Category Archives: Chinese Military Views – 中國軍事觀

China’s PLA Secret Military Information Troop Strategy //中國軍隊揭秘我军首支战略支援部队

《 人民日报 》( 2016年01月24日 )

中国解放军事科学院_lit

China’s People’s Liberation Army in 2016, a new combat force joins the PLA combat organization, it will become an important growth point of China’s  military combat capability and key strength leading to decisive nature of future wars…Secret military first team strategy support troops

December 31, 2015, and the Army leadership organization, listed with rocket forces, strategic support troops officially unveiled the PLA’s “family”!

“Strategic Support Unit is to safeguard the national security of the new combat forces, is an important qualitative growth of our military combat capability.” Chairman Xi Jinping stressed that the establishment of strategic support troops, military help to optimize the structure, improve the comprehensive support capabilities.Strategic support troops to adhere to system integration, civil-military integration, and strive to achieve leapfrog development in key areas, starting point to promote high standards of combat forces to accelerate the development of new, integrated development, strive to build a strong, modern strategic support units.

This is exactly what the troops support? Where highlights? Inception, the soldiers doing? Recently, this reporter approached the strategic support units, truly feel this nascent boom strong army troops.

“Without a high degree of integration, there will be no joint operations”

What is the strategic support? Case before us:

May 2011, the US military killed Osama bin Laden’s operations for the armed forces around the world a vivid lesson. On the surface, is the two “Black Hawk” helicopters and 24 “seal” commando on a mission, but behind it has a huge support system: Several pieces of reconnaissance and communications satellites, one responsible for real-time transmission and radio listening stealth unmanned reconnaissance missions, more aerial cover for the war to be F / A-18 fighter, an aircraft carrier battle groups responsible for strategic support, two of the five Central Asian bases and command centers, as well as various support guarantee ten thousand personnel……

This small-scale operations, major systems supporting combat style, demonstrating the winning mechanism of modern warfare. Information leading, system support, elite combat, joint victory, has become the basic characteristics of modern warfare.

“Strategic Support Unit is to support the battlefield, to ensure smooth operations, it is an important force in joint operations.” Military experts briefed reporters, figuratively speaking, strategic support troops for the army to provide accurate and reliable information to support efficient and strategies support guarantee, propped army system “information umbrella” that will blend action and armed with rocket forces, and throughout the war always, is the key to winning the war power.

“Without a high degree of integration, there will be no joint operations.” Strategic support units formed at the beginning, tightly pegged to the bottleneck restricting military joint operations in order to organize the work of planning military research started around how to understand the task, how construction and development, and how a good beginning in a higher starting point, different organizations Category troops, military leaders and experts in related fields, extensive research and discussion exchange, on major issues troop positioning functions, organization and structure, leadership and command system and other ongoing research and feasibility studies.Recently, the main leaders also dispatched military forces to the relevant units, mass fighting around the new generation to carry out special investigations.

Civil-military integration is the information war “nature.” According to statistics, the First World War, the number of industries involved in the development of weapons and equipment technology categories to ten dollars; World War II, extended to hundreds; to the Gulf War, it is in the thousands. In recent years, the proportion of military special technology United States, Britain, France, Germany, Japan and other developed countries, more and more low, while military and civilian technology for more than 80%, the construction of military information technology for more than 80% are from the civil information systems.

Around the realization of civil-military integration, strategic support units proposed aspects from planning, mechanisms, resources, projects, and talent continue to promote the use of the depth of integration. New Year’s a start, force planning construction of a number of strategies, many military enterprises, scientific research institutions, experts figure has emerged, based on a unit, for the country, strong army service, “says think-tank” on the horizon.

“Accelerate the cultivation of new mass combat capability, create new combat forces.”

In the 21st century, the new military revolution shock avalanche. Especially with the continuous breakthroughs in information, intelligence, invisible, nanotechnology and other emerging technologies strategy, the new combat forces into a military capability leapfrog development “growth pole”, a new military power to compete, “darling.”

Public information, the United States set up space combat troops, built a Cyber ​​Command under the jurisdiction of 100,000 troops, to create the world’s largest network warfare forces. Russia’s integration with the Air Force Space combat forces to establish air and space forces, formed a network warfare command structure and the forces. British promoter cutting-edge network warfare units “77th Brigade”, specializing in “unconventional information warfare” by Facebook website platform. Japan through the “Basic Universe” speed up the process of militarization of space, and actively organize a “cyberspace defense team.”

Faced with surging wave of this new revolution in military affairs, who insight into the initiative, who will win in the future. Chairman of the Central Military Commission Xi and decisive decision-making, the formation of strategic support units, to create a new type of war to safeguard national security forces, and the quality of our military combat capability as an important growth point.

Around accelerate the cultivation of new mass combat troops established a technology weaponization of power systems, the ability to combat the direction of development, to enter the combat readiness as an index, advancing step by step actual combat capacity building.

Military construction focus to the war, the work to fight hard. Reporters in an interview that the strategic support units, at all levels of urgency in order to focus on reform, promote transformation, many feel accustomed to the keyboard and mouse of science and technology experts put training uniform, embarked on a parade ground. He has been shelved, parked in the research paper, was taken to the test site and the development of weapons and equipment training ground troop maneuvers, become a new quality to enhance the operational capability of the “multiplier.”

It is understood that a unit of strategic support troops adhere to seek a breakthrough in the prospective, pilot, exploration, disruptive technology, research and development of a new type of combat equipment has passed the preliminary assessment, damage the effectiveness of the equipment reached the international advanced level.

“Only innovation, to seize the strategic high ground military competition”

This year New Year period, strategic support military leaders by telephone, video and checking to your combat troops on duty. From the deep ocean to mountain forests, from the Gobi desert to the border of the motherland, the troops together full member, combat readiness, to meet the troops in combat roles established.

As a safeguard national security, new combat forces, strategic support troops to innovation as a source of power to seize the strategic high ground of military competition, cohesion innovative new combat forces in combat theory, organizational form and mode of development.

On the organizational form of innovation, focusing on a new command structure, strengthen research and exploration of new combat forces woven patterns and leadership and command relationships. Focus to achieve leapfrog development, troops raised to operational requirements for traction, with technological breakthroughs driven, problem-oriented Forced to compete for the development of model approaches beyond, out to chase style, imitative development of passive situation.

“The best way to maintain peace, in accordance with their own terms to redefine the war.” Focus on accelerating the transformation of troops functions, and actively adapt to the mission mandate expansion, strategic support troops keep up with world trends of new military revolution, advance planning the layout of the new combat forces, to establish their own led “war rules” to achieve asymmetric competitive advantage.

Reporters in an interview that the strategic support units, to the troops from the authorities, from the laboratory to the training ground, a “brainstorming” is being rolled rushes –

A unit organized the workshop, big data, cloud computing, 3D printing, a new term nanotechnology often blurted out in the discussion. Graduated from a prestigious university, Dr. Young told reporters a firm voice, “the military planning and preparation is always tomorrow’s war, and even the day after the war.”

In this interview, the reporter for the officers and soldiers often high-spirited spirit, sharp shock of forward thinking on the future of this nascent force confidence.

Orriginal Mandarin Chinese:

2015年12月31日,与陆军领导机构、火箭军一同挂牌,战略支援部队正式亮相中国人民解放军的“大家庭”!

“战略支援部队是维护国家安全的新型作战力量,是我军新质作战能力的重要增长点。”习近平主席强调,成立战略支援部队,有利于优化军事力量结构、提高综合保障能力。战略支援部队要坚持体系融合、军民融合,努力在关键领域实现跨越发展,高标准高起点推进新型作战力量加速发展、一体发展,努力建设一支强大的现代化战略支援部队。

这究竟是支什么样的部队?亮点在哪里?成立之初,官兵们在做些什么?近日,本报记者走近战略支援部队,真切感受这支新生部队的强军热潮。

“没有高度融合,就没有联合作战”

什么是战略支援?案例摆在眼前:

2011年5月,美军击毙本·拉登的作战行动,为世界各国军队上了生动一课。表面看来,是两架“黑鹰”直升机和24名“海豹”突击队员在执行任务,但其背后却有着一个庞大系统在支撑:若干颗侦察和通信卫星、一架担负实时传输和无线监听任务的隐形无人侦察机、多架空中待战掩护的F/A—18战斗机、一支担负战略支援的航母编队、两个中亚基地和五个指挥中心,以及近万名各类支援保障人员……

这种小规模行动、大体系支撑的作战样式,充分展示了现代作战的制胜机理。信息主导、体系支撑、精兵作战、联合制胜,已成为现代战争的基本特点。

“战略支援部队就是支援战场作战,保证作战的顺利进行,它是联合作战的重要力量。”有军事专家向记者介绍,形象地说,战略支援部队为全军提供准确高效可靠的信息支撑和战略支援保障,撑起全军体系的“信息伞”,它将与陆海空和火箭军的行动融为一体,贯穿整个作战始终,是战争制胜的关键力量。

“没有高度融合,就没有联合作战”。战略支援部队组建之初,就紧紧盯住制约我军联合作战的瓶颈,以组织开展军事工作筹划研究起步,围绕如何理解任务、如何建设发展、如何在更高起点上开好局,组织不同类别部队、军地相关领域的领导和专家,广泛开展调查研究和座谈交流,对部队职能定位、编成结构、领导指挥体制等重大问题进行持续研究论证。近日,部队主要领导还分赴军地相关单位,围绕新质战斗力生成开展专题调研。

军民融合是信息化战争的“天性”。据统计,一战时期,武器装备研制涉及的工业行业技术门类数以十计;二战时期,扩展到数以百计;到海湾战争时期,则是数以千计。近些年来,美、英、法、德、日等发达国家军事专用技术比重越来越低,而军民通用技术已超过80%,军队信息化建设80%以上的技术均来自民用信息系统。

围绕实现军民融合,战略支援部队提出,要从规划、机制、资源、项目、运用和人才等方面持续推动深度融合。新年一开局,部队谋划建设的多项战略工程中,已出现不少军工企业、科研院校专家的身影,一座立足部队、面向全国、服务强军的“云智库”初露端倪。

“加速培育新质作战能力,打造新型作战力量”

进入21世纪,新军事革命的冲击波汹涌而来。特别是随着信息、智能、隐形、纳米等战略新兴技术的持续突破,新型作战力量成为军事能力跨越式发展的“增长极”,成为军事强国竞争的新“宠儿”。

公开资料显示,美国组建太空作战部队,建成了下辖10万部队的网络司令部,打造了世界上规模最大的网络战力量。俄罗斯整合空军与航天作战力量建立空天军,组建了网络战指挥机构和部队。英国启动新锐网络战部队“第77旅”,通过脸书网站平台专攻“非常规信息战”。日本则通过《宇宙基本法》加快太空军事化进程,积极组建“网络空间防卫队”。

面对这场新军事革命的汹涌浪潮,谁洞察先机,谁就能赢得未来。习主席和中央军委果断决策,组建战略支援部队,打造维护国家安全的新型作战力量,并将其作为我军新质作战能力的重要增长点。

围绕加速培育新质作战能力,部队确立了技术武器化、力量体系化、能力实战化的发展方向,以进入战备为指标,分阶段推进实战化能力建设。

部队建设向打仗聚焦,各项工作向打仗用力。记者在战略支援部队采访时看到,各级都在以时不我待的紧迫感抓改革、促转型,许多摸惯了键盘鼠标的科技专家穿上了作训服、走上了练兵场。曾经束之高阁、停在纸上的科研成果,被带到了武器装备研制试验现场和部队演习训练场,成为提升新质作战能力的“倍增器”。

据了解,战略支援部队某部坚持在前瞻性、先导性、探索性、颠覆性技术手段上求突破,研发的某新型作战装备已通过初步评估,毁伤效能达到国际同类装备先进水平。

“只有锐意创新,才能抢占军事竞争战略制高点”

今年元旦期间,战略支援部队领导通过电话、视频抽查所属部队作战值班情况。从深山密林到深海远洋,从大漠戈壁到祖国边陲,部队官兵齐装满员、枕戈待旦,在战斗岗位上迎接部队组建。

作为一支维护国家安全的新型作战力量,战略支援部队把创新视为抢占军事竞争战略制高点的动力之源,聚力创新新型作战力量的作战理论、组织形态和发展模式。

在组织形态创新上,着眼新的领导指挥体制,加强对新型作战力量编成模式和领导指挥关系的研究探索。着眼实现跨越发展,部队提出了以作战需求为牵引、以技术突破为驱动、以问题倒逼为导向、以竞争超越为途径的发展模式,摆脱尾追式、模仿式发展的被动局面。

“维护和平的最好方法,就是根据自己的条件来重新定义战争”。围绕加快部队职能转型、积极适应使命任务拓展,战略支援部队紧跟世界新军事革命发展趋势,超前谋划新型作战力量布局,确立自己主导的“战争规则”,实现非对称竞争优势。

记者在战略支援部队采访时看到,从机关到部队,从实验室到演兵场,一场“头脑风暴”正在翻卷奔涌——

某部组织的研讨会上,大数据、云计算、3D打印、纳米技术等新名词不时在讨论中脱口而出。一位毕业自名牌大学的青年博士语气坚定地告诉记者,“军人谋划和准备的,永远是明天的战争,甚至后天的战争。”

在这里采访,记者每每为官兵昂扬的精神面貌、敏锐的前瞻思考所震撼,对这支新生部队的未来充满信心。

 

Source: 《 人民日报 》( 2016年01月24日 )

Chinese Military Cyberspace Deterrence Characteristics // 中國軍隊的浅析网络空间威慑的特征

2016年01月04日

中国人民解放军军事科学院 袁艺

Editor’s Note: When the opposing sides have the ability to ensure the destruction invade other networks, you can bring two-way network containment, the two sides have, under certain conditions, to comply with the network and do not attack the other rules of the game, forming an invisible safety valve, even internationally will form a network and do not attack each other customary agreements or conventions, cyberspace became strategic areas can generate a huge deterrent effect. After following the nuclear deterrence deterrence in cyberspace, they began to enter the strategic vision of the big country politicians and military strategist. Research cyberspace deterrence characteristics, type and use points, a must consideration and necessary action network power, network and strong army.

As human society’s dependence on cyberspace deepening human production and life in cyberspace has become “second class living space” and military confrontation “fifth-dimensional battle space.” States initiative, control over the right to speak about the world of cyberspace in a fierce competition, competition in cyberspace has reached a level of survival, fate of the country and the success of the military struggle of human solidarity. Thinking of cyberspace deterrence capacity building of great practical and theoretical value.

First, analyze the pros and cons of deterrence in cyberspace

Cyberspace deterrence refers to various actions in cyberspace, showing the enemy paralyzed control cyberspace and physical space cross-border control of enemy’s determination and strength through cyberspace to achieve deterrence enemy, the enemy stops, stopping the enemy, stop An enemy form of strategic deterrence purposes. Cyberspace and physical space has compared to the “actual situation biphasic” network warfare, compared with the traditional style of warfare has unique nature determines the advantages and disadvantages of deterrence in cyberspace are very obvious.

Advantages (a) deterrence in cyberspace

Advantages of deterrence in cyberspace, mainly reflected in: First, become more civilized and humane way of deterrence. Compared with nuclear and biological weapons, physical, biological, chemical destruction mechanism-based, direct killing and destruction effects of network warfare weapons is far smaller than the former, usually does not cause permanent damage and pollution of the natural environment, it will not cause a lot of people casualties, and trigger a humanitarian disaster. Second, the cost of deterrence to cost-inefficient. Network warfare weapons to viruses, Trojan horses and other software-based, relatively low cost, low technology threshold, and damage caused by the effect has been amazing. Cyber ​​Defense broad area, are very hard to improve network security level of a grade each input costs increase exponentially. Low-cost network attack and defense of the high cost of network contrast, making the network attack and defense presented “spear shield thin” features, network warfare weapon which is called “poor atomic bomb.” Third, diverse practical means of deterrence. A variety of network warfare weapons, cyber attacks target pluralism, the decision has diverse cyberspace deterrent to choose from. Network attack effect to a certain extent is recoverable, if used properly implemented, the initiation and escalation of the war to promote war risk is relatively small. In a sense, the deterrent value of nuclear weapons is much greater than the actual value, and network warfare weapons is both practical value and deterrent value.Fourth, deterrence using reusable flexibility. “Nuclear threshold” Once across the full nuclear war will break out, both sides in the nuclear balance of mutual destruction will fall into the state, easily a nuclear deterrent against non-nuclear countries in particular, nuclear deterrence, but also lead to international condemnation, these factors which greatly limits the use of the nuclear deterrent. The cyberspace deterrence Flex, controllable power characteristics, which can be determined according to the change and the need for military struggle situation, timely regulatory deterrence strength, the initial use, full use, re-use, and highly flexible.

(B) lack of deterrence in cyberspace

Inadequate deterrence in cyberspace, mainly reflected in: First, the credibility of the deterrent effect has not been fully verified. The credibility of nuclear deterrence has been verified in actual combat. However, until now, the war in the true sense of the network have not really broken out. People cyberwarfare amazing destructive power, more of a speculation and worry, the real power of cyber warfare only after the actual test, we can really convincing. Second, the reliability of the means of deterrence is not too high. Cyberwar is a dynamic process two sides of continuous interaction network attack and defense, the network against complex, highly technical characteristics, determine the effect of cyber warfare attacks with greater uncertainty, there may not achieve the desired objective of the operation, so that the deterrent effect of greatly reduced . For example, when you attack the enemy in cyberspace combat deter enemy if promptly take all effective means of defense, it will increase the difficulty of one’s own cyber attacks and reduce the destructive effect, and even lead to the failure of the attack.Third, deterrence scope for further improvement in controllability. Virus weapons as an important weapon cyber warfare, the spread of resistance, controllability is poor, affecting relatively wide range, it is difficult for the enemy to launch specialized computers and networks, highly targeted attacks. If you can not control its effective scope, it will spread to a third-party neutral countries and even make itself a victim, thus using viral weapons are “legislator” of the suffering. Four is selectively limited deterrence object. Nuclear deterrence for any country is clear and effective, and the degree of information in cyberspace deterrent effect of a great relationship with the enemy. Cyberspace deter high degree of information is extremely effective countries, and for that information infrastructure is weak, not strong network dependent LDCs, the effect is difficult to play, or even completely ineffective. Five is relatively complex organization deterrence implementation. Various nuclear countries in the world are all focused on the implementation of the strategic nuclear forces unified management, command and control of the highly centralized organization and implementation of nuclear deterrence when action can be accurately controlled to each combat unit, very well organized and implemented. The organization and implementation of deterrence in cyberspace, to be involved in reconnaissance, control, prevent, control and other support forces, personnel, large scale, and scattered in different departments and units of the military, the organization is very complex and not easy to form a joint force.

Second, the main type of deterrence in cyberspace

Deterrence in cyberspace there are cyberspace technology test deterrence, deterrence in cyberspace display equipment, network space and cyberspace combat exercise deterrence deterrence four types of operations. Among them, the first three are shown in form of deterrence, the latter is the real deterrent.

(A) technical trial deterrence in cyberspace

Cyberspace technology test of deterrence, is in the field of cyber warfare, regularly carry out new operational concepts early exploratory trials, new attacks and tactical mechanism confirms test results, new technologies weaponization practical tests, and through the media and disclose to demonstrate their strong information technology infrastructure research capabilities, and network warfare capability into the enormous potential to achieve deterrence opponent’s goal. Currently, the network attack and defense technology is still rapid development, a key breakthrough technology, cyberspace and often have a significant impact on operations, or even lead to revolutionary change. Who is the first to occupy the strategic high ground network attack and defense technology, who will be able to achieve significant advantages in the future network warfare.

(B) equipment display deterrence in cyberspace

Cyberspace equipment display deterrence in cyber warfare equipment development plan formulation, technology development, targeting all stages of development testing, stereotypes production, according to the need for appropriate disclosure of network warfare equipment models, performance, features, parameters, and the development schedule, etc., in order to achieve deterrence opponent’s goal. Its methods are mainly two: one is by the defense white paper, diplomatic communiques and newspapers, periodicals, websites and other large-scale public disclosure of authoritative media from official sources, the implementation of explicit deterrence; the other is through a network of social media or other unofficial channels, deliberately leaking equipment relevant circumstances, the implementation of implicit deterrence.Cyberspace equipment display deterrence, one can fictitious new mechanism, the new concept of the new cyber-warfare equipment, and render their unique combat capability; on the other hand can be deliberately exaggerated the combat effectiveness of the existing network warfare equipment. There are virtual reality, real There are virtual, the implementation of a policy of ambiguity, so that the other lost in one’s own truth and strength, fear and psychological fear. For example, the US military’s “chute” airborne network attack system electrical integration has been repeatedly put into practical use, its hostile air defense system of the country pose a serious threat, but the basic principle, the working mechanism, tactical and technical indicators have neither publicly disclosed, nor by his country fully grasp cracks, has been shrouded in secrecy, it is difficult to distinguish the actual situation, it played a very good deterrent.

(C) combat exercise deterrence in cyberspace

Cyberspace exercise deterrence, is the way real soldiers or virtual exercises launched in cyberspace, and through various media channels to combat potential rival to show their cyber capabilities, strength and determination to achieve deterrence opponent’s goal. Cyberspace war exercises and military exercises can be divided into two kinds of virtual exercises. The former is usually the country or jointly with allies, generally joint military exercises in cyberspace defense action-oriented. In recent years, the United States and its allies held a number of “Cyber ​​Storm” series of network warfare exercises, and “Schriever” series of space – cyberspace exercise, a good show cyberwarfare mobilization strength, overall defense level, and the implementation of network warfare determination. The latter is usually the national large-scale integrated network Range held generally exercise the power of the military professional network warfare offensive action-oriented.

(D) operations in cyberspace deterrence

Cyberspace operations deterrence, refers to a particular network targets Attack effect to make sure to deter an actual combat the opponent’s deterrence. The timing of its use are two: First, when one’s own perceived enemy is about to wage war on one’s own, the focus of one’s own choice of enemy defenses against network-critical objectives targeted, preventive, dissuasive deterrence; the second is when the enemy When the party through one’s own network launched probing attacks, the implementation of deterrence in cyberspace, one’s own need for effective retaliatory, punitive deterrence immediately. Network warfare operations deterrent effect of a variety. For example, infiltration and sabotage the enemy telecommunications network, the phone sends a large number of people to its anti-war message enemy; the enemy to attack the power grid, causing the enemy’s major cities short of blackouts; broadcast television network to attack the enemy in one’s own prime-time spots a special video program; and so on.

Third, the use of elements of deterrence in cyberspace

The overall use of cyberspace deterrence requirements are: deterrence of war combined with strength, combat capability and determination to show, and strive to reflect the small war deterrence to ensure deterrence fine fight, with little cost to achieve deterrence purposes. Specifically, you should do the following.

(A) both peacetime and wartime, long-term preparations

“Rome was not built in a day.” The successful implementation of cyberspace deterrence, peacetime and wartime needs, will be carried out in the usual full detailed preparation. First, we must conduct a comprehensive and thorough network reconnaissance. Requires intelligence reconnaissance and surveillance technology, wireless surveillance and reconnaissance wired combined network enemy targets long-term sustainability of the network reconnaissance, and gradually find out the basic situation of the enemy network, draws its network topology map, especially analysis to find out the enemy all kinds of soft Vulnerability hardware system. The second is to carry out a large number of effective strategies presets. Using hacking tools, through the use of loopholes in the system or other measures to decipher passwords, secret penetration into enemy various types of networks, leaving the back door, set the stepping stones, planted logic bombs and Trojans, cyber attacks aside for the future launch breakthrough. Third, pre-network defenses are prepared. When the enemy to implement cyberspace deterrence, adjust the network’s own defense deployment in advance, so that the enemy attack path predesigned expected use of system vulnerabilities to attack the program scheduled to be executed difficult to implement, or to implement greatly reduced, to minimize the enemy Network revenge losses.

(B) careful decision-making, control the intensity

Sun Tzu said: “Lord, not anger and Xingshi, will not be indignant caused the war.” Cyberspace deterrence strategy game behavior between countries, especially real deterrence and sensitivity, we must do rational, beneficial, section, must not because deterrence “threshold” low abuse indiscriminate use, otherwise the effect may be counterproductive . Cyberspace real deterrent to combat the strength of the control of demanding. On the one hand, if the intensity is too small, an enemy government and people will not have fear, not achieve the desired deterrent effect, the person may also take the same means to implement anti-deterrence, eventually leading to confrontation upgrade, make one’s own deterrence fail. On the other hand, if the intensity is too large, to the enemy causing huge economic losses and casualties caused by the international community to condemn and enemy government, people’s hatred, it could lead to the use of conventional enemy forces massive retaliation, even nuclear states might use nuclear power, so not only can not deter war ended, it will play the role of the fuse of war.

