Category Archives: Chinese Military – Network & Space Forces

中國軍事史<2005>中華人民共和國的新軍事變革

Chinese Military History <2005> People’s Republic of China’s New Military Transformation

繁體中文:

迎接世界新軍事變革的挑戰,積極推動中國特色軍事變革,中央軍委所做的重大戰略決策,總部推出了一系列重大舉措。 最大的措施是決定2005年前軍隊再裁減員額20萬人。

 2002年,中央軍委會正式頒布《實施軍隊人才戰略工程規劃》;四總部相繼下發了《關於加強作戰部隊裝備技術保障幹部隊伍建設若干問題的規定》、《關於進一步做好幹部交流工作的意見》 和《關於提升參謀隊伍素質若干問題的意見》,全軍部隊人才培育的步伐明顯加快。 2002年10月,大軍區職領導幹部高科技知識訓練班開學,重點研究資訊化戰爭與軍隊資訊化建設的問題。 各總部機關也相繼開辦高科技知識培訓班。 抓資訊化建設從高級幹部和領率機關抓起,展現出一年來軍事變革的重點和特色。

 軍委會總部的重大舉措直接提升了戰鬥力。 總參謀部部署年度訓練任務時突出強調創新前瞻性作戰理論,以新的需求牽引訓練內容和訓練方法的改革。 總政治部直接組織了修訂新的《政治工作條例》,強調政治工作要為推進中國特色軍事變革服務,全軍政工幹部大規模地展開學習新《政治工作條例》。 總後勤部大力推動三軍聯勤和後勤資訊化建設,邊遠部隊遠距醫療、軍隊住房管理等資訊系統都有了新的飛躍。 裝備系統官兵抓住戰略機會期,加速推進軍隊武器裝備跨越式發展,努力使現有裝備特別是新裝備成建制、成系統形成作戰能力和保障能力。

 提高官兵素質,是推動中國特色軍事變革的重要內容。 適應建設資訊化軍隊、打贏資訊化戰爭,必須具備與之相適應的高素質。 至2003年,不管是基層官兵或師團主官,不管是低學歷幹部或高學歷幹部,都有強烈的危機感。 許多領導幹部率先垂範,下決心提升指揮資訊化戰爭的能力。 全軍各部隊狠抓人才工作的措施力度越來越大,為推動中國特色軍事變革提供了強而有力的人才和智力支持。

裁軍20萬

 2003年9月1日,中央軍委主席江澤民在出席國防科學技術大學50週年慶典活動時鄭重宣告:黨中央、中央軍委決定,將在“九五”期間裁減軍隊員額50萬的基礎上,2005年 前軍再裁減員額20萬。 這是新中國成立以來軍隊進行的第10次重大精簡整編,引起國際社會的高度關注,有輿論稱,「以大規模裁減軍隊員額為標誌,中國新軍事變革的大幕正式拉開」。


 推動中國特色的軍事變革,必須依照實現資訊化的要求,科學確立軍隊建設的戰略目標、發展思路和具體步驟。 然而,軍費供給不足,是新軍事變革中包括中國在內的各國軍隊普遍遇到的難題。 從世界範圍來看,世界各國國防費用佔GDP的比例一般都在2%—4%,而中國只佔1.5%左右。 以2002年為例,中國國防開支為1,694.44億元,約200億美元,只相當於美國的6%左右。 軍費大部分用於250萬人員的生活費、活動維持費,用於裝備和訓練的相對較少。

 軍事專家指出,高技術和資訊化武器裝備的購置費和維修費成幾何級數上升。 解決軍費供需矛盾,讓有限的軍費帶來最大的效益,其最佳想法是減少人員數量,提高軍隊品質。 新軍事變革對軍隊規模的要求是合理、適度、夠用,中國軍隊員額從250萬減少到230萬以後,將更可能使有限的戰略資源得到更有效的使用,發揮出更大效益。 大規模裁減員額並非僅僅“減人”,其實質是對軍隊現有體制編制的結構性調整,軍隊體制編制調整改革必須貫徹精兵、合成、高效的原則,只有深入研究高技術戰爭對軍隊體制編制 的影響,著重解決領導指揮和管理體制以及部隊編成中存在的矛盾和問題,才能建立起具有中國特色的軍事體制。

 軍事專家認為,減少數量,提高質量,優化軍隊內部結構,增大高科技含量,加強綜合集成建設,逐步建立符合現代戰爭要求的體制、編制,是加速人民解放軍現代化建設和更好地做好軍事 抗爭準備的必然選擇。 堅定不移地走中國特色的精兵之路,是軍隊建設的既定方針。 壓縮軍隊員額,是不斷適應世界新軍事變革發展趨勢,服從服務國家經濟建設大局的需要。 這次裁軍之後,中國軍事力量的規模雖然出現一定程度的壓縮,但戰鬥力必將得以提高,維護國家主權和領土完整的能力定能進一步增強!

 根據中央軍委會的統一部署,部隊的精簡整編工作將於2003年年底全面展開,精簡整編單位的編餘士兵多數要安排退出現役,其中包括未服滿服役期的編餘義務兵和士官。 解放軍總部已對此工作作出了具體安排:根據部隊調整精簡的需要,允許部分未服滿規定年限的義務兵和士官提前退出現役;精簡任務較重的單位的退役義務兵和復員士官,可安排提前 離隊;撤銷並改編為預備役部隊的單位的轉業士官,提前移交地方安置部門安置。 對因軍隊調整精簡提前退役士兵的安置,要與服役期滿的退役士兵同等對待,按時接收,納入2004年安置計劃。 其中,對服現役滿1年的城鎮退役義務兵,要按照服役期滿退伍義務兵的有關規定安置;對服現役滿9年的退役士官,要按照服滿現役10年以上退役士官的有關規定安排工作 。 對撤銷和改編為預備役部隊的單位的提前離隊的轉業士官,由各大單位派專人將檔案送地方有關安置部門審核,對符合條件的,簽發《接收安置通知書》,部隊即可組織轉業士官 離隊;本人要求復員的,經批准也可作復員安置。 對符合退休條件的士官,應依照國務院、中央軍委會頒發的《中國人民解放軍士官退出現役安置辦法》的規定,及時下達退休命令,並逐級上報列入移交安置計劃。 提前退役的士兵依實際服役年限和相應的標準發放退役費和物資,對該發放的經費和物資要及時足額地發放到退役士兵手中。 提前離隊的轉業士官按本年度正常時間離隊的轉業士官一樣對待,工資、福利、醫療待遇和服裝發放按有關規定辦理。

 軍隊體制編制調整改革後,中國軍隊將有司務長、俱樂部主任等數10種幹部職務、數萬個幹部職位改為士官擔任。 改由士官擔任的專業職位的人員,從2004年起納入軍院中專以上學歷訓練。 為確保這項工作的順利進行,實現人才等職位及2003年年底能接替的要求,士官任職前培訓擬採取中專學歷培訓與短期培訓相結合的方式進行。 其中,從經過院校2年以上學歷培訓的現有士官中選拔接替對象的專業崗位,進行3至5個月的短期培訓。 對現有士官學歷培訓規劃中無相同相近專業、選不到接替對象的專業崗位,組織中專學歷培訓,學制2年,在校學習1年,在崗位實習1年;每年一季度招生並開學 ,在校學習期間不休暑假,2003年底前回部隊實習。

附:前九次裁軍資料

 第一次精簡整編:新中國成立初期,解放軍總兵力達550萬人。 1950年6月,中國軍隊參謀會議精簡整編方案中規定軍隊精簡為400萬,當年即復員23.9萬餘人。 不久,抗美援朝戰爭爆發,精簡整編工作終止。 截止到1951年底,軍隊人員達627萬人,是中國軍隊史上兵力最多的時期。

 第二次精簡整編:1951年11月中央軍委召開整編會議,規定到1954年把軍隊總人員額控制在300萬人左右。 1952年1月,毛澤東批准《軍事整編計畫》,軍隊總定額縮減至300萬人左右。

 第三次精簡整編:截至1953年9月底,軍隊人數減少到420萬人左右。 當年12月,中國軍事系統黨的高級幹部會議決定,把軍隊簡編為350萬人。 到1954年6月軍隊已精簡47.2萬餘人,年底基本完成計畫。

 第四次精簡整編:1957年1月,中央軍委擴大會議,通過了《關於裁減軍隊數量加強質量的決定》,確定軍隊總人數再裁減三分之一,要求3年裁減130萬人,壓縮至 250萬人左右。

 第五次精簡整編:1975年6月24日至7月5日,中央軍委擴大會議決定3年內將軍隊減少60萬人。 到1976年,軍隊總人數比1975年減少13.6%。 後來由於「四人幫」的干擾破壞,精簡整編任務沒有完成就停了下來。

 第六、七、八次精簡整編:1980年3月,中央軍委決定軍隊再次進行精簡整編,大力精簡機關,壓縮非戰鬥人員和保障部隊,部分部隊實行簡編,將一部分部隊移交地方。 同年8月15日,中共中央批轉了中央軍委會《關於軍隊精簡整編的方案》。 1982年9月,中共中央和中央軍委決定軍隊進一步進行精簡整編。 1985年5月底6月初,中央軍委會決定裁減軍隊員額100萬人,精簡整編工作到1987年初基本結束。

 第九次精簡整編:1997年9月,江澤民同志在黨的十五大報告中宣布,在80年代裁減軍隊員額100萬人的基礎上,中國將在今後3年內再裁減軍隊員額50萬人。 到1999年底,裁軍50萬人的任務已經完成,20餘萬軍隊幹部退出現役轉業地方工作。 這是新中國歷次裁減軍員額中幹部精簡比例較高的一次。

科技練兵

 2003年,中國軍隊和武警部隊圓滿完成了年度訓練任務,在理論創新、實戰演練、反恐訓練、人才培養、從嚴治訓等5個方面取得新成果。

 一、用發展的軍事理論指導軍事訓練新實踐。 軍隊和武警部隊軍事訓練依照以資訊化帶動機械化、以機械化促進資訊化的要求,深入進行資訊作戰、非接觸作戰、聯合作戰等作戰樣式的理論研究,創新軍事理論和作戰思想,引導軍事訓練 改革的深化,推動科技練兵朝向資訊化方向發展。

 二、突出提升打贏能力,以軍事鬥爭準備為龍頭,部隊訓練貼近實戰。 南京、廣州軍區加大實兵實裝演練力度,圍繞戰術技術難點問題開展攻關,並取得了一批有價值的成果。 瀋陽、北京、濟南軍區在近似實戰的條件下練指揮、練戰法、練協同、練保障;海軍、空軍、第二砲兵注重強化諸軍兵種聯合作戰指揮演練;蘭州、成都軍區深化高寒山地作戰 演練,研究解決機動、生存、指揮、協同、保障等重點課題;武警部隊加強處突、反恐怖主義和防衛作戰演練。 全軍積極進行區域協作訓練創新實踐,對聯合戰術兵團作戰理論和區域協作訓練機制等關鍵性問題展開重點攻關。

 三、依據國家賦予軍隊反恐怖鬥爭新的軍事任務,擔負反恐怖任務的部隊紮實進行反恐怖軍事鬥爭研究和訓練實踐。

 四、人才培育有新的措施。 軍院校著眼培養高素質新型軍事人才,深化院校體制編制調整改革,推動了院校教學改革的深入發展。 各部隊進一步加大訓練機構建設與教學改革力度,為基層培養了大批優秀指揮士官。

 五、軍隊堅持依法治訓,嚴格依綱施訓,大力進行崗位練兵活動,契約戰術演練品質提高,部隊正規化訓練水準不斷提高。

部隊改革

 2003年6月10日,解放軍總政治部發出通知,要求全軍和武警部隊官兵認真學習貫徹《中共中央關於印發(「三個代表」重要思想學習綱要)的通知》精神,加深對「三個 代表」重要思想的理解,在全軍興起學習貫徹「三個代表」重要思想的新高潮。 總政治部組織出版部門迅速將《「三個代表」重要思想學習綱要》印發全軍,並特別發出通知,要求全軍團以上領導幹部和機關幹部要認真研讀江澤民同志一系列重要著作,以《綱要 》為線索,從整體深入系統地學習掌握「三個代表」重要思想。 基層要以《綱要》為主要輔導材料,選讀江澤民同志的若干重要著作,深入學習掌握「三個代表」重要思想的基本精神和基本觀點,把全軍官兵的思想和行動進一步統一到鄧小平理論和 「三個代表」重要思想上來,把智慧和力量進一步凝聚到實現黨的十六大確定的各項任務上來,堅決聽從黨中央、中央軍委和江主席的指揮,為實現全面建設小康社會的宏偉 目標,為軍隊的革命化、現代化、正規化建設努力奮鬥。

 6月18日,全軍學習貫徹「三個代表」重要思想理論研討會在北京舉行。 會議強調,必須更加牢固地確立「三個代表」重要思想在軍隊建設中的指導地位,把廣大官兵的意志和力量凝聚在「三個代表」重要思想的旗幟下,進一步打牢堅持黨對軍隊 絕對領導的思想理論根基,使全軍部隊始終保持與時俱進的精神狀態,肩負起神聖使命,積極推進中國特色軍事變革,實現軍隊現代化跨越式發展。

 6月中旬,經中央軍委批准,解放軍總政治部就認真貫徹中共中央通知精神,在全軍興起學習貫徹「三個代表」重要思想新高潮提出意見。

 經中央軍委批准,總政治部委託國防大學分別於8月下旬和9月中旬舉辦兩期全軍軍職以上領導幹部學習貫徹「三個代表」重要思想輪班班,來自全軍和武警部隊的近 百名軍以上領導幹部分別進行為期10天的學習。 輪班以胡錦濤同志「七一」重要講話精神為指導,按照中央《通知》和總政《意見》的要求,以《「三個代表」重要思想學習綱要》和《江澤民國防和軍事建設思想學習 綱要》為基本線索,組織學員學習了江澤民同志的著作和黨的十六大報告。 為了加深對所學內容的深刻理解和系統把握,了解掌握當前最新理論研究成果,輪班也分別邀請中央宣講團相關成員、中央文獻研究室、國家發展和改革委員會、北京大學以及軍隊思想理論戰線 的專家、學者,作了專題講座和輔導報告。 透過輪訓,學員們對「三個代表」重要思想的時代背景、實踐基礎、科學內涵、精神實質和歷史地位的認識有了新的提高,進一步加深了對江澤民國防和軍隊建設思想的理解,增強 了以「三個代表」重要思想指導部隊改革和建設,開創各項工作新局面的使命感和責任感。

     2003年,全軍和武警部隊廣泛深入學習學習實踐「三個代表」重要思想,為全面建構小康社會做貢獻教育活動。 透過教育,廣大官兵進一步堅定了對黨的創新理論的政治信仰,增強了自覺運用「三個代表」重要思想推進部隊改革建設、為全面建設小康社會做貢獻的責任感和使命感。

     根據解放軍總政治部相關部門負責人介紹,教育活動分成兩個階段實施,上半年重點學習了黨的十六大報告,集中進行專題教育;下半年貫徹胡錦濤總書記在省會級主要領導幹部 學習貫徹「三個代表」重要思想專題研討班上的重要演說和黨中央、中央軍委的部署,結合學習江澤民國防和軍隊建設思想,進一步把教育活動引向深入。 教育中,各大單位的主要領導深入部隊具體指導,近千名軍以上領導、萬餘名團以上幹部給部隊講課。 許多部隊請地方黨政領導介紹發展經濟、改善人民生活的舉措;組織觀看鄭培民、範匡夫等先進事蹟報告錄像;組織參觀抗擊非典圖片展,請抗非典英模作報告;舉辦形勢報告會,與專家學者 座談交流等。 官兵們說,在中國特色社會主義事業的偉大旅程中,一刻也離不開「三個代表」重要思想的指引,必須始終堅持,毫不動搖。

     各部隊引導官兵運用「三個代表」重要思想的立場觀點方法,深刻理解黨對國家經濟、社會、文化全面進步作出的重大戰略決策,激勵大家以實現中華民族偉大復興為己任,自覺服從服務於 全面建構小康社會的大局。 參加小湯山醫院對抗非典的軍隊醫護人員,奮戰50多個晝夜,為戰勝非典病魔做出突出功績。 黃河、淮河、渭河等流域發生洪水,新疆、雲南等地發生地震,大興安嶺等地區發生火災後,10多萬名官兵舍生忘死衝鋒在搶險救災第一線,協助地方政府轉移安置群眾100多 萬人,運送物資200多萬噸,用熱血和生命捍衛了「小康」建設成果。

     專注於把學習成果轉化為推動部隊建設,實現新發展、開創新局面的強大精神動力,是這次教育活動最鮮明的特色。 許多部隊引導官兵查找陳舊思維在訓練教學、教育管理、後勤保障、裝備建設等方面的表現,一項一項加以糾正,樹立起與全面建設小康社會、建設信息化軍隊相適應的訓練、管理和 人才觀念。 各單位積極組織官兵從實戰需要出發大膽改革創新,開發出了野戰指揮控制系統、戰時工作決策系統、模擬模擬訓練器材等一批新成果。 擔負緊急機動作戰任務的部隊,叫響了「練科技精兵,當打贏先鋒」的口號,練技術、強素質,圓滿完成了海訓野訓和實彈發射等任務。 2003年全軍12萬多名官兵踴躍報名參加各類函授學習和自學考試,數千名幹部攻讀軍事專業的碩士、博士學位,中央軍委關於實施人才戰略工程的決策正在變為廣大官兵的實際行動 。

     2003年7月底,經中央軍委會批准,由總政治部組織編寫的《江澤民國防與軍隊建設思想學習綱要》正式出版並印發全軍。 中央軍委發出通知,要求全軍官兵以江澤民《論國防和軍隊建設》和一系列重要講話為基本教材,以《綱要》為重要輔助材料,認真學習貫徹江澤民國防和軍隊建設思想,推動全軍學習 貫徹「三個代表」重要思想新高潮不斷深入發展。

     中央軍委會7月31日在北京召開《江澤民國防與軍隊建設思想學習綱要》出版座談會。 會議指出,江主席在領導國防和軍隊建設的偉大實踐中,形成了完整系統的國防和軍事建設思想。 江澤民國防與軍隊建設思想,同毛澤東軍事思想、鄧小平新時期軍隊建設思想是一脈相承而又與時俱進的軍事科學體系,是「三個代表」重要思想的重要組成部分,是馬克思主義軍事理論在 中國發展的最新成果,是新世紀新階段軍隊建設與發展的科學指南。 全軍部隊要毫不動搖地將江澤民國防和軍隊建設思想作為指導統領各項工作的根本指針和行動指南。 各級領導幹部要做學習貫徹江澤民國防與軍隊建設思想的模範,帶頭把這科學理論學習好、貫徹好、運用好。

後勤支援

     軍隊後勤工作堅持以「三個代表」重要想法統攬各項建設,按照積極推進中國特色軍事變革的要求,加大改革創新力度,加快發展步伐,後勤建設取得顯著成績。

     三軍聯勤體制運作良好,透過調整保障關係,多數部隊實現了就近就便保障;開展聯勤優質服務,保證了經費和物資及時足額供應;建立協調協作機制,為平時聯合訓練和戰時聯合 保障創造了條件。

     隨著新一輪後勤保障社會化全面啟動,2003年全軍有2179個食堂實施改革;1283個軍人服務社進行了撤、並、停、改;1851個非作戰部隊營區在營房維修、供水供電 、綠化清潔等項目上實施了社會化保障;採取整體移交、委託管理、自謀職業、解除勞動關係等多種方式,分流安置職工和臨時工31,000多人。

     2003年全軍招標採購突破70億元,比上年平均節省10%以上。 軍以下部隊採購制度改革普及推開,集中採購超過10億元,實現經濟、社會效益雙豐收。

     2003年首次推行總部事業部行政消耗性開支限額標準,戰備、訓練等重點項目得以有效保障。 2003年上半年,通過此制度壓縮總部事業經費中行政消耗性開支2000多萬元。

     全軍上下關注的住房制度改革穩步推進。 2003年總部推出了關於加強經濟適用住房管理、加速售房區現有住房出售和部分離休老幹部住房出售有關政策,現有住房政策基本完善配套。 2003年軍委投資9.5億元建設士官家屬臨時來隊住房,截至2003年,這項工作已取得階段性成果。

     擔負醫改試點任務的瀋陽、蘭州、濟南軍區實現了醫改試點的預期目標,在門診、住院經費的消耗上,比醫改前上升了10.5%,住院人均消耗比醫改前上升4.1%,用藥從數量品種 到檔次都有了較大提高;建立了大病醫療統籌補助標準,醫改工作初見成效。

     後勤資訊化建設穩步推進。 在已經建立20個全軍衛星遠距醫療系統站點的基礎上,2003年又為駐邊遠艱苦地區部隊新建60多個站點,在全軍基本形成了遠距醫療規模體系。 《軍隊住房建設與管理資訊系統》使全軍住房管理有了質的飛躍。 全軍規模最大的軍需自動化立體庫在總後軍需供應局正式投入使用,標誌著全軍軍需物資供應步入自動化。

住房制度日趨完善

     經過多年的探索和不斷深化,全軍住房制度改革取得了重大進展,住房制度日趨完善,住房保障新體系逐步形成。 全軍住房保障攤子大、出口不暢,軍人薪資中住房部分含量低、買不起房、買不到房等問題,逐漸解決。

     一、明確了各類人員的住房保障方式。 對在職幹部、離休幹部、退休幹部、轉業幹部及士官、職工等6類人員,分別實施不同的住房保障。 在職幹部主要住公寓房,有條件的可以購買自有住房;離休幹部主要購買乾休所現有住房,退休幹部主要購買專門為其建設的經濟適用住房,也可以自理住房;轉業、復員幹部和 士官由軍隊發給相應的住房補貼後購買社會提供的住房;職工按屬地原則實施房改。

     二、建立了住房補貼和公積金制度。 各類人員按月計算住房補貼,計入個人的帳戶,經批准購買住房或退休、轉業離開部隊時發給個人。 在工資總額中提取部分經費用於建立住房公積金,個人所有、統一存儲、專項使用。

     三、實施劃區售屋及發展經濟適用住宅。 部隊家屬生活區劃分為公寓區及售房區。 公寓區住房保障在職人員住用,離職遷出。 售房區住房向個人出售,產權歸己,維修自理。 軍事單位利用國家經濟適用住宅政策,在售屋區或徵用地方的土地建設經濟適用住宅向軍隊人員出售。

     四、住房管理實行社會化。 壓縮住房保障規模,減輕軍隊管房負擔,售房區出售的住房、新建的經濟適用住房全部實行物業管理,公寓區住房的管理逐步向社會化管理過渡。

基層幹部住宅建設明顯加快

     為了改善旅團作戰部隊、特別是駐鄉鎮和邊遠艱苦地區的旅團作戰部隊幹部的住房條件,軍委、總部多次撥出專項經費,著手安排住房建設和改造。 各級各部門依據總部製定的建設規劃,優先解決駐鄉鎮和邊遠艱苦地區旅團作戰部隊幹部住房問題,並針對幹部流動性大,能進能出,人走家搬等特點,因地制宜,通過缺 房屋新建、危險房屋完工、舊房整修和補缺配套等多種方式,加速進度,擴大受益面。 同時,加強以限額設計為主要內容的勘察設計管理,嚴格施工管理,確保新建、翻建和整修的房屋經濟實用,工程品質優良。 截至2003年底,全軍已累計投資17億多元,新建改造房屋300多萬平方米,使5萬多名旅團部隊的幹部住上了新房。 全軍士官家屬臨時來隊住房建設已完成投資3.5億元,建成士官家屬臨時來隊住房1.4萬套、56萬平方米,使10萬名士官家屬臨時來隊有房可住。

