中混雜於虛構事實,觀察的事實與客觀事實相距甚遠。四是保護特定知識。知識保護是認知戰的重要面向。主要內容有:指揮員決策風格,作戰理論推理過程、前提與假設,關鍵戰術思想與作戰原則,關鍵決策程序、機制與方法,資訊分析方法特別是一些演算法、密碼等。

瞄準判據,誤導判斷

戰場上,簡單的觀察和資料收集並沒有太多意義,只有對這些數據進行「透過現像看本質」地分析,進而得出各種判斷,才會推動形成作戰決策。如第二次世界大戰莫斯科保衛戰中,蘇聯有關日本關東軍的資訊多而雜亂,最後經過縝密分析,得出「蘇聯在遠東地區可以認為是安全的,來自日本方面的威脅已排除」的判斷後,才決定將遠東方面的部隊調往莫斯科,參加莫斯科保衛戰。判斷是對觀察結果進行分析推理而得出的相應結論,主要包括:一是事實判斷,通常用描述性語言表達,如當前形勢、敵方的戰場部署、戰場態勢等;二是價值和關系判斷,通常用評價性語言表達,如威脅評估、關聯分析、趨勢預測等。

判斷認知戰,實際上是圍繞判據展開的一種博弈。通常情況下,判斷是基於判據產生的,沒有判據,就不會有判斷結論。一個人是否患有高血壓、糖尿病,往往基於一些醫學指標,這些指標就是判據。推理的前提與假設,實際上也是基於判據。一戰中流傳的“波斯貓的故事”,從一隻波斯貓判斷出指揮所位置,就包含著一系列判據:周圍沒有村莊,不可能是普通平民養的貓;戰場上炮聲隆隆,不可能是謹慎避人的野貓;波斯貓是名貴品種,養貓的人職位不低;貓每天固定時間出現,指揮家應該就在貓出沒在貓出沒。因此,幹擾判斷就是瞄準判據進行資訊產品設計與生產,使其獲得的事實與判據不匹配,或盡量減少自己與判據相關資訊的洩漏,從而使敵方無法判斷或做出錯誤的判斷。

幹擾判據的主要內容有:一是乾擾以經驗為基礎的判據。根據敵方經驗,製造“虛擬事實”,使其判斷失誤。如馬陵之戰中孫臏日減半灶以誘龐涓,就是典型的例子。因為根據經驗,灶與軍隊人數成正比,日減半灶說明人數在減少,減少的可能性是士兵傷亡較大,從而得出戰力減弱的判斷。二是乾擾以知識體係為基礎的判據。此類知識,包括敵方的常識、概念、原則及一些假設等。如1973年10月爆發的第四次中東戰爭,以色列最初的失利在於對戰局的誤判,認為只要自己的空軍仍處於優勢地位,對方就絕對不敢進攻。但是,埃及開始採用新的軍事技術,運用移動式地空飛彈撐起一張空中防禦網,部分抵銷了以色列的空中優勢。三是乾擾以普遍文化為基礎的判據。即根據敵方文化特徵,設計相應資訊與行動,使其因文化差異而產生誤判。據國外資料介紹,冷戰時期美國曾研究了“蘇聯行為的根源”,因此從文化與行為上入手做文章,誘使蘇聯產生戰略誤判。四是乾擾以方法論為基礎的判據。概括、類比等是判斷的基本方法。針對方法論的認知幹擾,就是使對方難以了解事實,無法與已知事實類比;將因果關系復雜化,把事實因果、心理因果、條件因果、社會因果等混淆起來,無法實施因果判斷;減少可能的徵兆和現象,使其無法看透本質,無從進行準確判斷。

著眼過程,影響決策

作戰決策,是針對作戰目的和企圖,經過觀察和判斷,將各種因素綜合起來,推導出解決問題的最優方案。戰爭或沖突行為,具有博弈、競爭和對抗屬性,因而決策即是​​博弈。決策解決的是乾不干、怎麼幹,達到什麼目的或終止狀態等關鍵問題。在資訊化局部戰爭中,以行動為中心逐步取代以計畫為中心,要求從資料中心戰、資訊中心戰、知識中心戰上升為決策中心戰,作戰決策更成為敵我雙方競逐的主要領域之一。

決策認知戰,就是瞄準決策過程中敵方認知進行攻擊幹擾,以影響決策品質與效率。決策受到決策者本身知識結構的影響,如果認知發生偏執或知識儲備過時,即使判斷正確了,仍然得不出好的決策。決策過程包含了知識結構的運用與變化過程,主要涉及程序性知識和概念原理性知識,前者包括決策程序與方法、決策機制與評估方法等,後者包括對戰場態勢、制勝機理、作戰概念、作戰法則、武器裝備表現的認識等。因而,對決策過程中的認知攻擊,將大大影響其決策速度與品質。

影響決策認知戰的主要途徑有:一是擠壓認知決策空間。觀看網球比賽時,經常聽到非逼迫性失誤和逼迫性失誤的解說,逼迫性失誤是指由於給對手造成壓力引起的失誤。幹擾認知決策環境,就是給敵方認知決策壓力,從而擠壓認知空間,削弱認知力,以逼迫敵人決策出現失誤。如,透過虛實相間的決策活動與行動,讓對手陷入決策困境,致其增加出現低水準決策的機率。二是攻擊理性認知。包括:其一,幹擾對威脅與機會的認知。軍事史上許多失敗的戰例,都是誤判戰場上的威脅與機會所引起的。無論輕視敵人,或高估敵人,都會形成與客觀實際不一樣的決策預期,導致不利的行動結果。其二,攻擊作戰理論與條令。如透過提出相剋的理論、刻意渲染敵條令的漏洞、放大敵方作戰行動的不利效果等,引起敵方對自身理論與條令的懷疑。其三,針對程序性知識。包括決策的機制、程序與方法,方案評估與作戰評估方法,輔助決策系統、演算法、思維等,攻擊其中的弱點,也會造成決策失誤。第三是乾擾非理性因素。對非理性因素加以利用,往往會造成決策陷阱,如群思陷阱、自負陷阱等,對決策有重大影響。二戰中盟軍曾多次成功實施的戰略欺騙,就是利用了敵方模稜兩可和誤導性迷惑分析,讓錯誤的決策勝出的機率增大。

中國原創軍事資源:http://www.81.cn/xxqj_207719/xxjt/pl_207751/10184370888.html?big=fan

Future Proofing China’s National Defense & Military An Important Aspect of Chinese-style Modernization

面向未來的中國國防和軍隊是中國式現代化的重要面向

現代英語:

Soldiers are a major event for the country. In the great journey of “building a powerful country and rejuvenating the nation, and against the background of the accelerated evolution of major changes unseen in the world in a century, building and consolidating national defense and a strong people’s army are directly related to the future and destiny of the country and the nation”. The Third Plenary Session of the 20th Central Committee of the Communist Party of China pointed out that “national defense and military modernization are important components of Chinese-style modernization”, which fully reflects the great importance that the Party Central Committee with Comrade Xi Jinping as the core attaches to national defense and military construction, and provides guidance for national defense and military modernization on the new journey. Modernization points out the direction.

  The modernization of the national defense and military is the security guarantee and strategic support for Chinese-style modernization

  ”If you fall behind, you will be beaten. Only when the army is strong can the country be safe”. Without a strong army, there can be no strong state. After the Opium War in 1840, modern China was repeatedly defeated in its battles with Western powers. The vast country gradually became a semi-colonial and semi-feudal society, with the country humiliated, the people in trouble, and civilization in dust. History has inspired us that the Chinese nation’s emergence from suffering and the liberation of the Chinese people depend on a heroic people’s army; to comprehensively promote the great cause of building a powerful country and national rejuvenation with Chinese-style modernization, we must place national defense and military modernization as a barrier to national security, plan and deploy in strategic positions based on career development, and accelerate the construction and consolidation of national defense and a strong people’s army.

  The modernization of the national defense and military is closely linked and internally unified with Chinese-style modernization. Without the modernization of national defense and the military, there would be no Chinese-style modernization. Comrade Mao Zedong once profoundly pointed out “the original requirements for building socialism were industrial modernization, agricultural modernization, scientific and cultural modernization, and now we must add national defense modernization”; Comrade Deng Xiaoping also emphasized “four modernizations, one of which is national defense modernization”, these all reflect the great importance our party attaches to national defense and military construction.

  Since the 18th National Congress of the Communist Party of China, President Xi has always adhered to the integrated operation of strengthening the country and the military, put national defense and military modernization in the chess game of Chinese-style modernization, and opened up the road to strengthening the military with Chinese characteristics, forming a new strategy for national defense and military modernization by 2027, 2035, and the middle of this century, a new “three-step” strategy for national defense and military modernization that connects near, medium and long-term goals Created a new situation in the cause of strengthening the military. Guided by the party’s goal of strengthening the military in the new era, we will comprehensively implement the strategy of reforming and strengthening the military, promote the reform of the leadership and command system, the reform of scale structure and force organization, and the reform of military policies and systems. Our military’s organizational structure will achieve historic changes, and the force system will achieve revolutionary changes. Reshaping, the basic framework of the socialist military policy system with Chinese characteristics has been constructed and formed. Our military system has been completely new, its structure has been completely new, its pattern has been completely new, and its appearance has been completely new It has laid a solid foundation for the modernization of national defence and the army.

  Military means, as a means of guaranteeing the realization of great dreams, can only stop a war if it can be fought. The current and future periods are critical periods for comprehensively promoting the great cause of building a powerful country and rejuvenating the nation through Chinese-style modernization, and will inevitably encounter various risks, challenges and even turbulent waves. We must comprehensively modernize our national defense and military, build the People’s Army into a world-class military, effectively guarantee Chinese-style modernization, and safeguard national sovereignty, security, and development interests.

   Comprehensive and accurate grasp of the scientific connotation of national defense and military modernization

  Since the 18th National Congress of the Communist Party of China, President Xi has issued a series of important expositions around “Chinese-style modernization”, summarizing the Chinese characteristics, essential requirements and major principles for the formation of Chinese-style modernization, building a theoretical system for Chinese-style modernization, and promoting the new era and new journey. Chinese-style modernization provides scientific guidance and also carries out strategic design and scientific deployment for national defense and military modernization.

  The most fundamental thing about modernizing the national defense and military is to uphold the absolute leadership of the party over the military. The leadership of the Party is the fundamental guarantee of Chinese-style modernization, which determines the fundamental nature of Chinese-style modernization, and it must also determine the fundamental nature of national defense and military modernization. To promote the modernization of national defense and the military on the new journey, we must fully implement a series of fundamental principles and systems for the party to lead the people’s army, comprehensively and thoroughly implement the chairman’s responsibility system of the Military Commission, and effectively unify thoughts and actions into the decisions and arrangements of the Party Central Committee and President Xi; Adhere to the party’s management of cadres and talents, and highlight political standards and combat capabilities Ensure that the barrel of the gun is always in the hands of those who are loyal and reliable to the party; improve the comprehensive and strict governance of the party system, enhance the political and organizational functions of party organizations at all levels, and integrate the party’s leadership throughout the entire process of continuing to deepen national defense and military reforms in all aspects.

  To modernize national defense and the military is to modernize military doctrine, military organization, military personnel, and weapons and equipment. This reflects the inherent requirements for the construction of military forces resulting from changes in the concept of victory in modern warfare, elements of victory and methods of victory, and clarifies the main signs of the basic realization of national defence and military modernization. To realize the modernization of military theory is to keep pace with the times, innovate war and strategic guidance, and form a military theoretical system that is contemporary, leading, and unique; to realize the modernization of organizational form is to deepen the reform of national defense and the military, and the military force structure layout is scientific and reasonable, strategic deterrence capabilities are consolidated and improved, new areas and new quality combat forces continue to grow, and elite operations, system support, and joint victory have become the basic application models; To realize the modernization of military personnel is to deeply implement the strategy of strengthening the military with talents in the new era, promote the comprehensive transformation and upgrading of military personnel’s capabilities, structural layout, and development management, and forge high-quality, professional new military talents with both ability and political integrity; to realize the modernization of weapons and equipment, It is necessary to focus on strengthening national defense scientific and technological innovation and accelerating the development of strategic, cutting-edge and disruptive technologies Accelerate the upgrading of weapons and equipment and the development of intelligent weapons and equipment.

  For the modernization of national defence and the military, we must adhere to the integrated development of mechanization, informatization and intelligence. The military conflicts and local wars that have taken place in recent years have shown that new qualitative combat capabilities generated based on intelligent combat systems are increasingly becoming core military capabilities. Based on mechanization, dominated by informatization, and oriented by intelligence, the three superimpose, penetrate, and support each other, jointly giving rise to new forms of warfare and methods of warfare. Only by accelerating the integrated development of mechanization, informatization and intelligence and keeping up with the new military revolutionary trends in the world can we seize the opportunity and take the initiative in seizing the commanding heights of the military struggle.

  The modernization of national defence and the army is a guarantee of security for insisting on the path of peaceful development. Since ancient times, soldiers have not been warlike. Chinese-style modernization is modernization on the path of peaceful development. Building a consolidated national defense and a strong military commensurate with international status and national security and development interests is a strategic task of China’s socialist modernization drive and an insistence on taking the path of peaceful development. Safety guarantee is an inevitable choice for summarizing historical experience. China has always pursued a defensive defence policy and adhered to the strategic idea of active defence, and no matter how far it develops, China will never seek hegemony or engage in expansion. To promote the modernization of national defense and the military on the “new journey”, we must faithfully implement the concept of a community with a shared future for mankind, resolutely oppose all forms of hegemony and bullying, and contribute China’s strength to building a beautiful world of lasting peace and universal security.

   Advancing the modernization of national defence and the military at a new historical starting point

  The Third Plenary Session of the 20th Central Committee of the Communist Party of China included “continuous deepening of national defense and military reforms into the overall plan for further comprehensive deepening of reforms, and made a series of major strategic arrangements for improving the leadership and management system and mechanism of the people’s army, deepening the reform of the joint operations system, and deepening cross-military and civilian reforms”. On the new journey, we must deeply understand and grasp the themes, major principles, major measures, and fundamental guarantees for further comprehensively deepening reforms, resolutely implement the new “three-step” strategy for national defense and military modernization, and accelerate the modernization of military theory, military organizational form, and military personnel. Modernize and modernize weapons and equipment, and lead the modernization of national defense and the military to move forward with better strategies, higher efficiency, and faster speed.

  Strengthening the Party’s theoretical and scientific leadership in military guidance. Our party insists on combining the basic principles of Marxism with the practice of building the people’s army, absorbing the essence of China’s excellent traditional military culture, and constantly exploring new realms in the development of contemporary Chinese Marxist military theory and military practice. As an important part of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, Xi Jinping Thought on Strengthening the Military has achieved a new leap forward in the Sinicization and modernization of Marxist military theory. It is the fundamental guiding ideology of our party building and military governance in the new era. We must unremittingly arm our minds with Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, further firmly establish the guiding position of Xi Jinping Thought on Strengthening the Military in national defense and military construction, and build and consolidate national defense and a strong people’s army under the guidance of Xi Jinping Thought on Strengthening the Military. Take new and greater steps on the road to strengthening the military with Chinese characteristics.

  Efforts should be made to make the main responsibility and business of war preparation more solid and effective. The People’s Army is an armed group that performs the party’s political tasks. It must be both politically strong and capable. In the final analysis, this ability can win wars. To accelerate the modernization of national defense and the military, we must firmly grasp the fundamental direction of winning wars, establish the only fundamental standard of combat effectiveness, focus all our energy on fighting wars, and work hard on fighting wars. Conscientiously implement the military strategic policy for the new era, operate war preparation and cessation, deterrence and actual combat, war operations and the use of military forces in peacetime as a whole, innovate strategies, tactics and tactics, effectively shape the situation, manage crises, contain wars, and win wars. Adhere to the principle of “training troops as they fight, and comprehensively improve the actual combat level of military training and the ability to perform missions and tasks”.

  Promote high-quality development of national defense and military construction through “reform and innovation”. Reform is a key move that will determine the growth of our army and its future. On the new journey, we must put innovation at the core of the overall military construction and development, transform development concepts, innovate development models, enhance development momentum, and promote the transformation of national defense and military modernization from quantitative growth to qualitative improvement. Focus on integrating national defense and military construction into the national economic and social development system on a wider scale, at a higher level, and to a deeper extent, continuously improve the quality and efficiency of national defense and military modernization, promote the simultaneous improvement of national defense strength and economic strength, and consolidate and improve the integration National strategic system and capabilities, and constantly write a new chapter of strengthening the country and the military.