(C) unity of command, well-organized

Organization and implementation of deterrence in cyberspace, to centralized command, unified planning, improve collaboration. First, the well-organized force. Unified organization of military reconnaissance, attack, defense, control four forces, actively coordinate military forces the parties to form a joint force cyberwarfare. In particular, to organize and coordinate the civil non-professional cyber warfare forces especially patriotic hackers, can not appear “rashness” phenomenon, so as not to lead to friction, misfires, causing cyber warfare upgrades, or premature disclosure attack intentions, a handle , resulting in uncontrollable situation or action fails. Second, the precise and appropriate choice target. It should affect a wide selection, easy to produce significant deterrent effect of the goal. For example, the ratings ranking of radio and television channels, access to a huge amount of portals, many users of wireless communication networks. You can not select innocuous, the impact was small, the public indifference to attack targets, easily mistaken for network security incidents ordinary hackers manufactured not achieve the desired deterrent effect. Also, consider the constraints of international law and the laws of war, you can not select targets could easily lead to a humanitarian catastrophe, try not to choose the network destination railway, aviation, financial, medical and other sectors, so as not to provoke the international community and other public condemnation and resentment.Third, the precise control of the process. Before implementing cyberspace deterrent against, to issue a warning to the enemy hit by extensive propaganda campaign, declared to the world the justice of one’s own actions, to gain the understanding and support of international public opinion. To highlight the deterrent effect, can one’s own network announced high-profile target enemy to attack, then break the enemy defense layers of the network, implement firm and effective network attacks, and finally, if necessary, but also on the effect of timing recovery network attacks to demonstrate one’s own superb network attack techniques and tools, so that policy makers and the public to produce enemy off guard, overwhelming psychological frustration, thereby forming a strong deterrent effect.

(D) the actual situation, focusing on strategy

Sun Tzu said, “it can and can not be shown, and illustrates it with no”, applied to cyberspace deterrence, summed up the gist of “show undeclared, declared and not shown.” “Show undeclared”, is the use of cyber attacks is difficult to track the location of this, cyber attacks on specific targets, but not announced is that of one’s own, both showing one’s own ability, but also makes the enemy, although suspicion is that as one’s own, But there is no evidence, can not be pursued. “Vision does not show”, it is publicity or inadvertently disclose one’s own research or advanced network warfare equipment fictional models, performance, features, deliberately exaggerate their operational effectiveness, falsehoods, actual situation, make the enemy unable to figure out the true strength of one’s own to produce a deterrent effect. Network warfare operations traceable having difficulty tracing, forensics complex features, the initiator can either admit to be denied, or put the blame on civil hackers.

Original Mandarin Chinese:

编者按:当敌对双方都具有确保侵入破坏对方网络的能力时,就可以带来双向网络遏制,使得双方不得不在一定条件下,遵守互不攻击对方网络的游戏规则,形成一个无形的安全阀,甚至国际上也会形成互不攻击对方网络的惯例协议或公约,网络空间由此成为可以产生巨大威慑效应的战略领域。网络空间威慑继核威慑之后,开始进入大国政治家和军事家的战略视野。研究网络空间威慑的特征、类型和运用要点,成为网络强国、网络强军的必须考量和必要行动。

随着人类社会对网络空间依赖程度的不断加深,网络空间成为人类生产生活的“第二类生存空间”和军事对抗的“第五维作战空间”。世界各国围绕网络空间的主导权、控制权、话语权展开了激烈的争夺,网络空间的竞争已达到与人类生存、国家命运和军事斗争成败休戚相关的程度。思考网络空间威慑能力建设,具有重大现实和理论价值。

一、网络空间威慑的优劣分析

网络空间威慑,是指在网络空间采取各种行动,展示瘫痪控制敌方网络空间,并通过网络空间跨域控制敌方实体空间的决心和实力,从而达到慑敌、止敌、阻敌、遏敌目的的一种战略威慑形式。网络空间与实体空间相比所具有的“虚实二相性”,网络战与传统作战样式相比所具有的独特性,决定了网络空间威慑的优缺点都非常明显。

(一)网络空间威慑的优点

网络空间威慑的优点,主要体现在:一是威慑方式更趋文明和人道。与基于物理、生物、化学杀伤机理的核生化武器相比,网络战武器的直接杀伤和破坏效应要远小于前者,通常不会对自然环境造成永久性破坏和污染,也不会造成大量的人员伤亡,并引发人道主义灾难。二是威慑成本低效费比高。网络战武器以病毒、木马等软件为主,成本相对低廉,技术门槛较低,而造成的破坏效果却相当惊人。网络防御点多面广,防不胜防,要网络安全程度每提高一个等级,投入成本会呈指数级增加。网络进攻的低成本与网络防御的高成本对比鲜明,使得网络攻防呈现“矛尖盾薄”的特点,网络战武器因而被称为“穷国的原子弹”。三是威慑手段多样实用性强。网络战武器多种多样,网络攻击目标多元,决定了有多样化的网络空间威慑手段可供选择。网络攻击效果在一定程度上是可恢复的,只要运用实施得当,引发战争和促使战争升级的风险相对较小。从某种意义上讲,核武器的威慑价值远大于实战价值,而网络战武器则是实战价值与威慑价值兼具。四是威慑运用可重复灵活性强。“核门槛”一旦跨过就会爆发全面核战争,处于核均势的双方将陷入相互摧毁状态,轻易实施核威慑特别是对无核国家进行核威慑,还会招致国际舆论的谴责,这些因素都极大地限制了核威慑手段的使用。而网络空间威慑软硬结合、威力可控的特点,决定了其可根据军事斗争形势的变化和需要,适时调控威慑强度,先期使用、全程使用、反复使用,具有很强的灵活性。

(二)网络空间威慑的不足

网络空间威慑的不足,主要体现在:一是威慑效果的可信性未得到充分验证。核威慑的可信度已在实战中得到了验证。然而,截止目前,真正意义上的网络大战还没有真正爆发过。人们对网络战惊人的破坏力,更多的只是一种猜测和担忧,网络战的真实威力只有经过实战检验后,才能真正令人信服。二是威慑手段的可靠性不太高。网络战是敌我双方网络攻防持续互动的动态过程,网络对抗复杂、技术性强的特点,决定了网络战攻击效果具有较大的不确定性,有可能达不到预期作战目的,使威慑效果大打折扣。例如,对敌实施网络空间实战威慑时,敌方若及时采取各种有效防御手段,就会增加己方网络攻击的难度和降低破坏效果,甚至导致攻击行动的失败。三是威慑范围的可控性需进一步改善。病毒武器作为网络战的重要武器之一,其传播性强、可控性较差、影响范围比较广,很难针对敌国计算机和网络发动专门性、针对性极强的攻击。如果不能控制其有效作用范围,就会波及第三方中立国家,甚至使自身也成为受害者,因而病毒武器的使用有“投鼠忌器”之患。四是威慑对象的可选择性受限。核威慑对任何国家都是明确而有效的,而网络空间威慑的效果与敌国的信息化程度有很大关系。网络空间威慑对信息化程度高的国家极为有效,而对那些信息基础设施薄弱,网络依赖性不强的不发达国家,则很难发挥效果,甚至完全不起作用。五是威慑实施的组织相对复杂。世界各个核国家无不对战略核力量实施集中统管,指挥控制权高度集中,组织实施核威慑行动时可以准确控制到每一个作战单元,组织实施十分周密。而网络空间威慑的组织实施,要涉及侦、控、防、控等多支力量,人员多、规模大,且分散在军地不同部门和单位,组织起来非常复杂,形成合力不易。

二、网络空间威慑的主要类型

网络空间威慑主要有网络空间技术试验威慑、网络空间装备展示威慑、网络空间作战演习威慑和网络空间作战行动威慑四种类型。其中,前三种是示形威慑,后一种是实战威慑。

(一)网络空间技术试验威慑

网络空间技术试验威慑,是在网络战领域,经常性地进行新作战概念的先期探索性试验、新攻击机理和战术的效果印证性试验、新技术的实用化武器化试验等,并通过媒体向外界披露,以展现本国雄厚的信息技术基础研究实力,以及转化为网络战能力的巨大潜力,以达到威慑对手的目的。当前,网络攻防技术仍在快速发展,一项关键性技术的突破,往往会对网络空间安全和作战产生重大影响,甚至引发革命性变化。谁抢先占领了网络攻防技术的战略制高点,谁就能在未来网络战中取得明显优势。

(二)网络空间装备展示威慑

网络空间装备展示威慑,是在网络战装备发展规划制定、技术开发、打靶试验、定型生产等各个发展阶段,根据需要适当披露网络战装备的型号、性能、特点、参数以及研制进度等情况,以达到威慑对手的目的。其方式主要有两种:一种是通过在国防白皮书、外交公报以及报纸、期刊、大型网站等权威媒体从官方渠道公开披露,实施显性威慑;另一种是通过网络社交媒体或其他非官方渠道,刻意泄露装备相关情况,实施隐性威慑。网络空间装备展示威慑,一方面可以虚构新机理、新概念的新型网络战装备,并渲染其独特的作战能力;另一方面可以刻意夸大已有网络战装备的作战效能。虚中有实、实中有虚,实施模糊政策,使对方摸不清己方真实情况和实力,产生恐惧和忌惮心理。例如,美军的“舒特”机载网电一体攻击系统已多次投入实战使用,对其敌对国家的防空体系构成了严重威胁,但其基本原理、工作机制、战技指标既没有公开披露,也没有被他国完全掌握破解,一直处于保密状态,令人虚实难辨,起到了很好的威慑作用。

(三)网络空间作战演习威慑

网络空间作战演习威慑,是以实兵或虚拟的方式在网络空间展开演习活动,并借助各种媒体渠道,向潜在作战对手展现本国网络战能力、实力与决心,以达到威慑对手的目的。网络空间作战演习可分为实兵演习和虚拟演习两种。前者通常在全国范围内或与盟国联合进行,一般以演练军地联合网络空间防御行动为主。近几年来,美国及盟国多次举行“网络风暴”系列网络战演习,以及“施里弗”系列太空-网络空间演习,很好展现了网络战的动员实力、整体防御水平,以及实施网络战的决心。后者通常在国家大型网络综合靶场举行,一般以演练军队专业网络战力量的进攻行动为主。

(四)网络空间作战行动威慑

网络空间作战行动威慑,是指对特定的网络目标实施攻击,以确信的攻击效果来威慑作战对手的一种实战性威慑。其运用的时机有两个:一是当己方觉察敌方即将对己方发动战争时,己方选择敌方重点防御的关键性网络目标进行针对性打击,进行预防性、遏制性威慑;二是当敌方通过对己方发起试探性网络攻击,实施网络空间威慑时,己方应立即进行有效的报复性、惩戒性威慑。具有威慑效果的网络战行动有多种。例如,对敌电信网渗透破坏,向敌国民众手机大量发送宣传反战短信;对敌电力网进行攻击,造成敌重要城市短时间的大面积停电;对敌广播电视网进行攻击,在黄金时段插播己方特制的视频节目;等等。

三、网络空间威慑的运用要点

网络空间威慑总的运用要求是:慑战结合,以实力、实战展示能力和决心,力求以小战体现威慑、以精打确保威慑,以较小的代价实现威慑目的。具体说来,应做到以下几点。

(一)平战结合,长期准备

“冰冻三尺,非一日之寒”。成功实施网络空间威慑,需要平战结合,在平时就要进行充分细致的准备。一是要进行全面周密的网络侦察。要求谍报侦察与技术侦察、无线侦察与有线侦察相结合,对敌网络目标进行长期持续的网络侦察,逐步摸清敌网络基本情况,绘制其网络拓扑结构图,尤其是分析查找出敌各种软硬件系统的漏洞。二是要进行大量有效的战略预置。采用黑客手段,通过利用系统漏洞或口令破译等办法,秘密渗透进入敌各类网络,留下后门,设置跳板机,埋设逻辑炸弹和木马,为未来发动网络攻击预留突破口。三是进行预有准备的网络防御。在对敌实施网络空间威慑时,己方应提前调整网络防御部署,使敌预先设计的攻击路径,预期利用的系统漏洞,预定执行的攻击方案难以实施,或实施效果大打折扣,最大限度地降低敌网络报复造成的损失。

(二)慎重决策,控制强度

孙子曰:“主不可以怒而兴师,将不可以愠而致战”。网络空间威慑是国家之间的战略博弈行为,尤其是实战威慑,敏感性强,必须做到有理、有利、有节,决不能因为威慑“门槛”较低而滥用乱用,否则其效果可能会适得其反。网络空间实战威慑对作战强度控制的要求很高。一方面,若强度太小,敌国政府和民众不会产生畏惧心理,起不到应有的威慑效果,对方还可能采取同样的手段实施反威慑,最终导致对抗升级,使己方威慑失效。另一方面,若强度过大,给敌国造成巨大的经济损失和人员伤亡,引起国际社会的谴责和敌国政府、民众的仇恨心理,就可能引发敌国运用常规力量进行大规模报复,有核国家甚至可能会动用核力量,这样不但不能慑止战争,反而会起到战争导火索的作用。

(三)统一指挥,周密组织

网络空间威慑的组织实施,要集中指挥,统一筹划,搞好协同。一是精心组织力量。统一组织军队侦、攻、防、控四支力量,积极协调军地各方网络战力量形成合力。尤其是要组织和协调好民间非专业网络战力量特别是爱国黑客,不能出现“盲动”现象,以免引发磨擦,擦枪走火,引起网络战的升级,或过早暴露攻击意图,授人以柄,导致局势不可控或行动失败。二是精当选择目标。应选择影响面广,易产生明显威慑效果的目标。例如,收视率排名靠前的广播电视频道、访问量巨大的门户网站、用户众多的无线通信网络等。不能选择无关痛痒、影响面小、民众漠不关心的目标进行攻击,易被误认为是普通黑客制造的网络安全事件,起不到应有的威慑效果。此外,还要考虑国际法和战争法约束,不能选择易造成人道主义灾难的目标,尽量不选取铁路、航空、金融、医疗等部门的网络目标,以免激起国际社会和对方民众的谴责和反感。三是精确控制进程。实施网络空间威慑性打击之前,要通过广泛的舆论宣传造势,向敌国发出打击警告,并向全世界宣告己方行动的正义性,以争取国际舆论的理解和支持。为突出威慑效果,己方可以高调宣布要攻击的敌国网络目标,再突破敌方层层网络防御,实施坚决有效的网络攻击,必要时最后还可对网络攻击效果进行定时恢复,以展现己方高超的网络攻击技术和手段,让敌方决策者和民众产生防不胜防、难以招架的心理挫折感,从而形成强烈的震慑效果。

(四)虚实结合,注重谋略

孙子所说的“能而示之不能,用而示之不用”,运用到网络空间威慑,其要点概括起来就是“示而不宣、宣而不示”。“示而不宣”,就是利用网络攻击难以追踪定位这一点,对特定目标实施网络攻击,但不对外宣布是己方所为,既展示了己方能力,又使得敌方虽然怀疑是己方所为,但没有证据,无法追究。“宣而不示”,就是公开宣传或不经意透露己方研制或虚构的先进网络战装备的型号、性能、特点,刻意夸大其作战效能,虚虚实实,虚实结合,使敌摸不清己方真实实力,从而产生威慑效果。网络战行动具有追踪溯源困难、取证复杂的特点,发起方既可以承认,也可以矢口否认,或把责任推给民间黑客组织。

Source: 来源:中国信息安全

http://theory.people.com.cn/n1/2016/0104/

China’s PLA & Future Unconventional Warfare // 中國軍隊的未來非常規戰爭

2012年10月26日作者:知遠

Over the past decade, the United States has coped with a large number of unconventional warfare challenges. In Afghanistan, for example, at the beginning of 2012, a total of nearly 432,000 in Afghanistan, anti-riot troops, including US soldiers nearly 90,000 people, nearly 30,000 NATO soldiers, the Afghan national security forces of nearly 300,000 people, near the Afghan local police forces 12,000 people. In addition, the United States to this end spends more than 100 billion US dollars, the deployment of a large variety of advanced platforms and systems. On the other hand, “the Taliban” organization to deploy troops in between 20,000 to 40,000 people (the ratio of anti-riot troops to 1:11), the annual cost amounted to between 100 million to 200 million (with a consumption of anti-insurgency operations funds ratio of 1: 500). In addition, the Afghan insurgent groups from the main use of improvised explosive devices to the Internet using asymmetric warfare strategy and tactics. The ability to “Taliban” organization with limited resources to maintain a longer period of insurgency, highlighting the unconventional warfare challenges facing the United States. Accordingly, this report focuses on the following three questions:

• What is the United States may face challenges in the future unconventional warfare?

• What strategies best suited to address future challenges?

• Which existing cases or model can support these strategies effectively deal with unconventional warfare challenges?

And “terrorism”, “insurgency” is very similar to that, “unconventional warfare” has a variety of definitions. From the practical sense, unconventional warfare violent struggle for the national and NGO legitimacy and influence specific populations carried out.Unconventional threats include the use of guerrilla warfare, terrorism, sabotage, criminal activities and other activities rebel insurrection way countries and organizations. This article begins with a brief discussion of unconventional warfare threats, including threats from national and NGO’s. Then, the paper summarizes the United States in the fight against violence and support the insurrection could take unconventional warfare strategy. Finally, the “village stability operations,” US special forces in Afghanistan (Village Stability Operations, VSO) as an example to discuss.

 First, unconventional warfare challenges

What is the future of the United States could face unconventional warfare challenges?Period of the next decade, the United States will likely face a variety of unconventional warfare challenges, including terrorist groups (such as al-Qaeda and Hezbollah), drug trafficking organizations (such as the Mexican “cartels” drug cartels), global violence Activities Group (such as anarchist Group) NGO. In addition, the United States also faced for some countries (such as Iran) for their own purposes and the formation of unconventional warfare threats from some countries (such as Mexico) due to a result of weak dominance.These network threats, adaptability is gradually improving, and has leveraging cyberspace open up recruitment, intelligence gathering, training, spread propaganda, obtain funding and new ways to implement action.

To illustrate the future threat, it is necessary to highlight the al-Qaeda and its affiliated organizations, and now they have been a big hit because of some mysterious and gradually disappear. Future threat posed by al Qaeda and its affiliated organizations might cause depends on several factors: Some countries support the weak rule of force surviving leadership structure, North Africa, the Middle East and South Asia and other regional and local organizations. According to current trends, al-Qaeda is likely to save important leaders (with the possible exception of Pakistan), the ruling power in some countries will remain weak government, al-Qaeda will be local support in some countries. Al Qaeda may target as always: the overthrow of the monarchy more than one regime to establish pan-Islam (near enemy, or “throw into confusion the enemy within”), against the United States and its allies (the far enemy, or “anti-foreign enemies”). However, these trends are not yet clear how this will develop. For example, al-Qaeda as a global activity may be more dispersed bases in Pakistan to its core strength in Iran (Iran-Qaida), Yemen (AQAP), Somalia (Islamic Youth Corps), North Africa (Islamic Maghreb organizational relationships weaken organized base cloth) or other areas. This dispersion will enable the development of al-Qaida along the Syrian strategist Abu Arz • Lane (Abu Mus’ab al-Suri) envisaged way, more involved in the “individual jihad” and “small terror cells.”

Pan-Islamic movement al-Qaida means the United States will need to support the forces against them in many foreign areas. Al Qaeda affiliated organizations and global allies distribution shown in Figure 1. This figure highlights the future al-Qaida may support insurgent groups of countries. In some countries (such as Saudi Arabia), Al-insurgency operations have been launched to try and fail, but they might try again. In other countries (such as Yemen, Iraq), al-Qaeda has helped the insurgent groups. The figure in black-Qaida would support or continue to support the insurgency in the country. Of particular note is that for some African countries (such as Nigeria, Egypt) and Middle Eastern countries (such as Jordan, Iran), Al-Qaeda would seize every opportunity to support the insurgency.

2

In addition to these threats, the United States war effort unconventional future will be affected by a variety of other challenges. include:

• inter-agency cooperation. Inter-agency collaboration between some organizations seem to have improved, such as the United States Special Operations and CIA. But among a number of other organizations, such as the Department of Defense and the State Department, the US Agency for International Development (USAID) and other government agencies, inter-agency cooperation is still in a chaotic state. Whether it is still in Yemen, these challenges often result in the relationship between the military and government institutions in Afghanistan in the tensions of the strategic, operational and tactical levels.

• Vietnam syndrome. In Iraq and Afghanistan, as well as some of the challenges that may occur in Korea and Taiwan in the conventional military friction, may make some people ignore the importance of the US military future of unconventional warfare. As John • Nagel (John Nagl) In his counter-insurgency war in the study concluded, and on post-Vietnam era: “The US military believes the United States should not be again trapped in counter-insurgency operations, rather than face the US military counterinsurgency doctrine It was the fact that the failure in Vietnam. “unconventional warfare will not only extremely important for the foreseeable future, but there is a need to” should be how to stop the insurgency “and other topics for further research.

• The health of the US troops. More than a decade of fighting, it has made deep unconventional warfare quagmire of American forces extremely heavy. Officers have had to deal with their families are exposed to tremendous pressure, after the creation of stress disorder (PTSD), wars and countless other creative challenges.

• technical challenges. Future, insurgents and terrorist groups will make greater use of the Internet and social media field communication contact forum, spread propaganda, recruit personnel, to complete other tasks. Figure 2 indicates the 2015 global Internet traffic trends. Overall, Internet traffic will be 32% CAGR growth rate, that is until 2015 devices access to the Internet will be twice the total global population. By 2015, Internet traffic Wi-Fi technology and mobile devices will be 54% of the flow of Internet traffic and wired devices will total 46% of the total traffic. This growth will not happen in the West, but at a faster rate occurred in Latin America, the Middle East and Africa. These developments will likely insurgency operations and tactics have a significant impact, make it easier for the insurgents to recruit staff, spread propaganda and communications links.

Figure 2. 2010--2015 global Internet traffic

2
Figure 2. 2010–2015 global Internet traffic [Save to album]

Second, the strategy

What strategies best suited to address future challenges? US Department of Defense “Quadrennial Defense Review Report 2010” and “2012 Strategic Assessment” are briefly mentioned in unconventional warfare. But if we insist on the “strategy” is defined as “the use of armed forces and other tools to achieve military and political objectives,” then reports those are not summed unconventional warfare strategy. US Department of Defense publication “unconventional war: against unconventional threats” against unconventional warfare was more substantial research, but still focused on the United States on how to implement the joint operations of the armed forces should a military campaign in the future, rather than questions about the strategy. Due to the lack of unconventional warfare strategy in these assessments, we must seek the answers to elsewhere. The following outlines a few examples I.

(A) counter-insurgency

There are two major counter-insurgency strategy for US unconventional war.

1. Population center strategy: The first strategy is the population center strategy in Field Manual 3-24, and other resources proposed. Field Manual 3-24 from the British in Malaya, France extracted a lot of cases the best practical significance of military operations in Algeria. In these and other cases, the counterinsurgency is governance.However, in the most recent cases, the external forces is difficult to force the local government to make the necessary political change. As the American experience in Vietnam and Afghanistan as external forces can not force local governments to become legal regime. In addition, the deployment of large numbers of foreign troops is not always successful.

2. Indirect strategy: In some cases, the best way might mainly focus on the proposal, indirect strategic equipment and support local conventional and unconventional forces and organizations above. Such assistance, including foreign internal defense (Foreign Internal Defense) and unconventional warfare, has historically become the US Special Operations task forces and intelligence agencies. In the 1950s, the United States and the Philippines since 2001, in the 1960s in Thailand, the early 1990s and the 21st century, Colombia’s aid work, weakening relative success or defeat insurgent groups. In each case, the approach adopted in the USA are indirect rather than a direct way. Indirect way means that the US personnel To combat forces in the host country provide advice and support. Although this support sometimes include tactical leadership issues, but its focus has always been to help the host country instead of the United States against the enemy elements.

(Ii) riot

In other years, the United States might need to support insurgent groups, you may have to select one of the following two strategies.

1. Maoist insurgency strategy: The first strategy is that the United States can choose Mao guerrilla strategy in Afghanistan in the 1980s, the United States had this strategy against the Soviet Union. Such a strategy, a considerable part of the national organization of the population, the government has brought enormous consumption. While Mao Zedong’s guerrilla strategy is to target against the armed forces and their support networks, but the goal is the collapse of the morale of the attacker, but not necessarily the other’s combat strength. Goal of the strategy is not to ensure the rapid defeat the government. As Mao Zedong pointed out, the objective of the strategy is to consume the enemy to make the final surrender, that “the enemy advances, we retreat to the enemy camps, we harass the enemy tires, we attack the enemy retreats, we pursue.”

Mao Zedong’s guerrilla strategy includes three sequential advance and overlapping phases. The first stage is to establish a political and military structures riots among the general public. As Mao summed up: “The main feature is to rely on the people’s guerrilla fronts and other organizations to establish their own.” One of the main objectives of the first phase is to mobilize as many people to participate in sports. When Mao Zedong’s guerrilla strategy implemented in the rural uprising also began for urban riots. If the riots can be gradually achieved support and access to initial victory, then enter the second phase, the main feature of this phase is the most long guerrilla war and the gradual expansion. For more victory, guerrilla warfare will enable the Government military morale, no fighting, and gradually betrayal. So, the war entered the third phase, namely the collapse of the enemy. Riots changed to government collapsed for the purpose of large-scale conventional attack maneuver.