軍人配偶隨軍未就業期間可享有基本生活補貼

     新推出的《軍人配偶隨軍未就業期間社會保險暫行辦法》明確規定,軍人配偶隨軍未就業期間可享有基本生活補貼。 《辦法》規定,根據軍人駐地艱苦程度,軍人配偶隨軍未就業期間每月享有相應的基本生活補貼。 同時,為促進就業、再就業,實施領取基本生活補貼遞減制度。 駐國家確定的一、二類艱苦邊遠地區和軍隊確定的三類島嶼部隊的軍人,其配偶隨軍未就業期間領取基本生活補貼標準全額的期限最長為60個月;駐一般地區部隊的軍人 ,其配偶隨軍未就業期間領取基本生活補貼標準全額的期限最長為36個月。 未就業隨軍配偶領取基本生活補貼標準全額期滿後,以本人基本生活補貼標準8%的比例逐年遞減。 遞減後的最低基本生活補貼標準,由總後勤部參考省會城市失業保險金標準決定。 駐國家確定的三四類艱苦邊遠地區和軍隊確定的特、一、二類島嶼部隊的軍人,其配偶隨軍未就業期間基本生活補貼標準不實行遞減。

全軍99%以上的醫院實現資訊化管理

     根據解放軍總後勤部相關部門介紹,至2003年底,除駐西藏等偏遠地區的4所軍隊醫院外,全軍99%以上的醫院已實現資訊化管理,取得了顯著的效益。

     全軍醫院資訊系統擁有上網微電腦2.6萬台,已經建立了11個資訊化基地。 2003年部分大軍區已實現軍區機關到醫院的聯網,全軍將逐步實現醫院資訊系統的聯網,總部機關可透過廣域網路直接了解全軍醫院的醫療、教學、科研等情況,為宏觀決策提供科學依據 。 醫院資訊系統增強了醫院管理環節的調控力度,實現了全程管理;簡化了工作流程,方便了病患就醫;提高了醫療質量,減少了醫護差錯。 依托醫院資訊系統軍隊在瀋陽軍區、濟南軍區、蘭州軍區進行了醫療改革試點,130多萬官兵和家屬實現持「醫療卡」就醫,減少了就診、轉診程序。 明年4月1日,全軍將實施持卡就醫。 醫院資訊系統在合理用藥、電子醫療檔案和醫學影像應用方面也取得了顯著成效。 門診處方和住院病人用藥醫囑不合理,醫院資訊系統會自動顯示出來,並為病人提供最佳用藥選擇,避免了亂開大處方現象;電子醫療檔案規範了病程記錄的書寫;醫學影像資料的計算機 採集、存貯和調閱,為提高工作效率和醫療品質提供了方便。

首次派遣高級專家團赴駐邊遠艱苦地區部隊

     解放軍總後勤部高級專家團於8月11日抵達青海省西寧市,開始為駐邊遠艱苦地區的青藏兵站部基層部隊進行技術服務。 這是全軍首次組織面向駐邊遠艱苦地區基層部隊的智力服務活動。 參與這次智力服務活動的專家團成員由總後勤部所屬醫療單位、軍事院校、科研單位的中青年專家、教授組成,其中有1名院士、8名博士、2名碩士。 他們中既有在海外學成歸來的專家,又有全國、全軍先進典型和總後勤部「三星」人才。 專家團將根據部隊實際需要,深入青藏線沿線兵站、醫院、倉庫、輸油管部隊、汽車運輸部隊,透過舉辦學術講座、設備檢修、醫療服務、心理諮詢等方式對官兵們實行面對面服務,幫助解決部隊遇到的技術難題,指導開展新技術、新業務,傳授 基層所需的有關業務知識等。 專家團向部隊贈送了價值140多萬元的醫療設備。

武器裝備

     解放軍總裝備部領導同志在談到2003年部隊武器裝備現代化建設時強調,要切實把「三個代表」重要思想作為各項工作的科學指南,作為推動部隊裝備建設跨越式發展的根本動力。 深入研究面臨的新情況、新問題,積極推動適應武器裝備發展的理論創新;大力推進科技創新,在「生產一代、研發世代、預研一代」的基礎上,著力進行「探索一代」的研究; 穩步推進體制、機制創新。 要適應世界新軍事變革的大趨勢,努力尋求武器裝備建設的新突破新跨越。 要適應高新技術武器裝備發展的要求,確保重大科學研究試驗任務圓滿完成。 要服從並服務國家發展大局,為全面建立小康社會積極作貢獻。

     解放軍總裝備部把選拔培養高學歷優秀年輕幹部作為實施人才戰略工程的一項重要內容來抓,截至2003年底有400多名博士、碩士走上團以上領導崗位,其中150多人擔任軍師級領導 職務。 高學歷年輕幹部在總裝備部師團兩級已成為主體,團以上領導班子中具有大學本科以上學歷的約佔90%,基本形成了更替有序、人才輩出的良好局面,從而為部隊武器裝備 現代化建設的長遠發展提供了組織保證。

     總裝備部擔負部隊武器裝備建設和國防科研試驗重大任務。 為適應武器裝備建設長遠發展需要和進一步提高國防科研試驗能力,在總裝備部黨委的統一部署下,各級把選拔培養學歷高、素質好、發展潛力大的優秀年輕幹部作為一項長期而緊迫 的任務來抓,採取使用一批、培養一批、儲備一批的辦法,把高學歷優秀年輕幹部有序地充實到團以上領導崗位,逐步實現軍師級指揮軍官隊伍年輕化、知識化、專業 化。 至2003年,已培養了一批「博士司令」「博士老總」「博士校長」。 在選拔培養高學歷優秀年輕幹部過程中,總裝備部各級不搞論資排輩,而是強調“優先意識”和“超前意識”,把一批高學歷優秀年輕幹部提前安排到重要領導崗位上任職, 成為重點裝備研發、重大科學研究試驗任務和國防關鍵技術攻關的組織指揮者。 對特別優秀的高學歷年輕幹部,採取小步快走等超常措施破格提拔,近年來提拔的一批年輕軍職領導幹部中,博士和碩士佔一半以上。

     解放軍總裝備部認真依照國務院、中央軍委所授予的職能,加強對軍隊和國防科技工業部門國防科研經費的審計監督和管理,努力提高國防科研經費的使用效益,有效保證了新型裝備和重大國防科研試驗 任務的完成。

     根據總裝備部審計局負責人介紹,國防科研財務和審計部門採取多種措施,嚴格國防科研經費的管理和審計,使得國防科研經費的使用效益進一步提高;國防科研經費保障力度明顯加強,管理程序 更規範,經費流向更合理;國防科研合約制度進一步推廣和深化,大大促進和保障了重大科研試驗任務的順利完成;加大了國防科研經費的審計監督力度,嚴肅查處了一批違反國防科研經費 使用管理規定的單位和個人,有效確保了國防科研經費的專款專用。 經對26項國防重點工程和各軍工集團公司部分科研單位國防科研經費使用情況的審計表明,軍隊和國防科技工業部門國防科研經費使用情況良好,管理規範,財務核算體系完整,有效地保證了國防 科學研究的需要和新型裝備的研發。 一批新型武器裝備的研發工作取得重大進展,一批關鍵國防科技攻關計畫取得重要突破,國防研究與試驗產品的品質明顯提高,部分重點國防研究計畫的進度提前。

     2003年8月,解放軍總裝備部採用競爭性談判方式,分別與3家車輛製造廠簽訂了航太發射推進劑鐵路車輛的採購合約。 這標誌著軍隊裝備採購制度改革正逐步深入。

     航太發射推進劑鐵路車輛分罐車、機車、客車等不同類型,過去都是到指定廠商訂購,車輛造價不斷上漲,產品技術性能、可靠性和售後服務卻沒有明顯改善。 為貫徹落實《裝備採購條例》,深化裝備採購制度改革,總裝備部在車輛訂購中引入競爭機制,根據推進劑運輸車輛的技術特點和鐵路車輛製造業實際,首次採用競爭性談判方式選擇承製 廠商。 談判過程中,裝備部遵循「公平、公正、科學、擇優」的原則,從報價、品質、服務、資信等方面對參與競爭性談判的廠商進行了綜合評定。 最終,3個報價最低、方案最優的車輛廠成為預成交廠商。 這次採購比預算少支出了132萬元。

To meet the challenges of the world's new military transformation and actively promote military transformation with Chinese characteristics, the Central Military Commission has made major strategic decisions and the headquarters has launched a series of major measures. The biggest move is the decision to reduce the number of military personnel by another 200,000 before 2005.


    In 2002, the Central Military Commission officially promulgated the "Implementation of Military Talent Strategic Project Plan"; the four headquarters successively issued "Regulations on Several Issues on Strengthening the Construction of Cadre Teams for Equipment and Technical Support of Combat Forces" and "Opinions on Further Improving Cadre Exchanges" and the "Opinions on Several Issues Concerning Improving the Quality of Staff Teams", the pace of personnel training across the military has been significantly accelerated. In October 2002, a high-tech knowledge training class for senior military region leaders started, focusing on the study of information warfare and military information construction. Each headquarters agency has also successively launched high-tech knowledge training courses. The focus on informatization construction starts from senior cadres and leading agencies, demonstrating the focus and characteristics of military reforms over the past year.


    The major measures taken by the Central Military Commission Headquarters directly enhance combat effectiveness. When deploying annual training tasks, the General Staff Headquarters emphasizes innovative forward-looking combat theories and drives the reform of training content and training methods with new needs. The General Political Department directly organized the revision of the new "Political Work Regulations", emphasizing that political work should serve the promotion of military reform with Chinese characteristics, and all military political cadres began to study the new "Political Work Regulations" on a large scale. The General Logistics Department has vigorously promoted the construction of tri-service joint logistics and logistics informatization, and information systems such as telemedicine for remote troops and military housing management have made new leaps. Equipment system officers and soldiers seize the period of strategic opportunities, accelerate the leap-forward development of military weapons and equipment, and strive to make existing equipment, especially new equipment, into an organic system and into a system to form combat capabilities and support capabilities.

    Improving the quality of officers and soldiers is an important part of promoting military reform with Chinese characteristics. To adapt to building an information-based army and win information-based wars, we must have high qualities that are suitable for it. By 2003, both grassroots officers and soldiers, division chiefs, and low-educated cadres had a strong sense of crisis. Many leading cadres have taken the lead in setting an example and are determined to improve their ability to command information warfare. All units across the military have taken increasingly strong measures to focus on talent work, providing strong talent and intellectual support for promoting military reform with Chinese characteristics.

Disarmament by 200,000

    On September 1, 2003, when attending the 50th anniversary celebration of the University of Defense Technology, Jiang Zemin, Chairman of the Central Military Commission, solemnly announced that the Party Central Committee and the Central Military Commission decided to reduce the number of military personnel by 500,000 during the "Ninth Five-Year Plan" period. The former army will cut another 200,000 positions. This is the 10th major reorganization of the military since the founding of the People's Republic of China, which has attracted great attention from the international community. Some public opinion said, "With the large-scale reduction of military personnel as a symbol, the curtain of China's new military reform has officially begun."

    To promote military reform with Chinese characteristics, we must scientifically establish strategic goals, development ideas and specific steps for military construction in accordance with the requirements for realizing informatization. However, insufficient supply of military expenditures is a common problem encountered by the militaries of various countries, including China, in the new military transformation. From a global perspective, the proportion of national defense expenditures in GDP in various countries is generally between 2% and 4%, while China only accounts for about 1.5%. Taking 2002 as an example, China's defense expenditure was 169.444 billion yuan, equivalent to approximately 20 billion U.S. dollars, which was only equivalent to about 6% of that of the United States. Most of the military expenditure is used for the living expenses and activity maintenance expenses of the 2.5 million personnel, and relatively little is used for equipment and training.

    Military experts pointed out that the purchase and maintenance costs of high-tech and information-based weapons and equipment have increased exponentially. To solve the contradiction between supply and demand of military expenditure and maximize benefits from limited military expenditure, the best idea is to reduce the number of personnel and improve the quality of the army. The new military reform requires that the size of the army be reasonable, moderate and sufficient. After the number of Chinese military personnel is reduced from 2.5 million to 2.3 million, it will be more likely that limited strategic resources can be used more effectively and achieve greater benefits. Large-scale reduction of posts is not just about "reducing personnel". Its essence is a structural adjustment of the existing military system and establishment. The adjustment and reform of the military system and establishment must implement the principles of elite troops, integration and efficiency. Only by in-depth study of the impact of high-tech warfare on the military system and establishment Only by focusing on solving the contradictions and problems existing in the leadership, command and management system and troop formation can we establish a military system with Chinese characteristics.

    Military experts believe that reducing quantity, improving quality, optimizing the internal structure of the army, increasing high-tech content, strengthening comprehensive integration construction, and gradually establishing systems and establishments that meet the requirements of modern warfare are the key to accelerating the modernization of the People's Liberation Army and better doing military work. The inevitable choice for struggle preparation. Unswervingly following the path of elite soldiers with Chinese characteristics is the established policy of military construction. The reduction of military personnel is to continuously adapt to the world's new military reform and development trends and to serve the needs of the overall national economic construction. After this disarmament, although the scale of China's military power has been reduced to a certain extent, its combat effectiveness will definitely be improved, and its ability to safeguard national sovereignty and territorial integrity will definitely be further enhanced!

    According to the unified deployment of the Central Military Commission, the work of streamlining and reorganizing the army will be fully launched by the end of 2003. Most of the remaining soldiers in the streamlined and reorganized units will be arranged to retire from active service, including remaining conscripts and non-commissioned officers who have not completed their service period. The People's Liberation Army Headquarters has made specific arrangements for this work: in accordance with the needs of troop adjustment and downsizing, some conscripts and non-commissioned officers who have not served for the required period of time are allowed to retire from active service early; retired conscripts and demobilized non-commissioned officers in units with heavier missions can be arranged to retire early. Demobilized non-commissioned officers who leave the unit; demobilized non-commissioned officers from units that have been abolished or reorganized into reserve units shall be transferred to local resettlement departments for placement in advance. The resettlement of soldiers who retire early due to the adjustment and streamlining of the army must be treated equally with retired soldiers who have completed their service, be received on time, and included in the 2004 resettlement plan. Among them, retired urban conscripts who have served in active service for more than one year must be placed in accordance with the relevant regulations for retired conscripts after completing their service; retired non-commissioned officers who have served in active service for more than 9 years must be arranged in accordance with the relevant regulations for retired non-commissioned officers who have served in active service for more than 10 years. . For demobilized non-commissioned officers who leave early from units that have been abolished or reorganized into reserve forces, each major unit will send dedicated personnel to submit the files to the relevant local resettlement departments for review. For those who meet the conditions, a "Notice of Acceptance and Placement" will be issued, and the army can organize demobilized non-commissioned officers. Leave the team; if you personally request demobilization, you can also undergo demobilization and resettlement with approval. For noncommissioned officers who meet the retirement conditions, retirement orders should be issued in a timely manner in accordance with the "Measures for the Resettlement of Noncommissioned Officers of the Chinese People's Liberation Army Retiring from Active Service" issued by the State Council and the Central Military Commission, and reported to each level for inclusion in the transfer and resettlement plan. Soldiers who retire early will be issued retirement fees and materials based on their actual service years and corresponding standards. The funds and materials issued must be distributed to retired soldiers in full and in a timely manner. Decommissioned non-commissioned officers who leave the team early will be treated the same as decommissioned non-commissioned officers who leave the team during the normal time of the year. Salaries, benefits, medical treatment and clothing will be paid in accordance with relevant regulations.

    After the adjustment and reform of the military's organizational structure, the Chinese military will have dozens of cadre positions, including chiefs of departments and club directors, and tens of thousands of cadre positions filled by non-commissioned officers. Personnel in professional positions changed to non-commissioned officers will be included in the training of technical secondary school or above in military academies starting from 2004. In order to ensure the smooth progress of this work and meet the requirements for talents and other positions to be replaced by the end of 2003, pre-service training for non-commissioned officers is planned to be conducted by combining technical secondary school education training with short-term training. Among them, short-term training of 3 to 5 months will be conducted for professional positions in which replacement candidates are selected from existing non-commissioned officers who have received more than 2 years of training in colleges and universities. For professional positions that do not have the same or similar majors in the existing non-commissioned officer education training plan and for which there are no candidates for replacement, we will organize technical secondary school education training, with a 2-year academic system, 1 year of study at school, and 1 year of on-the-job internship; enrollment will begin in the first quarter of each year , he continued his summer vacation while studying at school, and returned to the army for internship before the end of 2003.

Attached: Information on the first nine disarmaments

    The first streamlining and reorganization: In the early days of the founding of New China, the total strength of the People's Liberation Army reached 5.5 million. In June 1950, the Chinese Army Staff Conference's streamlining and reorganization plan stipulated that the army should be reduced to 4 million, and more than 239,000 people were demobilized that year. Soon, the War to Resist US Aggression and Aid Korea broke out, and the streamlining and reorganization work was terminated. By the end of 1951, the number of military personnel reached 6.27 million, the largest number in the history of the Chinese military.

    The second streamlining and reorganization: In November 1951, the Central Military Commission held a reorganization meeting and stipulated that the total number of military personnel should be controlled at about 3 million by 1954. In January 1952, Mao Zedong approved the "Military Reorganization Plan" and the total quota of the army was reduced to about 3 million.

    The third streamlining and reorganization: As of the end of September 1953, the number of troops was reduced to about 4.2 million. In December of that year, a meeting of senior party cadres in the Chinese military system decided to reduce the number of troops to 3.5 million. By June 1954, the army had been streamlined by more than 472,000 people, and the plan was basically completed by the end of the year.

    The fourth streamlining and reorganization: In January 1957, the enlarged meeting of the Central Military Commission passed the "Decision on Reducing the Quantity and Strengthening the Quality of the Army", which determined that the total number of the army would be reduced by another third, requiring a reduction of 1.3 million personnel in three years, reducing it to Around 2.5 million people.

    The fifth streamlining and reorganization: From June 24 to July 5, 1975, the enlarged meeting of the Central Military Commission decided to reduce the army by 600,000 people within three years. By 1976, the total number of troops was 13.6% lower than in 1975. Later, due to the interference and sabotage of the "Gang of Four", the streamlining and reorganization task was stopped before it was completed.

    The sixth, seventh, and eighth streamlining and reorganization: In March 1980, the Central Military Commission decided to streamline the army again, vigorously streamline agencies, reduce non-combatants and support troops, implement streamlined reorganization of some units, and transfer some units to local governments. On August 15 of the same year, the Central Committee of the Communist Party of China approved the Central Military Commission's "Plan on the Streamlining and Reorganization of the Army." In September 1982, the Central Committee of the Communist Party of China and the Central Military Commission decided to further streamline and reorganize the army. At the end of May and beginning of June 1985, the Central Military Commission decided to reduce the number of military personnel by 1 million, and the streamlining and reorganization work was basically completed by the beginning of 1987.

    The ninth streamlining and reorganization: In September 1997, Comrade Jiang Zemin announced in his report to the 15th National Congress of the Communist Party of China that, based on the reduction of 1 million military personnel in the 1980s, China will reduce the military personnel by another 500,000 personnel in the next three years. By the end of 1999, the task of disarmament of 500,000 troops had been completed, and more than 200,000 military cadres had retired from active service and transferred to local jobs. This is the highest proportion of cadre reduction among the previous reductions in military personnel in New China.

Technological training

    In 2003, the Chinese military and armed police forces successfully completed their annual training tasks and achieved new results in five aspects: theoretical innovation, actual combat drills, anti-terrorism training, talent training, and strict management training.

    1. Use developed military theories to guide new military training practices. In accordance with the requirements of using informatization to drive mechanization and mechanization to promote informatization, the military training of the army and armed police forces conducts in-depth theoretical research on information operations, non-contact operations, joint operations and other combat styles, innovates military theories and combat ideas, and guides military training. The deepening of reform has promoted the development of scientific and technological training in the direction of informatization.

    2. Focus on improving the ability to win, taking preparations for military struggles as the leader, and making troop training close to actual combat. The Nanjing and Guangzhou Military Regions have intensified their efforts in practical training with actual troops, carried out research on difficult tactical and technical issues, and achieved a number of valuable results. The Shenyang, Beijing, and Jinan Military Regions practice command, tactics, coordination, and support under conditions similar to actual combat; the Navy, Air Force, and Second Artillery Force focus on strengthening joint combat command drills of all services and arms; Lanzhou and Chengdu Military Regions deepen operations in alpine mountains Conduct drills to study and solve key issues such as mobility, survival, command, coordination, and support; the Armed Police Force strengthens emergency response, anti-terrorism, and defense operations drills. The entire military actively carries out innovative practices in regional collaborative training, and launches key research on key issues such as joint tactical corps operational theory and regional collaborative training mechanisms.

    3. In accordance with the new military tasks assigned to the army by the state in the fight against terrorism, the troops responsible for the task of counter-terrorism shall carry out solid research and training practices in the military fight against terrorism.

    4. There are new measures for talent cultivation. Military academies focus on cultivating high-quality new military talents, deepening the adjustment and reform of the institutional structure of institutions, and promoting the in-depth development of teaching reforms in institutions. All units have further intensified the construction of training institutions and teaching reform, and trained a large number of outstanding command non-commissioned officers at the grassroots level.

    5. The military insists on conducting training in accordance with the law, conducts training strictly according to the program, vigorously carries out on-the-job training activities, improves the quality of contract tactical drills, and continuously improves the level of formalized training of the troops.

Force reform

    On June 10, 2003, the General Political Department of the People's Liberation Army issued a notice requiring officers and soldiers of the entire army and the Armed Police Force to conscientiously study and implement the spirit of the "Notice of the Central Committee of the Communist Party of China on Issuing the (Study Outline of the Important Thought of the "Three Represents")" and deepen the understanding of the "Three Represents" The understanding of the important thought of "Three Represents" has led to a new upsurge in studying and implementing the important thought of "Three Represents" in the entire army. The General Political Department organized the publishing department to quickly print and distribute the "Outline for Studying the Important Thought of "Three Represents"" to the entire army, and issued a special notice requiring all leading cadres at the army corps level and above and cadres in government agencies to carefully study a series of important works by Comrade Jiang Zemin and learn from the "Outline" "As a clue, we can deeply and systematically study and master the important thinking of the "Three Represents" as a whole. The grassroots level should use the "Outline" as the main guidance material, read several important works of Comrade Jiang Zemin, deeply study and master the basic spirit and basic viewpoints of the important thought of "Three Represents", and further unify the thoughts and actions of all officers and soldiers with Deng Xiaoping Theory and uphold the important thought of "Three Represents", further condense wisdom and strength into realizing the tasks set by the 16th National Congress of the Communist Party of China, resolutely obey the commands of the Party Central Committee, the Central Military Commission and Chairman Jiang, and strive to achieve the grand goal of building a moderately prosperous society in an all-round way. Goal and strive for the revolutionization, modernization and regularization of the army.

    On June 18, a theoretical seminar for the whole army to study and implement the important thought of "Three Represents" was held in Beijing. The meeting emphasized that we must more firmly establish the guiding position of the important thought of "Three Represents" in military building, gather the will and strength of the officers and soldiers under the banner of the important thought of "Three Represents", and further lay a solid foundation for adhering to the Party's support for the military. The ideological and theoretical foundation of absolute leadership enables the entire military to always maintain a mental state of advancing with the times, shoulder the sacred mission, actively promote military reform with Chinese characteristics, and achieve leap-forward development of military modernization.

    In mid-June, with the approval of the Central Military Commission, the General Political Department of the People's Liberation Army put forward opinions on conscientiously implementing the spirit of the notice of the CPC Central Committee and setting off a new upsurge in studying and implementing the important thought of "Three Represents" throughout the army.