現代國語:

時間:2024年11月15日 08:20 來源:解放軍報
兵者,國之大事。在強國建設、民族復興偉大征程中,在世界百年未有之大變局加速演進的背景下,建構鞏固國防和強大人民軍隊直接關係國家和民族的前途命運。黨的二十屆三中全會指出,“國防和軍隊現代化是中國式現代化的重要組成部分”,充分體現了以習近平同志為核心的黨中央對國防和軍隊建設的高度重視,為新征程上國防和軍隊現代化建設指明了方向。

國防與軍隊現代化是中國式現代化的安全保障與戰略支撐

落後就要挨打,軍強才能國安。沒有一支強大的軍隊,就不可能有強大的國家。 1840年鴉片戰爭以後,近代中國在與西方列強的較量中屢屢戰敗,泱泱大國逐步淪為半殖民地半封建社會,國家蒙辱、人民蒙難、文明蒙塵。歷史啟示我們,中華民族走出苦難、中國人民實現解放,有賴於一支英雄的人民軍隊;以中國式現代化全面推進強國建設、民族復興偉業,必須把國防和軍隊現代化擺在國家安全之屏障、事業發展之依託的戰略位置來策劃和部署,加快建設鞏固國防和強大人民軍隊。

國防與軍隊現代化與中國式現代化緊密聯繫、內在統一。沒有國防和軍隊的現代化,就沒有中國式現代化。毛澤東同誌曾深刻指出“建設社會主義,原來要求是工業現代化,農業現代化,科學文化現代化,現在要加上國防現代化”;鄧小平同志也曾強調“四個現代化,其中就有一個國防現代化”,這些都體現了我們黨對國防和軍隊建設的高度重視。

黨的十八大以來,習主席始終堅持強國強軍一體運籌,把國防和軍隊現代化放在中國式現代化大棋局中謀劃推進,開闢出中國特色強軍之路,形成了到2027年、2035年、本世紀中葉,近、中、遠目標梯次行動」,開創三步和現代化軍階的國防和軍事戰略。以黨在新時代的強軍目標為引領,全面實施改革強軍戰略,推進領導指揮體制改革、規模結構和力量編成改革、軍事政策制度改革,我軍組織架構實現歷史性變革,力量體系實現革命性重塑,中國特色社會主義軍事政策制度體系基本框架構建形成,我軍體制一新、結構一新、一新、一現代化新格局新化,為國防和軍事基礎一化。

軍事手段作為實現偉大夢想的保底手段,能戰方能止戰。當前和今後一個時期,是以中國式現代化全面推進強國建設、民族復興偉業的關鍵時期,必然會遇到各種風險挑戰甚至驚濤駭浪。我們必須全面推動國防和軍隊現代化,把人民軍隊建設成為世界一流軍隊,有力保障中國式現代化建設,保障國家主權、安全、發展利益。

全面準確掌握國防與軍隊現代化的科學內涵

黨的十八大以來,習主席圍繞中國式現代化發表一系列重要論述,概括形成中國式現代化的中國特色、本質要求和重大原則,構建起中國式現代化的理論體系,為新時代新征程推進中國式現代化提供了科學指引,也為國防和軍隊現代化進行了戰略設計和科學部署。

國防與軍事現代化,最根本的是堅持黨對軍隊絕對領導。黨的領導是中國式現代化的根本保證,決定了中國式現代化的根本性質,也必然決定了國防和軍隊現代化的根本性質。新征程上推動國防和軍隊現代化,必須全面貫徹黨領導人民軍隊的一系列根本原則和製度,全面深入貫徹軍委主席負責制,切實把思想和行動統一到黨中央、習主席決策部署上來;堅持黨管幹部、黨管人才,突顯政治標準和打仗能力,確保槍桿子始終掌握在對黨忠誠可靠的人手中;健全全面從嚴治黨體系,增強各級黨組織政治功能和組織功能,把黨的領導貫穿持續深化國防和軍事改革各方面全過程。

國防與軍隊現代化,就是要實現軍事理論、軍隊組織形態、軍事人員、武器裝備的現代化。這反映了現代戰爭制勝觀念、制勝要素、制勝方式變化對軍事力量建設的內在要求,明確了基本實現國防和軍隊現代化的主要標誌。實現軍事理論現代化,就是要與時俱進創新戰爭和戰略指導,形成具有時代性、引領性、獨特性的軍事理論體系;實現組織形態現代化,就是要深化國防和軍事改革,軍隊力量結構佈局科學合理,戰略威懾能力鞏固提高,新域新質作戰力量不斷壯大,精製作戰、體系支撐、聯合戰略威懾成為基本運作模式;實現軍事人員現代化,就是要深入實施新時代人才強軍戰略,推動軍事人員能力素質、結構佈局、開發管理全面轉型升級,鍛造德才兼備的高素質、專業化新型軍事人才;實現武器裝備現代化,就是要聚力加強國防科技創新,加速戰略性、前沿性、顛覆性技術發展,加速武器裝備升級和智能化武器裝備升級。

國防與軍隊現代化,必須堅持機械化資訊化智慧化融合發展。近年來發生的軍事衝突和局部戰爭表明,基於智慧化作戰體系所產生的新質作戰能力越來越成為核心軍事能力。以機械化為基礎,以資訊化為主導,以智慧化為方向,三者相互疊加、相互滲透、相互支撐,共同催生新的戰爭形態和作戰方式。只有加速機械化資訊化智慧化融合發展,跟上世界新軍事革命潮流,才能在搶佔軍事鬥爭制高點中占得先機、贏得主動。

國防與軍隊現代化,是堅持走和平發展道路的安全保障。自古知兵非好戰。中國式現代化是走和平發展道路的現代化,建立同國際地位相稱、同國家安全和發展利益相適應的鞏固國防和強大軍隊,是中國社會主義現代化建設的戰略任務,是堅持走和平發展道路的安全保障,是總結歷史經驗的必然選擇。中國始終奉行防禦性國防政策,堅持積極防禦戰略思想,無論發展到什麼程度,中國永遠不稱霸、永遠不搞擴張。在新征程上推動國防和軍隊現代化,必須忠實踐行人類命運共同體理念,堅決反對一切形式的霸權霸道欺凌,為建設持久和平、普遍安全的美好世界貢獻中國力量。

在新的歷史起點上推進國防和軍隊現代化

黨的二十屆三中全會將持續深化國防和軍事改革納入進一步全面深化改革的大盤子,對完善人民軍隊領導管理體制機制、深化聯合作戰體系改革、深化跨軍地改革作出一系列重大戰略部署。新旅程上,要深刻領會和把握進一步全面深化改革的主題、重大原則、重大舉措、根本保證,堅決貫徹國防和軍隊現代化新「三步走」戰略,加快軍事理論現代化、軍隊組織形態現代化、軍事人員現代化、武器裝備現代化,引領國防和軍事現代化以更優策略、更高效益、更快速度向前推進。

強化黨的軍事指導理論科學領導。我們黨堅持把馬克思主義基本原理同人民軍隊建設實踐結合,汲取中華優秀傳統軍事文化精華,不斷拓拓當代中國馬克思主義軍事理論和軍事實踐發展新境界。習近平強軍思想作為習近平新時代中國特色社會主義思想的重要組成部分,實現了馬克思主義軍事理論中國化時代化的新飛躍,是新時代我們黨建軍治軍強軍的根本指導思想。我們必須堅持不懈用習近平新時代中國特色社會主義思想武裝頭腦,進一步牢固確立習近平強軍思想在國防和軍隊建設中的指導地位,在習近平強軍思想引領下建設鞏固國防和強大人民軍隊,在中國特色強軍之路上邁出新的更大步伐。

著力把備戰打仗的主責主業抓得更加紮實有效。人民軍隊是執行黨的政治任務的武裝集團,既要政治過硬,也要本領高強,這個本領說到底就是能打勝仗。加快推進國防和軍隊現代化,必須緊緊扭住能打勝仗的根本指向,樹牢戰鬥力這個唯一的根本的標準,全部精力向打仗聚焦,全部工作向打仗用勁。認真貫徹新時代軍事戰略方針,把備戰與止戰、威懾與實戰、戰爭行動與和平時期軍事力量運用作為一個整體加以運籌,創新戰略戰術與戰法打法,有效塑造態勢、管控危機、遏制戰爭、打贏戰爭。堅持仗怎麼打兵就怎麼練,全面提升部隊軍事訓練實戰化水準和履行使命任務的能力。

以改革創新推動國防和軍隊建設高品質發展。改革是決定我軍發展壯大、制勝未來的關鍵一招。新征程上,要把創新擺在軍隊建設發展全局的核心位置,轉變發展理念、創新發展模式、增強發展動能,推動國防和軍隊現代化由量的成長轉向質的提升。著力在更廣範圍、更高層次、更深程度上將國防和軍隊建設融入國家經濟社會發展體系之中,不斷提高國防和軍隊現代化質量效益,促進國防實力和經濟實力同步提升,鞏固提高一體化國家戰略體系和能力,不斷書寫強國強軍新篇章。

中國原創軍事資源:https://www.mva.gov.cn/sy/zt/zt1/xxgcddsjdjs/qwjd/202411/t20241120_453942888.html

[Chinese National Defense] Establishing Correct Awareness to Contain China and Conduct Cognitive Warfare Operations

[中國國防]建立正確的意識,以遏制中國並進行認知戰爭行動

現代英語:

As the world continued to actively combat the COVID-19 pandemic, the British newspaper The Guardian reported in late May 2021 that Fazze, a public relations and marketing agency with close ties to Russian officials, was accused of providing funding to influential YouTubers, bloggers, and other opinion leaders in France, Germany, and other European countries to spread false information claiming that vaccines like Pfizer (BNT) and AstraZeneca (AZ) had caused hundreds of deaths. The false information also criticized the EU vaccine procurement system for harming public health in European countries, with the goal of sowing public distrust of Western vaccines and shifting public acceptance toward Russia’s Sputnik V vaccine. This is the most significant example of “perception warfare” in recent international history.

 In fact, human society has always adhered to the principle of “conquering the enemy without fighting” as the guiding principle for optimal military operations. While traditional warfare still primarily takes place in physical space, victory requires the physical capture of cities and territories, as well as the destruction of enemy forces. However, as humanity’s understanding of the nature of war deepens, the use of information technology has become a new trend in warfare, enabling the achievement of traditional combat effectiveness without the need for physical engagement. Given the increasing attention paid to “information warfare” and “hybrid warfare,” this article discusses the closely related concept of “cognitive warfare,” exploring the emerging threats facing our country and our national defense response strategy.

 Whether it’s what the US calls “hybrid warfare” or what Russia calls “information warfare,” the implications are quite similar: centered on the cognitive realm, the use of information to influence and manipulate targets, encompassing both peacetime public opinion and wartime decision-making. The rise of Nazi Germany after World War I was arguably the first modern regime to master the use of information to shape perceptions within its own country and even abroad. Its successful use of propaganda and lies, delivered through various communication technologies, was highly successful. Principles such as “repetition is power” and “negative information is more easily accepted and remembered than positive information” would later profoundly influence authoritarian governments, including Russia.

 Using information capabilities to subvert national regimes

 At the beginning of the 21st century, Russia began to pay attention to the situation where international discourse power was completely controlled by Western countries. It successively put forward theories such as “Information Warfare Theory” and “Sixth Generation Warfare Theory”, arguing that the sixth generation of warfare is a non-contact war that uses precision weapons and information warfare to traverse the battlefield. The purpose of war is no longer a devastating global war, but to achieve effects that cannot be achieved through traditional warfare by exploiting the enemy’s information capabilities to exploit its weaknesses, including changing social and cultural orientations and values, and thus subverting national regimes.

 In 2005, Russia established the international news channel “Russia Today.” Initially focused on soft power propaganda, it shifted its focus after the 2008 Georgian War to attacking negative aspects of Western society and fostering conspiracy theories. The 2014 Ukraine crisis became a training ground for Russian information warfare forces. Using electronic jamming and cyber theft, they intercepted Ukrainian communications, inferring subsequent Ukrainian actions and releasing damaging information at critical moments. They also targeted sensitive issues in eastern Ukraine, including the status of ethnic Russians and economic downturn, distributing a large amount of carefully selected, targeted information to resonate with the public, influencing their perceptions and behavior and gaining control of media opinion. In terms of “cognitive warfare,” Russia’s approach has been successful, and has become a model for the Chinese Communist Party.

 Manipulating “brain control” to control the public

 In 2014, the Chinese Communist Party (CCP) proposed the cognitive operational concept of “brain control,” building on its past “three warfares” of psychological warfare, legal warfare, and public opinion warfare, as well as Russia’s theoretical framework of “information warfare.” It states that a nation’s cognitive space is composed of the superposition of countless individuals, and that “brain control” uses national languages, propaganda media, and cultural products as weapons to comprehensively infiltrate and control the cognition, emotions, and consciousness of the general public and national elites, ultimately distorting, disintegrating, and reshaping their national spirit, values, ideology, history, and culture, thereby achieving the strategic goal of winning without fighting.

 Therefore, the CCP’s “cognitive operations” fall under the broad category of psychological warfare. In the era of information globalization, it integrates information warfare, psychological warfare, and public opinion warfare, becoming the core of the CCP’s overall strategy. Since the 2016 military reform, it has been led by the newly formed “Strategic Support Force” and implemented at all political and military levels. On the one hand, the PLA has adopted American operational thinking in the field of “cognitive operations,” using units such as the 311 Base, the National University of Defense Technology, and the Academy of Military Sciences to develop tactics such as “psychological operations,” “ideological operations,” “consciousness manipulation,” and “strategic communication” to strengthen the “cognitive operations” capabilities jointly constructed by military-civilian integration and joint combat systems. On the other hand, it uses professional personnel to operate media platforms, shape the public opinion environment, and introduce “cognitive operations” into the actual combat application stage.

 The CCP’s recent “cognitive warfare” offensive against Taiwan reveals its methods and tactics. First, the CCP primarily uses the internet to collect personal data from Taiwanese citizens, using big data databases to categorize information by target group, based on political leanings, age, occupation, and other factors. Second, it leverages intelligence gathering to launch targeted cognitive attacks on specific social media platforms, influencing the psychology of the targeted groups, particularly by releasing disinformation to weaken and distract Taiwanese society. Third, it employs online virtual organizations to set up fake social media accounts, infiltrate online communities, and disguise themselves as whistleblowers, deliberately spreading fabricated information to create confusion. Cybertroopers then massively repost and discuss this information, manipulating audience perceptions and creating a cycle of disrupting information retention, manipulating cognitive psychology, and altering thinking patterns.

 Identify fake news and fight back together

 At this stage, the CCP’s campaign for “brain control” over Taiwan aims to influence Taiwanese society’s cognition, distorting public opinion, devaluing democratic values, intensifying opposition, disrupting political conditions, and undermining public trust in the government. The following preventive measures can be taken within the national defense system:

 1. Strengthening educational functions

 Through national defense education in schools, institutions, and society, we will raise the public’s awareness of the threat posed by the CCP’s “cognitive warfare” and their ability to identify false information, and cultivate the habit of rationality, verification, and calmness.

 2. Follow the constraints

 Although there are currently no internationally accepted legal rules that can clearly define the extent to which cognitive warfare constitutes an act of war, making it even more difficult to hold people accountable, media platforms can still strengthen the review of their own reporting content in accordance with existing regulations, and the public can also refrain from spreading suspicious information and following the trend of tennis melee, so as to facilitate the establishment of information verification measures and mechanisms.

 3. Combining Military and Civilian Strength

 Incorporate information and communication-related institutions and industries into the national defense mobilization mechanism, coordinate in peacetime the review, analysis, and disposal of fake news, strengthen talent training and research cooperation, and enhance the capabilities of professional units of the government and the national army; in wartime, cooperate with the overall national actions and carry out countermeasures.

 Currently, Taiwan already has the National Security Bureau’s National Security Operations Center responsible for responding to controversial information from hostile foreign forces. There’s also the non-profit Taiwan Fact-Checking Center. Facing the challenges of cognitive warfare, we must continue to integrate various sectors, strive for international intelligence exchange and experience sharing, optimize the media environment, collaborate across multiple channels, and instantly identify the authenticity and source of information, jointly building our offensive capacity to respond to cognitive warfare.

 Conclusion

 In reality, all countries around the world face threats related to cognitive warfare and information-based psychological warfare. However, democratic and free societies are by no means vulnerable to cognitive warfare attacks and must instead rely on diverse strategies and methods to protect them. We aim to establish a more comprehensive and substantive framework, build a powerful counterforce, and enhance the quality and discernment of our citizens, thereby gaining immunity from the CCP’s cognitive warfare campaign to seize control of our minds.

