中國軍事基於系統的優勢戰爭研究:
資訊化戰爭中如何打好體系戰“九種典型戰法”
現代英語翻譯:
System-based superior warfare is a system-based warfare in information warfare. It is not limited to a specific combat style, but a “combination punch” or a group of combat styles composed of multiple combat styles and tactics . It emphasizes that according to the changes in combat missions, combat opponents and battlefield situations, as long as it is conducive to forming relative advantages and achieving system victory, any appropriate combat means and styles can be flexibly used to form combat advantages. In the specific implementation of system-based superior warfare, these specific combat styles and operational tactics can be organized and implemented separately as part of joint full-domain operations, and more emphasis is placed on playing a “combination punch”, taking multiple measures simultaneously, and winning as a whole. In order to better understand its core connotation, this article lists nine typical combat styles, including overall deterrence warfare, electromagnetic interference warfare, network attack warfare, cognitive control and interference warfare, and analyzes them .
Systematic Aggregation Warfare – Flexible Use of Multiple Combat Styles “Combination Punch”
The main content and keywords of this article
1. Overall deterrence warfare: Emphasis on multi-domain joint deterrence; Three major elements should be possessed to implement overall deterrence warfare ; Strong overall strength is the core of achieving effective deterrence
2. Electromagnetic interference warfare : The key to competing for information advantage; In terms of combined means and methods, information empowerment is achieved through “connection + sharing” ; Effective tactics to crack unmanned cluster warfare
3. Network attack warfare: Mainly soft killing, combining soft and hard, focusing on breaking the network and reducing energy
4. Cognitive control and interference warfare: Control situational awareness and cognitive rights, compete for information advantages; control command and decision-making rights, compete for decision-making advantages; control “brain” rights, and seize brain control advantages
5. Agile mobile warfare: High-efficiency and rapid decision-making; high Efficiency forms a favorable combat situation; high efficiency and instant aggregation of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
6. Swarm autonomous warfare: conducive to forming system advantages to suppress the enemy; conducive to enhancing combat effectiveness; conducive to trapping the enemy in combat difficulties
7. Precision point killing warfare: achieving high cost-effectiveness in combat; hitting key node targets is an important option; large-scale system support is a basic condition; inseparable from accurate intelligence support
8. Supply chain disruption warfare: the supply guarantee chain has a huge impact on the overall combat situation; the focus of attack is the key node of the enemy’s supply guarantee chain; the focus is on choosing the right time to use tactics
9. System destruction and paralysis warfare: the combat goal is to cause the enemy’s combat system to run out of order; heavy punches hit the key nodes of the combat system; soft strikes on the enemy’s combat system
The combat concept is first proposed as a new combat style. Innovative combat style is the core content of combat concept development. It can be said that system aggregation and optimization warfare is a general term for a series of specific tactics. The following nine typical combat styles constitute the combat method system of system aggregation and optimization warfare. They are:
First, overall deterrence warfare, actively organizing static power demonstrations and deterrence actions in the system-based superiority warfare, striving to win the battle without fighting or with a small battle;
Second, electromagnetic interference warfare, using a variety of combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for electromagnetic spectrum advantages, seize information control, and thus win the initiative in combat;
Third, network attack warfare, using a variety of means such as soft strikes and hard destruction to break the enemy’s command network, intelligence network, communication network, and logistics supply network, and disrupt the enemy’s command and support;
Fourth, cognitive control and interference warfare. Through information attacks, public opinion attacks, and brain attacks, control advantages are formed in cognitive space;
Fifth, agile mobile warfare. Rapidly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities;
Sixth, swarm autonomous warfare. Widely use unmanned combat means such as “swarms”, “wolf packs”, and “fish schools” to autonomously organize actions and distributed attacks to achieve human-machine joint victory;
seventh, precision point killing warfare. Accurately obtain intelligence, implement multi-domain precision strikes, strive to hit one point to shake the overall situation, and maximize combat effectiveness;
Eighth, supply chain disruption warfare. Organize elite forces to attack the enemy’s logistics and equipment supply chain, supply lines and supply bases, and destroy the enemy’s loss of supply and withdrawal from the battle;
Ninth, system destruction and paralysis warfare. Comprehensively adopt a variety of means such as breaking the network, training, and hitting nodes to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system.