2. Conventional insurrection strategy: the United States can choose the second strategy is routine riot strategy, the United States against “Taliban” in 2001 adopted this strategy in action. This strategy, skip the first two stages of Mao Zedong’s guerrilla strategy, mainly in conventional military action against each other. Elements of the strategy include the use of armed forces to capture or destroy the enemy’s armed forces, so as to control its population, territory, city or important industrial center and communications center.Objective of the strategy is a decisive action or series of actions, by defeating the enemy on which to resist the physical strength to win the war. For example, the riot troops could move forward, seizing strategic facilities the defense side, such as the capital, the communication center or base, while the defender will also take action to confront. Thus the two sides will launch a campaign or a series of battles, until the formation of a party or a political agreement to admit defeat.

Three, efficient sample

Development “Village stability operations” and Afghan local police force is one of the recent anti-insurgency operations in the most efficient mode. After three years, the United States Special Operations Forces have been in the majority of rural development in this model. Their goal is to help the Afghan people conscious action, reconstruction of traditional security institutions, economic development and consistent with Afghan history, culture and informal management. In essence, the “village stability operations” and Afghan local police forces will have joint and inter-institutional features. Since 2009, “village stability operations,” local police forces and the Afghan and US troops deployed in Afghanistan into the rural Afghanistan to help the local community of security, management and development, and enable them to better coupled to the central government. “Village stability operations” and Afghan local police forces according to the point quickly flourish throughout the country, the ultimate success of the “Taliban” to recapture the territory.

CONCLUSIONS

According to recent US experience in unconventional warfare and future threats, following several issues should be considered:

(A) Organization: According to current threats and challenges, the United States Special Operations Forces Command (SOCOM) should be in the fight against the terrorists, insurgents and other unconventional threats of war to play a front-line “defense” role. Although the US economy is more serious, we should continue (if not increase) investment in the future projects, such as the “village stability operations,” local police forces and the Afghan project.

(B) the health of the US troops: As unconventional warfare deployed US soldiers and their families have been treated countless pressures. The possibility of these threats continue to evolve, and the deployment of troops, means that the US Defense Department needs to continue to strengthen the soldiers and their families for the physical and mental health programs. March 2012 occurred in Kandahar, Afghanistan, US soldiers shot and killed civilians, had a negative impact on the US unconventional warfare operations, but also from the broader sense, is not conducive to US foreign policy.

(C) Training and education: especially for US conventional forces, the unconventional warfare military training of a temporary ad hoc in nature. In some core US military agencies, such as the US Army War College, unconventional warfare military training is relatively good. However, the current unconventional warfare military training and investment in danger of being weakened, so some departments and agencies might consider unconventional warfare military training obsolete. After the Vietnam War, and things like that happen, it would be a very serious mistake.

(D) Inter-agency cooperation: Congress may consider supporting one pair of unconventional warfare campaign experience of cooperation across agencies work assessment efforts as they perform operations against terrorism in Afghanistan and Iraq for cross-agency team made same. Inter-agency cooperation and did not complete the play should have the performance, we should consider an objective, analytical assessments.

Unconventional warfare struggle is a long-term activity, which will continue to be a global battlefield, will extend from the United States, Britain long coastline to Yemen, Pakistan deserted hilltop. This struggle will continue for decades, rather than months or years, this is a concept for most Westerners can not easily handle.

Original Mandarin Chinese:

過去十年內,美國應對了大量非常規戰爭挑戰。以阿富汗戰爭為例,至2012年初期,阿富汗境內共有近432000名反暴亂部隊官兵,其中包括美國官兵近90000人、北約組織官兵近30000人、阿富汗國家安全部隊近300000人、阿富汗地方警察部隊近12000人。另外,美國為此每年花費超過1000億美元,部署了大量各種先進的平台和系統。另一方面,“塔利班”組織部署部隊在20000人至40000人之間(與反暴亂兵力之比為1:11),每年花費額為1億至2億之間(與反暴亂行動資金消耗之比為1:500)。另外,阿富汗暴亂組織主要運用從使用簡易爆炸裝置到因特網作戰的不對稱戰略和戰術。 “塔利班”組織利用有限資源維持較長時間的暴亂活動的能力,凸顯了美國所面臨的非常規戰爭挑戰。因此,本報告主要關注如下三個問題:
•美國未來可能會面臨何種非常規戰爭挑戰?
•何種戰略最適於解決未來挑戰?
•哪種現有案例或者模式能夠支持這些戰略、有效應對非常規戰爭挑戰?
和“恐怖主義”、“暴亂活動”極為相似的是,“非常規戰爭”擁有各種定義。從實踐意義上說,非常規戰爭是國家和非政府組織為特定人群的合法性和影響力而進行的暴力鬥爭。非常規威脅包括運用游擊戰、恐怖主義、陰謀破壞、犯罪活動和暴動叛亂等活動方式的國家和組織。本文首先簡要討論非常規戰爭威脅,包括來自國家和非政府組織的威脅。繼而,本文總結了美國在打擊暴亂和支持暴動時可以採取的非常規戰爭戰略。最後,本文以美軍特種部隊在阿富汗進行的“鄉村穩定行動”(Village Stability Operations,VSO)為範例進行探討。
一、非常規戰爭挑戰
美國未來可能面臨何種非常規戰爭挑戰?在下一個十年時間段內,美國將有可能面臨著各種非常規戰爭挑戰,包括恐怖主義集團(如基地組織和真主黨)、毒品走私組織(如墨西哥“卡特爾”販毒集團)、全球暴力活動集團(如無政府主義分子集團)等非政府組織。此外,美國還面臨著出於某些國家(如伊朗)出於自身目的而形成的、某些國家(如墨西哥)因統治力薄弱而造成的非常規戰爭威脅。這些威脅的網絡性、適應性正在逐步提高,而且已借力網絡空間開拓招募人員、收集情報、進行訓練、散佈宣傳、獲得資助和實施行動的新途徑。
為說明未來威脅,有必要突出強調基地組織及其附屬組織,目前他們因遭到巨大打擊而有些神秘的逐步消失。未來由基地組織及其附屬組織造成的威脅可能會取決於以下幾項因素:領導結構的倖存,北非、中東和南亞等地區國家薄弱的統治力,地方組織的某些支持。根據當前趨勢,基地組織很有可能將保存重要領導人(巴基斯坦可能例外),某些國家政府的統治力將依然薄弱,基地組織將在某些國家得到地方性支持。基地組織的目標也可能一如既往:推翻多個政權建立泛伊斯蘭教王權(近敵,或者說是“攘內敵”),對抗美國及其盟友(遠敵,或者說是“抗外敵”)。但是,這些趨勢將如何發展尚不明朗。例如,基地組織作為一種全球性活動可能更加分散,在巴基斯坦的基地核心力量與其在伊朗(伊朗基地組織)、也門​​(阿拉伯半島基地組織)、索馬里(伊斯蘭青年軍)、北非(伊斯蘭馬格里布基地組織)或者其他地區的基地組織關係弱化。這種分散,將使基地組織沿由敘利亞戰略家​​阿布•阿爾蘇里(Abu Mus’ab al-Suri)所設想的方式發展,更多地捲入“個人聖戰”和“小細胞恐怖行動”。
基地組織的泛伊斯蘭教運動意味著美國將需要對抗他們在多外地區的支持力量。基地組織的附屬組織及全球盟友分佈如圖1所示。此圖突出介紹了未來基地組織可能支持暴亂集團的國家。在部分國家(如沙特阿拉伯),基地已經嘗試發起暴亂行動,而且遭到失敗,但他們可能會再次嘗試。在另外一些國家(如也門、伊拉克),基地組織已經協助了暴亂集團。圖中以黑色顯示基地組織將支持或者繼續支持暴亂活動的國家。特別值得注意的是,對於一些非洲國家(如尼日利亞、埃及)和中東國家(如約旦、伊朗),基地組織將抓住一切機會支持暴亂活動。
2
除了這些威脅,美國未來非常規戰爭努力將會受到其他各種挑戰的影響。包括:
•跨機構合作。跨機構合作似乎在某些組織之間已經有所提升,如美國特種作戰和中央情報局。但在其他一些組織之間,如國防部和國務院、美國國際開發署(USAID)等政府機構,跨機構合作尚處於一種混沌狀態。不管是在阿富汗還是在也門,這些挑戰經常會在戰略、戰役和戰術層次上造成軍事機構和政府機構之間的關係緊張化。
•越戰綜合症。在伊拉克和阿富汗以及在可能發生於朝鮮和台灣的常規性軍事摩擦中的一些挑戰,可能會使美國軍界部分人忽視未來非常規戰爭的重要性。如約翰•納格爾(John Nagl)在他反暴亂戰爭研究中所總結到的,關於越戰後時代:“美國軍隊認為美國不應當再次自陷於反暴亂作戰,而不是直面美國軍隊反暴亂作戰原則在越戰中遭到失敗這一事實。”不但非常規戰爭對於可預見的未來仍將極為重要,而且還有必要對“應當如何制止暴亂活動”等議題進行更進一步的研究。
•美國部隊的健康度。超過十年時間的戰鬥,已經使深陷非常規戰爭泥淖的美國部隊異常沉重。官兵已經不得不處理其家庭所承受的巨大壓力、創作後應激障礙(PTSD)、戰爭創作和其他無數挑戰。
•技術性挑戰。未來,暴亂分子和恐怖主義集團將更多地利用田因特網和社會媒體論壇進行通信聯繫、散佈宣傳、招募人員、完成其他任務。圖2指出了至2015年全球互聯網流量趨勢。總體上說,互聯網流量將以年復合增長率32%的速度增長,也就是至2015年接入國際互聯網的設備將是全球總人口的兩倍。到2015年,Wi-Fi技術和移動設備的互聯網流量將佔總流量的54%,而有線設備的互聯網流量將佔總流量的46%。這一增長將不僅僅發生於西方,而是將以更快的速率發生於拉丁美洲、中東和非洲。這些發展,將有可能會暴亂行動及其戰術產生重大影響,使暴亂分子更輕易的招募人員、散佈宣傳和通信聯繫。
圖2. 2010-2015年全球互聯網流量2
圖2. 2010-2015年全球互聯網流量[保存到相冊]

二、戰略
何種戰略最適於解決未來挑戰?美國國防部《2010年四年防務評估報告》​​和《2012年戰略評估》都簡要提及了非常規戰爭。但是,如果我們堅持將“戰略”定義為“運用武裝力量和其他工具達到軍事和政治目標”的話,這些文件報告都沒有總結出非常規戰爭戰略。美國國防部出版物《非常規戰爭:對抗非常規威脅》對非常規戰爭進行了更多實質性研究,但仍然主要集中於美國武裝力量應當如何在未來一場軍事戰役中實施聯合作戰,而不是關於戰略的問題。由於在這些評估工作中缺乏非常規戰爭戰略,我們必須向別處尋求答案。以下我概要介紹幾個範例。
(一)反暴亂
有兩種主要的反暴亂戰略適用於美國的非常規戰爭。
1.人口中心戰略:第一種戰略是在戰地手冊3-24和其他資源中提出的人口中心戰略。戰地手冊3-24從英國在馬來亞、法國在阿爾及利亞的軍事行動中提取了很多具有最佳實踐意義的案例。在這些以及其他案例中,反暴亂也就是治理。但是,在大部分近期案例中,外部勢力很難迫使當地政府作出必要的政治性改變。正如美國在越南和阿富汗所經歷的那樣,外部勢力無法強迫當地政府成為合法政權。另外,部署大量外來兵力也不是總能取得成功。
2.間接戰略:在一些案例中,最好的途徑可能會將主要著力點放在建議、裝備和支援當地常規和非常規部隊和組織之上的間接戰略。這種援助,包括國外內部防禦(Foreign Internal Defense)和非常規戰爭,已經歷史性地成為美國特種作戰部隊和情報機構的任務。美國在20世紀50年代以及自2001年開始對菲律賓、20世紀60年代對泰國、20世紀90年代和21世紀初對哥倫比亞的援助工作,相對成功地削弱或者擊敗了暴亂集團。在每一案例中,美國所採用的都是間接途徑而不是直接途徑。間接途徑意味著美國人員要向作戰中的主辦國部隊提供建議和支持。雖然這一支持有時也會包括戰術領導力問題,但其焦點始終是幫助主辦國而不是美國元素對抗敵人。
(二)暴動
在另外一些時間裡,美國可能會需要支持暴亂集團,可能必須在以下兩種戰略選擇其一。
1.毛澤東主義者的暴動戰略:美國可以選擇的第一種戰略是毛澤東游擊戰略,在上世紀80年代的阿富汗戰場上,美國就曾以此戰略對抗蘇聯。這種戰略,組織相當一部分國家人口,為政府帶來巨大消耗。雖然毛澤東游擊戰略的目標是對抗武裝力量及其支持網絡,但其目標是瓦解攻擊者的鬥志,而不一定是對方的作戰實力。這種戰略的目標並不是確保迅速擊潰政府。正如毛澤東所指出的,戰略的目標是消耗敵人使之最終投降,即“要敵進我退,敵駐我擾,敵疲我打,敵退我追。”
毛澤東游擊戰略包括三個順序推進又相互重疊的階段。第一階段是在人民大眾中建立暴動政治和軍事結構。如毛澤東所總結的:“游擊戰的主要特徵就是依靠人民群眾自己建立戰線和其他組織。”第一階段的主要目標之一,是發動盡可能多的人民參加運動。當毛澤東游擊戰略貫徹於農村暴動,也就開始適用於城市暴動。如果暴動可以逐步取得支持並獲得初步勝利,則進入第二個階段,這一最為漫長的階段的主要特點是游擊戰爭和逐步擴張。獲得更多勝利後,游擊戰將使政府軍事力量士氣低落、毫無鬥志、逐漸背叛。如此,戰爭就進入第三階段,即瓦解敵人。暴亂轉變為以政府垮台為目的的大規模常規機動攻擊。
2.常規暴動戰略:美國可以選擇的第二種戰略是常規暴動戰略,美國在2001年打擊“塔利班”行動中採取了這一戰略。這一戰略,跳過毛澤東游擊戰略的前兩個階段,主要以常規軍事行動打擊對方。戰略的內容包括運用武裝力量俘獲或者破壞敵方武裝力量,從而控制其人口、領土、城市或者重要工業中心和通信中心。戰略的目標是以一次決定性行動或者一系列行動,通過擊敗敵人賴以抵抗的物理實力,贏得戰爭。例如,暴動部隊可能會向前推進,奪取防禦方的戰略設施,如首都、通信中心或者基地,而防禦方則也採取行動進行對抗。雙方因此將展開一場戰役或者一系列戰役,直到了一方承認失敗或者形成政治協定。
三、有效的範例
“鄉村穩定行動”和阿富汗地方警察部隊的發展是近期反暴亂行動的最有效模式之一。此前三年,美國特種作戰部隊一直在廣大農村發展這一模式。他們的目標是幫助阿富汗人民自覺行動起來,重建傳統性安全機構、經濟發展和與阿富汗歷史、文化相一致的非正式管理。在本質上,“鄉村穩定行動”和阿富汗地方警察部隊就具有聯合性和跨機構性的特點。自2009年開始,“鄉村穩定行動”和阿富汗地方警察部隊部署阿富汗和美國兵力進入阿富汗農村,幫助地方群落的安全、管理和發展,使他們更好地聯結於中央政府。 “鄉村穩定行動”和阿富汗地方警察部隊的根據點很快在整個國家內蓬勃發展,最終成功從“塔利班”手中奪回了領土。
四、結論
根據美國近期在非常規戰爭和未來威脅的經驗,對以下幾項問題應當加以考慮:
(一)組織:根據當前威脅和挑戰,美國特種作戰部隊司令部(SOCOM)應當在打擊恐怖分子、暴亂分子和其他非常規戰爭威脅中發揮前線“國防部”的作用。儘管美國的經濟形勢較為嚴峻,我們還是應當繼續(如果不是增加)對未來各種項目的投資,如“鄉村穩定行動”和阿富汗地方警察部隊項目。
(二)美國部隊的健康度:由於非常規戰爭部署,美國官兵及其家庭已經處理了無數壓力。這些威脅的可能性繼續發展以及兵力部署,意味著美國國防部需要繼續加強針對官兵及其家庭的身體和心理健康項目。 2012年3月發生於阿富汗坎大哈省的美國士兵槍殺平民事件,為美國非常規戰爭行動帶來了負面影響,而且從更廣泛的意義上說也不利於美國外交政策。
(三)訓練和教育:特別是對於美國常規部隊來說,非常規戰爭軍事訓練具有臨時特設的性質。在一些美國核心軍事機構,如美國陸軍戰爭學院,非常規戰爭軍事訓練相對較好。但是,目前非常規戰爭軍事訓練和投資面臨著被消弱的危險,因此某些部門和機構可能會認為非常規戰爭軍事訓練已經過時。和越南戰爭之後所發生的事一樣,這將是一個極為重大的錯誤。
(四)跨機構合作:國會可能會考慮支持一項對非常規戰爭戰役中的跨機構合作經驗進行評估的工作,正如他們對正在阿富汗和伊拉克執行打擊恐怖主義行動的跨機構團隊所做的努力一樣。跨機構合作並沒有完成發揮出應當具備的效能,我們應當考慮進行一項客觀性、解析性評估。
非常規戰爭鬥爭是一種長期的活動,其戰場仍將是全球性的,會從美國、英國漫長海岸線延伸到也門、巴基斯坦荒無人煙的山頂。這一斗爭將持續數十年,而不是幾個月或者幾年,這是一項對大部分西方人來說都無法輕易處理的概念。

Source:  http://mil.sohu.com/20121026

 

China’s Central Military Commission Directs PLA to Conduct Force on Force Electromagnetic Warfare 中央军事委员会解放军演练电磁环境下红蓝双方攻防对抗作战

China’s Central Military Commission Directs PLA to Conduct Force on Force Electromagnetic Warfare

中央军事委员解放军演练电磁环境下红蓝双方攻防对抗作战

2010年12月19日 07:04

解放军报

Winter season, a confrontation exercise started somewhere in the south.

Just started fighting, “blue” group on electronic jamming to capture a group of unidentified electromagnetic signals.

Due operator eager to interfere when the signal was a commander of an emergency stop. He concluded that this group of signals is issued by the “Red Army” senior command authority, premature interference might arouse his suspicions. Right on cue, when the “Red Army” attack battle, they suppress this band in real time, effectively disrupting the “Red Army” combat deployment.

The Commander, General Miaosuan, of the “Blue Army” commander, that army outstanding commanding officers, the head of the Guangzhou Military Region regiment Xie Jinbo.

More than 60 million units of information data, witnessed his dedication and hard

The different kind of exercise summary, attracted the attention of the organizers of a number of exercises: “a certain type of equipment, depending on the conditions under conditions of less than two kilometers through, the interference effect is reduced by 13% ……” opened this up to 14 million words of summary reports, data everywhere so to speak, has changed the traditional reporting “heavy qualitative description, quantitative analysis of light,” the chronic illness.

These years, with the information technology and new equipment to allot troops, Xie Jinbo keen to find, sometimes combat environment, the nuances of equipment performance data are likely to affect the outcome of the war. In one exercise, since some stations no good equipment to control the temperature, humidity, resulting in interference to fail.

Moreover, to improve combat capability-based information system, it is also inseparable from the construction of the battlefield database. In contrast to many of the training 谢金波 found in advance into a battlefield data information technology equipment, compared with no injection data of “bare metal”, the highest combat effectiveness actually thousand fold difference.

Xie Jinbo deeply felt, each data is a valuable resource, he began a long, hard data acquisition. On one occasion, in order to obtain a certain type of equipment interference in different terrain conditions data distance, Xie Jinbo has spent more than two years, after several training, practice exercises, and finally collect the relevant data together. In recent years, in order to gain valuable operational data, he often worked day and night, tirelessly, nearly 300 days a year to soak in the training field.

Today, more than 60 million units of information data added to the database in the regiment of information technology equipment for command and decision automation solidify a solid foundation. Meanwhile, dozens of main equipment in the operating parameters of a variety of conditions are constantly refreshed, the regiment as a basis for improvement and innovation in more than 50 kinds of tactics and training methods.

Let new equipment enter onto the “battlefield,” have courage to play

July 2009, the Central Plains some ancient battlefield. Army fielded some type information equipment unit of soldiers gathered here, in the invisible space heated game.

Military leader far away in Guangzhou was very worried: 谢金波 and his forces can accomplish the task drill? You know, the regiment fielded only 14 days this equipment, this exercise they cannot participate.

At first, the military solicit the views of the regiment, led by Xie Jinbo insisted on participating. Organs Staff Recommendation: Even through emergency training, the soldiers also only master the basic operating, while sister unit has also been fitted out in the shortest one and a half, we have accumulated a wealth of coaching experience, and if a hit on units and individuals are negative.

Getting remark, Xie Jinbo eyes stare: equipped with new equipment as is the future battlefield to defeat the enemy, if you cannot make new equipment onto the “battlefield”, this is our soldier’s dereliction of duty.

In this drill, Xie Jinbo day to lead the troops to engage in combat, in the evening, led cadres backbone fumble summary, truly a “fight a battle further.” Just a few more than 40 days, the soldiers not only mastered this new equipment, but also several times in the walkthrough cornered his opponent. Finally, the regiment was named “advanced unit in the exercise.”

In this exercise, he proposed an idea to give the headquarters of heads and experts highly recognized. He led troops prepared this type of equipment operation manuals and Tactics methods, training materials issued by the headquarters of the army as a similar force. Three years, under the leadership of 谢金波 team constantly explore new equipment group training method summary, prepared more than 30 sets of textbooks, teaching Van and user manual, which is the headquarters of promoting the use of five sets; research and development of the three sets of simulation training software The signal automatic identification software, which obtained two military scientific and technological progress prize.

Xie Jinbo familiar people call him “isolated situation.” This is because in training he always trying to force opponents to find out the problem, just a defeat.

Two years ago, Xie Jinbo that neighbor a unit fielded a new equipment, he immediately with a “gauntlet” to the unit. Thereafter, they are back to back through a field exercise, a powerful increase the combat effectiveness of the two forces.

In recent years, the group has several units and 10 Army, Air Force, Navy established a joint training relationship, master a set to adapt to new equipment, tactics and close combat in a variety of complex conditions emergency support experience.

Usually “seeking abortion” as is undefeated wartime. Because of the technical performance of the equipment war fraternal units more familiar with the training he often felt recruited opponents hard enough, he would for ourselves, “made” opponents.

In 2008, Xie Jinbo well-established group “Blue Army” units, and personally served as commander. Under his leadership, our in-depth study of each of a regional war since the Gulf War, from operational to tactical training principles guiding ideology, means of attack, an action an action before, one would like to set a scenario to pull, so that the “blue army” soon He entered the role as military training of “grindstone.”

In a time of “seeking lost” experience, the team’s fighting again and again to give rise. In recent years, various types of exercises held superiors, they times and successfully complete the task.

