Category Archives: Chinese Military Cognitive Domain Operations

Chinese Military Research of System-based Superior Warfare:How to fight system-based warfare in informationized warfare using Nine Typical Combat Styles

中國軍事基於系統的優勢戰爭研究:
資訊化戰爭中如何打好體系戰“九種典型戰法”

現代英語翻譯:

System-based superior warfare is a system-based warfare in information warfare. It is not limited to a specific combat style, but a “combination punch” or a group of combat styles composed of multiple combat styles and tactics . It emphasizes that according to the changes in combat missions, combat opponents and battlefield situations, as long as it is conducive to forming relative advantages and achieving system victory, any appropriate combat means and styles can be flexibly used to form combat advantages. In the specific implementation of system-based superior warfare, these specific combat styles and operational tactics can be organized and implemented separately as part of joint full-domain operations, and more emphasis is placed on playing a “combination punch”, taking multiple measures simultaneously, and winning as a whole. In order to better understand its core connotation, this article lists nine typical combat styles, including overall deterrence warfare, electromagnetic interference warfare, network attack warfare, cognitive control and interference warfare, and analyzes them .

       Systematic Aggregation Warfare – Flexible Use of Multiple Combat Styles “Combination Punch”


       The main content and keywords of this article
1. Overall deterrence warfare: Emphasis on multi-domain joint deterrence; Three major elements should be possessed to implement overall deterrence warfare ; Strong overall strength is the core of achieving effective deterrence
2. Electromagnetic interference warfare : The key to competing for information advantage; In terms of combined means and methods, information empowerment is achieved through “connection + sharing” ; Effective tactics to crack unmanned cluster warfare
       3. Network attack warfare: Mainly soft killing, combining soft and hard, focusing on breaking the network and reducing energy
       4. Cognitive control and interference warfare: Control situational awareness and cognitive rights, compete for information advantages; control command and decision-making rights, compete for decision-making advantages; control “brain” rights, and seize brain control advantages
       5. Agile mobile warfare: High-efficiency and rapid decision-making; high Efficiency forms a favorable combat situation; high efficiency and instant aggregation of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
       6. Swarm autonomous warfare: conducive to forming system advantages to suppress the enemy; conducive to enhancing combat effectiveness; conducive to trapping the enemy in combat difficulties
       7. Precision point killing warfare: achieving high cost-effectiveness in combat; hitting key node targets is an important option; large-scale system support is a basic condition; inseparable from accurate intelligence support
       8. Supply chain disruption warfare: the supply guarantee chain has a huge impact on the overall combat situation; the focus of attack is the key node of the enemy’s supply guarantee chain; the focus is on choosing the right time to use tactics
       9. System destruction and paralysis warfare: the combat goal is to cause the enemy’s combat system to run out of order; heavy punches hit the key nodes of the combat system; soft strikes on the enemy’s combat system

The combat concept is first proposed as a new combat style. Innovative combat style is the core content of combat concept development. It can be said that system aggregation and optimization warfare is a general term for a series of specific tactics. The following nine typical combat styles constitute the combat method system of system aggregation and optimization warfare. They are: 

First, overall deterrence warfare, actively organizing static power demonstrations and deterrence actions in the system-based superiority warfare, striving to win the battle without fighting or with a small battle; 

Second, electromagnetic interference warfare, using a variety of combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for electromagnetic spectrum advantages, seize information control, and thus win the initiative in combat; 

Third, network attack warfare, using a variety of means such as soft strikes and hard destruction to break the enemy’s command network, intelligence network, communication network, and logistics supply network, and disrupt the enemy’s command and support; 

Fourth, cognitive control and interference warfare. Through information attacks, public opinion attacks, and brain attacks, control advantages are formed in cognitive space; 

Fifth, agile mobile warfare. Rapidly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; 

Sixth, swarm autonomous warfare. Widely use unmanned combat means such as “swarms”, “wolf packs”, and “fish schools” to autonomously organize actions and distributed attacks to achieve human-machine joint victory; 

seventh, precision point killing warfare. Accurately obtain intelligence, implement multi-domain precision strikes, strive to hit one point to shake the overall situation, and maximize combat effectiveness; 

Eighth, supply chain disruption warfare. Organize elite forces to attack the enemy’s logistics and equipment supply chain, supply lines and supply bases, and destroy the enemy’s loss of supply and withdrawal from the battle; 

Ninth, system destruction and paralysis warfare. Comprehensively adopt a variety of means such as breaking the network, training, and hitting nodes to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system.


       1. Overall deterrence warfare
       Overall deterrence warfare refers to actively organizing static power demonstrations and deterrence actions in system-based superior warfare, striving to defeat the enemy without fighting or fighting a small battle. Sun Tzu said: “To defeat the enemy without fighting is the best of the best.” Deterrence and war are the two main forms of military activities. Deterrence is mainly to show determination and will to potential opponents by showing strength or threatening to use strong strength to deter the opponent’s actions. It can be said that overall deterrence warfare in system-based superior warfare is an important means or method of achieving “stopping” the enemy’s troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first of all, strong in general, and then strong in key parts. Modern warfare is a confrontation between systems. The overall deterrence war under the informationized local war requires not only the traditional deterrence means and capabilities of land, sea, air and space, but also new deterrence means and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence, and more importantly, the overall deterrence that demonstrates the overall strength of the country. In particular, with the rapid development of advanced technologies such as information technology, the scientific and technological revolution, industrial revolution, and military revolution are accelerating their integration, and the coupling relationship between strategic competitiveness, social productivity, and military combat effectiveness is closer. Winning the informationized war is more of a contest of national will and national overall strength. If we want to contain war, we must first deter our opponents from the perspective of overall strength.
       1.1 Emphasize multi-domain joint deterrence
       Deterrence means usually include nuclear deterrence and conventional deterrence. In the system-based superiority war, the overall deterrence war is implemented, aiming to comprehensively use the conventional deterrence means of the land, sea, air, space, and power grid in the whole domain to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, network, and electromagnetic weapons have become new deterrent means .It mainly uses rapid response electromagnetic orbital weapons, space-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, high-power microwave weapons and other equipment to threaten and attack the opponent’s space targets, forming a “interference and blocking” deterrence against the enemy’s space information. Cyber ​​deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other key information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communication and other informationized weapon equipment systems to achieve deafening and blinding deterrence against the enemy. 1.2 Three elements should be possessed to implement overall deterrence warfare.

To implement overall deterrence warfare and achieve the expected deterrence effect, three elements must usually be possessed: one is strength. The deterrent party must have reliable capabilities or strength that make the opponent feel daunted and fearful; the second is determination and will. The deterrent party must dare to use this capability when necessary; the third is clear information transmission. The deterrent party must accurately and effectively let the other party know its action capabilities and determination.


       Historically, the criteria for judging deterrence strength have changed in three aspects: first, active military strength; second, comprehensive national strength or war potential; and third, the total number of main combat weapons and equipment. For a long period of history, the number of troops was deterrence, and the strength of military strength was directly determined by non-material factors such as the size of the active army, the number of important weapons and equipment, and the morale of the army’s training organization. After the 20th century, with the expansion of the scale of war, deterrence strength is no longer limited to the number of troops and important weapons and equipment, but is determined by the country’s war potential, including economic strength, scientific and technological strength, energy resources, and even population size. 

The overall deterrence war in the system-based superiority war, the formation of its deterrence strength is mainly based on the network information system and the joint full-domain deterrence capability formed under the integration of the system.


       1.3 Strong overall strength is the core of achieving effective deterrence
       The development of information technology and its extensive penetration and application in the military field have provided favorable conditions for building overall strength and achieving overall deterrence. System-based superior warfare is supported by a network information system and fully utilizes the penetration and connectivity of information technology. It not only integrates various combat forces, combat elements, and combat units into an organic whole to achieve a military system combat advantage, but also connects and integrates various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, energy, etc., into the national war mobilization system, gathers forces and resources from all aspects to form an overall synergy, realizes the emergence effect of system capabilities, and displays the overall strength advantage as a whole, forming a powerful invisible deterrent of unity and common hatred of the enemy, and shaping a situation in which the enemy “has the power but cannot act” and “can act but has no effect”, playing a role in containing and winning the war.
       In the overall deterrence war, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; the mobilization time will be faster, and the mobilization and action information can be quickly transmitted to everyone and every node at the first time by using the network and information system; the action coordination and collaboration will be more consistent, and the forces distributed in various regions can act in a unified manner almost at the same time based on the same situation and the same order, greatly improving the efficiency of action coordination; the resource utilization will be more sufficient, and various war resources based on the network can quickly realize the transition from peace to war and from military to civilian, and realize the integrated and precise guarantee of the front and rear.
       2. Electromagnetic interference warfare
       Electromagnetic interference warfare refers to the flexible use of various combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantage of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat.
       2.1 The key to competing for information advantage Informatization local wars are highly dependent on the electromagnetic spectrum, and the control and counter-control of electromagnetic space have become the focus of competing for the right to control information. Organizing and implementing electromagnetic interference warfare is mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. Using electromagnetic means to disrupt and destroy the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information warfare capability, and enable the friendly side to ensure the rapid and effective flow of information in the scenario of having information control, and drive the command flow, action flow, material flow, and energy flow through the information flow, thereby gaining the leading power and initiative in combat.
       2.2 The basic focus is to disable and invalidate the enemy’s combat system. The implementation of electromagnetic interference warfare in the system-based superiority war is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure the effective use of electromagnetic space by the friendly side, various electronic reconnaissance, interference, attack, defense and support forces are organized to interfere with and attack the enemy’s communication network, radar network, computer network and command center, communication hub, radar station, computer network node, global navigation positioning system, space-ground integrated Internet and other space link systems, and other various frequency-using weapons and equipment, block and destroy their communication and data transmission, and destroy the “connection” and “sharing” structural center of gravity of the enemy’s combat system, so as to provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities and disabling and invalidating the enemy’s entire combat system.
       2.3 Effective tactics to crack unmanned swarm warfare
     Unmanned autonomous swarm warfare such as “bee swarm”, “wolf pack” and “fish pack” is an important feature of information-based local wars with intelligent characteristics. Various unmanned autonomous swarms are huge in number, diverse in type and complex in characteristics, and each individual can complement each other and play a role in substitution. It will be very difficult to intercept and damage the entire unmanned swarm. However, from a technical perspective, in order to achieve effective coordination in unmanned combat swarms, each individual must share and interact with each other. Once the communication coordination between unmanned swarms is interfered with, it will be impossible to share battlefield situation and information, and it will be difficult to coordinate actions with each other, and it will be difficult to play its due combat effectiveness. This provides an opportunity for the other party to intercept communications and conduct electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attack on the information and communication network of unmanned swarms, and destruction of their information sharing and interaction will make it impossible for each individual in the unmanned swarm to achieve effective coordination, thereby losing combat capability.
       3. Network attack warfare
       Network attack warfare refers to the comprehensive use of network and computer technologies and other effective means to conduct military confrontation actions around the control of information and information networks. It is a major combat style for cyberspace operations and the struggle for network control. Its main combat operations include both soft kill and hard destruction, with soft as the main and a combination of soft and hard. Among them, soft kill is mainly network attack, that is, the comprehensive use of blocking attacks, virus attacks and other means to block and attack the enemy’s information network, command system, weapon platform, etc., making it difficult for the enemy’s network, command information system, etc. to operate effectively or even paralyzed; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses and anti-radiation attacks to paralyze the enemy’s information network physical facilities and destroy the enemy’s combat and weapon equipment entities. The
       focus is on breaking the network and reducing the power. Organizing a network attack war in the system concentration war is to target the weaknesses of the opponent’s military information network, take advantage of the system, organize various network attack forces, and continuously implement soft kill and hard destruction operations on the enemy’s combat command network, reconnaissance intelligence network, communication network and even logistics supply network throughout the combat process, destroy the enemy’s network system, and make the overall function of the enemy’s combat system decline or even become disabled. Mainly against the enemy’s basic information network, intelligence network, command network, support network and other core targets, implement a series of combat operations such as network and electronic coordinated attack, deception and confusion, link blocking, takeover and control, so as to disable the enemy’s intelligent combat network system and achieve a key victory in paralyzing the enemy system.
      4. Cognitive control and interference warfare:

Cognitive control and interference warfare refers to the use of information attack, public opinion attack, and brain attack in the system optimization war to interfere, destroy or control the enemy’s thinking and cognition, so that the enemy cannot make correct judgments and decisions, thereby forming a control advantage over the enemy in the cognitive space.
      Cognitive domain,That is, the human thinking space and consciousness space are areas that have a key impact on combat decisions and judgments. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the competition of war from physical space and information space to cognitive space, making cognitive space a new combat domain. With the development of information and intelligent technology and their extensive and in-depth application in the military field, human-machine intelligence tends to merge, making the position of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. Controlling cognitive rights has become a key factor in future battlefield control rights. Fighting for cognitive control rights has become an important combat style for winning in informationized local wars with intelligent characteristics.
       4.1 Controlling situational awareness cognitive rights and fighting for information advantage
       In the system-based superiority battle, information flow drives material flow and energy flow, and information advantage determines decision-making advantage. Rapid and accurate cognition of intelligence information and battlefield situation has an important impact on seizing command and decision-making advantages. Therefore, in order to organize and implement the system-based optimization war, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster cognition of the battlefield situation and combat environment, and ensure that we discover and recognize the enemy first from the source. While eliminating the “fog of war” of our own side, we must also create “fog” for the opponent. Therefore, in order to compete for the right of cognition, we must not only grasp and process information before the enemy, but also take measures such as network public opinion attacks and highly realistic virtual reality to actively create and spread false information, destroy and disrupt the enemy’s perception and cognition of the battlefield situation, maximize the creation of chaos, increase uncertainty, interfere with the opponent’s combat decision-making, and delay its combat operations.
       4.2 Control the command decision-making power and compete for decision-
       making advantages. Decision-making advantages determine action advantages. The commander’s quick decision-making is the key to shortening the “command cycle” and achieving rapid victory. In the organization of the system-based optimization war, the success or failure of combat operations depends to a large extent on the commander’s decision-making speed. We should make use of intelligent decision-making assistance systems to select the best combat plan, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access the required combat nodes and combat platforms at any time, build an integrated combat system, realize the decentralized deployment of forces, information, and capabilities, and cross-domain linkage, form advantages at the location and time required for combat, gather energy, and win by gathering advantages; implement “core attack war” to make the enemy’s command and decision-making errors or deviations by invading the opponent’s “chips”, tampering with their programs and command and decision-making system algorithms, etc.
       4.3 Control “brain” power and seize brain control advantage
       The cognitive control and disturbance war in the system of gathering advantages emphasizes “attacking the mind and winning the will”, that is, using network warfare, electromagnetic warfare and other methods to implement cognitive control warfare of “attacking the mind, controlling the brain and winning the will” on the enemy’s human brain and consciousness cognition and the control system of unmanned autonomous platforms, replacing “destruction” with “control”, and achieving the purpose of stopping the war and winning the war at the lowest cost. Different from traditional strategic deterrence, attacking the mind and controlling the brain is more focused on active attack. It is an active attack action, mainly using advanced information warfare technology, brain control technology, etc., to control the enemy’s decision-making leaders, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., to implement “brain” attacks, directly control and disrupt the opponent’s “brain”, influence and control the enemy’s decision-making, or disable it, and achieve invisible control of the enemy’s combat operations. For example, targeting human cognitive thinking, using brain reading and brain control technology, using mind guidance and control means, directly “inject” and “invade” attacks on the enemy’s brain, interfere with, control or destroy the enemy’s commander’s cognitive system, deeply control them from the consciousness, thinking and psychology, seize the “intelligence control power”, disrupt the enemy’s decision-making, break the enemy’s morale, and force the enemy to surrender.
      5. Agile mobile warfare
      Agile mobile warfare refers to high-efficiency decision-making, high-efficiency adjustment of troop and weapon deployment, and high-efficiency and immediate aggregation of combat forces in system-based superior warfare, high-efficiency aggregation of capabilities on the established battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and promptly to changes in the battlefield environment, and has characteristics such as responsiveness, robustness, flexibility, elasticity, innovation and adaptability.

Table 1 Concept of Agile Operations
      5.1 Efficient and rapid decision-making
      To implement agile mobile warfare, we must first make efficient and rapid decisions to gain the initiative in combat. Therefore, we must comprehensively use various reconnaissance, detection, perception and surveillance means to obtain battlefield situation and target information in a timely manner, especially the characteristic information, activity trajectory and real-time location information of time-sensitive targets, to ensure accurate intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. We must use less time to identify effective intelligence information, formulate action plans at a faster speed according to changes in the situation, take the initiative one step faster than the enemy, and seize the initiative. Efficient decision-making focuses on shortening the decision-making cycle. We must take the target time window as the center point, coordinate decision-making and command with combat units and weapon platforms, respond quickly, and link as a whole to improve combat efficiency.
      5.2 Efficiently form a favorable combat situation .
      We must keep abreast of changes in the battlefield situation at any time, rely on information network support, and achieve dynamic reorganization and integration of combat forces through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers, and achieve efficient flow and aggregation of combat resources across the entire domain, so as to achieve mobile aggregation and form a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent decision-making assistance and other means to quickly form combat plans, quickly deploy combat forces at a high frequency according to the plan, organize troops to quickly form favorable combat deployments, and achieve the first enemy discovery, first enemy decision-making, first enemy firing, and first enemy assessment, so as to change the balance of power in the shortest time and at the fastest speed, form combat advantages, and improve the efficiency of combat operations.
      5.3 High-efficiency and instant aggregation of combat forces
      The key to organizing agile mobile warfare is to select combat forces within a limited time, coordinate the entire battle situation, form an overall force, and ensure a fatal blow. Therefore, in response to changes in the battlefield situation, especially the target situation, a joint mobile combat system formed by multi-domain combat forces should be formed, combat forces should be aggregated in real time, and quickly deployed to a favorable battlefield to carry out immediate strikes on the enemy. In view of the deep space and deep sea becoming new combat spaces, intelligent unmanned autonomous combat platforms can be organized to quickly and flexibly deploy to key targets or important channels that are difficult for humans to reach due to physiological limitations, and wait for ambush operations to form a new cross-domain balance of power advantage.
      5.4 Agile mobile warfare is an innovative development of traditional mobile warfare.
      In the history of wars in ancient and modern times, there are many successful examples of relying on rapid and concealed maneuvers to achieve combat objectives. However, the combat process of local informationized wars has been greatly compressed, the combat rhythm has been accelerated, and the opportunity for war is fleeting, which puts higher requirements on rapid maneuvering to capture the opportunity. It is difficult to meet the requirements of joint operations and full-domain operations under informationized conditions by relying solely on “fast pace and high speed”, so agile maneuvers must be implemented.
       6. Unmanned cluster autonomous warfare
       Unmanned cluster autonomous warfare refers to the extensive use of unmanned combat means such as “bee swarms”, “wolf packs” and “fish schools” in system-based superior warfare, autonomously organizing actions and distributed attacks to achieve joint victory between man and machine. As unmanned autonomous equipment has become the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical advantages has become an important combat style in informationized warfare.
       6.1 It is conducive to forming a system advantage to suppress the enemy.
       Autonomous warfare of unmanned clusters gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds large-scale unmanned combat clusters or formations such as unmanned “bee swarms”, “wolf packs”, and “fish swarms”. They organize themselves autonomously and cooperate with each other. They can carry out close-range, full-coverage reconnaissance, or act as bait to implement interference and deception, or cooperate with main combat weapons to carry out distributed coordinated attacks, and achieve overall mobility and joint control of the enemy.
       6.2 It is conducive to enhancing combat effectiveness
       . In the autonomous combat of unmanned clusters, different combat units in the unmanned cluster formation are responsible for different functions and tasks. Some are responsible for reconnaissance, some are responsible for electromagnetic interference and firepower strikes, and some play the role of “bait”. The cluster transmits and shares battlefield information through the inter-cluster network, performs its duties according to the division of labor, and coordinates in real time, autonomously, and dynamically according to battlefield changes. It not only gives full play to the advantages of quantity and scale, but also uses information networks and intelligent integration technologies to achieve integration effects, and consumes the enemy’s defense detection, tracking and interception capabilities with the advantages of clusters, so that the enemy’s defense system is quickly saturated and paralyzed.
       6.3 It is conducive to trapping the enemy in a difficult situation in combat.
       Unmanned cluster autonomous warfare is a mixed formation of a large number of autonomous unmanned combat platforms with different functions, forming an unmanned combat cluster that integrates reconnaissance and detection, electronic interference, network attack, and firepower strike. It will carry out multi-directional, multi-wave, and continuous attacks on the same target or target group, making it difficult for the enemy to make an effective counterattack.
       7. Precision point killing war
       Precision point killing war refers to the precise acquisition of intelligence in the system-based superiority war, the implementation of multi-domain precision strikes, and the effort to hit one point to shake the overall situation and maximize combat effectiveness. Informationized local war is an overall confrontation between systems. Implementing precision point killing war, carrying out precision strikes on important nodes and key links of the enemy’s combat system, destroying the enemy’s combat system, and reducing the enemy’s combat capability will achieve twice the result with half the effort.
      7.1 Achieving high cost-effectiveness in combat
      Achieving maximum combat effectiveness at the lowest cost is the goal pursued by both sides in combat. With the widespread application of information technology in the military field and the advent of informationized warfare, precision-guided weapons, intelligent kinetic weapons, reconnaissance and strike integrated drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. All these provide material and technical conditions for achieving precision point-killing warfare, achieving combat objectives at a relatively low cost, and realizing high efficiency and cost-effectiveness in combat.
       7.2 Hitting key node targets is an important option
       . Precision point-killing warfare focuses on hitting key points and nodes. If you don’t hit, you’ll lose. If you hit, you’ll hurt and win. Hitting one point will break the enemy’s system and shake the overall situation. The targets of the strike are not limited to the enemy’s dispersed ships and aircraft, but should also be targeted at enemy command centers, important hubs, and even local, dynamic, time-sensitive targets or independent targets such as major generals and commanders, in order to achieve deterrence and shock and destroy the enemy’s system. In response to the distributed tactics of decomposing the functions of expensive large equipment into a large number of small platforms and implementing dispersed deployment of troops, using precision strike firepower to “point-kill” them will also be an effective countermeasure.
       7.3 Large-scale system support is a basic condition
       . The implementation of precision point-killing warfare cannot be separated from large-scale system support. Focusing on achieving combat objectives, the required forces and weapons are drawn from the dispersed combat domains. Under the support of the network information system, the precision strike system is dynamically integrated to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is attacked, and precise use of troops and precise energy are achieved. To implement precision point killing warfare, it is necessary to be precise. All links in the entire combat system must be closely connected, and there must not be any mistakes. The operation of the US military to kill Bin Laden in 2011 can be said to be a typical strategic precision point killing operation supported by the strategic system.
       7.4 Inseparable from accurate intelligence support
       In precision point killing warfare, accurate intelligence support is always the key to achieving combat objectives. Therefore, before the war, various means should be used to collect various intelligence data and information of the enemy, especially to make accurate analysis and judgment of the enemy’s targets. During combat operations, various sensors and intelligence reconnaissance means should be used to accurately grasp the changes in enemy targets and dynamic target situations in a timely manner, so as to provide strong and effective intelligence support for the implementation of precision point killing warfare. The US military’s targeted elimination of Soleimani is a typical precision point killing war supported by an efficient intelligence system.
       8. Supply Chain Disruption War
       Supply chain-breaking warfare refers to organizing elite forces in the system-based superiority war to attack the enemy’s supply chain, supply lines and supply bases for logistical materials and equipment, so that the enemy will lose supply and withdraw from the battle. Aiming at the enemy’s weaknesses such as long logistic supply lines and large equipment support, elite forces are organized to build a “chain-breaking warfare” combat system to carry out continuous, precise and devastating strikes on the enemy’s supply chain, supply lines and supply bases for logistical materials and equipment, which will make it difficult for them to continue due to loss of supply and have to withdraw from the battle.
       8.1 The supply support chain has a huge impact on the overall combat situation
       . Logistics equipment support is an important foundation for combat. The continuous supply of logistical materials and weapons and equipment ultimately determines the size of an army’s combat force, whether it can fight, in what season to fight, where to fight, how far it can leave the rear base, how long it can fight, how fast it can maneuver, etc. In information warfare, battlefield material consumption has increased exponentially. The reliance of operations on logistical equipment support has not only not decreased, but has become increasingly greater. In addition, the requirements for the degree of specialization of support have also become increasingly higher. In particular, the types and specifications of modern combat equipment are diverse, the mixed transportation volume is huge, and the deployment of troops is more dispersed, which also puts forward very high requirements for transportation capacity, making bases, communication lines and transportation more important than ever before. The stable and efficient operation of the supply support chain and the continuous and uninterrupted supply support are the key to winning the battle and have a huge impact on the overall situation of the battle.
       8.2 The focus of the attack is the key node of the enemy’s supply support chain.
       The focus of the supply chain-breaking war is to attack the key link of the enemy’s supply support chain, and to make it lose its continuous support capability by breaking the chain. Therefore, the supply chain-breaking war should mainly target the enemy’s ground railway and highway transportation lines, maritime supply fleets, military-requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, attacking the enemy’s maritime supply chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy’s aircraft carrier battle group lose its ability to continue to fight, and even affect the outcome of a battle.
       8.3 Focus on choosing the right time and using tactics
       to organize and implement the supply chain disruption war. It is crucial to choose a favorable time to strike. The timing of the supply chain disruption war should be selected when the enemy’s supply is maneuvering, using covert tactics to attack the enemy by surprise, and suddenly strike the enemy’s supply vehicles, ships, and transport aircraft to terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing elite forces to ambush on the routes and routes that the enemy’s transportation vehicles must pass through, waiting for an opportunity to carry out covert and sudden strikes; stealth surprise attack warfare, using submarines, stealth fighters, etc. to covertly advance and strike enemy transportation targets to win by surprise; long-range precision warfare, using long-range conventional ground-to-ground missile forces to carry out long-range precision strikes on enemy supply bases and airports, docks and other supply departure points.
       9. System Destruction and Paralysis Warfare
       System destruction and paralysis warfare refers to the use of a variety of means such as breaking the network, breaking the chain, and hitting the nodes in the system concentration and superiority war to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural strength between the elements of the enemy’s combat system, so that the system function degenerates and cannot play the role of multiplying capabilities.
       9.1 The combat goal is to cause disorder in the operation of the enemy’s combat system.
       In information warfare, the combat systems of both warring parties have their own internal order, which is the key to maintaining and supporting the operation of the combat system. The party that can maintain and control the internal order of the combat system will gain an advantage, otherwise it will be at a disadvantage. Therefore, system destruction and paralysis warfare should establish the goal of disrupting the enemy’s winning mechanism and causing disorder in the enemy’s combat system. This requires that in the system destruction and paralysis war, we must make full use of the powerful enabling role of information technology, especially intelligent algorithms , to quickly adjust and reconstruct our own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, so that the enemy’s combat system loses its normal operating order, and the system function is destroyed in the disorder, and the overall combat capability is significantly reduced.
       9.2 Strike the key nodes of the combat system with a heavy punch
       System confrontation is a major feature of information warfare. The system is an important foundation and support for system confrontation, and it is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can maintain a strong and smooth operation has a decisive impact on winning wars and campaigns. In the system destruction and paralysis war, the key is to focus on the enemy’s integrated combat system of land, sea, air, space and power grids, break the network, break the chain, and hit the nodes. By hitting the key node targets, the operation mechanism of the enemy’s combat system is disordered, or even severely damaged or destroyed. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, hit them at one point, destroy them in a piece, and paralyze them as a whole, so as to achieve the goal of defeating the enemy.
       9.3 Implementing soft strikes on the enemy’s combat system
       When organizing and implementing the hard destruction of system destruction warfare, soft kill operations such as electronic warfare, network warfare, psychological warfare, and public opinion warfare are organized simultaneously to carry out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare, using electronic warfare forces to implement strong electromagnetic interference on the enemy, causing its information to fail and fall into the fog of war; network warfare, using network offensive forces to attack the enemy’s network information system, causing serious damage to the enemy’s command and communication system and computer network, causing its command to fail and fall into an information island or even a war island; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare means to implement psychological strikes and public opinion guidance on the enemy, severely damaging its combat will and inducing cognitive confusion. Organizing livelihood warfare to strike the opponent’s major national and livelihood facilities can also play a role in “cutting off the firewood from the bottom of the pot” for the enemy’s combat system. During the Kosovo War in 1999, the US military did not attack the Yugoslav army, but instead attacked its potential target system, causing the Yugoslav military and civilians to lose their will to fight and lead to defeat. 