    With the approval of the Central Military Commission, the General Political Department entrusted the National Defense University to hold two rotational training courses for leading cadres above the military level in late August and mid-September to study and implement the important thinking of the "Three Represents". Recent students from the entire army and the Armed Police Force Hundreds of leading cadres above the military level each conducted a 10-day study. The rotation training class is guided by the spirit of Comrade Hu Jintao's "July 1st" important speech, in accordance with the requirements of the Central Committee's "Notice" and the General Administration's "Opinions", and based on the "Study Outline of the Important Thought of "Three Represents"" and "Jiang Zemin's Thought on National Defense and Army Construction" "Outline" as the basic clue, organized students to study Comrade Jiang Zemin's works and the report of the 16th National Congress of the Communist Party of China. In order to deepen the deep understanding and systematic grasp of the content learned, and to understand the latest theoretical research results, the rotation training class also invited relevant members of the Central Propaganda Group, the Central Literature Research Office, the National Development and Reform Commission, Peking University, and the Military Ideological and Theoretical Front. Experts and scholars gave special lectures and counseling reports. Through rotation training, the trainees have a new understanding of the historical background, practical basis, scientific connotation, spiritual essence and historical status of the important thought of "Three Represents", further deepened their understanding of Jiang Zemin's thoughts on national defense and army construction, and enhanced They have a sense of mission and responsibility to use the important thinking of "Three Represents" to guide the reform and construction of the army and create new situations in all work.

    In 2003, the entire army and armed police forces carried out extensive and in-depth educational activities to study and practice the important thought of "Three Represents" and contribute to the comprehensive construction of a well-off society. Through education, the majority of officers and soldiers have further strengthened their political belief in the party's innovative theory, and enhanced their sense of responsibility and mission to consciously apply the important thought of "Three Represents" to promote the reform and construction of the army and contribute to the comprehensive construction of a moderately prosperous society.

    According to the person in charge of the relevant department of the General Political Department of the People's Liberation Army, the educational activities are implemented in two stages. In the first half of the year, the focus is on studying the report of the 16th National Congress of the Communist Party of China and focusing on special education; in the second half of the year, the implementation of General Secretary Hu Jintao's instructions for leading cadres at the provincial and ministerial levels Study and implement the important speeches at the special seminar on the important thought of "Three Represents" and the deployment of the Party Central Committee and the Central Military Commission, combined with the study of Jiang Zemin's thoughts on national defense and army building, to further deepen educational activities. In education, the main leaders of major units went deep into the troops to provide specific guidance, and nearly a thousand leaders above the military level and more than 10,000 cadres above the regiment level gave lectures to the troops. Many troops invited local party and government leaders to introduce measures to develop the economy and improve people's lives; they organized viewings of video reports on the deeds of advanced people such as Zheng Peimin and Fan Kuangfu; they organized visits to anti-SARS photo exhibitions and invited anti-SARS heroes and models to give reports; and held situation report meetings with experts and scholars. Discussions and exchanges, etc. The officers and soldiers said that in the great journey of socialism with Chinese characteristics, we cannot do without the guidance of the important thought of "Three Represents" for a moment, and we must always persist and unswervingly.

    All units guide officers and soldiers to use the positions, viewpoints and methods of the important thought of "Three Represents" to deeply understand the party's major strategic decisions for the comprehensive progress of the country's economy, society and culture, and encourage everyone to take realizing the great rejuvenation of the Chinese nation as their own responsibility and consciously obey and serve The overall situation of building a moderately prosperous society in an all-round way. The military medical staff who participated in the fight against SARS at Xiaotangshan Hospital worked hard for more than 50 days and nights and made outstanding achievements in defeating the SARS disease. After floods occurred in the Yellow River, Huaihe, Weihe and other river basins, earthquakes occurred in Xinjiang, Yunnan and other places, and fires broke out in the Greater Khingan Mountains and other areas, more than 100,000 officers and soldiers risked their lives and rushed to the front line of rescue and disaster relief, assisting local governments to relocate and resettle more than 100 people. Thousands of people, transported more than 2 million tons of supplies, and defended the achievements of "moderately prosperous" construction with their blood and lives.

    The most distinctive feature of this educational activity is to focus on transforming learning results into powerful spiritual motivation to promote army building, achieve new development, and create new situations. Many troops guide officers and soldiers to find out the manifestations of outdated thinking in training and teaching, education management, logistics support, equipment construction, etc., correct them one by one, and establish training, management and management systems that are suitable for building a well-off society in an all-round way and building an information-based army. Talent concept. Each unit actively organized officers and soldiers to boldly reform and innovate based on actual combat needs, and developed a number of new achievements such as field command and control systems, wartime work decision-making systems, and simulation training equipment. The troops responsible for emergency mobile operations shouted the slogan of "training scientific and technological elite soldiers to serve as vanguards", practicing skills and improving quality, and successfully completed tasks such as sea training, field training and live ammunition launches. In 2003, more than 120,000 officers and soldiers in the army actively signed up to participate in various correspondence studies and self-study examinations. Thousands of cadres studied for master's and doctoral degrees in military majors. The Central Military Commission's decision on the implementation of the talent strategic project is becoming practical actions for the majority of officers and soldiers. .

    At the end of July 2003, with the approval of the Central Military Commission, the "Jiang Zemin Ideological Study Outline for National Defense and Army Construction" organized and compiled by the General Political Department was officially published and distributed to the entire army. The Central Military Commission issued a notice requiring all officers and soldiers to use Jiang Zemin's "On National Defense and Army Construction" and a series of important speeches as the basic teaching materials, and the "Outline" as important auxiliary materials, conscientiously study and implement Jiang Zemin's thoughts on national defense and army construction, and promote the study of the entire army The new upsurge in implementing the important thought of "Three Represents" continues to develop in depth.

    The Central Military Commission held a symposium on the publication of "Jiang Zemin's Ideological Study Outline for National Defense and Army Construction" in Beijing on July 31. The meeting pointed out that Chairman Jiang has formed a complete and systematic thought on national defense and army building in the great practice of leading national defense and army building. Jiang Zemin's thought on national defense and army building, together with Mao Zedong's military thought and Deng Xiaoping's thought on army building in the new era, is a military science system that is in the same vein and keeps pace with the times. It is an important part of the important thought of "Three Represents" and an important part of Marxist military theory. The latest achievements of China's development are scientific guides for military construction and development in the new century and new stage. The entire military must unswervingly regard Jiang Zemin's thoughts on national defense and army building as the fundamental guideline and guide to action in guiding all work. Leading cadres at all levels should set an example in learning and implementing Jiang Zemin's thoughts on national defense and army building, and take the lead in learning, implementing and applying this scientific theory well.

Logistics support

    The army's logistics work adheres to the important thinking of "Three Represents" to govern all constructions. In accordance with the requirements of actively promoting military reform with Chinese characteristics, it intensifies reform and innovation, accelerates the pace of development, and achieves remarkable results in logistics construction.

    The joint logistics system of the three armed forces is operating well. By adjusting the support relationship, most troops have achieved close-by support; high-quality joint logistics services have been carried out to ensure the timely and full supply of funds and materials; a coordination and cooperation mechanism has been established to provide joint training in peacetime and joint operations in wartime. Guarantee creates conditions.

    With the full launch of a new round of socialization of logistics support, 2,179 canteens in the army were reformed in 2003; 1,283 military service agencies were withdrawn, merged, suspended, or modified; and 1,851 non-combat military camps were undergoing barrack maintenance, water supply and power supply. , greening and cleaning projects, etc.; through various methods such as overall transfer, entrusted management, self-employment, and termination of labor relations, more than 31,000 employees and temporary workers were diverted and resettled.

    In 2003, the total military bidding and procurement exceeded 7 billion yuan, an average saving of more than 10% over the previous year. The reform of the procurement system for troops below the military level has been popularized and centralized procurement has exceeded 1 billion yuan, achieving both economic and social benefits.

    In 2003, the administrative consumable expenditure limit standards for headquarters business departments were implemented for the first time, and key projects such as combat readiness and training were effectively guaranteed. In the first half of 2003, more than 20 million yuan in administrative consumable expenses in the headquarters business funds were reduced through this system.

    The reform of the housing system, which the whole military is concerned about, is advancing steadily. In 2003, the headquarters issued relevant policies on strengthening the management of affordable housing, accelerating the sale of existing housing in the housing sales area and the housing sales of some retired veteran cadres. The existing housing policies have basically completed the supporting facilities. In 2003, the Military Commission invested 950 million yuan in building temporary housing for the families of non-commissioned officers. As of 2003, this work has achieved initial results.

    The Shenyang, Lanzhou, and Jinan Military Regions, which are responsible for the medical reform pilot tasks, have achieved the expected goals of the medical reform pilot. The consumption of outpatient and inpatient funds has increased by 10.5% compared with before the medical reform. The per capita consumption of inpatients has increased by 4.1% compared with before the medical reform. The number of drugs has increased from quantity to variety. The level of medical care has been greatly improved; the standards for collective subsidy for serious illness medical care have been established, and the medical reform work has initially achieved results.

    Logistics informatization construction is advancing steadily. On the basis of the 20 military-wide satellite telemedicine system sites that have been established, more than 60 new sites were built in 2003 for troops stationed in remote and difficult areas, basically forming a large-scale telemedicine system throughout the military. The "Military Housing Construction and Management Information System" has made a qualitative leap in the housing management of the entire military. The largest automated three-dimensional warehouse for military supplies in the entire army was officially put into use at the Military Supply Bureau of the General Logistics, marking the entry into automation of the military supply of military supplies.

The housing system is improving day by day

    After years of exploration and continuous deepening, the military's housing system reform has made significant progress. The housing system has been increasingly improved, and a new housing security system has gradually taken shape. The military's housing security market is large, exports are not smooth, and the housing component of soldiers' wages is low, so they cannot afford to buy a house. These problems are being gradually solved.

    1. Clarify the housing security methods for various types of personnel. Different housing guarantees are implemented for six categories of personnel, including serving cadres, retired cadres, retired cadres, transferred cadres, non-commissioned officers, and employees. Serving cadres mainly live in apartments, and they can buy their own houses if conditions permit; retired cadres mainly buy existing houses in cadres' residences, and retired cadres mainly buy affordable housing specially built for them, and they can also take care of their own houses; transferred and demobilized cadres and Non-commissioned officers purchase housing provided by society after receiving corresponding housing subsidies from the military; employees implement housing reform based on the territorial principle.

    2. Establish a housing subsidy and provident fund system. Housing subsidies for various types of personnel are calculated on a monthly basis and credited to their personal accounts. They will be paid to individuals upon approval to purchase a house or when they retire or change jobs and leave the military. Withdraw part of the funds from the total salary to establish a housing provident fund, which is owned by individuals, stored uniformly, and used exclusively.

    3. Implement zoning for housing sales and develop affordable housing. The living area for military family members is divided into apartment areas and sales areas. The housing in the apartment area ensures that employees can live in and move out after resigning. The houses in the sales area are sold to individuals, the property rights belong to them, and the maintenance is taken care of by themselves. Military units take advantage of the national affordable housing policy to build affordable housing on land in housing sales areas or requisitioned areas for sale to military personnel.

    4. Socialize housing management. The scale of housing security will be reduced to reduce the burden of housing management by the military. All housing sold in housing sales areas and newly built affordable housing will be subject to property management. The management of housing in apartment areas will gradually transition to socialized management.

Housing construction for grassroots cadres has been significantly accelerated

    In order to improve the housing conditions of brigade combat troops, especially those stationed in villages and towns and remote and difficult areas, the Military Commission and the headquarters have allocated special funds on many occasions to start arranging housing construction and renovation. Based on the construction plans formulated by the headquarters, departments at all levels give priority to solving the housing problem of cadres of brigade combat troops stationed in villages and towns and remote and difficult areas. In view of the characteristics of cadres, such as high mobility, being able to come in and out, and people moving around, measures are taken according to local conditions and through the lack of housing. New housing construction, renovation of dilapidated housing, renovation of old housing, and supporting facilities to fill gaps will speed up the progress and expand the scope of benefits. At the same time, we will strengthen survey and design management with quota design as the main content, and strictly implement construction management to ensure that newly built, renovated and renovated housing is economical and practical, and the project quality is excellent. By the end of 2003, the military had invested a total of more than 1.7 billion yuan in building and renovating more than 3 million square meters of housing, enabling more than 50,000 brigade and regiment cadres to live in new homes. An investment of 350 million yuan has been completed in the construction of temporary units for the families of non-commissioned officers in the entire army, and 14,000 temporary housing units covering 560,000 square meters have been built for the families of non-commissioned officers, providing housing for 100,000 temporary units for the families of non-commissioned officers.

Military spouses can enjoy basic living allowances while they are not employed in the military.

    The newly issued "Interim Measures for Social Security for Military Spouses While Not Employed in the Military" clearly stipulates that military spouses can enjoy basic living allowances while not employed in the military. The "Measures" stipulate that according to the hardship of the military station, military spouses shall enjoy corresponding basic living allowances every month while they are not employed in the military. At the same time, in order to promote employment and re-employment, a system of declining basic living allowances is implemented. For military personnel stationed in Category I and Category II difficult remote areas determined by the state and Category III island units determined by the military, their spouses can receive the full standard of basic living allowance for up to 60 months while they are not employed in the army; for soldiers stationed in general areas, the maximum period is 60 months. , the maximum period for which the spouse can receive the full standard of basic living allowance while serving in the military and not employed is 36 months. After the full period of the basic living subsidy standard for an unemployed military spouse expires, the rate of 8% of the basic living subsidy standard will be reduced year by year. The reduced minimum basic living allowance standard will be determined by the General Logistics Department with reference to the unemployment insurance standard in provincial capital cities. For servicemen stationed in the third and fourth categories of difficult remote areas determined by the state and the special, first and second category island units determined by the military, the basic living subsidy standards for their spouses will not be reduced during the period when they are not employed in the army.

More than 99% of hospitals across the military have implemented information management

    According to relevant departments of the General Logistics Department of the People's Liberation Army, by the end of 2003, with the exception of four military hospitals stationed in remote areas such as Tibet, more than 99% of hospitals in the army had implemented information management and achieved significant benefits.

    The military hospital information system has 26,000 Internet-connected computers, and 11 information bases have been established. In 2003, some major military regions have already implemented networking from military region agencies to hospitals. The entire military will gradually implement networking of hospital information systems. Headquarters agencies can directly understand the medical, teaching, scientific research, etc. conditions of all military hospitals through the wide area network, providing scientific basis for macro decision-making. . The hospital information system strengthens the control of hospital management links and realizes full-process management; it simplifies the work process and facilitates patients' medical treatment; it improves the quality of medical care and reduces medical errors. Relying on the hospital information system, the military has carried out medical reform pilots in the Shenyang Military Region, Jinan Military Region, and Lanzhou Military Region. More than 1.3 million officers, soldiers and their family members have been able to seek medical treatment with "medical cards", reducing medical treatment and referral procedures. On April 1 next year, the entire military will implement card-based medical treatment. Hospital information systems have also achieved remarkable results in rational drug use, electronic medical records and medical imaging applications. If outpatient prescriptions and inpatient medication orders are unreasonable, the hospital information system will automatically display them and provide patients with the best medication options, avoiding the phenomenon of random large prescriptions; electronic medical files standardize the writing of disease course records; computers of medical imaging data Collection, storage and retrieval provide convenience for improving work efficiency and medical quality.

For the first time, a high-level expert team was dispatched to troops stationed in remote and difficult areas.

    A senior expert team from the General Logistics Department of the People's Liberation Army arrived in Xining City, Qinghai Province on August 11 and began to provide technical services to the grassroots troops of the Qinghai-Tibet Military Station stationed in remote and difficult areas. This is the first time the army has organized an intellectual service activity for grassroots troops stationed in remote and difficult areas. The expert team members participating in this intellectual service activity are composed of young and middle-aged experts and professors from medical units, military academies, and scientific research units affiliated to the General Logistics Department, including 1 academician, 8 doctors, and 2 masters. Among them are experts who have returned from overseas studies, as well as advanced models across the country and the army and "three-star" talents from the General Logistics Department. According to the actual needs of the troops, the expert team will go deep into the military stations, hospitals, warehouses, oil pipeline troops, and automobile transportation troops along the Qinghai-Tibet Line, and provide face-to-face services to the officers and soldiers by holding academic lectures, equipment maintenance, medical services, psychological consultation, etc., to help the officers and soldiers. Solve technical problems encountered by the troops, guide the development of new technologies and new businesses, and impart relevant business knowledge needed by the grassroots. The expert team donated medical equipment worth more than 1.4 million yuan to the troops.

Weaponry

    When talking about the modernization of military weapons and equipment in 2003, leading comrades from the General Armament Department of the People's Liberation Army emphasized that the important thinking of "Three Represents" should be effectively used as a scientific guide for all work and as the fundamental driving force for the leap-forward development of military equipment construction. In-depth study of new situations and new problems faced, and actively promote theoretical innovation adapted to the development of weapons and equipment; vigorously promote scientific and technological innovation, on the basis of "production generation, development generation, pre-research generation", focus on "exploration generation" research; Steadily promote institutional and mechanism innovation. We must adapt to the general trend of new military changes in the world and strive to seek new breakthroughs and new leaps in the construction of weapons and equipment. It is necessary to adapt to the requirements of the development of high-tech weapons and equipment and ensure the successful completion of major scientific research and test tasks. We must obey and serve the overall development of the country and actively contribute to building a moderately prosperous society in an all-round way.

    The General Armament Department of the People's Liberation Army regards the selection and training of outstanding young cadres with high academic qualifications as an important part of the implementation of the talent strategy project. By the end of 2003, more than 400 doctors and masters had taken leadership positions at or above the regiment level, and more than 150 of them served as military division-level leaders. position. Highly educated young cadres have become the main body at the division and regiment levels of the General Armament Department. About 90% of the leadership teams above the regiment level have a bachelor's degree or above. This has basically formed a good situation of orderly replacement and the emergence of talents, thus providing a good foundation for the army's weapons and equipment. The long-term development of modernization provides organizational guarantee.

    The General Armament Department is responsible for the major tasks of military weapons and equipment construction and national defense scientific research and testing. In order to meet the long-term development needs of weapons and equipment construction and further improve national defense scientific research and testing capabilities, under the unified deployment of the Party Committee of the General Armament Department, all levels have regarded the selection and training of outstanding young cadres with high academic qualifications, good quality and great development potential as a long-term and urgent task. To grasp the tasks of the regiment and above, adopt the method of using a group, training a group, and reserving a group, and orderly enrich the outstanding young cadres with high academic qualifications into leadership positions above the regiment, and gradually realize the younger, more knowledgeable and professional team of commanding officers at the military division level. change. By 2003, a group of "Doctoral Commanders", "Doctoral Bosses" and "Doctoral Principals" had been trained. In the process of selecting and training outstanding young cadres with high academic qualifications, all levels of the General Armament Department do not engage in seniority ranking. Instead, they emphasize "priority awareness" and "advanced awareness" and arrange a group of outstanding young cadres with high academic qualifications to serve in important leadership positions in advance. Become the organizer and commander of key equipment development, major scientific research and test tasks, and key national defense technology research. For particularly outstanding young cadres with a high degree of education, extraordinary measures such as small steps and quick steps are taken to promote them. Among a group of young military leaders promoted in recent years, more than half have doctorates and master's degrees.

    The General Armaments Department of the People's Liberation Army conscientiously follows the functions assigned by the State Council and the Central Military Commission, strengthens the audit supervision and management of national defense scientific research funds of the military and national defense science and technology industry departments, strives to improve the efficiency of the use of national defense scientific research funds, and effectively ensures the safety of new equipment and major national defense scientific research experiments completion of the task.

    According to the person in charge of the Audit Bureau of the General Armaments Department, the national defense scientific research finance and audit department has taken various measures to strictly manage and audit national defense scientific research funds, which has further improved the efficiency of the use of national defense scientific research funds; the guarantee of national defense scientific research funds has been significantly strengthened, and management procedures have been strengthened. It is more standardized and the flow of funds is more reasonable; the national defense scientific research contract system has been further promoted and deepened, which has greatly promoted and guaranteed the smooth completion of major scientific research and test tasks; the audit and supervision of national defense scientific research funds has been strengthened, and a number of violations of national defense scientific research funds have been seriously investigated and punished The use of units and individuals specified in the management effectively ensures that national defense scientific research funds are earmarked for their exclusive use. An audit of the use of national defense scientific research funds for 26 key national defense projects and some scientific research units of various military industrial group companies shows that the use of national defense scientific research funds by the military and national defense science and technology industry departments is good, with standardized management and complete financial accounting systems, effectively ensuring the national defense The needs of scientific research and the development of new equipment. Significant progress has been made in the development of a number of new weapons and equipment, important breakthroughs have been made in a number of key national defense scientific and technological projects, the quality of national defense scientific research and test products has been significantly improved, and the progress of some key national defense scientific research projects has been advanced.

    In August 2003, the General Armament Department of the People's Liberation Army adopted a competitive negotiation method and signed purchase contracts for space launch propellant railway vehicles with three vehicle manufacturers. This marks that the reform of the military equipment procurement system is gradually deepening.

    Different types of space launch propellant railway vehicles, such as tank cars, maintenance cars, and passenger cars, used to be ordered from designated manufacturers. The cost of the vehicles continued to rise, but the technical performance, reliability, and after-sales service of the products did not improve significantly. In order to implement the "Equipment Procurement Regulations" and deepen the reform of the equipment procurement system, the General Equipment Department introduced a competition mechanism in vehicle ordering. Based on the technical characteristics of propellant transport vehicles and the actual conditions of the railway vehicle manufacturing industry, it used competitive negotiation for the first time to select contractors. factory. During the negotiation process, the Equipment Department followed the principles of "fairness, impartiality, science, and merit selection" and conducted a comprehensive evaluation of the manufacturers participating in the competitive negotiations from aspects such as quotation, quality, service, and credit standing. In the end, the three vehicle manufacturers with the lowest quotations and the best plans became the pre-transaction manufacturers. This purchase was 1.32 million yuan less than budgeted.