Original Mandarin Chinese:

初冬时节,一场对抗演练在南方某地打响。

战斗刚刚打响,“蓝军”电子干扰群就捕捉到一组来历不明的电磁信号。正当操作手急于对信号实施干扰时,被一名指挥员紧急叫停。他断定这组信号是由“红军”高级指挥机关发出的,过早干扰可能会打草惊蛇。果然不出所料,当“红军”发起进攻战斗时,他们实时压制这一频段,有效打乱了“红军”战斗部署。

这位神机妙算的“蓝军”指挥员,就是全军优秀指挥军官、广州军区某团团长谢金波。

60多万组信息数据,见证着他的执著与艰辛

这份别样的演习总结,吸引了多位演习组织者的眼球:“某型装备,在通视条件低于2公里的条件下,干扰效果下降13%……”翻开这份长达14万字的总结报告,处处都是这样用数据说话,改变了传统报告“重定性描述,轻定量分析”的痼疾。

后来,这份由谢金波亲自撰写的演习总结被当成范本下发参演部队传阅。

这些年,随着信息化新装备配发部队,谢金波敏锐地发现,有时作战环境、装备性能一个数据的细微差别都有可能影响战争的胜负。在一次演练中,由于某台站没有控制好装备的温度、湿度,结果导致干扰失败。

不仅如此,提高基于信息系统体系作战能力,也离不开战场数据库的建设。谢金波在多次的训练对比中发现,事先注入了战场数据的信息化装备,与没注入数据的“裸机”相比,作战效能最高时竟相差上千倍。

谢金波深深感到,每一个数据都是一笔宝贵的资源,他开始了漫长、艰辛的数据采集。有一次,为取得某型装备在不同地形条件下干扰距离的数据,谢金波先后花了2年多时间,经过多次训练、演习的实践,终于将相关数据收集齐。几年来,为了取得宝贵的作战数据,他常常夜以继日、不辞辛劳,一年有近300天泡在训练场。

如今,60多万组信息数据充实到该团信息化装备的数据库中,为指挥决策的自动化夯实了坚实的根基。同时,数十种主战装备在各种条件的工作参数被不断刷新,团里以此为依据完善和创新了50余种战法训法。

让新装备走上“战场”,他勇于担当

2009年7月,中原某古战场。全军列装某型信息化装备单位的官兵云集于此,在无形空间展开激烈博弈。

远在广州的军区领导很是担心:谢金波和他的部队能否完成好演练任务?要知道,该团列装这套装备仅14天,这次演练他们完全可以不参加。

当初,军区征求团里的意见,谢金波坚持要求带队参演。机关参谋建议:即便通过应急训练,官兵们也仅掌握基本的操作使用,而兄弟单位列装最短也已有一年半,积累了丰富的训练经验,要是演砸了对单位和个人都不利。

闻听此言,谢金波眼睛一瞪:配备新装备为的是未来战场克敌制胜,如果不能让新装备走上“战场”,这是我们军人的失职。

在这次演练中,谢金波白天带领部队搞对抗,晚上带领干部骨干摸索总结,真正做到了“打一仗进一步”。短短40多天,官兵们不仅熟练掌握了这套新装备,还多次在演练中把对手逼入绝境。最后,该团被评为“演练先进单位”。

在这次演练中,他提出一项构想,得到了总部首长和专家的高度认可。他带领官兵编写的该型装备操作使用手册和战术运用方法,被总部作为训练教材印发全军同类部队。3年来,在谢金波的带领下,团队不断摸索总结新装备组训方法,编写了30多套教材、教范和使用手册,其中5套被总部推广运用;研究开发了3套模拟训练系统软件、信号自动识别软件,其中2项获得军队科技进步三等奖。

在“求败”中砥砺战斗力,是他的制胜之道

熟悉谢金波的人,都叫他“独孤求败”。这是因为他在训练中总是想方设法给部队找对手、出难题,只求一败。

两年前,谢金波得知友邻某部列装了一套新装备,他立即带着“战书”到了该部。此后,他们通过一场场背靠背的演练,有力提高了两支部队的战斗力。

几年来,该团先后与陆军、空军、海军的10几个单位建立起了联训关系,掌握了一套适应新装备,贴近实战的战法和在各种复杂条件下应急保障的经验。

平时“求败”为的是战时不败。由于对兄弟单位装备战技术性能比较熟悉,训练中他常常感到找来的对手还不够硬,他就自己给自己“造”对手。

2008年,谢金波精心组建了团“蓝军”分队,并亲自担任指挥员。在他的带领下,大家深入研究海湾战争以来的每一场局部战争,从作战指导思想到战术训练原则、攻击手段,一个动作一个动作过,一个想定一个想定抠,使“蓝军”很快就进入了角色,成为部队训练的“磨刀石”。

在一次次的“求败”经历中,团队的战斗力一次次得到攀升。在近几年上级举行的各类演习中,他们次次圆满完成任务。

Original Source: 解放军报

Chinese Military Secrets of Deterrence in Cyberspace – 威懾的網絡空間中的中國軍事機密

Chinese Military Secrets of Deterrence in Cyberspace

威懾的網絡空間中的中國軍事機密

January 6th 2016

China’s National Defence University

 

Given the recent People’s Liberation Army (PLA) restructuring and renewed emphasis on strategic forces and cyberwarfare units it is no surprise that military experts in the People’s Republic of China (PRC) are discussing how to use military force in cyberspace effectively.

when the opposing sides have the ability to ensure invade destroy the other network when you can bring two-way network containment, the two sides have, under certain conditions, to comply with and do not attack the other network rules of the game, forming an invisible safety valve, even will form international networks and do not attack each other customary agreements or conventions, cyberspace became strategic areas can generate a huge deterrent effect. After following the nuclear deterrence deterrence in cyberspace, began to enter the strategic vision of the big country politicians and military strategist. Research cyberspace deterrence characteristics, type and use points, a must consideration and necessary action network power, network and strong army.   China Military Online publication Yuan Yi of PLA Military Academy of Sciences, said the article, along with human society’s dependence on cyberspace continues to deepen, cyberspace has become the “fifth dimension of human production and life of the” second class living space “and military confrontation battle space. ” States initiative, control over the right to speak about the world of cyberspace in a fierce competition, competition in cyberspace has reached a level of survival, fate of the country and the success of the military struggle of human solidarity. Thinking of cyberspace deterrence capacity building of great practical and theoretical value.   First, analyze the pros and cons of deterrence in cyberspace   cyberspace deterrence refers to various actions taken in cyberspace, cyberspace display paralyze enemy control, and cross-domain control of the enemy’s determination and strength of the physical space through cyberspace to achieve deterrence enemy, the enemy stops, stopping the enemy, stop the enemy in the form of a strategic deterrence purposes. Cyberspace and physical space has compared to the “actual situation biphasic” network warfare, compared with the traditional style of warfare has unique nature determines the advantages and disadvantages of deterrence in cyberspace are very obvious.

(A) Advantages of cyberspace deterrence.   Deterrence advantage of cyberspace, mainly reflected in: First, become more civilized and humane way of deterrence. Compared with nuclear and biological weapons, physical, biological, chemical destruction mechanism-based, direct killing and destruction effects of network warfare weapons is far smaller than the former, usually does not cause permanent damage and pollution of the natural environment, it will not cause a lot of people casualties, and trigger a humanitarian disaster. Second, the cost of deterrence to cost-inefficient. Network warfare weapons to viruses, Trojan horses and other software-based, relatively low cost, low technology threshold, and damage caused by the effect has been amazing. Cyber ​​Defense broad area, are very hard to improve network security level of a grade each input costs increase exponentially. Low-cost network attack and defense of the high cost of network contrast, making the network attack and defense presented “spear shield thin” features, network warfare weapon which is called “poor atomic bomb.” Third, diverse practical means of deterrence. A variety of network warfare weapons, cyber-attacks target pluralism, the decision has diverse cyberspace deterrent to choose from. Network attack effect to a certain extent is recoverable, if used properly implemented, the initiation and escalation of the war to promote war risk is relatively small. In a sense, the deterrent value of nuclear weapons is much greater than the actual value, and network warfare weapons is both practical value and deterrent value. Fourth, deterrence using reusable flexibility. “Nuclear threshold” Once across the full nuclear war will break out, both sides in the nuclear balance of mutual destruction will fall into the state, easily a nuclear deterrent against non-nuclear countries in particular, nuclear deterrence, but also lead to international condemnation, these factors which greatly limits the use of the nuclear deterrent. The cyberspace deterrence Flex, controllable power characteristics, which can be determined according to the change and the need for military struggle situation, timely regulatory deterrence strength, the initial use, full use, repeated use, with strong flexibility.

Original Mandarin Chinese:

雙方都具有確保侵入破壞對方網絡的能力時,就可以帶來雙向網絡遏制,使得雙方不得不在一定條件下,遵守互不攻擊對方網絡的遊戲規則,形成一個無形的安全閥,甚至國際上也會形成互不攻擊對方網絡的慣例協議或公約,網絡空間由此成為可以產生巨大威懾效應的戰略領域。網絡空間威懾繼核威懾之後,開始進入大國政治家和軍事家的戰略視野。研究網絡空間威懾的特征、類型和運用要點,成為網絡強國、網絡強軍的必須考量和必要行動。

中國軍網發表中國人民解放軍軍事科學院袁藝的文章稱,隨著人類社會對網絡空間依賴程度的不斷加深,網絡空間成為人類生產生活的“第二類生存空間”和軍事對抗的“第五維作戰空間”。世界各國圍繞網絡空間的主導權、控制權、話語權展開了激烈的爭奪,網絡空間的競爭已達到與人類生存、國家命運和軍事鬥爭成敗休戚相關的程度。思考網絡空間威懾能力建設,具有重大現實和理論價值。

一、網絡空間威懾的優劣分析

網絡空間威懾,是指在網絡空間採取各種行動,展示癱瘓控制敵方網絡空間,並通過網絡空間跨域控制敵方實體空間的決心和實力,從而達到懾敵、止敵、阻敵、遏敵目的的一種戰略威懾形式。網絡空間與實體空間相比所具有的“虛實二相性”,網絡戰與傳統作戰樣式相比所具有的獨特性,決定了網絡空間威懾的優缺點都非常明顯。

(一)網絡空間威懾的優點

網絡空間威懾的優點,主要體現在:一是威懾方式更趨文明和人道。與基於物理、生物、化學殺傷機理的核生化武器相比,網絡戰武器的直接殺傷和破壞效應要遠小於前者,通常不會對自然環境造成永久性破壞和污染,也不會造成大量的人員傷亡,並引發人道主義災難。二是威懾成本低效費比高。網絡戰武器以病毒、木馬等軟件為主,成本相對低廉,技術門檻較低,而造成的破壞效果卻相當驚人。網絡防禦點多面廣,防不勝防,要網絡安全程度每提高一個等級,投入成本會呈指數級增加。網絡進攻的低成本與網絡防禦的高成本對比鮮明,使得網絡攻防呈現“矛尖盾薄”的特點,網絡戰武器因而被稱為“窮國的原子彈”。三是威懾手段多樣實用性強。網絡戰武器多種多樣,網絡攻擊目標多元,決定了有多樣化的網絡空間威懾手段可供選擇。網絡攻擊效果在一定程度上是可恢復的,只要運用實施得當,引發戰爭和促使戰爭升級的風險相對較小。從某種意義上講,核武器的威懾價值遠大於實戰價值,而網絡戰武器則是實戰價值與威懾價值兼具。四是威懾運用可重複靈活性強。“核門檻”一旦跨過就會爆發全面核戰爭,處於核均勢的雙方將陷入相互摧毀狀態,輕易實施核威懾特別是對無核國家進行核威懾,還會招致國際輿論的譴責,這些因素都極大地限制了核威懾手段的使用。而網絡空間威懾軟硬結合、威力可控的特點,決定了其可根據軍事鬥爭形勢的變化和需要,適時調控威懾強度,先期使用、全程使用、反覆使用,具有很強的靈活性。

(B) Lack of deterrence in cyberspace

Cyberspace is insufficient when it comes to a deterrent effect, mainly reflected in the following:

First, the credibility of the deterrent effect has not been fully verified. The credibility of nuclear deterrence has been verified in actual combat. However, as of now, the war in the true sense of the network have not really broken out. People cyberwarfare amazing destructive power, more of a speculation and worry, the real power of cyber warfare only after the actual test, we can really convincing.

Second, the reliability of the means of deterrence is not too high. Cyberwar is a dynamic process two sides of continuous interaction network attack and defense, the network against complex, highly technical characteristics, determine the effect of cyber warfare attacks with greater uncertainty, and there may not achieve the desired objective of the operation, so that the deterrent effect greatly reduced. For example, when you attack the enemy in cyberspace combat deter enemy if promptly take all effective means of defense, it will increase the difficulty of one’s own cyber-attacks and reduce the destructive effect, and even lead to the failure of the attack.

Third, deterrence scope for further improvement in controllability. Virus weapons as an important weapon cyber warfare, the spread of resistance, controllability is poor, affecting relatively wide range, it is difficult for the enemy to launch specialized computers and networks, highly targeted attacks. If you cannot control its effective scope, it will spread to a third-party neutral countries and even make itself a victim, thus using viral weapons are “legislator” of the suffering. Four is selectively limited deterrence object. Nuclear deterrence for any country is clear and effective, and the degree of information in cyberspace deterrent effect of a great relationship with the enemy. Cyberspace deter high degree of information is extremely effective countries, and for that information infrastructure is weak, not strong network dependent LDCs, the effect is difficult to play, or even completely ineffective. Five is relatively complex organization deterrence implementation. Various nuclear countries in the world are all focused on the implementation of the strategic nuclear forces unified management, command and control of the highly centralized organization and implementation of nuclear deterrence when action can be accurately controlled to each combat unit, very well organized and implemented. The organization and implementation of deterrence in cyberspace, to be involved in reconnaissance, attack, control, prevention and other support forces, personnel, large scale, and scattered in different departments and units of the military, the organization is very complex and not easy to form a joint force.

Second, the main types of cyberspace deterrence.

Deterrence in cyberspace includes the following; there are cyberspace technology test deterrence measures, deterrence in cyberspace display equipment, network space and cyberspace combat exercise deterrence. There are four types of deterrence operations. Among them, the first three are shown in form of deterrence, the latter is the real deterrent.

(A) Technical trial deterrence in cyberspace

Original Mandarin Chinese:

(二)網絡空間威懾的不足

網絡空間威懾的不足,主要體現在:一是威懾效果的可信性未得到充分驗證。核威懾的可信度已在實戰中得到了驗證。然而,截至目前,真正意義上的網絡大戰還沒有真正爆發過。人們對網絡戰驚人的破壞力,更多的只是一種猜測和擔憂,網絡戰的真實威力只有經過實戰檢驗後,才能真正令人信服。二是威懾手段的可靠性不太高。網絡戰是敵我雙方網絡攻防持續互動的動態過程,網絡對抗複雜、技術性強的特點,決定了網絡戰攻擊效果具有較大的不確定性,有可能達不到預期作戰目的,使威懾效果大打折扣。例如,對敵實施網絡空間實戰威懾時,敵方若及時採取各種有效防禦手段,就會增加己方網絡攻擊的難度和降低破壞效果,甚至導致攻擊行動的失敗。三是威懾範圍的可控性需進一步改善。病毒武器作為網絡戰的重要武器之一,其傳播性強、可控性較差、影響範圍比較廣,很難針對敵國計算機和網絡發動專門性、針對性極強的攻擊。如果不能控制其有效作用範圍,就會波及第三方中立國家,甚至使自身也成為受害者,因而病毒武器的使用有“投鼠忌器”之患。四是威懾對象的可選擇性受限。核威懾對任何國家都是明確而有效的,而網絡空間威懾的效果與敵國的信息化程度有很大關係。網絡空間威懾對信息化程度高的國家極為有效,而對那些信息基礎設施薄弱,網絡依賴性不強的不發達國家,則很難發揮效果,甚至完全不起作用。五是威懾實施的組織相對複雜。世界各個核國家無不對戰略核力量實施集中統管,指揮控制權高度集中,組織實施核威懾行動時可以準確控制到每一個作戰單元,組織實施十分周密。而網絡空間威懾的組織實施,要涉及偵、攻、控、防等多支力量,人員多、規模大,且分散在軍地不同部門和單位,組織起來非常複雜,形成合力不易。

二、網絡空間威懾的主要類型

網絡空間威懾主要有網絡空間技術試驗威懾、網絡空間裝備展示威懾、網絡空間作戰演習威懾和網絡空間作戰行動威懾四種類型。其中,前三種是示形威懾,後一種是實戰威懾。

(一)網絡空間技術試驗威懾

Cyberspace technology test of deterrence, is in the field of cyber warfare, regularly carry out new operational concepts early exploratory trials, new attacks and tactical mechanism confirms test results, new technologies weaponization practical tests, and through the media and disclose to demonstrate their strong information technology infrastructure research capabilities, and network warfare capability into the enormous potential to achieve deterrence opponent’s goal. Currently, the network attack and defense technology is still rapid development, a key breakthrough technology, cyberspace and often have a significant impact on operations, or even lead to revolutionary change. Who is the first to occupy the strategic high ground network attack and defense technology, who will be able to achieve significant advantages in the future network warfare.

(B) Deterrence in cyberspace equipment display.

Equipment display deterrence in cyberspace, is planning to develop cyber warfare equipment development, technology development, targeting all stages of development testing, stereotypes production, appropriate disclosure network warfare equipment models, performance, features needed, parameters and development progress, etc., in order to achieve deterrence opponent’s goal. Its methods are mainly two: one is by the defense white paper, diplomatic communiques and newspapers, periodicals, websites and other large-scale public disclosure of authoritative media from official sources, the implementation of explicit deterrence; the other is through a network of social media or other unofficial channels, deliberately leaked equipment relevant circumstances, the implementation of implicit deterrence. Cyberspace equipment display deterrence, one can fictitious new mechanism, the new concept of the new cyber-warfare equipment, and render their unique combat capability; on the other hand can be deliberately exaggerated the combat effectiveness of the existing network warfare equipment. There are virtual reality, real There are virtual, the implementation of a policy of ambiguity, so that the other lost in one’s own truth and strength, fear and psychological fear. For example, the US military’s “chute” airborne network attack system electrical integration has been repeatedly put into practical use, its hostile air defense system of the country pose a serious threat, but the basic principle, the working mechanism, tactical and technical indicators have neither publicly disclosed, nor by his country fully grasp cracks, has been shrouded in secrecy, it is difficult to distinguish the actual situation, played a very good deterrent.

(C) Cyberspace exercise deterrence.

In cyberspace combat exercise deterrence, is the way real soldiers or virtual exercises launched in cyberspace, and through various media channels to combat potential rival to show their cyber capabilities, strength and determination to achieve deterrence opponent’s goal. Cyberspace war exercises and military exercises can be divided into two kinds of virtual exercises. The former is usually the country or jointly with allies, generally joint military exercises in cyberspace defense action-oriented. In recent years, the United States and its allies held a number of “Cyber ​​Storm” series of network warfare exercises, and “Schriever” series of space – cyberspace exercise, a good show cyberwarfare mobilization strength, overall defense level, and the implementation of network warfare determination. The latter is usually the national large-scale integrated network Range held generally exercise the power of the military professional network warfare offensive action-oriented.

Original Mandarin Chinese:

網絡空間技術試驗威懾,是在網絡戰領域,經常性地進行新作戰概念的先期探索性試驗、新攻擊機理和戰術的效果印證性試驗、新技術的實用化武器化試驗等,並通過媒體向外界披露,以展現本國雄厚的信息技術基礎研究實力,以及轉化為網絡戰能力的巨大潛力,以達到威懾對手的目的。當前,網絡攻防技術仍在快速發展,一項關鍵性技術的突破,往往會對網絡空間安全和作戰產生重大影響,甚至引發革命性變化。誰搶先占領了網絡攻防技術的戰略制高點,誰就能在未來網絡戰中取得明顯優勢。

(二)網絡空間裝備展示威懾

網絡空間裝備展示威懾,是在網絡戰裝備發展規劃制定、技術開發、打靶試驗、定型生產等各個發展階段,根據需要適當披露網絡戰裝備的型號、性能、特點、參數以及研製進度等情況,以達到威懾對手的目的。其方式主要有兩種:一種是通過在國防白皮書、外交公報以及報紙、期刊、大型網站等權威媒體從官方渠道公開披露,實施顯性威懾;另一種是通過網絡社交媒體或其他非官方渠道,刻意洩露裝備相關情況,實施隱性威懾。網絡空間裝備展示威懾,一方面可以虛構新機理、新概念的新型網絡戰裝備,並渲染其獨特的作戰能力;另一方面可以刻意誇大已有網絡戰裝備的作戰效能。虛中有實、實中有虛,實施模糊政策,使對方摸不清己方真實情況和實力,產生恐懼和忌憚心理。例如,美軍的“舒特”機載網電一體攻擊系統已多次投入實戰使用,對其敵對國家的防空體系構成了嚴重威脅,但其基本原理、工作機制、戰技指標既沒有公開披露,也沒有被他國完全掌握破解,一直處於保密狀態,令人虛實難辨,起到了很好的威懾作用。

(三)網絡空間作戰演習威懾

網絡空間作戰演習威懾,是以實兵或虛擬的方式在網絡空間展開演習活動,並借助各種媒體渠道,向潛在作戰對手展現本國網絡戰能力、實力與決心,以達到威懾對手的目的。網絡空間作戰演習可分為實兵演習和虛擬演習兩種。前者通常在全國範圍內或與盟國聯合進行,一般以演練軍地聯合網絡空間防禦行動為主。近幾年來,美國及盟國多次舉行“網絡風暴”系列網絡戰演習,以及“施裡弗”系列太空-網絡空間演習,很好展現了網絡戰的動員實力、整體防禦水平,以及實施網絡戰的決心。後者通常在國家大型網絡綜合靶場舉行,一般以演練軍隊專業網絡戰力量的進攻行動為主。

(D) Operations in cyberspace deterrence.

Deterrence in cyberspace operations, refers to a particular network targets Attack effect to make sure to deter fighting a real opponent deterrence. The timing of its use are two: First, when one’s own perceived enemy is about to wage war on one’s own, the focus of one’s own choice of enemy defenses against network-critical objectives targeted, preventive, dissuasive deterrence; the second is when the enemy When the party through one’s own network launched probing attacks, the implementation of deterrence in cyberspace, one’s own need for effective retaliatory, punitive deterrence immediately. Network warfare operations deterrent effect of a variety. For example, infiltration and sabotage the enemy telecommunications network, the phone sends a large number of people to its anti-war message enemy; the enemy to attack the power grid, causing the enemy’s major cities short of blackouts; broadcast television network to attack the enemy in one’s own prime-time spots a special video program, and so on.

Third, the use of elements of deterrence in cyberspace.

Cyberspace deterrence general use requirements are: deterrence of war combined with strength, combat capability and determination to demonstrate, and strive to reflect the small war deterrence to ensure deterrence fine fight, with little cost to achieve deterrence purpose. Specifically, you should do the following.

(A) Both peacetime and wartime, long-term preparations, “Rome was not built in a day.” The successful implementation of cyberspace deterrence, peacetime and wartime needs, will be carried out in the usual full detailed preparation. First, we must conduct a comprehensive and thorough network reconnaissance. Requires intelligence reconnaissance and surveillance technology, wireless surveillance and reconnaissance wired combined network enemy targets long-term sustainability of the network reconnaissance, and gradually find out the basic situation of the enemy network, draws its network topology map, especially soft and hard analysis to find out the enemy Vulnerability member system. The second is to carry out a large number of effective strategies presets. Using hacking tools, through the use of loopholes in the system or other measures to decipher passwords, secret penetration into enemy various types of networks, leaving the back door, set the stepping stones, planted logic bombs and Trojans, cyber-attacks aside for the future launch breakthrough. Third, pre-network defenses are prepared. When the enemy to implement cyberspace deterrence, adjust the network’s own defense deployment in advance, so that the enemy attack path predesigned expected use of system vulnerabilities to attack the program scheduled to be executed difficult to implement, or to implement greatly reduced, to minimize the enemy Network revenge losses.

Original Mandarin Chinese:

(四)網絡空間作戰行動威懾

網絡空間作戰行動威懾,是指對特定的網絡目標實施攻擊,以確信的攻擊效果來威懾作戰對手的一種實戰性威懾。其運用的時機有兩個:一是當己方覺察敵方即將對己方發動戰爭時,己方選擇敵方重點防禦的關鍵性網絡目標進行針對性打擊,進行預防性、遏制性威懾;二是當敵方通過對己方發起試探性網絡攻擊,實施網絡空間威懾時,己方應立即進行有效的報復性、懲戒性威懾。具有威懾效果的網絡戰行動有多種。例如,對敵電信網滲透破壞,向敵國民眾手機大量發送宣傳反戰短信;對敵電力網進行攻擊,造成敵重要城市短時間的大面積停電;對敵廣播電視網進行攻擊,在黃金時段插播己方特製的視頻節目等等。

三、網絡空間威懾的運用要點

網絡空間威懾總的運用要求是:懾戰結合,以實力、實戰展示能力和決心,力求以小戰體現威懾、以精打確保威懾,以較小的代價實現威懾目的。具體說來,應做到以下幾點。

(一)平戰結合,長期準備

“冰凍三尺,非一日之寒”。成功實施網絡空間威懾,需要平戰結合,在平時就要進行充分細致的準備。一是要進行全面周密的網絡偵察。要求諜報偵察與技術偵察、無線偵察與有線偵察相結合,對敵網絡目標進行長期持續的網絡偵察,逐步摸清敵網絡基本情況,繪制其網絡拓撲結構圖,尤其是分析查找出敵各種軟硬件系統的漏洞。二是要進行大量有效的戰略預置。採用黑客手段,通過利用系統漏洞或口令破譯等辦法,秘密滲透進入敵各類網絡,留下後門,設置跳板機,埋設邏輯炸彈和木馬,為未來發動網絡攻擊預留突破口。三是進行預有準備的網絡防禦。在對敵實施網絡空間威懾時,己方應提前調整網絡防禦部署,使敵預先設計的攻擊路徑,預期利用的系統漏洞,預定執行的攻擊方案難以實施,或實施效果大打折扣,最大限度地降低敵網絡報復造成的損失。

(B) Careful decision-making.

Control the intensity of decision-making   Sun Tzu said: “Lord, not anger and Xingshi, will not be indignant caused the war.” Cyberspace deterrence strategy game behavior between countries, especially real deterrence and sensitivity, we must do rational, beneficial, section, must not because deterrence “threshold” low abuse indiscriminate use, or their effect may be counterproductive. Cyberspace real deterrent to combat the strength of the control of demanding. On the one hand, if the intensity is too small, an enemy government and people will not have fear, not achieve the desired deterrent effect, the person may also take the same means to implement anti-deterrence, eventually leading to confrontation upgrade, make one’s own deterrence fail. On the other hand, if the intensity is too large, to the enemy causing huge economic losses and casualties caused by the international community to condemn and enemy government, people’s hatred, it could lead to the use of conventional enemy forces massive retaliation, possibly even nuclear states will be spent on nuclear power, so not only can not deter war ended, it will play the role of the fuse of war.

(C) Unity of command, well-organized.

Military organizations implement deterrence in cyberspace, to centralized command, unified planning, improve collaboration. First, the well-organized force. Unified organization of military reconnaissance, attack, defense, control four forces, actively coordinate military forces the parties to form a joint force cyberwarfare. In particular, to organize and coordinate the civil non-professional cyber warfare forces especially patriotic hackers, cannot appear “rashness” phenomenon, so as not to lead to friction, misfires, causing cyber warfare upgrades, or premature disclosure attack intentions, a handle , resulting in uncontrollable situation or action fails. Second, the precise and appropriate choice target. Should affect a wide selection, easy to produce significant deterrent effect of the goal. For example, the ratings ranking of radio and television channels, access to a huge amount of portals, many users of wireless communication networks. You cannot select innocuous, the impact was small, and the public indifference to attack targets, easily mistaken for network security incidents ordinary hackers manufactured not achieve the desired deterrent effect. Also, consider the constraints of international law and the laws of war, you cannot select targets could easily lead to a humanitarian catastrophe, try not to choose the network destination railway, aviation, financial, medical and other sectors, so as not to provoke the international community and other public condemnation and resentment.