1. Overall deterrence warfare
Overall deterrence warfare refers to actively organizing static power demonstrations and deterrence actions in system-based superior warfare, striving to defeat the enemy without fighting or fighting a small battle. Sun Tzu said: “To defeat the enemy without fighting is the best of the best.” Deterrence and war are the two main forms of military activities. Deterrence is mainly to show determination and will to potential opponents by showing strength or threatening to use strong strength to deter the opponent’s actions. It can be said that overall deterrence warfare in system-based superior warfare is an important means or method of achieving “stopping” the enemy’s troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first of all, strong in general, and then strong in key parts. Modern warfare is a confrontation between systems. The overall deterrence war under the informationized local war requires not only the traditional deterrence means and capabilities of land, sea, air and space, but also new deterrence means and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence, and more importantly, the overall deterrence that demonstrates the overall strength of the country. In particular, with the rapid development of advanced technologies such as information technology, the scientific and technological revolution, industrial revolution, and military revolution are accelerating their integration, and the coupling relationship between strategic competitiveness, social productivity, and military combat effectiveness is closer. Winning the informationized war is more of a contest of national will and national overall strength. If we want to contain war, we must first deter our opponents from the perspective of overall strength.
1.1 Emphasize multi-domain joint deterrence
Deterrence means usually include nuclear deterrence and conventional deterrence. In the system-based superiority war, the overall deterrence war is implemented, aiming to comprehensively use the conventional deterrence means of the land, sea, air, space, and power grid in the whole domain to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, network, and electromagnetic weapons have become new deterrent means .It mainly uses rapid response electromagnetic orbital weapons, space-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, high-power microwave weapons and other equipment to threaten and attack the opponent’s space targets, forming a “interference and blocking” deterrence against the enemy’s space information. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other key information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communication and other informationized weapon equipment systems to achieve deafening and blinding deterrence against the enemy. 1.2 Three elements should be possessed to implement overall deterrence warfare.
To implement overall deterrence warfare and achieve the expected deterrence effect, three elements must usually be possessed: one is strength. The deterrent party must have reliable capabilities or strength that make the opponent feel daunted and fearful; the second is determination and will. The deterrent party must dare to use this capability when necessary; the third is clear information transmission. The deterrent party must accurately and effectively let the other party know its action capabilities and determination.
Historically, the criteria for judging deterrence strength have changed in three aspects: first, active military strength; second, comprehensive national strength or war potential; and third, the total number of main combat weapons and equipment. For a long period of history, the number of troops was deterrence, and the strength of military strength was directly determined by non-material factors such as the size of the active army, the number of important weapons and equipment, and the morale of the army’s training organization. After the 20th century, with the expansion of the scale of war, deterrence strength is no longer limited to the number of troops and important weapons and equipment, but is determined by the country’s war potential, including economic strength, scientific and technological strength, energy resources, and even population size.
The overall deterrence war in the system-based superiority war, the formation of its deterrence strength is mainly based on the network information system and the joint full-domain deterrence capability formed under the integration of the system.
1.3 Strong overall strength is the core of achieving effective deterrence
The development of information technology and its extensive penetration and application in the military field have provided favorable conditions for building overall strength and achieving overall deterrence. System-based superior warfare is supported by a network information system and fully utilizes the penetration and connectivity of information technology. It not only integrates various combat forces, combat elements, and combat units into an organic whole to achieve a military system combat advantage, but also connects and integrates various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, energy, etc., into the national war mobilization system, gathers forces and resources from all aspects to form an overall synergy, realizes the emergence effect of system capabilities, and displays the overall strength advantage as a whole, forming a powerful invisible deterrent of unity and common hatred of the enemy, and shaping a situation in which the enemy “has the power but cannot act” and “can act but has no effect”, playing a role in containing and winning the war.