現代國語翻譯:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示與威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動;三是網絡破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通訊網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速響應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間資訊「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連結、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界相關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,以網路為基礎的各種戰爭資源,可快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳輸訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2 基本著眼點是使敵作戰體系失能失效體系聚優戰中實施電磁擾阻戰,主要是針對敵方對電磁空間的依賴,同時為確保己方對電磁空間的有效利用,組織各種電子偵察、幹擾、攻擊、防禦和支援力量,對敵通信網、雷達網、電腦網和指揮中心、通信樞紐、雷達站、電腦網路節點,全球導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通訊聯絡與資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱敵指揮控制能力,使敵整個作戰體系失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊網路物理設施,摧毀敵作戰及武器裝備實體。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷與硬摧毀行動,破壞敵之網路體系,使敵作戰體系功能整體下降甚至失能。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理訊息,還要採取網路輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假訊息,破壞、擾亂敵對戰場態勢的感知、認知,盡量製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰資源,實現作戰效能最大化;利用泛在智慧網絡,隨遇接入所需作戰節點、作戰平台,建構形成一體化作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集聚釋能、聚優制勝;實施“攻芯戰”,通過侵入對方“芯片”、篡改其程序及指揮決策系統演算法等,使敵指揮決策發生錯誤或偏差。
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志」的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進資訊作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵決策,或使其失能,實現隱形操控敵作戰行動。如以人的認知思考為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施「注入」「侵入」式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵

5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提升作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全域作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人集群自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘餌實施幹擾、欺騙,或配合主戰兵器實施分散式協同攻擊,實現整體機動、聯合製敵。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦偵測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以做出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點和關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使基地、通信線路和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱蔽突然打擊;隱形奇襲戰,使用潛艇、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確戰,使用遠程常規地地飛彈部隊對敵補給基地和機場、碼頭等補給出發地實施遠程精確打擊。
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整與重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運行機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強烈電磁幹擾,使其資訊失靈,陷入戰爭迷霧之中;網路戰,使用網路進攻力量對敵網路資訊體系實施攻擊,使敵指揮通訊系統和電腦網路受到嚴重破壞,使其指揮失靈,陷入資訊孤島乃至戰爭孤島;心理戰和輿論戰,使用心理戰、輿論戰手段,對敵實施心理打擊和輿論引導,重創其作戰意志,誘導其認知錯亂。組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗.

中國軍事資訊科技原創來源:https//www.81it.com/2022/0901/13888.html

Chinese Intelligent Warfare is Accelerating and Advancing

中國智能化戰爭正在加速推進

中國軍網 國防部網. 2022年3月17日 星期四

現代英語:

With the widespread application of artificial intelligence in the military field, intelligent warfare has gradually become a hot topic. History has repeatedly proved that the evolution of war forms will lead to profound changes in the winning mechanism. In today’s era when information warfare is developing in depth and intelligent warfare is beginning to emerge, the armies of major countries in the world have made great efforts to promote military intelligence, and many of these trends are worthy of attention.

Strengthen top-level design

Outlining a “roadmap” for intelligent warfare

Driven by a new round of scientific and technological revolution and industrial revolution, intelligent military transformation is developing in depth. The United States, Russia, Japan and other countries have regarded artificial intelligence as a disruptive technology that “changes the rules of the war game” and have made early arrangements, strengthened top-level design and planning guidance, and explored the direction of military application of artificial intelligence.

The U.S. military has detailed the current status and development plan of artificial intelligence in documents such as “Preparing for the Future of Artificial Intelligence”, “National Artificial Intelligence Research and Development Strategic Plan”, “Artificial Intelligence and National Security”, “Integrated Roadmap for Unmanned Systems, Fiscal Year 2017-2042”, and “American Artificial Intelligence Initiative: First Annual Report”, and has elevated the development of artificial intelligence to the national strategic level. In 2021, the U.S. military pointed out in its “U.S. Department of Defense Artificial Intelligence Posture: Assessment and Improvement Recommendations” that the U.S. military should consider three guiding questions in developing artificial intelligence: what is the current state of artificial intelligence related to the U.S. military; what is the current situation of the U.S. military in artificial intelligence; and what internal actions and potential legislative or regulatory actions may enhance the U.S. military’s artificial intelligence advantage.

Russia has invested a lot of resources to maintain a balance with the United States in the competition for the application of artificial intelligence in the military field. In 2021, Russian President Vladimir Putin stated at the first Defense Ministry meeting of the year that artificial intelligence will greatly promote changes in the military field, and the Russian Federation Armed Forces must accelerate the research and development of artificial intelligence application technologies such as robots, intelligent individual systems, and intelligent weapon modules, so as to form core technical capabilities and battlefield competitive advantages as soon as possible. Documents such as “Special Outline for the Research and Development of Future Military Robot Technology and Equipment before 2025”, “Future Russian Military Robot Application Concept”, and “The Development Status and Application Prospects of Artificial Intelligence in the Military Field” have established a series of mechanisms at the national level for the Russian military to promote the military application of artificial intelligence.

The Japanese government has also issued an “Artificial Intelligence Strategy” to lead the research and development of artificial intelligence technology and industrial development. In the “Robotics and Artificial Intelligence” strategic plan formulated by the United Kingdom, the application of artificial intelligence in battlefield construction is emphasized. In January 2021, the Australian Department of Defense released “Fighting the Artificial Intelligence War: Operational Concepts for Future Intelligent Warfare”, which explores how to apply artificial intelligence to land, sea and air combat.

Innovative combat concepts

Promoting the “Thinking First” Approach to Intelligent Warfare

The innovation of operational concepts has an ideological driving effect on the development of military science and technology and the evolution of war forms. In the past, people’s understanding and grasp of war mainly came from the summary of practical experience, and operational concepts were empirical concepts. In the future era of intelligent warfare, operational concepts are not only empirical concepts, but also the conception, design and foresight of operations.

The U.S. Army has proposed the concept of “multi-domain warfare”, which requires deep integration and close coordination of combat capabilities in various domains such as land, sea, air, space, electromagnetic, and network. To this end, the U.S. Army has successively issued white papers such as “Multi-Domain Warfare: The Development of Synthetic Arms in the 21st Century (2025-2040)”, “U.S. Army Multi-Domain Warfare (2028)”, and “Using Robotics and Autonomous Technologies to Support Multi-Domain Warfare”. In March 2021, the U.S. Department of the Army issued the document “Army Multi-Domain Transformation: Preparing to Win in Competition and Conflict”, indicating that “multi-domain warfare” has become a “flag” leading the transformation and development of the U.S. Army. The Defense Advanced Research Projects Agency proposed the concept of “mosaic warfare”, which aims to create a highly decentralized and highly adaptable “kill net” composed of different combat functional units, based on advanced computer technology and network technology. The U.S. Department of Defense strongly supports the concept of “joint all-domain operations”. In March 2020, the U.S. Air Force took the lead in writing “joint all-domain operations” into the doctrine to explore how the Air Force can play a role in “joint all-domain operations”.

The Russian military proposed the concept of “charge disintegration”. “Disintegration” is one of the most important operational concepts in Russia at present. The Russian electronic warfare forces set the goal of making the enemy’s information, charge, electronic warfare and robot systems ineffective, and believe that this goal will “determine the fate of all military operations”. Disrupting the command and control of enemy forces and weapon systems and reducing the efficiency of enemy reconnaissance and use of weapons are the primary tasks of electronic warfare. At present, the Russian military is considering forming 12 types of electronic warfare forces. The Russian military also proposed the concept of “non-nuclear containment system”, the core of which is to use non-nuclear offensive strategic weapons to contain opponents. The non-nuclear offensive strategic weapons it defines include all ballistic missiles equipped with non-nuclear warheads, as well as strategic bombers and long-range air-based and sea-based cruise missiles. In addition, the Russian military also proposed the concept of “hybrid warfare”, hoping to use artificial intelligence systems to seek battlefield information advantages.

The British Ministry of Defense has proposed the concept of “multi-domain integration” and will develop a new command and control system with intelligent capabilities to achieve comprehensive, persistent, accurate and rapid battlefield perception and force coordination.

Focus on technology research and development

Shaping the Intelligent Warfare Operational Model

The key to the effectiveness of artificial intelligence is the combination with other technologies, which is also described as the “AI stack”. Various technologies interact to produce a combined effect, thereby enhancing the capabilities and effects of each technology. In the intelligent warfare supported by artificial intelligence technology, the collaborative combat mode of “man-machine integration, cloud brain control”, the cluster combat mode of “mixed formation, group intelligence”, and the cognitive combat mode of “intelligence-led, attacking with intelligence first” will constantly update people’s understanding of war.

Focus on the research and development of innovative projects. The US military is vigorously promoting the application of artificial intelligence chips in existing weapons and equipment systems, adding “intelligent brains” to weapons to enable them to have human-like thinking and autonomous interaction capabilities. In October 2021, the US Navy launched the “Beyond Plan”, which is regarded as the “current highest priority”. It aims to accelerate the delivery of artificial intelligence and machine learning tools by building a military Internet of Things for maritime operations, integrating manned and unmanned joint formations, supporting a new intelligent naval architecture, enhancing large-scale firepower killing, and realizing intelligent distributed operations of the navy. In addition, the Defense Advanced Research Projects Agency has also carried out cognitive electronic warfare projects such as “Adaptive Electronic Warfare Behavior Learning”, “Adaptive Radar Countermeasures”, and “Communications under Extreme Radio Frequency Spectrum Conditions”, and developed a prototype of a cognitive radar electronic warfare system. The Russian Ministry of Defense’s Intelligent Technology and Equipment Research and Experimental Center cooperated with the Institute of Control Problems of the Russian Academy of Sciences to develop and test autonomous intelligent algorithms including drone swarm command and control, and also jointly developed an object automatic recognition software system based on neural network principles with the National Aviation System Research Institute.

Establish innovative R&D institutions. The continuous emergence of new technologies is an inexhaustible driving force for the vigorous development of military intelligence. High-level military intelligence construction cannot be separated from the technical research and development of professional institutions. Some countries and militaries have established R&D centers, focusing on innovative development from a technical level. The U.S. Department of Defense has established a joint artificial intelligence center, which is planned to be built into a national key laboratory to lead the promotion of hundreds of artificial intelligence-related projects and ensure the efficient use of artificial intelligence-related data and information to maintain the United States’ technological advantage in this field. Russia has established an artificial intelligence and big data alliance, a national artificial intelligence center, and a robotics technology research and experimental center under the Ministry of Defense, mainly conducting theoretical and applied research in the fields of artificial intelligence and information technology. France has established an innovative defense laboratory, the United Kingdom has set up an artificial intelligence laboratory, and India has established an artificial intelligence task force to explore related technologies.

Strengthen equipment research and development and deployment. In recent years, many countries have attached great importance to the research and development of intelligent weapons and equipment, and unmanned aerial vehicles, unmanned combat vehicles, unmanned ships, unmanned submarines, etc. have continued to emerge. At present, the US Air Force has begun to practice the combat concept of “man-machine collaboration, man in the loop” on the F-35 fighter. The US XQ-58A “Valkyrie” stealth drone previously mainly carried out man-machine collaborative operations with F-35 and F-22 fighters. In April 2021, the stealth drone successfully launched the ALTIUS-600 small drone system, further enhancing its manned and unmanned collaborative combat capabilities. Russia is focusing on reconnaissance and surveillance, command and decision-making, firepower strikes, combat support and other fields, and is developing and deploying intelligent equipment. It plans to increase the proportion of unmanned combat systems in weapons and equipment to more than 30% by 2025. Russia’s ground unmanned combat weapons, represented by the “Uranus” series and “Platform-M” and “Argo” models, are developing rapidly. Among them, the Nerekhta unmanned combat vehicle can be equipped with remote-controlled machine guns and rocket launchers. In addition to the combat capabilities of ordinary armored vehicles, it also has transportation and reconnaissance functions. In addition, the Japanese Self-Defense Forces plan to officially deploy an unmanned aerial formation with strong combat capabilities in 2035.

(Author’s unit: National University of Defense Technology)

國語中文:

■賈珍珍 丁 寧 陳方舟

隨著人工智慧在軍事領域的廣泛應用,智慧化戰爭逐漸成為備受矚目的焦點話題。歷史多次證明,戰爭形態的演進將引發致勝機理的深刻改變。在資訊化戰爭向縱深發展、智慧化戰爭初露端倪的當今時代,世界主要國家軍隊紛紛下大力推動軍事智慧化,其中的諸多動向值得關注。

加強頂層設計

勾勒智能化戰爭“路線圖”

在新一輪科技革命與產業革命推動下,智慧化軍事變革正向縱深發展。美國、俄羅斯、日本等國紛紛把人工智慧視為「改變戰爭遊戲規則」的顛覆性技術,並事先佈局,加強頂層設計和規劃引領,探索人工智慧的軍事應用方向。

美軍在《為人工智慧的未來做好準備》《國家人工智慧研究與發展戰略計畫》《人工智慧與國家安全》《2017至2042財年無人係統綜合路線圖》《美國人工智慧計畫》:在首個年度報告》等文件中,詳述了人工智慧的發展現狀和發展規劃,並將人工智慧發展提升至國家戰略層面。 2021年,美軍在發布的《美國防部人工智慧態勢:評估與改進建議》中指出,美軍發展人工智慧應考慮三個指導性問題:與美軍相關的人工智慧現處於何種狀態;美軍目前在人工智慧方面的態勢如何;哪些內部行動以及潛在的立法或監管行動可能會增強美軍的人工智慧優勢。

俄羅斯投入大量資源,以維持與美國在人工智慧軍事領域應用競爭的平衡。 2021年,俄總統普丁在年度首場國防部會議上表示,人工智慧將大幅推動軍事領域變革,俄國聯邦武裝力量要加速機器人、智慧單兵系統和武器智慧化模組等人工智慧應用技術的研發工作,早日形成核心技術能力和戰場競爭優勢。 《2025年前未來軍用機器人技術裝備研發專題綱要》《未來俄軍用機器人應用構想》《人工智慧在軍事領域的發展現狀以及應用前景》等文件,從國家層面為俄軍推動人工智慧軍事應用確立了一系列機制。

日本政府也推出了《人工智慧戰略》,旨在引領人工智慧技術研發和產業發展。在英國制定的《機器人與人工智慧》戰略規劃中,強調了人工智慧在戰場建設中的應用。 2021年1月,澳洲國防部發布《打好人工智慧戰爭:未來智慧化戰爭之作戰構想》,這份文件探討如何將人工智慧應用到陸、海、空作戰領域。

創新作戰概念

推動智慧化戰爭“思想先行”

作戰概念創新對軍事科技發展、戰爭形態演變具有思想牽引作用。過去人們對戰爭的認識與掌握,主要源自於對實踐經驗的歸納總結,作戰概念即經驗概念。未來智慧化戰爭時代,作戰概念不僅是經驗概念,更是對作戰的構想、設計與前瞻。

美陸軍提出「多域戰」概念,要求陸、海、空、天、電磁、網路等各域作戰能力深度整合與密切協同。為此,美陸軍先後發布《多域戰:21世紀合成兵種的發展(2025至2040)》《美國陸軍多域戰(2028)》《運用機器人與自主技術支援多域戰》等白皮書。 2021年3月,美陸軍部發布文件《陸軍多域轉型:準備在競爭和衝突中取勝》,顯示「多域戰」已成為引領美陸軍轉型發展的一面「旗幟」。美國防高級研究計畫局提出「馬賽克戰」概念,旨在打造一種由不同作戰功能單元構成的、以先進電腦技術與網路技術為基礎的、高度分散、具有高度適應性的「殺傷網」。美國防部大力支持「聯合全域作戰」概念。 2020年3月,美空軍率先將「聯合全域作戰」寫入條令,探討空軍如何在「聯合全域作戰」中發揮作用。

俄軍提出「指控瓦解」概念。 「瓦解」是當前俄羅斯最重要的作戰概念之一,俄軍電子戰部隊把使敵人的訊息、指控、電子戰和機器人系統失效作為目標,認為這一目標將「決定所有軍事行動的命運」。擾亂敵方部隊和武器系統的指揮和控制,降低敵方偵察和使用武器的效率,是進行電子戰的首要任務。目前,俄軍正在考慮組建12種類型的電子戰部隊。俄軍也提出「非核武遏制體系」概念,核心是使用非核武進攻性戰略武器來遏制對手。其所定義的非核武攻擊性戰略武器既包括所有裝備非核彈頭的彈道飛彈,也包括戰略轟炸機和遠程空基、海基巡航飛彈。此外,俄軍也提出「混合戰爭」概念,希望利用人工智慧系統謀求戰場資訊優勢。

英國防部提出「多域融合」概念,將發展具備智慧化能力的新型指控系統,以實現全面、持久、準確、快速的戰場感知與力量協同。

注重技術研發

塑造智慧化戰爭作戰模式

人工智慧發揮效用的關鍵是與其他多種技術的組合,這種組合也被描述為「人工智慧堆疊」。各種技術透過互動的方式產生組合效應,進而提升每項技術所產生的能力與效果。在人工智慧技術支援的智慧化戰爭中,「人機一體、雲腦控制」的協同作戰模式,「混搭編組、群體智慧」的集群作戰模式,「智慧主導、攻智為上」的認知作戰模式等,將不斷更新人們對戰爭的認知。

聚焦創新專案研發。美軍正在大力推廣人工智慧晶片在現有武器裝備系統中的應用,為武器加上“智慧大腦”,使之具備類人思考和自主互動能力。 2021年10月,美海軍推出被視為“當前最高優先事項”的“超越計劃”,旨在通過構建海上作戰軍事物聯網,整合有人無人聯合編隊,加速交付人工智能和機器學習工具,支撐全新的智慧化海軍架構,提升大規模火力殺傷、實現海軍智慧化分散式作戰。此外,美國防高級研究計畫局也進行了「自適應電子戰行為學習」「自適應雷達對抗」「極端射頻頻譜條件下的通訊」等認知電子戰項目,研發出認知雷達電子戰系統原型機。俄國防部智慧技術裝備科研試驗中心與俄聯邦科學院控制問題研究所合作,開發測試了包括無人機群指揮控制在內的自主智慧演算法,也與國家航空系統科研所共同開發基於神經網路原理的物體自動辨識軟體系統。

組成創新研發機構。新技術的不斷湧現是軍事智慧化蓬勃發展的不竭動力,高水準的軍事智慧化建設離不開專職機構的技術研發。一些國家和軍隊組成研發中心,注重從技術層面創新發展。美國國防部建立了聯合人工智慧中心,計劃將該中心打造成國家級重點實驗室,用於領導數百個與人工智慧相關的項目,確保對人工智慧相關數據資訊的高效利用,以保持美國在該領域的技術優勢。俄羅斯組成了人工智慧和大數據聯盟、國家人工智慧中心和隸屬國防部的機器人技術科研試驗中心,主要進行人工智慧和資訊科技領域的理論和應用研究。法國成立了創新國防實驗室,英國設立了人工智慧實驗室,印度組成了人工智慧特別工作小組,進行相關技術探索。

加強裝備研發列裝。近年來,多國重視研發智慧武器裝備,無人飛行器、無人戰車、無人艦艇、無人潛航器等不斷湧現。目前,美空軍已開始在F-35戰機上實踐「人機協同,人在迴路」的作戰理念。美XQ-58A「女武神」隱身無人機先前主要與F-35和F-22戰機進行人機協同作戰,2021年4月該隱身無人機成功投放ALTIUS-600小型無人機系統,進一步提升了其有人無人協同作戰能力。俄羅斯正聚焦偵察監視、指揮決策、火力打擊、作戰支援等多個領域,展開智慧裝備研發和列裝工作,計畫到2025年將無人作戰系統在武器裝備中的比例提高到30%以上。以“天王星”系列和“平台-M”“阿爾戈”等型號為代表的俄地面無人作戰武器發展迅速。其中,Nerekhta無人戰車可搭載遙控機槍和火箭發射器,除擁有一般裝甲車的戰鬥力外,還兼具運輸和偵察功能。此外,日本自衛隊計劃在2035年正式部署具有較強作戰能力的無人空中編隊。

(作者單位:國防科技大學)

中國軍事資料來源:https://www.81.cn/jfjbmap/content/2022-03/17/content_311555.htm

How Chinese Military Will Achieve Precise Strikes in Cognitive Domain Operations

中國軍隊如何在認知域作戰中實現精準打擊

現代英語:

How to achieve precise strikes in cognitive domain operations

■Bu Jiang Jiang Rilie

introduction

Currently, driven by intelligent technology, cognitive domain operations are showing new characteristics such as precise perception, precise prediction and precise calculation. Studying and grasping the connotation mechanism of precision strikes in cognitive domain operations to ensure clear operational targets, personalized information generation, and precise information delivery will be more conducive to seizing the commanding heights and initiative in future cognitive domain operations.

Accurately establish combat goals

The establishment of operational goals is often the primary issue of concern in cognitive domain operations. With the continuous application of artificial intelligence, big data and other technologies, the party with a technological advantage is often able to quickly and efficiently collect cognitive data of different dimensions, levels and modalities, thereby discovering the weaknesses and sensitivities of the opponent’s cognitive system. point and detonation point.

Massive “data sources” refine target clarity. Today, as the Internet becomes more popular, cognitive data is growing exponentially. With the support of big data, psychometric and other technologies, target portraits are gradually evolving rapidly towards accurate portraits and intelligent portraits. According to foreign statistics, as of July 2022, the global Internet penetration rate reached 69%, and the Internet has become an essential platform for users’ daily lives. With the help of the Internet, both combatants can widely and quickly realize target object cognitive data collection and cognitive situation awareness, providing support for analyzing the target object’s political beliefs, values, national sentiments, public opinion positions, etc. It is reported that in foreign elections in recent years, foreign data analysis companies have captured social media user data, established character analysis models, accurately portrayed voters’ personalities and cognitive characteristics, and on this basis pushed suggestive campaigns to swing voters. advertising, thereby influencing their electoral decisions.

Dynamic “tag pool” improves target recognition rate. Labeling usually refers to the abstract classification and generalization of certain characteristics of a specific group or object. In cognitive domain operations, labeling is an important process to achieve classification and visualization of cognitive data. In the face of massive user data, establishing a mature and reliable label system is a prerequisite for sorting out, analyzing, and making good use of cognitive data. Using the label system to filter useless data and mine potential value information can provide information for presetting combat scenarios in the cognitive domain. Direct frame of reference. The development of the labeling system should be based on the logical starting point of cognitive domain operations, and ultimately comes down to the application of cognitive domain operations. For the target object, the transfer of interests, changes in personality, and changes in emotion are real-time and dynamic. The establishment of a “tag pool” can sense the cognitive dynamics of the target object in real time and accurately improve the target recognition rate.

Intelligent “algorithm library” shows target relevance. If data is compared to the “fuel” of cognitive domain operations, algorithms are the “engine” and an important source of power for cognitive precision strikes. In a certain sense, cognitive domain operations are “confrontation of data or algorithms.” Through intelligent algorithms, we can deeply mine the multi-dimensional correlation data of the target object’s behavior, build an accurate target portrait, and then combine it with machine learning algorithms to build a prediction model to automatically match and associate cognitive information with the target object, at the right time and at the right place. Deliver cognitive information in an appropriate manner to change the target object’s cognition. As analyzed by some foreign research institutions, with 10 likes, the algorithm can know you better than your colleagues; with 150 likes, the algorithm will know you better than your parents; with 300 likes, the algorithm will know you better than your closest partner you.

Accurately generate information “ammunition”

Designing information “ammunition” that conforms to the target’s thinking habits and perception style is the key to improving the cognitive domain killing effect. The development and application of intelligent science and technology provides a convenient means to achieve “private customization” of cognitive information themes, content and forms, making it possible to instantly and forcibly change the decisions and actions of target objects.

Information theme planning based on target value orientation. Cognitive information theme is the central idea represented by the information and the core of the information content. From legal advice, military deterrence, conflict and separation, and emotional summons, to moral guidance, war mobilization, behavioral instructions, and motivational incentives, different information themes exert different influences. Practice shows that the theme of cognitive information must be planned closely around the target object. According to the different value orientations shown by different combat stages and different target objects, the information theme must be optimized in a timely manner so that the information “ammunition” can satisfy the target object to the maximum extent. needs. According to the analysis of foreign research institutions, foreign election campaign advertisements in recent years are often inseparable from the support of big data. Accurately designing different advertising themes for voters with different values ​​​​can resonate with voters’ values.