Third, the precise control of the process. Before implementing cyberspace deterrent against, to issue a warning to the enemy hit by extensive propaganda campaign, declared to the world the justice of one’s own actions, to gain the understanding and support of international public opinion. To highlight the deterrent effect, can one’s own network announced high-profile target enemy to attack, then break the enemy defense layers of the network, implement firm and effective network attacks, and finally, if necessary, but also on the effect of timing recovery network attacks to demonstrate one’s own superb network attack techniques and tools, so that policy makers and the public to produce enemy off guard, overwhelming psychological frustration, thereby forming a strong deterrent effect.

(D) Actual situation, focusing on strategy.

Sun Tzu said, “it can and cannot be shown, and illustrates it with no”, applied to cyberspace deterrence, summed up the gist of “show undeclared, declared and not shown.” “Show undeclared”, is the use of cyber-attacks is difficult to track the location of this, cyber-attacks on specific targets, but not announced is that of one’s own, both showing one’s own ability, but also makes the enemy, although suspicion is that as one’s own, but no evidence, not be pursued. “Vision does not show”, is publicity or inadvertently disclose one’s own research or advanced network warfare equipment fictional models, performance, features, deliberately exaggerate their operational effectiveness, falsehoods, actual situation, make the enemy unable to figure out the true strength of one’s own to produce a deterrent effect. Network warfare operations traceable having difficulty tracing, forensics complex features, the initiator can either admit to be denied, or put the blame on civil hackers.

Original Mandarin Chinese:

(二)慎重決策,控制強度

孫子曰:“主不可以怒而興師,將不可以慍而致戰”。網絡空間威懾是國家之間的戰略博弈行為,尤其是實戰威懾,敏感性強,必須做到有理、有利、有節,決不能因為威懾“門檻”較低而濫用亂用,否則其效果可能會適得其反。網絡空間實戰威懾對作戰強度控制的要求很高。一方面,若強度太小,敵國政府和民眾不會產生畏懼心理,起不到應有的威懾效果,對方還可能採取同樣的手段實施反威懾,最終導致對抗升級,使己方威懾失效。另一方面,若強度過大,給敵國造成巨大的經濟損失和人員傷亡,引起國際社會的譴責和敵國政府、民眾的仇恨心理,就可能引發敵國運用常規力量進行大規模報復,有核國家甚至可能會動用核力量,這樣不但不能懾止戰爭,反而會起到戰爭導火索的作用。

(三)統一指揮,周密組織

網絡空間威懾的組織實施,要集中指揮,統一籌劃,搞好協同。一是精心組織力量。統一組織軍隊偵、攻、防、控四支力量,積極協調軍地各方網絡戰力量形成合力。尤其是要組織和協調好民間非專業網絡戰力量特別是愛國黑客,不能出現“盲動”現象,以免引發摩擦,擦槍走火,引起網絡戰的升級,或過早暴露攻擊意圖,授人以柄,導致局勢不可控或行動失敗。二是精當選擇目標。應選擇影響面廣,易產生明顯威懾效果的目標。例如,收視率排名靠前的廣播電視頻道、訪問量巨大的門戶網站、用戶眾多的無線通信網絡等。不能選擇無關痛癢、影響面小、民眾漠不關心的目標進行攻擊,易被誤認為是普通黑客製造的網絡安全事件,起不到應有的威懾效果。此外,還要考慮國際法和戰爭法約束,不能選擇易造成人道主義災難的目標,盡量不選取鐵路、航空、金融、醫療等部門的網絡目標,以免激起國際社會和對方民眾的譴責和反感。三是精確控制進程。實施網絡空間威懾性打擊之前,要通過廣泛的輿論宣傳造勢,向敵國發出打擊警告,並向全世界宣告己方行動的正義性,以爭取國際輿論的理解和支持。為突出威懾效果,己方可以高調宣布要攻擊的敵國網絡目標,再突破敵方層層網絡防禦,實施堅決有效的網絡攻擊,必要時最後還可對網絡攻擊效果進行定時恢復,以展現己方高超的網絡攻擊技術和手段,讓敵方決策者和民眾產生防不勝防、難以招架的心理挫折感,從而形成強烈的震懾效果。

(四)虛實結合,注重謀略

孫子所說的“能而示之不能,用而示之不用”,運用到網絡空間威懾,其要點概括起來就是“示而不宣、宣而不示”。“示而不宣”,就是利用網絡攻擊難以追蹤定位這一點,對特定目標實施網絡攻擊,但不對外宣布是己方所為,既展示了己方能力,又使得敵方雖然懷疑是己方所為,但沒有證據,無法追究。“宣而不示”,就是公開宣傳或不經意透露己方研製或虛構的先進網絡戰裝備的型號、性能、特點,刻意誇大其作戰效能,虛虛實實,虛實結合,使敵摸不清己方真實實力,從而產生威懾效果。網絡戰行動具有追蹤溯源困難、取證複雜的特點,發起方既可以承認,也可以矢口否認,或把責任推給民間黑客組織。

Original Source: www.crntt.iw/888

People’s Republic of China: People’s Liberation Army General Officer Changes for New Military Commands

People’s Republic of China: People’s Liberation Army General Officer Changes for New Military Commands

China on Friday, January 1st, 2016 unveiled further details of one of its largest military reforms, launching three new bodies of the People’s Liberation Army (PLA), including an army command, an upgraded missile force and a special force for space and cyber wars. Chinese President Xi Jinping, who also heads the Central Military Committee (CMC), on Thursday conferred military flags to the commanders of the three bodies, namely the PLA Army General Command, the PLA Rocket Force and the PLA Strategic Support Force, at their inauguration ceremony in Beijing. This is part of China’s key reforms aimed at enhancing the Communist Party of China’s (CPC) leadership over the military, and boosting the PLA’s combat capabilities by establishing a modern military system.

20160104131249755

Newly Assigned PLA Generals of the Strategic Rocket and Support Forces

PLA’s New General Officer Assignments

[Pictured above starting with back row]

Army Commander Li Zuocheng (formerly the Chengdu Military Region Commander)

Army political commissar Liu Lei (former political commissar of the Lanzhou Military Region)

Lieutenant General Peng Bo (formerly the Lanzhou Military Region Deputy Commander)

Major General You Haitao (formerly the Nanjing Military Chief of Staff Region Deputy Commander)

Major General Ronggui Qing (formerly the Chengdu Military Region Commander)

Major General Shi Xiao (former deputy political commissar of the Lanzhou Military Region)

Major General Wu Gang (former deputy political commissar of the Nanjing Military Region, the Discipline Committee)

Major General Liuzhen Li (former General Armament Department of the Army equipment research)

Major General Zhangshu Guo (formerly the Beijing Military Region Political Department)

Major General Han Zhiqing (former Minister of Joint Logistics Department of the Jinan Military Region)

Major General Gao Bo (former chief minister of Minister of Joint Logistics Department of the Jinan Military Region)

Senior Colonel (Brigadier General Select)Lu Rong Yi (ordered to command the Ministry of Scientific Research)

中国解放军事科学院_lit

People’s Liberation Army Command

The army used to be supervised by four headquarters – the General Staff Headquarters, the General Political Department, the General Logistics Department and the General Armament Department. The establishment of the Army General Command puts the control directly under the Central Military Commission. It is a major measure to improve the leadership and command system, the Ministry of National Defense said earlier.

Through a joint command and combat system, the Central Military Commission will be able to directly lead the army, the navy, the air force and rocket force, which will largely enhance the efficiency during wartime, said Song. At a Chinese military conferral ceremony, President Xi said the move to form the Army General Command, the Rocket Force and the Strategic Support Force is a major decision by the CPC Central Committee and the Central Military Commission to realize the Chinese dream of a strong military, and a strategic step to establish a modern military system with Chinese characteristics. It will be a milestone in the modernization of the Chinese military and will be recorded in the history of the people’s armed forces, according to Xi.

The Central Military Commission has also released a guideline on deepening national defense and military reform, about a month after Xi ordered a military administration and command system overhaul at a key meeting. According to the guideline, a new structure will be established in which the CMC takes charge of the overall administration of the PLA, the Chinese People’s Armed Police and the militia and reserve forces, while battle zone commands focus on combat and various military services pursue development. The military reforms, which will involve massive restructuring and regrouping, are expected to “make major breakthroughs” and achieve concrete results by 2020, according to the CMC.

PLA Cyber and Space forces

3259521140

Yang did not get into much detail about what the Strategic Support Force is, but said it is a force which combines the strategic, basic and support resources of the country’s new type of combat forces. But Song said this new force is mainly aimed at providing resources capable of protecting China’s cyber and space security. Song said the establishment of the Strategic Support Force shows the Chinese leadership’s vision of building a military that can meet the challenges of not only traditional warfare but also of new warfare centered on new technology.

PLA Rocket Force

Analysts said the establishment of the PLA Rocket Force is an upgrade of the previous Second Artillery Force, which operates strategic as well as conventional missile weapons.

The upgrade places the rocket force on an equal footing with the army, navy and air force, said Song Zhongping, a military expert. The name change to the Rocket Force from “Second Artillery Force” also shows China’s determination to enhance military transparency. It will also impose strong strategic deterrence, he said. The Defense Ministry on Friday stressed that the establishment of the Rocket Force does not mean a major change of its nuclear policy. Reiterating its no-first-use nuclear weapons policy and defensive nuclear strategy, spokesperson Yang Yujun said at a press conference that China’s nuclear policy remains consistent, and China always keeps its nuclear capability at the minimum level required for safeguarding its national security. “We will strive to build a strong and modern Rocket Force,” he said.

Source:

http://chinamil.com.cn/news-channels/photo-reports/2016-01/01/content_6840094.htm

Major PLA Structural Announcements on a weekend?

Is anyone else out there wondering why China would make significant military announcements when the USGOV isn’t paying attention?

3259521140

China upgrades missile force, adds space and cyber war forces

China on Friday unveiled further details of one of its largest military reforms, launching three new bodies of the People’s Liberation Army (PLA), including an army command, an upgraded missile force and a special force for space and cyber wars.

Chinese President Xi Jinping, who also heads the Central Military Committee (CMC), on Thursday conferred military flags to the commanders of the three bodies, namely the PLA Army General Command, the PLA Rocket Force and the PLA Strategic Support Force, at their inauguration ceremony in Beijing.

This is part of China’s key reforms aimed at enhancing the Communist Party of China’s (CPC) leadership over the military, and boosting the PLA’s combat capabilities by establishing a modern military system.

Rocket force

Analysts said the establishment of the PLA Rocket Force is an upgrade of the previous Second Artillery Force, which operates strategic as well as conventional missile weapons.

The upgrade places the rocket force on an equal footing with the army, navy and air force, said Song Zhongping, a military expert.

The name change to the Rocket Force from “Second Artillery Force” also shows China’s determination to enhance military transparency. It will also impose strong strategic deterrence, he said.

The Defense Ministry on Friday stressed that the establishment of the Rocket Force does not mean a major change of its nuclear policy.

Reiterating its no-first-use nuclear weapons policy and defensive nuclear strategy, spokesperson Yang Yujun said at a press conference that China’s nuclear policy remains consistent, and China always keeps its nuclear capability at the minimum level required for safeguarding its national security.

“We will strive to build a strong and modern Rocket Force,” he said.

Cyber and space forces

Yang did not get into much detail about what the Strategic Support Force is, but said it is a force which combines the strategic, basic and support resources of the country’s new type of combat forces.

But Song said this new force is mainly aimed at providing resources capable of protecting China’s cyber and space security.

Song said the establishment of the Strategic Support Force shows the Chinese leadership’s vision of building a military that can meet the challenges of not only traditional warfare but also of new warfare centered on new technology.

Army command

The army used to be supervised by four headquarters – the General Staff Headquarters, the General Political Department, the General Logistics Department and the General Armament Department.

The establishment of the Army General Command puts the control directly under the Central Military Commission. It is a major measure to improve the leadership and command system, the Ministry of National Defense said earlier.

Through a joint command and combat system, the Central Military Commission will be able to directly lead the army, the navy, the air force and rocket force, which will largely enhance the efficiency during wartime, said Song.

At Thursday’s conferral ceremony, President Xi said the move to form the Army General Command, the Rocket Force and the Strategic Support Force is a major decision by the CPC Central Committee and the Central Military Commission to realize the Chinese dream of a strong military, and a strategic step to establish a modern military system with Chinese characteristics.

It will be a milestone in the modernization of the Chinese military and will be recorded in the history of the people’s armed forces, according to Xi.

The Central Military Commission has also released a guideline on deepening national defense and military reform, about a month after Xi ordered a military administration and command system overhaul at a key meeting.

According to the guideline, a new structure will be established in which the CMC takes charge of the overall administration of the PLA, the Chinese People’s Armed Police and the militia and reserve forces, while battle zone commands focus on combat and various military services pursue development.

The military reforms, which will involve massive restructuring and regrouping, are expected to “make major breakthroughs” and achieve concrete results by 2020, according to the CMC.

Xinhua contributed to this story


The General Command of Army Badge. Photo source: weibo account of “yangshixinwen”.


The PLA Rocket Force Badge. Photo source: weibo account of “yangshixinwen”.
 

The PLA Strategic Support ForceBadge. Photo source: weibo account of “yangshixinwen”.

China upgrades missile force, adds space and cyber war forces – #China Military Online

People’s Republic of China upgrades missile force, adds space and cyber war forces

Source: Global TimesEditor: Dong Zhaohui

Chinese President Xi Jinping (L F), confers the military flag to Li Zuocheng (C F), commander of the Army of the Chinese People’s Liberation Army (PLA), and Liu Lei, political commissar of the Army, in Beijing, capital of China, Dec. 31, 2015. The general commands of the PLA Army, Rocket Force and Strategic Support Force were founded on Thursday.

The People’s Republic of China, Friday unveiled further details of one of its largest military reforms, launching three new bodies of the People’s Liberation Army (PLA), including an army command, an upgraded missile force and a special force for space and cyber wars.

Chinese President Xi Jinping, who also heads the Central Military Committee (CMC), on Thursday conferred military flags to the commanders of the three bodies, namely the PLA Army General Command, the PLA Rocket Force and the PLA Strategic Support Force, at their inauguration ceremony in Beijing.

This is part of China’s key reforms aimed at enhancing the Communist Party of China’s (CPC) leadership over the military, and boosting the PLA’s combat capabilities by establishing a modern military system.

Rocket force

Analysts said the establishment of the PLA Rocket Force is an upgrade of the previous Second Artillery Force, which operates strategic as well as conventional missile weapons.

The upgrade places the rocket force on an equal footing with the army, navy and air force, said Song Zhongping, a military expert.

The name change to the Rocket Force from “Second Artillery Force” also shows China’s determination to enhance military transparency. It will also impose strong strategic deterrence, he said.

The Defense Ministry on Friday stressed that the establishment of the Rocket Force does not mean a major change of its nuclear policy.

Reiterating its no-first-use nuclear weapons policy and defensive nuclear strategy, spokesperson Yang Yujun said at a press conference that China’s nuclear policy remains consistent, and China always keeps its nuclear capability at the minimum level required for safeguarding its national security.

“We will strive to build a strong and modern Rocket Force,” he said.

Cyber and space forces

Yang did not get into much detail about what the Strategic Support Force is, but said it is a force which combines the strategic, basic and support resources of the country’s new type of combat forces.

But Song said this new force is mainly aimed at providing resources capable of protecting China’s cyber and space security.

Song said the establishment of the Strategic Support Force shows the Chinese leadership’s vision of building a military that can meet the challenges of not only traditional warfare but also of new warfare centered on new technology.

Army command

The army used to be supervised by four headquarters – the General Staff Headquarters, the General Political Department, the General Logistics Department and the General Armament Department.

The establishment of the Army General Command puts the control directly under the Central Military Commission. It is a major measure to improve the leadership and command system, the Ministry of National Defense said earlier.

Through a joint command and combat system, the Central Military Commission will be able to directly lead the army, the navy, the air force and rocket force, which will largely enhance the efficiency during wartime, said Song.

At Thursday’s conferral ceremony, President Xi said the move to form the Army General Command, the Rocket Force and the Strategic Support Force is a major decision by the CPC Central Committee and the Central Military Commission to realize the Chinese dream of a strong military, and a strategic step to establish a modern military system with Chinese characteristics.

It will be a milestone in the modernization of the Chinese military and will be recorded in the history of the people’s armed forces, according to Xi.

The Central Military Commission has also released a guideline on deepening national defense and military reform, about a month after Xi ordered a military administration and command system overhaul at a key meeting.

According to the guideline, a new structure will be established in which the CMC takes charge of the overall administration of the PLA, the Chinese People’s Armed Police and the militia and reserve forces, while battle zone commands focus on combat and various military services pursue development.

The military reforms, which will involve massive restructuring and regrouping, are expected to “make major breakthroughs” and achieve concrete results by 2020, according to the CMC.

Xinhua contributed to this story


The General Command of Army Badge. Photo source: weibo account of “yangshixinwen”.


The PLA Rocket Force Badge. Photo source: weibo account of “yangshixinwen”.
 

The PLA Strategic Support ForceBadge. Photo source: weibo account of “yangshixinwen”.
 

http://english.chinamil.com.cn/news-channels/photo-reports/2016-01/01/content_6840094.htm

Chinese Military View: Strategy of American Cyberspace

Chinese Military View: Strategy of American Cyberspace

中國軍事的看法:美國網絡空間戰略

Author Info:  中校崔建树

 

F201107160907271133257576

Summary: As “artificial space” Cyberspace is the second land, sea, air, space human’s fifth-dimensional space. Reports from the relevant strategy adopted by the United States in recent years, the United States developed a set of cyberspace strategy, including the right to compete for the system network strategy, enabling the network to improve the combat effectiveness of weapons “network-centric warfare” strategy, cyberspace security strategy and the strategic use of cyberspace for his country’s political and ideological penetration. Cyberspace has developed strategic US achieved remarkable results, for which seek a major political, security, economic and military interests. However, the openness of cyberspace also increased the vulnerability of the United States, such as the United States to maintain hegemony in cyberspace developed thousands of computer viruses, so-called “logic bomb”, once mastered by terrorists, the consequences would be disastrous.

Keywords: USA; cyberspace; strategy

Cyberspace (Cyberspace) or, more accurately known as the network of electromagnetic space, is a noun Canadian science fiction writer William Gibson (William Gibson) made in its 1984 publication of the novel “Neuromancer” (Neuromancer), the mean computer information systems and the human nervous system is connected to produce a virtual space. ① with the rapid development of computer technology, sensor technology and networks and grid technology breakthrough, cyberspace has become a new objective in the field of real. “The field of electromagnetic energy to use electronic equipment, grid, and networking hardware and software systems for the physical carrier, information and control information as the main content, by storing the data, modify, and exchange, to achieve the physical system manipulation. ” ② Thus, cyberspace is a new “control domain.” ③ Its various sectors and areas of operation control is as effective as the control of human behavior the human nervous system. As the world’s sole superpower, the United States to maintain its hegemony, naturally will not miss this new “control domain.” ④ to this end, the United States developed a comprehensive strategy for cyberspace. This strategy includes the right to compete for the system network strategy, enabling the network to improve the combat effectiveness of weapons “network-centric warfare” strategy, cyberspace security strategy and the use of cyberspace for his country’s political and ideological penetration strategy.

First, the United States made the right strategic network

The predecessor of the modern Internet is the United States Department of Defense to build the “ARPANET” (ARPA Net). In 1969, the US Department of Defense to ensure that the US critical computer systems in the event of nuclear war still normal operation, ordered their subordinates Advanced Research Projects Agency (Advanced Research Project Agency, ARPA) study computer networking problems. By the late 1970s, the Defense Advanced Research Projects Agency has established a number of computers on the LAN and put into use. In order to solve communication problems between the LAN, Advanced Research Projects Agency to examine the different LAN WAN link up the formation of a new method, and built a wide area of the computer on the Internet. Since the advent of the Internet, it can be described as a breakthrough in technology by leaps and bounds, the network connection touches every corner of the world, “showing unprecedented strength.” ⑤ especially with the micro-electromechanical systems (micro-electro-mechanism system, MEMS) rapid development, there have been a number of communications and computing power of having micro-sensors. These sensors can always be accurately detected on the detection region by an ad hoc manner, and the detection result transmitted through a wired or wireless network to the implementers. Since the prospect of this technology is unlimited, the US National Science Foundation in 2003 to allocate huge amounts of money, research sensor network technology, the US Department of Defense has set up a series of military sensor network research projects.

Currently, connect the computer and mass sensor network is the nerve of the world has been integrated, and grasp the system network electromagnetic space right is tantamount to control of the world of the nervous system, it’s meaning even more dramatically than the seas of the 19th century, 20th century airpower. Therefore, all the major countries in the world attaches great importance to the network the right to compete for electromagnetic space. Such as Germany in recent years to develop a “German network security strategy,” Britain also issued a “National Cyber Security Strategy.” Although these reports entitled strengthen “cybersecurity”, in fact, prepared to compete for the right network electromagnetic space. In order to firmly grasp the system network electromagnetic space right, the American government can be described as a multi-pronged.

内容提要:作为“人造空间”的网络空间是继陆、海、空、天之后的人类第五维空间。从美国近几年通过的相关战略报告来看,美国制定了一整套网络空间战略,其中包括争夺制网权战略、通过网络赋能提高武器打击效果的“网络中心战”战略、网络空间安全战略以及利用网络空间对他国进行政治和思想渗透的战略。美国制定的网络空间战略已经取得明显效果,为其谋取了重大的政治、安全、经济和军事利益。但是,网络空间的开放性也同样增加了美国的脆弱性,如美国为维持网络空间霸权开发的数千种计算机病毒,即所谓的“逻辑炸弹”,一旦被恐怖分子所掌握,后果将不堪设想。

关 键 词:美国;网络空间;战略

网络空间(Cyberspace)或更准确地称为网络电磁空间,是加拿大科幻小说家威廉·吉布森(William Gibson)在其1984年出版的小说《神经漫游者》(Neuromancer)中提出的名词,意指计算机信息系统与人的神经系统相连接产生出的一种虚拟空间。①随着计算机技术、传感器技术的飞速发展及网络和网格技术的突破,网络空间已成为一个新兴的真实存在的客观领域。“该领域以使用电磁能量的电子设备、网格,以及网络化软硬件系统为物理载体,以信息和对信息的控制力为主要内容,通过对数据的存储、修改和交换,实现对物理系统的操控”。②由此可见,网络空间是一个新兴的“控制域”。③它对各个行业和领域运转的控制就如人的神经系统对人的行为的控制一样有效。作为世界上的唯一超级大国,美国要维护自己的霸权地位,自然不会放过这一新兴的“控制域”。④为此,美国制定了一套完备的网络空间战略。这一战略包括争夺制网权战略、通过网络赋能提高武器打击效果的“网络中心战”战略、网络空间安全战略以及利用网络空间对他国进行政治和思想渗透的战略。

一、美国的制网权战略

现代互联网的前身是美国国防部构建的“阿帕网”(ARPA Net)。1969年,美国国防部为确保美国重要的计算机系统在发生核大战时仍能正常运作,下令其下属的高级研究计划局(Advanced Research Project Agency,ARPA)研究计算机联网问题。到20世纪70年代末期,国防部高级研究计划局又建立了若干个计算机局域网并投入使用。为解决局域网之间的通信问题,高级研究计划局着手研究将不同局域网联结起来形成广域网的新方法,并建成了一个广域的计算机互联网。自互联网问世以来,它在技术方面的突破可谓一日千里,网络连接触及全球的每一个角落,“展现出史无前例的力量”。⑤特别是随着微机电系统(micro-electro-mechanism system,MEMS)的迅速发展,出现了众多具有通信和计算能力的微型传感器。这些传感器可以通过自组方式时时对探测区进行精确探测,并将探测结果通过有线或无线网络传输给实施者。由于这一技术的应用前景无限广阔,美国自然科学基金会于2003年拨出巨资,研究传感器网络技术,美国国防部也设立了一系列军事传感器网络研究项目。

当前,连接计算机和海量传感器的网络是已经融为一体的世界的神经,而掌握住制网络电磁空间权就等于控制了这个世界的神经系统,其意义甚至大大超过19世纪的制海权、20世纪的制空权。所以,世界主要国家无不高度重视对网络电磁空间权的争夺。如德国近几年制定了《德国网络安全战略》,英国也发布了《国家网络安全战略》。这些报告虽然名为加强“网络安全”,实为争夺制网络电磁空间权。为了牢牢把握制网络电磁空间权,美国政府可谓多管齐下。

First, the United States firmly gripping the global Internet DNS rights. Internet domain names corresponding numeric Internet address of the network hierarchy character flags, house number is the online world, has a unique and exclusive features. Since the domain name and corporate name, logo or trademark goods closely linked, the United States could reap significant economic and strategic interests. As in 2000, Shenzhen Kim Ji tower software company, Shanghai AIU Online, Shenzhen China Motion and other companies related to domain names registered by the United States against the company, the result lost both “referee” in the domain name dispute arbitration is “athlete” US companies and economic losses. To control DNS rights, the United States as early as September 1998 on the establishment of the “Internet domain name and address of the Management Company” (ICANN). ICANN board member from the United States, Brazil, Bulgaria, Germany, Japan and other countries, but the US Department of Commerce has the final veto. Conference USA to maintain its control over the domain name, in November 2005, held in Tunis on issues related to the Internet, when he was Secretary of State Condoleezza Rice specifically wrote to the then European Presidency, asking him to support ICANN management of the Internet. The US Congress also to the 423 votes to none passed a resolution demanding the US government to control the Internet. In December 2012, at the World Conference on International Telecommunications in Dubai, UAE, held on the United Arab Emirates submitted a host of Internet governance requires separation of the right to file, was firmly opposed to the United States on behalf of Kramer, claiming that the meeting “to discuss the telecommunications issues, with the Internet is not relevant. ” ⑥

Second, the Internet’s root server control in their own hands. Since the domain name system management mode was root-like distribution, so the root server management plays a decisive role in the domain name, which is state-controlled root server, this country will have enormous power in the Internet field. Presently there are a main root server and 12 deputy root servers. Placed in Dulles, Virginia, USA taproot server by the American company responsible for managing VeriSign. 12 deputy root servers, 9 placed in the United States, the US military to use two, NASA use a. In addition three deputy root server is placed in the hands of Britain, Sweden, Japan and other US allies. In other words, the United States has the root servers direct and indirect control. As long as the United States is willing, just the root servers and secondary domain name server is disconnected, the United States can paralyze a country with hostile Internet system. 2009, should the United States government requirements, Microsoft has cut off Cuba, Syria, Iran, Sudan and North Korea and other five countries of MSN services, resulting in five countries MSN users can not log in to the instant messaging system.