中國政府資料來源:https://www.gov.cn/test/2005-06/28/content_10531.htm

中國軍方智能通信任務:認知域作戰的重要領域

Chinese Military Mandate of Intelligent Communication: An Important Field of Cognitive Domain Operations

Original Mandarin Chinese:

要點提示

●智能傳播環境下,人不斷“吸收”信息成為媒介的延伸,媒介逐漸變成具有“主體能動性的人”。人機雙方實現了循環交替與即時交互,使認知攻防呈現出不間斷、常態化的特徵。

●智能傳播能夠全維全時全域塑造用戶與信息之間的關系,使輿論引導、觀念塑造和行為導控變得更加便捷,日益成為“控腦武器”,並逐步發展出一整套認知操縱的實踐手法。

隨著智能媒介和平台技術的快速發展,智能傳播逐漸實現了智能技術與傳播媒體的跨界融合應用,不僅極大改變了信息的生產樣式和傳播方式,也深刻影響著人類的思維邏輯和價值觀念。智能傳播為影響認知、主導認知、顛覆認知等提供了強力支撐和廣闊空間,正在引發認知域作戰的迭代升級和深刻變革。釐清智能傳播作用於認知攻防的機理手段,對於借助智能傳播創新認知域作戰戰法具有重要意義。

智能傳播作用認知域的特點

智能傳播是將大數據、雲計算、機器學習、虛擬現實等技術應用於信息生產與傳播的活動。智能傳播能夠持續塑造和深入誘導目標對象的價值取向與行為思辨,日益成為認知攻防的全新平台和重要場域。

萬物泛在互聯。隨著智能傳播的發展演進,人與人、人與物、物與物都將被連接起來,任何智能終端都可以成為用戶接收信息的工具和平台投放內容的渠道,並且推送能力更加強大,分發場景也更為廣泛。受此影響,傳播平台的作用不再是純粹的信息輸出,對傳播內容甚至對人的思維、行為以及各種關系的塑造能力也將越來越突出。智能傳播可以深度介入並促進人際交往、數據交互和信息交換,無形之中使得認知域作戰空間、參戰力量類型得到極大拓展,同時還實現了對公眾思維認知、生產交往的全方位操控。 “萬物泛在互聯”的持續演進,使一切物體都可能成為媒介實現信息傳播的工具,信息也不再受到維域的限制,認知對抗的主體無處不在、空間廣為擴展。

虛實雜糅互構。在智能技術賦能的多元傳播格局下,無論是文字、圖片,還是聲音、影像等產品形態,均可輕而易舉地被偽造並大肆擴散。隨著深度偽造技術的迭代演化,其生產內容能夠以無限接近真實的形式呈現給廣大受眾,極易影響公眾對某一議題、事件、對象的態度立場。同時,由代碼和算法驅動的社交機器人,可以通過提取關鍵信息、點贊轉發評論等進行“噴灌式”傳播,從而不斷擴散假情況、假信息以混淆輿論視聽,加劇公眾對信息的非理性、情緒化反應,進而操縱認知走向。信息傳播真中有偽、真偽混雜,這種真實與虛假雜糅互構的狀態,極易引發群體信任撕裂,使認知攻防的狀況愈加復雜難控。

人機雙向互動。智能媒介既不斷豐富著信息的輸入輸出方式,也日益模糊了人與媒介原本清晰的界限。其不僅可以簡單地執行用戶指令,還可以根據傳播效果給予更多回饋。長此以往,公眾便可能潛移默化地視其為外接“大腦”,無意識地受其影響。在技術的支撐下,智能媒介還可以獲得類似人的感知、運算甚至情感智能,借助人機交互反向影響用戶的思維方式,通過算法推薦塑造用戶的行為取向。智能傳播環境下,人不斷“吸收”信息成為媒介的延伸,媒介逐漸變成具有“主體能動性的人”。人機雙方實現了循環交替與即時交互,使認知攻防呈現出不間斷、常態化的特徵。

智能傳播作用認知域的機理

當前,智能傳播已經成為主導信息內容、控制輿論導向的有效手段,並借助全方位、多感官的媒介系統,由淺入深地調動目標受眾的沉浸體驗和主體意識,進而加深其感知程度、拓寬其認知範圍並影響其價值選擇,逐漸成為進行思想滲透、實施攻心奪志的重要方式。

借助情境浸染施加認知影響。心理學理論認為,受眾身體及其與環境的交互關系在認知活動中發揮著關鍵作用。媒介作為人體之外的人工感應系統,不斷進化的媒介技術能夠改變甚至重塑感知方式。智能媒介可以將不能同時出現在相同時空的復雜信息,進行疊加合並或仿真模擬,從而最大程度地還原信息的本來面貌,為公眾提供視覺、聽覺、觸覺等沉浸式的感官體驗。如此一來,傳播效果越來越呈現出沉浸式趨勢,智能傳播使信息以更具立體感、時空感和震撼感的方式,直擊目標受眾的感官通道,並由此催生“感官觸碰-心理觸動-情感共鳴”的一系列鏈式反應,藉以實現對其在生理層面的感知影響和操控。

通過虛擬映射影響認知走向。智能設備的發展與普及,提高了人的“可量化度”與“可跟蹤性”,這些設備有些存在於外部環境,但未來也會越來越多地與人的身體形成密不可分的關系。得益於此,可以將受眾的行為、活動、身體狀態等以多種維度映射在虛擬世界裡。一旦人們可以通過“虛擬實體”真實體驗認知的過程及其所在的環境,認知域與認知語境的關系,便不再割裂為虛擬和現實兩種維度。在此過程中,作為受眾,既被增強,即獲得新的感知覺體驗,實現認知活動的自由延展;同時也被約束,即被數字化映射的個體,更容易被他人洞察和操控。

運用人機融合強化認知幹預。當前,社交機器人可以通過捕捉用戶情感動態、分析信息內容及結構的方式,形塑一個類人的交流對象,推動傳播主體由“人”轉向“人機共生”。基於用戶身份和實時互動,社交機器人能在一定程度上影響公眾的思考習慣和行為模式,在傳播虛假信息、操縱公共輿論、進行社會動員、煽動公眾情緒等方面效果顯著。隨著技術的不斷完善,社交機器人的形象將會更加豐富、具有質感,甚至可以模仿人類的情緒。前段時間,基於生成式AI的ChatGPT,其生成的數據、信息等更容易被用戶信任和接納,對思維認知的影響更直接、更有效,可以在潛移默化中改變用戶的意識,隱秘而持續地建構用戶的認知框架。

智能傳播作用認知域的手段

智能傳播能夠全維全時全域塑造用戶與信息之間的關系,使輿論引導、觀念塑造和行為導控變得更加便捷,日益成為“控腦武器”,並逐步發展出一整套認知操縱的實踐手法。

製造信息迷霧,攻擊認知黑洞。智能傳播環境下,深度偽造信息混淆了存在與虛無、現實與虛擬以及記憶與遺忘的界限,能夠用以扭曲事實真相、左右輿論流向,進而達到影響認知走向、強化認知幹預的目的。特別是以社交機器人為代表的智能程序具備自動識別、智能應答甚至類腦思考的能力,並且不知疲憊、全時無休,能夠以大規模、多渠道、高速度、強頻率的方式對公眾進行信息轟炸,形成高強度思維認知壓迫。一旦虛假意見或者偽造事件形成輿論環境,將極大地壓縮個體的反應時間,受眾不僅難以進行深度思考,還容易在從眾心理的驅使之下,產生從不相信到相信、從不接受到接受、從不認同到認同的質變,進而營造出虛假的集體認同,將目標對象引入預設的議題陷阱。

實施靶向攻心,構建認知繭房。信息化智能化時代,公眾對事物的認知受到無處不在的各類推送信息的潛在影響。外軍認為,通過掌握目標對象的上網痕跡、購物記錄、社交狀態等情況,能夠迅速採集不同維度、不同層級、不同模態的認知數據,為高效掌握其價值觀念、輿論立場等提供支撐。在精準繪制認知圖景的基礎上,能夠發現目標對象認知體系的疑點、弱點和需求點,可以按其思維偏好設定內容主題、敘事方式和話語框架。繼而或選定具有相似理解語境、相同情感特質的群體,或選定易受影響、具有較大影響價值的特定個體,通過有選擇性地推薦和有針對性地過濾,差異化、分眾化投送相關信息。借助內容定向投送和渠道精準攻擊,能夠對目標對象進行靶向攻心和持續影響,有效固化其信息接受範圍,不斷削弱其獨立思考能力,致使其陷入認知繭房和思維定式,甚至強制地改變其決策意圖和行動部署。

滲透心理裂隙,擊潰情感堤防。不同於以往的傳播手段,智能傳播可以構建身臨其境式的虛擬環境,在使用戶感覺空間和感覺維度得以拓展的同時,也天然附帶強烈的感官刺激和感性認知偏向,磨損著用戶的理性認知水平與價值判斷能力。受眾在感知事件真相時將更加受制於感性的影響,要想撬動認知就特別需要倚重感性爭取。或是用絢爛的景觀吸引人,或是以娛樂的場景誘惑人,或是靠恐怖的場景震懾人,借助可觸可感可交互的智能傳播營造出極具欺騙性、迷惑性、煽動性的信息場景,強烈刺激用戶的心理感受,使其深陷其中而不自知。一旦陷入情感浸潤和場景浸染中,就可以利用共通情感、共同價值來進行情緒煽動或加以道德裹挾,摧毀其情感依賴,破壞其價值支撐,進而震撼、佔據甚至極化目標對象心智。

(作者單位:國防大學國家安全學院)

●Under the intelligent communication environment, people continue to “absorb” information and become the extension of the media, and the media gradually become “persons with the initiative”. Both man and machine have achieved cyclic alternation and real-time interaction, making cognitive attack and defense present uninterrupted and normalized features.

●Intelligent communication can shape the relationship between users and information in all dimensions, all time and all domains, making public opinion guidance, concept shaping, and behavior guidance more convenient. It has increasingly become a “brain control weapon” and gradually developed a set of cognitive manipulation methods Practical approach.

With the rapid development of intelligent media and platform technology, intelligent communication has gradually realized the cross-border integration and application of intelligent technology and communication media, which has not only greatly changed the production style and communication mode of information, but also profoundly affected human thinking logic and values. . Intelligent communication provides strong support and broad space for influencing cognition, dominating cognition, subverting cognition, etc., and is triggering iterative upgrades and profound changes in cognitive domain operations. Clarifying the mechanism and means of intelligent communication on cognitive attack and defense is of great significance for innovating combat tactics in the cognitive domain with the help of intelligent communication.

The Characteristics of the Cognitive Domain of Intelligent Communication

Intelligent communication is an activity that applies technologies such as big data, cloud computing, machine learning, and virtual reality to information production and dissemination. Intelligent communication can continuously shape and deeply induce the value orientation and behavioral speculation of the target audience, and has increasingly become a new platform and important field for cognitive attack and defense.

Everything is ubiquitously connected. With the development and evolution of intelligent communication, people and people, people and things, and things and things will all be connected. Any smart terminal can become a tool for users to receive information and a channel for the platform to deliver content, and the push capability is more powerful. The scene is also wider. Affected by this, the role of the communication platform is no longer pure information output, and its ability to shape the content of communication and even people’s thinking, behavior and various relationships will become more and more prominent. Intelligent communication can deeply intervene and promote interpersonal communication, data interaction and information exchange, which invisibly greatly expands the combat space in the cognitive domain and the types of forces participating in the war. The continuous evolution of “Ubiquitous Internet of Everything” makes it possible for all objects to become a tool for media to realize information dissemination, and information is no longer limited by dimensions. The subject of cognitive confrontation is ubiquitous and the space is widely expanded.

Mixture of fiction and reality. Under the multi-communication pattern empowered by intelligent technology, whether it is text, pictures, sound, video and other product forms, it can be easily forged and spread wantonly. With the iterative evolution of deep forgery technology, its production content can be presented to a wide audience in a form that is infinitely close to reality, which can easily affect the public’s attitude towards a certain issue, event, or object. At the same time, social robots driven by codes and algorithms can carry out “sprinkling” dissemination by extracting key information, liking and forwarding comments, etc., so as to continuously spread false information and false information to confuse public opinion and aggravate the public’s irrationality and dissatisfaction with information. Emotional responses, which in turn manipulate cognitive trends. Information dissemination is true and false, and the true and false are mixed. This state of mixed and interconstructed truth and falsehood can easily lead to a tear in group trust, making the situation of cognitive attack and defense more complicated and difficult to control.

Human-machine two-way interaction. Intelligent media not only continuously enriches the input and output methods of information, but also increasingly blurs the original clear boundary between people and media. It can not only simply execute user instructions, but also give more feedback according to the propagation effect. If things go on like this, the public may subtly regard it as an external “brain” and be influenced by it unconsciously. With the support of technology, intelligent media can also obtain human-like perception, computing, and even emotional intelligence. With the help of human-computer interaction, it can reversely affect the user’s way of thinking, and shape the user’s behavior orientation through algorithm recommendations. In the intelligent communication environment, people continue to “absorb” information and become the extension of the media, and the media gradually become “people with subjective initiative”. Both man and machine have achieved cyclic alternation and real-time interaction, making cognitive attack and defense present uninterrupted and normalized features.

The Mechanism of Intelligence Spreading in the Cognitive Domain

At present, intelligent communication has become an effective means to dominate information content and control the direction of public opinion. With the help of an all-round and multi-sensory media system, it can mobilize the immersive experience and subject consciousness of the target audience from the shallower to the deeper, thereby deepening their perception and broadening their horizons. Its scope of cognition and its influence on its value choices have gradually become an important way to infiltrate thoughts and implement mind-boggling.

Cognitive influence is exerted through situational immersion. According to psychological theory, the audience’s body and its interaction with the environment play a key role in cognitive activities. As an artificial sensory system outside the human body, media technology can change and even reshape the way of perception. Smart media can superimpose and merge or simulate complex information that cannot appear in the same time and space at the same time, so as to restore the original appearance of the information to the greatest extent, and provide the public with immersive sensory experiences such as vision, hearing, and touch. As a result, the communication effect is increasingly showing an immersive trend. Intelligent communication enables information to directly hit the sensory channels of the target audience in a more three-dimensional, time-space and shocking way, thus giving birth to the “sensory touch-psychological A series of chain reactions of “touch-emotional resonance” in order to realize the influence and control of its perception on the physiological level.

Influence cognitive orientation through virtual mapping. The development and popularization of smart devices have improved people’s “quantifiability” and “traceability”. Some of these devices exist in the external environment, but in the future they will increasingly form an inseparable relationship with the human body. Thanks to this, the behavior, activities, and physical status of the audience can be mapped in the virtual world in multiple dimensions. Once people can truly experience the process of cognition and its environment through the “virtual entity”, the relationship between the cognitive domain and the cognitive context will no longer be separated into two dimensions: virtual and real. In this process, as the audience, it is not only enhanced, that is, to obtain a new sensory experience, to realize the free extension of cognitive activities; but also constrained, that is, the individual who is digitally mapped is more likely to be observed and manipulated by others.

Using human-machine fusion to strengthen cognitive intervention. At present, social robots can shape a human-like communication object by capturing users’ emotional dynamics and analyzing information content and structure, and promote the main body of communication from “human” to “human-machine symbiosis”. Based on user identity and real-time interaction, social robots can affect the public’s thinking habits and behavior patterns to a certain extent, and have remarkable effects in spreading false information, manipulating public opinion, conducting social mobilization, and inciting public emotions. With the continuous improvement of technology, the image of social robots will be richer and more textured, and can even imitate human emotions. Some time ago, based on the generative AI ChatGPT, the data and information generated by it are easier to be trusted and accepted by users, and the impact on thinking and cognition is more direct and effective. It can change the user’s consciousness subtly and continuously construct The user’s cognitive framework.

The Means of Intellectual Diffusion in the Cognitive Domain

Intelligent communication can shape the relationship between users and information in all dimensions, time and space, making public opinion guidance, concept shaping, and behavior guidance more convenient. It has increasingly become a “brain control weapon” and gradually developed a set of cognitive manipulation practices. technique.

Create information fog and attack cognitive black holes. Under the environment of intelligent communication, deep fake information confuses the boundaries between existence and nothingness, reality and virtuality, memory and forgetting, and can be used to distort the truth, influence the flow of public opinion, and then achieve the purpose of influencing the direction of cognition and strengthening cognitive intervention. In particular, intelligent programs represented by social robots have the ability of automatic recognition, intelligent response and even brain-like thinking. Bombing forms high-intensity thinking and cognitive oppression. Once false opinions or falsified events form a public opinion environment, the individual reaction time will be greatly reduced, and it will be difficult for the audience to think deeply, and it is easy to be driven by the herd mentality, from disbelief to belief, from non-acceptance to acceptance, from The qualitative change from disapproval to identification creates a false collective identity and leads the target audience into the preset issue trap.

Implement targeted attacks and build a cognitive cocoon. In the era of informationization and intelligence, the public’s perception of things is potentially affected by all kinds of ubiquitous push information. The foreign army believes that by grasping the target’s online traces, shopping records, social status, etc., it can quickly collect cognitive data of different dimensions, levels, and modes, and provide support for efficiently grasping its values, public opinion positions, etc. On the basis of accurately drawing the cognitive landscape, it is possible to discover doubts, weaknesses, and needs of the target object’s cognitive system, and to set content themes, narrative methods, and discourse frameworks according to their thinking preferences. Then either select a group with a similar understanding context and the same emotional characteristics, or select a specific individual who is susceptible and has a greater influence value, and through selective recommendation and targeted filtering, differentiated and segmented delivery Related Information. With the help of targeted delivery of content and precise attacks on channels, it can carry out targeted attack and continuous influence on the target object, effectively solidify the scope of their information acceptance, continuously weaken their independent thinking ability, cause them to fall into a cognitive cocoon and mindset, and even forcibly change Its decision-making intention and action deployment.

Penetrate psychological fissures and break down emotional embankments. Different from the previous means of communication, intelligent communication can build an immersive virtual environment. While expanding the user’s sense of space and dimension, it also naturally comes with strong sensory stimulation and perceptual cognitive bias, which wears down the user’s rationality. Cognitive level and value judgment ability. When the audience perceives the truth of the event, they will be more subject to the influence of sensibility. If they want to leverage cognition, they need to rely more on sensibility. Either attract people with gorgeous landscapes, seduce people with entertaining scenes, or frighten people with scary scenes. With the help of tactile, sensible and interactive intelligent communication, it creates a very deceptive, confusing and provocative The information scene strongly stimulates the user’s psychological feelings, making them deeply immersed in it without knowing it. Once immersed in emotional infiltration and scene infiltration, you can use common emotions and common values ​​​​to incite emotions or impose moral coercion, destroy their emotional dependence, destroy their value support, and then shock, occupy, and even polarize the mind of the target object.

(Author unit: National Security College, National Defense University)

Source: http://www.mod.gov.cn/gfbw/jmsd/16217865.html

People’s Republic of China’s Practice of Network Power // 中華人民共和國網絡權力實踐

People’s Republic of China’s Practice of Network Power //

中華人民共和國網絡權力實踐

People’s Daily (April 19, 2018 01 edition)

In today’s world, the information technology revolution is changing with each passing day.

  In contemporary China, the development of the network business has advanced by leaps and bounds.

  From mobile payment everywhere to new high-level online transaction volume; from the nationwide e-government system to the booming big data industry… General Secretary Xi Jinping’s important speech on network security and informationization work published two years ago, China’s online letter With the rapid and healthy development of the business, the Internet has increasingly become an important driving force for national development, and the digital field has continuously achieved leap-forward development.

  

        Under the guidance of the strategic blueprint for the “two hundred years” struggle goal, China, which is opening a new era, is striding towards a new journey of network power.

  Looking ahead and judging the situation, the Party Central Committee with Comrade Xi Jinping as the core points the way forward for building a network power

  In March 2018, the “Deepening the Party and State Institutional Reform Plan” issued by the Central Committee of the Communist Party of China opened a new chapter in the national network letter business – the Central Cyber ​​Security and Informatization Leading Group was changed to the Central Cyber ​​Security and Informatization Committee, responsible for Top-level design, overall layout, overall coordination, overall promotion, and supervision and implementation of major work in this field.

  This is the far-sightedness of the Party Central Committee with Comrade Xi Jinping as the core of the national network letter, and it is also the implementation of the important speech delivered by General Secretary Xi Jinping at the symposium on cybersecurity and informationization.

  Since the 18th National Congress of the Communist Party of China, General Secretary Xi Jinping has accurately grasped the general trend of the times, actively responded to the requirements of practice, deeply examined the major changes in the main social contradictions, and issued a series of important speeches on the development of the network business, clearly proposing the strategic thinking of the network power.

  ”To develop a network business, we must implement a people-centered development thinking.”

  ——According to the ups and downs of Internet technology changes, General Secretary Xi Jinping always puts the people at the highest position, clearly defining “to adapt to people’s expectations and needs, speed up the popularization of information services, reduce application costs, and provide them with affordable and affordable The well-used information service has enabled hundreds of millions of people to gain more sense of sharing Internet development results.”

  “Big data is a new stage in the development of information technology.”

  ——In the face of the information-based competitive environment that you chase after me, General Secretary Xi Jinping made a keen judgment to “understand the current status and trends of big data development and its impact on economic and social development, and analyze the achievements of China’s big data development and Problems exist to promote the implementation of the national big data strategy.”

  ”Building a community of cyberspace destiny.”

  ——Investigating the profound changes in the global Internet governance system, General Secretary Xi Jinping proposed “four principles” and “five points of proposition”, calling for “the Internet is invisible, but the people who use the Internet are tangible, and the Internet is the common home of mankind. It is the common responsibility of the international community to make this home more beautiful, cleaner and safer.

  ……

  New ideas lead new practices, and new strategies open up new journeys. Under the strong leadership of the Party Central Committee with Comrade Xi Jinping as the core, a colorful network of powerful powers is slowly unfolding.

  One-point deployment, nine-point implementation, a series of new policies and new measures for the reform and development of the network letter business are turning into new achievements and new changes

  ”Party committees and governments at all levels should strengthen Internet thinking, be good at using the advantages of the Internet, and focus on integrating, sharing, facilitating, and security, promoting scientific decision-making in government, refining social governance, and improving the efficiency of public services. Perceive the social situation, open communication channels, assist decision-making and governance, and facilitate the masses to do things.

  On April 13, 2018, General Secretary Xi Jinping made important instructions during the inspection of the Hainan Provincial Government Affairs Data Center, once again in order to speed up the development of big data and use information technology to point the way.

  Without informatization, there is no modernization.

  General Secretary Xi Jinping’s important speech on cybersecurity and informatization work has been published for two years. All localities and departments have kept pace with the times, pioneering and innovating, and introduced a series of new policies and new measures to promote the cause of major strategic opportunities in the network letter industry and usher in new Development, new leap.

  ——Continuously strengthen the top-level design, and the information development will add institutional guarantee.

  The Outline of the National Informatization Development Strategy was published, which depicts the development of digital China’s construction in the next 10 years, and clearly sets a clear timetable and roadmap for the construction of a network power. The “13th Five-Year National Informationization Plan” was released. It is proposed to achieve significant results in the construction of digital China as the overall goal of China’s informatization development.

  In the past two years, the informatization development strategy, the national big data strategy, and the “Internet +” action plan have been frequently deployed, and the foundation of the network is solid.

  ——The infrastructure is more perfect, and the digital development paves the way.

  In 2017, the length of new optical cable lines in China was 7.05 million kilometers. The total length of national optical cable lines reached 37.47 million kilometers, an increase of 23.2% over the previous year; the number of Internet broadband access ports reached 779 million, an increase of 9.3%.

  The Action Plan for Promoting the Scale Deployment of the Internet Protocol Version 6 (IPv6) was issued and implemented, and the scale of IPv6 deployment was comprehensively improved. As of December 31, 2017, the total number of IPv6 address allocations in China was 23,430 (/32).

  In the past two years, the quality and coverage of mobile network services have continued to improve, and the development of next-generation Internet has shown great prospects.

  – Internet innovative social governance tools, e-government work into the fast lane.

  At the Taxation Hall of the State Taxation Bureau of Jinjiang City, Fujian Province, the financial manager Shi Jinxing received dozens of special value-added tax invoices through the self-service terminal. He felt that “it took a half-day to become a few minutes, and the government service became more and more convenient. Efficient.”

  Innovative services to benefit the people. The data shows that the current total number of government websites in the country is nearly 32,000; the new government media has become a new channel for communication between the public and the public.

  In December 2017, the Central Network Information Office and other departments jointly launched a two-year national e-government comprehensive pilot project in eight provinces including Beijing, Shanghai and Jiangsu to explore the development of e-government development experience that can be used for promotion, and more convenient and efficient e-government experience. Just around the corner.

  Take the matter at any time, make meritorious deeds from the capital, and profit from the power of all things.

  The 19th National Congress of the Communist Party of China formulated a blueprint for the development of a new era, and proposed to build a network power, digital China, and a smart society, promote the deep integration of the Internet, big data, artificial intelligence and the real economy, develop the digital economy, share the economy, and foster new growth. Point, form new kinetic energy.

  In Zhejiang, the digital economy, which is dominated by software services, Internet of Things, cloud computing, and big data, has exceeded 10 trillion yuan for three consecutive years. In Guizhou, where poverty alleviation is the main battlefield, big data has become one of the three development strategies. Its economic growth rate has been in the forefront of the country for seven consecutive years.

  A series of data and an item of results reflect a series of historical achievements and historic changes in the digital development of China in recent years.

  Let hundreds of millions of people gain more sense of sharing the Internet development achievements, and build a strong power for building a network power.

  At the end of each course, Zhang Fan, an online training teacher, will carefully review the “Magic Mirror System” analysis of the students’ class status and adjust and optimize the teaching plan accordingly.

  Through this system, the camera captures the classroom state, such as raising hands, practicing, listening to classes, speaking, etc., and even facial expression changes at any time. Through multi-dimensional measurement of data, a unique learning report for each student is generated.

  With the help of digital technology, the goal of “there is no education, teaching students in accordance with their aptitudes”, which is the sage of the past dynasties, is now entering an ordinary life.