In the overall deterrence war, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; the mobilization time will be faster, and the mobilization and action information can be quickly transmitted to everyone and every node at the first time by using the network and information system; the action coordination and collaboration will be more consistent, and the forces distributed in various regions can act in a unified manner almost at the same time based on the same situation and the same order, greatly improving the efficiency of action coordination; the resource utilization will be more sufficient, and various war resources based on the network can quickly realize the transition from peace to war and from military to civilian, and realize the integrated and precise guarantee of the front and rear.
2. Electromagnetic interference warfare
Electromagnetic interference warfare refers to the flexible use of various combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantage of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat.
2.1 The key to competing for information advantage Informatization local wars are highly dependent on the electromagnetic spectrum, and the control and counter-control of electromagnetic space have become the focus of competing for the right to control information. Organizing and implementing electromagnetic interference warfare is mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. Using electromagnetic means to disrupt and destroy the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information warfare capability, and enable the friendly side to ensure the rapid and effective flow of information in the scenario of having information control, and drive the command flow, action flow, material flow, and energy flow through the information flow, thereby gaining the leading power and initiative in combat.
2.2 The basic focus is to disable and invalidate the enemy’s combat system. The implementation of electromagnetic interference warfare in the system-based superiority war is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure the effective use of electromagnetic space by the friendly side, various electronic reconnaissance, interference, attack, defense and support forces are organized to interfere with and attack the enemy’s communication network, radar network, computer network and command center, communication hub, radar station, computer network node, global navigation positioning system, space-ground integrated Internet and other space link systems, and other various frequency-using weapons and equipment, block and destroy their communication and data transmission, and destroy the “connection” and “sharing” structural center of gravity of the enemy’s combat system, so as to provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities and disabling and invalidating the enemy’s entire combat system.
2.3 Effective tactics to crack unmanned swarm warfare
Unmanned autonomous swarm warfare such as “bee swarm”, “wolf pack” and “fish pack” is an important feature of information-based local wars with intelligent characteristics. Various unmanned autonomous swarms are huge in number, diverse in type and complex in characteristics, and each individual can complement each other and play a role in substitution. It will be very difficult to intercept and damage the entire unmanned swarm. However, from a technical perspective, in order to achieve effective coordination in unmanned combat swarms, each individual must share and interact with each other. Once the communication coordination between unmanned swarms is interfered with, it will be impossible to share battlefield situation and information, and it will be difficult to coordinate actions with each other, and it will be difficult to play its due combat effectiveness. This provides an opportunity for the other party to intercept communications and conduct electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attack on the information and communication network of unmanned swarms, and destruction of their information sharing and interaction will make it impossible for each individual in the unmanned swarm to achieve effective coordination, thereby losing combat capability.
3. Network attack warfare
Network attack warfare refers to the comprehensive use of network and computer technologies and other effective means to conduct military confrontation actions around the control of information and information networks. It is a major combat style for cyberspace operations and the struggle for network control. Its main combat operations include both soft kill and hard destruction, with soft as the main and a combination of soft and hard. Among them, soft kill is mainly network attack, that is, the comprehensive use of blocking attacks, virus attacks and other means to block and attack the enemy’s information network, command system, weapon platform, etc., making it difficult for the enemy’s network, command information system, etc. to operate effectively or even paralyzed; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses and anti-radiation attacks to paralyze the enemy’s information network physical facilities and destroy the enemy’s combat and weapon equipment entities. The
focus is on breaking the network and reducing the power. Organizing a network attack war in the system concentration war is to target the weaknesses of the opponent’s military information network, take advantage of the system, organize various network attack forces, and continuously implement soft kill and hard destruction operations on the enemy’s combat command network, reconnaissance intelligence network, communication network and even logistics supply network throughout the combat process, destroy the enemy’s network system, and make the overall function of the enemy’s combat system decline or even become disabled. Mainly against the enemy’s basic information network, intelligence network, command network, support network and other core targets, implement a series of combat operations such as network and electronic coordinated attack, deception and confusion, link blocking, takeover and control, so as to disable the enemy’s intelligent combat network system and achieve a key victory in paralyzing the enemy system.