Information content design based on target mindset. In the Internet era, the life trajectory, geographical location, hobbies, social relationships, etc. of the target object are all recorded on the Internet, making it possible to accurately create an “information cocoon” that caters to the target object’s way of thinking. Driven by big data technology, the interaction trajectories of target objects in the virtual world can also be easily captured, perceived and calculated. With the assistance of multimedia content intelligent generation systems, information similar to the target’s thinking habits can be generated in batches, causing the target to be trapped in an “information cocoon”. The scope of information acceptance narrows, and the perception of the outside world gradually decreases, and then falls into cognitive confusion. Know the trap. In recent years, many “color revolutions” that have occurred around the world are inseparable from the support of cognitive control. Some Western countries use “deep forgery” technology to instill false information in target objects that conforms to their way of thinking, creating anti-intellectual, The information environment stupefies the people, forming cognitive biases and inducing them to deny their own national and cultural values, thereby creating anti-government sentiments.

Information form selection based on target perceptual characteristics. Psychology believes that the formation and change of the cognitive subject’s attitude needs to go through three processes of “attention-understanding-acceptance”. Whether the target object can be affected by the dissemination of information, attracting attention is the first step. Information form is an important carrier to attract the attention of the target audience, and its form design is crucial to improving the acceptance, dissemination and infectivity of information “ammunition”. Through big data technology, we can mine the national emotions, customs and habits, religious beliefs, personal preferences and other characteristics of the target object, and scientifically judge the perceptual characteristics such as information receiving habits. On this basis, we can comprehensively use text, language, video, image and other information carriers to integrate Color, layout and other elements can cause strong stimulation to the target object’s senses. Since 2011, some Syrian anti-war activists have produced a number of anti-war propaganda short films from the perspectives of children and women and spread them on the international Internet, arousing strong responses from international public opinion. This internationally accepted information carrier meets the aesthetic needs of the public, avoids differential interpretation by the audience, and can often achieve unexpected results.

Accurately deliver information

Cognitive information delivery follows the laws of information dissemination. In order to achieve the effect of precise cognitive attack, it is necessary to deal with issues such as delivery objects, delivery channels, and delivery timing.

Extract cognitive features and filter information delivery objects. The profiling technology supported by big data makes it possible to extract the cognitive characteristics of target objects. Through the cognitive characteristic library, objects with similar characteristics can be screened out from groups of different races, different parties, different occupations, etc., thereby upgrading the traditional extensive screening method. , so that the information “ammunition” is more closely matched with the target object, thereby improving the pertinence and accuracy of cognitive attacks. In recent years, Cambridge Analytica has used machine learning methods to classify Facebook users according to five personality types: openness to experience, conscientiousness, extroversion, agreeableness, and emotional instability, and established a linear regression of the five personality traits. model to establish a “target” for precise delivery of campaign advertisements. This move has many implications for the world. In the future, cognitive domain operations, based on the extensive collection of users’ cognitive characteristics, will place more emphasis on accurately dividing groups, and carry out targeted campaigns based on the differences in values ​​and behavioral habits of different groups. information delivery and behavior prediction.

Follow social habits and match information delivery channels. The deep popularization of the Internet has brought about tremendous changes in the way information is disseminated, and the ways in which people receive information are becoming more diversified and diversified. According to data from foreign research institutions, there are currently more than 4.62 billion social media users worldwide, and social media platforms have become the main battlefield in the cognitive domain. In the many “color revolutions” that have occurred in recent years, social media such as Facebook, Twitter, and YouTube, controlled by Western countries, have played an important role in spreading public opinion, organizing protests, and mobilizing the public. It is reported that in similar operations, Facebook is often used to determine the schedule, Twitter is used to coordinate actions, and YouTube is used to spread the word widely. Future operations in the cognitive domain will place great emphasis on focusing on the target’s social habits and characteristics, fully understanding the target’s social circle and life circle, and selecting information delivery methods from multiple channels, including online and offline, military and civilian, to ensure the effectiveness of cognitive information. Delivery rate.

Track cognitive dynamics and accurately deliver information at the right time. Changes in cognition do not happen overnight. Blindly pursuing high rhythm and achieving goals in an instant will have the opposite effect. Therefore, cognitive domain operations must grasp the rhythm and intensity of “time immersion”, select the correct delivery time based on the cognitive dynamics of the target object, and gradually seek to expand the effect advantage. Before the target object has formed a preliminary understanding of a certain event, it is necessary to actively seize the priority of information release, carry out information “bombing” as soon as possible, and strive to “preemptively strike first.” In addition, during the public opinion fermentation stage of the incident, the subject’s cognition has not yet been completely solidified. At this time, by repeatedly disseminating a specific information, the purpose of subtly reconstructing the subject’s cognition can also be achieved.

(Author’s unit: National University of Defense Technology)

國語中文:

如何實現認知域作戰精準打擊

■卜江 蔣日烈

引言

目前,在智慧化技術的推動下,認知域作戰正呈現出精確感知、精確預測和精確計算等全新特徵。研究掌握好認知域作戰精準打擊的內涵機理,從而確保作戰目標清晰化、資訊生成個性化、資訊投射精準化,將更有利於奪取未來認知域作戰制高點和主動權。

精準確立戰目標

作戰目標的確立往往是認知域作戰關注的首要問題。隨著人工智慧、大數據等技術的不斷應用,佔據技術優勢的一方往往能夠快速、有效率地採集不同維度、不同層級、不同模態的認知數據,進而發現對手認知體系的薄弱點、敏感點和爆燃點。

海量「資料來源」細化目標清晰度。在網路深入普及的今天,認知數據正呈指數級增長,目標畫像在大數據、心理測量等技術的支撐下,正逐漸朝著精準畫像、智慧畫像的方向快速演進。根據國外統計數據顯示,截至2022年7月,全球互聯網滲透率達69%,互聯網已成為用戶日常生活的必備平台。借助互聯網,作戰雙方能夠廣泛快速地實現目標對象認知數據收集和認知態勢感知,為分析目標對象的政治信念、價值觀念、民族情感、輿論立場等提供支撐。據悉,在近年的國外大選中,國外數據分析公司就曾透過抓取社群媒體用戶數據,建立人物分析模型,精準刻畫選民性格、認知特徵,在此基礎上對搖擺選民推送暗示性競選廣告,從而影響其選舉決策。

動態「標簽池」提升目標辨識率。貼標簽通常是指對某一類特定群體或物件的某項特徵進行的抽象分類和概括。在認知域作戰中,貼標簽是實現認知資料分類與可視化的重要過程。面對海量的用戶數據,建立一套成熟可靠的標簽體係是梳理分析、用活用好認知數據的前提,利用標簽體系過濾無用數據,挖掘潛在價值信息,能夠為認知域作戰場景預設提供直接參考框架。標簽體系的開發要基於認知域作戰這個邏輯起點,最終歸結於認知域作戰應用。對於目標對象來講,興趣的遷移、性格的改變、情感的變化是即時動態的,建立「標簽池」能夠即時感知目標對象的認知動態,精準提升目標辨識率。

智慧“演算法庫”顯現目標關聯性。如果將數據比作認知域作戰的“燃料”,演算法則是“引擎”,是認知精準打擊的重要動力源。從一定意義上講,認知域作戰是「數據或演算法的對抗」。透過智慧演算法,可以深度挖掘目標對象行為的多維關聯數據,構建精準目標畫像,再結合機器學習演算法構建預測模型,將認知資訊與目標對象進行自動匹配關聯,在合適的時間、合適的地點,以合適的方式投送認知訊息,從而改變目標對象認知。正如國外一些研究機構分析發現,透過10個點贊,演算法可以比同事更了解你;150個點贊,演算法將比你父母更了解你;300個點贊,演算法將比最親密的伴侶更了解你。

精準生成資訊“彈藥”

設計符合目標對象思維習慣和感知風格的訊息“彈藥”,是提升認知域殺傷效果的關鍵所在。智慧科學技術的發展運用,為實現認知資訊主題、內容和形式的「私人客製化」提供了便捷手段,即時、強制地改變目標對象決策和行動成為可能。

基於目標價值取向的資訊主題策劃。認知資訊主題是資訊所表現的中心思想,是資訊內容的核心。從法理勸告、軍事威懾、矛盾離間、情感召喚,到義理引導、戰爭動員、行為指示、動機激勵,不同的訊息主題發揮不同的影響作用。實踐表明,認知訊息的主題必須緊緊圍繞目標對像做策劃,針對不同作戰階段、不同目標對象所表現出來的不同價值取向,及時優化信息主題,才能使信息“彈藥”最大限度地滿足目標對象的需求。根據國外研究機構分析,近年來的國外大選競選廣告背後往往離不開大數據的支撐,針對不同價值觀的選民精準設計不同廣告主題,可以引起選民價值共鳴。

基於目標思維方式的資訊內容設計。在互聯網時代,目標對象的生活軌跡、地理位置、興趣愛好、社交關係等都被網絡所記錄,精準打造迎合目標對象思維方式的「資訊繭房」成為可能。在大數據技術驅動下,目標對像在虛擬世界中的互動軌跡也很容易被捕捉、被感知和被計算。在多媒體內容智慧生成系統等輔助下,可大量產生與目標對象思維習慣類似的訊息,致使其陷於「訊息繭房」之中,訊息接受範圍變窄,對外界的感知度逐漸降低,進而陷入認知陷阱。近年來,全球發生的多起「顏色革命」背後都離不開認知控制的支撐,一些西方國家利用「深度偽造」技術,向目標對象灌輸符合其思維方式的虛假信息,製造反智化、愚民化資訊環境,形成認知偏差,誘導其否定自身民族文化價值理念,進而產生反政府情緒。

基於目標感知特性的資訊形式選擇。心理學認為,認知主體的態度的形成與改變需經過「注意力-了解-接受」三個過程,目標對象能否受到訊息傳播的影響,吸引註意是第一步。資訊形式作為引起目標對象注意的重要載體,其形式設計對提高訊息「彈藥」的接受度、傳播力、感染性至關重要。透過大數據技術可以挖掘目標對象民族情感、風俗習慣、宗教信仰、個人喜好等特徵,科學判斷訊息接受習慣等感知特性,在此基礎上綜合運用文本、語言、視頻、圖像等資訊載體,加以融入色彩、佈局等元素,可以給目標感官造成強烈刺激。自2011年以來,一些敘利亞反戰人士以兒童、婦女等視角,製作出多部反戰宣傳短片在國際互聯網上傳播,引起國際社會輿論強烈反響。這種國際通用的資訊載體,符合大眾審美需求,避免了受眾差異性解讀,往往能達到意想不到的效果。

精準實現資訊投送

認知訊息投送遵循資訊傳播規律,要達到認知精準打擊效果,需要處理好投送對象、投送管道、投送時機等問題。

提取認知特徵,篩選訊息傳遞對象。大數據支撐的畫像技術使提取目標對象認知特徵成為可能,透過認知特徵庫,可以從不同種族、不同黨派、不同職業等群體中篩選出具有相似特徵的對象,從而升級傳統的粗放篩選方式,讓資訊「彈藥」與目標對象更加匹配,從而提高認知攻擊的針對性和精準性。近年來,劍橋分析公司曾使用機器學習方法,依照經驗開放型、盡責型、外向型、親和型、情緒不穩定型五類人格對臉書用戶進行分類,建立了五種人格特質的線性回歸模型,為精準投送競選廣告立起「標靶」。此舉對世人的啟示是多方面的,未來認知域作戰,在廣泛蒐集用戶認知特徵的基礎上,將更加強調精準劃分群體,依據不同群體的價值觀念和行動習慣的差異,進行有目的地信息投送和行為預測。

遵循社交習慣,匹配資訊投送管道。互聯網的深度普及使資訊的傳播方式正發生巨大變革,人們接受資訊的方式更加多樣化、多元化。根據國外調研機構數據顯示,目前全球社群媒體用戶超過46.2億,社群媒體平台成為認知域作戰主戰場。在近年來發生的多起「顏色革命」中,臉書、推特、優兔等社群媒體在西方國家操縱下,在輿論傳播、組織抗議、動員民眾等方面發揮了重要作用。據悉,在類似行動中臉書往往用來確定日程,推特用來協調行動,優兔用來廣泛傳播。未來的認知域作戰,十分強調著眼目標對象社交習慣和特點,充分掌握目標對象的社交圈、生活圈,從線上線下、軍用民用等多渠道選擇信息投送方式,從而確保認知信息的送達率。

追蹤認知動態,把準資訊投送時機。認知的改變,並非一蹴而就,一味地追求高節奏、瞬間達成目的反而會起到反面效果。因此,認知域作戰要掌握好「時間沉浸」的節奏與力度,根據目標對象認知動態選準投送時間,逐步漸進地謀求擴大效果優勢。在目標對像對某一事件還未形成初步認知前,要積極搶佔信息的發布優先權,第一時間進行信息“轟炸”,力求“先發製人、先入為主”。此外,在事件的輿論發酵階段,主體的認知還未徹底固化,此時透過不斷重復傳播某個特定訊息,也可以達到潛移默化地重構主體認知的目的。

(作者單位:國防科技大學)

中國軍事資料來源:https://www.81.cn/yw_208727/16209631.html

How the Chinese Military Identify Key Targets for Cognitive Domain Operations

中國軍隊如何辨識認知域作戰的關鍵目標

現代英語:

Cognitive domain combat targets refer to the specific role of cognitive domain combat. In cognitive domain combat, compared with combat targets, combat targets solve the problem of precise aiming, that is, to let commanders understand and grasp the precise coordinates of what to hit, where to hit, and to what extent. Only by deeply understanding the connotation and characteristics of cognitive domain combat targets can we accurately find key targets through appearances and thus seize the initiative in future combat.

Cognitive focus that influences behavioral choices

The cognitive focus is the “convergence point” of the cognitive subject’s multi-dimensional thinking cognition in war activities. As a dynamic factor, it affects the cognitive process and behavioral results. Generally speaking, the cognitive factors that affect individual behavioral choices in war activities mainly include political attribute cognition, interest-related cognition, group belonging cognition, risk loss cognition, emotional orientation cognition, war morality cognition, etc. For war activities and groups or individuals who pay attention to war activities, the cognitive focus that affects their attitudes, tendencies and behaviors is not the same. Judging from the local wars and regional conflicts in the world in recent years, there are obvious differences in the cognitive focus of different groups or individuals. Politicians pay more attention to political attribute cognition and interest-related cognition, those who may intervene in the war pay more attention to risk loss cognition and interest-related cognition, ordinary people pay more attention to interest-related cognition and emotional orientation cognition, and people in other countries outside the region generally pay more attention to war morality cognition and group belonging cognition because their own interests will not be directly lost. In combat practice, foreign militaries are good at targeting the cognitive focus of different objects, accurately planning topics, and pushing related information to induce specific behavioral choices. For example, before the Gulf War, the Hill Norton public relations company fabricated the non-existent “incubator incident” by using Naira, the daughter of the Kuwaiti ambassador to the United States, as a “witness” to show the “inhumanity” of the Iraqi army, induce the American people’s ethical and moral cognition, and then support the US government to send troops to participate in the Gulf War.

Style preferences that constrain command decisions

Cognitive style directly affects decision-making behavior preferences. Cognitive style refers to the typical way of individual cognition, memory, thinking, and problem solving. According to the preference of command decision-making style, commanders can be divided into calm cognitive style and impulsive cognitive style. Commanders with calm cognitive style pay attention to accuracy but not speed in the decision-making process. The quality of the decisions they make is high, but they are prone to fall into the comparison and analysis of various intelligence information sources and overemphasize the accuracy and objectivity of information analysis. Commanders with calm cognitive style are often easily disturbed by the diverse and diverse information stimulation in battlefield cognitive offensive and defensive operations, and their mental energy is easily disturbed and dissipated, which may lead to missed opportunities. Commanders with impulsive cognitive style pay attention to speed but not accuracy. The decision-making reaction speed is fast, but the quality is not high. They are easily emotional and prone to conflict with team members. Commanders with impulsive cognitive style are also prone to over-interpret the ambiguous external security environment, and constantly look for “evidence” to strengthen and verify individual erroneous thinking, narrowing individual attention and leading to command decision-making deviations. In combat practice, foreign armies pay more attention to analyzing the decision-making style of commanders of combat opponents, and then select specific information to influence them psychologically. For example, during the U.S. invasion of Panama, when besieging the hiding place of Panamanian President Noriega, the U.S. military repeatedly played rock and heavy metal music, and used language that stimulated and humiliated Noriega to carry out cognitive and psychological attacks on him, causing Noriega to gradually collapse physically and mentally.

Backdoor channel to control thinking and cognition

Once a computer is infected with a “Trojan” virus, it will send a connection request to the hacker control terminal at a specific time. Once the connection is successful, a backdoor channel will be formed, allowing the hacker to control the computer at will. Similarly, the human brain also has a cognitive “backdoor” and may be controlled by others. Cognitive psychologists have found that by sending information to the target object’s audio-visual perception channel, carefully pushing information content that the target object recognizes and accepts, catering to the target object’s existing experience memory, conforming to the target object’s thinking habits, and stimulating the target object’s emotional pain points, it is possible to control and interfere with the target object’s cognition and promote its instinctive emotional and behavioral reactions. With the support of cutting-edge cognitive science and technology, using the two modes of automatic start and control processing of brain information processing, the target object can easily fall into a “cognitive cocoon”. In cognitive domain operations, by immersing individuals in massive amounts of artificially constructed information, and continuously providing them with “evidence” to prove that their judgments and cognitions are “correct”. Over time, the individual’s cognitive vision becomes smaller and smaller, and the ability to perceive the external environment gradually decreases. Eventually, they will not be able to see the truth of the matter and will be immersed in the “cognitive cocoon” and unable to extricate themselves. When foreign militaries conduct operations in the cognitive domain, they often target their opponents’ cognitive biases on a certain issue and continuously push situational information and intelligence information through various channels to support their opponents’ so-called “correct cognition,” causing errors and deviations in their opponents’ command decisions.

Sensory stimuli that induce attention

Effective perceptual stimulation is the first prerequisite for attracting the attention of the target object. The human brain will perceive and react to stimuli within the perceptual range. Cognitive psychology experimental research has found that information such as dynamic, dangerous, relevant, survival safety, and contrast between before and after is more likely to attract the attention of the human brain. In the era of intelligence, the psychological cognitive process of the target object often follows the law of “attracting attention, cultivating interest, actively searching, strengthening memory, actively sharing, and influencing others”. In combat, foreign troops often use exclusive revelations, intelligence leaks, authoritative disclosures, on-site connections, and other methods, and cleverly use exaggeration, contrast, association, metaphor, suspense, and contrast to push information that subverts common sense, cognitive conflicts, and strong contrasts to attract the attention of the target object. For example, the “Lin Qi rescue incident” created by the US military in the Iraq War and the “Gaddafi Golden Toilet” in the Libyan War mostly choose stories familiar to the audience as the blueprint, hiding the purpose and embedding the viewpoint in the story plot, which attracted the attention of the general public. In addition, the human brain will also process stimuli outside the perceptual range. In recent years, the military of Western countries has attached great importance to the research of subthreshold information stimulation technology, and has developed subthreshold visual information implantation technology, subthreshold auditory information implantation technology, subthreshold information activation technology, subconscious sound manipulation technology of the nervous system, etc., continuously expanding the application scope of neurocognitive science and technology in the military field.

Meta-value concepts that give rise to cognitive resonance

In cognitive theory, cognitive resonance refers to information that can cross the cognitive gap between the two parties and trigger the ideological and psychological resonance and cognitive empathy of both parties, thereby achieving the deconstruction and reconstruction of the other party’s cognitive system. In cognitive domain warfare, this cognitive energy-gathering effect is not a simple concentration of power, but an internal accumulation of system synergy. Under the diffusion and dissemination of modern information media, this cognitive resonance effect can spread rapidly to all parts of the world in a short period of time, and produce secondary indirect psychological effects or more levels of derivative psychological effects, presenting a state of cumulative iteration. Once it exceeds the psychological critical point, it will present a state of psychological energy explosion, thereby changing the direction or outcome of the event. The targets that can induce this cognitive resonance are mainly value beliefs, moral ethics, common interests, etc. In war, if one party touches or violates human meta-values, common emotional orientation, etc., it is very easy to induce collective condemnation, bear the accusation of violating human morality, and fall into a moral trough. For example, a photo during the Vietnam War shows a group of Vietnamese children, especially a 9-year-old girl, running naked on the road because of burns after being attacked by US napalm bombs. In 1972, this photo caused a huge sensation after it was published, setting off an anti-war wave in the United States and even the world, and accelerating the end of the Vietnam War.

Cognitive gaps in a split cognitive system

In daily life, seemingly hard steel is very easy to break due to the brittleness of the material due to factors such as low temperature environment, material defects, and stress concentration. The same is true for the cognitive system. Cognitive gaps refer to the cracks, pain points, weaknesses, and sensitive points in the cognitive thinking of the target object, which are mainly manifested as the individual’s worry that he is unable to cope with or adapt to the environment, and under the influence of anxiety, cognitive vulnerability is formed. The experience of security threats, the looseness of group structure, the confusion of beliefs and ideals, and the loss of voice of authoritative media will all cause cognitive conflicts and tearing of the target object. In cognitive domain operations, sometimes seemingly powerful combat opponents hide a large number of thinking cracks and psychological weaknesses behind them. Often a news event can shake the cognitive framework of the combat opponent and puncture the cognitive bubble. In addition, this cognitive psychological conflict will also cause moral damage and psychological trauma to individuals. In recent years, the U.S. and Western countries’ troops carrying out overseas missions have faced “enemies disguised as civilians” that appear anytime and anywhere, and their uncertainty about the battlefield environment has continued to increase. They generally lack the perception of the significance of combat, and are filled with guilt and sin. A large number of soldiers developed post-traumatic stress disorder, the number of self-harm on the battlefield, post-war suicides and crimes increased sharply, and the number of suicides among veterans of the war even exceeded the number of deaths on the battlefield.

(Author’s unit: Political Science Academy of National Defense University)

國語中文:

引言

認知域作戰標靶是指認知域作戰的具體作用指向。在認知域作戰中,相較於作戰對象,作戰標靶解決的問題是精確瞄準,也就是讓指揮官了解掌握具體打什麼、往哪裡打、打到什麼程度的精準座標問題。只有深刻理解認知域作戰標靶的內涵特點,才能透過表象準確找到關鍵標靶,以便在未來作戰中掌握先機。

影響行為選擇的認知重心

認知重心是戰爭活動中認知主體多元思維認知的“匯聚點”,作為一種能動因素影響認知進程和行為結果。一般而言,影響戰爭活動中個人行為選擇的認知因素,主要包含政治屬性認知、利益關聯認知、群體歸屬認知、風險損失認知、情緒定向認知、戰爭道德認知等。對於戰爭活動以及關注戰爭活動的群體或個體而言,影響其態度、傾向和行為的認知重心並不相同。從近年來的世界局部戰爭和地區衝突來看,不同群體或個體關注的認知重心有著明顯差異,政治人物更加關注政治屬性認知和利益關聯認知,戰爭可能介入者更關注風險損耗認知和利益關聯認知,一般民眾更關注利益關聯認知和情感定向認知,而域外他國民眾由於自身利益不會受到直接損失,普遍更關注戰爭道德認知和群體歸屬認知。外軍在作戰實踐中,善於針對不同對象的認知重心,精準策劃主題,推送關聯訊息,誘發特定的行為選擇。如同在海灣戰爭前,希爾·諾頓公關公司炮製了根本不存在的“育嬰箱事件”,就是利用科威特駐美大使的女兒娜伊拉“做證”,展現伊拉克軍隊的“慘無人道”,誘發美國民眾的倫理道德認知,進而支持美國政府派兵參加海灣戰爭。

制約指揮決策的風格偏好

認知風格直接影響決策行為偏好。認知風格是指個體認知、記憶、思考、解決問題的典型方式。根據指揮決策風格偏好,指揮家可以分為冷靜型認知風格和衝動型認知風格。冷靜型認知風格的指揮者在決策過程中重視準確但不重視速度,作出的決策品質較高,但容易陷入對各類情報資訊來源的比對分析,過度強調資訊分析的準確客觀。冷靜型認知風格的指揮在戰場認知攻防行動中,常常容易受到紛繁多元的信息刺激幹擾,心智精力容易被擾亂和耗散,進而可能貽誤戰機。衝動型認知風格的指揮者重視速度但不重視準確度,作出的決策反應速度較快,但品質不高,且容易情緒激動,易與團隊成員發生衝突。衝動型認知風格的指揮者也容易將模稜兩可的外在安全環境進行過度曲解,並不斷尋找「證據」強化和驗證個體錯誤思維,使個體注意力變窄,導致出現指揮決策偏差。外軍在作戰實務中,比較著重分析作戰對手指揮官決策風格,進而選擇特定資訊對其進行心理影響。如美軍入侵巴拿馬戰爭中,在圍攻巴拿馬總統諾列加躲藏處時,美軍反複播放搖滾和重金屬音樂,運用刺激和羞辱諾列加的語言對其進行認知打擊和心理進攻,使諾列加身心逐漸崩潰。

控制思維認知的後門通道

電腦一旦中了「木馬」病毒,會在特定時間向駭客控制端發送連線請求,一旦連線成功就會形成後門通道,使得駭客可以隨心所欲地控制電腦。與之相似,人類大腦也存在認知“後門”,也可能被他人控制。認知心理學家研究發現,透過給目標對象視聽感知通道發送訊息,精心推送目標對象認可的、接受的信息內容,迎合目標對像已有的經驗記憶,順應目標對象思維習慣,刺激目標對象的情感痛點,就可以控制干擾目標物認知,促進其產生本能情緒行為反應。在尖端認知科學技術的支撐下,運用大腦資訊加工的自動啟動和控制加工兩種模式,目標物很容易陷入「認知繭房」之中。認知域作戰中,透過讓個體沉浸在人為構設的海量資訊之中,並源源不斷地為其提供「證據」用來佐證其判斷和認知是「正確」的。長此以往,個體的認知視野就變得越來越小,對外在環境的感知能力逐漸降低,最終會看不到事情的真相,沉湎於「認知繭房」中無法自拔。外軍在認知域作戰中,常常針對作戰對手對某一問題的認知偏差,持續透過多種管道推送佐證作戰對手自以為「正確認知」的態勢訊息和情報訊息,使作戰對手指揮決策出現失誤和偏差。