  No longer just online shopping, sharing bicycles, today, digital technology represented by big data, cloud computing, artificial intelligence is increasingly infiltrating into every aspect of Chinese life: the construction of cancer big data portraits makes health dreams clearer; The guardian platform gives the minors a clearer cyberspace; the 5G “super speed” makes the screen “flashing” words become history…

  New products from the Internet have emerged, and digital technology has turned people’s imagined new life into reality. From the introduction of the network security law to the new stage of legal governance, to the digital economy, the “big artery” is more smooth… The world of the people of the world is more colorful because of the Internet, and the lives of the people are more abundant because of the Internet.

  Promoting the development of the Internet and making good use of the power of the Internet are the basic projects that promote social progress and enhance people’s well-being.

  Liuyu Village is located in the selenium-rich area of ​​southern Meizhou, Guangdong Province, and has a long history of growing tea. However, due to the remote location, poor traffic and information, the sales of tea has not been opened.

  Since the staying tea has been stationed in the Guangdong mobile e-commerce informationization poverty alleviation platform to achieve online sales, the problem of slow sales of tea has been solved. In the past year, the tea sold by the “Lingnan Life” platform has reached 6,000 kilograms, and the single-day sales order has reached a maximum of 1423.

  Statistics show that in 2017, China’s digital economy reached 27.2 trillion yuan, accounting for 32.9% of GDP; e-commerce and online retail continued to grow, e-commerce promoted the steady expansion of rural consumption, and rural consumer infrastructure such as logistics, telecommunications, and transportation. further improvement.

  ”Adhere to the people as the center”, digital development is constantly satisfying people’s yearning for a better life, and the people have more sense of gaining in sharing the development of the Internet.

  “The way of benefit, and the time.”

  In just over 20 years, starting from a network cable with a network speed of only 64 kilobits per second, China now has 700 million netizens and more than 4 million websites. It has built the world’s largest 4G network, and the scale of online retail transactions has jumped. The world’s first… a series of “great”, witnessed a slap in the face of a network power to the network power.

  In just two years, from the speed increase and decrease of the network to the implementation of the Cyber ​​Security Law, from the continuous hosting of the four World Internet Conferences to the Alibaba Cloud Data Center, which covers the major Internet markets in the world, a series of “big-handed” highlights China’s move to a network powerhouse. Determination and confidence.

  In December 2017, General Secretary Xi Jinping emphasized in the second collective study of the Political Bureau of the 19th Central Committee that “the situation will be judged, carefully planned, advanced, and proactive” “accelerate the construction of digital China and better serve China’s economic and social development and people. Life improvement.”

  The construction of digital China is an important measure to implement the internship General Secretary General Ping Ping’s strategic thinking on network power. It is an effective way to adhere to the people-centered development thinking and continuously enhance the people’s sense of acquisition. It is an inevitable requirement for seizing development opportunities and accelerating the modernization process.

  This is an urgent call for the new era, and it is a firm declaration of China in the new era.

  Under the strong leadership of the Party Central Committee with Comrade Xi Jinping as the core, the development of China’s network information industry will surely take greater steps in the construction of a network powerhouse, and create a more awkward innovation for the Chinese dream of building a well-off society in an all-round way and realizing the great rejuvenation of the nation. power.

 

Original Mandarin Chinese:

當今世界,信息技術革命日新月異。

當代中國,網信事業發展突飛猛進。

從隨處可見的移動支付到屢創新高的網絡交易額;從覆蓋全國的電子政務系統到蓬勃發展的大數據產業……習近平總書記關於網絡安全和信息化工作重要講話發表兩年來,我國網信事業快速健康發展,互聯網日益成為國家發展重要驅動力,數字領域不斷實現跨越式發展。

在“兩個一百年”奮鬥目標的戰略藍圖指引下,開啟新時代的中國,正在闊步邁向網絡強國的新征程。

高瞻遠矚、審時度勢,以習近平同志為核心的黨中央為建設網絡強國指明前進方向

2018年3月,中共中央印發的《深化黨和國家機構改革方案》,揭開了國家網信事業的新篇章——中央網絡安全和信息化領導小組改為中央網絡安全和信息化委員會,負責這一領域重大工作的頂層設計、總體佈局、統籌協調、整體推進、督促落實。

這是以習近平同志為核心的黨中央對國家網信事業的深謀遠慮,也是對習近平總書記在網絡安全和信息化工作座談會上發表的重要講話的貫徹落實。

黨的十八大以來,習近平總書記準確把握時代大勢,積極回應實踐要求,深刻審視社會主要矛盾新變化,就網信事業發展發表一系列重要講話,鮮明提出了網絡強國的戰略思想。

“網信事業要發展,必須貫徹以人民為中心的發展思想。”

——順應風起雲湧的互聯網技術變革,習近平總書記始終把人民放在最高位置,明確“要適應人民期待和需求,加快信息化服務普及,降低應用成本,為老百姓提供用得上、用得起、用得好的信息服務,讓億萬人民在共享互聯網發展成果上有更多獲得感”。

“大數據是信息化發展的新階段。”

——面對你追我趕的信息化競爭環境,習近平總書記敏銳地作出判斷,要求“深入了解大數據發展現狀和趨勢及其對經濟社會發展的影響,分析我國大數據發展取得的成績和存在的問題,推動實施國家大數據戰略”。

“構建網絡空間命運共同體。”

——洞察全球互聯網治理體系的深刻變革,習近平總書記提出“四項原則”“五點主張”,呼籲“互聯網雖然是無形的,但運用互聯網的人們都是有形的,互聯網是人類的共同家園。讓這個家園更美麗、更乾淨、更安全,是國際社會的共同責任”。

……

新理念引領新實踐,新戰略開啟新征程。在以習近平同志為核心的黨中央堅強領導下,一幅五彩斑斕的網絡強國畫卷正在徐徐展開。

一分部署、九分落實,一系列網信事業改革發展的新政策新舉措正在化為舉世矚目的新成就新變革

“各級黨委和政府要強化互聯網思維,善於利用互聯網優勢,著力在融合、共享、便民、安全上下功夫,推進政府決策科學化、社會治理精細化、公共服務高效化,用信息化手段更好感知社會態勢、暢通溝通渠道、輔助決策施政、方便群眾辦事,做到心中有數。”

2018年4月13日,習近平總書記在考察海南省政務數據中心時作出的重要指示,再一次為加快大數據發展、用好信息化手段指明方向。

沒有信息化就沒有現代化。

習近平總書記關於網絡安全和信息化工作重要講話發表兩年來,各地各部門與時俱進、開拓創新,出台一系列新政策、新舉措,推動網信事業抓住重大戰略機遇期,迎來新發展、新飛躍。

——持續加強頂層設計,信息化發展更添制度保障。

《國家信息化發展戰略綱要》出台,描繪了未來10年數字中國建設的發展圖景,為網絡強國建設標識出清晰的時間表和路線圖;《“十三五”國家信息化規劃》發布,明確提出將數字中國建設取得顯著成效作為我國信息化發展的總目標。

兩年間,信息化發展戰略、國家大數據戰略、“互聯網+”行動計劃等頻密部署,網絡強國基礎夯實。

——基礎設施更加完善,數字化發展鋪就前進道路。

2017年,我國新建光纜線路長度705萬公里,全國光纜線路總長度達3747萬公里,比上年增長23.2%;互聯網寬帶接入端口數量達到7.79億個,增長9.3%。

《推進互聯網協議第六版(IPv6)規模部署行動計劃》印發實施,IPv6規模化部署全面提升。截至2017年12月31日,我國IPv6地址分配總數為23430塊(/32)。

兩年間,移動網絡服務質量和覆蓋範圍持續提升,下一代互聯網發展展現美好前景。

——互聯網創新社會治理手段,電子政務工作駛入快車道。

在福建晉江市國稅局辦稅大廳,財務經理施金星通過自助終端機領取了數十份增值稅專用發票後,深感“原先要花半天的時間變成了幾分鐘,政府服務越來越便捷高效”。

創新服務,利企便民。數據顯示,目前全國政府網站運行總數近3.2萬家;政務新媒體成為溝通社情民意的新渠道。

2017年12月,中央網信辦等部門聯合在北京、上海、江蘇等8省份開展為期2年的國家電子政務綜合試點,探索形成可藉鑑推廣的電子政務發展經驗,更加方便高效的電子政務體驗指日可待。

隨時以舉事,因資而立功,用萬物之能而獲利其上。

黨的十九大製定了面向新時代的發展藍圖,提出要建設網絡強國、數字中國、智慧社會,推動互聯網、大數據、人工智能和實體經濟深度融合,發展數字經濟、共享經濟,培育新增長點、形成新動能。

在浙江,以軟件服務業、物聯網、雲計算、大數據等為主體的數字經濟規模連續3年超萬億元;在脫貧攻堅主戰場的貴州,大數據成為三大發展戰略支撐之一,其經濟增速已連續7年位居全國前列。

一串串數據、一項項成果,折射出近年來我國數字化發展的一系列歷史性成就、歷史性變革。

讓億萬人民在共享互聯網發展成果中有更多獲得感,為建設網絡強國凝聚磅礴力量

每次課程結束,在線培訓教師張帆都會仔細查看“魔鏡系統”對學生上課狀態的分析,並據此調整優化教學方案。

通過這一系統,攝像頭隨時捕捉學生上課時的舉手、練習、聽課、發言等課堂狀態,甚至面部表情的變化,通過多維度量化數據,生成專屬每一個學生的學習報告。

借助數字技術,“有教無類、因材施教”這一歷代先賢嚮往的目​​標如今正在走入尋常生活。

不再僅僅是網上購物、共享單車,如今,以大數據、雲計算、人工智能為代表的數字技術正日益滲透進中國人生活的方方面面:癌症大數據畫像的構建讓健康夢想更加清晰;“成長守護平台”給未成年人一片更為清朗的網絡空間;5G“超級網速”使屏幕閃現的“加載中”字樣成為歷史……

從互聯網催生的新產品新業態競相湧現,到數字技術將人們想像中的智能新生活變為現實;從出台網絡安全法開啟依法治網新階段,到數字經濟的“大動脈”更加通暢……億萬國人的世界因互聯網而更多彩,百姓的生活因互聯網而更豐富。

推動互聯網發展,用好互聯網的力量,是促進社會進步、增進人民福祉的基礎性工程。

留畬村位於廣東梅州南部的富硒地帶,種茶歷史悠久。但由於地理位置偏僻,交通和信息不暢,留畬茶的銷路一直沒有打開。

自從留畬茶進駐廣東移動電商信息化扶貧平台,實現在線銷售,茶葉滯銷難題迎刃而解。一年來,經“嶺南生活”平台售出的留畬茶多達6000餘斤,單日銷售訂單最高達1423單。

統計顯示,2017年,中國數字經濟規模達27.2萬億元,佔GDP比重達32.9%;電子商務、網絡零售持續增長,電商推動農村消費規模穩步擴大,物流、電信、交通等農村消費基礎設施進一步完善。

“堅持以人民為中心”,數字化發展正不斷滿足人民對美好生活的嚮往,百姓在共享互聯網發展成果上擁有了更多獲得感。

“凡益之道,與時偕行。”

短短20多年時間,從一條網速僅有64千比特每秒的網線出發,如今我國已經擁有7億網民、400多萬家網站,建成了全球最大的4G網絡,網絡零售交易額規模躍居世界第一……一連串的“了不起”,見證了一個網絡大國向網絡強國邁進的鏗鏘足音。

短短兩年間,從網絡提速降費到網絡安全法啟動實施,從連續主辦四屆世界互聯網大會到阿里雲數據中心基本覆蓋全球主要互聯網市場,一系列的“大手筆”,彰顯中國邁向網絡強國的決心與信心。

2017年12月,習近平總書記在十九屆中央政治局第二次集體學習時強調,“審時度勢、精心謀劃、超前佈局、力爭主動”“加快建設數字中國,更好服務我國經濟社會發展和人民生活改善”。

建設數字中國是貫徹落實習近平總書記關於網絡強國戰略思想的重要舉措,是堅持以人民為中心的發展思想、不斷增強人民獲得感的有效途徑,是搶抓發展機遇、加快現代化進程的必然要求。

這是新時代的迫切呼喚,更是新時代中國的堅定宣示。

在以習近平同志為核心的黨中央堅強領導下,我國網信事業發展必將在網絡強國的建設中邁出更大步伐,為全面建成小康社會,實現民族偉大復興的中國夢凝聚更加澎湃的創新動力。

Referring URL: http://paper.people.com.cn/rmrb/html/2018-04/

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar // 中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar //

中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Author: Source: Netease military

DTG: 2016-01-04 08:XX:XX

Strategic support forces are not logistical support or more powerful than the Rockets. Three tears on, how effective has China’s SSF become in the realm of cyber warfare?

Abstract: On December 31, 2015, the PLA Army Leadership, Rocket Army, and Strategic Support Forces were established. Xi Jinping, General Secretary of the CPC Central Committee, President of the State Council, and Chairman of the Central Military Commission, awarded the newly established three major units. The major steps marking the reform of the PLA’s army are beginning to be gradually implemented. Among the three new units, the strategic support force is definitely a brand new name, which naturally raises many questions. What kind of force is this?

The strategic support force should be called Skynet Army: it will change the war.

Strategic support is not logistical support

The newly established three units, the Army’s leading body is also the Army’s headquarters. The former PLA has always been the army’s boss. The mainland’s thinking is deeply rooted. Therefore, only the navy and air force headquarters, and no army command, the top leaders of the army are all from The army, the head of the navy and air force ranks among the members of the Central Military Commission, and it is more symbolic. The establishment of the Army Headquarters now means that the status of the Army will gradually be lowered and will be consistent with other services. This will lay the foundation for the model of the highest military leadership in the rotation of the heads of the Western military in the future, and further strengthen the synergy for the various services. The conditions.

The Rockets are no strangers to military fans. They are the former Second Artillery Corps, which is essentially a strategic missile force. The strategic missile unit of the former Soviet Union was called the Strategic Rocket Army. When the PLA established the strategic missile force, the international situation was surging. For the sake of low-key restraint, Zhou Enlai proposed the name of the Second Artillery. Now renamed the Rocket Army, the name is more prestige, more directly strengthen the significance of strategic deterrence.

Relative to the above two units, for those concerned about national defense construction, the strategic support force will be much more strange. When many people hear this name, the first reaction is the logistics support force, which is a big mistake! The strategic support force is actually a genuine combat force. It is nominally supportive. In many cases, it is the first open-minded pioneer to fight, even to enter the battlefield earlier than the land, sea, air force and rocket forces. According to the spokesman of the Ministry of National Defense, the strategic support force is a new type of combat force for safeguarding national security and an important growth point for our military’s new combat capability. It is mainly a strategic, basic, and supportive type. The support force is formed after the functional integration.

The strategic support force should be called Skynet Army: it will change the war.

Specifically, the strategic support force will include five parts: intelligence reconnaissance, satellite management, electronic countermeasures, cyber offense and defense, and psychological warfare. It is a combination of the most advanced corps, the net army, and other battlefields on the battlefield. More specifically, it is a combat force dedicated to the soft kill mission.

This is also the adjustment of the military reform at the military level. The PLA is divided into the traditional land, sea and air force, the strategic deterrent and the attacking rocket army and the most modern “sky-net” army. The three levels of division of labor are clear, and they can strengthen each other. The synergy between the two, to maximize the advantages of the overall war, is undoubtedly the highlight of this military reform.

Five major parts highlight high-tech content

Let’s take a closer look at the five major components of the Strategic Support Army. First, intelligence reconnaissance. This is not a spy war in the traditional sense. It is not like the old movie “The Crossing River Scout”, which disguise itself as a deep enemy. More is technical reconnaissance. With the increasing popularity of modern equipment, the leakage of various technical information is difficult to avoid, such as radio signals, electromagnetic signals, infrared signals, etc., through the collection and analysis of these signals, a large amount of valuable information can be obtained, strategic support forces The reconnaissance is mainly the technical reconnaissance in this respect, which can be carried out through modern equipment such as reconnaissance satellites, reconnaissance planes, drones, and sensors.

The strategic support force should be called Skynet Army: it will change the war.

Satellite management is the so-called “Heavenly Army”. This is a new type of force that has emerged with the rapid development of space technology, especially satellite information reconnaissance, tracking and surveillance, guided navigation and aerospace weapons. The United States established the National Space Command in 1985, marking the birth of the world’s first heavenly army. Russia subsequently separated the military space force and the space missile defense force from the strategic rocket army and established a space force with a total strength of about 90,000 people. Then with the military reform of the People’s Liberation Army, the “Heavenly Army” under the strategic support force was formally formed and became a force dedicated to space operations in the future. The significance is significant.

The history of electronic confrontation is much longer than that of the Tianjun. As early as in the First World War, both sides have had the information of the other party and the communication of the other party. To the Second World War, the means of electronic confrontation. Both the scale and the scale have been greatly developed. In July 1943, the British army used metal foil strips to interfere with the German radar in the bombing of Hamburg, Germany, which was considered the beginning of modern electronic confrontation. During the Middle East War in the 1960s, electronic confrontation played a decisive role. Under today’s technical conditions, there is no need to spend more on electronic countermeasures.

Network attack and defense is also called cyber warfare. It is the rise of the network, exploiting the loopholes and security flaws of the network to attack and destroy the data in the hardware, software and systems of the network system. In 2001, there was a large-scale civil hacking incident between China and the United States, which stimulated the United States to a certain extent. By 2009, the world’s first cyber command was established. Through the opportunity of military reform, China has set up a specialized cyber warfare force and began systematically investing and developing in the fields of information construction and network attack and defense. This is a milestone for the future war, which is bound to spread to the network. meaningful.

003

In the end, it is psychological warfare, that is, by applying the principle principle of psychology, taking human psychology as the battlefield, and systematically adopting various means, including the means of communication, such as the Internet, television, and broadcasting, which cannot be separated from modern life. Cognitive, emotional, and will exert influence, mentally disintegrating enemy military and civilian fighting spirits or eliminating the influence of enemy propaganda, thus combating the enemy’s mind, in exchange for the greatest victory and benefits at the least cost. Psychological warfare sounds very mysterious. In fact, as mentioned in “Sun Tzu’s Art of War·The Tactics”: “It is the victorious battle, the good ones who are not good, the soldiers who do not fight and the good, and the good ones.” The “war without a war” is the ultimate goal of today’s psychological war. In the Battle of Normandy in the Second World War, the Allies used a large number of psychological warfare methods, which seriously affected the judgment of the German commander-in-chief and made great contributions to the victory of the battle. Since then, from the Korean War, the Vietnam War, to today’s Iraq War and the Afghan War, the US military has had professional psychological warfare troops to participate in the war. Therefore, this is the most easily overlooked military means, but it is a high level of military struggle, and even more efficient and effective than advanced aircraft cannons.

Therefore, it can be said that the strategic support force is the highest in the five major services after the reform of the PLA’s army. It can even be said to be completely different from the traditional war style of the past, and it is more characterized by ultra-modern flow.

004

Soft killing

According to the strategy disclosed on the network, the armbands are supported on the network. The above is the eight-and-five-pointed star. Below is the triangular arrow and the electronic cloud orbit. Surrounded by the surrounding wheat ears, it can be seen from this pattern that the strategic support force is not a traditional one. In the sense of steel contest, you can’t see the scene of the smoke, and there is no such thing as a nuclear weapon to destroy the horror of the sea, but the soft kill of the soldiers. In a sense, soft killing is no less inferior than hard killing, and even playing a role is more important than hard killing.

In contrast, until today, the US military has only independent scattered Tianjun, Net Army and psychological warfare units, but the PLA Strategic Support Forces have integrated these units directly in the preparation, and they are able to cooperate and play the greatest combat effectiveness. . It can be said that this major reform of the military, especially the establishment of the strategic support force, is definitely a major improvement in the system.

Imagine that without the strategic support force’s satellites accurately positioned and navigated, without the electronic escaping forces and cyber warfare forces escorting, the Rocket’s strategic missiles will be difficult to function; if there is no strategic support for the technical reconnaissance intelligence support, Satellite communication links, then the land, sea and air forces on the vast battlefield are blind and deaf, and the combat effectiveness is greatly reduced. Therefore, the strategic support forces will play a major role in the invisible four-dimensional and five-dimensional battlefield space.

Original Mandarin Chinese:

战略支援部队可不是后勤支援,或比火箭军更厉害

摘要:2015年12月31日,解放军陆军领导机构、火箭军、战略支援部队成立,中共中央总书记、国家主席、中央军委主席习近平给新成立的这三大单位授旗。标志着此轮解放军军队改革重大步骤正开始逐步落实,在这三个新单位中,战略支援部队绝对是个全新的名称,自然会引起不少的疑问,这到底是支怎样的部队呢?