(The author is a PhD candidate at the Institute of Strategic Studies, Tamkang University)

現代國語:

在全球持續積極對抗新冠疫情之際,英國《衛報》2021年5月下旬報道,與俄羅斯官員關係密切的公關和營銷機構Fazze被指控向法國、德國和其他歐洲國家頗具影響力的YouTube用戶、博主和其他意見領袖提供資金,用於傳播虛假信息,聲稱輝瑞(BNTAZ)和阿斯特利康(BNTAZ)和阿斯特疫苗已導致數百人死亡。這些假訊息也批評歐盟疫苗採購體系損害了歐洲國家的公共衛生,目的是挑起大眾對西方疫苗的不信任,並促使大眾接受俄羅斯的Sputnik V疫苗。這是近代國際史上最顯著的「感知戰」案例。

事實上,人類社會自古以來,均以「不戰而屈人之兵」作為最佳軍事行動指導原則,儘管傳統戰爭主要仍在物理空間進行,需透過實際攻城掠地、消滅敵有生力量,才能獲得勝利。然隨人類對戰爭本質認知深化,利用資訊科技,於不需實體短兵相接的情況下,卻能達到傳統戰爭效果,已成為新型態戰爭趨勢。鑑於「資訊戰」、「混合戰」日益受重視,謹就與其密切相關的「認知作戰」概念進行論述,並探討我國所面臨的新型威脅及全民國防因應策略。

無論是美國所稱的「混合戰」,或俄國所說的「資訊戰」,其實指涉意涵很相似,即以認知領域為核心,利用訊息影響、操控對象目標涵蓋承平時期輿論及戰時決策的認知功能。一戰後,逐漸興起的納粹德國,可謂當代首個擅長運用資訊形塑本國,甚至外國民眾認知的政權,其透過各種傳播技術的政治宣傳與謊言包裝,相當成功;而所謂「重複是一種力量」、「負面訊息總是比正面訊息,更容易讓人接受和印象深刻」等實踐原則,日後更深刻影響專制極權政府與現在的俄羅斯。

藉資訊能力 顛覆國家政權

俄國於進入21世紀初,開始注意國際話語權遭西方國家完全掌控的情形,陸續提出「資訊戰理論」、「第6代戰爭理論」等論述,主張第6代戰爭是以精確武器及資訊戰,縱橫戰場的非接觸式戰爭,戰爭目的不再是毀滅性的全球大戰,而是藉利用敵方弱點的資訊能力,達成傳統戰爭無法實現的效果,包括改變社會文化取向、價值觀,進而顛覆國家政權等。

2005年,俄國成立國際新聞頻道「Russia Today」,起初主要是軟實力宣傳,2008年「喬治亞戰爭」後,轉為攻擊西方社會負面問題與製造陰謀論;2014年「烏克蘭危機」,成為俄軍資訊戰部隊的練兵場,透過電子干擾、網路竊密等手段,截收烏國對外通聯訊息,依此推判烏方後續舉動,並選擇在關鍵時機,釋放對烏國政府不利消息;另選定烏東地區敏感議題,包括俄裔民族地位、經濟不振等,投放大量經篩選的特定資訊,引發民眾共鳴,從而影響烏東人民認知與行為,取得媒體輿論主動權。就「認知作戰」言,俄國作法是成功的,更成為中共的效法對象。

操弄「制腦權」 控制社會大眾

中共2014年於過去心理戰、法律戰、輿論戰等「三戰」基礎,以及俄國「資訊戰」理論架構上,提出「制腦權」認知操作概念,指國家認知空間係由無數個體疊加而成,「制腦」是以民族語言、宣傳媒體、文化產品為武器,全面滲透、控制社會大眾與國家精英之認知、情感與意識,最終扭曲、瓦解、重塑其民族精神、價值觀念、意識形態、歷史文化等,達致不戰而勝的戰略目標。

是以,中共「認知作戰」屬於廣義心理戰範疇,是資訊全球化時代,融合資訊戰、心理戰及輿論戰的戰法,成為中共整體戰略主軸,並自2016年「軍改」後,由新組建的「戰略支援部隊」操盤,在各政略、軍事層次開展執行。一方面,共軍擷取美國在「認知作戰」領域的操作思維,以311基地、國防科技大學、軍事科學院等單位研提「心理作戰」、「思想作戰」、「意識操縱」、「戰略傳播」等戰法,以加強軍民融合及聯戰體系共同建構的「認知作戰」能力;另一方面,則以專業人員操作媒體平臺,形塑輿論環境,將「認知作戰」導入實戰運用階段。

從近年中共對臺進行的「認知作戰」攻勢,可拆解其途徑與手段。首先,中共主要係以網路蒐集國人個資,透過大數據資料庫,劃分政治傾向、年齡、職業等不同目標族群資訊;其次,配合情報偵蒐,針對個別社群媒體展開認知精準打擊,影響目標群眾心理,尤其釋放假訊息,以削弱、分散臺灣社會注意力;再次,則運用網路虛擬組織設置社群媒體假帳號,打入網路族群,偽裝成揭密者、吹哨者,刻意傳散變造資訊,製造混亂,再由網軍大量轉傳、討論,操弄受眾認知,進入阻斷資訊記憶、操縱認知心理、改變思考模式的運作循環。

識別假訊息 全民齊反制

基於現階段,中共對臺「制腦權」作戰,影響臺灣社會認知的目的,在於扭曲輿論、貶低民主價值、激化對立、擾亂政情、減損民眾對政府信任等,於全民國防體系可採取的防制辦法包括:

一、強化教育功能

分別透過全民國防之學校教育、機關教育、社會教育途徑,提高公眾對中共「認知作戰」威脅的認識,與對假訊息識別能力,養成理性、查證、冷靜習慣。

二、遵循約束規範

儘管目前尚無國際通用的法律規則,可明確定義何種程度的認知作戰已構成戰爭行為,更難以究責;然各媒體平臺仍可按既有規範,對自身報導內容加強審查,民眾也可做到不傳播可疑訊息、不跟風網壇混戰,俾利訊息查證措施與機制建立。

三、結合軍民力量

將資訊與傳播相關機構、產業,納入全民防衛動員機制,平時協調因應假訊息審查、分析、處置,加強人才培訓、研究合作,提升政府、國軍專業單位能力;戰時則配合國家整體作為,執行反制任務。

目前我國已有國安局「國家安全作業中心」執行對境外敵對勢力爭議訊息應處有關工作,民間亦有非營利組織成立的「臺灣事實查核中心」。面對「認知作戰」挑戰,仍應持續整合各界力量,爭取國際情報交流與經驗共享,優化媒體環境,多管道合作,即時辨識訊息真偽與來源,共同建設應處「認知作戰」攻勢能量。

結語

事實上,世界各國都同樣面臨「認知作戰」、「資訊心理戰」等相關威脅,然民主自由的社會環境,絕非易受「認知作戰」攻擊的溫床,更需仰賴多元策略與方式守護。期以更完善周全的實質架構,建構強而有力的反制力量,並提升我國公民素質及識別能力,於中共奪取「制腦權」的認知作戰中,獲得免疫。

(作者為淡江大學戰略研究所博士)

中國原創軍事資源:https://www.ydn.com.tw/news/newsInsidePage?chapterID=1431550

Chinese Military Exercises Focused on Taiwan Conclude Signaling Joint Containment Strategy

中國軍事演習的重點是台灣結束信號的聯合遏制策略

現代英語:

The Chinese Communist Party announced the “Strait Thunder-2025A” exercise on the 2nd. The Ministry of National Defense detected 13 Chinese warships, 10 Coast Guard ships, and 8 ships from the Shandong aircraft carrier formation.

(Central News Agency reporter Wu Shuwei, Taipei, 2nd) The two-day Chinese Communist Party military exercise has concluded. Military scholars analyzed that the Chinese Communist Party’s military exercise is still led by politics, using a 70% political and 30% military approach to put pressure on Taiwan, raising the strategic level of “joint blockade” and enhancing the mission role of the Chinese Coast Guard.

The Eastern Theater Command of the People’s Liberation Army of China announced yesterday that it would organize the army, navy, air force, and rocket force to conduct joint exercises around Taiwan. Today, it said that the army will conduct long-range live-fire exercises in relevant waters of the East China Sea in accordance with the “Strait Thunder-2025A” exercise plan.

Regarding the characteristics of the CCP’s military exercise that are worthy of Taiwan’s attention, Chen Wenjia, a senior consultant at the National Policy Research Institute, told a Central News Agency reporter that the PLA’s exercise mobilized the army, navy, air force and rocket force to conduct joint combat drills to test the PLA’s coordinated combat capabilities and enhance the overall effectiveness of operations against Taiwan. Secondly, it is an operational practice exercise, including precision strikes on key infrastructure, blockades of ports and other practical subjects, and simulates scenarios of actual military operations against Taiwan, showing that the PLA’s combat preparations against Taiwan are becoming increasingly mature.

Chen Wenjia said that the Chinese Coast Guard also participated in the military exercise and carried out law enforcement patrols and other operations. The purpose was to exert pressure on Taiwan through gray zone harassment and increase the effectiveness of the “three warfares” of public opinion warfare, psychological warfare, and legal warfare against Taiwan.

Su Ziyun, director of the Institute of Defense Strategy and Resources at the National Defense Security Research Institute, said that the CCP’s military exercise this time is still 70% political and 30% military. Compared with the past “Joint Sword” military exercises against Taiwan, this time the CCP has raised the status of the coast guard and the implementation of “joint blockade” to a strategic level, and announced today that the exercises will practice verification and identification, warning and expulsion, and interception and detention. It is to think about non-war military actions with strategic thinking, and when necessary, cut off Taiwan’s sea transportation lines through isolation to force Taiwan to surrender.

Regarding the warning that the CCP’s military exercises send to Taiwan, Chen Wenjia said that as the PLA continues to conduct high-intensity military exercises around Taiwan, it shows that the military threat to Taiwan is escalating, and Taiwan needs to strengthen its own defense capabilities to ensure the security of the Taiwan Strait; secondly, the pressure in the gray zone is increasing, especially the participation of the coast guard force, which means that China is exerting more pressure in the gray zone. Taiwan needs to increase its vigilance against this non-traditional security threat and should formulate corresponding strategies as soon as possible.

Su Ziyun stated that the Chinese Communist Party’s military exercises highlight the importance of “air defense being the most urgent of all.” Whether the CCP intends to attack Taiwan’s ports or energy facilities, it will need to resort to air strikes, such as missile attacks. This means Taiwan’s air defense capabilities need to be strengthened. In response to Chinese Communist Party gray zone harassment, the Navy currently relies on destroyers and frigates as its main combat vessels. The Navy should emulate the British Navy’s deployment of surveillance vessels, such as River-class patrol vessels, to counter gray zone harassment and preserve the availability and capacity of its main combat vessels. (Editor: Yang Lanxuan) 1140402

現代國語:

中共2日宣布「海峽雷霆-2025A」演練,國防部偵獲共艦13艘、海警船10艘及山東號航艦編隊8艘。 (中央社製圖)

(中央社記者吳書緯台北2日電)中共兩天軍演落幕,軍事學者分析,中共此次軍演仍以政治掛帥,採7分政治、3分軍事的方式對台施壓,拉高「聯合封控」的戰略位階,提升中國海警的任務角色。

中國人民解放軍東部戰區昨天稱組織陸海空軍與火箭軍等兵力,在台灣週邊展開聯合演訓,今天則是稱陸軍部隊按「海峽雷霆-2025A」演練計畫,在東海相關海域實施遠程火力實彈射擊演練。

針對中共此次軍演值得台灣關注的特點,國策研究院資深顧問陳文甲告訴中央社記者,共軍此次演習動用了陸海空軍與火箭軍進行聯合作戰演練,測試共軍的協同作戰能力,提升對台作戰的整體效能,其次是操作實戰化科目演練,包括對關鍵基礎設施的精確打擊、封鎖港口等實戰化科目,並模擬對台灣進行實際軍事行動的場景,顯示共軍針對台灣的作戰整備日益成熟。

陳文甲表示,中國海警也參與此次軍演,並進行執法巡查等行動,目的在透過灰色地帶襲擾施加對台灣的壓力,增加對台灣進行輿論戰、心理戰、法律戰的「三戰」效果。

國防安全研究院國防戰略與資源研究所長蘇紫雲說,中共此次軍演仍是7分政治、3分軍事,和過去對台「聯合利劍」軍演相比,這次中共將海警與執行「聯合封控」的位階提高至戰略位階,並在今天宣稱演習演練查證識別、警告驅離及攔截扣押等課目,就是以戰略思維來思考非戰爭的軍事行動,在必要的時候透過隔離手段,切斷台灣的海上運輸線,來逼迫台灣投降。

對於中共此次軍演對台灣的警訊,陳文甲表示,隨著共軍持續在台灣週邊進行高強度軍事演習,顯示對台灣的軍事威脅不斷升級,台灣需強化自身防衛能力確保台海安全;其次是灰色地帶壓力增加,尤其是海警力量的參與,意味著中國在灰色地帶施加更多壓力,台灣需提高對此非傳統安全威脅的警覺,應盡速制定相應的策略。

蘇紫雲表示,中共軍演凸顯「萬事莫如防空急」,無論是中共要攻擊台灣港口或能源設施,都需要透過飛彈攻擊等空襲手段,代表台灣的防空能力還需加強,而在應對中共灰色地帶襲擾活動,海軍目前仍是以驅逐艦、巡防艦等主戰艦艇應對,應仿效英國海軍建置河級巡邏艦(River-class patrol vessel)等監視性質的艦艇,來應對共軍灰色地帶襲擾,保存主戰艦艇的妥善率和能量。 (編輯:楊蘭軒)1140402

中國原創軍事資源:https://www.cna.com.tw/news/aipl/202504020405.aspx

China’s Weaponized Communication in International Public Opinion Warfare: Scenarios and Risk Responses

中國在國際公眾輿論戰爭中的武器交流:場景和風險回應

現代英語:

【Abstract】 In the international public opinion war, weaponized communication has penetrated into military, economic, diplomatic and other fields, bringing imagination and practice “everything can be weaponized”. Weaponized communication manipulates public perception through technology, platforms, and policies, reflecting the complex interaction of power distribution and cultural games. Driven by globalization and digitalization, cognitive manipulation, social fragmentation, emotional polarization, digital surveillance, and information colonization have become new means of influencing national stability, which not only exacerbates competition between information-powerful and weak countries, but also provides information-weak countries with the opportunity to achieve reversal through flexible strategies and technological innovation. Under the global asymmetric communication landscape, how to find a point of convergence and balance between technological innovation and ethical responsibility, strategic goals and social balance will be key elements that will influence the future international public opinion landscape.

【Keywords】 Public opinion warfare; weaponized communication; information manipulation; asymmetric communication; information security

If “propaganda is a rational recognition of the modern world” [1], then weaponized communication is a rational application of modern technological means. In the “public opinion war”, each participating subject achieves strategic goals through different communication methods, making them superficially reasonable and concealed. Unlike traditional military conflicts, modern warfare involves not only physical confrontation, but also competition in several fields, including information, economics, psychology, and technology. With the advancement of technology and globalization, the shape of war has changed profoundly, and traditional physical confrontations have gradually shifted to multi-dimensional and multi-field integrated warfare. In this process, weaponized communication, as a modern form of warfare, becomes an invisible means of violence that affects the psychology, emotions and behavior of the opposing enemy or target audience by controlling, guiding and manipulating public opinion, thereby achieving political, military or strategic ends.》 “On War” believes that war is an act of violence that makes the enemy unable to resist and subservient to our will. [ 2] In modern warfare, the realization of this goal not only relies on the confrontation of military forces, but also requires support from non-traditional fields such as information, networks, and psychological warfare. Sixth Generation Warfare heralds a further shift in the shape of warfare, emphasizing the application of emerging technologies such as artificial intelligence, big data, and unmanned systems, as well as comprehensive games in the fields of information, networks, psychology, and cognition. The “frontline” of modern warfare has expanded to include social media, economic sanctions, and cyberattacks, requiring participants to have stronger information control and public opinion guidance capabilities.

At present, the spread of weaponization has penetrated into the military, economic, diplomatic and other fields, bringing with it the apprehension that “everything can be weaponized”. In the sociology of war, communication is seen as an extended tool of power, with information warfare penetrating deeply and accompanying traditional warfare. Weaponized communication is precisely under the framework of information control, by shaping public perceptions and emotions, consolidating or weakening the power of states, regimes or non-state actors. This process not only occurs in wartime, but also affects power relations within and outside the state in non-combatant states. In international political communication, information manipulation has become a key tool in the great power game, as countries try to influence global public opinion and international decision-making by spreading disinformation and launching cyberattacks. Public opinion warfare is not only a means of information dissemination, but also involves the adjustment of power games and diplomatic relations between countries, directly affecting the governance structure and power pattern of the international community. Based on this, this paper will delve into the conceptual evolution of weaponized communication, analyze the social mentality behind it, elaborate on the specific technical means and the risks they entail, and propose multidimensional strategies to deal with them at the national level.

1. From weaponization of communication to weaponization of communication: conceptual evolution and metaphor

Weapons have been symbols and tools of war throughout human history, and war is the most extreme and violent form of conflict in human society. Thus, “weaponized” refers to the use of certain tools for confrontation, manipulation or destruction in warfare, emphasizing the way in which these tools are used.“ Weaponization ”(weaponize) translated as“ makes it possible to use something to attack an individual or group of people”. In 1957, the term “weaponization” was proposed as a military term, and Werner von Braun, leader of the V-2 ballistic missile team, stated that his main work was “weaponizing the military’s ballistic missile technology‘ [3].

“Weaponization ”first appeared in the space field, during the arms race between the United States and the Soviet Union, and the two major powers tried to compete for dominance in outer space.“ Weaponization of space ”refers to the process of using space for the development, deployment or use of military weapons systems, including satellites, anti-satellite weapons and missile defense systems, etc., with the purpose of conducting strategic, tactical or defensive operations. From 1959 to 1962, the United States and the Soviet Union proposed a series of initiatives to ban the use of outer space for military purposes, especially the deployment of weapons of mass destruction in outer space orbit. In 2018, then-U.S. President Trump signed Space Policy Directive-3, launching the construction of the “Space Force” and treating space as an important combat area on the same level as land, air, and ocean. In 2019, the “Joint Statement of the People’s Republic of China and the Russian Federation on Strengthening Contemporary Global Strategic Stability” proposed “prohibiting the placement of any type of weapons in outer space” [4].