Third, the United States to use its absolute dominance in the network software, hardware manufacturing capacity and technology to reap political benefits. According to the statistics of relevant institutions, worldwide 18 Internet software companies, 10 are US companies, including Microsoft (Microsoft) is the world’s largest software company, the company’s operating system is widely used in personal computers and servers . Cisco (Cisco Systems) is a network hardware leader in the field of production, the company’s routers, switches, repeaters, etc. occupies an important position in the international market. Juniper (Juniper Networks) and Brocade Communications Systems (Brocade Communications Systems) is the world’s leading network equipment manufacturers, its router technology and storage switch technology leader worldwide. Advanced network software, hardware manufacturing technology and strong production capacity is one of the United States compete for hegemony trump network electromagnetic space can be necessary to stop the threat or actual termination of the provision of goods to the opponent, the other stuck in the woods. In addition, major US software companies are closely related with the US government. Under the government’s behest, the US software vendors often on their manufacturing software is embedded with the back door, so that, if necessary, to serve the US political, economic and national security purposes. In 1999, Microsoft’s blockbuster “NSA key” event the United States attempts to steal other countries’ secrets revealed to the world.

首先,美国坚决把持全球互联网的域名解析权。互联网的域名是对应互联网数字地址的层次结构式网络字符标志,是网络世界的门牌号,具有唯一性和排他性的特点。由于域名与企业名称、商品标识或商标紧密相联,美国可以从中谋取重大经济与战略利益。如2000年,深圳金智塔软件公司、上海美亚在线、深圳润迅等公司注册的域名遭到美国相关公司的反对,结果在域名争议仲裁中输给了既是“裁判员”又是“运动员”的美国企业,经济损失惨重。为控制域名解析权,美国早在1998年9月就成立“互联网域名与地址管理公司”(ICANN)。ICANN的董事会成员来自美国、巴西、保加利亚、德国、日本等国家,但美国商务部拥有最终否决权。美国为维持其域名控制权,2005年11月,在突尼斯召开有关互联网问题的会议上,时任国务卿的赖斯专门写信给当时的欧洲轮值主席,要求他支持ICANN管理互联网。美国国会还以423票对0票通过决议,要求美国政府控制互联网。2012年12月,在阿联酋迪拜召开的国际电信世界大会上,东道国阿联酋提交了一份要求分离互联网管理权的文件,遭到美国代表克雷默的坚决反对,声称这次会议“要讨论的是电信问题,跟互联网不相关”。⑥

其次,把互联网根服务器控制在自己手里。由于域名解析系统的管理模式呈根状分布,因此根服务器在域名管理中起着决定性作用,哪个国家控制根服务器,这个国家就会在互联网领域拥有巨大权力。目前全球共有1个主根服务器和12个副根服务器。放置在美国弗吉尼亚州杜勒斯市的主根服务器由美国的VeriSign公司负责管理。12个副根服务器中,有9个放置在美国,美国军方使用2个,美国国家航空航天局使用1个。另外3个副根服务器放置在英国、瑞典、日本等美国盟友手里。换句话说,美国拥有对根服务器的直接和间接控制权。只要美国愿意,只需将根服务器与二级域名服务器断开,美国便可瘫痪某个与之敌对的国家的互联网系统。2009年,应美国政府要求,微软公司曾切断古巴、叙利亚、伊朗、苏丹和朝鲜等五国的MSN服务,导致这五个国家的MSN用户无法登陆该即时通信系统。

第三,美国利用其在网络软件、硬件制造能力和技术方面的绝对优势地位谋取政治利益。据相关机构的统计数据,全世界18个互联网软件公司中,有10个是美国公司,其中微软公司(Microsoft)是世界最大的软件公司,该公司生产的操作系统广泛应用于个人电脑和服务器上。思科公司(Cisco Systems)是网络硬件生产领域的龙头老大,该公司生产的路由器、交换机、中继器等在国际市场上占有重要地位。瞻博网络(Juniper Networks)和博科通信系统(Brocade Communications Systems)是世界著名的网络设备制造商,其路由器技术和存储交换机技术领先全球。先进的网络软、硬件制造技术和强大的生产能力是美国争夺网络电磁空间霸权的王牌之一,必要时可以威胁停止或实际终止向对手提供商品,陷对方于困境。此外,美国的主要软件商与美国政府均有密切关系。在政府的授意下,美国软件商往往在它们制造的软件上嵌有后门,以便在必要时服务于美国的政治、经济和国家安全目的。1999年,轰动一时的微软“NSA密钥”事件让美国窃取别国机密的企图大白于天下。

Fourth, the United States holds the distribution rights worldwide IP addresses. In the online world, the amount of IP addresses in the real world is like the size of a country’s geographic territory. Because the United States controls the assignment of IP addresses, the vast majority of it will be left to its own IP address and its allies of the company and the public use, other countries can only share a little cold leftovers. For example, although China is a big country network, but IPV4 / IPV6 addresses and domain names are on loan from the United States, seriously controlled by others.

Through control of the domain name and address management of the network, along with its superior network software, hardware manufacturing capacity and advanced technology, the United States has firmly hold control over the Internet. Nevertheless, the US still has a strong sense of urgency. US Department of Defense in 2006 issued a report, “Although the United States is currently in the electromagnetic field of space to enjoy the advantages of the network, but these advantages are being eroded …… and other combat areas, the American network have equal shares of the electromagnetic field of space and opponents fear” . ⑦

In order to further strengthen the US hegemony in cyberspace, the US government multi-pronged approach. In the military field, the US Defense Department network and electromagnetic space regarded as land, sea, air, space similar fifth area, and that the control system network right to maintain its hegemony in the other four areas are of decisive significance. In the 2004 release of “National Military Strategy” report, the US Department of Defense that “the United States armed forces must have the whole sky, land, sea, space and electromagnetic space to expand the network capacity to act.” ⑧ 2006, the US military released the “National Network of electromagnetic space military strategy.” The purpose of the strategy is to ensure that the US “freedom of action in this highly competitive field, while depriving the freedom of movement of our competitors”, ⑨ namely “to ensure US military dominance in the network of electromagnetic space.” ⑨ The document proposes to strengthen in four areas: (1) obtain and maintain the initiative in the competition advantage in the decision-making cycle. US troops should use the Internet to shorten the decision cycle of electromagnetic space, while weakening the decision-making cycle competitors. It needs to maintain a strong network defense, while taking advantage of the weakness of competitors electromagnetic space network, find out competitors weaknesses and defense decision-making cycle. (2) use the Internet so that the whole field of electromagnetic space to further integrate the military capabilities of military operations. DoD various departments must be integrated network electromagnetic space even more delicate. Operational commanders must be closely coordinated with the various support units and defense agencies, and maximize combat, carry out military operations. Although the combat troops to be deployed in various war zones, but they must cooperate with existing military operations, and various government departments, the joint command departments, allied and industrial partners to achieve seamless. (3) construction of the network capacity for action. Including the continuous training of personnel, infrastructure and organization. By wealthy aggressive testing, exercises and continuous improvement, and create new network capacity to act. Risk (4) Management Network electromagnetic space operations. ⑩

第四,美国掌握着全球IP地址的分配权。在网络世界,IP地址的多寡犹如现实世界中一个国家地理版图的大小。由于美国控制了IP地址的分配,它将绝大多数的IP地址留给本国及其盟国的公司和民众使用,其他国家只能分得一点残羹冷炙。例如中国虽是网络大国,但IPV4/IPV6的地址和域名是从美国租借来的,严重受制于人。

通过掌控网络的域名与地址管理,再加上它超强的网络软、硬件制造能力与先进技术,美国已经牢牢掌握着国际互联网的控制权。尽管如此,美国仍然具有强烈的忧患意识。美国国防部2006年出台的报告中称,“尽管美国目前在网络电磁空间领域享有优势,但这些优势正在受到侵蚀……与其他作战领域不同,美国在网络电磁空间领域有与对手平分秋色之虞”。⑦

为进一步强化美国在网络空间领域的霸主地位,美国政府多管齐下。在军事领域,美国国防部将网络电磁空间视作与陆、海、空、天同类的第五个领域,并认为掌握制网权对维持其在其他四个领域内的霸权具有决定性意义。在2004年发布的《国家军事战略》报告中,美国国防部提出“美国武装部队必须拥有在整个天空、陆地、海洋、太空和网络电磁空间展开行动的能力”。⑧2006年,美军发布《国家网络电磁空间军事行动战略》。这项战略的宗旨是确保美军“在这个激烈竞争的领域行动自由,同时剥夺我们竞争对手的行动自由”,⑨即“确保美国在网络电磁空间的军事优势”。⑨该文件提出要在四个方面加强建设:(1)在竞争对手决策周期里获取和维持主动行动优势。美军官兵应利用网络电磁空间缩短决策周期,同时削弱竞争对手的决策周期。这需要维持一个强大的网络防御,同时利用竞争对手的网络电磁空间的弱点,搞清竞争对手的决策周期和防御弱点。(2)利用网络电磁空间使整个军事行动领域进一步整合军事能力。国防部的各个部门必须将网络电磁空间整合得更加精致。作战指挥人员必须与支援部队和国防部的各个机构紧密协同,最大程度地提高战斗力,遂行军事行动。尽管作战部队被部署在各个不同战区,但他们必须与现存的军事行动相配合,与不同政府部门、联合指挥部门、盟军及工业伙伴实现无缝对接。(3)建设网络行动能力。包括持续不断地培训人员、基础设施和组织机构。通过富有进攻性的测试、演习以及不断改良,创造新的网络行动能力。(4)管理网络电磁空间行动的风险。⑩

In fact, long before the promulgation of these documents, the United States had begun to train cyber warfare electromagnetic space warfare capability. According to reports, in June 1995, the US 16 “the first generation of cyberspace warfare warrior” graduated from the National Defense University. In the same year on October 1, the US military in South Carolina State Air Force Base set up the first network of electromagnetic space warfare units, namely the 9th Air Force 609 Squadron. October 1998, the US Defense Department official will be included in the information war fighting doctrine, also approved the establishment of “computer network defense joint special forces.” In early 2006, the US Air Force to establish research networks electromagnetic space problem “network special group”, the special assistant to the Air Force Chief of Staff Dr. Lani Kass headed. With the end, the Air Force officially announced the establishment of a temporary network electromagnetic Space Command 8,000 people, Robert · J. Elder will serve as commander of the post. (11) in 2007, the US Air Force to rely on the 8th Air Force, the Air Force set up a network of electromagnetic space Warfare Command, the Navy has set up a “Navy computer emergency response unit,” West Point established a network of electromagnetic Space Science Center. In 2009, US Defense Secretary Robert Gates announced the formal establishment of the “network of electromagnetic Space Warfare Command,” the US National Security director Keith Alexander will be nominated as commander. According to the US Deputy Secretary of Defense Ashton Carter said in the Aspen Security Forum, held July 18, 2013, the US network forces to be deployed in place. (12) This indicates that the United States has sounded the clarion call to compete for hegemony in cyberspace.

Leading cyberspace requires more advanced than in other countries “in cyberspace arms.” “Cyberspace weapon” belongs to the new concept weapons category, the current world’s major countries are all invested heavily in research and development of such weapons. According to data disclosed by the United States Institute of Technology analysis, the current world investment in electromagnetic weapons in space network has more than 1.7 trillion US dollars. (13) The United States is a pioneer in the development of cyberspace arms and leader. As the Air Force is promoting “Cyber aircraft” (Cybercraft) project aims to develop a kind of reconnaissance for the first time able to rival the network of electromagnetic space combat weapons intent. (14) According to the report disclosed, the concept of cyberspace combat aircraft is very advanced, it can be installed in any electronic medium, you can take the initiative to all software and hardware devices Ping scanning, port scanning, OS identification, vulnerability scanning and enumeration ensure operational commanders to the entire network capable of electromagnetic space, small to any computer instantaneously perception and control. (15) in May 2008, the US government launched a more ambitious program – “Cyber Range” (NCR) program. This program is known as America’s “electronic Manhattan Project” in an attempt by developing “revolutionary” new technology, to win the network electromagnetic space this “space race.”

实际上,早在这些文件颁布之前,美国就已开始着手培养网络战电磁空间战能力。据报道,1995年6月,美军16名“第一代网络空间战战士”从美国国防大学毕业。同年10月1日,美军在南卡罗来纳州空军基地组建了第一支网络电磁空间战部队,即第9航空队第609中队。1998年10月,美国国防部正式将信息战列入作战条令,同时批准成立“计算机网络防御联合特种部队”。2006年初,美国空军建立研究网络电磁空间问题的“网络特别小组”,由空军参谋长特别助理拉尼·卡斯博士任组长。同年底,美国空军正式宣布成立一个8,000人的临时网络电磁空间司令部,罗伯特·J.埃尔德中将担任司令之职。(11)2007年,美国空军以第8航空队为依托,组建了空军网络电磁空间战司令部,海军也组建了“海军计算机应急反应分队”,西点军校成立了网络电磁空间科学中心。2009年,美国国防部部长盖茨宣布正式成立“网络电磁空间战司令部”,美国国家安全局长基思·亚历山大上将被提名担任司令。据美国国防部副部长阿什顿·卡特在2013年7月18日举行的阿斯彭安全论坛上称,美国网军即将部署到位。(12)这标志着美国已经吹响了争夺网络空间霸权的号角。

主导网络空间需要有比其他国家先进的“网络空间武器”。“网络空间武器”属于新概念武器范畴,当前世界主要国家无不投入巨资研究开发这种武器。据美国技术分析研究所披露的数据,目前世界各国在网络电磁空间武器方面的投入已超过1.7万亿美元。(13)美国是网络空间武器研制的先驱与引领者。如美国空军正在推进“赛博飞机”(Cybercraft)项目,旨在研制出一种能在第一时间侦察到对手在网络电磁空间里的作战意图的武器。(14)据有关报告披露,网络空间飞机的作战理念非常先进,它可以安装在任何电子介质中,能主动对所有软件和硬件设备进行Ping扫描、端口扫描、操作系统辨识、漏洞扫描和查点,保证作战指挥员能对大到整个网络电磁空间,小到任意一台计算机进行瞬间感知与控制。(15)2008年5月,美国政府启动了一项更加雄心勃勃的计划——“赛博靶场”(NCR)计划。这一计划号称美国的“电子曼哈顿工程”,企图通过研发“革命性”的新技术,来赢得网络电磁空间这一“太空竞赛”。

Second, the use of cyberspace technology based on the “network-centric warfare,” the Defense Transformation Strategy

Construction on the Internet beginning of the formation, the relevant departments and think tanks on the United States is keenly aware of the great military significance of the Internet, recognizing that future US military strategy must adapt to the development of information technology. August 1, 1995, US Army Training and Doctrine Command issued a report entitled “information warfare” concept “525-69 Handbook”, proposed to all dimensions (land, sea, air, space) space combat and battlefield systems (command and control systems, mobile systems, fire support system) with a data link connection together to establish shared situational awareness coupled with continuous operational capability “of the 21st century force” so that they can more quickly than the enemy, the more accurate reconnaissance, develop decisions into action. (16) in October 1998, the US military issued a “Joint Information Operations doctrine,” said information warfare is the impact of the enemy’s information and information systems, and to protect one’s own information and information systems …… information advantage is the use of information and prevent enemy use capability information. (17)

May 25, 2001, former US President George W. Bush delivered a speech at the US Naval Academy graduation ceremony, stressed that “we must take advantage of the revolutionary advances in warfare technology to build our army, so that we can define our way of war to the maintenance of peace. We are committed to build a mainly mobility and quickness rather than size and number to measure the strength of the future army, build an easier to deploy and security forces, and build a greater reliance on precision-guided weapons and stealth and IT forces. ” (18) about George W. Bush proposed the construction of digital force requirements, the US Congress and the Defense Department put forward a defense to rely on IT transformation program.

US Defense Transformation’s goal is to use the network forming, so that the physical limits of technology has now reached the weaponry to combat multiplier effect. Exercise USAF F-15C aircraft organizations perform aerial combat missions showed that the kill rate using data link F-15C aircraft, increased by more than 1 times. The reason is that “the use of tactical data link enables pilots greatly improved the perception of the battle space, resulting in enhanced combat effectiveness.” (19) forming the premise can use the Internet is to strengthen national defense information infrastructure. As well-developed highway transportation extending in all directions, like inseparable, to obtain information superiority, is also inseparable from nothing is to the broadband network. In January 1993, the Clinton administration issued the “National Information Infrastructure: Action Plan” document, proposed the establishment of high-speed fiber-optic communications network in the United States, namely the “information superhighway”, to every office and home network connections are used to form easily accessible information superhighway. After starting the “information superhighway” Soon, the US military has begun to design national defense information infrastructure (DII) construction. 1995, the US military C4I concept proposed to start the Defense Information Infrastructure Common Operating Environment (DII-COE) construction, is intended to provide timely and accurate safety information for military action. In 1996, the US military further proposed various types of reconnaissance, surveillance, sensor integration, breaking the military services between the “chimney” lined situation, construction command, control, communications, computers, intelligence, surveillance and reconnaissance systems (C4ISR), real “From sensor to shooter” combat capability.

US Department of Defense in promoting the construction of a military network bandwidth while also developing Information Grid (Grid) (20) technology. In 1999, the US Department of Defense proposed the building of “Global Information Grid” (Global Information Grid, GIG). In 2003, the Ministry has announced a “Global Information Grid Architecture” (version 2.0), with the Defense Information Systems Network Planning (DISN) as the backbone to integrate the services of the US military information system, built in line with “Global Information Grid” requirement The “system of systems” formula common operating environment (GIG SOS-COE). At present, “Global Information Grid” bandwidth expansion plan (GIG-BE) has been completed, nearly 100 backbone nodes to achieve a seamless broadband high-speed Internet. 2008, the US Defense Information Infrastructure will extend from the narrow to the broad field of cognitive domain information, information from a network domain to electromagnetic fields (Cyber) across.

二、利用网络空间技术实现基于“网络中心战”的国防转型战略

在因特网构建形成之初,美国相关部门和智库就敏锐地意识到因特网的巨大军事意义,认识到美国未来的军事战略必须适应信息技术的发展。1995年8月1日,美国陆军训练与条令司令部颁发了题为《信息战概念》的《525-69手册》,提出将所有维度(海、陆、空、天)的作战空间和战场系统(指挥控制系统、机动系统、火力支援系统)用数据链连接起来,建立态势感知共享加上具有连续作战能力的“21世纪部队”,使之能够比敌人更迅速、更精准地实施侦察、制定决策、展开行动。(16)1998年10月,美军发布了《信息作战联合条令》,称信息战就是影响敌方的信息和信息系统,并保护己方的信息和信息系统……信息优势就是使用信息并阻止敌人使用信息的能力。(17)

2001年5月25日,美国前总统小布什在美国海军学院毕业典礼上发表讲话,强调“我们必须利用战争技术的革命性进步来建设我们的军队,使我们能用我们所定义的战争方式来维护和平。我们将致力于建设一支主要以机动性和快速性而非规模和人数来衡量实力的未来军队,建设一支更易于部署和保障的军队,建设一支更依赖于隐身精确制导武器和信息技术的军队”。(18)围绕小布什提出的建设数字化部队的要求,美国国会和国防部提出了以信息技术为依托的国防转型计划。

美国国防转型的目标是利用网络赋能,使目前已达到物理技术极限的武器装备打击效果倍增。美国空军组织的F-15C飞机执行空中对抗任务的演习表明,使用数据链的F-15C飞机的杀伤率提高了1倍以上。原因是“战术数据链的使用使飞行员极大地提高了对作战空间的感知,最终导致了战斗力的增强”。(19)利用网络赋能的前提是加强国防信息基础设施建设。就如发达的交通离不开四通八达的高速公路一样,要取得信息优势,也离不开无所不至的宽带网络。1993年1月,克林顿政府出台《国家信息基础设施:行动计划》文件,提出在美国建立高速光纤通信网,即“信息高速公路”,把每一个办公室和家庭都用网络连接起来,形成四通八达的信息高速公路。在启动“信息高速公路”后不久,美国军方也开始着手设计国防信息基础设施(DII)建设。1995年,美军提出C4I概念,启动国防信息基础设施公共操作环境(DII-COE)建设,意在为军事行动提供及时、准确的安全信息。1996年,美国军方进一步提出对各类侦察、监视传感器进行整合,打破军种之间“烟囱”林立的状况,建设指挥、控制、通信、计算机、情报、监视和侦察系统(C4ISR),真正实现“从传感器到射手”的作战能力。

美国国防部在推进军用网络带宽建设的同时,还在大力发展信息网格(Grid)(20)技术。1999年,美国防部提出建设“全球信息网格”(Global Information Grid,GIG)。2003年,该部又公布了《全球信息网格体系结构》(2.0版),规划以国防信息系统网(DISN)为骨干整合美军各军种的军事信息系统,建成符合“全球信息网格”要求的“系统之系统”式公共操作环境(GIG SOS-COE)。目前“全球信息网格”带宽扩展计划(GIG-BE)已完成,近100个骨干节点实现了无缝宽带高速互联。2008年,美军将国防信息基础设施从狭义信息域扩展到广义认知域,实现从信息域到网络电磁域(Cyber)的跨越。

IT as the US military will support the transformation of the armed forces, which means the network as the core of military transformation, from a “platform-centric” to “network-centric” transformation. Network-centric warfare concept first proposed by the American Arthur Cheb Petrovsky and John Garstka. (21) They “Network Centric Warfare: The Origins and Future” in an article that, in the 20th century, humanity has entered a new era of war, “society has changed, potential economic and technology has changed, American business has changed if the US military does not change, we should be surprised and shocked. ” (twenty two)

“Network Centric Warfare” concept put forward by the two authors was quickly adopted by the US official. In 2002, the US Department of Defense submitted to the “Network Centric Warfare” (Network-Centric Warfare) report to Congress, proposed Defense Transformation Network Centric Warfare as a guide. The report said, “network-centric forces are able to create and use an information advantage to dramatically improve the combat effectiveness of troops, it can improve the ability of the Department of Defense to maintain global peace and the need to restore stability to assume its tasks dominant position “in all types of military operations. (twenty three)

Core network-centric warfare is to war physical domain, information domain and cognitive domain “network.” (24) Compared with the platform-centric warfare, network centric warfare has incomparable advantages.

First, the network-centric warfare make the battlefield transparent. Outcome of the war does not depend on who put the most money, manpower and technology put on the battlefield, but rather who has the best information about the battlefield. Since (25) For centuries, there has been war uncertainty and resistance, making it difficult to predict war, Clausewitz called the “fog of war”, and now finally able to gradually uncover the layers of fog. (26)

Second, network-centric warfare can greatly improve the firepower effect. Platform-centric blow process, the ability to detect and combat together under one platform, and a platform for the ability to obtain information from the other platforms and then carry out combat missions based on very limited. And network-centric warfare, the fighting is fueled by increased capacity, improve the quality and timeliness of information flow between networks. Increase the flow of information is critical battle space perception can be shared and improving information accuracy. Network after partial image of each unit consisting of a complete summary of operational space diagram, and then transferred immediately to the decision scheme weapon against the system, greatly improving the efficiency of the weapon system.