誘發關注的感知覺刺激

有效的知覺刺激是引發目標對象關注的首要前提。人類大腦對感知覺範圍內的刺激會有所察覺,並做出各種反應。認知心理學實驗研究發現,動態、危險、利害關係人、生存安全、前後反差等類別資訊更容易引起人類大腦的注意。在智慧化時代,目標對象的心理認知過程往往遵循「引起注意、培養興趣、主動搜尋、強化記憶、主動分享、影響他人」的規律。外軍在作戰中,常運用獨家爆料、情報外洩、權威揭露、現場連線等方式,巧用誇張、對比、聯想、比喻、懸念、襯託等手法,推播顛覆常識、認知衝突、對比強烈等訊息,來引發目標對象注意。例如伊拉克戰爭中美軍塑造的“營救女兵林奇事件”,利比亞戰爭中的“卡扎菲黃金馬桶”,大多選擇受眾對象熟知的故事為藍本,藏目的、寓觀點於故事情節,吸引了廣大民眾的注意力。此外,人類大腦也會對感知覺範圍外的刺激進行加工。近年來,西方國家軍隊非常重視知覺閾下資訊刺激技術的研究,開發發展了閾下視覺訊息植入技術、閾下聽覺訊息植入技術、閾下訊息啟動技術、神經系統潛意識聲音操控技術等,不斷擴大神經認知科學技術在軍事領域的應用範圍。

催生認知共振的後設價值概念

認知理論中,認知共振是指跨越雙方認知鴻溝,能夠引發雙方思想心理與認知共鳴共感的訊息,進而實現對對方認知體系的解構與重建。在認知域作戰中,這種認知聚能效應不是簡單意義上的力量集中,而是體系合力的內在累積。在現代資訊傳媒的擴散傳播作用下,這種認知共振效應能在短時間內迅速擴散到全球各地,並產生二次間接心理效應或更多層次的衍生心理效應,呈現出一種累積迭代的狀態,一旦超過心理臨界點,即呈現出心理能量爆發狀態,從而改變事件走向或結果。能夠誘發這種認知共振的靶標,主要有價值信念、道德倫理、共通利益等。戰爭中,若某一方觸及或違反人類元價值觀、共同情感指向等,則極易誘發集體聲討,承擔違背人類道德的指責,陷於道義低谷。如越戰期間的一張照片,畫面呈現的是遭遇美軍凝固汽油彈襲擊後,一群越南孩子特別是一名9歲女孩在公路上因為燒傷而裸體奔跑。 1972年,這張照片刊登後引發巨大轟動,掀起美國乃至全球的反戰浪潮,加速了越戰的結束。

分裂認知體系的認知縫隙

日常生活中,看似堅硬的鋼鐵,受低溫環境、材質缺陷、應力集中等因素影響,非常容易因材料脆性而斷裂,認知體係也是如此。認知縫隙是指目標對象認知思考中的裂縫、痛點、弱點與敏感點,主要表現為個體擔心自己沒有能力應對或無法適應環境的想法,並在焦慮情緒的作用下,構成認知脆弱性。安全威脅的經驗、團體結構的鬆散、信念理想的迷惘、權威媒介的失聲等,都會使得目標物出現認知上的衝突與撕裂。認知域作戰中,有時看似強大的作戰對手,背後卻潛藏著大量的思維裂隙與心理弱點,往往一個新聞事件就能動搖作戰對手的認知框架,刺破認知泡沫。此外,這種認知心理衝突也會使個體產生道德損傷和心理創傷。近年來,執行海外任務的美西方國家軍隊面對隨時隨地出現的“偽裝成平民的敵人”,對戰場環境的不確定感不斷提升,普遍缺乏作戰意義感知,進而內心充滿內疚與罪惡。大量士兵產生戰爭創傷後壓力障礙,戰場自殘自傷、戰後自殺與犯罪人數激增,參戰老兵自殺人數甚至超過戰場死亡人數。

(作者單位:國防大學政治學院)唐國東

中國軍網 國防部網 // 2023年3月23日 星期四

中國原創軍事資源:https://www.81.cn/jfjbmap/content/2023-03/23/content_336888.htm

Chinese Military Dissipative Warfare: a Typical Form of Intelligent Warfare

中國軍事耗散戰:智慧戰爭的典型形式

現代英語:

With the rapid development of intelligent technology and its widespread application in the military, intelligent warfare is becoming a new form of warfare after information warfare, and dissipative warfare has become a typical form of intelligent warfare. The so-called dissipative warfare refers to the combat method in which the intelligent warfare system achieves comprehensive combat power by integrating material consumption, energy release and information diffusion through internal enrichment and integration and external mutation emergence. Strengthening the research on dissipative warfare will help us to deeply reveal the winning mechanism of intelligent warfare and win the initiative in future war games.

Dissipative warfare is the inevitable result of the development of the times

Dissipative warfare is manifested in the comprehensive confrontation of the physical, information and cognitive domains in the intelligent era. It is embodied in the highly unified forms of political contest, economic competition, military offense and defense, cultural conflict and diplomatic checks and balances, reflecting the openness, complexity and emergence of the intelligent warfare system.

Adapt to the security situation requirements of the intelligent era. Entering the intelligent era, technologies such as broadband networks, big data, big models, cloud computing, and deep learning are developing rapidly, and the connections between political groups, countries, and nations are becoming more extensive. Under the influence of multiple factors such as political pluralism, economic integration, social openness, and technological revolution, non-traditional security has emerged and intertwined with traditional threats. The subjects and scope of intelligent warfare are constantly expanding, the time and space of war are constantly extending, and war and peace are inseparable and intertwined. The war system will further transcend local regional restrictions, from relative closure to greater openness, forming a higher level and larger range of confrontation. Dissipative warfare emphasizes the comprehensive efforts of the intelligent warfare system in the physical domain, information domain, and cognitive domain, and highly unifies the forms of political competition, economic competition, military offense and defense, cultural conflict, and diplomatic checks and balances and incorporates them into the category of enemy-us confrontation, adapting to the requirements of the times for the development of the world security situation.

This is in line with the objective law of the evolution of war forms. The dissipation phenomenon of the war system has always existed since the emergence of war. However, before the emergence of intelligent war forms, due to technological constraints, it has always been in a relatively low-level and simple state. War confrontation can only be manifested in one of the forms of material consumption, energy dissipation and information diffusion. In the agricultural era, the form of war was mainly manifested as a cold weapon war dominated by material elements and centered on the human body. In the industrial era, the form of war was mainly manifested as thermonuclear weapons and mechanized war dominated by energy elements and centered on platforms. In the information age, the form of war is mainly manifested as an information war dominated by information elements and centered on the network security system. Entering the intelligent era, intelligent technology highly unifies the cognitive advantages, decision-making advantages and action advantages in the confrontation between the enemy and us. In essence, it highly unifies the three elements of matter, energy and information. Through empowering, gathering and releasing energy with intelligence, an intelligent war form dominated by intelligent elements and centered on intelligent algorithms has been formed. The main form of expression is the dissipative war that reflects the confrontation of the complex system of intelligent warfare.

It has a solid philosophical theoretical foundation. The social form is the mother of the war form. To explore and understand intelligent warfare, we must base ourselves on the basic principles of historical materialism and dialectical materialism, comprehensively examine the evolution of the war form and the social form in which intelligent warfare is located, and construct a new war concept and context system. From a philosophical perspective, matter, energy and information are the three major elements that constitute the world. Matter embodies the existence of the origin, energy embodies the existence of movement, and information embodies the existence of connection. The three progressively and alternately dominate the evolution and operation of social and war forms. According to the principle of negation of negation of dialectical materialism, in the intelligent age after the information age, the dominant element of society will be matter again after matter, energy and information. However, this material is a new type of material formed after a spiral rise after high informatization, and its main feature is that it has intelligent technology attributes. Therefore, in essence, dissipative warfare is the intelligent element that highly unifies the characteristics and advantages of matter, energy and information in the previous low-level war form, and highly unifies the forms of material consumption, energy release and information diffusion that are prevalent in war, reflecting the typical characteristics of intelligent warfare.

Deeply grasp the inherent meaning of dissipative warfare

Dissipative warfare is based on the real world and covers the virtual world. It adapts to the rapid development of intelligent technology, the rise of non-traditional security threats, and the continuous expansion of the subjects and scope of war, and presents many new characteristics.

Comprehensive game of confrontation. As the intelligent war form accelerates to a higher depth and breadth, the interconnection and influence of political, economic, cultural, diplomatic and other fields are more extensive, and the focus of war begins to shift from the military system to the social system. The confrontation of war stakeholders will be reflected in various forms of comprehensive games such as political competition, economic competition, military offense and defense, cultural conflict and diplomatic checks and balances. The war advantage pursued is no longer limited to the field of military confrontation. The winner of the war must adapt to the openness, complexity and emergence requirements of the war system, and transform from the extensive consumption and use of single materials, energy and information to the dissipation of the war system dominated by intelligent advantages, and strive to gain initiative and advantage in the comprehensive game in multiple fields.

The subjects are cross-domain and diversified. The subjects of intelligent warfare are becoming more and more generalized, and the potential forces of war that need to be mobilized in traditional warfare will be in a state of normalized confrontation. Political forces, various institutions and personnel, together with the troops and soldiers fighting on the battlefield in the traditional sense, constitute the subjects of war. Diversified war subjects will cross the real domain and the virtual domain, appear in multiple spatial domains such as land, sea, air, space, electricity, and psychology, covering the physical domain, information domain, cognitive domain, etc., covering multiple social domains such as politics, economy, culture, and diplomacy. For example, civilians can use smartphones to collect information on the military battlefield and pass it on to war stakeholders, resulting in the spread of key information about the war, which in turn affects war decisions or the victory or defeat of a campaign or battle.

Forces are integrated and enriched. Virtual forces are integrated. Focusing on the purpose of war, all possible real forces and virtual forces will be integrated with the support of intelligent technology, and perform their duties and act according to regulations on parallel battlefields; unmanned forces are integrated. After going through the stages of manual operation, manual authorization, and manual supervision, unmanned combat forces will achieve a high degree of autonomy, and can be deployed and combined with various manned forces on demand, and effectively coordinate and coexist in parallel under the constraints of common war rules; multiple forces are integrated. Based on the extensive connections in various fields and the common purpose of the war system, the forces of the party, government, military, police, and civilians will closely coordinate military operations with political, economic, diplomatic, public opinion, and legal struggles, and unify their actions to form comprehensive combat power. In short, under the integrated planning of the country or political group, although the multiple participating forces of intelligent warfare are physically dispersed, they can achieve logical concentration, immediate enrichment, complementary advantages, and integrated excellence around the common purpose of war.

Effectiveness accumulates and emerges. While the high-level war form has new technical characteristics, it still includes the characteristic advantages of the low-level war form. Dissipative warfare emphasizes continuous comprehensive confrontation in multiple domains, which includes the consumption of ammunition, supplies, equipment and even combatants at the material level, as well as the continuous collection and release of energy, and the diffusion and integration of data, knowledge, algorithms, etc. at the information level, which has an unlimited impact on people’s thinking cognition, value pursuit, moral concepts, emotional will, and behavior patterns. Under the normal deterrence of nuclear weapons, intelligent warfare shows a decrease in bloodiness, but political isolation, economic blockade, cultural conflict, diplomatic strangulation, etc. will become more severe and intense. When the military, political, economic, cultural, diplomatic and other systems continue to play their roles and the effectiveness accumulation reaches a certain level, the war system will increase negative entropy, thereby achieving a sudden change in combat power and the emergence of system effectiveness, thereby gaining a war advantage.

Fighting a Dissipative War by Choosing the Right Combat Focus

The intelligent warfare system achieves maximum system combat effectiveness through internal enrichment and integration, external mutation, cross-domain efficiency enhancement, and intelligent dissipation, which is the winning mechanism contained in dissipative warfare. To win in intelligent warfare, it is necessary to clarify the operational focus of dissipative warfare, target the shortcomings and weaknesses of the opponent’s system, and find the focus of war preparation.

Focus on the openness of the system and isolate the opponent’s war system. Cut off the material, energy and information exchange between the opponent’s war system and the external battlefield environment, so that it lacks material, energy and information sources, and gradually moves towards an isolated, closed and weak state. For example, at the strategic level, political isolation is used to isolate the opponent’s war system, causing the system’s entropy to increase. At the campaign level, methods such as cutting off data sources, destroying data backups, falsifying data, and tampering with information can be used to force its war system to transform into a closed state, thereby reducing the effectiveness of the opponent’s system.

Focusing on the complexity of the system, the opponent’s war system is destroyed in different domains. The more connections and the closer the degree of connection between the elements of the intelligent war system, the lower the reliability of the system structure. By using the principle of relative independence of each layer in a complex system, we can formulate strategic overall, local and tactical action strategies to achieve layered and domain-based destruction of the enemy’s war system. For example, at the strategic level, the economic blockade is adopted to greatly weaken the opponent’s war strength and development potential. At the campaign level, the vulnerability of the combat system communication network is utilized, and the network-electric composite attack is used as the basic path and means. The methods of “destroying the end, attacking the element, isolating the group, disconnecting the network, and breaking the cloud” are adopted to destroy the opponent’s combat system structure and cause the opponent’s war system to “collapse”.

Focus on system emergence and dismantle and disperse the opponent’s war system. Only when the intelligent war system has mutation and emergence effects can it quickly form and exert system effectiveness and gain dissipative warfare advantages. If only a single component or element plays a role, it is impossible to form an advantage. It can be foreseen that the currently emerging technologies such as ChatGPT and more advanced intelligent technologies in the future will provide a new way of thinking to understand and discover the operating behavior, state and laws of complex war systems, as well as new means to explore objective laws and transform nature and society. The party with the advantage in war confrontation will reduce the coupling degree of the opponent’s war system through a combination of virtual and real, parallel and integrated confrontation methods, and achieve the purpose of dismantling and dismantling the enemy’s war system.

國語中文:

耗散戰:智慧化戰爭典型方式
王榮輝
引 言
隨著智慧化技術快速發展及在軍事上的廣泛應用,智慧化戰爭正成為資訊化戰爭後的新戰爭形態,而耗散戰則成為智慧化戰爭的典型方式。所謂耗散戰,是指智慧化戰爭體系透過對內富聚融合,對外突變湧現,達成集物質消耗、能量釋散和資訊擴散於一體的綜合戰力的作戰方式。加強耗散戰研究,有利於我們深入揭示智慧化戰爭制勝機理,贏得未來戰爭賽局主動權。
耗散戰是時代發展的必然結果
耗散戰表現在智慧化時代中物理域、資訊域和認知域的綜合對抗,體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式的高度統一,反映了智慧化戰爭體系所具有的開放性、複雜性和湧現性。
適應智慧化時代的安全情勢要求。進入智慧化時代,寬網路、大數據、大模型、雲端運算、深度學習等技術快速發展,各政治集團、國家、民族之間的聯繫更加廣泛。在政治多元、經濟交融、社會開放、科技革命等多重因素作用下,非傳統安全興起並與傳統威脅交織,智慧化戰爭主體與範疇不斷拓展,戰爭時間與空間不斷外延,戰爭與和平如影相隨並交織一體,戰爭體系將進一步超越局部地域限制,從相對封閉走向更開放,形成更高層次和更大範圍的對抗。耗散戰強調智慧化戰爭體系在物理域、資訊域和認知域的綜合發力,把政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式高度統一併納入敵我對抗範疇,適應了世界安全情勢發展的時代要求。
符合戰爭形態演變的客觀法則。戰爭體系的耗散現象自戰爭產生以來便始終存在,只不過在智能化戰爭形態出現之前,由於技術的製約,一直處於較為低級的、簡單的狀態,戰爭對抗僅能表現為物質消耗、能量釋散和訊息擴散中的某一種形式。農業時代,戰爭形態主要表現為以物質要素為主導的、以人體為中心的冷兵器戰爭。工業化時代,戰爭形態主要表現為以能量要素為主導的、以平台為中心的熱核兵器和機械化戰爭。在資訊化時代,戰爭形態主要表現為以資訊要素為主導的、以網信體系為中心的資訊化戰爭。進入智慧化時代,智慧化科技將敵我對抗中的認知優勢、決策優勢和行動優勢高度統一起來,實質是將物質、能量和資訊三者高度統一,透過以智賦能、以智聚能、以智釋能,形成了以智慧要素為主導的、以智慧演算法為中心的智慧化戰爭形態,主要表現形式即為反映智慧化戰爭複雜體系對抗的耗散戰。
具有堅實的哲學理論基礎支撐。社會形態是戰爭形態的母體,探索和認識智能化戰爭,必須基於歷史唯物主義和辯證唯物主義的基本原理,綜合考察戰爭形態的演進和智能化戰爭所處的社會形態,構建新的戰爭概念和語境體系。從哲學角度看,物質、能量和資訊是構成世界的三大要素,物質體現本源的存在,能量體現運動的存在,訊息則體現聯繫的存在,三者遞進交替主導著社會形態和戰爭形態的演進和運行。依照辯證唯物論的否定之否定原理,在資訊時代之後的智慧時代,主導社會的要素將繼物質、能量、資訊後再次輪到物質,只不過這個物質是高度資訊化後螺旋式上升後形成的新型物質,其主要特徵就是具有了智慧化技術屬性。因此,從本質上講,耗散戰是智慧要素將以前低階戰爭形態中物質、能量和資訊的特性優勢高度統一起來,將戰爭中普遍存在的物質消耗、能量釋散和資訊擴散等形式高度統一起來,反映了智慧化戰爭的典型特徵。
深刻把握耗散戰的內在要義
耗散戰基於現實世界、涵蓋虛擬世界,適應了智慧化技術快速發展、非傳統安全威脅興起、戰爭主體和範疇不斷拓展的趨勢,呈現出許多新特性。
對抗綜合博弈。隨著智慧化戰爭形態加速向更高深度和廣度發展,政治、經濟、文化、外交等領域相互聯繫和影響更具廣泛性,戰爭重心開始從軍事系統向社會系統偏移,戰爭利益攸關方的對抗將體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等多種形式的綜合博弈,追求的戰爭優勢不再只限於軍事對抗領域。戰爭制勝方必須適應戰爭體系的開放性、複雜性和湧現性要求,從單一物質、能量和資訊的粗放式消耗和運用轉變到以智慧優勢主導戰爭體系的耗散,力爭在多領域的綜合博弈中贏得主動和優勢。
主體跨域多元。智慧化戰爭的主體日益泛化,傳統戰爭需要動員的戰爭潛在力量將處於常態化對抗狀態。政治力量、各類機構和人員與傳統意義上在戰場廝殺的部隊和軍人一起構成戰爭的主體。多元化戰爭主體將跨越現實域和虛擬域,出現在陸、海、空、天、電、心理等多個空間域,涵蓋物理域、資訊域、認知域等,涵蓋政治、經濟、文化、外交等多類社會域。如社會平民可以用智慧型手機收集軍事戰場上的信息並傳遞給戰爭利益攸關方,造成對戰爭關鍵訊息的擴散,進而影響戰爭決策或一場戰役和戰鬥的勝敗。
力量一體富聚。虛實力量一體。圍繞著戰爭目的,一切可能運用的現實力量和虛擬力量將在智能化技術支撐下實現一體化,在平行戰場上按職履責、按規行動;有無力量一體。無人作戰力量將在經歷人工操作、人工授權、人為監督階段後,實現高度的自主性,並可與各類有人力量按需部署、按需組合,在共同的戰爭規則約束下有效協同、並行共生;多方力量一體。基於各領域的廣泛聯繫和戰爭體系的共同目的,黨政軍警民等各方力量將軍事行動與政治、經濟、外交、輿論、法理鬥爭密切配合、統一行動,形成綜合戰力。總之,在國家或政治集團的一體籌劃下,智慧化戰爭的多元參戰力量雖然物理分散,但能夠圍繞共同的戰爭目的,實現邏輯集中、即時富聚,優勢互補、一體聚優。
效能累積湧現。高階戰爭形態在具有新質技術特徵的同時,仍涵括低階戰爭形態的特徵優勢。耗散戰強調在多域持續進行綜合對抗,這既包括物質層面的彈藥、物資、器材甚至作戰人員的消耗,也包括能量層面的不斷匯集和釋放,更包括透過資訊層面的數據、知識、演算法等的擴散與融合,對人的思考認知、價值追求、道德觀念、情感意志、行為模式等產生不可限制的影響。在核武的常態嚇阻下,智慧化戰爭呈現出血腥味下降,但政治孤立、經濟封鎖、文化衝突、外交扼殺等將更加嚴峻激烈的局面。當軍事、政治、經濟、文化、外交等各系統角色持續發揮,效能累積達到某一程度,戰爭體係就會增加負熵,進而實現戰力突變和體系效能湧現,從而獲得戰爭優勢。
在選準作戰重心中打好耗散戰
智慧化戰爭體系透過對內富聚融合,對外突變湧現,跨域增效、以智耗散,達成體係作戰效能最大化,這是耗散戰蘊含的製勝機理。要在智慧化戰爭中贏得勝勢,必須明確耗散戰的作戰重心,針對對手體系短板弱點,找準戰爭準備的發力點。
著眼體系開放性,封閉孤立對手戰爭體系。截斷對手戰爭體系與外在戰場環境的物質、能量和資訊交流,使之缺乏物質、能量和資訊來源管道,逐漸走向孤立、封閉和虛弱狀態。如在戰略層面,採取政治孤立的方式,使對手戰爭體系處於孤立狀態,造成體系熵增。在戰役層面,可利用切斷資料來源、毀滅資料備份、資料作假、竄改資訊等方法,綜合採用軟硬手段,迫其戰爭體係向封閉狀態轉化,進而降低對方體系效能。
著眼體系複雜性,分域破擊對手戰爭體系。智慧化戰爭體係要素間連結越多、連結程度越緊密,體系結構可靠性就越低。運用複雜系統中各分層相對獨立的原理,可製訂戰略全局、戰役局部和戰術行動策略,實現對敵戰爭體系的分層分域破擊。如在戰略層面,採用經濟封鎖的方式,大大削弱對手的戰爭實力和發展潛力。在戰役層面,利用作戰系統通訊網路的脆弱性,以網電複合攻擊為基本路徑與手段,採用「毀端、擊元、孤群、斷網、破雲」等方式,破擊對方作戰系統結構,促使對方戰爭體系「坍塌」。
著眼體系湧現性,拆解疏散對手戰爭體系。智慧化戰爭體系只有出現突變和湧現效應,才能快速形成發揮體系效能,獲得耗散戰優勢。如果只是單一組分或要素發揮作用,不可能形成優勢湧現。可以預見,當前興起的ChatGPT等技術以及未來更高級的智慧化技術,將提供理解和發現戰爭複雜體系運作行為、狀態和規律的全新思維方式,以及探知客觀規律、改造自然和社會的新手段,戰爭對抗優勢方將透過虛實結合、平行一體的對抗方式,降低對手戰爭體系的耦合度,達成拆解疏散敵戰爭體系的目的。

中國軍事資源:https//www.81it.com/2023/0509/14288.html

2023-05-09 11:48:56來源:中國軍網-解放軍報

People’s Liberation Army Looking ahead to the “Battlefield Metaverse”

解放軍展望“戰場元宇宙”

現代英語:

Recently, the “metaverse” has become a hot topic of concern. On November 26 last year, this edition published an article titled “Unveiling the Veil of the Metaverse”, which mentioned the concept of the “battlefield metaverse”.

Simply put, the “metaverse” will be the ultimate form of the next generation of the Internet. It is a virtual world that is parallel and isomorphic to the real world, with main features such as multi-dimensionality, full sensory perception, virtual-real integration, and seamless interaction. The “battlefield metaverse” is the manifestation of the “metaverse” in the military field, with stricter security and confidentiality standards, more powerful simulation computing capabilities, more real-time and sophisticated interaction requirements, and more prominent battlefield time consistency, virtual-real integration, boundary security, decision-making intelligence, and performance fidelity.

Imagine a typical application scenario

We can preliminarily outline the outline of the “battlefield metaverse” by imagining a typical military training application scenario in the future:

An aircraft carrier fleet was cruising in a certain sea area. Suddenly, in the fleet command room, a virtual AI staff officer projected a virtual figure through the “Battlefield Metaverse” terminal, making a clear voice to convey the upper level’s combat readiness inspection instructions.

The fleet commander immediately issued an “exercise combat alert” command to the fleet according to the plan. The fleet’s combat command and control system began to automatically receive combat missions and battlefield situations sent by the “Battlefield Metaverse” terminal. Except for the personnel on duty at the bridge of each ship in the fleet who continued to cruise and guard according to the scheduled route, all other personnel were transferred to the combat scene set by the “Battlefield Metaverse”.

On the flight deck of an aircraft carrier, all deck workers immediately put on enhanced terminals of the “Battlefield Metaverse” after hearing the “combat alert”. Depending on the login user ID, the corresponding virtual information in the “Battlefield Metaverse” is seamlessly superimposed on the workers’ field of vision, supporting the deck workers to complete relevant practical operations in the real world.

Under the unified command of the flight deck commander, all deck operators perform virtual and real integrated deck operations for various types of carrier-based aircraft in accordance with combat mission requirements and carrier-based aircraft take-off procedures, including refueling, bomb loading, towing, safety inspection, ejection, recovery, and ammunition emergency disposal.

In the flight briefing room, all pilots of various types of carrier-based aircraft participating in this mission have put on the immersive terminals of the “Battlefield Metaverse” and entered the cockpit of the virtual world, waiting for their carrier-based aircraft to complete take-off preparations.

In the cockpit of the virtual carrier-based fighter, an AI assistant with the same configuration as the actual carrier-based aircraft is confirming the status of the aircraft with the pilot and planning the upcoming combat operations according to the combat mission received. During the combat mission, the virtual carrier-based fighter can equivalently feedback the situation information of the enemy and our own reconnaissance, electronic interference, combat damage, etc., providing real-time information for the pilot to make decisions and take actions…

It can be seen from the above typical application scenarios that the “battlefield metaverse” requires a large number of revolutionary breakthroughs in key technologies as its basic support, including VR/AR/MR technology, digital twin technology, cloud computing technology, blockchain technology, high-speed network technology, AI technology, etc.

Construction requires many basic conditions

Compared with the “metaverse” that is open to the public and reconstructs the network ecology, the “battlefield metaverse” needs to be developed based on the actual topological structure of the military network and the construction results of various military information systems, and has higher requirements on key technical indicators. Specifically, the construction of the “battlefield metaverse” should have at least the following basic conditions:

– Independent network communication links. The “Battlefield Metaverse” is an independent form built on the military high-speed network architecture and infrastructure, which is significantly different from the design concept of the “Metaverse” global access. Users of the “Battlefield Metaverse” need to verify and log in through a secure military network node in a relatively fixed place or area. The remote wireless network link is not open to the outside world and has the ability to resist communication interference and network attacks.