战略支援部队就应该叫天网军:将改变战争

战略支援可不是后勤支援

这次新成立的三个单位,陆军领导机构也就是陆军总部,原来解放军历来就是陆军老大,大陆军的思想根深蒂固,所以只有海军、空军司令部,而不设陆军司令部,军队最高领导全都出自陆军,海空军首长位列中央军委委员,也更多是象征意义。现在设立陆军总部,也就意味着陆军的地位逐渐下调,将和其他军种相一致,这为今后仿效西方各军种首长轮流担任军队最高领导的模式打下了基础,同时也对各军种进一步加强协同创造了条件。

火箭军对于军迷来说也是并不陌生,就是以前的第二炮兵,实质就是战略导弹部队。前苏联的战略导弹部队就叫战略火箭军,解放军成立战略导弹部队时,国际形势风起云涌,出于低调克制的考虑,由周恩来提议采用了第二炮兵的名称。现在改称火箭军,在名称上就威风多了,更直接地强化了战略威慑的意义。

相对上述两个单位,对于关心国防建设的人来说,战略支援部队就要陌生多了。很多人一听到这个名称,第一反应就是后勤支援部队,那就大错特错了!战略支援部队其实一样是货真价实的作战部队,名义上是支援,很多时候反而是第一个冲锋陷阵的开路先锋,甚至要比陆海空军和火箭军更早地投入战场。按照国防部发言人的话来说,战略支援部队是维护国家安全的新型作战力量,是我军新质作战能力的重要增长点,主要是将战略性、基础性、支撑性都很强的各类保障力量进行功能整合后组建而成。

战略支援部队就应该叫天网军:将改变战争

具体来说,战略支援部队将包括情报侦察、卫星管理、电子对抗、网络攻防、心理战等五大部分,是综合了这个时代最先进的天军、网军等看不见硝烟的战场上的作战部队,更确切地说是专门担负软杀伤使命的作战力量。

这也是此次军队改革在军种层面的调整,将解放军分为传统的陆海空军、战略威慑和打击的火箭军和最现代化的“天-网”军,三个层次分工明确,又能强化相互之间的协同配合,最大限度地发挥出整体战的优势,无疑是本次军队改革的重头戏。

五大部分凸现高科技含量

再来细看战略支援军的五大组成部分,先是情报侦察,这可不是传统意义上打入敌人内部的谍战无间道,也不是像老电影《渡江侦察记》那样乔装改扮深入敌后,而更多的是技术侦察。随着现代化装备越来越普遍,各种技术信息的泄漏很难避免,比如无线电信号、电磁信号、红外信号等等,通过对这些信号的搜集和分析就可以获取大量宝贵的情报,战略支援部队的侦察主要就是这方面的技术侦察,可以通过侦察卫星、侦察机、无人机、感应器等现代化装备来进行。

战略支援部队就应该叫天网军:将改变战争

卫星管理就是所谓的“天军”,这是随着航天技术的飞速发展,特别是卫星信息侦察、跟踪监视、制导导航及航天兵器的广泛应用,应运而生的新型部队。美国在1985年成立了全美航天司令部,标志着世界上第一支天军的诞生。俄罗斯随后也将军事航天部队和太空导弹防御部队从战略火箭军中分离出来,成立了一支总兵力约9万人的航天部队。那么随着解放军这次军事改革,隶属于战略支援部队的“天军”也正式组建,成为今后专门承担航天作战的部队,意义可谓重大。

电子对抗的历史就要比天军更为悠久,早在第一次世界大战中交战双方就都曾有过侦收对方的信息和干扰对方通信联络,到第二次世界大战,电子对抗的手段和规模都有了很大发展,1943年7月英军在对德国汉堡的轰炸中大规模使用金属箔条干扰德军雷达,被认为是现代电子对抗的开始。到60年代中东战争期间,电子对抗更是发挥了决定性的作用。在今天的技术条件下,电子对抗就不用再多费口舌了。

网络攻防也叫网络战,是随着网络的兴起,利用网络存在的漏洞和安全缺陷对网络系统的硬件、软件及其系统中的数据进行攻击和破坏。2001年中美之间就曾发生过大规模的民间黑客攻击事件,这在一定程度上刺激了美国,到2009年成立了世界上第一个网络司令部。中国此次借着军队改革的契机,组建了专业化的网络战部队,开始系统地在信息化建设和网络攻防领域进行投入和发展,这对于未来战争势必波及到网络的大趋势,是具有里程碑意义的。

003

最后则是心理战,也就是通过运用心理学的原理原则,以人类的心理为战场,有计划地采用各种手段,包括现代生活须臾不能脱离的网络、电视、广播等传播手段,对人的认知、情感和意志施加影响,从精神上瓦解敌方军民斗志或消除敌方宣传所造成的影响的对抗活动,从而打击敌方的心志,以最小的代价换取最大胜利和利益。心理战听起来很是玄乎,其实《孙子兵法·谋攻篇》中所提到的:“是故百战百胜,非善之善者也;不战而屈人之兵,善之善者也。” 这里的“不战而屈人之兵”就是今天心理战所要达到的终极目标。在第二次世界大战中的诺曼底登陆战役,盟军就曾运用了大量的心理战手段,严重影响干扰了德军统帅部的判断,为战役的胜利做出了巨大贡献。此后,从朝鲜战争、越南战争,直到今天的伊拉克战争和阿富汗战争,美军都曾有专业的心理战部队参战。因此,这是最容易被忽视的军事手段,但却是军事斗争的高级层次,甚至要比先进的飞机大炮更有效率和作用。

因此,可以说战略支援部队是解放军军队改革之后五大军种中,高科技含量最高的,甚至可以说是完全不同于过去传统战争的样式,更多地带有超现代流的特色。

004

不容小觑的软杀伤

根据网络上披露的战略支援部队臂章图案,上面是八一五角星,下面是三角箭头和电子云轨道,周围是环绕的麦穗,从这个图案中就可以看出,战略支援部队并不是传统意义上钢铁的较量,看不到硝烟滚滚的场景,更没有核武器那样毁山灭海的恐怖威力,而是兵不血刃的软杀伤。从某种意义上来说,软杀伤丝毫并不比硬杀伤逊色,甚至所发挥的作用更要比硬杀伤重要。

相比之下,直到今天美军才只有独立分散的天军、网军和心理战部队,但解放军战略支援部队则将这些部队直接在编制上整合在一起,更能协同配合,发挥出最大的战斗力。可以说是这次军队的大改革,特别是战略支援部队的成立,在体制上绝对是一大进步。

试想一下,如果没有战略支援部队的卫星准确地定位和导航,没有电子干扰部队、网络战部队的保驾护航,那么火箭军的战略导弹就难以发挥作用;如果没有战略支援部队技术侦察的情报保障、卫星的通讯联系,那么分布在广阔战场上的陆海空军部队就是眼盲耳聋,战斗力也要大打折扣。因此,在看不到的四维、五维战场空间,战略支援部队必将发挥出重大的作用。

Original Referring URL:  http://war.163.com/16/0104/08/

Chinese Military: Cyber security is a matter of war. In the information war, cyberspace has become a new dimension of battlefield space // 中國軍隊:網絡安全是戰爭問題。 在信息戰中,網絡空間已成為戰場空間的新維度

Chinese Military: Cyber security is a matter of war. In the information war, cyberspace has become a new dimension of battlefield space //

中國軍隊:網絡安全是戰爭問題。 在信息戰中,網絡空間已成為戰場空間的新維度

 

Author:   來源: 解放軍報 作者: 周鴻禕 張春雨

DTG: 2018年05月22日 16:XX:XX

 ● Promote network security. The integration of military and civilian needs to integrate and optimize the allocation at the national level, and promote the two-way flow of technology, talents and resources.

  ● Whether it is network security analysis, situation research, emergency response, or network protection hardware and software development, a large number of information technology talents are needed.

  

        President Xi profoundly pointed out that there is no national security without cyber security. In the digital age, cyberspace has penetrated into various fields such as politics, economy, military, culture, etc. It has the natural attributes of military and civilian integration, and is an important aspect of the integration and development of military and civilians in the new era. At present, China is marching toward a network power and building a network great wall combining military and civilian integration. It is not only the basic system design for building a network power and information army, but also an important driving force for promoting the deep development of military and civilian integration. Under the new situation, we will actively promote the in-depth development of cyber security, military and civilian integration, and urgently need to break down institutional barriers, structural contradictions, and policy issues, and constantly improve the level of integration and enhance joint protection capabilities.

Cybersecurity is related to the overall security of the country, and it is necessary for the military to walk away from the road of comprehensive integration.

  In the information age, cyberspace security has become a new commanding height of the national strategy. Last year, the “Eternal Blue” ransomware that broke out in the world, the Ukrainian power grid attacked, and the US election “mail door” and other events showed that cyber security concerns national security, social stability and war victory or defeat. The cyber security contest has risen to the national level of confrontation, beyond the scope of the military’s respective management and control, and it is necessary to rely on the integration of the military and the local forces to manage and manage well.

  Cybersecurity is a national interest. As the network’s tentacles extend to economic, social, cultural and other fields, its security will affect economic security, social security, cultural security, and information security. In May 2017, the “Eternal Blue” ransom virus swept through more than 150 countries and regions, including government, banks, communications companies, energy companies and other important departments, and the infrastructure was paralyzed, causing an uproar in the world. Earlier, Saudi Arabia’s infrastructure was attacked by cyber attacks. In just a few minutes, the computer hard drive was destroyed, all data was emptied, and the attacker tried to cause an explosion. If it succeeded, it would undoubtedly have serious consequences.

  Cybersecurity is a matter of war. In the information war, cyberspace has become a new dimension of battlefield space. At present, the United States, the United Kingdom, and Japan have established cyber warfare forces and vigorously developed various cyber weapons. In the Iraq war, the US military first destroyed the five key command and radar facilities of the Iraqi army, and used electronic interference to firmly grasp the information superiority, making the Iraqi army blind and paralyzed, and the defense system quickly paralyzed. With the accelerated evolution of war forms, the competition for information superiority has increasingly become the core content of war wins and losses. As the “main battlefield” of information control, cyberspace has increasingly become the commanding height of war games.

  Cybersecurity is a common practice in the world. At present, many countries in the world regard military and civilian integration as an important way to improve the security of cyberspace. For example, the United States has made cybersecurity the focus of national security. The White House and the Pentagon have designated Boeing and Lockheed Martin as the national network security team, and designated information technology giants such as Microsoft, Intel, Cisco, Apple, and Google for network security. Professional team, designated Symantec, McAfee and other network security protection companies for the network security special team. In Israel, after the retiring of many Israeli cyber security forces, they became the elite of local high-tech enterprises and founded several network security companies. These companies have come back to cooperate with the Israeli army in the field of network security to enhance the security of the military network and promote the development of the entire network space security.

Network security resources are diversified and diverse, requiring military to strengthen top-level design coordination

  Promoting the integration of military and civilian development is a systematic project. It is necessary to use system science, system thinking, and systematic methods to solve problems. At present, China’s various information network systems are developing at a high speed, and network functions of different functions and types are being put into use one after another. The overall framework of the network security protection system is basically established. However, network security resources are widely distributed in the military and local areas. Promoting network security and military-civilian integration, improving synergy protection needs to strengthen top-level design coordination, break down institutional barriers and departmental interests, unify integration and optimize allocation at the national level, and promote technology, talents, resources, etc. Two-way flow conversion of features.

  Establish and improve the leadership system of the network security organization. It is necessary to speed up the establishment of a leading agency for cybersecurity work organizations with Chinese characteristics in order to ensure a clear hierarchy and division of labor. The national cybersecurity leadership agency’s work focuses on strengthening the top-level design and macro-management of cybersecurity military-civilian integration, formulating development strategies and planning plans, fulfilling the overall coordination function in military-civilian integration, and being responsible for domestic cybersecurity defense and emergency response, and combating cybercrime. And cyber terrorism; military cyber security authorities focus on the overall planning and construction of military cybersecurity, integrating the areas of military and civilian integration into the overall development of national cybersecurity, and doing a good job of connecting with national cybersecurity development plans, We will clarify the relevant processes and management methods for military-land coordination, improve the work system for regular military conferences, important situation notifications, and major operational coordination, and form joint prevention, joint management, and joint control of cyberspace security.

  Coordinate the planning standards for military network security construction. With the goal of effectively responding to the current and future cyber offensive and defensive measures, the overall framework of military and civilian cybersecurity construction will be scientifically formulated, the construction model will be classified, the short-term and long-term construction goals will be defined, and the supporting measures for completing the tasks will be determined. The first is to adhere to the standard. Actively promote the unification of technical standards for network security basic products such as autonomously controllable secure operating systems and secure database systems, and achieve full integration of systems at key moments to create a solid and reliable network security defense line. The second is to insist on a unified assessment. Strengthen the assessment of network security construction and technical risk assessment of network security products, clarify the evaluation procedures and links, and adopt scientific and effective evaluation methods to ensure that the network is secure and controllable after it is built.

  Establish a network security military resource sharing mechanism. To realize the sharing of military network security resources, the key is to establish a mechanism for military land demand. The information on military and civilian technical achievements should be released in a timely manner. The real-time table of “the battlefield needs to be lacking” and “market ownership” should be fully shared with the military and land needs, technologies, standards, products and other information resources; accelerate the construction of military information integration and sharing platform, Expand Unicom channels, standardize interoperability standards, and achieve full complementarity and sharing of military and territorial information resources; establish a network security access system, clearly define the scope of confidentiality levels, and the military business authorities and the “Ministry of the Army” enterprises regularly meet, information, and demand docking Collaborate with research and development to prevent civil network security forces from developing technology and losing targets, reducing targets, protecting tactics from losing rivals, and lacking direction; establishing a network threat information exchange mechanism, timely interoperating with domestic and international network security updates and major event notifications, encouraging private Enterprises and governments, the military share real-time network security threat information, improve the professional and real-time response capabilities of research and analysis.

The essence of cybersecurity is the contest of talents.

  The essence of cybersecurity is cyber confrontation, which is essentially the competition of talents. Whether it is network security analysis, planning, situation research, response and disposal, or network protection hardware and software development, a large number of information technology talents are needed. In order to meet the huge demand of military network security talents, it is necessary to firmly establish a joint thinking.

  Jointly train talents. In recent years, important progress has been made in the training of national cyber security personnel. Cyberspace security has been added to the first-level discipline by the Academic Degrees Committee and the Ministry of Education, and nearly 10,000 graduates in the field of cyberspace security each year. However, compared with the demand for building a network strong country and strengthening the army, there is still a big gap, such as a large gap in the talent team, a need to improve the training system, and insufficient reserve of practical talents. We should actively explore the military, local colleges, research institutes and network security enterprises to carry out joint training channels for talents, build a team of teachers, jointly set up experimental sites, and set up a practice base to realize the organic combination of classroom teaching and practical practice, through network security training. Camp, safety operation and maintenance personnel training, etc., to enhance the professional capabilities of network security practitioners, improve the rapid, large-scale, actual combat security operation and maintenance, analysis and response, attack and defense penetration and other network security personnel joint training mechanism.

  Joint use of strength. We should coordinate the use of various forces in the military, strengthen operational coordination, and establish a relatively comprehensive network security joint prevention and control mechanism. On the one hand, give full play to the role of local network security talents, open up the military network security top-level design, core technology research and development, and network security overall construction to meet the needs of military network security for talents; on the other hand, give full play to the military network security needs The role of the booster is to use the military’s advanced network technology to test the security of national critical infrastructure networks such as nuclear power, communications, transportation, and finance, and to verify the effectiveness of the emergency response system.

  Joint research and development technology. Military and civilian collaborative innovation is an important way to achieve breakthroughs in network protection technology innovation. We should focus on the use of military demand for cutting-edge innovation, and focus on breaking key network technologies, promoting the sharing of military and civilians on the basic platform, and vigorously promoting the mutual transformation of military and civilian technologies; encouraging universities, research institutes, military enterprises, and superior private enterprises to strengthen alliances. Focus on military, human, material and financial resources, and focus on key chips, core devices, operating systems, etc.; explore military and civilian integration network security equipment technology innovation model, develop a new generation of firewalls, intrusion detection, information encryption, information hiding, anti-eavesdropping And other protection technologies to jointly foster an ecological chain of autonomous network security industry.

  In addition, due to the comprehensive complexity of network security, military and regional forces are needed to strengthen regulatory and policy guarantees. Formulate a legal system for network security and military-civilian integration, relevant policies to support the integration of cyber security and civil-military, and relevant documents in the field of cybersecurity military-civilian integration key protection, ensure that the measures for network security and military-civilian integration take root, and form a joint support system for military and land.

Original Mandarin Chinese:

要點提示

●推動網絡安全軍民融合,需要在國家層面統一整合、優化配置,促進技術、人才、資源等要素雙向流動轉化。

●無論是網絡安全分析、態勢研判、應急處置,還是網絡防護硬件、軟件的研發,都需要大量的信息科技人才。

習主席深刻指出,沒有網絡安全就沒有國家安全。數字化時代,網絡空間已滲透到政治、經濟、軍事、文化等各個領域,具備軍民一體的天然屬性,是新時代軍民融合發展的重要方面。當前,我國正向網絡強國邁進,打造軍民融合的網絡長城,既是建設網絡強國和信息化軍隊的基本製度設計,也是推動軍民融合深度發展的重要驅動力量。新形勢下,積極推動網絡安全軍民融合深度發展,亟須破解體制性障礙、結構性矛盾、政策性問題,不斷提高融合水平、提升聯合防護能力。

網絡安全事關國家整體安全,需軍地走開全面融合之路

信息化時代,網絡空間安全已經成為國家戰略新的製高點。去年全球爆發的“永恆之藍”勒索病毒、烏克蘭電網遭攻擊、美國大選“郵件門”等事件表明,網絡安全事關國家安全、社會穩定和戰爭勝敗。網絡安全的較量已上升為國家層面的對抗,超出軍地各自管理控制的範疇,需要依靠軍地一體合力集中統管才有可能管得住、管得好。

網絡安全事關國家利益。由於網絡觸角延伸到經濟、社會、文化等各個領域,其安全必將影響到經濟安全、社會安全、文化安全、信息安全等。 2017年5月,“永恆之藍”勒索病毒席捲150多個國家和地區,包括政府、銀行、通信公司、能源企業等重要部門機構基礎設施陷入癱瘓,在全球引起軒然大波。早前,沙特的基礎設施遭網絡攻擊,僅僅數分鐘內,計算機硬盤就被破壞,所有數據被清空,攻擊者還試圖引發爆炸,如果得逞無疑會造成十分嚴重的後果。

網絡安全事關戰爭勝負。信息化戰爭中,網絡空間已成為新維戰場空間。當前,美國、英國、日本等都已建立網絡作戰部隊,並大力研發各種網絡武器。伊拉克戰爭中,美軍首先摧毀了伊軍非常關鍵的5個指揮與雷達設施,並使用電子乾擾等方式牢牢掌握信息優勢,使伊軍又盲又聾,防禦體系迅速癱瘓。隨著戰爭形態的加速演變,信息優勢爭奪日益成為戰爭勝負的核心內容,網絡空間作為信息控制的“主戰場”,日益成為戰爭博弈的製高點。

網絡安全軍民一體是世界普遍做法。當前,世界很多國家都將軍民一體看作是提升網絡空間安全的重要途徑。例如,美國就將網絡安全作為國家安全的重點,白宮和五角大樓指定波音、洛克希德·馬丁等公司為網絡安全國家隊,指定微軟、英特爾、思科、蘋果、谷歌等信息技術巨頭為網絡安全的專業隊,指定賽門鐵克、邁克菲等網絡安全防護企業為網絡安全的特種隊。在以色列,許多以軍網絡安全部隊的軍人退役後,成為地方高科技企業的精英,並創辦多家網絡安全公司。這些公司回過頭來與以軍在網絡安全領域展開全方位合作,提升以軍網絡防護能力的同時,推動整個網絡空間安全的發展。

網絡安全資源分散多元,需軍地強化頂層設計統籌

推動軍民融合發展是一個系統工程,要善於運用系統科學、系統思維、系統方法研究解決問題。目前,我國各類信息網絡系統高速發展,不同功能、類型的網絡安全設施陸續配套投入使用,網絡安全防護系統的總體框架基本建立。但網絡安全資源廣泛分佈於軍隊和地方,推動網絡安全軍民融合,提高協同防護能力需要強化頂層設計統籌,打破體制壁壘和部門利益,在國家層面統一整合、優化配置,促進技術、人才、資源等要素雙向流動轉化。

構建完善網絡安全組織領導體制。應加快建立軍地一體具有中國特色的網絡安全工作組織領導機構,確保層級清晰、分工協作。國家網絡安全領導機構的工作重點是加強網絡安全軍民融合的頂層設計和宏觀管控,制定發展戰略和規劃計劃,履行軍民融合中的統籌協調職能,負責國內網絡安全的防禦與應急反應,打擊網絡犯罪和網絡恐怖主義等;軍隊網絡安全主管機構側重於擬制軍隊網絡安全的整體規劃和建設,將可以實施軍民融合的領域納入國家網絡安全發展全局,做好與國家網絡安全發展規劃的相互銜接,明確軍地協調的相關流程和管理辦法,健全軍地定期會商、重要情況通報、重大行動協同等工作制度,形成網絡空間安全的聯防、聯管、聯控。

統籌軍地網絡安全建設規劃標準。以有效應對當前和未來一段時期網絡攻防手段為目標,科學制定軍民網絡安全建設總體框架,分類確立建設模式,明確近期和長遠建設目標,確定完成任務的配套措施。一是堅持統一標準。積極推動自主可控的安全操作系統、安全數據庫系統等網絡安全基礎產品的技術標準統一,關鍵時刻能實現各系統的全面融合,打造堅固可靠的網絡安全防線。二是堅持統一評估。加強網絡安全建設評估和網絡安全產品的技術風險評估,明確評估程序和環節,採取科學有效的評估方法,確保網絡建成后防得牢、控得住。

建立網絡安全軍地資源共享機制。實現軍地網絡安全資源共享,關鍵是建立軍地需求共提機制。應及時發布軍民兩用技術成果信息,實時對錶“戰場需缺”與“市場所有”,實現軍地雙方需求、技術、標準、產品等信息資源充分共享;加快構建軍地信息融合共享平台,拓展聯通渠道,規範互通標準,實現軍地信息資源充分互補共用;建立網絡安全准入制度,明確劃定保密等級範圍,軍隊業務主管部門與“民參軍”企業定期會商、信息通報、需求對接和協作攻研,防止民用網絡安全力量技術研發丟了目標、少了靶子,防護戰術失去對手、缺乏指向;建立網絡威脅信息互通機制,及時互通國內外網絡安全最新動態和重大事件通報,鼓勵民營企業與政府、軍隊實時共享網絡安全威脅信息,提高研究分析的專業性和實時響應能力。

網絡安全實質是人才的較量,需軍地樹牢聯合思想

網絡安全的本質是網絡對抗,實質是人才的競爭較量。無論是網絡安全分析、規劃、態勢研判、響應和處置,還是網絡防護硬件、軟件的研發,都需要大量的信息科技人才。為滿足軍地網絡安全人才巨大需求,需要牢固樹立聯合思想。

聯合培養人才。近年來,國家網絡安全人才培養取得重要進展,網絡空間安全被國務院學位委員會和教育部增設為一級學科,每年網絡空間安全領域畢業生近萬名。但與打造網絡強國和強軍興軍需求相比還存在較大差距,存在人才隊伍缺口較大、培養體係有待完善、實踐型人才儲備不足等問題。應積極探索軍隊、地方高校、科研院所和網絡安全企業開展人才聯合培養渠道,共建師資隊伍、共搭實驗場所、共設實習基地,實現課堂教學、實習實踐的有機結合,通過網絡安全訓練營、安全運維人才培養等,提升網絡安全從業人員的專業能力,完善快速化、規模化、實戰化的安全運維、分析響應、攻防滲透等網絡安全人才聯合培養機制。

聯合運用力量。應統籌軍地各種力量的運用,加強行動協同,建立較為完善的網絡安全聯防聯控機制。一方面,充分發揮地方網絡安全人才的作用,開放軍隊網絡安全頂層設計、核心技術研發、網絡安全整體建設等領域,以滿足軍隊網絡安全對人才的需求;另一方面,充分發揮軍隊網絡安全需求的助推器作用,利用軍方先進的網絡技術,測試核能、通信、交通、金融等國家關鍵基礎設施網絡的安全性,檢驗應急響應體系的有效性。

聯合研發技術。軍民協同創新是實現網絡防護技術創新突破的重要途徑。應圍繞發揮軍事需求對前沿創新的牽引帶動作用,聚力突破關鍵網絡技術,促進基礎平台軍民共享,大力推動軍民技術相互轉化;鼓勵高校、科研院所、軍工企業和優勢民營企業強強聯合,集中軍地人力、物力和財力,對關鍵芯片、核心器件、操作系統等領域集智攻關;探索軍民融合網絡安全裝備技術創新模式,研發新一代防火牆、入侵檢測、信息加密、信息隱藏、反竊聽等防護技術,共同培育自主化網絡安全產業生態鏈。

此外,由於網絡安全具有綜合性複雜性,還需軍地合力來強化法規政策保障。制定網絡安全軍民融合的法規體系、支撐網絡安全軍民融合的相關政策,以及網絡安全軍民融合重點保障領域的相關文件,確保網絡安全軍民融合的措施落地生根,形成軍地聯合支撐體系。

Chinese Military Review : US Army issued the “cyberspace and electronic warfare operations” doctrine // 中國軍事評論美國陸軍頒布《網絡空間與電子戰行動》條令

US Army issued the “cyberspace and electronic warfare operations” doctrine// 中國軍事評論美國陸軍頒布《網絡空間與電子戰行動》條令

The field command FM3-12 provides instructions and guidance for the Army to implement cyberspace and electronic warfare operations using cyberspace electromagnetic activity in joint ground operations. The Fields Act FM3-12 defines the Army’s cyberspace operations, electronic warfare, roles, relationships, responsibilities, and capabilities, and provides an understanding of this to support Army and joint operations. It details how Army forces protect Army networks and data, and explains when commanders must integrate custom cyberspace and electronic warfare capabilities within military operations.

On the basis of the 2006 National Cyberspace Operations Military Strategy (NMS-CO), the US Joint Chiefs of Staff announced the joint publication JP 3-12 in February 2013 as an internal document. October 21, 2014 The published document for public release is Joint Publication JP 3-12(R). The order states that “the global reliance on cyberspace is increasing, and careful control of offensive cyberspace operations is required, requiring national-level approval.” This requires commanders to recognize changes in national network policies that are mandated by operations. Potential impact. On April 11, 2017, the US Army issued the field command FM3-12 “Network Space and Electronic Warfare Action” on this basis. The field war said that in the past decade of conflict, the US Army has deployed the most powerful communication system in its history. In Afghanistan and Iraq, enemies lacking technological capabilities challenge the US military’s advantages in cyberspace, and the US military has taken the lead in cyberspace and electromagnetic spectrum (EMS) operations. However, regional rivals have demonstrated impressive capabilities in a mixed-operational environment that threatens the US Army’s dominance in cyberspace and the electromagnetic spectrum. Therefore, the Order states that the integration of cyberspace electromagnetic activity at all stages of combat operations is the key to acquiring and maintaining freedom of maneuver in the cyberspace and electromagnetic spectrum, while preventing the enemy from doing so. Cyberspace electromagnetic activity can synchronize capabilities across a variety of domains and operational functions, and maximize synergies within and through the cyberspace and electromagnetic spectrum. Intelligence, signal, information operations (IO), cyberspace, space and firepower operations are critical to planning, synchronizing, and implementing cyberspace and electronic warfare operations.