In addition to weaponization in the space sector, there is also a trend towards weaponization in the military, economic and diplomatic fields.“ Military weaponization” is the use of resources (such as drones, nuclear weapons, etc.) for military purposes, the deployment of weapons systems, or the development of military capabilities. During the Russo-Ukrainian War in 2022, a report from the Royal United Services Institute showed that Ukraine lost approximately 10,000 drones every month due to the impact of Russian jamming stations. [ 5] “weaponization” also often appears in expressions such as “financial war ”“diplomatic battlefield”. In the economic sphere, weaponization usually refers to the use of shared resources or mechanisms in the global financial system by countries or organizations; diplomatic weaponization is manifested in countries pursuing their own interests and exerting pressure on other countries through economic sanctions, diplomatic isolation, and manipulation of public opinion. Over time, the concept of “weaponization” has gradually expanded into the political, social, cultural and other fields, especially in the information field, and since the 2016 United States presidential election, manipulation of public opinion has become a universal tool in political struggles. David Petraeus, a former director of the CIA in the United States, once said at a National Institute for Strategic Studies conference that the time has come for “the weaponization of everything”.[ 6]

As a metaphor, “weaponization” not only refers to the use of actual physical tools, but also symbolizes the transformation of adversarial and aggressive behavior, emphasizing how the concept of “weapons” permeates daily life, cultural production, and political strategies, showing how social actors use various tools to achieve strategic goals. Nowadays, many areas that should remain neutral, such as the media, law and government agencies, are often described as “weaponized” to criticize their excessive politicization and improper use, highlighting their illegality and negative impact on society. Influence. Through this metaphor, one unconsciously contrasts the current political environment with an idealized and seemingly more moderate past, making one think that the political climate of the past was more rational and civilized, while the present appears too extreme and oppositional.[ 7] Therefore, the essence of “weaponization” is the process of political mediation, which is the use of various means and channels by political forces to influence or control areas that should remain neutral, making them political purposes and tools of political struggle.

In the field of information, the weaponization of communication is a long-standing and strategic means. During World War I and II, propaganda and public opinion warfare were widely used in various countries, and means of communication were used as a psychological tactic. Weaponized communication is the embodiment of the weaponization of communication in the modern information society. It uses algorithms and big data analysis to accurately control the speed and scope of information dissemination, and then controls public opinion and emotions. It reflects the combination of technology, platforms and strategies, making Political forces can more accurately and efficiently control the public perception and public opinion environment. As the ontology of public opinion, information is “weaponized” and used to influence social cognition and group behavior, and the concept of “war” has changed accordingly, no longer just traditional military confrontation, but also includes psychological warfare and cognitive warfare through information dissemination and public opinion manipulation. This shift has led to a range of new terms such as unrestricted warfare, new generation warfare, asymmetric warfare, and irregular warfare. Almost all of these terms are borrowed from “warfare” (warfare) to emphasize diverse conflicts in the information field, and information becomes the core content of “weaponization”.

Although there is some view that the term “war” does not apply to situations where hostilities are not formally declared [8], weaponized communication extends the concept of “war” by weakening the traditional political attributes of war and treating overt or covert forces and forms in various fields in general terms. as an act of communication. It is important to note that in English terms “weaponization” there are two formulations: one is “weaponized noun ”noun“, which means that something has been ”weaponized“ with a weapon function or purpose, and the other is ”weaponization of noun, which refers to the process of converting something into a weapon or having the nature of a weapon. In the academic sphere, Chinese translations differ, although weaponized communication and weaponization of communication are not yet strictly distinguished.“ Weaponized communication ”which focuses more on the means of communication or the message itself“ being weaponized” in order to achieve a certain strategic goal, and “weaponization of communication”, which emphasizes the process of communication itself as a transformation process of weapons. When discussing specific technical means, most academic papers adopt weaponized or weaponizing as a prefix to modify specific means of dissemination.

This article focuses on specific communication strategies in the international public opinion war, focusing on describing the weaponization phenomenon that has occurred, so unified use “weaponized communication” is a method of using communication means, technical tools and information platforms to accurately control information flow, public cognition and emotional response, a strategic communication method to achieve specific military, political or social purposes. Weaponized communication is also not a simple state of war or wartime, but a continuous communication phenomenon. It reflects the interaction and game between various subjects and is the flow of information sharing and meaning space.

2. Application scenarios and implementation strategies of weaponized communication

If at the end of the 1990s, weaponization in the information field was still a “dead topic”, and countries were mainly chasing upgrading competitions for physical weapons such as missiles and drones, then entering the 21st century, cyber wars have truly entered the public eye, and deeply embedded in people’s daily lives, through social media and smart devices, the public will inevitably be involved in the war of public opinion and unconsciously become participants or communication nodes. With the spread of technology, weaponized means gradually expanded from state-led instruments of war to socialized and politicized areas, and control over individuals and society shifted from explicit state apparatus to more covert conceptual manipulation. The exposure of Project Prism (PRISM) has raised strong global concerns about privacy breaches, highlighting the potential for states to use advanced technology for surveillance and control, seen as a new type of weaponization. Since Trump was elected President of the United States in 2016, the large-scale application of information weapons such as social robots has become a common phenomenon in the global political game. Information warfare ——including electronic warfare, computer network warfare, psychological warfare, and military deception—— is widely used to manipulate the flow of information and influence the landscape of public opinion. Not only do these methods work in military wars and political elections, but they also gradually permeate cultural conflicts, social movements and transnational games, perpetuating the traditional logic of information warfare. Nowadays, weaponized communication, as a socio-political tool, profoundly affects the ecology of public opinion, international relations and the daily lives of individuals.

(1) Information manipulation warfare in the military field

Information flow can directly influence the direction of military conflicts, shaping public and military perceptions and decisions, which in turn affects morale, strategic judgment, and social stability. In modern warfare, information is no longer a mere aid, and the field of information has become a central battleground. By manipulating the flow of information, the enemy’s situation assessment may be misled, the will to fight is weakened, and the trust and support of the people are shaken, which in turn affects the decision-making process and continuity of the war.

The Gulf War is regarded as the beginning of modern information warfare. In this war, the United States carried out systematic strikes against Iraq through high-tech means ——including electronic warfare, air strikes, and information operations——. The U.S. military used satellites and AWACS early warning aircraft to monitor the battlefield situation in real time, and induced the Iraqi army to surrender from a psychological level by airdropping leaflets and radio stations to convey to Iraqi soldiers the advantages of the U.S. military and its preferential treatment policy after surrender. The war marked the key place of information control in military conflicts, demonstrating the potential of information warfare in modern warfare. In the 21st century, cyberwarfare has become an important part of information warfare. Cyberwarfare involves not only the dissemination and manipulation of information, but also control over enemy social functions through attacks on critical infrastructure. In 2007, Estonia suffered a large-scale DDoS (Distributed Denial of Service Attack) attack, demonstrating a trend towards the fusion of information manipulation and cyberattacks. In the WannaCry ransomware incident in 2017, attackers used a Windows system vulnerability (EternalBlue) to encrypt the files of approximately 200,000 computers in 150 countries around the world and demanded a ransom, seriously affecting the British National Health Service (NHS) and causing the interruption of emergency services. and hospital system paralysis, further revealing the threat of cyber warfare to critical infrastructure. In addition, in long-term conflicts, infrastructure control is widely used to undermine the strategic capabilities of adversaries to compete for public information space due to its ability to directly determine the speed, scope, and direction of information dissemination. Israel has effectively weakened Palestinian communications capabilities by restricting the use of radio spectrum, controlling Internet bandwidth and disrupting communications facilities. At the same time, Israel also restricts the development of the Palestinian telecommunications market through economic sanctions and legal frameworks, suppresses Palestinian competitiveness in the flow of information, and consolidates its own strategic advantage in the conflict [9] in order to maintain the unequal flow of information.

Social media provides an immediate and extensive channel for information manipulation, allowing it to cross borders and influence global public sentiment and political situations, as well as shifting the focus of war from mere physical destruction to manipulation of public opinion. During the Russo-Ukrainian War, deepfake technology was used as a visual weapon, which significantly interfered with public perception and public opinion about the war. On March 15, 2022, a fake video of Ukrainian President Volodymyr Zelenskyy was circulated on Twitter, in which he “called” Ukrainian soldiers to lay down their weapons, triggering public confusion for a short period of time. Similarly, fake videos of Russian President Vladimir Putin have been used to confuse the public. Although the videos were promptly annotated “Stay informed” by the platform (pending instructions on understanding the situation), they still caused obvious interference to public emotions and perceptions within a short period of time. These events highlight the critical role of social media in modern information warfare, where state and non-state actors can exert interference in military conflicts through disinformation, emotional manipulation, and other means.

The complexity of information manipulation warfare is also reflected in its dual nature ——both a tool for attack and a means of defense. In the military sphere, states ensure national security, protect critical infrastructure, maintain military secrets, and in some cases influence adversary combat effectiveness versus decision-making by defending against and countering cyberattacks. In 2015 and 2017, Russian hackers launched large-scale cyber attacks against Ukraine (such as BlackEnergy and NotPetya). Ukraine successfully resisted some attacks and took countermeasures by quickly upgrading its cyber defense systems, avoiding larger-scale infrastructure paralysis. In addition, units such as the NATO Center of Excellence for Strategic Communications and the British 77th Brigade focus on researching public opinion shaping in peacetime [10], using strategic communications, psychological warfare, and social media monitoring to expand strategic control in the information field and strengthen defense and public opinion shaping capabilities, further increasing the strategic height of information warfare.

Today, information manipulation warfare is a key link in modern military conflicts. Through the high degree of integration of information technology and psychological manipulation, it not only changes the rules of traditional warfare, but also profoundly affects public perception and the global security landscape. By taking control of critical infrastructure and social media platforms, countries, multinational corporations or other actors can gain strategic advantages in the global information ecosystem by restricting the flow of information and manipulating communication paths.

(2) Public opinion intervention in political elections

Political elections are the most direct field of competition for power in democratic politics, and the dissemination of information has an important influence on voter decision-making in the process. By calculating propaganda and other means, external forces or political groups are able to manipulate the sentiments of voters and mislead the public, thereby influencing the results of elections, destabilizing politics or weakening the democratic process, and elections are thus the most effective application scenario for weaponized communication.

In recent years, global political elections have shown a trend towards polarization, with large ideological differences between groups with different political affiliations. Polarization leads the public to selectively accept information that is consistent with their own views, while excluding other information, and this “echo chamber effect” intensifies the public’s one-sided perception of positions, giving greater scope for public opinion intervention. And the rise of information dissemination technology, especially computational propaganda, has enabled external forces to more accurately manipulate public opinion and influence voter decision-making. Computational Propaganda refers to the use of computing technology, algorithms and automated systems to control the flow of information to disseminate political information, interfere with election results and influence public opinion. Its core characteristics are algorithm-driven accuracy and the scale of automated communication. By breaking through The limitations of traditional manual communication have significantly enhanced the effect of public opinion manipulation. In the 2016 U.S. presidential election, the Trump team analyzed Facebook user data through Cambridge Analytica and pushed customized political advertisements to voters, accurately affecting voters’ voting intentions [11]. This incident was seen as a classic case of computational propaganda interfering in elections, and also provided an operational template for other politicians, driving the widespread use of computational propaganda worldwide. In the 2017 French presidential election, candidate Emmanuel Macron’s team was hacked, and internal emails were stolen and made public, claiming that Macron had secret accounts overseas and was involved in tax evasion in an attempt to discredit his image. During the 2018 Brazilian presidential election, the team of candidate Jair Bolsonaro used WhatsApp groups to spread inflammatory political content, targeting and pushing a large number of images, videos and inflammatory messages to influence voter sentiment. According to statistics, from 2017 to 2019, the number of countries using computing for propaganda worldwide increased from 28 to 70, and in 2020 this number rose to 81. This suggests that computational propaganda is redefining the rules of public opinion in global elections through technical means and communication strategies.

Computational propaganda is also an important tool for state actors in the war of public opinion intervention. In 2011, the U.S. Defense Advanced Research Projects Agency (DARPA) launched Operation “Voice of Ernest” in the Middle East to distort conversations on Arabic-language social media by establishing and managing multiple false identities (sockpuppets). Russia also frequently uses computational propaganda to intervene, operating about 200,000 social media accounts in Canada, using far-right and far-left movements to spread pro-Russian rhetoric, create false social hot spots, and try to undermine Canada’s support for Ukraine [12]. As an important part of computing propaganda, social robots create the heat of public opinion through automation and scale, increase the exposure of information on social platforms through specific tags, and control the priority of issues. During the 2016 U.S. election, Russia used social robots to post content supporting Putin and attacking the opposition, covering up the opposition’s voice through information overload, and strengthening the pro-Putin public opinion atmosphere. [ 13] During the 2017 Gulf crisis, Saudi Arabia and Egypt used Twitter bots to create anti-Qatar hashtags#AlJazeeraInsultsKingSalman, which made it a hot topic and fictionalized the peak of anti-Qatar sentiment, which in turn affected global public opinion attitudes towards Qatar. [ 14] Deepfake technology further improves the accuracy and concealment of computing propaganda. In 2024, a fake video of U.S. President Joe Biden went viral on X (formerly Twitter), showing him using offensive language in the Oval Office, sparking controversy in public opinion and influencing voter sentiment. According to a survey by cybersecurity firm McAfee, 63% of respondents had watched a political deepfake video within two months, and nearly half said the content influenced their voting decisions.[ 15]

Globally, computing propaganda has infiltrated public opinion wars in various countries, affecting social stability and national security. The Israel Defense Forces waged a public opinion war against Palestine through digital weapons, Turkey cultivated “a patriotic troll army” to manipulate public opinion at home and abroad, and the Mexican government used botnets to influence public opinion. Computational propaganda is changing the landscape of global political communication as an important means of modern public opinion intervention warfare. With the development of technologies such as artificial intelligence and quantum computing, computing propaganda may also interfere with electoral processes through more covert and efficient means, or even directly threaten the core operating logic of democratic institutions.

(3) Symbolic identity war in the cultural field

Weaponized communication attempts to influence the public’s thoughts, emotions, and behaviors by manipulating information, symbols, and values, which in turn shapes or changes society’s collective cognition and cultural identity. This mode of communication consists not only in the transmission of information, but also in promoting the transmission and identification of a specific ideological or political idea through a specific narrative framework, cultural symbols and emotional resonance. Through the manipulation of cultural symbols, social emotions and collective memory, weaponized communication interferes with social structure and cultural identity in the cultural field, becoming a core means of symbolic identity warfare.

Memes, as a cultural symbol that combines visual elements and concise words, stimulate the emotional response of the audience in a humorous, satirical or provocative way, affecting their political attitudes and behaviors. Pepe the Frog began as a harmless comic book character that was repurposed and weaponized by far-right groups to spread hate speech, gradually evolving into a racist and anti-immigrant symbol. Memes transform complex political sentiments into easy-to-spread visual symbols that quickly stir up public distrust and anger over policy, seen as “weaponized iconoclastic weaponization” (Iconoclastic Weaponization). This process, by manipulating cultural symbols in order to achieve the purpose of political or social struggle [16], aggravates the public’s division of society and politics. For example, during Brexit, memes bearing the words “Take Back Control” Take Back Control spread rapidly, reinforcing nationalist sentiments.

In addition to the manufacture of cultural symbols, the screening and shielding of symbols are equally capable of shaping or deepening a certain cultural identity or political stance. Censorship has been an important means for power to control information since ancient times, and as early as the ancient Greek and Roman periods, governments censored public speeches and literary works to maintain social order and power stability. Entering the digital age, the rise of the Internet and social media has driven the modernization of censorship, and platform censorship has gradually replaced traditional censorship methods as a core tool for contemporary information control and public opinion guidance. Algorithm review detects sensitive topics, keywords, and user behavior data through artificial intelligence, automatically deletes or blocks content deemed “violations”, and the review team of social media manually screens user-generated content to ensure its compliance with platform policies and laws and regulations. The role of platform censorship is not only to limit the dissemination of certain content, but also to guide public opinion and shape the public perception framework through push, deletion and blocking. Although mainstream social platforms control the spread of information through strict content moderation mechanisms, some edge platforms such as Gab, Gettr, Bitchute, and others have become hotbeds of extreme speech and malicious information due to the lack of effective censorship. These platforms do not place sufficient restrictions on content publishing, allowing extreme views and disinformation to spread wantonly. For example, Gab has been repeatedly criticized for its extremist content and is accused of promoting violence and hatred. In the “echo chamber”, users can only access information that is consistent with their own views. This information environment further strengthens extreme ideas and leads to increased antagonism among social groups.[ 17]

Language, as a carrier and tool for information dissemination, can profoundly influence group behavior and cultural identity through emotional manipulation, symbolic politics, and social mobilization. The weaponization of language focuses on how language forms and cultural contexts affect the way information is received, emphasizing how language can be used to manipulate, guide or change people’s cognition and behavior. This involves not only the use of specific lexical and rhetorical devices, but also the construction of specific social meanings and cultural frameworks through linguistic representations. As another important tool of symbolic identity warfare, language shapes the narrative framework “of antagonism between the enemy and the enemy”. The Great Translation Movement spread the nationalist rhetoric of Chinese netizens to international social media platforms through selective translation, triggering negative perceptions of China. This language manipulation amplifies controversial content through emotional expression and deepens the cultural bias of the international community.