4. Cognitive control and interference warfare:
Cognitive control and interference warfare refers to the use of information attack, public opinion attack, and brain attack in the system optimization war to interfere, destroy or control the enemy’s thinking and cognition, so that the enemy cannot make correct judgments and decisions, thereby forming a control advantage over the enemy in the cognitive space.
Cognitive domain,That is, the human thinking space and consciousness space are areas that have a key impact on combat decisions and judgments. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the competition of war from physical space and information space to cognitive space, making cognitive space a new combat domain. With the development of information and intelligent technology and their extensive and in-depth application in the military field, human-machine intelligence tends to merge, making the position of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. Controlling cognitive rights has become a key factor in future battlefield control rights. Fighting for cognitive control rights has become an important combat style for winning in informationized local wars with intelligent characteristics.
4.1 Controlling situational awareness cognitive rights and fighting for information advantage
In the system-based superiority battle, information flow drives material flow and energy flow, and information advantage determines decision-making advantage. Rapid and accurate cognition of intelligence information and battlefield situation has an important impact on seizing command and decision-making advantages. Therefore, in order to organize and implement the system-based optimization war, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster cognition of the battlefield situation and combat environment, and ensure that we discover and recognize the enemy first from the source. While eliminating the “fog of war” of our own side, we must also create “fog” for the opponent. Therefore, in order to compete for the right of cognition, we must not only grasp and process information before the enemy, but also take measures such as network public opinion attacks and highly realistic virtual reality to actively create and spread false information, destroy and disrupt the enemy’s perception and cognition of the battlefield situation, maximize the creation of chaos, increase uncertainty, interfere with the opponent’s combat decision-making, and delay its combat operations.
4.2 Control the command decision-making power and compete for decision-
making advantages. Decision-making advantages determine action advantages. The commander’s quick decision-making is the key to shortening the “command cycle” and achieving rapid victory. In the organization of the system-based optimization war, the success or failure of combat operations depends to a large extent on the commander’s decision-making speed. We should make use of intelligent decision-making assistance systems to select the best combat plan, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access the required combat nodes and combat platforms at any time, build an integrated combat system, realize the decentralized deployment of forces, information, and capabilities, and cross-domain linkage, form advantages at the location and time required for combat, gather energy, and win by gathering advantages; implement “core attack war” to make the enemy’s command and decision-making errors or deviations by invading the opponent’s “chips”, tampering with their programs and command and decision-making system algorithms, etc.
4.3 Control “brain” power and seize brain control advantage
The cognitive control and disturbance war in the system of gathering advantages emphasizes “attacking the mind and winning the will”, that is, using network warfare, electromagnetic warfare and other methods to implement cognitive control warfare of “attacking the mind, controlling the brain and winning the will” on the enemy’s human brain and consciousness cognition and the control system of unmanned autonomous platforms, replacing “destruction” with “control”, and achieving the purpose of stopping the war and winning the war at the lowest cost. Different from traditional strategic deterrence, attacking the mind and controlling the brain is more focused on active attack. It is an active attack action, mainly using advanced information warfare technology, brain control technology, etc., to control the enemy’s decision-making leaders, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., to implement “brain” attacks, directly control and disrupt the opponent’s “brain”, influence and control the enemy’s decision-making, or disable it, and achieve invisible control of the enemy’s combat operations. For example, targeting human cognitive thinking, using brain reading and brain control technology, using mind guidance and control means, directly “inject” and “invade” attacks on the enemy’s brain, interfere with, control or destroy the enemy’s commander’s cognitive system, deeply control them from the consciousness, thinking and psychology, seize the “intelligence control power”, disrupt the enemy’s decision-making, break the enemy’s morale, and force the enemy to surrender.