Third, network-centric warfare has greatly enhanced the efficiency of command. Under normal circumstances, the operations process consists of the following elements: probe target, identify the target, hit the target to make decisions, the decision to transfer arms, weapons, aim and fire. This process, play a decisive role from target detection to fire the reaction time and firepower range. The reaction time depends on the role of distance sensors and weapons, time kill radius of weapons, communications and information processing needs, and make the decision to spend time. Platform-centric weapons systems, linkages between the various weapons systems by voice to achieve, not the direct command of weapons engagement; and in network-centric warfare, perception, command, control, and the ability of warring and so on through the “robustness” The digital data link connection to a network, the capacity of the flow of information between network nodes, the quality and timeliness greatly improve the combat effectiveness of the weapon system.

美军将信息技术作为军队转型的支撑,也就意味着将网络作为军队转型的核心,实现从“以平台为中心”向“以网络为中心”转型。网络中心战概念最早由美国人阿瑟·切布罗夫斯基和约翰·加斯特卡提出。(21)他们在《网络中心战:起源与未来》一文中认为,在20世纪末人类进入了一个新的战争时代,“社会业已变化,潜在的经济和技术业已改变,美国的商业也发生了变化,如果美国的军事不发生变化,我们就应该诧异和震惊了”。(22)

两位作者提出的“网络中心战”概念被美国官方迅速采纳。2002年,美国国防部向国会提交《网络中心战》(Network-Centric Warfare)报告,提出将网络中心战作为国防转型的指南。该报告称,“以网络为中心的部队是一支能够创造并利用信息优势,从而大幅度提高战斗力的部队,它能够提高国防部维护全球和平的能力,并在需要其担负恢复稳定的任务时在所有各种类型的军事行动中占据优势地位”。(23)

网络中心战的核心是将战争中的物理域、信息域和认知域“网络化”。(24)与平台中心战相比,网络中心战具有无可比拟的优点。

首先,网络中心战使战场透明化。战争的胜负并非取决于谁把最多的资金、人力和技术投放到战场上,而在于谁拥有有关战场的最佳信息。(25)几个世纪以来,战争中一直存在不确定性和阻力,使得战争难以预测,克劳塞维茨称之为“战争的迷雾”,而现在终于能逐步揭开这层迷雾了。(26)

第二,网络中心战能够极大地提高火力打击效果。以平台为中心的打击过程,探测和打击能力同归于一个平台,而一个平台基于从其他平台获得信息进而遂行打击任务的能力非常有限。而以网络为中心的作战中,战斗力提高的动力源自网络之间信息流的容量、质量和实时性的提高。信息流的增加是作战空间感知得以共享和提高信息精确性的关键。网络将各个单元的局部图像汇总后组成一幅完整的作战空间图,然后再将决策方案立即传送至武器打击系统,大大提高了武器系统的效率。

第三,网络中心战大大提高了指挥效率。通常情况下,作战过程由以下几个要素组成:探测目标、识别目标、作出打击目标的决策、把决策传送给武器、武器瞄准和开火。这一过程中,起决定作用的是从探测目标到开火的反应时间和火力打击范围。反应时间取决于传感器和武器的作用距离、武器的杀伤半径、通信和信息处理所需要的时间,以及做出决策花费的时间。以平台为中心的武器系统,各武器系统之间的联系靠话音来实现,不能直接指挥武器进行交战;而在网络中心战中,感知、指挥、控制以及交战等各项能力通过“鲁棒”的数字数据链路连接成网络,网络节点之间信息流的容量、质量和实时性极大地提高了武器系统的战斗力。

Fourth, to save resources. In the era of mechanized warfare, because the relatively low level of information sharing, the various branches of weapons and equipment are loosely organized together, the main operations center in each platform and expand, the lack of effective communication and coordination mechanism between them. Therefore, in the development of equipment development, mechanized warfare is more concerned about the construction of weapons platforms, emphasizing weaponry itself to each generation longer range detection broader, better mobility, protection stronger, rather than emphasizing weapons and equipment in various branches of information detection, firepower, protection and other aspects of the battlefield lateral complementary collaboration. In order to meet the various needs of battlefield environment, mechanized warfare requires a single platform should also have multiple complex combat system with air and sea, the potential early warning, surveillance, detection and far, short-range strike capability and protection capacity, and all of these functions due to lack of information and the main coordination mechanism for their own services, causing great waste. Meanwhile, the upgrading of platform-centric weapons systems, weapons platforms make increasingly large and more complex. Network Centric Warfare in the Information Age is completely different, it emphasizes the grid in the framework of the various branches of military hardware strike weapons, sensors, communications equipment and support equipment and other integration as a whole, combined into a super-scale precision weapons, implementation of the system and the system, against the system and the system as a whole.

Comprehensive US troops from the Cold War so far the introduction of the strategic planning report and the army, the US military is increasing access to network electromagnetic spatial information efforts. As in the late 1990s when the proposed C4ISR, the US network of electromagnetic space requirement is to provide four “arbitrary” for combat, that is, any time, any information, any place, any person. And when in 2003 started the construction of the Global Information Grid is designed to allow network electromagnetic space provides five “proper”, that the right time, the right place, the right information, the right form, the right people. By 2008, the US also proposed the establishment of a network through electromagnetic space environment, to achieve the “three global capacity”, that global warning capabilities, global reach capabilities and global operational capabilities, to achieve full spectrum advantage. Thus, the United States will make every effort to expand the use of the network enabling the US military’s combat strength, to maintain American military hegemony.

第四,节省资源。在机械化战争时代,由于信息共享水平比较低,各军兵种武器装备都是松散地组织在一起,作战行动主要以各自平台为中心而展开,相互之间缺乏有效的信息沟通和协作机制。因此,在装备研制发展上,机械化战争更多的是关注武器平台的建设,强调武器装备本身要一代比一代射程更远、探测范围更广、机动性更好、防护能力更强,而不是强调各军兵种武器装备在信息探测、火力打击、战场防护等方面的横向互补、协同。为适应各种不同的战场环境需要,机械化战争要求单一平台要同时具备多个复杂的战斗系统,具有对空、对海、对潜在预警、侦察、探测和远、中、近程打击能力和防护能力等,而所有这些功能由于缺乏信息协作机制而主要为自己服务,造成极大浪费。同时,以平台为中心的武器系统的更新换代,使武器平台越来越庞大,越来越复杂。信息化时代的网络中心战完全不同,它强调在军事网格的框架下把各军兵种软硬件打击武器、传感器、通信设备和保障装备等融合为一个整体,组合成一台超级规模的精密武器,实施体系与体系、系统与系统的整体对抗。

综合美军从冷战结束到目前为止出台的战略报告和建军规划来看,美军正在不断加大获取网络电磁空间信息的力度。如在上世纪90年代末提出C4ISR时,美军的要求是网络电磁空间能为作战提供四个“任意”,即任意时间、任意信息、任意地点、任意人。而2003年启动全球信息网格时建设则旨在让网络电磁空间提供五个“恰当”,即恰当时间、恰当地点、恰当信息、恰当形式、恰当人。到2008年,美军又提出通过建立网络电磁空间环境,实现“三个全球能力”,即全球警戒能力、全球到达能力和全球作战能力,达成全谱优势。由此可见,美国将会竭尽全力利用网络赋能来拓展美军的作战实力,维护美国的军事霸权。

Third, the US cyberspace security strategy

Geographically, the United States is two foreign countries, the security environment is very favorable. However, the development of network technology is superior to the American tradition of the security environment and constitute a real challenge. Since computer networks after commercial operation, industrial manufacturing, utilities, banking and other areas of the US communications network to connect all computers and controlled by the United States and other areas of diplomacy and defense are highly confidential full realization of the network, resulting in American society computer network to form a highly dependencies. It can be said, “No country in the world like the United States is so dependent on the network.” (27)

The United States is highly dependent on the network provides an unprecedented opportunity for America’s opponents. Through network attacks caused unimaginable destruction. If the “cut off power and water through the network,” the entire United States would “paralyze”:.. “Then everything stopped, railway connections and traffic lights do not work without electricity, but also get information which will cause people’s life . This is not a great impact bomb, but the bomb is similar to the effect produced – everything is closed. ” (28)

First, cyber crime against the United States continues to rise. Since the commercialization of the Internet, cyber crime showed rapid growth trend, especially for network hacker attacks even more so. The original purpose of hackers to launch cyber attacks is the purpose of self-presentation, namely by identifying network vulnerabilities and the attacks to achieve self-sufficiency. However, as the economy becomes network, hacker attacks more in order to obtain illegal interests for the purpose. Hackers from the “play” to become a ‘big business’, it takes only $ 400, you can buy one on the Internet, “crime package”, to steal other people’s bank accounts and credit card numbers. According to the study, worldwide each year due to loss of network attack suffered about 5,000 billion US dollars, the cost of crime generated by the network up to 3,880 billion US dollars, more than the world’s heroin, cocaine and cannabis market all combined. (29) in 2005, the largest US credit card The company, one of MasterCard’s 40 million users of banking information is acquired by hackers, causing the largest US credit card user information leak case. 2005 to 2007, Albert Gonzalez and a man named “shadow team” Teamwork hacker penetrated include TJ Maxx, Barnes, Noble and BJ including retail giant database, obtaining 180 million payment account access, these companies resulted in more than 400 million US dollars in economic losses. (30) According to US industry estimates, the 2008 data theft and infringement of intellectual property rights to the United States caused by the loss of up to $ 1 trillion. (31)

Second, the network of terrorist activities against the United States poses a great threat in cyberspace. As the network has become the most important human information dissemination and communication tools, terrorist organizations will also spread its tentacles into the network, make full use of the network of privacy, anonymity and across time and space characteristics, to implement terrorist recruitment and training programs . For example, the world’s largest terrorist organization “base” organization in recent years to take advantage of the network to carry out terrorist activities. According to the US Institute of Peace in Washington researcher Gabriel Weinmann observed, “In the traditional site of discussions and forums area can be found al-Qaida elements. 7 years ago, they are about 12 Internet sites. Since the ‘base’ Organization members have been expelled from Afghanistan later, to some extent, they have found refuge on the Internet. They added one, two or even 50 sites “Every day. Statistics US Treasury Bureau of Information said, “base” organization has about 4,000 online sites. “(32) terrorist organizations use network behavior aroused the attention of the American government department. In early 2005, the FBI asked to be alert terrorist organizations to recruit engineers from the Internet. In July, the US government should request, Pakistani authorities arrested the “base” organization computer expert Naeem Noor Mohammad Khan.

三、美国网络空间安全战略

从地理上看,美国是两洋国家,安全环境相当优越。但是,网络技术的发展对美国传统的优越安全环境构成了现实挑战。自从计算机网络实现商业化运营以后,美国的工业制造、公用事业、银行和通讯等领域全部由计算机网络连接和控制,美国的外交与国防等高度机密的领域也全面实现了网络化,导致美国社会对计算机网络形成高度的依赖关系。可以说,“世界上还没有哪个国家像美国这样如此依赖网络”。(27)

美国对网络的高度依赖为美国的对手提供了前所未有的机会。通过网络发动袭击造成的破坏令人难以想象。如果“通过网络切断电源和水源”,整个美国就会“陷入瘫痪”:“届时一切停止运转,铁路连接和红绿灯都不起作用。没有电,也得不到信息。这将给民众的生活造成很大影响。这虽然不是核弹,但产生的效果与核弹相似——一切都被关闭”。(28)

首先,针对美国的网络犯罪持续攀升。自从互联网商业化以来,网络犯罪便呈快速增长之势,特别是黑客对网络发动的攻击更是如此。最初的黑客发动网络袭击的目的多是为了自我展示,即通过发现网络漏洞并对之发动攻击来实现自我满足。但是,随着经济生活越来越网络化,黑客攻击更多以获取非法利益为目的。黑客已从“玩玩”发展成为一个‘‘大行业”,只要花上400美元,就可以在网上买一个“犯罪包”,以窃取别人的银行账户和信用卡密码。据研究,全世界每年因网络攻击遭受的损失约有5,000亿美元,由网络犯罪产生的成本高达3,880亿美元,比全球海洛因、可卡因和大麻市场全部加起来还要多。(29)2005年,美国最大信用卡公司之一的万事达公司4,000万用户的银行资料被黑客获取,酿成美国最大规模信用卡用户信息泄密案。2005至2007年,阿尔伯特·冈萨雷斯和一个名叫“影子团队”的黑客团队合作,侵入包括TJ Maxx、Barnes、Noble和BJ在内的零售业巨头的数据库,获取1.8亿支付账户的访问权,给这些公司造成了4亿多美元的经济损失。(30)据美国业界估计,2008年的数据失窃和知识产权受到侵犯给美国造成的损失高达1万亿美元。(31)

其次,网络恐怖活动对美国的网络空间造成巨大威胁。随着网络成为人类最重要的信息传播方式和交流工具,恐怖组织也将触角伸向了网络,充分利用网络的隐密性、匿名性和跨时空的特点,来实施恐怖分子的招聘和培训计划。例如,全球最大的恐怖组织“基地”组织近年来就充分利用网络实施恐怖活动。据美国华盛顿和平研究所研究员加布里埃尔·魏曼的观察,“在传统网站的讨论和论坛区都能发现‘基地’组织分子。7年前他们在网上大约有12个站点。自从‘基地’组织成员被驱逐出阿富汗以后,从某种程度来说,他们在因特网上找到了避难所。他们每天增加1个、2个甚至50个网站”。美国信息报务局的统计数据称,“基地”组织在网上有大约4,000个站点”。(32)恐怖组织利用网络的行为引起美国政府部门的重视。2005年初,美国联邦调查局提出要警惕恐怖组织从网上招募工程师。同年7月,应美国政府要求,巴基斯坦当局逮捕了“基地”组织电脑专家穆罕默德·纳伊姆·努尔汗。

Third, the United States Government to collect foreign intelligence through the network, to pose a challenge to US national security. In 2007, the US Defense Department, State Department, Homeland Security, Ministry of Commerce, the National Aeronautics and Space Administration and the National Defense and other departments have been large-scale invasion. In the invasion, the US defense secretary e-mail or even cracks, the Ministry of Defence were stolen “millions of bytes” of information, launcher design NASA also been maliciously modified, the Commerce Department also was forced off its network belongs Bureau of Industry and Security connections for several months, causing serious compromised. (33)

Fourth, the US network competitors may launch cyber warfare. And several network security threats described earlier, this kind of threat is more serious. In launching cyber attacks, the United States is the instigator. Back in the 1980s, the United States against the Soviet Union had launched a similar “attack.” Then the lack of control of its long-range Soviet oil and natural gas pipeline network of automatic pump and valve control technology. Since the Soviet Union embargo by Western countries, the official was unable to purchase through normal channels to the relevant products. Thus, the Soviet government would purchase this task to the Soviet KGB intelligence service to complete. After US intelligence agencies informed the KGB procurement plan, secretly let a Canadian company to undertake business. KGB successful completion of the procurement task, but it absolutely did not think that the CIA has implanted malicious code in its procurement of goods and software. The pipeline system runs a few months after the installation is completed, the United States launched the malicious code, so that the pipeline at the same time, a pump running at full speed all the valves closed pipeline, resulting in pipeline explosion, the entire piping system is permanently damage. Although the United States temporarily networks dominate, but now it’s network vulnerability has not be overlooked. US software programming engineer John Martelli found that US “industrial control computer system, water and electricity networks of the class are automatically linked like …… This proves, in some cases, we are exposed to the sun , hackers can easily attack us. ” (34)

Given the extreme importance of the network to US national security, in order to prevent the “Network Pearl Harbor” occurred (Cyber Pearl Harbor) events, from the Clinton administration, the United States adopted a series of measures to ensure that the United States of network security.

First, the US government cybersecurity strategies into national security strategy areas, to enhance network security awareness of network security status and population strategy. 1998, Clinton issued “critical infrastructure protection” Presidential Decree (PDD-63), the first clear concept of network security strategy. The report notes that although the United States is the world’s most powerful countries, but more and more dependent on “the importance of those countries as well as the physical properties of computer-based systems and assets once they are damaged or destroyed, will the country security, national economic security and national public health and health care have a devastating impact. ” (35) in December 2000, Clinton signed the “National Security Strategy in the Age of Globalization” file, the network security as an important part of the national security strategy. (36) in January 2009, shortly after Obama became US president, will according to the US Strategic and International Studies Center, “to ensure that any new president within the network of electromagnetic space security” to submit a special report, proposed in October 1957 as the Soviet Union launched the first Sputnik as holding a similar referendum discussion, raise the American public network electromagnetic space security awareness. (37) After due deliberation, the US government in 2011 focused on the introduction of a number of reports on network electromagnetic space security, the more important the “network authentication electromagnetic space credible national strategy” (National Strategy for Trusted Identities in Cyberspace, March 2011), “Network electromagnetic space International Strategy” (International Strategy for Cyberspace, 2011, May 2007), “DoD networks electromagnetic space action strategy” (Department of Defense Strategy for Operating in Cyberspace, 2011 July 2009) and “DoD networks electromagnetic space policy report” (Department of Defense Cyberspace Policy Report, 2011 November 2003). These reports are all involved in the network of electromagnetic space security strategy.

第三,外国政府通过网络收集美国情报,对美国的国家安全构成挑战。2007年,美国国防部、国务院、国土安全部、商务部、国家航空航天局和国防大学等部门均遭到大规模入侵。在入侵中,美国国防部长的电子信箱甚至被破解,国防部则被窃走“数百万字节”的信息,航空航天局的发射器设计也被恶意修改,商务部还被迫断开与其所属工业与安全局的网络连接达数月之久,造成严重失密。(33)

第四,竞争对手有可能对美国网络发动网络战。和前文所述的几种网络安全威胁相比,这种威胁更为严重。在发动网络袭击方面,美国是始作俑者。早在上世纪80年代,美国就曾对苏联发动过类似的“袭击”。那时苏联缺乏控制其远距离石油、天然气管道输送网的自动泵和阀门的控制技术。由于苏联受西方国家禁运,官方无法通过正规渠道采购到相关产品。于是,苏联政府将这项采购任务交给苏联的情报部门克格勃来完成。美国情报部门获知克格勃的采购计划后,暗中让一家加拿大公司承接业务。克格勃顺利完成了采购任务,但它绝没有想到的是,美国中央情报局已在其采购的产品软件中植入了恶意代码。这一管道系统在安装完成运行几个月后,美国启动了恶意代码,让管道中的某个泵在全速运行的同时关闭了管道的所有阀门,结果造成管道大爆炸,整个管道系统受到永久性破坏。别看美国一时网络称霸,但目前它的网络脆弱性已经不容小视。美国软件编程工程师约翰·马特利发现,美国的“工业控制电脑的系统,类似于水厂和电力网之类被自动连接在一起……这证明在某些情况下,我们是暴露在阳光下的,那些黑客很容易就能攻击我们”。(34)

鉴于网络对美国国家安全的极端重要性,为防止“网络珍珠港”(Cyber Pearl Harbor)事件的发生,从克林顿政府起,美国就采取一系列措施,确保美国的网络安全。

首先,美国政府把网络安全战略纳入国家安全战略范畴,提升网络安全战略的地位和民众的网络安全意识。1998年,克林顿签发《关键基础设施保护》总统令(PDD-63),首次明确网络安全战略的概念。报告指出,美国虽然是世界上最强大的国家,但越来越依赖“那些对国家十分重要的物理性的以及基于计算机的系统和资产,它们一旦受损或遭到破坏,将会对国家安全、国家经济安全和国家公众健康及保健产生破坏性的冲击”。(35)2000年12月,克林顿签署《全球化时代的国家安全战略》文件,将网络安全作为国家安全战略的重要组成部分。(36)2009年1月,奥巴马出任美国总统后不久,便根据美国战略与国际问题研究中心提交的《确保新总统任内网络电磁空间安全》专题报告,提出要像1957年10月苏联发射第一颗人造地球卫星那样,举行类似的全民大讨论,提高美国民众网络电磁空间安全意识。(37)经过充分酝酿后,美国政府于2011年集中出台了多项有关网络电磁空间安全的报告,其中比较重要的《网络电磁空间可信身份认证国家战略》(National Strategy for Trusted Identities in Cyberspace,2011年3月)、《网络电磁空间国际战略》(International Strategy for Cyberspace,2011年5月)、《国防部网络电磁空间行动战略》(Department of Defense Strategy for Operating in Cyberspace,2011年7月)和《国防部网络电磁空间政策报告》(Department of Defense Cyberspace Policy Report,2011年11月)。这些报告无不涉及网络电磁空间安全战略问题。

Second, we continue to strengthen the legislative work network electromagnetic field of space. Soon after the United States in order to prevent electronic “September 11 incident” occurred, “9.11” incident (e-9/11 event), President George W. Bush issued Executive Order No. 13231 – “Critical Infrastructure Protection Information Age” , (38) in February 2003 and issued a “critical infrastructure and key assets of physical protection of the national strategy.” (39) documents the communications, information technology, defense industrial base, etc. 18 infrastructure sector as a critical infrastructure, the five major items of nuclear power plants, government facilities and other assets defined as important. In the same month, the United States enacted its first national strategy on network electromagnetic space security – “ensure that the network electromagnetic space security national strategy.” The document up to 76, for the United States to protect the network electromagnetic space security established the guiding framework and priorities. May 2009, the Obama administration issued a “network of electromagnetic space policy review.” The report says, to “the capacity of national security for the next generation network communication and emergency preparation, to develop a coordinated plan.” (40)

Third, focus on top-level design, streamline management network electromagnetic space security organizations. Early in the Clinton administration, the United States will set up an inter-departmental coordination mechanism – the president Critical Infrastructure Protection Board. From the implementation point of view, the role of this institution is limited. After the “9.11” incident, the Bush administration set up by the chairman of the committee for the first time as the “president of network security consultant”, but its mandate is relatively small. After the 2003 establishment of the Department of Homeland Security, the US government handed over responsibility for the US network electromagnetic space security to the ministry. Report of March 2009, US security committee electromagnetic space network to President Obama just appointed submitted a “ensure that any new president within the network of electromagnetic space security”, said the “network of electromagnetic space security issue is a serious national security challenge facing the United States of a network of electromagnetic space security is not just Chief Information Officer IT office tasks, it is not just homeland security and counter-terrorism strategy and …… it is to prevent the proliferation of weapons of mass destruction and the fight against global ‘jihad’ equally important event. The federal government should bear the main responsibility. ” (41) Under the repeated calls of experts and scholars, the White House also recognized “Without a central coordinating mechanism, no update national strategy, no plan of action for the development and coordination of the executive departments, and no congressional support, by partaking work is insufficient to meet this challenge. ” (40) 163 For this reason, the White House organized the “White House cybersecurity office”, and established close ties with the president can “White House cybersecurity coordinator.” After the integration of the Obama administration, the US federal government currently has six full-time network security agency: Department of Homeland Security under the “US Computer Emergency Response Team”, under the Ministry of Defence, “Joint Operations Force Global Network Operations Center” and “Defense Cybercrime Center “, under the FBI’s” national online survey Joint Task Force “, under the Office of the Director of National Intelligence” Intelligence Community Network Incident Response Center “, and is part of the National Security Agency’s” Cyberspace Security Threat Operations Center. ” Obama administration to adjust to network security management system is primarily intended to improve the efficiency of network security organization and leadership, the formation of a comprehensive national network of electromagnetic space security leadership and coordination system integration.

Fourth, to the outside world announced the implementation of a high-profile network deterrence. May 2009, the Obama administration announced the “Cyberspace Policy Assessment” is made, “From now on, our digital infrastructure will be considered national strategic assets to protect this infrastructure will be a priority of national security.” (42) for the protection of the United States of this strategic asset, in May 2011 the US government announced the “Cyberspace International Strategy” stressed: If potentially hostile country for the US-sponsored cyber attack threat to national security and interests, the United States will not hesitate to use military power. In June, US Defense Secretary Robert Gates in Singapore to attend the 10th Shangri-La Security Dialogue noted in confirming network attacks from his country, the United States regarded as “an act of war” and to give “force to fight back.” (43) This shows that the United States 已把 network security as a top priority, of means by those who seek to attack the national or organizational network infrastructure to benefit the United States resorts to war.