The deep logic of the weaponization of language lies in emotional and inflammatory forms of language. Western countries often justify acts of intervention by using the labels of justice such as “human rights” and “democracy”, legitimizing political or military action. White supremacists reshape ideologies using vague labels such as “alt-right”, transforming traditional “white supremacist” with strongly negative connotations into a more neutral concept, reducing the vocabulary’s social resistance, broadening the base of its supporters with a broad “umbrella” identity. Through the infiltration of secular discourse, hate politics and extreme speech are justified, gradually creating a political normality. Language is truly weaponized after the public routineizes this politics.[ 18] In Nigeria, hate-mongering content spreads through racial, religious and regional topics, profoundly deteriorating social relations. [ 19] Linguistic ambiguity and reasonable denial strategies have also become powerful tools for communicators to circumvent their responsibilities and spread complex social and political issues in simplified narratives. Through negative labeling and emotional discourse, Trump’s America First policy deliberately puts forward views that are opposed to mainstream opinions by opposing globalization, questioning climate change science, and criticizing traditional allies, stimulating public distrust of globalization, reshaping the cultural identity of national interests first. [ 20]

III Risks and challenges of weaponized dissemination: legitimacy and destructiveness

Although weaponized communication poses a great risk to the international public opinion landscape, it may be given some legitimacy by certain countries or groups through legal, political or moral frameworks in specific situations. For example, after the “9/11” incident, the United States passed the Patriot Act to expand the surveillance authority of intelligence agencies and implement extensive information control in the name of “anti-terrorism”. This “legitimacy” is often criticized as undermining civil liberties and eroding the core values of democratic society.

In the international political game, weaponized transmission is more often seen as a means of “Gray Zone” (Gray Zone). Confrontations between countries are no longer limited to economic sanctions or diplomatic pressure, but are waged through non-traditional means such as information manipulation and social media intervention. Some States use “the protection of national interests” as a pretext to disseminate false information, arguing that their actions are compliant and, although they may be controversial under international law, are often justified as necessary means “to counter external threats”. In some countries where the regulation of information lacks a strict legal framework, interference in elections is often tolerated or even seen as a “justified” political exercise. At the cultural level, certain countries attempt to shape their own cultural influence on a global scale by disseminating specific cultural symbols and ideologies. Western countries often promote the spread of their values in the name of “cultural sharing” and “communication of civilizations”, but in actual operations, they weaken the identity of other cultures by manipulating cultural symbols and narrative frameworks, leading to global cultural ecology. imbalance. The legal framework also provides support, to a certain extent, for the justification of weaponized dissemination. In the name of “counter-terrorism” and “against extremism”, some countries restrict the dissemination of so-called “harmful information” through information censorship, content filtering and other means. However, this justification often pushes moral boundaries, leading to information blockades and suppression of speech. Information governance on the grounds of “national security”, although internally recognized to a certain extent, provides space for the proliferation of weaponized communications.

Compared to legitimacy, the spread of weaponization is particularly devastating. At present, weaponized communication has become an important tool for power structures to manipulate public opinion. It not only distorts the content of information, but also profoundly affects public perception, social emotions, and international relations through privacy violations, emotional mobilization, and cultural penetration.

(1) Information distortion and cognitive manipulation

Distortion of information means that information is deliberately or unintentionally distorted during dissemination, resulting in significant differences between what the public receives and the original information. On social media, the spread of disinformation and misleading content is rampant, and generated content from artificial intelligence models (such as GPT) may be exacerbated by bias in training data. Gender, race, or social bias may be reflected in automatically generated text, amplifying the risk of information distortion. The fast-spreading nature of social media also makes it difficult for traditional fact-checking mechanisms to keep up with the spread of disinformation. Disinformation often dominates public opinion in a short period of time, and cross-platform dissemination and anonymity complicate clarification and correction. The asymmetries in communication undermine the authority of traditional news organizations, and the public’s preference for trusting instantly updated social platform information over in-depth coverage by traditional news organizations further diminishes the role of news organizations in resisting disinformation.

In addition to the distortion of the information itself, weaponized communication makes profound use of the psychological mechanisms of cognitive dissonance. Cognitive dissonance refers to the psychological discomfort that occurs when an individual is exposed to information that conflicts with their pre-existing beliefs or attitudes. By creating cognitive dissonance, communicators shake the established attitudes of their target audience and even induce them to accept new ideologies. In political elections, targeted dissemination of negative information often forces voters to re-examine their political positions or even change their voting tendencies. Weaponized communication further intensifies the formation of “information cocoon houses” through selective exposure, allowing audiences to tend to access information consistent with their own beliefs, ignoring or rejecting opposing views. This not only reinforces the cognitive biases of individuals, but also allows disinformation to spread rapidly within the group, making it difficult to be broken by external facts and rational voices, and ultimately forming a highly homogeneous ecology of public opinion.

(2) Privacy leakage and digital monitoring

In recent years, the abuse of deepfakes has exacerbated the problem of privacy violations. In 2019, the “ZAO” face-changing software was removed from the shelves due to default user consent to portrait rights, revealing the risk of overcollection of biometric data. Photos uploaded by users that have been processed through deep learning can either generate an accurate face-changing video or become a source of privacy leaks. What’s more, techniques such as deepfakes are abused for gender-based violence, the faces of multiple European and American actresses are illegally planted with fake sex videos and widely distributed, and although the platforms remove this content in some cases, the popularity of open-source programs makes it easy for malicious users to copy and share forged content. In addition, when users use social media, they tend to authorize the platform by default to access their devices’ photos, cameras, microphones and other app permissions. Through these rights, the platform not only collects a large amount of personal data, but also analyzes users’ behavioral characteristics, interest preferences, and social relationships through algorithms, allowing it to accurately deliver ads, recommend content, and even implement information manipulation. This large-scale data acquisition drives global discussion of privacy protections. In Europe, the General Data Protection Regulation attempts to strengthen the protection of individuals’ right to privacy through strict regulations on data collection and use. However, due to “implicit consent” or complex user agreements, platforms often bypass regulations that make the data-processing process less transparent, making it difficult for regular users to understand what the data is actually used for. Section 230 of the U.S. Communications Decency Act provides that online platforms are not legally responsible for user-generated content, a provision that has fueled the development of content moderation on platforms but has also left them with little incentive to respond to privacy infringements. Platforms, motivated by commercial interests, often lag behind in dealing with disinformation and privacy issues, leading to ongoing shelving of audit responsibilities.

In terms of digital surveillance, social platforms work with governments to make user data a core resource “of surveillance capitalism”. The National Security Agency (NSA) implements mass surveillance through phone records, Internet communications, and social media data, and works with large enterprises such as Google and Facebook to obtain users’ online behavioral data for intelligence gathering and behavioral analysis worldwide. The abuse of transnational surveillance technologies is what pushes privacy violations to an international level. Pegasus spyware developed by the Israeli cybersecurity company NSO, which compromises target devices through “zero-click attacks”, can steal private information and communication records in real time. In 2018, in the case of the murder of Saudi journalist Jamal Khashoggi, the Saudi government monitored its communications through Pegasus, revealing the profound threat this technology poses to individual privacy and international politics.

(3) Emotional polarization and social division

Emotions play a key role in influencing individual cognition and decision-making. Weaponized communication influences rational judgment by inciting feelings of fear, anger, sympathy, etc., and pushes the public to react irrationally, driven by emotions. War, violence and nationalism often become the main content of emotional mobilization. Through carefully designed topics, communicators implant elements such as patriotism and religious beliefs into information dissemination, quickly arousing public emotional resonance. The widespread adoption of digital technologies, particularly the combination of artificial intelligence and social media platforms, further amplifies the risk of emotional polarization. The rapid spread of disinformation and extreme speech on the platform comes not only from the sharing behavior of ordinary users, but is also driven by algorithms. Platforms tend to prioritize the push of emotional and highly interactive content, which often contains inflammatory language and extreme views, thus exacerbating the spread of hate speech and extreme views.

Social media hashtags and algorithmic recommendations play a key role in emotional polarization. After the Charlie Hebdo incident, the #StopIslam hashtag became a communication tool for hate speech, with the help of which users posted messages of hatred and violent tendencies. During the 2020 presidential election in the United States, extreme political rhetoric and misinformation on social platforms were also amplified in a bitter partisan struggle. Through precise emotional manipulation, weaponized communication not only tears apart public dialogue, but also greatly affects the democratic process of society. Another particular extremist mobilization tactic is “Weaponized Autism”, where far-right groups use the technical expertise of autistic individuals to implement emotional manipulation. These groups recruit technically competent but socially challenged individuals, transforming them into enforcers of information warfare by giving them a false sense of belonging. These individuals, guided by extremist groups, are used to spread hate speech, carry out cyberattacks and promote extremism. This phenomenon reveals not only the deep-seated mechanisms of emotional manipulation, but also how technology can be exploited by extremist groups to serve the larger political and social agenda.[ 21]

(4) Information colonization and cultural penetration

“Weaponized Interdependence” theory Weaponized Interdependence Theory reveals how states use key nodes in political, economic, and information networks to exert pressure on other states. [ 22] Especially in the field of information, developed countries further consolidate their cultural and political advantages by controlling the implementation of information flows “information colonization”. Digital platforms became the vehicles of this colonial process, the countries of the Global South were highly dependent on Western-dominated technology platforms and social networks for information dissemination, and in sub-Saharan Africa, Facebook has become synonymous with “the Internet”. This dependence not only generates huge advertising revenues for Western businesses, but also has a profound impact on indigenous African cultures and values through algorithmic recommendations, especially in terms of gender, family, and religious beliefs, making cultural penetration the norm.

Digital inequality is another manifestation of information colonization. The dominance of developed countries in digital technology and information resources has increasingly marginalized countries of the South in the economic, educational and cultural fields. Palestine’s inability to effectively integrate into the global digital economy due to inadequate infrastructure and technological blockade both limits local economic development and further weakens its voice in global information dissemination. Through technological blockades and economic sanctions, the world’s major economies and information powers restrict other countries’ access to key technological and innovation resources, which not only hinders the development of science and technology in target countries, but also exacerbates the rupture of the global technology and innovation ecosystem. Since withdrawing from the Iran Nuclear Deal in 2018, U.S. economic sanctions on Iran have blocked its development in the semiconductor and 5G sectors, and the asymmetry between technology and innovation has widened the gap in the global technology ecosystem, putting many countries at a disadvantage in information competition.

IV Reflection and discussion: the battle for the right to speak in the asymmetric communication landscape

In the competitive landscape of “Asymmetric Communication”, strong parties often dominate public opinion through channels such as mainstream media and international news organizations, while weak parties need to use innovative communication technologies and means to make up for their disadvantages and compete for the right to speak. At the heart of this communication landscape lies Information Geopolitics, the idea that the contest of power between states depends not only on geographical location, military power, or economic resources, but also on control over information, data, and technology. The game between the great powers is no longer limited to the control of physical space, but extends to the competition for public opinion space. These “information landscapes” involve the right to speak, information circulation and media influence in the global communication ecosystem. In this process, the country continuously creates landscapes to influence international public opinion and shape the global cognitive framework, thereby achieving its strategic goals. The strategy of asymmetric communication is not only related to the transmission of information content, but more importantly, how to bridge the gap between resources and capabilities with the help of various communication technologies, platforms and means. The core of information communication is no longer limited to the content itself, but revolves around the right to speak. The competition unfolds. With the rise of information warfare and cognitive warfare, whoever has the information will have a head start in global competition.

(1) Technology catching up under the advantage of latecomers

Traditional large countries or strong communicators control the dominance of global public opinion, and by contrast, weak countries often lack communication channels to compete with these large countries. The theory of latecomer advantage advocates that latecomer countries can rapidly rise and circumvent inefficient and outdated links in early technological innovation by leaping forward and bypassing traditional technological paths and introducing existing advanced technologies and knowledge. In the context of weaponized communication, this theory provides information-weak countries with a path to break through the barriers of communication in large countries through emerging technologies, helping them to catch up at the technical level. Traditional media are often constrained by resources, influence and censorship mechanisms, with slow dissemination of information, limited coverage and vulnerability to manipulation by specific countries or groups. The rise of digital media has brought about a fundamental change in the landscape of information dissemination, enabling disadvantaged countries, with the help of globalized Internet platforms, to directly target international audiences without having to rely on traditional news organizations and mainstream media. Through emerging technologies, disadvantaged countries can not only transmit information more precisely, but also rapidly expand their influence in international public opinion through targeted communication and emotional guidance. Later-developing countries can use advanced technologies (such as big data, artificial intelligence, 5G networks, etc.) to achieve precise information dissemination and create efficient communication channels. Taking “big data analysis” as an example, latecomer countries can gain an in-depth understanding of audience needs and public opinion trends, quickly identify the pulse of global public opinion, implement targeted communication, and quickly expand international influence. AI technology not only predicts the direction of public opinion development, but also optimizes communication strategies in real time. The popularization of 5G networks has greatly improved the speed and coverage of information dissemination, allowing latecomer countries to break through the limitations of traditional communication models in a low-cost and efficient manner and form unique communication advantages.

Through transnational cooperation, late-developing countries can integrate more communication resources and expand the breadth and depth of communication. For example, Argentina has established “Latin American News Network” with other Latin American countries to push Latin American countries to speak with a single voice in international public opinion and counter the single narrative of Western media through news content sharing. In Africa, South Africa has partnered with Huawei to promote the “Smart South Africa” project to build a modern information infrastructure and promote digital transformation and efficiency improvements in public services. Governments of late-developing countries should invest more in technological research and development and innovation, and encourage the development of local enterprises and talent. At the same time, attention should be paid to the export of culture and the construction of the media industry, so as to enhance the country’s voice in the international information space through globalized cooperation and decentralized communication models. Governments can fund digital cultural creations, support the growth of local social media platforms, and integrate more communication resources through an international cooperation framework.

(2) Construction of barriers in information countermeasures

Unlike a full-scale conflict that may be triggered by military action, or the risks that economic sanctions may pose, weaponized dissemination is able to achieve strategic objectives without triggering full-scale war, and it is extremely attractive based on cost and strategic considerations. Because weaponized communication is characterized by low cost and high returns, an increasing number of State and non-State actors have chosen to manipulate information in order to reach strategic objectives. The spread of this means of dissemination makes countries face even more complex and variable threats in the face of attacks involving information from outside and inside. With the increasing intensity of information warfare, mere traditional military defense can no longer meet the needs of modern warfare. Instead, building a robust information defense system becomes a key strategy for the country to maintain political stability, safeguard social identity, and enhance international competitiveness. Therefore, how to effectively deal with external interference in information and manipulation of public opinion, as well as counter-information, has become an urgent issue for all countries to address. A complete cybersecurity infrastructure is key to maintaining national security against the manipulation or tampering of sensitive information from outside. Take, for example, the European Union’s push to strengthen cybersecurity in member states through its “Digital Single Market” strategy, which requires internet companies to be more aggressive in dealing with disinformation and external interference. The EU’s cybersecurity directives also provide for member states to establish emergency response mechanisms to protect critical information infrastructure from cyberattacks. In addition, the EU has established cooperation with social platform companies, such as Facebook, Twitter and Google, to combat the spread of fake news by providing anti-disinformation tools and data analysis technologies. Artificial intelligence, big data, and automation technologies are becoming important tools for information defense, used to monitor information propagation paths in real time, identify potential disinformation, and resist public opinion manipulation. In the field of cybersecurity, big data analysis helps decision makers identify and warn against malicious attacks, and optimize countermeasures. The application of these technologies will not only enhance information defence capabilities at the domestic level, but also enhance national initiative and competitiveness in the international information space.

Counter-mechanisms are another important component of the information defence system, especially under pressure from international public opinion, where real-time monitoring of the spread of external information and timely correction of disinformation become key to safeguarding the initiative of public opinion. Since the 2014 Crimean crisis, Ukraine has built a rather large-scale cyber defense system through cooperation with NATO and the United States. Ukraine’s National Cyber Security Service has set up “information countermeasures teams” to counter cyberthreats, using social media and news release platforms to refute false Russian reports in real time, a tactic that has significantly boosted Ukraine’s reputation and trust in international public opinion.

(3) Agenda setting in public opinion guidance

In the global competitive landscape of informatization and digitalization, public opinion guidance involves not only the content of information dissemination, but more importantly, how to set the agenda and focus on hot topics of global concern. The agenda-setting theory suggests that whoever can take control of the topics of information circulation can guide the direction of public opinion. Agenda setting influences public attention and evaluation of events by controlling the scope and focus of discussion of topics, and the rise of social media provides a breakthrough for information-disadvantaged countries to compete for dominance in information dissemination through multi-platform linkage. In the case of Ukraine, for example, during the Russo-Ukrainian War, it disseminated the actual war situation through social media, not only publishing the actual combat situation, but also incorporating the emotional demands of the people, and using the tragic narrative of civilian encounters and urban destruction to inspire sympathy and attention from the international community. While resisting interference from external information, the State also needs to proactively disseminate positive narratives and tell cultural stories that can resonate with the international community. The story should correspond to the emotional needs of international public opinion, while at the same time showing the uniqueness of the country and strengthening the link with the international community. Taking my country’s “One Belt, One Road” co-construction as an example, in the “One Belt, One Road” co-construction country, my country has invested in and constructed a large number of infrastructure projects. These projects not only helped improve local economic basic conditions, but also demonstrated China’s globalization process. Responsibility provides a window for cultural cooperation and exchange activities, showing the rich history and culture of the Chinese nation to the world It has demonstrated the inclusiveness and responsibility of Chinese culture to the international community.