5. Agile mobile warfare
Agile mobile warfare refers to high-efficiency decision-making, high-efficiency adjustment of troop and weapon deployment, and high-efficiency and immediate aggregation of combat forces in system-based superior warfare, high-efficiency aggregation of capabilities on the established battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and promptly to changes in the battlefield environment, and has characteristics such as responsiveness, robustness, flexibility, elasticity, innovation and adaptability.
Table 1 Concept of Agile Operations
5.1 Efficient and rapid decision-making
To implement agile mobile warfare, we must first make efficient and rapid decisions to gain the initiative in combat. Therefore, we must comprehensively use various reconnaissance, detection, perception and surveillance means to obtain battlefield situation and target information in a timely manner, especially the characteristic information, activity trajectory and real-time location information of time-sensitive targets, to ensure accurate intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. We must use less time to identify effective intelligence information, formulate action plans at a faster speed according to changes in the situation, take the initiative one step faster than the enemy, and seize the initiative. Efficient decision-making focuses on shortening the decision-making cycle. We must take the target time window as the center point, coordinate decision-making and command with combat units and weapon platforms, respond quickly, and link as a whole to improve combat efficiency.
5.2 Efficiently form a favorable combat situation .
We must keep abreast of changes in the battlefield situation at any time, rely on information network support, and achieve dynamic reorganization and integration of combat forces through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers, and achieve efficient flow and aggregation of combat resources across the entire domain, so as to achieve mobile aggregation and form a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent decision-making assistance and other means to quickly form combat plans, quickly deploy combat forces at a high frequency according to the plan, organize troops to quickly form favorable combat deployments, and achieve the first enemy discovery, first enemy decision-making, first enemy firing, and first enemy assessment, so as to change the balance of power in the shortest time and at the fastest speed, form combat advantages, and improve the efficiency of combat operations.
5.3 High-efficiency and instant aggregation of combat forces
The key to organizing agile mobile warfare is to select combat forces within a limited time, coordinate the entire battle situation, form an overall force, and ensure a fatal blow. Therefore, in response to changes in the battlefield situation, especially the target situation, a joint mobile combat system formed by multi-domain combat forces should be formed, combat forces should be aggregated in real time, and quickly deployed to a favorable battlefield to carry out immediate strikes on the enemy. In view of the deep space and deep sea becoming new combat spaces, intelligent unmanned autonomous combat platforms can be organized to quickly and flexibly deploy to key targets or important channels that are difficult for humans to reach due to physiological limitations, and wait for ambush operations to form a new cross-domain balance of power advantage.
5.4 Agile mobile warfare is an innovative development of traditional mobile warfare.
In the history of wars in ancient and modern times, there are many successful examples of relying on rapid and concealed maneuvers to achieve combat objectives. However, the combat process of local informationized wars has been greatly compressed, the combat rhythm has been accelerated, and the opportunity for war is fleeting, which puts higher requirements on rapid maneuvering to capture the opportunity. It is difficult to meet the requirements of joint operations and full-domain operations under informationized conditions by relying solely on “fast pace and high speed”, so agile maneuvers must be implemented.
6. Unmanned cluster autonomous warfare
Unmanned cluster autonomous warfare refers to the extensive use of unmanned combat means such as “bee swarms”, “wolf packs” and “fish schools” in system-based superior warfare, autonomously organizing actions and distributed attacks to achieve joint victory between man and machine. As unmanned autonomous equipment has become the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical advantages has become an important combat style in informationized warfare.
6.1 It is conducive to forming a system advantage to suppress the enemy.
Autonomous warfare of unmanned clusters gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds large-scale unmanned combat clusters or formations such as unmanned “bee swarms”, “wolf packs”, and “fish swarms”. They organize themselves autonomously and cooperate with each other. They can carry out close-range, full-coverage reconnaissance, or act as bait to implement interference and deception, or cooperate with main combat weapons to carry out distributed coordinated attacks, and achieve overall mobility and joint control of the enemy.