——Strict identity authentication mechanism. All individual users accessing the “Battlefield Metaverse” are required to be military personnel who have passed confidentiality review and military scientific research personnel with confidentiality qualifications. The authentication information of all types of users cannot be tampered with, fabricated, or misused in the “Battlefield Metaverse”. All user operations will be recorded in detail in the “Battlefield Metaverse” to facilitate tracking and analysis by the operation and maintenance security department, and any illegal users and operations will have no chance to take advantage.

——Diverse user access capabilities. Users who access the “Battlefield Metaverse” can be divided into individual users, equipment users, and system users according to their types. Among them, individual users are organic individuals who directly enter the “Battlefield Metaverse” activities; equipment users and system users are key digital equipment and information systems that need to access the “Battlefield Metaverse”, and their operators or maintenance personnel participate in the activities in the “Battlefield Metaverse” in an indirect way through operational control behaviors in the real world.

——Clear command, coordination and interaction relationship. Different from the high degree of freedom of ordinary users in the “metaverse”, all types of users in different locations in the “battlefield metaverse” participate in specific activities, play designated roles or undertake major tasks, which are uniformly planned, deployed and coordinated by the only event organizer. Before each activity is launched, the event organizer determines the user identification, command relationship, coordination relationship, information interaction permissions, etc. of the participants based on the elements required to achieve the goal.

——Immersive real-time interaction capabilities. Individual users who access the “Battlefield Metaverse” need to log in through a human-computer interaction terminal and achieve real-time interaction with the “Battlefield Metaverse” and other users in the real world. In addition to having basic immersive interaction and time-based functions, terminal devices also need to enhance the user’s operational freedom and sensitivity, so that users can operate and use a variety of weapons, equipment and information systems in the “Battlefield Metaverse”.

——Powerful AI individuals. Similar to the “metaverse”, AI individuals with intelligence and autonomous behavior capabilities will act as permanent residents in the “battlefield metaverse”. They can play the role of virtual red team, blue team, and third-party entities to participate in combat, training and test tasks, and can also play the role of instructors, examiners, staff, system operation and maintenance personnel, etc., to assist individual users in making decisions and taking actions.

——Realistic performance simulation capability. All weapons, equipment and information systems mapped into the “Battlefield Metaverse” need to have functional performance and consistent operation methods equivalent to those in the real world. Through signal-level simulation models and performance algorithms, simulation of reconnaissance detection effectiveness, electronic countermeasure effectiveness, firepower strike effectiveness and comprehensive protection effectiveness can be achieved, ensuring that the experience accumulated by individual users in the “Battlefield Metaverse” can guide actual combat operations.

——Flexible scenario generation capability. The “Battlefield Metaverse” needs to set a battlefield area for each activity, including the geographical environment, electromagnetic environment, meteorological environment, and hydrological environment of the area. Its scenario data is required to be more real and accurate, and requires institutions with relevant qualifications to build and maintain it step by step.

Application, bringing significant benefits in multiple fields

In the future, the “metaverse” may first be applied to areas such as online social networking, online games, and online economy, becoming the starting point for the virtualization of human society.

After the “Battlefield Metaverse” is built, it will have a huge impact on the application fields of education, training, testing, research, etc. of the troops, greatly change the original methods of organizing and implementing activities, significantly improve the comprehensive benefits of various military activities, and effectively stimulate the innovation capabilities of military personnel and scientific researchers.

In the field of education, the “Battlefield Metaverse” can play an important role in centralized education in colleges and universities, in-service distance education, etc. The teachers and students can interact and communicate with each other freely in different locations, which is conducive to creating a harmonious and relaxed teaching atmosphere. On the one hand, the teachers can use more powerful teaching content to demonstrate their teaching ability and achieve more vivid teaching effects; on the other hand, the students can recognize and understand the problems more intuitively, effectively improving their personal interest in self-study and subjective initiative.

In the field of training, the “Battlefield Metaverse” can fully meet the requirements of actual combat training in the context of large-scale combat. Participants at all levels can play the roles of their current positions or proposed positions, and repeatedly receive training and assessments in a larger, more confrontational, and longer-lasting environment. While honing combat skills, honing tactical coordination, and forging combat will, they can apply the accumulated simulated combat experience to actual combat operations. The evaluation of training effects will also be more quantitative and intuitive, which is more conducive to selecting talents.

In the field of testing, the “Battlefield Metaverse” can provide a practical background and large-scale test scenarios with equivalent simulation capabilities for the design and demonstration of new weapons and equipment, weapons and equipment performance testing, weapons and equipment compatibility testing, and weapon system combat effectiveness testing. It can bring virtual and real equipment into a peer environment to operate together, and fully grasp the various states and parameter changes of the equipment, thereby effectively solving practical problems such as limited test times, simple test links, low complexity of the test background, and difficulty in building a combat system.

In the field of research, the “Battlefield Metaverse” can provide a public platform for remote simulation and verification for the use of new equipment and innovation of tactics. On the basis of coordinating expert resources from various regions and centrally calling simulation computing power, virtual AI is used to play the combat forces of all parties, conduct uninterrupted simulation calculations, obtain massive data samples, and mine and analyze knowledge and conclusions that meet the research objectives. During the research process, researchers can also communicate and collaborate with relevant experts, intervene in real time and improve the simulation elements to ensure that the research results can stand the test of actual troops.

From the perspective of system architecture and functional characteristics, although the “Battlefield Metaverse” cannot directly affect actual combat operations, it can serve as a backup for wartime command and communication networks. When the command and communication network is paralyzed by enemy network attacks or key nodes are damaged by attacks, combat troops can try to access the communication link of the “Battlefield Metaverse” to ensure the most basic combat command and information exchange.

The above picture is a schematic diagram of the “Battlefield Metaverse”.

Gaosong System

國語中文:

近期,「元宇宙」成為人們關注的熱點。本版去年11月26日曾刊登《揭開「元宇宙」面紗》一文,並提到了「戰場元宇宙」概念。

簡單地說,「元宇宙」將是下一代網路的終極形態,是與現實世界平行同構的一個虛擬世界,具備多維度、全感官、虛實融合、無縫互動等主要特徵。 “戰場元宇宙”,則是“元宇宙”在軍事領域的表現形態,具有更嚴格的安全保密標準、更強大的仿真計算能力、更實時的精細交互要求,更突出的戰場時統一致性、虛實一體性、邊界安全性、決策智能性、效能逼真性。

設想,一個典型應用場景呈現

我們可透過假想未來一個典型軍事訓練應用場景,初步描繪出「戰場元宇宙」的輪廓——

一支航母編隊正在某海域巡航。突然,編隊指揮室內,虛擬的AI參謀透過「戰場元宇宙」終端,投射生成一個虛擬人影,發出清脆聲音,傳達上一級戰備檢查指令。

編隊指揮官立即依照預案,向編隊下達「演習戰鬥警報」命令。編隊作戰指控系統開始自動接收「戰場元宇宙」終端發送的作戰任務和戰場態勢,除編隊各艦艦橋部位的值更人員按照預定航線繼續進行巡航和警戒外,其餘人員全部轉入「戰場元宇宙」設定的作戰場景之中。

在航空母艦飛行甲板上,所有甲板作業人員在聽到「戰鬥警報」後,立即穿戴好「戰場元宇宙」的增強型終端,根據登入使用者ID的不同,「戰場元宇宙」中對應的虛擬資訊無縫疊加至作業人員視野,支撐甲板作業人員在真實世界完成相關實作動作。

在飛行甲板指揮官統一指揮下,所有甲板作業人員依照作戰任務要求和艦載機起飛流程,對各型艦載機進行虛實融合的甲板作業,包括加油、掛彈、牽引、安全檢查、彈射、回收、彈藥緊急處置等內容。

飛行簡報室內,所有參與本次任務的各型艦載機飛行員已穿戴好「戰場元宇宙」的沉浸型終端,進入虛擬世界的駕駛座艙中,等待自己的艦載機完成起飛準備。

虛擬的艦載戰鬥機座艙內,一位與艦載機實裝配置相同的AI助理正在向飛行員確認飛機的各項狀態,並根據受領的作戰任務,籌劃即將開始的作戰行動。在執行作戰任務期間,虛擬艦載戰鬥機能等效反饋敵我雙方的偵察探測、電子乾擾、交戰毀傷等態勢信息,實時供飛行員決策判斷和採取行動…

透過上述典型應用場景可以看出,「戰場元宇宙」需要大量關鍵技術的革命性突破作為基礎支撐,包括VR/AR/MR技術、數位孿生技術、雲端運算技術、區塊鏈技術、高速網路技術、AI技術等。

構建,需要具備許多基本條件

相較於面向大眾、重構網路生態的“元宇宙”,“戰場元宇宙”需要在軍用網路實際拓撲結構和各類軍用資訊系統的建設成果上展開,對關鍵技術指標上的要求更高。具體來說,建構「戰場元宇宙」應至少具備以下基本條件:

——獨立的網路通訊鏈路。 「戰場元宇宙」是建立在軍用高速網路架構和基礎設施上的獨立形態,與「元宇宙」全球隨遇接入的設計理念有明顯差異。 「戰場元宇宙」的使用者需要在相對固定的場所或區域,透過安全的軍用網路節點進行驗證登入。遠端無線網路連結不對外開放,並具備抵禦通訊幹擾和網路攻擊能力。

——嚴格的身份認證機制。所有接取「戰場元宇宙」的個人用戶,均要求是透過保密審查的軍方人員和具備保密資質的軍工科研人員。所有類型用戶的認證資訊在「戰場元宇宙」中不可篡改、虛構、冒用,所有用戶的操作行為在「戰場元宇宙」中將被詳細記錄,以利於運維安全部門追蹤分析,任何非法用戶及操作均無機可乘。

——多樣化的用戶接入能力。接取「戰場元宇宙」的用戶,依類型可分為個人用戶、裝備用戶及系統用戶等。其中,個人使用者是直接進入「戰場元宇宙」活動的有機個體;裝備使用者和系統使用者則是需要連接「戰場元宇宙」的關鍵數位化裝備和資訊化系統,其操作或維運人員透過在現實世界中的操作控制行為,以間接方式參與「戰場元宇宙」內的活動。

——明確的指揮協同互動關係。與「元宇宙」中普通用戶高自由度不同,異地分佈的所有類型用戶在「戰場元宇宙」中參與的特定活動、扮演的指定角色或擔負的主要任務,均由唯一的活動組織者進行統一籌劃、部署和協調。在每項活動展開前,由活動組織者圍繞達成目標所需的要素,確定參與活動的使用者標識、指揮關係、協同關係、資訊互動權限等。

——沉浸式的即時互動能力。接取「戰場元宇宙」的個人用戶,需透過人機互動終端進行登錄,並與「戰場元宇宙」及現實世界中其他用戶達成即時互動。終端設備在具備基本的沉浸式互動功能和時統功能基礎上,也需要強化使用者的操作自由度和靈敏度,以便於使用者在「戰場元宇宙」中操作使用各式各樣武器裝備和資訊系統。

——強大的AI個體。與「元宇宙」類似,具備智慧和自主行為能力的AI個體,將作為「戰場元宇宙」中永久居民進行活動,既可扮演虛擬的紅方、藍方、第三方實體,參與到作戰、訓練和試驗任務中,也可扮演教官、考官、參謀、系統維運人員等角色,輔助個人使用者進行決策與行動。

——逼真的效能模擬能力。所有映射到「戰場元宇宙」中的武器裝備和資訊系統,均需要具有與真實世界等效的功能性能和一致的操作方法。透過訊號級的模擬模型和效能演算法,實現對偵察探測效能、電子對抗效能、火力打擊效能和綜合防護效能的仿真,確保個人用戶在「戰場元宇宙」中累積的經驗能指導實際作戰行動。

——靈活的場景生成能力。 「戰場元宇宙」需要針對每次活動,設定戰場區域,包括該區域地理環境、電磁環境、氣象環境和水文環境等。其情境資料需求更真實且準確,需要具備相關資格的機構進行逐步建置與持續維護。

應用,多個領域帶來顯著效益

未來,「元宇宙」可能首先應用於網路社交、網路遊戲、網路經濟等領域,成為人類社會虛擬化起點。

「戰場元宇宙」建成後,則會對部隊的教育、訓練、試驗、研究等應用領域帶來巨大影響,極大改變原有的活動組織實施方式,顯著提升各類軍事活動的綜合效益,有效激發軍事人員和科學研究人員的創新能力。

在教育領域,「戰場元宇宙」能在院校集中教育、在職遠距教育等方面發揮重要作用,施教方與受教方在不同地點就能進行自由度極高的互動交流,有利於營造和諧輕鬆的授課氛圍。一方面,施教方能利用更強大的教學內容來展現宣講能力,達成更生動的宣教效果;另一方面,受教方能更直觀地認識和理解問題,有效提升個人自學興趣和主觀能動性。

在訓練領域,「戰場元宇宙」能充分滿足大規模作戰背景下的實戰化訓練要求,各級參訓對象可透過扮演現任職位或擬任崗位的角色,在更大規模、更具對抗性、在更長持續時間的環境中,反覆接受訓練與考核,在錘鍊戰鬥技巧、磨合戰術配合、鍛造戰鬥意志的同時,將累積的模擬作戰經驗應用到實際作戰行動中。訓練效果的評鑑也將更量化直觀,更有利於選賢任能。

在試驗領域,「戰場元宇宙」能為新型武器裝備設計論證、武器裝備性能試驗、武器裝備相容性試驗、武器系統體係作戰效能檢驗等,提供具備等效模擬能力的實戰化背景及大規模試驗場景,將虛實裝備納入對等的環境中共同運行,並全面掌握裝備的各種狀態和參數的變化情況,從而有效解決試驗次數受限、試驗環節簡單、試驗背景複雜度低、作戰體系構建困難等現實問題。

在研究領域,「戰場元宇宙」能為新型裝備運用和戰法創新提供遠端推演驗證的公共平台。在協調各地專家資源與集中調用模擬算力的基礎上,利用虛擬AI扮演各方作戰力量,進行不間斷推演計算,得出海量資料樣本,並從中挖掘分析出符合研究目標的知識和結論。在研究過程中,研究人員還可與相關專家共同交流協作,即時介入並完善推演要素,以確保研究成果經得起實兵檢驗。

從體系架構和功能特性來看,「戰場元宇宙」雖然無法直接影響實際作戰行動,但可作為戰時指揮通訊網路的備份手段。當指揮通訊網路遭受敵方網路攻擊而癱瘓或關鍵節點遭受打擊被損毀時,作戰部隊可嘗試接取「戰場元宇宙」的通訊鏈路,確保最基本的作戰指揮和資訊互動。

上圖為「戰場元宇宙」示意圖。

高 嵩制

中國軍事資料來源:https://www.81.cn/jfjbmap/content/2022-01/21/content_307950.htm

Chinese Military Training and the Metaverse: Challenges & Opportunities Coexist

中國軍事訓練與虛擬世界:挑戰與機會並存

現代英語:

 In the field of military training, the basic technology of the Metaverse has long been used as a virtual resource by the military to varying degrees. It must be acknowledged that the value and potential of the Metaverse in military training is immeasurable and is the focus of current and future military competition. However, due to the immaturity of the development of Metaverse-related technologies and their application in military training, the bright prospects are accompanied by potential risks.

1. The past and present of the military training metaverse
       
 The metaverse relies on a technology group with virtual reality technology as its core. In its early form in the military field, it is also called virtual simulation or simulated Internet. It can be said that virtual simulation training is very close to today’s concept of the metaverse and is the primary form of the military training metaverse. From ancient times to the present, the progress that has brought great influence in the field of science and technology is generally for winning wars or maintaining combat effectiveness. As the leading technology of the third scientific and technological revolution, the metaverse is used for military training in different forms of basic metaverses in the global military field.
      The US military began to deploy the “Military Metaverse” plan very early. In 1978, Jack Thorpe, a captain of the US Air Force, proposed the idea of ​​a military simulator network in his paper, hoping to establish a distributed or networked military modeling system to facilitate training. In 1983, the Advanced Research Projects Agency (DARPA) of the US Department of Defense developed the Virtual Battlefield Network Simulator (SIMNET Simulator), which uses computers to generate virtual battlefields, simulate the situation of fighting between the two sides, and summarize errors and failures. Replacing field exercises in this way saves costs to a certain extent and improves the effectiveness of training. Although the SIMNET simulator, as the earliest version, was still at a lower level of battlefield simulation, it pioneered distributed or networked modeling and simulation. By the end of the 1980s, the project reached its peak, and eventually more than 200 simulated interconnected tank and aircraft simulators based on local area networks and wide area networks were formed across the United States and across Europe, and used for large-scale training and exercises. The distributed interactive simulation (DIS) protocol developed at that time is still in use today, and through more advanced high-level architectures, different military simulations can be linked to provide a richer collective training or mission preparation experience. It can be said that the SIMNET simulator project directly or indirectly promoted the development of many key technologies of the current metaverse. Today, the US military is very interested in the metaverse that has sprung up like mushrooms after rain. The newly established military branch, the United States Space Force (USSF), wants to create a military-specific metaverse for collaborative operations, training, and mission execution. Its chief technology officer, Lisa Costa, declared: “Soldiers cannot go to space in person. The only way they can experience their own combat territory is through visual data display. The virtual reality environment will provide them with situational awareness and understand their options in order to make decisions.”
       In recent years, virtual reality and augmented reality technologies of the metaverse have been incorporated into the regular military training of the US military. In 2014, the BlueShark project developed by the Office of Naval Research and the Institute for Creative Technologies at the University of Southern California allowed soldiers to collaborate in a virtual environment to conduct driving technology training; in 2018, the US Army and Microsoft cooperated to develop an integrated visual enhancement system IVAS for soldiers to conduct regular training; in 2020, the US Navy launched the Avengers Project to conduct flight course training through virtual reality, artificial intelligence and biometric technology; in 2021, Boeing created a military aircraft training system that enables maintenance personnel to use AR technology for related simulated maintenance drills; on May 10, 2022, two US fighter pilots took a jet and completed a high-altitude prototype metaverse experiment over the California desert. Refueling operations were performed using a virtual tanker through a specially designed augmented reality display connected to a computer system that displayed a glowing image of a virtual refueling aircraft.

 (I) The US military uses virtual reality technology for military training on a large scale
       
 . At the same time, Russia is also a leader in the development of virtual training systems. Almost all of its advanced weapons and equipment are equipped with corresponding virtual training systems, and are developing in the direction of universalization and embeddedness. For example, the Sound M universal virtual training system is a universal virtual training equipment for combat personnel of surface-to-air missile weapon systems. The Tor M1 surface-to-air missile system is also equipped with a special virtual training vehicle, which can complete battlefield simulation training while searching for targets and conducting weapon operations.

 (II) The Tor M1 surface-to-air missile system is also equipped with a dedicated virtual training vehicle.
        
 In addition, other countries have also begun to explore the combination of metaverse technology and military training. The British Army has been committed to studying the use of extended reality technology, which can put more than 30 soldiers in the same virtual training scene. The British Ministry of Defense’s “Single Synthetic Environment” has used this technology in soldier training. In South Korea, a developer and supplier of a military training simulator called “Optimus Prime” completed the development of the DEIMOS military training system based on metaverse technology in 2019 and applied it to the training of the armed forces. The system can create various environments for professional military training, including precision shooting training, tactical behavior training and observation training.

       2. The inherent advantages of the metaverse in military training Military training
       
is a commonplace in the military, specifically referring to the military theory and related professional knowledge education, combat skills training and military operations exercises conducted by the armed forces and other trainees. The continuous innovation of technologies such as artificial intelligence and virtual reality has accelerated the trend of intelligentization in future wars. Single actual combat exercises in traditional forms will be difficult to meet the combat requirements under the new situation. As a huge group of new technologies, the metaverse plays an increasingly important role in military training. If training is an important support for combat effectiveness, then the primary use of the metaverse in military training is as an important “enabler” for simulation training.       Immersive experience can improve the effectiveness of battlefield environment simulation. As a practical science, military training is centered on experience and the key to training is immersion. The virtual space created by the metaverse makes people feel a “common sense of embodied presence”, allowing trainees to fully immerse themselves in the virtual space and experience a war close to reality. Battlefield environment simulation uses virtual reality technology to process battlefield element data such as battlefield terrain, battlefield personnel, weapons and equipment through computer systems, and finally creates a realistic three-dimensional battlefield environment. Soldiers are immersed in digital environments such as deserts, mountains or plateaus. Each environment has different tactics, techniques and procedures, and soldiers can constantly practice tasks. Even if the soldiers are not in the actual battlefield environment, this technology is enough to restore the authenticity of the environment. More importantly, through battlefield simulation training, not only can soldiers become familiar with the battlefield environment and obtain information to the greatest extent, but they can also improve their ability to observe things from multiple angles and solve emergencies. The US military has developed a virtual reality system called a laser sand table, which can identify and convert photos and videos sent back by satellites, and turn them into realistic three-dimensional maps, presenting the battlefield environment thousands of miles away to commanders. Before the wars in Afghanistan and Iraq, the US military used virtual reality technology to create real war scenes, including battlefield conditions, personnel appearances, etc., in order to allow soldiers to adapt to the environment in advance and improve their combat capabilities.

 (II) On the eve of the wars in Afghanistan and Iraq, the U.S. military used virtual reality technology to create real war scenes
        
. Open interconnection better supports synthetic training. The various parts of the Metaverse ecosystem can be interconnected and operated, and information can be transmitted across platforms and across the world (between virtual worlds or between the virtual world and the real world) without hindrance. Synthetic training uses the open interconnection advantage of Metaverse technology to supplement actual combat training. According to statistics, since 2015, the number of non-combat deaths in the U.S. military has exceeded the number of deaths in actual military operations each year, and many of the deaths in non-combat operations are caused by conventional military training. Therefore, the U.S. Army has begun to use Metaverse to carry out synthetic training in an attempt to establish a virtual synthetic training environment (STE) to reduce casualties in training. From urban warfare to mountain warfare, the “synthetic training environment” integrates “real-time, virtual and constructive training environments into a single synthetic training environment, and provides training functions to ground, transport and air platforms and command posts where needed.” Practice has proved that the synthetic training environment built by the metaverse, with the help of multi-sensory simulation and restoration, can help soldiers break through the limitations of theoretical learning and cognition, and improve the quality and ability of team combat coordination, injury treatment and safe evacuation. On the eve of the Iraq War, the US military stationed in Kuwait conducted synthetic training on Iraq’s urban conditions, which enhanced the soldiers’ urban combat capabilities while minimizing casualties in actual combat. The
      imaginative space stimulates innovation in military training thinking to the greatest extent. War exercises have been valued by military strategists since ancient times. During the Warring States Period, Mozi and Gongshu Ban’s deduction games of “untying belts to make a city” and “wooden pieces to make weapons” rehearsed the real situation on the battlefield, thus avoiding fighting between the two armies. In the deep scene era opened by the future metaverse, the military system will become highly intelligent, and the two sides of the war may be able to conduct war deductions in the battlefield metaverse, and even compete in the virtual world. Based on the information obtained in the virtual world, the two sides of the deduction capture and predict the changes in the battlefield through thinking processes such as association, reasoning and logical judgment, which is not only conducive to learning more war laws, but also can exercise the soldiers’ logical deduction ability. In the Gulf War of 1991, the U.S. military conducted war games based on the training level of the troops, the possible course of the war, and the time required for actual combat before implementing Operation Desert Storm. Practice has proved that the U.S. military used the problems found in this war game to transform the combat concept into an actual action plan and ultimately won. This also fully demonstrates that the real battlefield is full of uncertainties, so it is necessary to be fully prepared through continuous war exercises. Undoubtedly, it is almost impossible for the enemy and us to conduct coordinated deductions in the real world, but if the deployment of the enemy and us can be made public to a certain extent by their respective satellites, air and ground reconnaissance equipment, then at a certain time point, between two or more parties about to break out a military crisis, it is expected that the deployment of troops in the metaverse can be carried out first, and the actual military conflict can be resolved.
      The application of metaverse technology in military training can not only avoid accidental casualties during training, but also allow a single or many trainees to complete training tasks in different virtual environments without leaving home and without actual contact. And this kind of non-contact training plays a more obvious role in the regular form of the new crown epidemic.
       3. Potential risks of the metaverse in military training
      
Although the metaverse provides technical support for military training to a large extent, it should never be simply understood as a training program or considered as a means of conducting training. Even if the metaverse technology brings convenience and innovation to military training, the technology itself and its accompanying challenges and uncertainties cannot be ignored.
      The development of metaverse technology may cause security issues. The metaverse is a huge technology group. Its system architecture, core algorithms and immersive technology are still in a stage of continuous development. The supporting industry, value consensus, management standards, etc. have not yet been reached. In general, the metaverse is still a new thing, and its application in military training is even more so. Although the use of virtual training systems can reduce casualties to a certain extent, it is worth thinking about whether such training can be truly used in combat sites. It is still an unknown. And whether the technology is safe enough in operation is also an urgent problem to be solved. James Crowley of Virtual City Training Experts pointed out that computer power may be the most influential part of it. Unless the delay can be reduced to a level that does not make people uncomfortable and feels real, and unless the movement and communication data between different people can be stored in different simulators, it will not be able to provide practical training tools. At the same time, another challenge is the security issue of mutual contact between the armies of different countries in the open virtual world of the Metaverse.
      Virtual training environments are prone to cognitive illusions. Military training in the Metaverse world is the result of a contest between human intelligence and technology. War simulations and military training conducted in a virtual environment can have a powerful deterrent effect on future wars, just like “nuclear weapons”. Although it makes up for the limited senses of people at the physiological level, it also brings psychological cognitive illusions to trainees. Taking unmanned combat military training as an example, long-term combat training under a virtual system will cause the operator to have a gaming mentality. Because the audiovisual senses are out of touch with the real battlefield situation, they are alienated from the real people and society, and have a numb mentality towards the behavior of depriving others of their lives. With the continuous maturity of Metaverse technology, the interaction between the virtual world and the real world will become closer and closer, forming a mixed world that is difficult to distinguish between the real and the virtual. By then, it will not only cause a distinction dilemma for the cognitive psychology of soldiers, but also a major challenge for future military training. The
      “decentralization” of the Metaverse deviates from the traditional military training structure. In the world of the metaverse, all parties involved are virtual entities with equal status after computer processing and digitization. They can act autonomously in the metaverse, so they pursue “decentralization”. However, the traditional military training organizational structure is highly centralized and hierarchical management from top to bottom, which is contrary to the value needs of the metaverse. The US military has made a lot of efforts in pursuing “decentralized” operations, such as the “network-centric warfare” proposed in the 1990s, and the current distributed lethality and mosaic warfare. However, the traditional military training structure and thinking inertia are still obstacles to “decentralization”, and this situation is common in the armies of various countries.
     Yuval Noah Harari said in “Sapiens: A Brief History of Humankind” that humans conquer the world by relying on the ability of fiction and imagination. The metaverse gives us the ability to fiction and imagine, and at the same time, the uncertainty of the metaverse in the field of military training also increases the element of fear. Therefore, we must pay attention to innovative scientific and technological theories, develop cutting-edge metaverse technologies, continuously stimulate the potential of the military training metaverse, and at the same time improve relevant laws, regulations and moral and ethical regulations to make advance preparations for winning future intelligent wars.