However, because countries of the Global South often face constraints in terms of resources, technology and international communication platforms, and have difficulty in competing directly with developed countries, they rely on more flexible and innovative means of communication to participate in the setting of the global agenda. For example, Brazil is under negative public opinion pressure from the Western media when it comes to dealing with issues of environmental protection and climate change, especially the deforestation of the Amazon forest. To this end, the Brazilian government actively creates the country’s image in the field of environmental protection by using social media to publish recent data and success stories about Amazon protection. At the same time, Brazil has strengthened its voice on climate issues by engaging with other developing countries in global climate change negotiations and promoting South-South cooperation. Large international events, humanitarian activities and the production of cultural products, among others, are also effective ways of telling national stories. International sports events such as the World Cup and the Olympic Games are not only a display platform for sports competitions, but also an exhibition venue for national image and cultural soft power. By hosting or actively participating in these global events, the country can show its strength, value and cultural charm to the world, promoting a positive public opinion agenda.

“War is nothing more than the continuation of politics through another means”[23]. This classic Clausewitz assertion is modernized in the context of weaponized communication. Weaponized communication breaks through the physical boundaries of traditional warfare and becomes a modern strategic means of integrating information warfare, cognitive warfare, and psychological warfare. It manipulates the flow of information and public perception in a non-violent form, so that State and non-State actors can achieve political goals without relying on direct military action, reflecting a highly strategic and targeted nature. By manipulating information, emotions and values, weaponized communication can achieve strategic goals while avoiding all-out war, and in global competition and conflict, it has become an important means of political suppression by powerful countries against weak ones.

The core of weaponized communication lies in weakening the enemy’s decision-making and operational capabilities through information manipulation, but its complexity makes the communication effect difficult to fully predict. Although information-powerful countries suppress information-weak countries through technological advantages and communication channels, the effectiveness of communication is uncertain. Especially in the context of the globalization of social media and digital platforms, the boundaries and effects of information flow are becoming increasingly difficult to control. This complexity offers the weak countries the opportunity to break through the hegemony of discourse and promote the reverse game of information dissemination. Weak countries can use these platforms to launch confrontations, challenge the information manipulation of powerful countries, and take their place in global public opinion. The asymmetric game reflects the dynamic balance of international public opinion, whereby communication is no longer one-way control, but more complex interaction and dialogue, giving the weak the possibility of influencing public opinion. The current international public opinion landscape is still dominated by the one-way suppression of information-weak countries by information-powerful countries, but this situation is not unbreakable. Information warfare has a high degree of asymmetry, and information-weak countries can counter it step by step with technological innovation, flexible strategies and transnational cooperation. By exerting “asymmetric advantages”, weak countries are not only able to influence global public opinion, but also to enhance their voice with the help of joint action and information-sharing. Transnational cooperation and the establishment of regional alliances provide the weak countries with a powerful tool to counter the powerful, enabling them to form a synergy in international public opinion and challenge the dominance of the information powers. Under the “war framework”, countries can flexibly adjust their strategies and proactively shape the information dissemination pattern, rather than passively accepting information manipulation by powerful countries.

Sociology of war emphasizes the role of social structure, cultural identity, and group behavior in warfare. Weaponized communication is not only a continuation of military or political behavior, but also profoundly affects the psychosocial, group emotions, and cultural identity. Powerful countries use information dissemination to shape other countries’ perceptions and attitudes in order to achieve their own strategic goals. However, from a sociological perspective, weaponized transmission is not a one-way suppression, but rather the product of complex social interactions and cultural responses. In this process, the information-weak countries are not completely vulnerable, but, on the contrary, they can counter external manipulation with “soft power” with the help of cultural communication, social mobilization and dynamic confrontation of global public opinion, shaping a new collective identity and demonstrating the legitimacy of “weak weapons”.

(Fund Project: Research results of the National Social Science Fund Major Project to Study and Interpret the Spirit of the Third Plenary Session of the 20th Central Committee of the Communist Party of China “Research on Promoting the Integrated Management of News Publicity and Online Public Opinion” (Project No.: 24ZDA084))

現代國語:

作者:

郭小安 康如诗来源:

  发布时间:

2025-05-06

【摘要】在國際輿論戰中,武器化傳播已滲透軍事、經濟、外交等領域,帶來“一切皆可武器化”的想像與實踐。武器化傳播通過技術、平台和政策操控公眾認知,體現了權力分配與文化博弈的複雜互動。在全球化和數字化的推動下,認知操控、社會分裂、情感極化、數字監控、信息殖民已成為影響國家穩定的新型手段,這不僅加劇了信息強國與弱國間的競爭,也為信息弱國提供了通過靈活策略和技術創新實現逆轉的機會。在全球非對稱傳播格局下,如何在技術創新與倫理責任、戰略目標與社會平衡間找到契合點和平衡點,將是影響未來國際輿論格局的關鍵要素。

【關鍵詞】輿論戰;武器化傳播;信息操縱;非對稱傳播;信息安全

如果說“宣傳是對現代世界的理性認可”[1],那麼武器化傳播則是對現代技術手段的理性應用。在輿論戰中,各參與主體通過不同傳播手段實現戰略目標,做到表面合理且隱蔽。與傳統軍事衝突不同,現代戰爭不僅涉及物理對抗,還涵蓋信息、經濟、心理及技術等多個領域的競爭。隨著技術進步和全球化的推動,戰爭形態發生深刻變化,傳統的物理對抗逐漸轉向多維度、多領域的綜合作戰。在這一過程中,武器化傳播作為一種現代戰爭形式,成為通過控制、引導和操縱輿論,影響敵對方或目標受眾的心理、情感與行為,進而實現政治、軍事或戰略目的的隱形暴力手段。 《戰爭論》認為,戰爭是讓敵人無力抵抗,且屈從於我們意志的一種暴力行為。 [2]在現代戰爭中,這一目標的實現不僅依賴於軍事力量的對抗,更需要信息、網絡與心理戰等非傳統領域的支持。第六代戰爭(Sixth Generation Warfare)預示戰爭形態的進一步轉變,強調人工智能、大數據、無人系統等新興技術的應用,以及信息、網絡、心理和認知領域的全面博弈。現代戰爭的“前線”已擴展到社交媒體、經濟制裁和網絡攻擊等層面,要求參與者俱備更強的信息控制與輿論引導能力。

當前,武器化傳播已滲透到軍事、經濟、外交等領域,帶來“一切皆可武器化”的憂慮。在戰爭社會學中,傳播被視為權力的延伸工具,信息戰爭深刻滲透並伴隨傳統戰爭。武器化傳播正是在信息控制的框架下,通過塑造公眾認知與情感,鞏固或削弱國家、政權或非國家行為者的權力。這一過程不僅發生在戰時,也在非戰斗狀態下影響著國家內外的權力關係。在國際政治傳播中,信息操控已成為大國博弈的關鍵工具,各國通過傳播虛假信息、發動網絡攻擊等手段,試圖影響全球輿論和國際決策。輿論戰不僅是信息傳播的手段,更涉及國家間權力博弈與外交關係的調整,直接影響國際社會的治理結構與權力格局。基於此,本文將深入探討武器化傳播的概念流變,分析其背後的社會心態,闡述具體的技術手段及所帶來的風險,並從國家層面提出多維應對策略。

一、從傳播武器化到武器化傳播:概念流變及隱喻

武器在人類歷史上一直是戰爭的象徵和工具,戰爭則是人類社會中最極端、暴力的衝突形式。因此,“被武器化”是指將某些工具用於戰爭中的對抗、操控或破壞,強調這些工具的使用方式。 “武器化”(weaponize)譯為“使得使用某些東西攻擊個人或團體成為可能”。 1957年,“武器化”一詞作為軍事術語被提出,V-2彈道導彈團隊的領導者沃納·馮·布勞恩表示,他的主要工作是“將軍方的彈道導彈技術‘武器化’”[3]。

“武器化”最早出現在太空領域,時值美蘇軍備競賽時期,兩個大國力圖爭奪外太空主導權。 “太空武器化”是指將太空用於發展、部署或使用軍事武器系統的過程,包括衛星、反衛星武器和導彈防禦系統等,目的是進行戰略、戰術或防禦性行動。 1959年至1962年,美蘇提出了一系列倡議,禁止將外太空用於軍事目的,尤其是禁止在外層空間軌道部署大規模毀滅性武器。 2018年,當時的美國總統特朗普簽署了《空間政策指令-3》,啟動“太空軍”建設,將太空視為與陸地、空中、海洋同等的重要作戰領域。 2019年,《中華人民共和國和俄羅斯聯邦關於加強當代全球戰略穩定的聯合聲明》中倡議“禁止在外空放置任何類型武器”[4]。

除太空領域的武器化外,軍事、經濟、外交等領域也顯現武器化趨勢。 “軍事武器化”是將資源(如無人機、核武器等)用於軍事目的、部署武器系統或發展軍事能力。 2022年俄烏戰爭期間,英國皇家聯合軍種研究所的報告顯示,烏克蘭每月因俄羅斯干擾站的影響,損失約10000架無人機。 [5]“武器化”也常出現在“金融戰爭”“外交戰場”等表述中。在經濟領域,武器化通常指國家或組織對全球金融系統中的共享資源或機制的利用;外交武器化則表現為國家通過經濟制裁、外交孤立、輿論操控等手段,追求自身利益並對他國施加壓力。隨著時間的推移,“武器化”概念逐漸擴展到政治、社會、文化等領域,尤其在信息領域,自2016年美國總統大選以來,輿論操縱已成為政治鬥爭的普遍工具。美國前中央情報局局長戴維·彼得雷烏斯曾在國家戰略研究所會議上表示,“萬物武器化”(the weaponization of everything)的時代已經來臨。 [6]

作為一種隱喻,“武器化”不僅指實際物理工具的使用,還像徵著對抗性和攻擊性行為的轉化,強調“武器”這一概念如何滲透至日常生活、文化生產和政治策略中,展現社會行動者如何利用各種工具達成戰略目的。時下,許多本應保持中立的領域,如媒體、法律和政府機構,常被描述為“武器化”,用以批判它們的過度政治化和被不正當利用,突出其非法性及對社會的負面影響。通過這一隱喻,人們無意識地將當前的政治環境與理想化的、看似更溫和的過去進行對比,使人們認為過去的政治氛圍更加理性和文明,而現今則顯得過於極端和對立。 [7]因此,“武器化”的實質是政治中介化的過程,是政治力量通過各種手段和渠道,影響或控製本應保持中立的領域,使其成為政治目的和政治鬥爭的工具。

在信息領域,傳播武器化是長期存在的一種戰略手段。第一、二次世界大戰期間,各國就廣泛使用了宣傳和輿論戰,傳播手段被作為一種心理戰術使用。武器化傳播是傳播武器化在現代信息社會中的體現,其利用算法和大數據分析精準地控制信息的傳播速度和範圍,進而操控輿論和情感,反映了技術、平台和策略的結合,使得政治力量可以更加精準和高效地操控公眾認知與輿論環境。信息作為輿論的本體,被“武器化”並用於影響社會認知和群體行為,“戰爭”的概念也隨之變化,不再只是傳統的軍事對抗,還包括通過信息傳播和輿論操控實現的心理戰和認知戰。這種轉變促生了一系列新術語,例如無限制戰爭(unrestricted warfare)、新一代戰爭(new generation warfare)、非對稱戰爭(asymmetric warfare)和非常規戰爭(irregular warfare)等。這些術語幾乎都藉用“戰爭”(warfare)強調信息領域中的多樣化衝突,信息成為被“武器化”的核心內容。

儘管有部分觀點認為“戰爭”一詞不適用於未正式宣布敵對行動的情況[8],但武器化傳播通過弱化戰爭的傳統政治屬性,將各領域的公開或隱蔽的力量和形式籠統地視作傳播行為,從而擴展了“戰爭”這一概念的外延。值得注意的是,在英文術語中“武器化”有兩種表述方式:一種是“weaponized noun(名詞)”,即表示某物已經“被武器化”,具備武器功能或用途;另一種是“weaponization of noun”,指將某物轉化為武器或具有武器性質的過程。在學術領域,儘管weaponized communication和weaponization of communication尚未嚴格區分,但中文翻譯有所區別。 “武器化傳播”更側重於傳播手段或信息本身“被武器化”,以實現某種戰略目標;“傳播武器化”則強調傳播過程本身作為武器的轉化過程。在討論具體技術手段時,多數學術論文采用weaponed或weaponizing作為前綴,以修飾具體的傳播手段。

本文重點討論的是國際輿論戰中的具體傳播策略,著重描述已經發生的武器化現象,故統一使用“武器化傳播”,其是一種利用傳播手段、技術工具和信息平台,通過精確操控信息流動、公眾認知與情感反應,達到特定軍事、政治或社會目的的策略性傳播方式。武器化傳播也並非單純的戰爭或戰時狀態,而是一種持續的傳播現象,它反映了各主體間的互動與博弈,是信息共享和意義空間的流動。

二、武器化傳播的應用場景及實施策略

如果說20世紀90年代末,信息領域的武器化仍是一個“死話題”,各國主要追逐導彈、無人機等實體武器的升級競賽,那麼步入21世紀,網絡戰爭則真正衝進了公眾視野,並深刻嵌入人們的日常生活,經由社交媒體和智能設備,公眾不可避免地捲入輿論戰爭,不自覺地成為參與者或傳播節點。隨著技術的普及,武器化手段逐漸從國家主導的戰爭工具擴展到社會化和政治化領域,對個人和社會的控制從顯性的國家機器轉向更隱蔽的觀念操控。棱鏡計劃(PRISM)的曝光引發了全球對隱私洩露的強烈擔憂,凸顯了國家利用先進技術進行監視和控制的潛力,這被視為一種新型的武器化。自2016年特朗普當選美國總統以來,社交機器人等信息武器的大規模應用,成為全球政治博弈中的常見現象。信息作戰——包括電子戰、計算機網絡作戰、心理戰和軍事欺騙——被廣泛用於操控信息流動,影響輿論格局。這些手段不僅在軍事戰爭和政治選舉中發揮作用,還逐漸滲透到文化衝突、社會運動及跨國博弈之中,傳統的信息作戰邏輯得以延續。如今,武器化傳播作為一種社會政治工具,深刻影響著輿論生態、國際關係以及個人的日常生活。

(一)軍事領域的信息操縱戰

信息流能夠直接影響軍事衝突的走向,塑造公眾和軍隊的認知與決策,進而影響士氣、戰略判斷和社會穩定。在現代戰爭中,信息不再是單純的輔助工具,信息領域已成為核心戰場。通過操控信息流向,敵方的形勢評估可能被誤導,戰鬥意志被削弱,民眾的信任與支持被動搖,進而影響戰爭的決策過程與持續性。

海灣戰爭(Gulf War)被視為現代信息戰的開端。在這場戰爭中,美國通過高科技手段——包括電子戰、空中打擊和信息操作——實施了對伊拉克的系統性打擊。美軍利用衛星和AWACS預警機實時監控戰場態勢,通過空投傳單和廣播電台向伊拉克士兵傳遞美軍優勢及投降後的優待政策,從心理層面誘使伊軍投降。這場戰爭標誌著信息控制在軍事衝突中的關鍵地位,展示了信息戰在現代戰爭中的潛力。進入21世紀,網絡戰成為信息戰的重要組成部分。網絡戰不僅涉及信息的傳播和操控,還包括通過攻擊關鍵基礎設施實現對敵方社會功能的控制。 2007年愛沙尼亞遭遇大規模DDoS(Distributed Denial of Service Attack)攻擊,展示了信息操縱與網絡攻擊融合的趨勢。 2017年在WannaCry勒索軟件事件中,攻擊者利用Windows系統漏洞(EternalBlue)加密全球150個國家約20萬台計算機文件,要求支付贖金,嚴重影響英國國家健康服務體系(NHS),導致急診服務中斷和醫院系統癱瘓,進一步揭示了網絡戰對關鍵基礎設施的威脅。此外,在長期衝突中,基礎設施控制因能夠直接決定信息傳播的速度、範圍和方向,被廣泛用於削弱對手的戰略能力,爭奪公共信息空間。以色列通過限制無線電頻譜使用、控制互聯網帶寬和破壞通信設施,有效削弱了巴勒斯坦的通信能力。同時,以色列還通過經濟制裁和法律框架限制巴勒斯坦電信市場的發展,壓制巴勒斯坦在信息流動中的競爭力,鞏固自身在衝突中的戰略優勢[9],以維持信息的不平等流動。

社交媒體為信息操縱提供了即時、廣泛的信息傳播渠道,使其能夠跨越國界,影響全球公眾情緒和政治局勢,也使戰爭焦點從單純的物理破壞轉向輿論操控。俄烏戰爭期間,深度偽造技術作為視覺武器,對公眾認知和戰爭輿論產生了顯著干擾。 2022年3月15日,烏克蘭總統澤連斯基的偽造視頻在Twitter上傳播,視頻中他“呼籲”烏克蘭士兵放下武器,引發了短時間內的輿論混亂。同樣,俄羅斯總統普京的偽造視頻也被用以混淆視聽。儘管這些視頻被平台迅速標註“Stay informed”(等待了解情況)的說明,但其在短時間內仍然對公眾情緒和認知造成明顯干擾。這些事件凸顯了社交媒體在現代信息戰中的關鍵作用,國家和非國家行為體可以通過虛假信息、情感操控等手段對軍事衝突施加干擾。