6.2 It is conducive to enhancing combat effectiveness
. In the autonomous combat of unmanned clusters, different combat units in the unmanned cluster formation are responsible for different functions and tasks. Some are responsible for reconnaissance, some are responsible for electromagnetic interference and firepower strikes, and some play the role of “bait”. The cluster transmits and shares battlefield information through the inter-cluster network, performs its duties according to the division of labor, and coordinates in real time, autonomously, and dynamically according to battlefield changes. It not only gives full play to the advantages of quantity and scale, but also uses information networks and intelligent integration technologies to achieve integration effects, and consumes the enemy’s defense detection, tracking and interception capabilities with the advantages of clusters, so that the enemy’s defense system is quickly saturated and paralyzed.
6.3 It is conducive to trapping the enemy in a difficult situation in combat.
Unmanned cluster autonomous warfare is a mixed formation of a large number of autonomous unmanned combat platforms with different functions, forming an unmanned combat cluster that integrates reconnaissance and detection, electronic interference, network attack, and firepower strike. It will carry out multi-directional, multi-wave, and continuous attacks on the same target or target group, making it difficult for the enemy to make an effective counterattack.
7. Precision point killing war
Precision point killing war refers to the precise acquisition of intelligence in the system-based superiority war, the implementation of multi-domain precision strikes, and the effort to hit one point to shake the overall situation and maximize combat effectiveness. Informationized local war is an overall confrontation between systems. Implementing precision point killing war, carrying out precision strikes on important nodes and key links of the enemy’s combat system, destroying the enemy’s combat system, and reducing the enemy’s combat capability will achieve twice the result with half the effort.
7.1 Achieving high cost-effectiveness in combat
Achieving maximum combat effectiveness at the lowest cost is the goal pursued by both sides in combat. With the widespread application of information technology in the military field and the advent of informationized warfare, precision-guided weapons, intelligent kinetic weapons, reconnaissance and strike integrated drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. All these provide material and technical conditions for achieving precision point-killing warfare, achieving combat objectives at a relatively low cost, and realizing high efficiency and cost-effectiveness in combat.
7.2 Hitting key node targets is an important option
. Precision point-killing warfare focuses on hitting key points and nodes. If you don’t hit, you’ll lose. If you hit, you’ll hurt and win. Hitting one point will break the enemy’s system and shake the overall situation. The targets of the strike are not limited to the enemy’s dispersed ships and aircraft, but should also be targeted at enemy command centers, important hubs, and even local, dynamic, time-sensitive targets or independent targets such as major generals and commanders, in order to achieve deterrence and shock and destroy the enemy’s system. In response to the distributed tactics of decomposing the functions of expensive large equipment into a large number of small platforms and implementing dispersed deployment of troops, using precision strike firepower to “point-kill” them will also be an effective countermeasure.
7.3 Large-scale system support is a basic condition
. The implementation of precision point-killing warfare cannot be separated from large-scale system support. Focusing on achieving combat objectives, the required forces and weapons are drawn from the dispersed combat domains. Under the support of the network information system, the precision strike system is dynamically integrated to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is attacked, and precise use of troops and precise energy are achieved. To implement precision point killing warfare, it is necessary to be precise. All links in the entire combat system must be closely connected, and there must not be any mistakes. The operation of the US military to kill Bin Laden in 2011 can be said to be a typical strategic precision point killing operation supported by the strategic system.
7.4 Inseparable from accurate intelligence support
In precision point killing warfare, accurate intelligence support is always the key to achieving combat objectives. Therefore, before the war, various means should be used to collect various intelligence data and information of the enemy, especially to make accurate analysis and judgment of the enemy’s targets. During combat operations, various sensors and intelligence reconnaissance means should be used to accurately grasp the changes in enemy targets and dynamic target situations in a timely manner, so as to provide strong and effective intelligence support for the implementation of precision point killing warfare. The US military’s targeted elimination of Soleimani is a typical precision point killing war supported by an efficient intelligence system.