國語中文:

在軍事訓練領域,元宇宙的基本技術其實早就作為一種虛擬資源,在不同程度上為軍方使用。必須承認,元宇宙在軍事訓練中的價值潛力不可估量,是當下和未來軍事領域爭鋒的焦點。但由於元宇宙相關技術的發展及其在軍事訓練中的應用尚不成熟,美好前景背後也伴隨著潛在風險。
一、軍事訓練元宇宙的前世今生
元宇宙依賴的是以虛擬實境技術為核心的技術群,在軍事領域的早期形態又稱為虛擬模擬或模擬互聯網。可以說,虛擬模擬訓練已經非常接近今天的元宇宙概念,是軍事訓練元宇宙的初級形態。從古至今,科技領域帶來巨大影響力的進步普遍都是為了贏得戰爭或保持戰鬥力。作為第三次科技革命的領導技術,元宇宙在全球軍事領域,以不同形式的基本元宇宙被用於軍事訓練。
美軍很早就開始部署「軍事元宇宙」計畫。 1978年,美空軍上尉傑克·索普在自己的論文中提出了軍事模擬器網路的構想,希望建立一個分散式或網路化的軍事建模系統方便訓練。 1983年美國防部高級研究計畫局(DARPA),開發了虛擬戰場網路模擬器(SIMNET模擬器),以電腦生成虛擬戰場,模擬雙方交戰的情形進行推演,總結錯誤和失敗。用這樣的方式取代實地演習,一定程度上節省了成本,也提高了訓練的效果。雖然SIMNET模擬器作為最早的版本仍處於較低階的戰場仿真,但卻開闢了分散式或網路化建模仿真的先河。到了20世紀80年代末,該計畫達到頂峰,最終落地形成200多個遍布美國、橫跨歐洲,基於區域網路和廣域網路的模擬互聯坦克和飛機模擬器,並用於大規模訓練與演習。而當時開發的分散式互動式模擬(DIS)協議,至今仍在使用,並且透過更先進的高階體系結構,可以連結不同的軍事模擬,以提供更豐富的集體訓練或任務準備體驗。可以說SIMNET模擬器專案直接或間接推動了當前元宇宙的許多關鍵技術的發展。時至今日,美軍對如雨後春筍般崛起的元宇宙興趣正濃,新成立的軍種——美國太空部隊(USSF)欲打造軍事專用元宇宙,用於協同作戰、訓練、執行任務。其技術主管利薩·科斯塔宣稱:「軍人們並不能親自上太空,他們體驗自身作戰疆域的唯一途徑就是視覺數據顯示,虛擬現實環境會為他們提供態勢感知,並了解自己的選項,以便做出決策。
近年來,元宇宙的虛擬實境和擴增實境技術已納入美軍的常規軍事訓練。 2014年,南加州大學海軍研究辦公室和創意技術研究所開發的BlueShark項目,讓士兵在虛擬環境中協作配合,進行駕駛技術訓練;2018年,美陸軍與微軟合作開發了一款集成視覺增強系統IVAS ,供士兵進行常規訓練;2020年,美海軍又推出了復仇者計劃,透過虛擬現實、人工智慧以及生物識別技術,開展飛行課程培訓;2021年,波音公司打造了一個軍用飛機培訓系統,使維修人員利用AR技術進行相關模擬維修演練;2022年5月10日,兩名美軍戰鬥機飛行員乘坐噴射機,在加州沙漠上空完成了一次高空原型元宇宙實驗。透過特製的擴增實境顯示器,連接到一個虛擬加油飛機發光影像的電腦系統,使用虛擬加油機進行了加油操作。
(一)美軍大量採用虛擬實境技術進行軍事訓練
同時,俄羅斯在虛擬訓練系統的開發上也是領先者,其先進武器裝備幾乎都配有相應的虛擬訓練系統,並且正在朝著通用化和嵌入式的方向發展。如音色M通用虛擬訓練系統就是用於地對空飛彈武器系統作戰人員的通用虛擬訓練裝備。道爾M1型地對空飛彈系統也配備有專用虛擬訓練車,可在目標搜尋和武器作戰的同時完成戰地模擬訓練。

(二)道爾M1型地空飛彈系統也配備有專用虛擬訓練車
此外,其他國家也紛紛開始探索元宇宙技術與軍事訓練的結合。英陸軍一直致力於研究擴展實境技術的使用,可以讓30多名士兵處於相同的虛擬訓練場景。英國防部的「單一合成環境」已經在士兵訓練中使用了這項技術。在韓國,一家名為「擎天柱」的軍事訓練模擬器的開發商和供應商,在2019年完成了基於元宇宙技術的DEIMOS軍事訓練系統研發並應用於武裝部隊的訓練。該系統能夠為專業軍事訓練創造各種環境,包括精準射擊訓練、戰術行為訓練和觀察訓練。
二、軍事訓練元宇宙的內在優勢
軍事訓練乃是兵家常事,具體指武裝力量及其他受訓對象所進行的軍事理論及相關專業知識教育、作戰技能教練和軍事行動演練的活動。人工智慧、虛擬實境等技術的不斷革新,加速了未來戰爭的智慧化趨勢。傳統形式下的單一實戰演練將難以滿足新情勢下的作戰要求。而元宇宙作為一個龐大的新技術群,在軍事訓練中扮演越來越重要的角色。如果說訓練是戰鬥效能的重要支撐,那麼元宇宙在軍事訓練中的首要用途便是作為模擬訓練重要的「賦能器」。
沉浸式體驗能夠提升戰場環境模擬效能。軍事訓練作為實踐科學,訓練的核心在體驗,訓練的關鍵在沉浸。元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”,讓受訓者完全沉浸虛擬空間,體驗一場接近真實的戰爭。戰場環境模擬正是利用虛擬實境技術,透過電腦系統對取得的戰場要素資料如戰場地形、戰場人員、武器裝備等進行處理,最終創設出逼真的立體戰場環境。士兵們沉浸在沙漠、山區或高原的數位環境中,每個環境都有不同的戰術、技術和程序,士兵們可以不斷地演練任務。即便士兵不是在實際的戰場環境中,但這項技術足以還原環境的真實度,更重要的是透過戰場模擬訓練,不僅能夠讓士兵熟悉戰場環境,最大程度獲取信息,而且還能提升其多角度觀察事物、解決突發狀況的能力。美軍目前已研發出一款被稱為雷射沙盤的虛擬實境系統,能夠辨識和轉換衛星發回的照片和錄像,並將其轉變成逼真的立體地圖,將遠在千里外的戰場環境呈現給指揮員。在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術來打造真實的戰爭場景,包括戰地狀況、人員樣貌等。旨在讓士兵提前適應環境,提升作戰能力。

(一)元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”

(二)在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術打造真實的戰爭場景
開放式互聯較能支撐合成訓練開展。元宇宙生態系統各部分之間可以實現相互連接和操作,資訊可以暢通無阻地實現跨平台和跨世界傳輸(在虛擬世界之間或虛擬世界與現實世界之間)。合成訓練正是利用元宇宙技術的這一開放式互聯優勢,來實現實戰訓練的補充。根據統計,從2015年開始,美軍每年的非戰鬥死亡人數超出了在實際軍事行動中犧牲的人數,而在非戰鬥行動中喪生的人員很多是由常規軍事訓練造成的。因此,美陸軍已經開始採用元宇宙進行合成訓練,試圖建立虛擬合成訓練環境(STE)來減少訓練中的傷亡。從城市作戰到山地作戰,「合成訓練環境」將「即時、虛擬和建設性的訓練環境整合到一個單一的合成訓練環境中,並在有需要的地方向地面、運載和空中平台以及指揮所提供訓練功能」。實務證明,透過元宇宙建構的合成訓練環境,藉助多感官模擬還原,能夠幫助戰士突破理論學習和認知局限,提升團隊作戰協同、傷情處置和安全撤離等素質和能力。伊拉克戰爭前夕,駐紮在科威特的美軍就對伊拉克的城市狀況進行了合成訓練,增強了士兵城市作戰能力的同時,把實戰中的傷亡降到了最低。
想像性空間最大程度激發軍事訓練思維創新。戰爭演習自古就受到兵家重視,戰國時期墨子和公輸班「解帶為城」「木片為械」的推演遊戲將戰場上的真實情況演練出來,從而避免了兩軍交戰。在未來元宇宙開啟的深度場景時代,軍事體系將走向高度智慧化,作戰雙方或許能在戰場元宇宙進行戰爭推演,甚至在虛擬世界一決高下。推演雙方根據虛擬世界獲取的信息,透過聯想、推理和邏輯判斷等思維過程,對戰場風雲變化進行捕捉和預判,不僅有利於習得更多戰爭規律,還能夠鍛鍊士兵的邏輯推演能力。 1991年的海灣戰爭中,美軍就在實施「沙漠風暴」行動前,根據部隊的訓練水準和可能的戰爭進程,以及實際作戰所需時間進行了兵棋推演。實踐證明,美軍借助這次兵棋推演發現的問題,將作戰設想轉化為實際行動方案,最終取得勝利。這也充分說明了真實的戰場充滿了種種不確定性,因此需要透過不斷進行戰爭演習來做好充分準備。毋庸置疑,敵我雙方在現實世界中進行協同推演幾乎是不可能的,但若敵我雙方的兵力部署可以被各自的衛星、空中和地面偵查設備進行一定程度的公開,那麼在某個時間節點,在即將爆發軍事危機的雙方或多方之間,先在元宇宙中進行排兵布陣,可以化解現實的軍事衝突則有望實現。
元宇宙技術在軍事訓練中的應用不僅可以避免訓練中的人員意外傷亡,還可以讓單一或眾多參訓者在足不出戶,無需實際接觸便可在不同虛擬環境下完成訓練任務。而這種非接觸式訓練在新冠疫情的常規化形態下,所扮演的角色更加明顯。
三、軍事訓練元宇宙的潛在風險
元宇宙在很大程度上雖然為軍事訓練提供技術支撐,但絕不能僅僅將其簡單地理解為一種訓練項目,或者被認為是一種開展訓練的手段。即使元宇宙技術為軍事訓練帶來便利和創新,也不能忽視科技本身及其伴生的挑戰和不確定性。
元宇宙技術發展或引發安全問題。元宇宙是一個龐大的技術群,其體系架構、核心演算法和沈浸技術等尚處於不斷開發的階段,配套產業、價值共識、管理標準等還沒有達成,總的來說,元宇宙還是一個新事物,在軍事訓練中的應用更是如此。儘管使用虛擬訓練系統能夠在一定程度上減少傷亡,但值得思考的是這樣的訓練是否能夠真正用於作戰現場,目前仍是一個未知數。而技術在運作中是否夠安全也是一個亟待解決的問題。虛擬城市訓練專家公司的詹姆斯·克勞利指出,電腦能力可能是其中最有影響力的部分,除非可以將延遲降低到不會讓人不適並且感覺真實的程度,除非可以在不同的模擬器中儲存不同人之間的行動和通訊數據,否則將無法提供實用的訓練工具。同時,另一個擺在眼前的挑戰則是在開放的元宇宙虛擬世界中,不同國家軍隊之間相互接觸的安全問題。
虛擬訓練環境易造成認知錯覺。元宇宙世界裡的軍事訓練是人類智力和技術較量的結果,在虛擬環境下進行的戰爭推演、軍事訓練等對未來戰爭的作用,如同「核武」一般,不用動用實槍實彈也能起到強大的威懾效果。儘管在生理層面彌補了人的有限感官,同時也帶來了受訓者在心理上的認知錯覺。以無人作戰的軍事訓練為例,長期在虛擬系統下進行作戰訓練,將會造成操縱者的遊戲心態。由於視聽感官與真實戰場情況脫節,而疏離了現實的人與社會,對於剝奪他人生命的行為產生麻木心態。隨著元宇宙技術的不斷成熟,虛擬世界、現實世界的互動將會越來越緊密,形成虛實難分的混合世界。到那時,不僅對士兵的認知心理造成區分困境,對於未來的軍事訓練也是重大挑戰。
元宇宙「去中心化」與傳統軍事訓練結構相背離。在元宇宙的世界中,參與各方都是經過電腦處理、資料化後產生的地位平等的虛擬主體,可以在元宇宙中自主活動,因而其追求「去中心化」。但傳統的軍事訓練組織結構則是高度集中、自上而下的分層化管理,這一方面與元宇宙的價值需求是背離的。美軍在追求“去中心化”作戰上做出了很多努力,如20世紀90年代提出的“網絡中心戰”,以及當前的分散式殺傷以及馬賽克戰等。但傳統的軍事訓練結構和思維慣性仍然是「去中心化」的阻力,而這種情況普遍存在於各國軍隊。
尤瓦爾·赫拉利在《人類簡史》中談道,人類靠著的是虛構和想像的能力征服世界。元宇宙給了我們虛構和想像的能力,同時元宇宙在軍事訓練領域的不確定性也增加了恐懼的成分。因此,我們必須關注創新科技理論、發展元宇宙前沿科技,不斷激發軍事訓練元宇宙的潛力,同時完善相關法律法規和道德倫理規約,為打贏未來智慧化戰爭做好超前準備。
版權聲明:本文刊於2023年1期《軍事文摘》雜誌,作者:張愷悅、李傑春,如需轉載請務必註明「轉自《軍事文摘》」。

中國軍事原文來源:https//www.81it.com/2023/0321/14167.html

Chinese Military Analysis on the Application of Metaverse in Military Communication

中國軍事分析虛擬宇宙在軍事通訊的應用

現代英語翻譯:

Abstract: Metaverse, as an innovative concept of the clustering effect of advanced technologies, will become the key to future media content production and cognitive advantage. Looking forward to the development prospects of Metaverse, this article explains the concept of Metaverse and analyzes its development prospects, key technologies and practical applications, aiming to provide reference for the application of Metaverse in the field of military communication.

Keywords: Metaverse; Military Communication; Development Prospects

The Metaverse has become a hot topic that people are competing to talk about, and has been selected as one of the “Top Ten Internet Terms of 2021”. Globally renowned Internet companies from Facebook to ByteDance are all planning the Metaverse. The 2022 Russia-Ukraine conflict was called a “public opinion war” and “cognitive war” with various means by domestic and foreign public opinion experts. Some experts even exclaimed that cognitive domain warfare in the form of the Metaverse has begun. The Metaverse, as an innovative concept of the clustering effect of advanced technology, will become the key to future media content production and gaining cognitive advantages. Exploring the application of the Metaverse in the field of military communication has become an important topic in the era of omnimedia.

1. The special functions of the metaverse determine its broad development prospects

Metaverse was born in the 1992 science fiction novel Snow Crash. The Metaverse described in the novel is a virtual shared space parallel to the real world. According to relevant information, as early as 1990, Qian Xuesen had a vision of virtual reality and Metaverse, and gave it a very meaningful name – “Spirit Realm”. Four years later, Qian Xuesen specifically mentioned: “Spirit Realm technology is another technological revolution after the computer technology revolution. It will trigger a series of changes that will shock the world and must be a major event in human history.” Qian Xuesen had already foreseen that Metaverse-related technologies would bring profound changes to human society.

From originating from science fiction to entering reality, the industry has not yet reached a consensus on the definition of the metaverse. According to the research of relevant experts, the essential characteristics of the metaverse are two: virtual-real integration and immersive experience. Virtual-real integration means that the boundary between the digital world and the physical world gradually disappears, and the economy, life, assets and identity of the two worlds are fully integrated. Immersive experience means that people’s two-dimensional audio-visual experience of the Internet is expanded into a three-dimensional, immersive, full-sensory experience. The special functions of the metaverse determine its broad development prospects.

The Metaverse is the next generation of the Internet. Looking back at the development of the Internet, from PC Internet to mobile Internet, the sense of immersion when using the Internet has gradually increased, and the distance between virtual and reality has gradually shortened. Under this trend, the Metaverse, where both immersion and participation have reached their peak, may be the “ultimate form” of the Internet. Regarding the future development of the Metaverse, some experts predict that: in terms of hardware terminals, with the portable development of wearable devices such as VR/AR glasses, their popularity will increase significantly, and people will gradually adapt to and accept the larger visual range and more natural interaction methods brought by new devices; in terms of content ecology and application scenarios, explosive Metaverse content will continue to emerge, and application scenarios will gradually expand. In the Metaverse, user experience has achieved an improvement and transformation from “online” to “presence”, thus entering the “scenario era”.

The metaverse is a new type of holographic medium. With the development of media technology, the presentation of media content has evolved from one-dimensional, two-dimensional to multi-dimensional. The emergence of the metaverse is another revolution in communication media after radio, television, and the Internet. From the perspective of user experience, the metaverse not only expands the user’s experience space, but also brings an immersive experience of “you are not just watching the content, you are in it as a whole”. From the perspective of media products, a large number of “we are on the scene” news media products will appear in the metaverse. The media products of the metaverse will achieve the advancement of news content with immersive narratives. For example, major sudden incident reports, large-scale live events, news documentaries, etc., can make the complete news scene into a digital scene of the metaverse, allowing the audience to enter the scene from various perspectives for experience. From the perspective of communication methods, there are currently four main modes of information communication: mass communication, network communication, social communication, and intelligent communication. The arrival of the new media of the metaverse will enrich the means of information communication in the era of intelligent communication, and “holographic communication” will become possible.

The metaverse is the future battlefield of cognitive domain warfare. The essence of communication media is the communication platform and channel, which is the material basis and main weapon of cognitive narrative in cognitive domain warfare. The 2022 Russia-Ukraine conflict was reported to the world in countless “first-person perspectives”. Both Russia and Ukraine spoke out on online media and social platforms to compete for the dominance of international communication cognitive narrative. As a new type of holographic medium, the metaverse transmits cognition in a full-dimensional, full-system and immersive way. It can shape people’s thinking and cognition more comprehensively, deeply and lastingly, and has immeasurable application value in cognitive warfare. In addition, the metaverse provides a parallel cognitive space that digitally twins real combat scenarios, where cognitive warfare can be efficiently promoted and presented in a panoramic manner.

2. A Preliminary Study on the Application of Metaverse in the Field of Military Communication

Like other new technologies, the metaverse was quickly applied to the field of military communication. The PLA News and Communication Center made a bold attempt and launched the “Holographic Military Newspaper” during the National People’s Congress for three consecutive years. It used technologies such as extended reality and digital construction to show a newspaper full of futuristic atmosphere: you can wear VR glasses to experience the “Holographic Military Newspaper” immersively, or you can watch it through your mobile phone. The “Holographic Military Newspaper” is the first of its kind in the domestic newspaper publishing industry and has been selected as an innovative case of deep integration and development of China’s newspaper industry. During the 2021 National People’s Congress, the center also launched the military media intelligent cartoon virtual person “Xiaojun”, which realized the same-screen interaction between 3D cartoons and real people. In 2022, the center and the Art Department of the PLA Culture and Art Center jointly launched the “2022 Metaverse Military Camp Network Spring Festival Gala”, which used metaverse technology to build a virtual space and interactive platform. Netizens and audiences can enter the three-dimensional virtual space by avatars, visit the performance site, and choose their favorite seats to watch the Spring Festival Gala. They can also interact with the audience around them through language and gestures. Some netizens commented: “It’s so shocking! The literary and artistic light cavalry team expressed it in the form of the metaverse, which shows the advancement of technology!” In addition, the center’s network department also took the lead in launching the public welfare NFT digital collection “Stars Accompany Me to Guard the Border”.

At present, the military-related authoritative media is organizing a team to promote the preliminary research and design of the Metaverse Editorial Department. Looking at the development process from traditional news editorial departments to intelligent editorial departments, combined with the advanced technology and future development of the Metaverse, experts have proposed the concept of “Metaverse Editorial Department”, that is, “Metaverse Editorial Department” enables editors and reporters at multiple locations to efficiently complete planning, interviews, editing, publishing and other tasks “face to face” in the same virtual space, the same chain of command, and the same work system. This will be the evolution of the news editorial department in the future. Each editor and reporter has his or her own virtual workspace. When there is a need for a meeting discussion, they can instantly travel to the virtual conference room for “face-to-face” communication.

3. Thoughts on how to win the cognitive war in the metaverse

A major feature of the 2022 Russia-Ukraine conflict is the deep involvement of social media. Mobile Internet has become the main source of information related to this conflict. As mentioned earlier, the special functions of the metaverse determine its broad development prospects. How to win the cognitive war in the metaverse urgently requires us to think forward-lookingly.

Strive to achieve the autonomy and control of the core technologies of the future metaverse. As a pioneering and innovative frontier field, the metaverse has huge initial R&D costs and requires long-term and continuous high investment to achieve the docking and unification of massive standards and specifications and the connection and interaction of ultra-large-scale users. This also leads to the inherent monopoly gene of the metaverse. At present, American companies such as Facebook, Google, and Microsoft, with the support of their governments and military, have deeply laid out the metaverse, and are very likely to become the technology monopolist and ruler of the future metaverse, just like the current situation of the Internet. In this Russia-Ukraine conflict, these technology giants “one-sidedly” pointed their spearheads at Russia, restricted or even banned Russia from using its technology products, and provided support for the United States to impose comprehensive sanctions. This warns us that in order not to be constrained in technology in the future, we should concentrate the superior forces of the military and the local area, aim at the metaverse technology, work together to tackle key problems, and strive to achieve the autonomy and control of the core technologies of the future metaverse.

Develop a metaverse platform that adapts to cognitive warfare. Developing a metaverse platform that is autonomous, controllable, has a wide coverage, and has a great influence is the key to winning in the cognitive domain battlefield in the future. Back to the Russia-Ukraine conflict, in order to suppress Russia from public opinion, American social platforms such as YouTube, Twitter, and Facebook, at the instruction of the US officials, directly restricted the exposure of Russian media. It can be said that they have taken advantage of the platform at the cognitive warfare level. This requires us to actively think about the future form of military communication platforms, develop metaverse platforms that adapt to cognitive warfare, and strive to create explosive products. For example, launching a metaverse version of the military’s new media platform.

We should speed up the production and accumulation of immersive content suitable for the era of the Metaverse. In addition to the traditional visible content types, content creation in the Metaverse era has also added a large amount of three-dimensional content, including panoramic shooting, digital twins of the real world, artificial construction of virtual space, and the display of virtual digital people. It is an issue that needs to be considered at present to speed up the production and accumulation of immersive content suitable for the era of the Metaverse. For example, the creation of digital history museums, the creation of heroic virtual people, the reproduction of classic battles, etc., can truly make history “perceptible” and make cultural relics “speaking”. In addition, the independent research and development of content creation tools is also critical.