The Fields Order FM3-12 supports the Joint Cyberspace and Electronic Warfare Act and the Army Doctrine Reference Publication ADRP3-0, Combat, and provides a background to define the Army’s doctrine reference publication ADRP5-0 “Operational Process” and Cyberspace and The relationship between electronic warfare operations. In order to understand the basic principles of integration and synchronization of cyberspace and electronic warfare operations, you must first read the Army’s doctrine publication ADP2-0, the Army’s doctrine reference publication ADRP2-0, the Army doctrine publication ADP3-0, and the Army doctrine reference publication ADRP3. -0, Army doctrine publication ADP5-0, Army doctrine reference publication ADRP5-0, Army doctrine publication ADP6-0, Army doctrine reference publication ADRP6-0, Army technical publication ATP2-01.3, field bar FM3-13 And FM6-0. By planning, integrating, and synchronizing cyberspace and electronic warfare operations, cyberspace electromagnetic activities can integrate functions and capabilities across operational functions, defend networks, and provide critical capabilities to commanders at all levels during joint ground operations. Cyberspace and electronic warfare operations affect all combat functions and are also affected by them.

Network space visualization operating environment of electromagnetic spectrum

The field battles present detailed tactics and procedures for Army cyberspace and electronic warfare operations. The field command replaced the field title FM3-38 dated February 2014. The Fields Order FM3-12 is an Army cyberspace and electronic warfare campaign advocacy publication. The field battles contain the basic principles and guiding principles of cyberspace operations, electronic warfare, and cyberspace electromagnetic activities in a single publication. It provides a comprehensive account of how they support and achieve action, and how to support the missions and functions of the various levels of force. The field battles laid the foundation for subordinate Army technical publications.

Cyberspace and e-war operations incorporate established joint and Army processes into operations such as intelligence processes, targeting processes, and military decision-making processes (MDMPs). The field battles explain the basic ideas of the Army’s cyberspace and electronic warfare operations. Content includes staff responsibilities, contributions to military decision-making processes, cyberspace and target work in the electromagnetic spectrum, and reliance on intelligence and operational environment readiness (OPE) in cyberspace.

The field battles describe the relationship between cyberspace operations, missions, operations, electronic warfare, electromagnetic spectrum, and each other’s actions. This elaboration also includes cyberspace electromagnetic activity, providing compliance for military forces and the following combat forces planning, integration, and simultaneous electromagnetic activities.

Schematic diagram of electromagnetic spectrum

The first chapter provides an understanding of cyberspace, cyberspace operations, missions, actions, and effects. It describes cyberspace and situational understanding, situational awareness, threats, risks, vulnerabilities, and their relationship to information and operational environments. The level and characteristics of cyberspace confirm the legal authorization applicable to cyberspace and cyberspace operations, and discuss the basic information and spectrum management functions of electronic warfare related to cyberspace and electronic warfare operations.

Chapter 2 provides information on the use of cyberspace operations and tasks, rather than day-to-day operations, pointing out that information operations, intelligence, space operations, and targeted work can affect cyberspace, electromagnetic spectrum, cyberspace operations, and electronic warfare operations. Commanders and staff officers have integrated and synchronized all of these aspects of cyberspace and electronic warfare operations.

The third chapter expounds the Army’s cyberspace electromagnetic activity and mission-style command, the role of the commander, the cyberspace with combat functions and the electronic warfare action, and discusses how to incorporate the planning elements of cyberspace and electronic warfare operations into the operational process. This includes planning, preparation, implementation, evaluation, and targeting. The discussion of the operational environment is combined with the military decision-making process, followed by an overview of the preparation requirements, implementation tactics, and how to assess cyberspace and electronic warfare operations.

Figure cyberspace electromagnetic activity combat framework

Appendix A discusses cyberspace operations and various joint operations partners.

Appendix B highlights the location of cyberspace operational information in the Combat Command and Appendix 12 to Annex C. This appendix includes an example of Appendix 12 to Annex C, which describes the types of information contained in this appendix and sections.

Appendix C contains the procedures for handling cyberspace operations requests from military, military, and military units, as well as fields and information for the Cyber ​​Operations Application Form (CERF). Blank copies of the cyber operations application form and field explanations are all part of the process.

Appendix D includes fields and information for the Electronic Attack Request Form (EARF). A blank copy of the electronic attack application form and a five-line brief with field interpretation are part of the program.

Cyberspace and Electronic Warfare Actions Directory

Preface

preface

Chapter 1 Network Space and the Basic Principles of Electronic Warfare Action

Section 1 Overview of Cyberspace and Electromagnetic Spectrum

First, the network space domain

Second, combat operations and cyberspace domain

Third, cyberspace tasks and actions

Section 2 Understanding Network Space and Environment

1. Network space and electromagnetic spectrum

Second, cyberspace and information environment

Third, the network space level

Fourth, the characteristics of cyberspace

5. Cyberspace as part of the operational environment

Sixth, risk in cyberspace

Seven, authorization

Section III Electronic Warfare Action

First, the electromagnetic spectrum action

Second, electronic warfare

Third, the application of matters needing attention

Fourth, spectrum management

Chapter 2 Relationship with Cyberspace and Electromagnetic Spectrum

I. Interdependence

Second, information operations

Third, intelligence

Fourth, space operations

V. Target determination

Chapter III Electromagnetic Activities in Cyberspace in Operation

First, the basic principle

Second, matters needing attention

Third, the role of the commander

Fourth, empower resources

V. Planning work and cyberspace electromagnetic activities

Sixth, network effect application form and target determination activities

Appendix A Integration with Unified Action Partners

Appendix B Cyberspace in Combat Commands

Appendix C Network Effect Application Form

Appendix D Electronic Attack Application Form

Thanks for compiling/reviewing: Shen Song

Article source: Zhiyuan Strategy and Defense Research Institute

Electric Defense Research

Original Mandarin Chinese:

野战条令FM3-12为陆军在联合地面作战中使用网络空间电磁活动实施网络空间和电子战行动提供了指示与指导。野战条令FM3-12界定了陆军网络空间行动、电子战、角色、关系、职责和能力,并提供了对此的理解,从而为陆军和联合作战提供支持。它详述了陆军部队保护陆军网络与数据的方法,并阐述了指挥官必须在军事行动范畴内整合定制网络空间与电子战能力的时机。

在2006年《国家网络空间作战军事战略(NMS-CO)》基础上,美军参谋长联席会议在2013年2月只是以内部文件形式公布了联合出版物JP 3-12。2014年10月21日对外公开发布的条令文件为联合出版物JP 3-12(R)。该条令指出,“在全球范围内,对网络空间的依赖日益增加,需要仔细控制进攻性网络空间作战,需要国家层面的批准。”这就要求指挥官认识到国家网络政策的变化对作战授权的潜在影响。2017年4月11日,美国陆军在此基础上颁布了野战条令FM3-12《网络空间与电子战行动》。该野战条令认为,在过去十年的冲突中,美国陆军已经部署了其历史上最强大的通信系统。在阿富汗和伊拉克,缺少技术能力的敌人挑战美军在网络空间内的优势,美军在网络空间和电磁频谱(EMS)行动中取得了主导权。但是,地区同等对手已经在一种混合作战环境中展示了令人印象深刻的能力,这种混合作战环境威胁了美国陆军在网络空间和电磁频谱中的主导权。因此,该条令指出,在作战行动的所有阶段整合网络空间电磁活动是在网络空间和电磁频谱内获取和保持机动自由的关键,同时可以阻止敌人这么做。网络空间电磁活动可以同步贯穿各种域和作战职能中的能力,并在网络空间和电磁频谱内及通过它们最大程度地发挥互补效果。情报、信号、信息作战(IO)、网络空间、太空和火力作战对计划、同步和实施网络空间与电子战行动是至关重要的。

野战条令FM3-12支持联合网络空间与电子战行动条令以及陆军条令参考出版物ADRP3-0《作战》,并提供了条令背景以明确陆军条令参考出版物ADRP5-0《作战过程》和网络空间与电子战行动之间的关系。为了理解整合与同步网络空间与电子战行动的基本原理,必须首先要阅读陆军条令出版物ADP2-0、陆军条令参考出版物ADRP2-0、陆军条令出版物ADP3-0、陆军条令参考出版物ADRP3-0、陆军条令出版物ADP5-0、陆军条令参考出版物ADRP5-0、陆军条令出版物ADP6-0、陆军条令参考出版物ADRP6-0、陆军技术出版物ATP2-01.3、野战条令FM3-13和FM6-0。通过计划、整合和同步网络空间与电子战行动,网络空间电磁活动就可以横跨作战职能整合各种职能与能力,保卫网络,并在联合地面作战期间为各级指挥官提供关键能力。网络空间和电子战行动影响到所有的作战职能,也会受到它们的影响。

电磁频谱的网络空间可视化操作环境

本野战条令提出了陆军网络空间和电子战行动的详细战术和程序。该野战条令取代了日期标注为2014年2月的野战条令FM3-38。野战条令FM3-12是陆军网络空间和电子战行动倡导出版物。本野战条令将网络空间作战、电子战和网络空间电磁活动的基本原理与指导原则都包含在一本出版物中。它全面阐述了他们如何支持并达成行动,以及如何支持各级部队的使命任务和职能。本野战条令为下属陆军技术出版物奠定了基础。

网络空间和电子战行动将已经制定的联合和陆军流程纳入作战行动之中,比如情报流程、目标确定流程和军事决策流程(MDMP)。本野战条令阐释了陆军网络空间与电子战行动的基本想法。内容包括参谋职责、对军事决策流程的贡献、网络空间和电磁频谱中的目标工作、网络空间中对情报和作战环境准备(OPE)的依赖性。

本野战条令阐述了网络空间作战、任务、行动、电子战、电磁频谱以及相互间与所有陆军行动之间的关系。这种阐述还包括网络空间电磁活动,为军及以下规模的作战部队计划、整合和同步电磁活动提供遵循。

电磁频谱示意图

第一章提供了对网络空间、网络空间作战、任务、行动和效果的理解,阐述了网络空间和态势理解、态势感知、威胁、风险、脆弱性及其与信息和作战环境的关系,阐述了网络空间的层次与特点,确认了适用于网络空间和网络空间作战的法律授权,论述了与网络空间和电子战行动有关的电子战基本信息和频谱管理职能。

第二章提供了有关使用网络空间行动与任务的信息,而不是日常业务,指出信息作战、情报、太空作战和目标工作可能影响网络空间、电磁频谱、网络空间作战和电子战行动。指挥官和参谋人员对网络空间和电子战行动中的所有这些方面进行了整合和同步。

第三章阐述了陆军网络空间电磁活动和任务式指挥、指挥官的作用、具有作战职能的网络空间和电子战行动,论述了如何将网络空间和电子战行动的计划工作要素纳入作战流程。这包括计划、准备、实施、评估和目标确定。对作战环境的论述与军事决策流程结合在一起,随后概述了准备要求、实施战术以及如何评估网络空间和电子战行动。

图 网络空间电磁活动作战框架

附录A 论述了网络空间作战与各种联合行动伙伴。

附录B 强调了网络空间作战信息在作战命令和附件C之附录12中的位置。本附录包括一个附件C之附录12的例子,描述了本附录和各部分所包含的信息类型。

附录C 包含了在军、军以下、军以上级别部队处理网络空间作战行动申请的程序,以及网络作战行动申请表(CERF)的字段和信息。网络作战行动申请表的空白副本和字段解释都是该程序的组成部分。

附录D包括了电子攻击申请表(EARF)的字段和信息。电子攻击申请表的空白副本和带有字段解释的五行式简令都是该程序的组成部分。

《网络空间与电子战行动》目录

序言

导言

第一章 网络空间与电子战行动基本原理

第一节 网络空间和电磁频谱概述

一、网络空间域

二、作战行动与网络空间域

三、网络空间任务与行动

第二节 了解网络空间与环境

一、网络空间和电磁频谱

二、网络空间和信息环境

三、网络空间层次

四、网络空间的特点

五、作为作战环境组成部分的网络空间

六、网络空间中的风险

七、授权

第三节 电子战行动

一、电磁频谱行动

二、电子战

三、运用注意事项

四、频谱管理

第二章与 网络空间和电磁频谱的关系

一、相互依存

二、信息作战

三、情报

四、太空作战

五、目标确定

第三章 作战中的网络空间电磁活动

一、基本原理

二、注意事项

三、指挥官的作用

四、赋能资源

五、计划工作与网络空间电磁活动

六、网络效果申请表与目标确定活动

附录A 与统一行动伙伴的整合

附录B 作战命令中的网络空间

附录C 网络效果申请表

附录D 电子攻击申请表

感谢编译/述评:沈松

文章来源:知远战略与防务研究所

转载请注明出处

电科防务研究

Original Source:  http://cpc.people.com.cn/

Chinese Military Informationization Trends – Cyber Integrated Battlefield // 中國軍事信息化趨勢 – 網絡綜合戰場

Chinese Military Informationization Trends – Cyber Integrated Battlefield // 中國軍事信息化趨勢 – 網絡綜合戰場

Source: PLA Daily

The army has given birth to the military and other military services. With the advent of the information age, the integration of battlefields and combat operations has made the integration of services a new trend and destination for the development of military construction.

Service integration: the general trend of informationized army construction

■Wang Xueping

The development of things often presents a spiral rising path, following the law of negation of negation. The development of human military activities, especially military construction, is also in line with this law. Before the information age, the army of the army was from one to many. The army had given birth to the sea and air. With the advent of the information age, the rapid development of technology has made the integration of military services a trend and a destination for the development of new military construction.

The future battlefield does not distinguish between land, sea and air

Under the condition of mechanization, the pattern of independent existence of land, sea, air and sky battlefields began to merge under the catalysis of the new military revolution. Multidimensional and multi-war occasions are the basic forms of the future battlefield.

The promotion of rapid development of science and technology. With the continuous development of science and technology and the improvement of mankind’s ability to control the battlefield, it is an inevitable trend that the battlefield will be dispersed from integration to integration. Science and technology are the driving force for the integration of battlefields and unlimited expansion into the air. The development of high-tech such as information technology, positioning and guidance technology has made the performance of weapons and equipment surpass the traditional land, sea and airspace boundaries. Global mobility, global arrival and global strike have become the targets of the development of the military of the world’s military power. The development of space situational awareness technology integrates surveillance, reconnaissance, intelligence, meteorology, command, control and communication, and integrates the battlefield information network to realize battlefield information sharing. Joint operations and precision strikes become the basic style of future warfare. The rapid development of space technology has made the surface information and the information of the global environment unobstructed. The expansion of the battlefield into space has condensed the traditional land, sea and air battlefields into one, becoming a stepping stone and pedal for the vast innocent space battlefield.

The inevitable evolution of the form of war. With the in-depth development of the new military revolution, the intensity of the war to informationization will further increase. Informatized warfare is not only a “speed war” but also a “precise war” and an “integrated war.” The acceleration of the war integration process is first manifested in the integration of land, sea and airspace, and the integration of the scope of the battlefield as the war develops. This is the basic condition for information warfare. The speed of war and the improvement of precision strike capability require that the military must have global maneuver, global combat and precision strike capability that transcends land, sea and air, cross-border, trans-ocean, and vacant, and battlefield integration is the basic guarantee. The war science and technology contest has intensified, and the requirements for battlefield resource sharing have become more obvious. Military personnel have broken through the geographical and military barriers and broke the boundary between land, sea and airspace. It is an important weight to win the war.

The requirements for quick fixes in combat objectives. Speed ​​and precision are the main thrust of future wars. Eliminating battlefield barriers, integrating land, sea, air, and battlefields is the way to reach a speedy battle. The quickness and determination of the purpose of informatized warfare has promoted the integration of force preparation, equipment and operations. The integration of force preparation, equipment and operations has also promoted the arrival of battlefield integration. The military system is integrated into the arms and services. The scope of action has surpassed the narrow space of a single service. The ability to operate in a wide area and in a large space makes it difficult to divide the battlefield into a land battlefield, a sea battlefield, and an air battlefield. Weapons and equipment combines the performance of land, sea and air weapons. Its combat function surpasses the land, sea and airspace range, providing material conditions and support for battlefield integration. The strategic battle tactical action is integrated into one, the joint operations are divided into groups, the small squad completes the large task, and the informatized war characteristics of the tactical action strategy purpose will inevitably catalyze the dispersed battlefield toward one.

Signs of military integration appear quietly

While the development of science and technology is promoting the rapid birth of new arms, the cohesiveness of war integration is also affecting the integration of military construction. Under the conditions of informationization, the trend of integration of arms and services is becoming more and more obvious, and there is a tendency to accelerate development.

The theory of integration theory is repeated. The fusion of theory is a prelude to the integration of the military, and it is the magic weapon and sword to win the information war. Under the impact of the new military revolution, theoretical innovations have surpassed the waves, especially the integration of theoretical innovations aimed at joint operations. In order to adapt to the new changes in the form of war and the international pattern, in the 2010 “four-year defense assessment report” of the United States, the theory of joint operations of “sea and air warfare” was clearly put forward. In order to adapt to the requirements of the network-centric warfare, the French military integration theory innovation is at the forefront. The Army proposed the air-to-ground combat bubble theory, and the Navy proposed the theory of joint action from sea to land. The Indian Army has referenced and learned from the US “air-ground integration” and “quick-decisive” operational theories, and put forward the “cold-start” operational theory. The core is to strengthen the cooperation between the army and the sea and air force in order to seek the initiative of the operation and strive for the shortest time. The purpose of the battle is achieved within.

Integrated equipment surfaced. The rapid development of science and technology has continuously enhanced the comprehensive functions of weapons and equipment, and integrated equipment integrating land, sea, air and sky has become a material support and an important driving force for the development of military services. In order to win the initiative of integrated joint operations, the world’s military powers have accelerated the research and development of integrated equipment. The US military “Independence” stealth warship, which was once popular, is a very typical new integrated equipment. The ship integrates anti-submarine, mine-clearing, surveillance, reconnaissance and force deployment functions. It can carry three helicopters, some special forces and armored vehicles, and integrates the “ground and air” equipment. The ship-borne gun can carry out three-dimensional attacks on missiles launched from air, land and underwater targets, which greatly enhances the integrated combat capability of the equipment.

The integrated forces first appeared. The future informationized warfare is an integrated joint warfare operation carried out in multi-dimensional space such as land, sea, air, sky, and information. It is required that the participating troops must be an integrated military system. To meet this requirement, the army of the world’s powerful countries has intensified the construction of integrated forces. Joint expeditionary forces such as the US military include the Army Division, the Naval Aircraft Carrier Combat Group, the Marine Corps Division (sub-) and the Air Force Fighter Wing. The Russian military formed a mobile unit that spanned three services and one independent unit, including the Army’s Mobility Division, tank division, special brigade, rocket brigade, air force fighter, attack aircraft, bomber regiment, naval marine battalion and airborne troops. Airborne division. The rapid reaction force formed by France consists of different types of divisions of five arms. In accordance with operational needs, Germany has directly organized the Defence Forces into three units: the Intervention Force, the Stabilization Force and the Support Force. It can be seen that the integrated forces of multiple arms and services have become the direction of army construction and development in the information age.

Looking into the future, planning the army of today

The integration of the services and the ultimate integration are the inherent requirements of the information war and the basic law of the army’s construction and development. This law does not shift from people’s will. In order to seek the initiative of army building, we should follow this trend and make forward-looking decisions in promoting the integration of the military.

In-depth exploration of the theory of military integration. Theory is the forerunner of action, and it is the reflection on the top of the mountain. Aiming at the trend of the times, accumulating strength and finding countermeasures through theoretical research is the experience and practice of world-class military construction and development. The first is to strengthen the theoretical exploration of integrated construction. We should study the issue of integrated military construction as soon as possible, explore the construction goals, standards, paths, methods, and methods of the integrated military, and build bridges and paved roads for the military integration. The second is to strengthen the exploration of integrated operational theory. The development trend of military integration will inevitably bring about new changes in combat theory. It is necessary to strengthen the study of the characteristics of the integrated military operations, strengthen the study of integrated military operations and command methods, strengthen the study of the basic military tactics of the integrated military, and make forward-looking theories a traction in the development of military construction. The third is to strengthen the theoretical exploration of new talent training. To train new talents that meet the needs of the development of integrated military construction needs to be prepared in theory. The institutional structure, teaching content and teaching methods of colleges and universities need to focus on the law of integrated military construction and development, theoretically research, clear, and even through pilot exploration, so that the training of college personnel can adapt to the general trend of military integration development as soon as possible. For the development of integrated military construction, it is necessary to make a good talent reserve.

Accelerate the development of integrated equipment for the military. Integrated equipment is the material basis for the integration of services. In line with the general trend of the development of integrated military construction, our military should speed up the research and development of military integrated weapons and equipment. The first is the “collection” type of equipment. For example, the aircraft carrier-style “collection” type of equipment, with the hull as the basic platform, fuses fighters, artillery, anti-aircraft guns, missiles, and chariots into one, so that the equipment has the ability to multi-domain and multi-air combat. Our military should develop such “collection” type equipment based on land or sea or air, and promote the development of weapons and equipment to the integration of various arms and services. The second is the “all-round” type of equipment. In the future, the equipment must be able to run on the ground, fly in the air, swim in the water, and operate at high speed on the water, underwater, on land, and in the air, and the “human outfit” is integrated. The combatants follow the operational needs. Become a super equipment that “takes the sea and catches the moon, and picks up the moon.”

Explore the construction of a military united army. Comply with the general trend of the integration and development of the informatized military, actively promote the exploration of the construction of the military-integrated forces, and explore ways to accumulate experience for the development of military integration. Under the current circumstances, it is mainly necessary to build a large article on the integration of hybrid force preparation and create conditions for the integration of the military system. The establishment of a multi-service hybrid pilot unit will be rolled forward in actual combat training. Take the Army as an example, it is to build a hybrid force that integrates rifle, tan, gun, and land. For example, the integrated ground detachment consisting of armored forces, artillery, machine infantry, missile corps, attack and transport helicopter detachments, which was formed by the US Army, foreshadowed the development trend of integrated force formation that broke the arms and even the service line. With the accumulation of experience, the maturity of the conditions, and the improvement of the level of science and technology, the scope of the composition of the force has gradually expanded, and eventually an integrated experimental unit with complete strengths of the arms and services has been established.