8. Supply Chain Disruption War
Supply chain-breaking warfare refers to organizing elite forces in the system-based superiority war to attack the enemy’s supply chain, supply lines and supply bases for logistical materials and equipment, so that the enemy will lose supply and withdraw from the battle. Aiming at the enemy’s weaknesses such as long logistic supply lines and large equipment support, elite forces are organized to build a “chain-breaking warfare” combat system to carry out continuous, precise and devastating strikes on the enemy’s supply chain, supply lines and supply bases for logistical materials and equipment, which will make it difficult for them to continue due to loss of supply and have to withdraw from the battle.
8.1 The supply support chain has a huge impact on the overall combat situation
. Logistics equipment support is an important foundation for combat. The continuous supply of logistical materials and weapons and equipment ultimately determines the size of an army’s combat force, whether it can fight, in what season to fight, where to fight, how far it can leave the rear base, how long it can fight, how fast it can maneuver, etc. In information warfare, battlefield material consumption has increased exponentially. The reliance of operations on logistical equipment support has not only not decreased, but has become increasingly greater. In addition, the requirements for the degree of specialization of support have also become increasingly higher. In particular, the types and specifications of modern combat equipment are diverse, the mixed transportation volume is huge, and the deployment of troops is more dispersed, which also puts forward very high requirements for transportation capacity, making bases, communication lines and transportation more important than ever before. The stable and efficient operation of the supply support chain and the continuous and uninterrupted supply support are the key to winning the battle and have a huge impact on the overall situation of the battle.
8.2 The focus of the attack is the key node of the enemy’s supply support chain.
The focus of the supply chain-breaking war is to attack the key link of the enemy’s supply support chain, and to make it lose its continuous support capability by breaking the chain. Therefore, the supply chain-breaking war should mainly target the enemy’s ground railway and highway transportation lines, maritime supply fleets, military-requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, attacking the enemy’s maritime supply chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy’s aircraft carrier battle group lose its ability to continue to fight, and even affect the outcome of a battle.
8.3 Focus on choosing the right time and using tactics
to organize and implement the supply chain disruption war. It is crucial to choose a favorable time to strike. The timing of the supply chain disruption war should be selected when the enemy’s supply is maneuvering, using covert tactics to attack the enemy by surprise, and suddenly strike the enemy’s supply vehicles, ships, and transport aircraft to terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing elite forces to ambush on the routes and routes that the enemy’s transportation vehicles must pass through, waiting for an opportunity to carry out covert and sudden strikes; stealth surprise attack warfare, using submarines, stealth fighters, etc. to covertly advance and strike enemy transportation targets to win by surprise; long-range precision warfare, using long-range conventional ground-to-ground missile forces to carry out long-range precision strikes on enemy supply bases and airports, docks and other supply departure points.
9. System Destruction and Paralysis Warfare
System destruction and paralysis warfare refers to the use of a variety of means such as breaking the network, breaking the chain, and hitting the nodes in the system concentration and superiority war to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural strength between the elements of the enemy’s combat system, so that the system function degenerates and cannot play the role of multiplying capabilities.
9.1 The combat goal is to cause disorder in the operation of the enemy’s combat system.
In information warfare, the combat systems of both warring parties have their own internal order, which is the key to maintaining and supporting the operation of the combat system. The party that can maintain and control the internal order of the combat system will gain an advantage, otherwise it will be at a disadvantage. Therefore, system destruction and paralysis warfare should establish the goal of disrupting the enemy’s winning mechanism and causing disorder in the enemy’s combat system. This requires that in the system destruction and paralysis war, we must make full use of the powerful enabling role of information technology, especially intelligent algorithms , to quickly adjust and reconstruct our own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, so that the enemy’s combat system loses its normal operating order, and the system function is destroyed in the disorder, and the overall combat capability is significantly reduced.