國語中文:

摘 要:元宇宙作為先進技術群聚效應的創新概念,將成為未來媒體內容生產、贏得認知優勢的關鍵。展望元宇宙發展前景,本文闡釋了元宇宙概念,並圍繞其發展圖景、關鍵技術和實踐應用進行闡釋分析,旨在為元宇宙在軍事傳播領域的應用提供借鑒參考。

關鍵字:元宇宙;軍事傳播;發展前景

元宇宙,目前成為人們競相談論的熱門話題,並入選了「2021年度十大網路用語」。從Facebook到位元組跳動等全球知名網路公司都在版面元宇宙。 2022年的俄烏衝突被國內外輿論戰專家稱作是一場手段多樣的“輿論戰”“認知戰”,有專家甚至驚呼元宇宙形態下的認知域作戰拉開了序幕。元宇宙,作為先進技術群聚效應的創新概念,將成為未來媒體內容生產、贏得認知優勢的關鍵。探尋元宇宙在軍事傳播領域的應用,成為全媒體時代一門重要課題。

一、元宇宙的特殊功能決定了其廣闊的發展前景

元宇宙(Metaverse),誕生於1992年的科幻小說《雪崩》。小說中所描述的元宇宙是一個平行於現實世界的虛擬共享空間。根據相關資料顯示,早在1990年,錢學森就對虛擬實境與元宇宙有過展望,並為其起了個頗有意境的名字—「靈境」。 4年後,錢學森特別提到:「靈境技術是繼電腦科技革命之後的另一場科技革命。它將引發一系列震撼全世界的變革,一定是人類歷史中的大事。」錢學森當時就已預見元宇宙相關技術將對人類社會帶來的深層變革。

從源自科幻到走進現實,業界對於元宇宙的定義還沒能達成共識。根據相關專家的研究,認為元宇宙的本質特徵是兩個:虛實融合和沈浸體驗。虛實融合,就是數位世界和實體世界的邊界逐漸消失,實現兩個世界的經濟、生活、資產和身分認同等全方位的融合。沉浸體驗,就是人們對網路的二維視聽體驗拓展為三維立體、沉浸式的全感官體驗。元宇宙的特殊功能決定了其廣闊的發展前景。

元宇宙是下一代互聯網。回顧網路的發展歷程,從PC互聯網到行動互聯網,使用網路時的沉浸感逐漸提升,虛擬與現實的距離也逐漸縮短。在此趨勢下,沉浸感和參與度都達到高峰的元宇宙或是網路的「終極形態」。對於元宇宙的未來發展,有專家預計:硬體終端方面,隨著VR/AR眼鏡等穿戴設備的便攜化發展,其普及程度將大幅度提高,人們逐漸適應和接受新設備帶來的更大的視覺範圍和更自然的互動方式;內容生態及應用場景方面,爆款元宇宙內容將不斷湧現,應用場景也將逐步拓展。在元宇宙中,使用者體驗實現了從「線上」到「在場」的提升和轉變,從而進入「場景時代」。

元宇宙是新型全息媒介。隨著媒介技術的發展,媒體內容的呈現方式從一維、二維到多維不斷演進。元宇宙的出現,是繼廣播、電視、網路之後傳播媒介的另一次革命。從使用者體驗來看,元宇宙不僅拓展了使用者的體驗空間,也帶來了「你不只是觀看內容,你整個人就身在其中」的沉浸式體驗。從媒體產品來看,元宇宙將出現大量「我們在現場」式的新聞媒體產品。元宇宙的媒體產品將以沉浸式敘事實現新聞內容的進階。例如,重大突發事件報導、大型現場活動、新聞紀錄片等,可以將完整的新聞現場做成元宇宙的一個數位場景,讓觀眾以各種視角進入現場進行體驗。從傳播方式來看,目前,訊息傳播主要有4種傳播模式:大眾傳播、網路傳播、社交傳播、智慧傳播。元宇宙新型媒介的到來將使得智慧傳播時代訊息傳播的手段更為豐富,「全像傳播」成為可能。

元宇宙是認知域作戰的未來戰場。傳播媒介實質就是傳播平台和管道,是認知域作戰中認知敘事的物質基礎和主要武器。 2022年的俄烏衝突以無數「第一視角」的方式向全球報道,俄烏雙方都在網路媒體和社群平台發聲,爭奪國際傳播認知敘事主導權。元宇宙作為新型全像媒介,其傳導認知的方式是全維度、全系統和沈浸式的,能夠更全面、更深入、更持久地塑造人的思維認知,具有不可估量的認知戰應用價值。另外,元宇宙提供了一個將現實作戰場景數位孿生的平行認知空間,在這裡認知戰得以高效率推進和全景式呈現。

二、元宇宙在軍事傳播領域的應用初探

和其他新技術的產生一樣,元宇宙也很快被應用於軍事傳播領域。解放軍新聞傳播中心進行了大膽嘗試,連續3年在全國兩會期間推出的“全息軍報”,運用擴展現實、數字構建等技術,展示了一份充滿未來氣息的報紙:可以佩戴VR眼鏡沉浸式體驗“全息軍報”,也可以透過手機觀看。 「全像軍報」是國內報紙出版業的首創,入選了中國報業深度融合發展創新案例。 2021年全國兩會期間,該中心還推出軍媒智慧卡通虛擬人“小軍”,實現了3D卡通與現實人物的同屏互動。 2022年,該中心和解放軍文化藝術中心文藝部共同推出的“2022年元宇宙軍營網絡春晚”,利用元宇宙技術搭建虛擬空間和互動平台。網友觀眾化身虛擬人即可進入立體虛擬空間,參觀演出現場,並自行選擇喜好的座位觀看春晚,還可以跟著周圍的觀眾進行語言和手勢互動。有網友評價:「太震撼了!文藝輕騎以元宇宙的形式表現,真是科技在進步!」另外,該中心網絡部還率先推出了公益性NFT數字藏品《星星伴我守邊防》。

目前,軍隊相關權威媒體正在組織團隊推進元宇宙編輯部的前期研究和設計。縱觀傳統新聞編輯部到智慧編輯部的發展歷程,結合元宇宙先進技術和未來發展,專家提出了「元宇宙編輯部」的概念,即「元宇宙編輯部」使多點位的編輯記者在同一虛擬空間、同一指揮鏈、同一工作體系裡「面對面」有效率地完成規劃、訪談、編輯、發布等工作。這將是未來新聞編輯部的進化形態,每個編輯記者都擁有各自的虛擬工作空間,當有會議討論需求時,可以瞬間穿越到虛擬會議室進行「面對面」交流。

三、如何在元宇宙中打贏認知戰的思考

2022年俄烏衝突的一個主要特徵,是社群媒體的深度參與。行動互聯網成了這次衝突關聯資訊的主要來源。如前所述,元宇宙的特殊功能決定了其廣闊的發展前景。如何在元宇宙中打贏認知戰,迫切需要我們做前瞻性思考。

努力實現未來元宇宙核心技術的自主可控。元宇宙作為開拓性和創新性的前沿領域,前期研發成本龐大,需要長期且持續的高額投資,以實現大量標準規範的對接統一、超大規模用戶的連結互動。這也導致了元宇宙具有內在壟斷基因。目前,Facebook、Google、微軟等美國公司在其政府和軍方的支持下,深入佈局元宇宙,極大可能成為未來元宇宙的技術壟斷者和統治者,就像現在互聯網的情況一樣。在這次俄烏衝突中,上述這些科技巨頭「一邊倒」地將矛頭對準俄羅斯,限制甚至禁止俄羅斯使用其科技產品,為美國實施全面製裁施壓提供了支撐。這警告我們,為了將來在技術上不被掣肘,應該集中軍地優勢力量,瞄準元宇宙技術,協力攻關,努力實現未來元宇宙核心技術的自主可控。

發展適應認知戰的元宇宙平台。開發自主可控、覆蓋範圍廣、影響力大的元宇宙平台,是未來在認知域戰場上取得勝利的關鍵。回到俄烏衝突中,為了從輿論上打壓俄羅斯,YouTube、Twitter和Facebook等美國的社群平台在美國官方的授意下,直接限制了俄羅斯媒體的曝光率,可以說在認知戰層面佔盡了平台優勢。這就需要我們主動思考未來軍隊傳播平台型態,開發適應認知戰的元宇宙平台,努力打造爆款產品。例如,推出軍隊新媒體平台的元宇宙版本等。

抓緊生產與累積適合元宇宙時代的沉浸式內容。元宇宙時代的內容創作除了傳統可見的內容類型外,還大量增加了三維內容,包括全景拍攝、真實世界的數位孿生、虛擬空間的人工構建、虛擬數位人的展示等等。抓緊生產和累積適合元宇宙時代的沉浸式內容,是當前需要重點考慮的問題。例如,製作數位史館、打造英雄虛擬人、復現經典戰例等等,真正實現讓歷史「可感知」、讓文物「會說話」。另外,內容創作工具的自主研發也很關鍵。

(作者單位:解放軍新聞傳播中心網絡部)

中國軍事資源:https://www.81.cn/rmjz_203219/jsjz/2022nd5q_242715/tbch_242721/10193529.html

Metaverse-enabled military training is on the rise for China’s People’s Liberation Army

中國人民解放軍元宇宙軍事訓練正在興起

現代英語:

The metaverse is an artificial online virtual world that is born out of, parallel to, and independent of the real world. It is parallel to the real world, reacts to the real world, and integrates a variety of high technologies. These are the three major characteristics of the future metaverse. The operation of the metaverse conforms to the natural laws of human understanding and transformation of the world, providing a new way of thinking to understand and discover the operation behavior, state, and laws of complex real systems, as well as a new means to explore objective laws and transform nature and society. Researching the application of the metaverse in the field of foreign military training and analyzing the opportunities and challenges that the metaverse brings to the field of military training have important theoretical and practical value in solving the key problems that need to be solved in military training in the intelligent era, promoting scientific and technological training, and promoting the innovative development of military training models.

Background of cognitive metaverse empowering military training

The scientific and technological revolution has given rise to a new ecosystem for military training. Driven by the new scientific and technological revolution and the industrial revolution, cutting-edge technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things are accelerating their development. Technology giants are laying out the metaverse, and human real life is migrating to the virtual world more rapidly. The metaverse integrates a variety of emerging technologies, thus generating new Internet applications and new social forms that integrate the virtual and the real. Perception technology supports the integration of the virtual and the real in the metaverse, “AI+” technology supports the social nature of the metaverse, data transmission technology supports the real-time nature of the metaverse, electronic game technology supports the diversity of the metaverse, digital twin technology supports the sustainability of the metaverse, and blockchain technology supports the security of the metaverse. The future metaverse, where virtuality and reality are highly interconnected, is born out of, parallel to, and independent of the real world. It integrates all elements such as the Internet, virtual reality, immersive experience, blockchain, and digital twins to build a new basic ecology for intelligent military training.

The evolution of war dominates the transformation and upgrading of military training. With the advent of the intelligent era, the war form is accelerating its evolution towards informationization and intelligence. The informationized warfare system with “information acquisition and utilization as the core” will gradually transition to an intelligent warfare system with “intelligent simulation and expansion as the core”. The trend of long-range precision, intelligence, stealth, and unmanned weapons and equipment is more obvious, and intelligent warfare has surfaced. At the same time, combat elements represented by artificial intelligence such as “AI, cloud, network, group, and terminal” and their diversified combinations have formed a new battlefield ecology. The metaverse has built a new battlefield space where virtual and real are integrated and parallel and interactive. The traditional war winning mechanism is being profoundly changed. The development and change of intelligent warfare has compulsorily driven the transformation and reshaping of the military’s thinking and concepts, requiring the acceleration of the transformation and upgrading of military training, paying more attention to the impact of technological development and changes on war, and using the “new engine” of training and war to run out of the “acceleration” of preparation.

Foreign militaries explore breakthroughs in military training models. In order to seize the strategic commanding heights of military intelligence, the world’s military powers attach great importance to the innovation of military training models, and some countries have begun to try to apply the metaverse and related technologies in military training. For example, the United States has successively released the “National Security Strategy”, “National Defense Strategy” and “Department of Defense Transformation Plan”, focusing on building an “all-round army” and forming a “full spectrum advantage”. At the same time, it has formulated the “Training Transformation Strategic Plan” and “Training Transformation Implementation Plan”, and proposed the concept of comprehensive training environment (STE), the core of which is immersive and integrated virtual training, which intends to integrate real-time, virtual, constructive and game environments into a comprehensive training environment. Russia also attaches great importance to the development of virtual training systems. Almost all of its advanced weapons and equipment are equipped with corresponding virtual training systems, and are developing in the direction of universalization and embedding. The United Kingdom, Germany, South Korea, etc. are also actively developing various professional military training virtual environments. Intelligent training supported by technologies such as artificial intelligence, virtual reality and augmented reality is gradually becoming the mainstream of military training research in powerful countries.

Clarify the advantages of metaverse-enabled military training

Sprouting new concepts of military training. Only by leading opponents in thought can we gain the upper hand in action. The emergence of disruptive technologies will inevitably rewrite the current military training rules and systems, and will also innovate the existing military training thinking concepts. On the one hand, the metaverse has set off a hurricane-like “brainstorm”, and the training thinking led by “intelligence” will organically connect training with actual combat, and upgrade to intelligent military training thinking. On the other hand, new technologies and new means represented by the metaverse empower military training, strengthen the concept of winning by science and technology and intelligent driving, and greatly improve the scientific and technological content of military training, in order to control the initiative in future wars. The future metaverse will create more impossible possibilities by constructing a virtual battlefield space, designing wars and evolving wars.

Innovate new theories of military training. War is the area that needs innovation the most. Military training must adapt to the development of intelligent warfare, and theoretical innovation and training practice must be driven by two wheels. Training transformation will not happen automatically. It requires not only a sharp and profound foresight to grasp the general trend, but also a scientific and powerful solid theory to drive forward. On the one hand, by keeping up with the development of the times and starting from new concepts and new cognitions, we can build a scientific theoretical system for metaverse-enabled military training. On the other hand, by following the laws of combat-training coupling, we can establish an intelligent military training theory innovation model with the characteristics of the times, so that the metaverse can empower and improve the efficiency of promoting the iterative development of military training transformation.

Transform the new model of military training. The combat style determines the training mode. Intelligent warfare changes the “rules of the game”. Military training for the next war must adapt to the requirements of future wars by changing the training mode. The first is to be able to build an intelligent blue army with “both form and spirit”. With the help of optimized AI technology, powerful computing support, and realistic performance simulation, the Metaverse follows the evolutionary process of “knowing the enemy, imitating the enemy, surpassing the enemy, and defeating the enemy” to create an intelligent blue army with platform support and data empowerment, and carry out “real” confrontation training and effect evaluation in the Metaverse space. The second is to be able to carry out new domain and new quality combat training. The metaverse expands the practical application path with new domains and new types of combat forces as the leading elements, highlights the research and development of training methods and tactics that are compatible with advanced combat concepts and winning mechanisms, and creates new types of training such as unmanned and seamless human-machine collaboration, becoming a new point of combat power growth. Third, it can cultivate new military talents. At present, the educational metaverse has led the intelligent transformation of education. In the future, the military metaverse will accelerate the realization of intelligent interaction between people and equipment, deep integration between people and systems, and adaptive evolution between people and the environment, and promote the integrated development of “commanders” and “fighters” to “scientists” and “technicians”.

Reshape the new ecology of military training. The multi-dimensional perception, virtual-real integration, free creativity, and open development of the metaverse will make the future metaverse a fully immersive, time-transcending, self-creating and developing space. First, create a digital twin “battlefield metaverse”. The “battlefield metaverse” will be a typical manifestation of the metaverse in the military field, with stricter security and confidentiality standards, stronger simulation computing capabilities, and more real-time and detailed interaction requirements. Secondly, create a full-dimensional three-dimensional metaverse training environment. The metaverse uses technologies such as virtual reality, augmented reality, and mixed reality to create an immersive and complex scene environment; using powerful data and network support, it builds a full-dimensional space such as land, sea, air, space, electricity, and the Internet. Furthermore, build a metaverse verification platform for weapons and equipment. The platform will have functions such as new weapon equipment design demonstration, weapon equipment performance test, weapon equipment compatibility test, and weapon system combat effectiveness test. In the future, the metaverse will greatly shorten the timeline of weapons and equipment from “weak intelligence” to “strong intelligence” and then to “super intelligence”, and realize the intelligent multiplication effect of weapons and equipment.

Grasp the key points of metaverse empowered military training

Focus on top-level design. From the perspective of the development of things, the metaverse, as a new thing, has yet to be verified to mature. Intelligent military training is also a complex, arduous and long-term system engineering, which requires strengthening strategic planning and top-level layout. We should pay close attention to the development and technological trends of the metaverse, scientifically formulate the development plan of the “training metaverse”, and give full play to the outstanding advantages of the metaverse in allowing trainees to immerse themselves in experiential training under the realistic background of the integration of intelligence, informatization, and mechanization, so that the metaverse can not only be a display platform for virtual technology, but also a practical platform for improving the effectiveness of military training.

Strengthen technology research and development. From a technical perspective, the metaverse re-integrates the existing technologies in the information and intelligent technology group, puts forward an overall innovative concept, and provides a comprehensive application scenario, thereby giving birth to new vitality. To accelerate the development of the “training metaverse”, we must speed up the research on basic software and hardware technologies such as algorithm engines and network communications, strengthen the research and development capabilities of core technologies such as artificial intelligence, digital twins, blockchain, and the Internet of Things, and at the same time strengthen the overall technical design and development of the metaverse, such as immersion, sociality, openness, collaboration, and decentralization.

Create training types. From the perspective of time and space, the metaverse may construct an extremely large virtual war space, reproduce the war environment, present the war process, and virtualize the future of war. An intelligent military training operation system based on the metaverse should be constructed, the military training thinking concept should be updated in a timely manner, and innovations in military training models, management guarantees, and legal mechanisms should be deepened. Construct a dynamic and high-level combat-oriented military training environment based on the metaverse to fully support strategic, campaign and tactical training and war games. At the same time, in the process of “intelligent adaptation” of military training, realize the expansion of wisdom and intelligent evolution towards the unknown space of military training with “innovation, openness, multiple iterations, and new intelligent ecology”.

Pay attention to risk prevention and control. From the perspective of safety and controllability, the concept and technology of the metaverse bring innovative opportunities for intelligent military training, but what cannot be ignored is the potential risks associated with the technology itself. The Metaverse is a huge technology complex, and its system architecture, key technologies, and application environment are still in the development and implementation stage. The supporting protection system, safety technology, and management standards will bring security risks. In addition, the integrated application of multiple emerging technologies during the construction process, as well as the complexity and confidentiality of the application process, will be unknown factors that will be the key prevention and risk challenges of the Metaverse in military training.

繁體中文:

元宇宙是脫胎於、平行、獨立於現實世界的人造線上虛擬世界,與現實世界平行、反作用於現實世界、多種高技術綜合,是未來元宇宙的三大特徵。元宇宙運行符合人類認識世界、改造世界的自然規律,提供了理解和發現現實復雜系統運行行為、狀態和規律的全新思維方式和探知客觀規律、改造自然和社會的新手段。研究元宇宙在外軍軍事訓練領域的運用,剖析元宇宙在軍事訓練領域帶來的機遇與挑戰,對破解智能化時代軍事訓練亟待解決的關鍵問題,推動科技強訓,促進軍事訓練模式創新發展,具有重要理論和實踐價值。

認知元宇宙賦能軍事訓練的背景

科技革命催生軍事訓練嶄新生態。在新科技革命和產業革命推動下,人工智慧、大數據、雲端計算、物聯網等前沿科技加速發展,科技巨頭紛紛佈局元宇宙,人類現實生活更快速向虛擬世界遷移。元宇宙整合多種新興技術,從而產生出虛實相融的互聯網新應用與社會新形態。感知技術支撐元宇宙的虛實相融性,「AI+」技術支撐元宇宙的社會性,數據傳輸技術支撐元宇宙的實時性,電子遊戲技術支撐元宇宙的多樣性,數字孿生技術支撐元宇宙的永續性,區塊鏈技術支撐元宇宙的安全性。虛擬與現實高度互通的未來元宇宙,脫胎於、平行於、獨立於現實世界,將互聯網、虛擬現實、沉浸式體驗、區塊鍊及數字孿生等全要素融合,為智能化軍事訓練構建起全新基礎生態。

戰爭演進主導軍事訓練轉型升級。智能化時代到來,戰爭形態加速向資訊化智能化演變,以「資訊獲取利用為內核」的資訊化戰爭體系,將逐漸過渡至以「智慧模擬與拓展為內核」的智能化戰爭體系,武器裝備遠程精確化、智慧化、隱身化、無人化趨勢更明顯,智慧化作戰浮現。同時,以「AI、雲、網、群、端」等人工智慧為代表的作戰要素及其多樣化組合,構成了新的戰場生態,元宇宙構建出虛實融生、平行互動的戰場新空間,傳統的戰爭制勝機理正被深刻改變。智慧化戰爭形態發展變化,強制性驅動軍隊思維理念的變革重塑,要求加快實現軍事訓練轉型升級,更加重視科技發展變化對戰爭的影響,以練戰「新引擎」跑出備戰「加速」。

外軍探索開啟軍事訓練模式突破。為搶佔軍事智慧化戰略制高點,世界軍事強國高度重視軍事訓練模式創新,有的國家開始嘗試應用元宇宙及相關技術運用在軍事訓練方面。如美國先後發布《國家安全戰略》《國家防務戰略》和《國防部轉型計劃》,圍繞打造“全能型軍隊”、形成“全頻譜優勢”,同步製定了《訓練轉型戰略計劃》和《訓練轉型實施計劃》,並提出了綜合訓練環境(STE)理念,其內核是沉浸式、集成虛擬訓練,擬將實時、虛擬、建設性和遊戲環境整合到綜合培訓環境中。俄羅斯也高度重視虛擬訓練系統開發,其先進武器裝備幾乎都配有相應虛擬訓練系統,並且正朝著通用化和嵌入化方向發展。英國、德國、韓國等也都積極發展各種專業軍事訓練虛擬環境。以人工智慧、虛擬現實與增強現實等技術為支撐的智慧化訓練,正逐漸成為強國軍隊訓練研究的主流。

明晰元宇宙賦能軍事訓練的優勢

萌發軍事訓練新理念。在思想上領先對手,才能在行動上贏得先機。顛覆性技術的出現必將改寫現行的軍事訓練規則制度,也必將革新現有的軍事訓練思維理念。一方面,元宇宙掀動颶風式的“頭腦風暴”,以“智”引領的練兵思維將訓練與實戰有機銜接起來,升級成智能化軍事訓練思維。另一方面,以元宇宙為代表的新技術新手段賦能軍事訓練,強化科技制勝、智慧驅動理念,大幅提升軍事訓練科技含量,以期掌控未來戰爭主動權。未來元宇宙透過構設虛擬戰場空間,設計戰爭並演化戰爭,將創造出更多不可能的可能性。

創新軍事訓練新論。戰爭是最需要創新的領域。軍事訓練要順應智慧化戰爭發展,理論創新與訓練實踐必須雙輪驅動。訓練轉型不會自動發生,既需要敏銳而深邃的前瞻性眼光把握大勢,更需要科學而強大的堅實理論驅動前行。一方面,緊跟時代發展,從新觀念新認知出發,可以建構元宇宙賦能軍事訓練的科學理論體系。另一方面,遵循戰訓耦合規律,可以建立具有時代特色的智慧化軍事訓練理論創新模式,讓元宇宙為推進軍事訓練轉型迭代發展賦能提效。

變革軍事訓練新模式。作戰樣式決定著訓練模式,智慧化戰爭改變著“遊戲規則”,預演下一場戰爭的軍事訓練必須通過變革訓練模式,來適應未來戰爭要求。一是能夠建造「形神兼備」的智慧藍軍。元宇宙藉由優化的AI技術、強大的算力支撐、逼真的效能仿真,依照「知敵、像敵、超敵、勝敵」的演化進程,打造以平台支撐、數據賦能等綜合整合的智能藍軍,並在元宇宙空間進行「真實」的對抗訓練和效果評估。二是能夠開展新域新質作戰研練。元宇宙拓展新域新質作戰力量為主導要素的實戰化運用路徑,突顯與先進作戰概念、制勝機理相適應的訓法戰法的研練,開創無人化、人機無縫協同等新樣式訓練,成為新的戰鬥力增長點。第三是能夠培養新型軍事人才。當前,教育元宇宙已經引領了教育智慧化變革。未來軍事元宇宙將加速實現人與裝備智慧互動、人與體系深度融合、人與環境適應進化,推動「指揮者」「戰鬥員」向「科學家」與「技術家」融合發展。

重塑軍事訓練新生態。元宇宙的多維感知性、虛實融合性、自由創造性、開放發展性等特點,使未來元宇宙將成為完全沉浸式的、超越時空的、自我創造發展的空間。首先,打造數字孿生的「戰場元宇宙」。 「戰場元宇宙」將是元宇宙在軍事領域的典型表現形態,具有更嚴格的安全保密標準、更強大的仿真計算能力、更實時的精細交互要求。其次,創造全維立體的元宇宙訓練環境。元宇宙運用虛擬現實、增強現實以及混合現實等技術,創造沉浸複雜的場景環境;利用強大的數據、網絡支撐,搭建起陸、海、空、天、電、網等全維空間。再者,建造武器裝備的元宇宙驗證平台。該平台將具備新型武器裝備設計論證、武器裝備性能試驗、武器裝備相容性試驗、武器系統體係作戰效能檢驗等功能。未來元宇宙將大幅縮短武器裝備從「弱智」到「強智」再到「超智」的時間軸,以實現武器裝備的智慧倍增效應。

掌握元宇宙賦能軍事訓練的重點

著重頂層設計。從事物發展上看,元宇宙作為新生事物,發展成熟尚待驗證。智慧化軍事訓練又是一項複雜、艱巨且長期的系統工程,需要加強戰略籌劃與頂層佈局。應密切關注元宇宙發展動向與技術趨勢,科學制定「訓練元宇宙」的發展規劃,在智慧化、資訊化、機械化「三化」融合的現實背景下,充分發揮元宇宙能讓受訓者沉浸式體驗式訓練等突顯優勢,讓元宇宙不能只是虛擬技術的展示平台,而應成為提升軍事訓練效益的實踐平台。

加強技術研發。從技術意義上看,元宇宙把資訊化智能化技術群中已有的技術重新整合到了一起,提出了整體性創新性概念,給出了綜合性的應用場景,從而煥發出了新的生命力。加速「訓練元宇宙」的發展,要加速演算法引擎、網路通訊等基礎軟硬體技術研究,強化人工智慧、數字孿生、區塊鏈、物聯網等核心技術的研發能力,同時也要加強沉浸性、社交性、開放性、協作性、去中心化等元宇宙整體性技術設計與研發。

創設訓練種類。從時空視角來看,元宇宙可能構造出龐大無比的虛擬戰爭空間,重現戰爭環境,呈現戰爭進程,虛擬戰爭未來。應建構基於元宇宙的智慧化軍訓運行體系,及時更新軍事訓練思維理念,深化軍事訓練模式、管理保障、法規機制等創新。建構基於元宇宙的動態高階的實戰化軍事訓練環境,全面支持戰略、戰役和戰術訓練以及戰爭推演。同時,在軍事訓練「智適應」運作過程中,實現拓展生慧,向「創新開放、多元迭代、新智生態」的軍事訓練未知空間智能演進。

重視風險防控。從安全可控上看,元宇宙概念與技術為智慧化軍事訓練帶來創新機遇,但不容忽視的是技術本身伴生的潛在風險。元宇宙龐大的技術群,其體系架構、關鍵技術和應用環境等尚處於開發落地階段,配套防護體系、安全技術、管理標準等都會帶來安全風險,加上建設過程中多種新興技術的整合運用,運用過程中的複雜性與保密性,都將是軍事訓練元宇宙重點防範與風險挑戰的未知數。

來源:中國軍網-解放軍報 作者:侯春牧 王勇 責任編輯:於雅倩 發布:2024-01-16

中國軍事資料來源:https://www.81.cn/yw_208727/16280588.html

Chinese Military Considerations for the Effective Use of Evidence in Public Opinion Warfare During Cognitive Domain Operations

中國軍事在認知域作戰中有效運用證據進行輿論戰的思考

翻譯成現代英文:

 In the operational chain of public opinion warfare in the cognitive domain, the collection and application of evidence is a fundamental link of great value, and is an important starting point for the preparation of cognitive domain construction at all levels. Combining the special background of public opinion warfare in the cognitive domain to study evidence, accurately grasp its characteristics and laws, continuously study strategies and usage, and improve the effective application of evidence in public opinion warfare in the cognitive domain, it is of great reference significance for our army to fight the proactive battle of public opinion warfare in the cognitive domain in the future.

Keywords: cognitive domain; public opinion warfare; evidence

With the formation of the three major operational dimensions of the modern information battlefield, namely the physical domain, information domain and cognitive domain, cognitive domain operations have received increasing attention in the context of future intelligent hybrid warfare. Cognitive domain operations refer to a type of operations that directly acts on the brain’s cognition through special means to influence its emotions, motivations, judgments and behaviors, and even achieve the purpose of controlling the brain. As a cognitive carrier, the brain may become the main battlefield of future wars, and the right to control the brain will soon become the key to cognitive domain operations and the highest level of war control. In this sense, cognitive domain operations are cognitive confrontation actions that influence the decision-making and behavior of the target audience by influencing their cognition in order to achieve the strategic goals of national security. In the meantime, evidence has become an important factor affecting cognition, and evidence game is a basic link that must be paid attention to in planning and implementing public opinion warfare in the cognitive domain. According to the general consensus of the legal community, evidence refers to the basis for determining the facts of an event in accordance with the rules of litigation. The evidence of public opinion warfare referred to in this article is derived from this. It can be seen that only by grasping evidence more accurately and timely and using evidence more prudently and appropriately can we more effectively destroy the enemy’s cognition, consolidate our own cognition, and shape the cognition of neutral forces, and provide effective support for the comprehensive victory of public opinion warfare in the cognitive domain.