第二,不断强化网络电磁空间领域的立法工作。“9·11事件”发生后不久,美国为防止发生电子“9·11”事件(e-9/11 event),小布什总统发布了13231号行政命令——《保护信息时代的关键基础设施》,(38)2003年2月又颁发了《关键基础设施和重要资产物理保护的国家战略》。(39)这份文件把通讯、信息技术、国防工业基础等18个基础设施部门列为关键基础设施,把核电厂、政府设施等5大项界定为重要资产。同月,美国颁布了首份有关网络电磁空间安全的国家战略——《确保网络电磁空间安全国家战略》。该份文件长达76页,为美国保护网络电磁空间安全确立了指导性框架和优先目标。2009年5月,奥巴马政府出台了《网络电磁空间政策评估报告》。该报告称,要“针对下一代网络的国家安全与应急准备通信的能力,制定一个协调计划”。(40)

第三,着力顶层设计,理顺管理网络电磁空间安全的组织机构。早在克林顿政府时期,美国便设立了一个跨部门的协调机构——总统关键基础设施保护委员会。从实施效果来看,这个机构作用有限。“9·11”事件后,小布什政府首次设立由该委员会主席担任的“总统网络安全顾问”,但其职权比较小。2003年国土安全部成立后,美国政府把负责美国网络电磁空间安全的职责移交给该部。2009年3月,美国网络电磁空间安全委员会向刚上任的奥巴马总统提交了《确保新总统任内网络电磁空间安全》的报告,称“网络电磁空间安全问题是美国国家安全所面临的严重挑战之一。网络电磁空间安全工作不仅仅是信息技术办公室首席信息官的任务,它也不只是国土安全和反恐问题……它是与防止大规模杀伤性武器扩散以及打击全球‘圣战’同等重要的战略大事。联邦政府要担负主要职责”。(41)在专家学者的反复呼吁下,白宫也认识到“如果没有一个中央协调机制、没有更新国家战略、没有各行政部门制定和协调的行动计划,以及没有国会的支持,靠单打独斗的工作方式不足以应付这一挑战”。(40)163为此,白宫组建了“白宫网络安全办公室”,并设立了能与总统密切联系的“白宫网络安全协调员”。经过奥巴马政府的整合,美国联邦政府目前设有六大网络安全专职机构:隶属国土安全部的“美国计算机应急响应小组”,隶属国防部的“联合作战部队全球网络行动中心”和“国防网络犯罪中心”,隶属联邦调查局的“国家网络调查联合任务小组”,隶属国家情报总监办公室的“情报界网络事故响应中心”,以及隶属于国家安全局的“网络空间安全威胁行动中心”。奥巴马政府对网络安全管理体制的调整主要是为了提高网络安全组织领导效率,形成一体化的综合性国家网络电磁空间安全领导和协调体制。

第四,向外界高调宣布实施网络威慑。2009年5月,奥巴马政府在公布《网络空间政策评估》时提出,“从现在起,我们的数字基础设施将被视为国家战略资产。保护这一基础设施将成为国家安全的优先事项”。(42)为保护美国的这项战略资产,2011年5月美国政府公布的《网络空间国际战略》强调:如果潜在敌对国家对美国发起的网络攻击威胁到国家安全与利益,美国将不惜动用军事力量。同年6月,美国国防部长罗伯特·盖茨在新加坡出席第10届香格里拉安全对话时指出,在确认遭到来自他国的网络攻击时,美国视之为“战争行为”,并给予“武力还击”。(43)这表明,美国已把网络安全视为重中之重,对那些企图通过攻击美国网络基础设施获益的国家或组织不惜动用战争的手段。

Fifth, actively build network security defense system to protect the electromagnetic space. In response to the invasion of US network infrastructure behavior, the US government early in 2002 started the “Einstein Program.” Currently, the program has entered the third phase. The first phase of the plan is to achieve Einstein information collection and sharing of safety information. Einstein program is the second phase of intrusion detection systems to scan all Internet traffic and government computers (including private communication section) a copy of the data. When the scanning system will mark the communication data having the characteristics of malicious code, and automatically obtain and store the entire message. Then, the computer network defense department officials for information is identified and stored for review. The third stage is planned Einstein intrusion prevention systems. This system detects a malicious attack agents, and agents of the United States to prevent malicious network attacks. Former US Secretary of Homeland Security Michael Chertoff functional Einstein plan is it this way: If the second phase of Einstein’s plan is “a holding in a roadside police radar, they can advance by telephone warning was drunk or speeding, “then Einstein program is the third phase of a possible” to arrest suspects “and” stop attacks, “the police, it’s like an air defense weapon system, before it can attack the target to shoot down the missile. (44) in October 2009, the implementation of “Einstein Program” and “new national cyberspace security and Communications Integration Center” (New National Cybersecurity and Communications Integration Center, NCCIC) enabled in Arlington, Virginia. The center 24-hour surveillance involving basic network architecture and network threats to national security, the protection of the United States to become the central network security. In addition to the Einstein program, the US National Security Agency is still great efforts to build the so-called “network shield” (Cyber Shield) Project, for use against American competitors in the United States critical infrastructure attacks. This system can transmit packets on the network in real-time analysis, it can quickly filter out all kinds of illegal data packages and other attacks loads; if the system can not exclude a threat, it will start to apply physical isolation mechanism. (45) to create a secure network environment electromagnetic space, enormous amounts of money the United States. In 2008, the Bush administration launched the “National Cybersecurity Initiative comprehensive” budget of up to $ 30 billion. According to media reports, the draft defense budget for fiscal year 2014 to be a substantial increase in US Department of Defense budget network security, network security funds reached a total budget of $ 13 billion each department. (46)

The United States is highly dependent on the electromagnetic space of national network, the national network intrusion greatly. US Department of Defense’s unlawful invasion by a day tens of thousands of times. However, so far the US network infrastructure has not been large-scale cyber attacks, which US cybersecurity strategy proved to be effective from one side. However, the US alleged network electromagnetic space security is actually a network of electromagnetic space to seek hegemony, showing that “security” is based on other national networks electromagnetic space “unsafe” basis, and it will force the other The country also in the network invested heavily in research and development of electromagnetic field of space technology to deal with, resulting in “Network arms race.”

第五,积极构建保障网络电磁空间的安全防御体系。为应对入侵美国网络设施的行为,美国政府早在2002年就启动了“爱因斯坦计划”。目前,该计划已进入第三阶段。爱因斯坦计划的第一阶段主要是实现信息采集和安全信息共享。爱因斯坦计划的第二阶段是检测入侵系统,用以扫描所有互联网流量以及政府电脑(包括私人通信部分)的副本数据。系统扫描时会标记出具有恶意代码特征的通信数据,同时自动获取并存储整个信息。然后,计算机网络防御部门政府官员对被识别出来和存储的信息进行审查。爱因斯坦计划第三阶段是入侵防御系统。该系统对恶意攻击代理进行检测,并阻止恶意代理对美国网络的攻击。美国前国土安全部长切尔托夫对爱因斯坦计划的功能是这样表述的:如果第二阶段爱因斯坦计划是“一个在路边拿着测速雷达的警察,他们可以提前用电话警告有人醉酒或超速驾驶”,那么第三阶段爱因斯坦计划则是一位可以“逮捕疑犯”和“阻止攻击”的警察,这就像一个防空武器系统,它可以在导弹攻击到目标之前将其击落。(44)2009年10月,执行“爱因斯坦计划”的“新国家网络空间安全和通信集成中心”(New National Cybersecurity and Communications Integration Center,NCCIC)在弗吉尼亚州的阿林顿启用。该中心24小时全天候监控涉及基础网络架构和国家安全的网络威胁,成为保护美国网络安全的中枢。除爱因斯坦计划外,美国国家安全局还在大力建设所谓的“网络盾牌”(Cyber Shield)项目,用于抵御美国的竞争对手对美国关键基础设施发动的攻击。这一系统可以对网络传输的信息包进行实时分析,能迅速过滤掉各种非法数据包和其他攻击载荷;如果系统无法排除威胁,会申请启动物理隔离机制。(45)为打造安全的网络电磁空间环境,美国不惜巨资。2008年,小布什政府推出的《国家网络安全全面倡议计划》预算高达300亿美元。据媒体报道,美国2014财年国防预算草案拟大幅增加国防部网络安全经费预算,各部门网络安全经费预算总额达到130亿美元。(46)

美国是高度依赖网络电磁空间的国家,也是大受网络侵扰的国家。美国国防部每天受到的非法入侵达数万次。但是,到目前为止美国的网络基础设施还没有受到大规模的网络攻击,这从一个侧面证明美国的网络安全战略是有效的。不过,美国所称的网络电磁空间安全实际上是要寻求网络电磁空间霸权,可见这一“安全”是建立在别的国家网络电磁空间“不安全”的基础之上的,它必将迫使别的国家也要在网络电磁空间领域投入巨资研发应对技术,从而导致“网络军备竞赛”。

Fourth, through the advocacy of “network freedom” implementation of network penetration strategy

Due to the popularity of the network, the global number of Internet users increased dramatically. According to statistics Internetworldstats.com, and as of December 31, 2012, the global number of Internet users reached 2.405 billion, accounting for 34.3 percent of global population. (47) where the number of Chinese Internet users more development trend showing a blowout. According to the China Internet Network Information Center released data, as of the end of December 2012, China’s netizens reached 564 million, the year of new users 5,090 million and Internet penetration rate of 42.1%, an increase of 3.8 percentage points over the end of the year; slightly Bo 309 million registered users, more than the end of 2011 increased 5,873 million.

Seen from the above statistics, human society has entered a “fiber age.” Spread nature of the network is not just the flow of information, but also the sharing of information network participants, negotiation, compromise and confrontation, including deep-level activities behind the concept of action, will, emotions. (48) In particular, especially Web2.0 era. Development and application of this technology to make a breakthrough in the field of Internet is essentially a computer communication era, ushered in a revolution in ideas and thoughts. (49) in the Web 2.0 environment, participation in interactive is a more obvious characteristics of user demand. Most online content is to create a user, different users can easily share wisdom, namely the use of collective wisdom to make the Internet into a sense of global brain. Web2.0 individual-centered, users not only information the reader, but also the publisher of information, communicators, modified by. In other words, by a few leading resource control by centralized control of the Internet system began to change for the bottom-up by the majority of users of the collective wisdom and strength to dominate the Internet system, opening the era of the Internet’s roots.

Popularity of the network of traditional print media and television revolution. Government and the consortium can easily control a newspaper or a television station. A country may also be issued in other countries refuse to newspapers in the country, do not let other countries landed a television program in the country, thereby more effectively prevent other countries to the ideological penetration. However, the Internet real-time dissemination of information and without Borders greatly weakened the ability of countries to withstand external ideological penetration. After the Cold War, the United States launched the Iraq war and by the war in Afghanistan to extend “American-style democracy”, that is by way of regime change “top-down” to promote democracy, but frustrated, in trouble. (50), however, began in the “Arab Spring” in Tunisia saw the US has “point” and “interactive” features of the Internet, to help the United States “bottom-up” to pursue its expansion strategy democracy. So the United States began to increasingly rely on international hegemony it has in the technical aspects of the Internet, began to fully exploit the great advantages of foreign ideological penetration of their enjoyment of the Internet as an important tool for ideological penetration of his country.

First, the US government set up a network penetration leadership. In 2002, the US government established the “Internet diplomatic team,” the team after being incorporated into the “Internet diplomatic office,” the US State Department. In February 2006, Secretary of State Condoleezza Rice established the “Working Group on Global Internet Freedom”, the main research on the Internet and free foreign policy. In 2008, the Rand Corporation report to the US Department of Defense, suggested that the US should help reformers obtain and use information program, which provides a number of measures to encourage US companies to invest in communications infrastructure and information technology in the region. Obama called the US the “Internet president.” When he ran for the presidency in 2008, through superior rabbit network (Youtube), Facebook (Facebook), Twitter network (Twitter) and MySpace (Myspace), etc. send a message, users win support. After the White House, Obama actively using Web 2.0 technology to promote US public diplomacy to promote the American spirit to the world and to promote American-style democracy. Under the White House’s push, the United States set up the relevant institutions, leadership network penetration work. Under the leadership of these organizations, the US State Department after the launch of Twitter in French, Spanish, Arabic and Persian launched version, also plans to launch Chinese, Russian and Hindi version.

四、通过倡导“网络自由”实施网络渗透战略

由于网络的普及,全球网民数量急剧增加。据Internetworldstats.com的数据统计,截止到2012年12月31日,全球互联网用户数达24.05亿,占全球人口总数的34.3%。(47)其中,中国网民人数更呈现出井喷式发展态势。据中国互联网络信息中心发布的数据,截止到2012年12月底,中国网民规模达5.64亿,全年新增网民5,090万,互联网普及率为42.1%,比上年底提升3.8个百分点;微博注册用户3.09亿,比2011年底增加5,873万。

从上述统计数据可见,人类社会已经进入了“光纤时代”。网络传播本质上不仅仅是信息的流动,而且是网络参与者对信息的共享、协商、妥协和对抗,其中包括行动背后的观念、意志、情绪等深层次的活动。(48)特别是Web2.0时代的到来更是如此。这项技术的开发与应用使互联网领域突破了实质上是计算机交流的时代,迎来了一次理念和思想的革命。(49)在Web 2.0环境下,参与互动性是用户需求的一个比较明显的特点。网上的内容大多是由用户来创造,不同用户可以非常方便地共享智慧,即利用集体智慧使互联网变成某种意义上的全球大脑。Web2.0以个人为中心,网民既是信息的阅读者,同时也是信息的发布者、传播者、修改者。换句话说,由少数资源控制者集中控制主导的互联网体系开始转变为自下而上的由广大用户集体智慧和力量主导的互联网体系,开启了互联网的草根化时代。

网络的普及是对传统平面媒体和电视的一次革命。政府和财团可以轻而易举地控制某份报纸或某家电视台。一个国家也可以拒绝其他国家的报纸在该国发行,不让其他国家的电视节目在该国落地,从而较为有效地防止别国对之进行思想渗透。但是,互联网信息传播的即时性和无国界性大大削弱了国家抵御外部思想渗透的能力。冷战结束之后,美国通过发动伊拉克战争和阿富汗战争来扩展“美国式民主”,即通过以政权更迭的方式“自上而下”地推进民主,但屡屡受挫,陷入困境。(50)不过,始于突尼斯的“阿拉伯之春”使美国看到了具有“点对点”和“互动”特点的互联网,有助于美国“自下而上”地推行其民主扩展战略。所以美国开始日益倚重它在互联网技术方面拥有的国际霸权地位,开始充分发掘其享有的对外国进行思想渗透的巨大优势,将互联网当作对他国进行意识形态渗透的重要工具。

首先,美国政府组建了进行网络渗透的领导机构。2002年,美国政府组建了“互联网外交研究小组”,该小组后被并入美国国务院的“互联网外交办公室”。2006年2月,国务卿赖斯成立了“全球互联网自由工作组”,主要研究有关互联网自由的对外政策。2008年,兰德公司向美国国防部提交报告,建议美国应该帮助变革者获取和使用信息计划,即提供一些措施鼓励美国公司投资这一地区的通信基础设施和信息技术。奥巴马号称美国“互联网总统”。他在2008年竞选总统职位时,通过优兔网(Youtube)、脸谱网(Facebook)、推特网(Twitter)和聚友网(Myspace)等发送信息,赢得网民支持。入主白宫后,奥巴马积极利用Web 2.0技术推动美国的公共外交,向全世界宣扬美国精神和推广美国式民主政治。在白宫的推动之下,美国设立了相关机构,领导网络渗透工作。在这些机构的领导下,美国国务院在推出推特的法语、西班牙语版之后,又推出了阿拉伯语和波斯语版,还计划推出中文、俄语和印地语版。

其次,高举所谓“互联网自由”的大旗,从法理上否定其他国家的网络主权。针对一些国家出于国家安全考虑,实施网络监管的做法,美国打出了“互联网自由”的大旗。2010年1月21日,美国国务卿希拉里·克林顿提出互联网“连接自由”,并声称将之作为“21世纪外交方略的一部分”。(51)次年2月15日,希拉里发表演说称,互联网自由为“普世权利”,是“加速政治、社会和经济变革的巨大力量”,由于“互联网继续在许多国家受到多种限制”,因此美国要在全球范围内大力推动互联网自由。用她的话说,就是“我们对互联网自由的承诺是对人民权利的承诺,我们也会相应地采取行动。关注和应对互联网自由受到的威胁已经成为我国外交人员和发展专家日常工作的一部分”。(52)2011年5月,白宫出台的《网络电磁空间国际战略》将确保“互联网自由”纳入国家战略范畴。报告称“国家不能也不应该在信息自由流动和保护他们的网络安全方面作出选择”,“确保系统安全的工具不能妨碍创新,压制表达或联系自由……美国致力于发起国际倡议和制定促进网络安全的标准,同时保障自由贸易和拓宽信息的自由流动”。(53)为了实现所谓“网络自由”,美国政府一方面向有关国家施加政治压力,另一方面在财政上支持开发“翻墙”软件。奥巴马在其任期内投入数千万美元,“支持正在利用尖端技术手段对抗互联网压制行为的新涌现的技术人员和活动人士”。当前美国力倡“互联网自由”是上世纪40年代美国力推“贸易自由化”的翻版,是对其他国家网络主权的宣战。

第三,拉拢网络公司高管,延揽网络渗透人才。2009年,美国国务院组织推特网的创始人杰克·多尔西及其他多名美国网络公司高管到伊拉克考察,意在让他们在伊拉克建设社交信息网,以引导伊拉克的民意和影响伊拉克国内政治发展。2010年,美国国务卿希拉里·克林顿还特意宴请杰克·多尔西和谷歌公司首席执行官埃里克·施密特,要他们利用新媒体输出美国的价值观。这些新媒体的领军人物在2011年爆发的阿拉伯世界“茉莉花革命”中扮演了重要角色。为了更有效地影响阿拉伯世界的网民,美国国务院积极延揽阿拉伯语、波斯语和乌尔都语人才,将他们组成“数字外联小组”,参与伊斯兰世界的网络聊天室的讨论。对于网络在推动北非变局中发挥的作用,美国国务院政策设计顾问杰拉德·科恩(Jerad Cohen)予以高度评价,他将“脸谱”网称为有史以最有效的促进民主工具之一,称赞互联网是一个在全球范围内促进自由、平等和人权价值观的有效工具。(54)

References:

①William Gibson,Neuromancer,New York:Ace Books,1984,p.69.

②吴巍.赛博空间与通信网络安全问题研究[J].中国电子科学研究院学报,2011年第5期,第474页.

③刘兴.赛博及其相关术语的来源与概念[J].指挥信息系统与技术,2010年第2期。作者认为,“cyber”源自希腊语,是“掌舵和调节”的意思,可以理解为统治与管理、控制与调整。所以有学者主张将“Cyberspace”译为控域.

④美国高边疆战略的提出者丹尼尔·格雷厄姆提出,在整个人类历史上,凡是能够最有效地从人类活动的一个领域迈向另一个领域的国家,都会取得巨大的战略优势。参见[美]丹尼尔·奥·格雷厄姆:《高边疆——新的国家战略》,张健志、马俊才、傅家祯译,北京:军事科学出版社,1988年版,第5页.

⑤Jose Vericat,”Is the Google World a Better Place,” Journal of International Affairs,Vol.24,No.1,2010.

⑥美国继续把持全球互联网管理权[EB/OL].http://damin0728.blog.sohu.com/248698464.html.

⑦The Department of Defense,The National Military Strategy for Cyberspace Operations(2006),p.10.

⑧The Department of Defense,National Military Strategy(2004),p.18.

⑨The Department of Defense,The National Military Strategy for Cyberspace Operations(2006),p.v.

⑩The Department of Defense,The National Military Strategy for Cyberspace Operations(2006),pp.19-20.

(11)Thomas Rid and Marc Hecker,War 2.0:Irregular War in the Information Age,Westport:Praeger Security International,2009,p.58.

(12)美国网军即将部署到位[N].参考消息,2013-07-20,第5版.

(13)TECHNOLYTICS,Cyber Commander’s Handbook.转引自王源.赛博武器的现状与发展[J].中国电子科学研究院学报,2011年第6期.

(14)Shane P.Courville,Air Force and the Cyberspace Mission Defending:the Air Force’s Computer Network in the Future,2007.

(15)刘红军.赛博空间武器——赛博飞机[J].中国电子科学研究院学报,2011年第6期.

(16)Thomas Rid and Marc Hecker,War 2.0:Irregular War in the Information Age,p.37.

(17)Thomas Rid and Marc Hecker,War 2.0:Irregular War in the Information Age,p.57.

(18)美国国防部呈国会报告.网络中心战[R].第11-12页.

(19)David S.Alberts,John J.Garstka,Frederich P.Stein,Network Centric Warfare:Developing and Leveraging Information Superiority,CCRP Publication Series,2000,p.100.
(21)Arthur K.Cebrowski and John J.Garstka,”Network-Centric Warfare:Its Origin and Future,” Proceedings,January 1998.

(20) 在网络带宽迅速增加的同时,网上的IP地址和资源更呈几何级数增加,再加上传感器网络提供的图像或数据,使网上资源或信息极其丰富。第三代互联网技术开发出来之前,人们使用网上资源要么是通过直接访问网站,要么是通过搜索引擎来查找资源。对于前者来说,就如用户打开电灯开关时需要指定一个发电厂一样;而对于后者来说,输入一下查询关键词可能有数万乃至数千万个结果,查找不便,效率低下。网格(Grid,也译成信息栅格)技术,彻底改变了这种效率低下的状况,真正实现了网络用户之间的互连、互通和互操作。这一技术将散布在网络上的资源虚拟为一个极其强大的信息系统,实现了计算、存储、数据、信息、软件、通信等各种资源的全面共享。参见刘鹏、王立华主编.走向军事网格时代[M].北京:解放军出版社2004年版,第7页.

(22)Arthur K.Cebrowski and John J.Garstka,”Network-Centric Warfare:Its Origin and Future,” Proceedings,January 1998.

(23)美国国防部呈国会报告.网络中心战[R].第11页.

(24)物理域是部队企图影响态势存在的领域;信息域是创造、处理并共享信息的领域。它是促进作战人员之间信息交流、传送现代军队的指挥控制信息和传递指挥官作战意图的领域。在争取信息优势的关键斗争中,信息域是斗争焦点;认知域是知觉、感知、理解、信仰和价值观存在的领域,是通过推理作出决策的领域。这一领域包括领导才能、士气、部队凝聚力、训练水平与经验、情势感知和公众舆论等无形因素。参见美国国防部呈国会报告.网络中心战[M].第11页.

(25)约翰·阿奎拉等.决战信息时代[M].长春:吉林人民出版社2001年版,第25页.

(26)Thomas Rid and Marc Hecker,War 2.0:Irregular War in the Information Age,p.37.

(27)Charles E.Croom,Jr.,”Guarding Cyberspace Global Network Operations,” Joint Force Quarterly,No.46,July 2007,p.69.

(28)网络战效果与核弹相似[N].参考消息,2012-06-26,第12版.

(29)美国视网络犯罪为安全稳定巨大威胁[EB/OL].http://intl.ce.cn/specials/zxgjzh/201207/25/t20120725_23522095.shtml.

(30)http://www.mcafee.com/cn/resources/reports/rp-good-decade-for-cybercrime.pdf.

(31)中国国际战略学会军控与裁军研究中心.美国网络空间安全战略文件汇编[M].第159页.

(32)网络恐怖活动日趋普遍,“网络反恐”成当务之急[EB/OL].http://news.xinhuanet.com/world/2005-08/10/content_3334114.htm.

(33)中国国际战略学会军控与裁军研究中心.美国网络空间安全战略文件汇编[M].北京:军事谊文出版社2009年版,第96页.

(34)http://intl.ce.cn/specials/zxgjzh/201207/25/t20120725_23522095.shtml.

(35)The White House,National Plan for Information Systems Protection Version 1.0:An Invitation to a Dialogue,2000.http://fas.org/irp/offdocs/pdd/CIP-plan.pdf.

(36)White House,A National Security Strategy For A Global Age,December 2000,http://www.globalsecurity.org/military/library/policy/national/nss-0012.pdf.

(37)中国国际战略学会军控与裁军研究中心.美国网络空间安全战略文件汇编[M].第156页.

(38)Executive Order 13231 of October 16,2001,Critical Infrastructure Protection in the Information Age,http://www.fas.org/irp/offdocs/eo/eo-13231.htm.

(39)National Strategy for the Physical Protection of Critical Infrastructures and Key Assets,February 2003.http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf.

(40)中国国际战略学会军控与裁军研究中心.美国网络空间安全战略文件汇编[M].第188页.

(41)中国国际战略学会军控与裁军研究中心.美国网络空间安全战略文件汇编[M].第99页.

(42)Remarks by the President on Securing our Nation’s Cyber Infrastructure,May 29,2009,http://www.whitehouse.gov/the-press-office/remarks-president-securing-ournations-cyber infrastructure.

(43)Reuter,”Cates:US ready to use force against cyber attackers,” June 4,2011,http://www.jpost.com/VideoArticles/Video/Article.aspx?id=223559.

(44)Jack Goldsmith.The Cyberthreat,Government Network Operations,and the Fourth Amendment[EB/OL].http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx.

(45)王源、张博.赛博武器的现状与发展[J].中国电子科学研究院学报,2011年第3期.

(46)美打造网盾为网络战铺路[EB/OL].http://mil.news.sina.com.cn/2013-04-22/1013722502.html.

(47)http://www.internetworldstats.com/stats.htm.

(48)蔡文之.互联网时代的地缘关系新范式.载上海社会科学院世界经济与政治研究院编.地缘关系与区域秩序的建构[M].北京:时事出版社2011年版,第6页.

(49)Web2.0应用功能包括:博客(Blog)、简易聚合(RSS)、开放式应用程序接口(API)、维基(Wiki)、分类分众标签(Tag)、社会性书签(Socialbookmark)、社交网络(SNS)、异步传输(Ajax)等,底层是XML和接口协议.

(50)李建波、崔建树.美国在阿富汗的困境研究[J].国际展望,2012年第6期.

(51)http://www.hexi2009.com/thread-13267-1-1.html.

(52)http://www.hexi2009.com/thread-13267-1-1.html.

(53)White House,”International Strategy for Cyberspace:Prosperity,Security,and Openness in a Networked World,” May 2011,p.5.

(54)晋继勇.美国互联网外交战略评析[J].郑州大学学报,2010年第4期.

Original Article HERE