9.2 Strike the key nodes of the combat system with a heavy punch
System confrontation is a major feature of information warfare. The system is an important foundation and support for system confrontation, and it is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can maintain a strong and smooth operation has a decisive impact on winning wars and campaigns. In the system destruction and paralysis war, the key is to focus on the enemy’s integrated combat system of land, sea, air, space and power grids, break the network, break the chain, and hit the nodes. By hitting the key node targets, the operation mechanism of the enemy’s combat system is disordered, or even severely damaged or destroyed. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, hit them at one point, destroy them in a piece, and paralyze them as a whole, so as to achieve the goal of defeating the enemy.
9.3 Implementing soft strikes on the enemy’s combat system
When organizing and implementing the hard destruction of system destruction warfare, soft kill operations such as electronic warfare, network warfare, psychological warfare, and public opinion warfare are organized simultaneously to carry out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare, using electronic warfare forces to implement strong electromagnetic interference on the enemy, causing its information to fail and fall into the fog of war; network warfare, using network offensive forces to attack the enemy’s network information system, causing serious damage to the enemy’s command and communication system and computer network, causing its command to fail and fall into an information island or even a war island; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare means to implement psychological strikes and public opinion guidance on the enemy, severely damaging its combat will and inducing cognitive confusion. Organizing livelihood warfare to strike the opponent’s major national and livelihood facilities can also play a role in “cutting off the firewood from the bottom of the pot” for the enemy’s combat system. During the Kosovo War in 1999, the US military did not attack the Yugoslav army, but instead attacked its potential target system, causing the Yugoslav military and civilians to lose their will to fight and lead to defeat.
現代國語翻譯:
體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。
體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊
僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示與威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動;三是網絡破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通訊網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速響應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間資訊「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連結、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界相關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,以網路為基礎的各種戰爭資源,可快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳輸訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2 基本著眼點是使敵作戰體系失能失效體系聚優戰中實施電磁擾阻戰,主要是針對敵方對電磁空間的依賴,同時為確保己方對電磁空間的有效利用,組織各種電子偵察、幹擾、攻擊、防禦和支援力量,對敵通信網、雷達網、電腦網和指揮中心、通信樞紐、雷達站、電腦網路節點,全球導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通訊聯絡與資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱敵指揮控制能力,使敵整個作戰體系失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊網路物理設施,摧毀敵作戰及武器裝備實體。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷與硬摧毀行動,破壞敵之網路體系,使敵作戰體系功能整體下降甚至失能。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理訊息,還要採取網路輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假訊息,破壞、擾亂敵對戰場態勢的感知、認知,盡量製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰資源,實現作戰效能最大化;利用泛在智慧網絡,隨遇接入所需作戰節點、作戰平台,建構形成一體化作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集聚釋能、聚優制勝;實施“攻芯戰”,通過侵入對方“芯片”、篡改其程序及指揮決策系統演算法等,使敵指揮決策發生錯誤或偏差。
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志」的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進資訊作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵決策,或使其失能,實現隱形操控敵作戰行動。如以人的認知思考為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施「注入」「侵入」式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵
5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提升作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全域作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人集群自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘餌實施幹擾、欺騙,或配合主戰兵器實施分散式協同攻擊,實現整體機動、聯合製敵。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦偵測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以做出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點和關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使基地、通信線路和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱蔽突然打擊;隱形奇襲戰,使用潛艇、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確戰,使用遠程常規地地飛彈部隊對敵補給基地和機場、碼頭等補給出發地實施遠程精確打擊。
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整與重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運行機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強烈電磁幹擾,使其資訊失靈,陷入戰爭迷霧之中;網路戰,使用網路進攻力量對敵網路資訊體系實施攻擊,使敵指揮通訊系統和電腦網路受到嚴重破壞,使其指揮失靈,陷入資訊孤島乃至戰爭孤島;心理戰和輿論戰,使用心理戰、輿論戰手段,對敵實施心理打擊和輿論引導,重創其作戰意志,誘導其認知錯亂。組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗.
中國軍事資訊科技原創來源:http://www.81it.com/2022/0901/13888.html