1. A deep understanding of the three values ​​of evidence in the public opinion war in the cognitive domain is the prerequisite for the effective use of evidence

Information is the basic “ammunition” of public opinion warfare in the cognitive domain. As one of the ammunition, evidence has great value and can be examined from the following three dimensions.

1. Evidence is an indispensable cognitive weapon in the public opinion war in the cognitive domain and has fighting value.

To examine the evidence of public opinion warfare in the cognitive domain is to explore the essence of fact-finding in public opinion warfare from the cognitive level. The cognitive domain takes the human brain as the main combat space. Evidence, as a trace left by a certain “past fact”, undoubtedly exists regardless of whether people can find it. However, some evidence is specially proposed and emphasized at certain times, and its purpose must be to prove certain facts, cater to certain views, and influence certain attitudes. In fact, it is the process of proving the subject’s own cognition shaping, viewpoint presentation and value dissemination. With the help of the cognitive justification theory of contemporary epistemic evidentialism, it is demonstrated that there is an unignorable logical connection between belief attitude and cognitive justification: the epistemological rationality of belief attitude depends on the quality of evidence possessed by the believer at that time. It can be said that the value of evidence in public opinion warfare in the cognitive domain is highly consistent with the weapon context of informationized cognitive warfare. High-quality evidence can influence cognition in a high-quality manner and is an indispensable and irreplaceable weapon of struggle. This “basis of proof” is not only a spear and a sharp sword to strike and change the enemy’s cognition and make cognitive attacks in the public opinion warfare in the cognitive domain, but also a solid shield to guide and consolidate one’s own cognition and make cognitive protection.

(II) Evidence is the basis for the value guidance of public opinion warfare in the cognitive domain and has guiding value

Authenticity is the essential characteristic of facts, but not the essential characteristic of evidence. Evidence is not equivalent to objective facts. It can be said that there are no false facts, but there are false evidence. According to the rules of evidence law, facts proved by evidence are possible facts, not necessarily inevitable. The result it produces may be a “wrong” result, but this so-called “wrong” is still a legitimate result in legal procedures. To be precise, although it is wrong, it is legitimate. Based on this dialectical logic, the evidential facts recognized by public opinion warfare in the cognitive domain are not equivalent to objective facts in themselves, and there may be differences between the evidential facts and objective facts. Evidence may be true or false, or half true and half false. It does not pursue an absolutely true and correct result, but a “legitimate” result that can influence cognition. Through these cognitive elements presented in the form of evidence, because of the “legitimate” label, they are more persuasive and authoritative, and have the guiding value of influencing cognition and behavior.

(III) Evidence is the basis for completing the special mission of public opinion warfare in the cognitive domain and has winning value

As the basis for completing the special mission of public opinion warfare in the cognitive domain, the winning value of evidence should not be underestimated. First, the effective use of evidence can minimize the deviation in factual characterization of public opinion warfare in the cognitive domain. By sorting out and integrating evidence materials, making clear logical connections between scattered and multi-perspective evidence, constructing a chain of evidence that is favorable to us and pointing to clear factual characterization, we can accurately associate and interpret objective facts. Preventing cognitive bias and passive public opinion caused by unclear and inaccurate factual characterization can improve the accuracy and clarity of fact identification. Secondly, the effective use of evidence can minimize the strategic decision-making cost of public opinion warfare in the cognitive domain. As the saying goes, words are not enough. Without the effective support of evidence, public opinion warfare in the cognitive domain will be separated from the objective basis for the generation of combat effectiveness and become a complete self-talk. Its strategic decision-making efficiency will inevitably decrease and the decision-making cost will inevitably soar. Third, the effective use of evidence can minimize the legal risk of public opinion in the cognitive domain. The main sources of legal risks in the cognitive domain of public opinion are the deviation of values, the lack of legitimacy, and the indifference of humanitarianism… In this regard, through scenario pre-setting, targeted evidence lists, active storage of evidence materials, and reasonable and rational construction of the use of evidence, we can achieve a certain degree of risk warning, risk avoidance, and risk resolution.

2. Accurately grasping the three major shifts of evidence in the public opinion war under the cognitive domain is the key to the effective use of evidence

Compared with the physical and information domains, evidence in the cognitive domain presents distinct characteristics in the public opinion war. In terms of the purpose of proof, it guarantees the realization of policy and strategic goals and serves the political intention of the public opinion war in the cognitive domain; in terms of the means of proof, truth and falsehood are often intertwined, creating many situations where the truth and falsehood are unclear; in terms of the content of proof, it must be able to clearly, conclusively and promptly prove the justice and legality of our actions and the meaninglessness and illegality of the enemy. It is mainly reflected in three changes.

1. Shifting from “restoring the truth” to “influencing cognition” and highlighting cognitive attributes with goal orientation

In the public opinion war under the cognitive domain, the fundamental purpose of evidence has shifted from “approaching the truth, restoring facts, and promoting objective scene reconstruction” to “influencing the cognition of the target audience and realizing national security interests”. From the initial objective basis for reflecting the battlefield situation to the powerful weapon of public opinion war under the cognitive domain, it is neither simply an objective fact to be proved nor just a material and means to prove facts. Evidence in the public opinion war under the cognitive domain must have a clear position. Before proving, it is necessary to first clarify whose point of view is proved? Whose facts are proved? Whose interests are protected? It is absolutely impossible to be value-free without its basic position. Evidence serves political purposes and strategic intentions, guides the target audience to move towards the established cognitive goals, and accepts, identifies, and shapes the corresponding argumentation conclusions. Its collection and use are all determined by strategic determination, combat intentions, and battlefield situation. Whether it is true or false, good or bad, it must serve the overall strategic situation and needs to be judged in combination with combat effectiveness.

2. Shifting from “raw collection” to “scientific compilation” to assist cognitive decision-making with intelligent means

Cognition is the process of actively processing information, including three links: information input, processing and output. Corresponding to the evidence action of public opinion warfare in the cognitive domain, it is to collect evidence, analyze and compile evidence, and make decisions and use evidence. It must be recognized that the public opinion warfare in the cognitive domain in the digital era is essentially a strategic action to manipulate information and shape cognition in the public opinion field, and the quality requirements of evidence materials are more stringent. If there is insufficient understanding of evidence, and evidence collection is simply regarded as taking photos and recording scenes, it is far from meeting the requirements of the new digital cognitive domain public opinion battlefield environment. It must be assisted by intelligent means and transformed into scientific evidence collection, analysis and compilation. Scientific evidence can, to a certain extent, get rid of human dependence on experience consciousness, eliminate the ambiguity, fragmentation and one-sidedness of human cognition under certain conditions, and assist cognitive domain combat commanders to make more accurate command decisions. In reality, there is indeed a phenomenon that the evidence is true, but the cognition generated is false. Only through a series of intelligent compilation work such as collection, classification, compilation, comparison, verification, reasoning, judgment, and integration of evidence information perceived across the entire domain, and using the scientific presentation of evidence to influence cognition in a targeted manner, can the process of evidence information fusion and command decision-making results be made corresponding and unified, making accurate decision-making the key to winning the war of public opinion in the cognitive domain.

3. Shift from “objective presentation” to “emotional resonance” to prove quality and improve cognitive effectiveness

In the cognitive domain, it is far from enough to simply record objective phenomena as evidence in the public opinion war. It also needs to have special guidance and appeal in order to form a strong communication power and influence, aiming to stimulate certain emotions of the target audience and trigger specific cognition. It is necessary to shift from “objective presentation” to “emotional resonance”. Only by awakening the empathy experience of the target audience through sophisticated and appropriate evidence presentation can the expected proof effect be produced. For example, a bloody knife cannot directly support or oppose any proposition by itself. Unless someone perceives the knife, forms a feeling state, and associates it with other evidence, it can produce a proof effect. Therefore, the evidence of public opinion warfare in the cognitive domain must be perceptible. Whether it is true evidence or false evidence, these evidences are not responsible for restoring the truth of the facts, nor are they used only to prove the legality or illegality of a certain action or behavior. They are intended to shock the target audience with thoughts and generate emotional waves, and play cognitive effects such as shaking the morale of the army, inspiring morale, gaining support from many people, inspiring sympathy, guiding public opinion, and breaking the enemy’s spirit, ensuring that the reason can be said and spread. Otherwise, no matter how good the proof logic is, its effectiveness will be greatly reduced due to the lack of communication and appeal, and it may even be ineffective in the fierce cognitive game.

3. Innovative evidence in the three ways of public opinion warfare in the cognitive domain is the path to effective use of evidence

In the public opinion war in the cognitive domain, evidence is sometimes an offensive weapon, sometimes a means of deterrence, and sometimes a tool for bargaining… How to cleverly deploy troops and gain the initiative on this battlefield? It is necessary to judge the situation, deeply study the techniques, present accurately, and implement them purposefully, systematically, and strategically. According to the logical order of evidence participation from weak to strong, the understanding of evidence from shallow to deep, and the evidence tactics from passive to active, there are three ways to use evidence: objective, directional, and strategic.

1. Attaching importance to the objective use of evidence in public opinion warfare in the cognitive domain

Evidence has incomparable persuasiveness, and public opinion warfare in the cognitive domain must attach importance to speaking with evidence. The most basic approach is to solidly promote the objective collection and use of evidence. First, it is necessary to discover and extract evidence from a large amount of materials to preliminarily solve the problem of evidence admissibility. Secondly, the evidence collected must withstand the test and judgment of public opinion warfare in the cognitive domain to solve the problem of evidence availability. The basic logical line of evidence collection and use is: objectively obtain evidence materials – based on the acquired evidence materials, sort out, match, integrate, and analyze which existing evidence materials can prove objective facts that have an impact on cognition – solve the problem of “what can be proved”. If objective evidence collection is not done well, it is easy for the enemy to take it out of context, generalize, and even confuse right and wrong. On the one hand, through the objective presentation of original evidence, the illegality and provocation of the other party’s behavior are exposed, the legitimacy and justice of our actions are explained, the truth of the incident is intuitively and powerfully clarified, and the psychological defense of the other party is effectively disintegrated, the other party’s fighting will is shaken, and a strong psychological offensive and deterrence effect is formed; on the other hand, it effectively boosts our military morale, inspires fighting spirit, and enhances psychological protection in the cognitive battlefield. In short, we must strive to objectively make good use of “real evidence that can gain the initiative” and expose “false evidence in the hands of evidence dealers.”

2. Strengthening the guiding use of evidence in public opinion warfare in the cognitive domain

It is necessary to fully realize that the probative value of evidence needs to be realized through interpretation, which leaves sufficient space for guiding the collection and use of evidence in the public opinion war under the cognitive domain. On the basis of the objective collection and use of evidence, through more proactive reverse thinking, another logical line of evidence collection and use can be found: first clarify what facts need to be proved in the public opinion war under the cognitive domain – then consider how to compile and interpret the existing evidence materials in a biased manner according to the demand orientation – solve the problem of “how to interpret and use the evidence materials”. Under the demand-oriented role, by actively presetting the facts to be proved, consciously do a good job of evidence association and effectiveness interpretation. It can be said that the process of compiling objective original evidence is the process of evidence interpretation. Scattered evidence materials, after being fully interpreted and compiled with subjective intentions, will form a closed evidence chain with directionality. These directional evidence products guide the audience from “seeing” evidence to “understanding” evidence, which is a weapon that can influence the generation of combat effectiveness in the public opinion war under the cognitive domain. In fact, the party with a stronger ability to interpret evidence selfishly is often more able to dominate the development of the battle.

3. Strategic Use of Evidence in Public Opinion Warfare under the Design Cognitive Domain

The ultimate target of public opinion warfare in the cognitive domain is cognitive ability, and the dominant factor for winning the battle will naturally shift to cognition. Therefore, the high-skilled use of evidence in public opinion warfare in the cognitive domain must be achieved with the help of the systematic vision and strategic thinking of strategists. The logical line of evidence collection and use here is: consider evidence as an indispensable key element of public opinion warfare in the cognitive domain and incorporate it into the overall strategic planning link – preset a list of key evidence according to different scenarios – actively create conditions to obtain key evidence – solve the problem of “how to achieve the strategic intention and combat determination of public opinion warfare in the cognitive domain from the evidence level”. Under special conditions, even through sophisticated arrangements, with active and proactive “creative design” to lay out the fog of evidence, prompt the enemy to reveal its shortcomings, expose its weaknesses, and make actions and reactions that are beneficial to us, forming a complete and conclusive chain of evidence, so as to achieve the purpose of releasing special information, propaganda against the enemy’s mind, political and diplomatic hints, etc., consume the enemy’s cognitive ability, disrupt its thinking, interfere with its judgment, and hinder its actions. In particular, we must develop an awareness of strategies and tactics in the game of evidence in the context of cognitive domain public opinion warfare, select, choose, combine, assemble, switch among various types of evidence… flexibly deploy and skillfully present them, give full play to the potential of evidence use, contain, curb, and counter enemy actions, and expand our own space for action. The key to applying evidence well lies in one’s heart.

(Author’s unit: Political Science Academy of National Defense University)

中國軍事資料來源:

在認知域下輿論戰的作戰鏈上,證據的採集與運用是有重大價值的基礎環節,也是目前各級認知域建設準備的重要發力點。結合認知域下輿論戰的特殊背景來研究證據,準確掌握其特徵規律,不斷深研謀略用法,提高認知域下輿論戰證據的有效運用,對我軍打好未來認知域下輿論戰主動仗具有重要藉鏡意義。

關鍵字:認知域;輿論戰;證據

隨著現代資訊化戰場物理域、資訊域和認知域三大作戰維度的形成,認知域作戰在未來智慧化混合戰爭背景下越來越受到關注。認知域作戰指透過特殊手段直接作用於大腦認知,以影響其情緒、動機、判斷和行為,甚至達成控制大腦目的的一種作戰樣式。大腦作為認知載體,或將成為未來戰爭主戰場,制腦權即將成為認知域作戰的關鍵所在,是戰爭制權的最高層次。從這個意義上講,認知域作戰是為實現國家安全戰略目的,透過影響目標受眾認知來影響其決策和行為的認知對抗行動。此間,證據已然成為影響認知的重要因素,證據賽局是規劃實施認知域下輿論戰必須重視的基礎環節。依照法學界普遍的共識,證據是指依照訴訟規則認定事件事實的依據。本文所指的輿論戰證據由此引申而來。可見,只有更精準及時掌握證據、更穩妥適當地運用證據,才能更有效地摧毀敵方認知、鞏固己方認知、塑造中立力量認知,為認知域下輿論戰的全面勝利提供有效支撐。

一、深刻認識證據在認知域下輿論戰中的三大價值,是證據有效運用的前提

資訊是認知域下輿論戰的基本「彈藥」。證據作為彈藥之一,具有巨大價值,可從以下三個維度來檢視。

(一)證據是認知域下輿論戰不可或缺的認知武器,具有鬥爭價值

檢視認知域下輿論戰的證據,就是要從認知層面來探究輿論戰事實認定的本質。認知域以人腦為主要作戰空間。證據,作為某種「過去事實」留下的痕跡,不管人們能否發現,它們無疑都是存在的。但某些證據在某些時候被特別提出和強調,其目的必然是為了佐證某些事實、迎合某些觀點、影響某些態度,其實就是論證主體自身認知塑造、觀點呈現和價值傳播的過程。借助當代認知證據主義(Epistemic Evidentialism)的認知證成理論,論證信念態度與認知證成之間存在著不可忽視的邏輯聯繫:信念態度在認識論上的合理程度,取決於相信者當時所擁有的證據的品質。可以說,認知域下輿論戰的證據價值與資訊化認知作戰的武器脈絡高度契合,高品質的證據能夠高品質影響認知,是不可或缺不可取代的鬥爭武器。這種“證明的根據”,在認知域下輿論戰中,既是打擊、改變敵方認知,做好認知攻擊的長矛利劍;也是引導、鞏固己方認知,做好認知防護的堅固盾牌。

(二)證據是認知域下輿論戰價值引導的證明根據,具有導向價值

真實性是事實的本質特性,卻不是證據的本質特性。證據不等同於客觀事實。可以說,沒有假的事實,卻有假的證據。依據證據法則,以證據證明的事實,是一種可能性的事實,不一定具有必然性。它所產生的結果,有可能是“錯誤”的結果,但這種所謂的“錯誤”,在法律程序上仍然是一種正當化的結果。準確地說,它雖然是錯的,但卻是正當的。基於這種辯證的邏輯,認知域下輿論戰認可的證據事實,本身並不等同於客觀事實,其證據事實與客觀事實之間可以存在差異。證據可能是真是假,也可能半真半假,它追求的並不是絕對真實正確的結果,而是一種能夠影響認知的「正當化」結果。透過這些以證據方式呈現出來的認知要素,因為有「正當化」標籤,更具說服力和權威性,具有影響認知和行為的導向價值。

(三)證據是認知域下輿論戰完成特殊使命的基礎,具有致勝價值

作為認知域下輿論戰完成特殊使命的基礎,證據的致勝價值不容小覷。首先,證據的有效運用能夠使認知域下輿論戰在事實定性上偏差最小化。透過對證據素材進行梳理整合,對零散的、多重視角下的證據做明確的邏輯性關聯,構設於我有利的證據鏈和指向明確的事實定性,藉此對客觀事實進行精確性關聯與有效性解讀。防止因事實定性不明、不準造成的認知偏差和輿論被動,能夠提高事實認定的準確性和清晰度。其次,證據的有效運用能使認知域下輿論戰的策略決策成本最小化。所謂口說無憑,脫離了證據的有效支撐,認知域下輿論戰就脫離了戰鬥力生成的客觀基礎,淪為徹頭徹尾的自說自話,其戰略決策效率必將降低,決策成本必將飆升。第三,證據的有效運用能夠使認知域輿論法理風險最小化。認知域輿論法理風險的主要來源是價值觀的背離、合法性的缺失、人道主義的漠視……對此,透過情境預設,有的放矢地列出證據清單,積極儲備證據素材,做好證據運用的合情合理化構建,就能夠實現一定程度的風險預警、風險規避和風險化解。

二、準確掌握證據在認知域下輿論戰中的三大轉向,是證據有效運用的關鍵

相對於物理域、資訊域環境下,證據在認知域下輿論戰呈現鮮明的個性特徵。在證明目的上,保障政略與戰略目標實現,服從服務於認知域下輿論戰的政治意圖;在證明手段上,往往真偽交織,製造許多真真假假、真偽不明的情況;在證明內容上,要能明晰、確鑿、及時地證明我方行動的正義、合法和敵人的無義、非法。主要體現在三個轉變。

(一)從“還原真相”轉向“影響認知”,以目標導向凸顯認知屬性

認知域下輿論戰,證據的根本目的從「接近真相、還原事實、促進客觀情境再現」轉向了「影響目標受眾認知,實現國家安全利益」。從最初反映戰場情況的客觀根據,到認知域下輿論戰的強大武器,它既不單純是用來證明的客觀事實,也不僅僅是用來證明事實的材料和手段。認知域下輿論戰的證據必然是帶有鮮明立場的。證明前先要明確證明誰的觀點?佐證誰的事實?維護誰的利益?絕不可能脫離其基本立場而價值無涉,證據以服務政治目的和戰略意圖為己任,引導目標受眾向既定認知目標邁進,接受、認同、塑造相應的論證結論。其採集與運用,都是由戰略決心、作戰意圖、戰場態勢來決定的,到底是真是假,是好是壞,都必須服從服務於戰略大局,需要結合作戰效果加以評判。

(二)從「原始採集」轉向“科學整編”,以智慧手段輔助認知決策

認知是對資訊進行積極加工的過程,包括資訊輸入、加工和輸出三個環節。對應到認知域下輿論戰的證據行動中,就是收取採集證據、研判整編證據和決策運用證據。必須體認到,數位時代認知域下輿論戰,實質是在輿論場上進行資訊處理與認知塑造的戰略行動,對證據素材的品質要求更嚴苛。如果對證據認識不足,把取證簡單看作為是拍照錄影、記錄現場,已經遠遠不能適應新的數位化認知域輿論戰場環境的要求了。必須以智慧手段為輔助,向科學的證據蒐集、研判整編轉化。科學的證據,可以在一定程度上擺脫人類對經驗意識的依賴,消除人在一定條件下認知的模糊性、零散性和片面性,輔助認知域作戰指揮員進行更精準的指揮決策。現實中確實存在證據為真,但產生的認知卻為假的現象。只有透過對全局感知的證據資訊進行收集、分類、彙編、對比、驗證、推理、判斷、整合等一系列智能整編工作,以證據的科學呈現來定向影響認知,才能將證據信息融合的過程和指揮決策結果相對應、統一,使精準決策成為認知域下輿論戰制勝的關鍵。

(三)從“客觀呈現”轉向“情感共振”,以證明品質提升認知效能

認知域下輿論戰證據,僅作為客觀現象的簡單記錄是遠遠不夠的,還需要具有特殊的引導性、感染力,以便形成較強的傳播力和影響力,意在激發目標受眾的某種情感、引發特定認知,要從「客觀呈現」轉向「情感共振」。只有透過精巧適度的證據呈現來喚醒目標受眾的同理心體驗,才能產生預期的證明效果。例如,一把帶血的刀,其本身並不能直接支持或反對任何命題,除非有人感知到了這把刀,形成了感覺狀態,並將其與其他證據相關聯,才能產生證明效力。所以,認知域下輿論戰的證據必須是要能夠感知的。無論是真證據或假證據,這些證據不以還原事實真相為己任,也並非僅用來證明某行動或行為的合法性或非法性,其意在使目標受眾受到思想衝擊、產生情感波瀾,起到如動搖軍心、激勵士氣、得道多助、激發同情、引導輿論、破敵銳氣等認知效果,確保有理說得出、說了傳得開。否則再好的證明邏輯也會因傳播力、感染力的缺失,導致證明效果大打折扣,甚至在激烈的認知賽局中無法產生效能。

三、創新證據在認知域下輿論戰的三種用法,是證據有效運用的路徑

認知域下輿論戰,證據有時是進攻的武器、有時是嚇阻的手段、有時是博弈的工具……如何巧妙地在這片沙場上排兵布陣、贏取主動?必須審時度勢、深研技法、精準呈現,有目的、有計畫、有策略、成系統地實施。依照證據參與度由弱到強、對證據認識由淺入深、證據戰法由被動到主動的邏輯順序,有客觀性、導向性、謀略性三種運用證據的方式。

(一)重視認知域下輿論戰證據的客觀性運用

證據有著不可比擬的說服力,認知域下輿論戰必須重視用證據說話。最基礎的做法是紮實推進證據的客觀性採集與運用。首先,需要在海量素材中發現並提取證據,初步解決證據可採性的問題。其次,採到的證據要經得起認知域下輿論戰實踐檢驗和評判,解決證據可用性的問題。基礎的證據採、用的邏輯線是:客觀取得證據素材—基於取得的證據素材,梳理、配對、整合,分析現有證據素材能夠證明哪些是對認知產生影響的客觀事實—解決「能夠證明什麼」的問題。客觀取證做不好,就容易被敵方斷章取義,以偏概全,甚至混淆是非。一方面,透過原始證據的客觀呈現,揭露對方行為的非法性、挑釁性,闡釋我方行動的合法性、正義性,直觀有力地澄清事件真相,有效瓦解對方心理防線、動搖對方戰鬥意志,形成強大的心理攻勢與嚇阻效能;另一方面,有效提振我方軍心士氣、激發戰鬥精神,增強認知戰場的心理防護。總之,要力求在客觀上用好“能夠贏取主動的真證據”,揭露“證據販子手裡的假證據”。

(二)加強認知域下輿論戰證據的導向運用

要充分認識到,證據的證明價值需要透過解讀來實現,這給認知域下輿論戰的取證、用證留下了充分的引導空間。在證據的客觀性採集與運用基礎上,透過更主動的逆向思考,可以發現另外一條證據採、用的邏輯線路:先釐清在認知域下輿論戰中需要證明哪些事實—再根據需求指向,考慮如何對既有證據材料進行傾向性整編和解讀—解決「如何闡釋、利用證據素材」的問題。在需求導向作用下,透過主動預設想要證明的事實,有意識做好證據關聯和有效性解讀。可以說,客觀性原始證據整編的過程就是證據闡釋解讀的過程。零散的證據素材,經過注入主觀意圖的充分解讀和整編組合,就會形成帶有指向性的閉合證據鏈。這些導向證據產品引導受眾從「看見」證據到「看懂」證據,就是能夠影響認知域下輿論戰戰鬥力生成的武器。事實上,對證據利己性解讀能力較強的一方,往往更能主導戰局發展。

(三)設計認知域下輿論戰證據的謀略性運用

認知域下輿論戰最終打擊的目標是認知能力,作戰制勝的主導要素會自然地向認知轉移。因此,證據在認知域下輿論戰的高技巧運用,必須藉助戰略家的系統眼光和謀略思維來實現。這裡證據採、用的邏輯線是:把證據視為認知域下輿論戰不可或缺的關鍵要素納入整體策略規劃環節—依據不同場景預設關鍵證據清單—主動製造條件來取得關鍵證據—解決「如何從證據層面實現認知域輿論戰的戰略意圖和作戰決心」的問題。在特殊條件下,甚至可以透過精巧的安排,以積極主動的「創意設計」佈設證據迷霧,促使敵方自揭其短,暴露弱點,做出於我有利的動作反應,形成完整確鑿的證據鏈條,以達成特殊訊息釋放、對敵攻心宣傳、政治外交暗示等目的,消耗敵方認知能力,打亂其思維、幹擾其判斷、阻礙其行動。特別要形成認知域輿論戰背景下的證據博弈謀略戰法意識,在各類證據間選擇、取捨、組合、拼搭、切換……靈活投放、巧妙呈現,充分發揮證據運用的潛能,牽制、遏止、反制敵方行動,拓展己方行動空間,可謂運用之妙,存乎一心。

(作者單位:國防大學政治學院)

中國軍事資料來源: https://www.81.cn/rmjz_203219/jsjz/2022nd3q_239302/bktg_239303/1016888.html