信息操縱戰的複雜性還體現在其雙重特性上——既是攻擊工具,也是防禦的手段。在軍事領域,各國通過防禦和反擊網絡攻擊來確保國家安全、保護關鍵基礎設施、維護軍事機密,並在某些情況下影響對手的戰鬥力與決策。 2015年和2017年,俄羅斯黑客發起了針對烏克蘭的大規模網絡攻擊(如BlackEnergy和NotPetya),烏克蘭通過迅速升級網絡防禦系統,成功抵禦部分攻擊並採取反制措施,避免了更大規模的基礎設施癱瘓。此外,北約戰略傳播卓越中心和英國第77旅等單位專注研究和平時期的輿論塑造[10],利用戰略傳播、心理戰和社交媒體監控等手段,擴大信息領域的戰略控制,並強化了防禦與輿論塑造能力,進一步提高了信息戰的戰略高度。

如今,信息操縱戰已經成為現代軍事衝突中的關鍵環節。通過信息技術與心理操控的高度結合,它不僅改變了傳統戰爭的規則,也深刻影響著公眾認知和全球安全格局。國家、跨國公司或其他行為體通過掌控關鍵基礎設施和社交媒體平台,限制信息流動、操控傳播路徑,從而在全球信息生態中獲得戰略優勢。

(二)政治選舉的輿論干預戰

政治選舉是民主政治中最直接的權力競爭場域,信息傳播在此過程中對選民決策具有重要影響。通過計算宣傳等手段,外部勢力或政治團體能夠操縱選民情緒、誤導公眾認知,從而左右選舉結果、破壞政治穩定或削弱民主進程,選舉因此成為武器化傳播最具效果的應用場景。

近年來,全球政治選舉呈現極化趨勢,持不同政治立場的群體之間存在巨大的意識形態差異。極化導致公眾選擇性接受與自身觀點一致的信息,同時排斥其他信息,這種“回音室效應”加劇了公眾對立場的片面認知,為輿論干預提供了更大的空間。而信息傳播技術,尤其是計算宣傳的興起,使外部勢力能夠更加精準地操控輿論和影響選民決策。計算宣傳(Computational Propaganda)指利用計算技術、算法和自動化系統操控信息流動,以傳播政治信息、干預選舉結果和影響輿論,其核心特徵在於算法驅動的精準性和自動化傳播的規模化,通過突破傳統人工傳播的限制,顯著增強了輿論操控的效果。 2016年美國總統選舉中,特朗普團隊通過劍橋分析公司分析Facebook用戶數據,為選民定向推送定制化的政治廣告,精準影響了選民的投票意向[11]。這一事件被視為計算宣傳干預選舉的典型案例,也為其他政客提供了操作模板,推動了計算宣傳在全球範圍內的廣泛應用。 2017年法國總統選舉中,候選人埃馬紐埃爾·馬克龍(Emmanuel Macron)團隊遭遇黑客攻擊,內部郵件被竊取並公開,內容稱馬克龍在海外擁有秘密賬戶並涉及逃稅,企圖抹黑其形象。 2018年巴西總統選舉期間,候選人雅伊爾·博索納羅(Jair Bolsonaro)團隊利用WhatsApp群組傳播煽動性政治內容,定向推送大量圖像、視頻和煽動性消息以影響選民情緒。據統計,自2017年至2019年,全球採用計算宣傳的國家由28個增加至70個,2020年這一數量上升至81個。這表明,計算宣傳正通過技術手段和傳播策略,重新定義全球選舉中的輿論規則。

計算宣傳也是國家行為者在輿論干預戰中的重要工具。 2011年,美國國防高級研究計劃局(DARPA)在中東地區開展“歐內斯特之聲”行動,通過建立和管理多個虛假身份(sockpuppets),扭曲阿拉伯語社交媒體的對話。俄羅斯也頻繁利用計算宣傳實施干預,在加拿大操作約20萬個社交媒體賬戶,借助極右翼和極左翼運動散佈親俄言論,製造虛假的社會熱點,試圖破壞加拿大對烏克蘭的支持[12]。作為計算宣傳的重要組成部分,社交機器人通過自動化和規模化手段製造輿論熱度,藉由特定標籤在社交平台上增加信息的曝光率,操控議題的優先級。 2016年美國大選期間,俄羅斯利用社交機器人發布支持普京和攻擊反對派的內容,通過信息過載(information overload)掩蓋反對派聲音,強化親普京的輿論氛圍。 [13]2017年海灣危機期間,沙特阿拉伯和埃及通過Twitter機器人製造反卡塔爾標籤#AlJazeeraInsultsKingSalman的熱度,使其成為熱門話題,虛構了反卡塔爾情緒的高峰,進而影響了全球範圍內對卡塔爾的輿論態度。 [14]深度偽造技術則進一步提升了計算宣傳的精準性與隱蔽性。 2024年,美國總統喬·拜登的偽造視頻在X(原Twitter)上迅速傳播,視頻顯示其在橢圓形辦公室使用攻擊性語言,引發輿論爭議並影響選民情緒。據網絡安全公司McAfee調查,63%的受訪者在兩個月內觀看過政治深度偽造視頻,近半數表示這些內容影響了他們的投票決定。 [15]

在全球範圍內,計算宣傳已滲透各國輿論戰中,影響著社會穩定與國家安全。以色列國防軍通過數字武器對巴勒斯坦展開輿論戰,土耳其培養了“愛國巨魔軍隊”操控國內外輿論,墨西哥政府利用殭屍網絡影響輿論。作為現代輿論干預戰的重要手段,計算宣傳正在改變全球政治傳播的格局。隨著人工智能、量子計算等技術的發展,計算宣傳還可能通過更隱蔽和高效的方式乾預選舉流程,甚至直接威脅民主制度的核心運行邏輯。

(三)文化領域的符號認同戰

武器化傳播通過操控信息、符號和價值觀,試圖影響公眾的思想、情感和行為,進而塑造或改變社會的集體認知與文化認同。這種傳播方式不僅在於信息的傳遞,更通過特定的敘事框架、文化符號和情感共鳴,推動某種特定的意識形態或政治理念的傳播與認同。通過操縱文化符號、社會情感和集體記憶,武器化傳播在文化領域干擾社會結構與文化認同,成為符號認同戰的核心手段。

模因(Meme)作為一種集視覺元素和簡潔文字於一體的文化符號,以幽默、諷刺或挑釁的方式激發觀眾的情感反應,影響他們的政治態度和行為。佩佩模因(Pepe the Frog)起初是一個無害的漫畫角色,被極右翼群體重新利用並武器化,用以傳播仇恨言論,逐漸演變為種族主義和反移民的象徵。模因將復雜的政治情緒轉化為便於傳播的視覺符號,迅速激起公眾對政策的不信任和憤怒,被視為“武器化的偶像破壞主義”(Iconoclastic Weaponization)。這一過程通過操控文化符號,以達到政治或社會鬥爭的目的[16],加劇了公眾對社會和政治的分裂。例如,在英國脫歐期間,帶有“Take Back Control”(奪回控制權)字樣的模因迅速傳播,強化了民族主義情緒。

除了文化符號的製造外,符號的篩选和屏蔽同樣能夠塑造或加深某種文化認同或政治立場。審查制度自古以來就是權力控制信息的重要手段,早在古希臘和古羅馬時期,政府就對公共演講和文學作品進行審查,以維持社會秩序和權力穩定。進入數字時代,互聯網和社交媒體的興起推動了審查制度的現代化,平台審查逐漸取代傳統的審查方式,成為當代信息控制和輿論引導的核心工具。算法審查通過人工智能檢測敏感話題、關鍵詞和用戶行為數據,自動刪除或屏蔽被視為“違規”的內容,社交媒體的審核團隊會對用戶生成的內容進行人工篩選,確保其符合平台政策和法律法規。平台審查的作用不僅是限制某些內容的傳播,更是通過推送、刪除和屏蔽等方式引導輿論,塑造公眾認知框架。儘管主流社交平台通過嚴格的內容審核機制控制信息傳播,但一些邊緣平台,如Gab、Gettr、Bitchute等因缺乏有效審查,成為極端言論和惡意信息的溫床。這些平台未對內容髮布做出足夠限制,極端觀點和虛假信息得以肆意擴散,例如,Gab因極端主義內容屢遭批評,被指助長暴力和仇恨。在迴聲室中,用戶只能接觸與自身觀點一致的信息,這種信息環境更強化了極端思想,導致社會群體間的對立加劇。 [17]

語言作為信息傳播的載體和工具,能夠通過情感操控、符號政治和社會動員等方式,深刻影響群體行為和文化認同。語言武器化聚焦於語言形式和文化語境如何影響信息的接收方式,強調語言如何被用來操控、引導或改變人們的認知與行為。這不僅涉及特定詞彙和修辭手法的使用,更包括通過語言表述建構特定的社會意義和文化框架。作為符號認同戰的另一重要工具,語言塑造了“敵我對立”的敘事框架。大翻譯運動(Great Translation Movement)通過選擇性翻譯中國網民的民族主義言論,將其傳播到國際社交媒體平台,引發了對中國的負面認知。這種語言操控通過情緒化表達放大了爭議性內容,加深了國際社會的文化偏見。

語言武器化的深層邏輯在於情緒化和煽動性的語言形式。西方國家常以“人權”與“民主”等正義化標籤為乾預行為辯護,合法化政治或軍事行動。白人至上主義者使用“另類右翼”等模糊標籤重塑意識形態,將傳統的帶有強烈負面含義的“白人至上主義”轉化為一個較為中立的概念,降低了該詞彙的社會抵抗力,用寬泛的“傘式”身份擴大其支持者的基礎。通過對世俗話語的滲透,仇恨政治和極端言論被正當化,逐漸形成一種政治常態。當公眾將這種政治日常化後,語言實現了真正的武器化。 [18]在尼日利亞,煽動仇恨的內容通過種族、宗教和地區話題擴散,深刻惡化了社會關係。 [19]語言的模糊性和合理否認策略也成為傳播者規避責任的有力工具,在被簡化的敘事中傳播複雜的社會和政治議題。特朗普的美國優先(America First)政策通過否定性標籤和情緒化話語,以反對全球化、質疑氣候變化科學、抨擊傳統盟友等方式,故意提出與主流意見相對立的觀點,激發公眾對全球化的不信任,重塑國家利益優先的文化認同。 [20]

三、武器化傳播的風險與挑戰:正當性與破壞性

儘管武器化傳播給國際輿論格局帶來了巨大風險,但特定情形下,其可能會被某些國家或團體通過法律、政治或道德框架賦予一定的正當性。如“9·11”事件後,美國通過《愛國法案》擴大了情報部門的監控權限,以“反恐”為名實施廣泛的信息控制,這種“正當性”常被批評為破壞公民自由,侵蝕了民主社會的核心價值。

在國際政治博弈中,武器化傳播更常被視為“灰色區域”(Gray Zone)的手段。國家間的對抗不再局限於經濟制裁或外交壓力,而是通過信息操控、社交媒體干預等非傳統方式展開。部分國家以“保護國家利益”為藉口傳播虛假信息,辯稱其行為是合規的,儘管這些行為可能在國際法上存在爭議,但往往被合理化為“反制外部威脅”的必要手段。在一些信息監管缺乏嚴格法律框架的國家,選舉的干預行為往往被容忍,甚至被視為一種“正當”的政治活動。在文化層面,某些國家通過傳播特定的文化符號和意識形態,試圖在全球範圍內塑造自身的文化影響力。西方國家常以“文化共享”和“文明傳播”為名,推動其價值觀的傳播,而在實際操作中,卻通過操控文化符號和敘事框架,削弱其他文化的認同感,導致全球文化生態的不平衡。法律框架也在一定程度上為武器化傳播的正當性提供了支持。一些國家以“反恐”和“反對極端主義”為名,通過信息審查、內容過濾等手段限制所謂“有害信息”的傳播。然而,這種正當性往往突破了道德邊界,導致信息封鎖和言論壓制。以“國家安全”為理由的信息治理,雖然在一定程度上獲得了內部認可,卻為武器化傳播的氾濫提供了空間。

相較於正當性,武器化傳播的破壞性尤為顯著。目前,武器化傳播已成為權力結構操控輿論的重要工具,其不僅扭曲了信息內容,還通過隱私侵犯、情感動員和文化滲透等方式,深刻影響了公眾認知、社會情緒以及國際關係。

(一)信息失真與認知操控

信息失真指信息在傳播過程中被故意或無意扭曲,導致公眾接收到的內容與原始信息存在顯著差異。在社交媒體上,虛假信息和誤導性內容的傳播日益猖獗,人工智能模型(如GPT)的生成內容,可能因訓練數據的偏見而加劇這一問題。性別、種族或社會偏見可能被反映在自動生成的文本中,放大信息失真的風險。社交媒體的快速傳播特性也使傳統的事實核查機制難以跟上虛假信息的擴散速度。虛假信息在短時間內往往佔據輿論主導地位,跨平台傳播和匿名性使得澄清與糾正變得更加複雜。傳播的不對稱性削弱了傳統新聞機構的權威性,公眾更傾向於相信即時更新的社交平台信息,而非傳統新聞機構的深入報導,這進一步削弱了新聞機構在抵制虛假信息中的作用。

除了信息本身的失真,武器化傳播還深刻利用了認知失調的心理機制。認知失調指個體接觸到與其已有信念或態度相衝突的信息時產生的心理不適感。傳播者通過製造認知失調,動搖目標受眾的既有態度,甚至誘導其接受新的意識形態。在政治選舉中,定向傳播負面信息常迫使選民重新審視政治立場,甚至改變投票傾向。武器化傳播通過選擇性暴露進一步加劇了“信息繭房”的形成,讓受眾傾向於接觸與自身信念一致的信息,忽視或排斥相反觀點。這不僅強化了個體的認知偏見,也讓虛假信息在群體內部快速擴散,難以被外界的事實和理性聲音打破,最終形成高度同質化的輿論生態。

(二)隱私洩露與數字監控

近年來,深度偽造技術的濫用加劇了隱私侵權問題。 2019年,“ZAO”換臉軟件因默認用戶同意肖像權而被下架,揭示了生物特徵數據的過度採集風險。用戶上傳的照片經深度學習處理後,既可能生成精確的換臉視頻,也可能成為隱私洩露的源頭。更嚴重的是,深度偽造等技術被濫用於性別暴力,多名歐美女演員的面孔被非法植入虛假性視頻並廣泛傳播,儘管平台在部分情況下會刪除這些內容,但開源程序的普及讓惡意用戶能夠輕鬆複製和分享偽造內容。此外,用戶在使用社交媒體時,往往默認授權平台訪問其設備的照片、相機、麥克風等應用權限。通過這些權限,平台不僅收集了大量個人數據,還能夠通過算法分析用戶的行為特徵、興趣偏好和社交關係,進而精準投放廣告、內容推薦甚至實施信息操控。這種大規模數據採集推動了對隱私保護的全球討論。在歐洲,《通用數據保護條例》(General Data Protection Regulation)試圖通過嚴格的數據收集和使用規定,加強個人隱私權保障。然而,由於“隱性同意”或複雜的用戶協議,平台常常繞過相關規定,使數據處理過程缺乏透明度,導致普通用戶難以了解數據的實際用途。美國《通信規範法》第230條規定,網絡平台無需為用戶生成的內容承擔法律責任,這一規定推動了平台內容審核的發展,但也使其在應對隱私侵權時缺乏動力。平台出於商業利益的考慮,往往滯後處理虛假信息和隱私問題,導致審核責任被持續擱置。

在數字監控方面,社交平台與政府的合作使用戶數據成為“監控資本主義”的核心資源。美國國家安全局(NSA)通過電話記錄、互聯網通信和社交媒體數據,實施大規模監控,並與Google、Facebook等大型企業合作,獲取用戶的在線行為數據,用於全球範圍內的情報收集和行為分析。跨國監控技術的濫用更是將隱私侵犯推向國際層面。以色列網絡安全公司NSO開發的Pegasus間諜軟件,通過“零點擊攻擊”入侵目標設備,可實時竊取私人信息和通信記錄。 2018年,沙特記者賈馬爾·卡舒吉(Jamal Khashoggi)被謀殺一案中,沙特政府通過Pegasus監聽其通信,揭示了這種技術對個體隱私和國際政治的深遠威脅。

(三)情感極化與社會分裂

情感在影響個體認知與決策中起著關鍵作用。武器化傳播通過煽動恐懼、憤怒、同情等情緒,影響理性判斷,推動公眾在情緒驅動下做出非理性反應。戰爭、暴力和民族主義常成為情感動員的主要內容,傳播者通過精心設計的議題,將愛國主義、宗教信仰等元素植入信息傳播,迅速引發公眾情感共鳴。數字技術的廣泛應用,特別是人工智能和社交媒體平台的結合,進一步放大了情感極化的風險。虛假信息與極端言論在平台上的快速傳播,不僅來自普通用戶的分享行為,更受到算法的驅動。平台傾向優先推送情緒化和互動性高的內容,這些內容常包含煽動性語言和極端觀點,從而加劇了仇恨言論和偏激觀點的傳播。

社交媒體標籤和算法推薦在情感極化中扮演著關鍵角色。在查理周刊事件後,#StopIslam標籤成為仇恨言論的傳播工具,用戶借助該標籤發布仇視和暴力傾向的信息。在美國2020年總統選舉期間,社交平台上的極端政治言論和錯誤信息也在激烈的黨派鬥爭中被放大。通過精確的情感操控,武器化傳播不僅撕裂了公共對話,還極大影響了社會的民主進程。另一種特殊的極端主義動員策略是“武器化自閉症”(Weaponized Autism),即極右翼團體利用自閉症個體的技術專長,實施情感操控。這些團體招募技術能力較強但有社交障礙的個體,通過賦予虛假的歸屬感,將其轉化為信息戰的執行者。這些個體在極端組織的指引下,被用於傳播仇恨言論、執行網絡攻擊和推動極端主義。這種現像不僅揭示了情感操控的深層機制,也表明技術如何被極端團體利用來服務於更大的政治和社會議程。 [21]

(四)信息殖民與文化滲透

“武器化相互依賴”理論(Weaponized Interdependence Theory)揭示了國家如何利用政治、經濟和信息網絡中的關鍵節點,對其他國家施加壓力。 [22]特別是在信息領域,發達國家通過控制信息流實施“信息殖民”,進一步鞏固其文化和政治優勢。數字平台成為這一殖民過程的載體,全球南方國家在信息傳播中高度依賴西方主導的技術平台和社交網絡,在撒哈拉以南非洲地區,Facebook已成為“互聯網”的代名詞。這種依賴不僅為西方企業帶來了巨大的廣告收入,還通過算法推薦對非洲本土文化和價值觀,尤其是在性別、家庭和宗教信仰等方面,產生了深遠影響,使文化滲透成為常態。

數字不平等是信息殖民的另一表現。發達國家在數字技術和信息資源上的主導地位,使南方國家在經濟、教育和文化領域日益邊緣化。巴勒斯坦因基礎設施不足和技術封鎖,難以有效融入全球數字經濟,既限制了本地經濟發展,又進一步削弱了其在全球信息傳播中的話語權。全球主要經濟體和信息強國通過技術封鎖和經濟制裁,限制他國獲取關鍵技術與創新資源,這不僅阻礙了目標國的科技發展,也加劇了全球技術與創新生態的斷裂。自2018年退出《伊朗核協議》以來,美國對伊朗的經濟制裁導致其在半導體和5G領域發展受阻,技術與創新的不對稱拉大了全球技術生態的差距,使許多國家在信息競爭中處於劣勢。

四、反思與討論:非對稱傳播格局中的話語權爭奪

在國際非對稱傳播(Asymmetric Communication)競爭格局下,強勢方常常通過主流媒體和國際新聞機構等渠道佔據輿論的主導地位,而弱勢方則需要藉助創新傳播技術和手段來彌補劣勢,爭奪話語權。這一傳播格局的核心在於信息地緣政治(Information Geopolitics),即國家之間的權力較量不僅僅取決於地理位置、軍事力量或經濟資源,更取決於對信息、數據和技術的控制。大國間的博弈已不再僅限於物理空間的控制,而擴展至輿論空間的爭奪。這些“信息景觀”涉及全球傳播生態中的話語權、信息流通和媒體影響力等,在這一過程中,國家通過不斷製造景觀,以影響國際輿論、塑造全球認知框架,進而實現其戰略目標。非對稱傳播的策略不僅關乎信息內容的傳遞,更重要的是如何借助各種傳播技術、平台和手段彌補資源與能力上的差距,信息傳播的核心不再局限於內容本身,而圍繞著話語權的爭奪展開。隨著信息戰和認知戰的興起,誰掌握了信息,誰就能在全球競爭中占得先機。

(一)後發優勢下的技術赶超

傳統的大國或強勢傳播者掌控著全球輿論的主導權,相比之下,弱勢國家往往缺乏與這些大國抗衡的傳播渠道。後發優勢理論主張後發國家能夠通過跳躍式發展,繞過傳統的技術路徑,引進現有的先進技術和知識,從而迅速崛起並規避早期技術創新中的低效和過時環節。在武器化傳播的背景下,這一理論為信息弱國提供了通過新興科技突破大國傳播壁壘的路徑,有助於其在技術層面上實現赶超。傳統媒體往往受到資源、影響力和審查機制的限制,信息傳播速度慢、覆蓋面有限,且容易受到特定國家或集團的操控。數字媒體的崛起使信息傳播的格局發生了根本性變化,弱勢國家能夠借助全球化的互聯網平台,直接面向國際受眾,而不必依賴傳統的新聞機構和主流媒體。通過新興技術,弱勢國家不僅能更精準地傳遞信息,還能通過定向傳播和情感引導,迅速擴大其在國際輿論中的影響力。後發國家可以利用先進技術(如大數據、人工智能、5G網絡等)實現精準的信息傳播,打造高效的傳播渠道。以大數據分析為例,後發國家可以深入了解受眾需求和輿情趨勢,快速識別全球輿論脈搏,實施定向傳播,快速擴大國際影響力。人工智能技術不僅能夠預測輿論發展方向,還能實時優化傳播策略。 5G網絡的普及大大提升了信息傳播的速度與覆蓋範圍,使後發國家能夠以低成本、高效率的方式突破傳統傳播模式的局限,形成獨特的傳播優勢。

通過跨國合作,後發國家可以整合更多的傳播資源,擴大傳播的廣度與深度。例如,阿根廷與拉美其他國家共同建立了“拉美新聞網絡”,通過新聞內容共享,推動拉美國家在國際輿論中發出統一的聲音,反擊西方媒體的單一敘事。在非洲,南非與華為合作推動“智慧南非”項目,建設現代化信息基礎設施,促進數字化轉型和公共服務效率的提升。後發國家政府應加大對技術研發和創新的投入,鼓勵本土企業和人才的發展。同時,還應注重文化輸出和媒體產業建設,通過全球化合作和去中心化傳播模式提升國家在國際信息空間中的話語權。政府可以資助數字文化創作,支持本地社交媒體平台的成長,並通過國際合作框架整合更多傳播資源。

(二)信息反制中的壁壘構建

與軍事行動可能引發的全面衝突,或經濟制裁可能帶來的風險不同,武器化傳播能夠在不觸發全面戰爭的情況下實現戰略目標,基於成本和戰略考量,其具有極大的吸引力。由於武器化傳播具備低成本、高回報的特點,越來越多的國家和非國家行為體選擇通過操控信息來達到戰略目標。這種傳播手段的普及,使得國家在面對來自外部和內部的信息攻擊時,面臨更加複雜和多變的威脅。隨著信息戰爭的日益激烈,單純的傳統軍事防禦已經無法滿足現代戰爭的需求。相反,構建強有力的信息防禦體系,成為國家保持政治穩定、維護社會認同和提升國際競爭力的關鍵策略。因此,如何有效應對外部信息干擾和輿論操控,並進行信息反制,已成為各國迫切需要解決的問題。完善的網絡安全基礎設施是維護國家安全的關鍵,用以防范敏感信息不被外部操控或篡改。以歐盟為例,歐盟通過“數字單一市場”戰略推動成員國加強網絡安全建設,要求互聯網公司更積極地應對虛假信息和外部干預。歐盟的網絡安全指令還規定各成員國建立應急響應機制,保護重要信息基礎設施免受網絡攻擊。此外,歐盟還與社交平台公司,如Facebook、Twitter和Google等建立合作,通過提供反虛假信息工具和數據分析技術來打擊假新聞傳播。人工智能、大數據和自動化技術正在成為信息防禦的重要工具,被用以實時監控信息傳播路徑,識別潛在的虛假信息和抵禦輿論操控。在網絡安全領域,大數據分析幫助決策者識別和預警惡意攻擊,並優化反制策略。這些技術的應用不僅能夠在國內層面增強信息防禦能力,還能提高國家在國際信息空間中的主動性和競爭力。

反制機制是信息防禦體系的另一重要組成部分,尤其是在國際輿論壓力下,實時監控外部信息傳播並及時糾正虛假信息成為維護輿論主動權的關鍵。烏克蘭自2014年克里米亞危機以來,通過與北約和美國合作,建立了頗具規模的網絡防禦體系。烏克蘭的國家網絡安全局為應對網絡威脅設立了“信息反制小組”,利用社交媒體和新聞發布平台實時駁斥俄羅斯的虛假報導,這一策略顯著提升了烏克蘭在國際輿論中的聲譽和信任度。

(三)輿論引導中的議程設置

在信息化和數字化的全球競爭格局中,輿論引導不僅涉及信息傳播內容,更關鍵的是如何設置議程並聚焦全球關注的熱點話題。議程設置理論表明,誰能掌控信息流通的議題,誰就能引導輿論的方向。議程設置通過控制話題的討論範圍和焦點,影響公眾對事件的關注與評價,社交媒體的興起為信息弱勢國提供了突破口,使其可以通過多平台聯動來爭奪信息傳播的主導權。以烏克蘭為例,其在俄烏戰爭中通過社交媒體傳播戰爭實況,不僅發布戰鬥實況,還融入民眾的情感訴求,借助平民遭遇和城市破壞的悲情敘事,激發國際社會的同情與關注。在抵禦外部信息干擾的同時,國家還需要主動傳播正面敘事,講述能夠引發國際社會共鳴的文化故事。故事應該符合國際輿論的情感需求,同時展現國家的獨特性,強化與國際社會的聯繫。以我國的“一帶一路”共建為例,在“一帶一路”共建國家,我國投資建設了大量基礎設施項目,這些項目不僅幫助改善了當地的經濟基礎條件,也展示了中國在全球化進程中的責任擔當,更為文化合作和交流活動提供了窗口,向世界展示了中華民族豐富的歷史文化,為國際社會展現了中華文化的包容性和責任感。

但由於全球南方國家往往面臨資源、技術與國際傳播平台的限制,難以直接與發達國家競爭,因此它們依賴更加靈活、創新的傳播手段來參與全球議程的設置。例如,巴西在應對環保和氣候變化議題上,尤其是亞馬遜森林的砍伐問題,面臨來自西方媒體的負面輿論壓力。為此,巴西政府利用社交媒體發布關於亞馬遜保護的最新數據和成功案例,積極塑造國家在環境保護領域的形象。同時,巴西通過與其他發展中國家合作,參與全球氣候變化談判,推動南南合作,增強了在氣候問題上的話語權。大型國際事件、人道主義活動和製作文化產品等,也是講述國家故事的有效方式。國際體育賽事如世界杯、奧運會等,不僅是體育競技的展示平台,更是國家形象和文化軟實力的展現場所,通過承辦或積極參與這些全球性事件,國家能夠向世界展示其實力、價值和文化魅力,推動積極的輿論議程。

“戰爭無非是政治通過另一種手段的延續”[23]。這一克勞塞維茨的經典論斷在武器化傳播的語境下得到了現代化的詮釋。武器化傳播突破了傳統戰爭的物理邊界,成為一種融合信息戰、認知戰和心理戰的現代戰略手段。它以非暴力的形式操控信息流向和公眾認知,使國家和非國家行為者無須依賴直接軍事行動即可實現政治目標,體現出極強的戰略性和目標性。通過操控信息、情緒和價值觀,武器化傳播能夠在避免全面戰爭的同時達成戰略目的,在全球競爭和衝突中,已成為強國對弱國進行政治壓制的重要手段。

武器化傳播的核心在於通過信息操控削弱敵方的決策力與行動能力,但其複雜性使得傳播效果難以完全預測。儘管信息強國通過技術優勢和傳播渠道壓制信息弱國,傳播效果卻充滿不確定性。尤其是在社交媒體和數字平台全球化的背景下,信息流動的邊界和效果愈加難以控制。這種複雜性為弱國提供了突破話語霸權的機會,推動信息傳播的反向博弈。弱國可以利用這些平台發起對抗,挑戰強國的信息操控,在全球輿論中佔據一席之地。非對稱性博弈反映了國際輿論的動態平衡,傳播不再是單向的控制,而是更為複雜的交互和對話,賦予弱者影響輿論的可能性。當前國際輿論格局仍以信息強國對信息弱國的單向壓制為主,但這一局面並非不可打破。信息戰爭具有高度的不對稱性,信息弱國可以憑藉技術創新、靈活策略和跨國合作逐步反制。通過發揮“非對稱優勢”,弱國不僅能夠影響全球輿論,還能藉助聯合行動和信息共享提升話語權。跨國合作與地區聯盟的建立,為弱國提供了反制強國的有力工具,使其能夠在國際輿論上形成合力,挑戰信息強國的主導地位。在戰爭框架下,各國可以靈活調整策略,主動塑造信息傳播格局,而非被動接受強國的信息操控。

戰爭社會學強調社會結構、文化認同和群體行為在戰爭中的作用。武器化傳播不僅是軍事或政治行為的延續,更深刻影響社會心理、群體情感和文化認同。強國利用信息傳播塑造他國的認知與態度,以實現自己的戰略目標。然而,從社會學視角來看,武器化傳播並非單向的壓制,而是複雜的社會互動和文化反應的產物。在這一過程中,信息弱國並非完全處於弱勢,相反,它們可以藉助文化傳播、社會動員和全球輿論的動態對抗,以“軟實力”反擊外部操控,塑造新的集體認同,展示“弱者武器”的正當性。

(基金項目:研究闡釋黨的二十屆三中全會精神國家社科基金重大專項“推進新聞宣傳和網絡輿論一體化管理研究”(項目編號:24ZDA084)的研究成果)

References:

[1] Lasswell H D Propaganda techniques in the world wars [M] Beijing: Renmin University Press, 2003

[2] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978.

[3]Herrman J. If everything can be ‘weaponized,’ what should we fear? [EB/OL]. (2017-03-14)[2024-12-20].https://www.nytimes.com/2017/03/14/magazine/if-everything-can-be-weaponized-what-should-we-fear.html.

[4] Ministry of Foreign Affairs of the People’s Republic of China Joint statement by the People’s Republic of China and the Russian Federation on strengthening contemporary global strategic stability (full text) [EB/OL].https://www.mfa.gov.cn/web/ziliao_674904/1179_674909/201906/t20190606_7947892.shtml.

[5]Mazarr M J, Casey A, Demus A, et al. Hostile social manipulation: present realities and emerging trends[M]. Santa Monica, CA USA: Rand Corporation, 2019.

[6]Bob Y J. Ex-CIA director Petraeus: Everything can be hijacked, weaponized[EB/OL].(2018-01-30)[2024-12-20].https://www.jpost.com/israel-news/ex-cia-director-petraeus-everything-can-be-hijacked-weaponized-540235.

[7]Mattson G. Weaponization: Metaphorical Ubiquity and the Contemporary Rejection of Politics[EB/OL].OSF(2019-01-08)[2024-12-20].osf.io/5efrw.

[8]Robinson L, Helmus T C, Cohen R S, et al. Modern political warfare[J]. Current practises and possible responses, 2018.

[9]Kreitem H M. Weaponization of Access, Communication Inequalities as a Form of Control: Case of Israel/Palestine[J]. Digital Inequalities in the Global South, 2020: 137-157.

[10]Laity M. The birth and coming of age of NATO StratCom: a personal history[J]. Defence Strategic Communications, 2021, 10(10): 21-70.

[11]Confessore N. Cambridge Analytica and Facebook: The scandal and the fallout so far[J]. The New York Times, 2018(4).

[12]McQuinn B, Kolga M, Buntain C, et al. Russia Weaponization of Canada’s far Right and far Left to Undermine Support for Ukraine[J]. International Journal,(Toronto,Ont),2024,79(2):297-311.

[13]Stukal D, Sanovich S, Bonneau R, et al. Why botter: how pro-government bots fight opposition in Russia[J]. American political science review, 2022, 116(3): 843-857.

[14]Jones M O. The gulf information war| propaganda, fake news, and fake trends: The weaponization of twitter bots in the gulf crisis[J]. International journal of communication13(2019):27.

[15]Genovese D. Nearly 50% of voters said deepfakes had some influence on election decision. [EB/OL].(2024-10-30)[2024-12-20].https://www.foxbusiness.com/politics/nearly-50-voters-said-deepfakes-had-some-influence-election-decision.

[16]Peters C, Allan S. Weaponizing memes: The journalistic mediation of visual politicization[J]. Digital Journalism, 2022, 10(02):217-229.

[17]Gorissen S. Weathering and weaponizing the# TwitterPurge: digital content moderation and the dimensions of deplatforming[J]. Communication and Democracy, 2024, 58(01): 1-26.

[18]Pascale C M. The weaponization of language: Discourses of rising right-wing authoritarianism[J]. Current Sociology, 2019, 67(06): 898-917.

[19]Ridwa1ah A O, Sule S Y, Usman B, et al. Politicization of Hate and Weaponization of Twitter/X in a Polarized Digital Space in Nigeria[J]. Journal of Asian and African Studies, 2024.

[20]Mercieca J R. Dangerous demagogues and weaponized communication[J]. Rhetoric Society Quarterly, 2019, 49(03): 264-279.

[21]Welch C, Senman L, Loftin R, et al. Understanding the use of the term “Weaponized autism” in an alt-right social media platform[J]. Journal of Autism and Developmental Disorders, 2023, 53(10): 4035-4046.

[22]Farrell H, Newman A L. Weaponized interdependence: How global economic networks shape state coercion[J]. International security,2019,44(01):42-79.

[23] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978

作者簡介:郭小安,重慶大學新聞學院教授、博士生導師,重慶市哲學社會科學智能傳播與城市國際推廣重點實驗室執行主任(重慶 400044);康如詩,重慶大學新聞學院碩士生(重慶 400044)。

中國原創軍事資源:https://www.cjwk.cn/journal/guidelinesDetails/192031322246497484888