Original Mandarin Chinese:

陸軍曾孕育了海、空等軍種。信息時代的到來,戰場、作戰行動的一體化,使得軍種融合成為新型軍隊建設發展的走向與歸宿——

軍種融合:信息化軍隊建設大趨勢

■王雪平

事物的發展往往呈現著螺旋式上昇道路,遵循著否定之否定的規律。人類軍事活動發展特別是軍隊建設也暗合著這種規律要求。在信息時代以前,軍隊的軍種是從一到多,陸軍曾孕育了海、空等軍種。而信息時代的到來,技術的迅猛發展使得軍種融合成為新型軍隊建設發展的走向與歸宿。

未來戰場不分陸海空天

機械化條件下,陸、海、空、天戰場獨立存在的格局,在新軍事革命的催化下開始走向融合,多維立體、多戰場合一是未來戰場的基本形態。

科技快速發展的推動。隨著科技的不斷發展和人類對戰場控制能力的提高,戰場由分散走向融合是必然趨勢。而科學技術則是戰場融合一體,並向空天無限擴展的推動力。信息技術、定位與製導技術等高新技術的發展,使武器裝備性能超越了傳統的陸、海、空域界線,全球機動、全球到達、全球打擊成為世界軍事強國軍隊發展的目標。空間態勢感知技術的發展,使監視、偵察、情報、氣象、指揮、控制和通信等融合一體,一體化戰場信息網絡,實現了戰場信息共享,聯合作戰、精確打擊成為未來戰爭的基本樣式。太空技術的快速發展,使地表信息和地球環境信息盡收眼底,戰場向太空的拓展,使傳統的陸海空戰場濃縮為一體,成為廣闊無垠太空戰場的墊腳石與踏板。

戰爭形態演變的必然。隨著新軍事革命的深入發展,戰爭向信息化演變的力度將進一步加大。信息化戰爭,既是“速度戰爭”,又是“精確戰爭”,更是“一體化戰爭”。戰爭一體化進程的加快,首先表現為陸域、海域、空域的融合,以及隨著戰爭發展而不斷拓展的戰場空間範圍的一體化,這是進行信息化戰爭的基本條件。戰爭速度與精準打擊能力的提升,要求軍隊必須具有超越陸海空界線,跨境、跨海、騰空的全球機動、全球作戰和精確打擊能力,而戰場一體化則是基本保障。戰爭科技較量加劇,戰場資源共享的要求更加明顯,軍事人才更衝破了地域、軍種壁壘,打破陸域、海域、空域戰場界線,是贏得戰爭的重要砝碼。

作戰目的速決的要求。速度與精確是未來戰爭的主旨。而消除戰場壁壘,融陸、海、空、天戰場為一體,則是達成戰爭速決的通道。信息化戰爭作戰目的速決性,推動了部隊編制、裝備、行動的融合。而部隊編制、裝備、行動的融合,又促進了戰場一體化的到來。部隊體制編制諸軍兵種融於一體,行動範圍已超越了單一軍種的狹小空間,廣地域、大空間行動的能力,使戰場很難再分為陸戰場、海戰場和空戰場。武器裝備集陸海空天兵器性能於一身,其作戰功能超越了陸域、海域、空域範圍,為戰場一體化提供了物質條件和支撐。戰略戰役戰術行動融於一體,聯合作戰分隊化,小分隊完成大任務,戰術行動戰略目的的信息化戰爭特性,必然催化分散的戰場走向一體。

軍種融合跡象悄然出現

科技發展在推動新軍兵種快速誕生的同時,戰爭一體化的內聚力也在牽動軍隊建設走向融合。信息化條件下,軍兵種一體化的趨勢日漸明顯,大有加速發展之勢。

一體化理論見解迭出。理論融合是軍種融合的前奏,更是打贏信息化戰爭的法寶與利劍。在新軍事革命大潮衝擊下,理論創新一浪高過一浪,特別是瞄準聯合作戰需要的一體化理論創新更是見解迭出。為適應戰爭形態和國際格局的新變化,2010年度美國《四年防務評估報告》中,明確提出了“海空一體戰”聯合作戰理論。為適應網絡中心戰的要求,法國軍隊一體化理論創新更是走在了前列,陸軍提出了空地作戰氣泡理論,海軍提出了由海向陸聯合行動理論。印度陸軍參考和借鑒美軍“空地一體”和“快速決定性”作戰理論,提出了“冷啟動”作戰理論,核心是強化陸軍與海、空軍的配合作戰,以謀求作戰的主動性,爭取在最短時間內達成作戰目的。

一體化裝備浮出水面。科技的快速發展,使武器裝備的綜合功能不斷增強,融陸、海、空、天於一身的一體化裝備不斷問世,成為軍兵種編制向一體化發展的物質支撐和重要推動力。為贏得一體化聯合作戰的主動權,世界軍事強國紛紛加快了一體化裝備的研發力度。曾經熱炒的美軍“獨立號”隱形戰艦,就是非常典型的新型一體化裝備。該艦融反潛、掃雷、監視、偵察和兵力部署綜合功能於一體,可載3架直升機、一些特種部隊和裝甲車,融“地空”裝備於一身。艦載炮可對空中、陸地和水下目標發射導彈進行立體攻擊,使裝備的一體化戰鬥力大大提升。

一體化部隊初見端倪。未來信息化戰爭,是在陸、海、空、天、信息等多維空間進行的一體化聯合作戰行動,要求參戰部隊必須是一體化的軍事系統。適應這一要求,世界強國軍隊紛紛加大了一體化部隊建設的力度。如美軍組建的聯合遠征部隊包括陸軍師、海軍航母戰鬥群、海軍陸戰隊部(分)隊和空軍戰鬥機聯隊。俄軍組建的機動部隊橫跨3個軍種和1個獨立兵種,包括陸軍的摩步師、坦克師、特種旅、火箭旅,空軍的戰鬥機、強擊機、轟炸機團,海軍的陸戰隊營和空降兵的空降師。法國組建的快速反應部隊由5個軍兵種的不同類型師組成。德國則根據作戰需求把國防軍直接編組為乾涉部隊、穩定部隊和支援部隊三種性質部隊。足見,多軍兵種一體化部隊已成為信息時代軍隊建設發展的方向。

放眼未來謀劃今日之軍

軍種融合,並最終走向一體,是信息化戰爭的內在要求,是軍隊建設發展的基本規律。這一規律不以人們的意志為轉移。謀求軍隊建設的主動性,我們就應該順應這一趨勢,在推進軍隊一體化建設上前瞻決策,未雨綢繆。

深入探索軍種一體理論。理論是行動的先導,更是“山頂”上的思考。瞄準時代走向,通過理論研究積蓄力量、尋找對策,是世界一流軍隊建設發展的經驗做法。一是加強一體化建設理論探索。應儘早研究一體化軍隊建設問題,探索一體化軍隊的建設目標、標準、路徑、方式、方法,為軍隊一體化建設從理論上搭好橋樑、鋪好路基。二是加強一體化作戰理論探索。軍隊一體化發展趨勢必然帶來作戰理論的全新變化。要加強一體化軍隊作戰運用的特點規律研究,加強一體化軍隊作戰行動和指揮方法研究,加強一體化軍隊基本戰法研究,讓前瞻性的理論成為軍隊建設發展的牽引。三是加強新型人才培養理論探索。培養適應一體化軍隊建設發展需要的新型人才,需要在理論上早做準備。院校的體制格局、教學內容、教學方法都需要著眼一體化軍隊建設發展規律,從理論上研究透,搞清楚,甚至通過試點探索,使院校人才培養儘早適應軍隊一體化發展的大趨勢,為一體化軍隊建設發展需要做好人才儲備。

加速軍種一體裝備研製。一體化裝備是軍種融合的物質基礎。順應一體化軍隊建設發展的大趨勢,我軍應加快軍種一體武器裝備的研發。一是“集合”型裝備。如航空母艦式的“集合”型裝備,其以艦體為基本平台,融戰機、火砲、高炮、導彈、戰車於一體,使裝備具有海陸空天多域多空作戰的能力。我軍應研發這種以陸或海或空為基本平台的“集合”型裝備,推進武器裝備建設向諸軍兵種融合一體方向發展。二是“全能”型裝備。今後的裝備要達到地上能跑、空中能飛、水中能遊,水上水下、陸上、空天都可高速機動作戰,而且“人裝”一體,戰鬥人員根據作戰需要隨進隨出,真正成為“下海捉鱉,上天摘月”的超能裝備。

進行軍種一體部隊建設探索。順應信息化軍隊一體化建設發展的大勢,積極推進軍種一體部隊建設探索,為軍隊一體化建設發展探索路子、積累經驗。當前情況下,主要應做好建設混合型部隊編制融合的大文章,為軍種體制編制走向一體創造條件。組建多兵種混合一體試點部隊,在實戰訓練中滾動推進。以陸軍為例,就是建設融步、坦、炮、陸航等兵種於一體的混合型部隊。如,美陸軍組建的由裝甲兵、砲兵、機步兵、導彈兵、攻擊與運輸直升機分隊組成的一體化地面分隊,預示了打破兵種甚至軍種界線的一體化部隊編制的發展趨勢。隨著經驗的積累、條件的成熟,以及科技水平的提高,部隊力量構成的範圍逐漸擴大,最終組建成軍兵種力量齊全的一體化試驗部隊。

Original referring url: http://www.mod.gov.cn/mobilization/2017-07/28/

Chinese Military Analysis of Korean Army Network Centric Warfare Capabilities // 中國軍事韓軍“網絡中心戰”建設現狀及未來發展趨勢

Chinese Military Analysis of Korean Army Network Centric Warfare Capabilities //

中國軍事韓軍“網絡中心戰”建設現狀及未來發展趨勢

  

“Network-centric warfare” is an important symbol in the evolution of mechanized warfare to informatized warfare. It is a high-level form of joint warfare in the information age, and a new type of warfare on the information-based battlefield of the “platform center warfare”. In recent years. Han Jun continues to deepen his understanding of network-centric warfare. Accelerated the pace of the army’s informatization construction. Han Jun’s network-centric warfare concept is embodied by the Korean military command and control system, the military information system, and the Korea-US Joint Operational Information System. This paper analyzes the status quo and future development trend of Han Jun’s “network center warfare” from the aspects of network center warfare, Korean military defense informationization, Hanjun C4I system construction, and Korea-US joint information system construction.

First, the composition of national defense information

  The field of national defense informationization in Korea consists of five areas: basic system, modeling and simulation (M&S: Modeling & Simulation), interoperability and standardization, information security, and application systems. The basic system field consists of communication networks, servers, computers, and basic software. The field of modeling and simulation refers to the training exercise simulation system and simulation analysis system for NC Cent (Network Centric Warfare), and the simulation based acquisition (SBA) for procurement management.

  Interoperability and standardization are prerequisites for the implementation of network-centric warfare theory. Through interoperability and standardization, information interconnection, interoperability, interoperability and real-time perception and sharing of battlefield information can be realized. Interoperability and standardization cover technical standardization, system construction standardization, and user interface standardization.

  Information network technology brings high benefits to military construction and operational command, and also brings high risks to military information security. At present, information network technology is widely used in various fields of the Korean Army, and information security is also facing various severe challenges. The main contents of information security include: in order to ensure the integrity, availability and confidentiality of information, establish a security system under the wireless local area network (LAN) and ALL-IP environment, establish a sound information security system, and establish the security of the Korean-American information system. Program and other aspects.

  The application system consists of a battlefield management system and a resource management system. The battlefield management system consists of a command and control system called the C4I system, a military information system that collects, processes, and transmits information, and a Korean-US joint operational information system. Han Jun’s command and control system consists of the Korean Joint Command and Control System (KJCCS: Korea Joint Command and Control System), the Ground Tactical Command Information System (ATCIS), and the Naval Tactical C4I System (KNCCS: Korea Naval Command Control System). ), Air Force Command and Control System (AFCCS), Joint Fire Operation System (JFOS-K: Joint Fire Operation System-Korea), Rear Area Tactical C4I System, Brigade Command System (B2CS: Battalion Battle Command System). The Korean military military information system consists of the Military Information Management System (MIMS). The Korea-US Joint Operations Information System consists of the Joint Operations C4I System – Joint Command and Control System (AKJCCS: Allied Korea Joint Command and Control System), Joint Military Information Distribution System (MIMS-C) and the US Army Global Joint Information Exchange System – Korea System (CENTRIXS-K), US Pacific Command Automated Data Processing System – PASS-K: Pacific Command Automated Data Processing Server Site-Korea.

  The resource management system is an automated information system for improving the utilization efficiency of national defense resources. It is divided into four major areas: planning finance, personnel mobilization, military needs facilities, and electronic administration. There are comprehensive financial information systems and results management systems in the planning and finance field; personnel information systems, integrated distance education systems, and mobilization information systems in the personnel mobilization field; military needs comprehensive information systems, facility information systems, transportation information systems, and ammunition information systems in the field of military needs. , defense terrain information system, medical information system; electronic administrative field has a comprehensive defense knowledge management system, business management system, record management system.

<Figure 1> Defense Information Application System.
<Figure 1> Defense Information Application System.

Second, the construction of the Korean Army C4I system

  Han Jun’s battlefield management system consists of five major systems: KJCCS, ATCIS, KNCCS, AFCCS, and MIMS. As of 2010, all these systems have been completed. Performance improvements were made to the ATCIS system and the AFCCS system in 2011, and performance improvements were made to the KJCCS system since 2012. In 2010, the system development of the ATCIS system in the rear area was completed, and the actual deployment was completed in June 2011. Since 2009, the research and development work of the B2CS system and the preliminary research work of the ATCIS system have been carried out. In 2011, B2CS system development and ATCIS system performance improvement research and development projects were comprehensively promoted. It is estimated that in 2015, system development and test evaluation will be completed, and in 2020, it will be deployed to military-level combat units.

  KJCCS’s performance improvement work is mainly to prepare for the establishment of the first group army and the third group army integrated/merged ground combat command. It is expected that after the performance improvement of KJCCS, the powerful new features will be greatly improved in terms of reliability, survivability and security.

  ATCIS in the rear area will establish an information sharing system between the Army’s 2nd Combat Command and each team. The ATCIS in the rear area will be able to effectively adapt to the operational tasks and types of operations undertaken by the 2nd Combat Command, and it is highly targeted and operable. In addition, ATCIS in the rear area will be able to interoperate with KJCCS, MIMS and other systems to provide an integrated information environment for the vast rear battlefield management, ensuring high information sharing.

  The B2CS system is the command and control system used by the Army Brigade to the squad combat units. The B2CS system will use situational awareness and information acquisition as the forerunner to realize a variety of data information sharing and visual interaction. It is a system integrating command, control, communication and intelligence, which can effectively guarantee the command and control (C2OTM) in action.

  At present, the Korean Army’s brigade-level units are only equipped with limited C4I terminals and Position Reporting Equipment (PRE), and the commanders below the squad level are not equipped with relevant equipment. After the actual deployment of the B2CS system, it will realize the visual sharing of the battlefield information from the military to the squad through interconnection with ATCIS, and provide the basis for the close cooperation and real-time coordinated action of various combat forces and the integration of command and control.

  The ATCIS system performance improvement project is to build a network platform for the existing system to achieve interaction between the ATCIS system and 50 weapon systems. In addition, as a supplement and extension of the wired network, a command center wireless local area network (LAN) will be constructed for the ATCIS system to enhance the flexibility of the operational network.

  In response to the transfer of wartime operational command, Han Jun is promoting the research and development of AKJCCS system, MIMS-C system and JFOS-K system. It is expected that the AKJCCS system will interact with the CENTRIXS-K system, the CENTRIXS-K system will interact with the CENTRIXS-K system, and the JFOS-K system will interact with the US military’s firepower system.

  In the course of using the battlefield information management system of Han Jun, many problems were discovered. At present, system improvement work for KJCCS, ATCIS, and AFCCS is underway, but KNCCS and MIMS have made little progress in this regard. The system performance upgrade work mainly focuses on interoperability with other systems, improving the authentication system, adding some application functions, and diversifying system expansion.

Judging from the current situation, the construction of the Korean Army C4I system mainly has the following problems:

  First, in the battlefield management information system construction needs assessment stage, the proposed conceptual operational performance (ROC, Required Operational Capability) is directly reflected in the concept research phase, and then through the entire process of system development. In this way, the ROC is only based on the judgment of the R&D personnel, and is out of line with the level, type, and actual situation of the troops. As a result, the battlefield management system is singular and cannot provide the required information to the combat units in a targeted manner, resulting in users usually using only some of the functions.

  In order to solve these problems, the ROC should first be completed with the participation of developers and users. This will fully reflect the user’s needs and make the system more practical for practical use. The user interface and usage functions should also be personalized. According to the different positions and responsibilities of the troops, the corresponding functions should be set up, and a number of nodes with different functions, which can be randomly combined, aggregated in efficiency, and can adapt and act in one body, Provide a strong foundation for the combat system.

  Second, in the specific promotion stage of battlefield management information system construction, from the communication network to the application system construction, the old road of “chimney development” has been taken, resulting in “chimneys” and mutual disjoint, which greatly restricted the army. The improvement of comprehensive combat capability. Although the Korean Ministry of Defense issued a number of regulations and guidelines, it is required to follow the relevant technical standards from system development to system construction, but the actual situation is that these regulations have not been specifically implemented. As a result, the information of the Korean military battlefield management system is not well connected. The three military C4I systems—ATCIS, KNCCS, AFCCS, and military information system MIMS can only be indirectly linked through KJCCS.

  In the 2009 and 2010 “Key Decisions/鹞鹰” joint exercises, there was a problem with the Common Operational Picture (COP), which failed to accurately and real-time update and improve the comprehensive sensory intelligence information of the battlefield. The results of the 2011 review by the Institute of the Ombudsman confirmed this. The specific errors are the position of the troops, the number of troops, the size of the troops, and the major equipment intelligence. The main reasons are serious problems in coding management, system interaction, database (DB) management, and information input.

  In order to solve these problems, it is necessary to introduce not only a system based on a command and control personal computer (C2PC) that the US military is using, but also to standardize COP data. The common use in the Common Commitment Map (COP) does not mean that all users in the information system are watching the same picture. Universal means that all users share the same data source. That is, the Joint Chiefs of Staff shared the true standardized common operational map data with the three armed forces. Each user saw different presentations provided by the same data source that he or she needed.

  Third, the core of the battlefield management information system–the application system has the necessary functions required for the troops to perform tasks, but at present it only realizes the automation of the business and functions, and can not achieve the organic integration of command and control at all levels. In addition, the functional development of the application system lacks top-level design and system planning, lacks communication and collaboration, and objectively causes low level of interconnection between systems, which cannot meet the actual needs of users. From the current point of view, it is difficult to provide resource optimization configuration plans and strong decision support to commanders and operational staff.

  The information system is only automated, meaning that there is no business process analysis (BPA) in the system development process, and no reasonable and scientific business processes are formed. It can be said that one of the most important aspects of system development is Business Process Analysis (BPA). In the specific development, the current business process status analysis (As-Is) should be performed first. Once problems are identified or areas that need improvement, they are redesigned to the type of process that the user expects (to-Be) or optimizes. In this way, business process reengineering (BPR) based on the analysis of existing business processes can generate new and more reasonable business processes.

  System function development does not only include software development. Research and development personnel of information systems generally believe that software development is the entire content of system function development, and data is only the content that the system transmits during the operation. In fact, the purpose of the software is to process the data, not independent. That is to say, in the process of business process, the system and data should be promoted in parallel; in the process of system development, the data should be processed into the form required by the user. This means that business process modeling (BPM: Business Process Modeling) and data modeling (DM: Data Modeling), business standardization and data standardization should be carried out simultaneously.

  Fourth, for the weapon system, if the improvement needs are found after the development is completed, the performance improvement work will be carried out after all the problems are integrated, and there will not be too many problems. However, for the information system, even if the function is very perfect, if a specific user proposes a new functional requirement, it cannot be updated in time and improved in time, which will directly affect the actual use of the system. Without the flexibility and reliability to meet business and performance needs, information systems can hardly play a role in improving operational effectiveness.

  It is very important to establish a sound information system optimization and maintenance system, and timely reflect business requirements/performance requirements in the operation of the system. This is simpler and more effective than directly advancing performance improvement projects. Therefore, it is necessary to designate the system R&D department to be responsible for the optimization and upgrading of the system throughout its life cycle. To this end, it is also necessary to invest the corresponding budget.

III. Construction of the joint information system between Korea and the United States

  The CENTRIXS-K system and the PASS-K system were designed and used by the US military to share information with the Korean Army C4I system and military information systems. It is particularly worth mentioning that the CENTRIXS-K system is the joint operational command and control system of Korea and the United States under the leadership of the Korea-US Joint Command.

  After the transfer of wartime operational command, the command of wartime operations will be dominated by the current joint command of South Korea and the United States, becoming a new model dominated by the Korean army and supported by the US military. This means that the command organization has changed from the current single system of the Korea-US Joint Command to the two command systems of the Korean Army and the US Army in Korea. At present, both Korea and the United States are considering the disintegration of the Korea-US Joint Command, the adaptation of the Korea-Jin United Association, and the establishment of the US Korean Command (US KORCOM). At that time, the chairman of the Korean Federation of Senate will be responsible for commanding the Korean army, and the US South Korean Command (Commander of the US Army in South Korea) will be responsible for commanding the troops under the jurisdiction of the US military. In addition, South Korea and the United States will also establish new cooperation institutions, in which the Alliance Military Cooperation Headquarters will assist the Military Commission (MC) to carry out strategic cooperation; the theater-level cooperation agencies will be responsible for specific cooperation matters between the Korean Federation of Senate and the US Korean Command; The Combatant Command-level cooperation agency will be responsible for specific cooperation matters between the Korean-American combat command-level forces.

  In the face of this change in organizational structure, it is necessary for the ROK to strengthen the system construction required by Korea’s leading command and control and the Korea-US cooperation mechanism. To this end, Hanshen is developing the AKJCCS system and the MIMS-C system. It is expected that the AKJCCS system and the MIMS-C system will be used as a theater-level information circulation, joint operational command and control, joint operational function support, and cooperation means of military cooperation agencies between the two countries. As a result, changes will be brought to the command and control systems and support systems in the Korea-US Joint Information System. That is, the Korean Army through the KJCCS system, the US military through the CENTRIXS-K system to command and control their respective combat forces; the Korean Army’s Joint Chiefs of Staff and the Korean Army’s various combat command through the KJCCS system using the main functions of the AKJCCS system, the United States and South Korea Command And the US military combat command uses the main functions of the AKJCCS system through the CENTRIXS-K system.

  In 2015, after the transfer of wartime operational command, the Korean Army’s battlefield management information system and the US military’s C4I system will achieve a fairly level of interconnection, interoperability, and interoperability. Han Jun’s battlefield management will be implemented through the KJCCS system and the three military C4I systems – ATCIS system, KNCCS system, AFCCS system, and the joint operation of Korea and the United States will be implemented through the CENTRIXS-K system and the AKJCCS system. The existing system interaction mechanism will be maintained between the Korean-American Air Force/Naval Combat Force, and the non-interoperability between the Korean-US Army/Marine Corps combat units will continue.

  The MIMS-C system is currently in the research and development stage, and the MIMS system is only used as the Korean military’s own military information system.

  From the perspective of joint operations, it is important that the AKJCCS system function as much as possible in the interoperability with CENTRIXS-K. The CENTRIXS-K system operation data is provided by various underlying systems, but the AKJCCS system does not have such a lower system application support system, so some functions of the CENTRIXS-K system are difficult to run on the AKJCCS system. These functions include the Crisis Action Standard Operating Procedures (CASOP), the Integrated Decision Support Framework (IDSF), and the Commander’s Critical Information Requirement (CCIR), 5X8 Card. SIGEVENT: Significant Event, etc. It is expected that after the transfer of wartime operational command, the AKJCCS system will be able to obtain the information provided by the above functions from the CENTRIXS-K system through a network link.

  Joint Warning and Reporting Network, Joint Weather Impacts System, Theater Battle Management Core System, Theater Ballistic Missile Warning (TBMW) Wait. The CENTRIXS-K system can effectively interconnect, interoperate and interoperate with so many systems. Therefore, the functions of command and control, information sharing, cooperation and coordination, and business support are excellent, and the operation is very smooth without any problems or obstacles. However, Han Jun’s AKJCCS system can only obtain limited data from the KJCCS system, so it has great limitations in function. Therefore, it is also necessary for Han Jun to build the lower system of the AKJCCS system to ensure safe, efficient and stable operation of the AKJCCS system.

Fourth, the trend of the construction of the joint information system between Han Jun and Korea-US

  From the point of view of the Korean military’s individual operations, to improve the combat effectiveness of the battlefield management system, it must have the necessary performance required for the mission.

  First of all, it is necessary to realize the interaction of the Korean and American tactical C4I systems to ensure information sharing and collaboration between Korean and American tactical forces. That is to realize the Korean-American ground forces–Hanjun ATCIS system and the US Army ABCS system, the Korean-American naval–Korean army KNTDS system and the US military CENTRIXS-M system, the Korea-US Air Force–Hanjun AFCCS system and the US Air Force tactics C4I System (ACC-COIN), Korea-US Marine Corps–Hanjun ATCIS system interacts with the US Marine Corps system in real-time or near-real-time systems, and information sharing is very important.

  Secondly, the interactive mode of the current three-armed tactical system-ATICS system, KNCCS system, and AFCCS system centered on the KJCCS system should be changed. This mode has limited the improvement of combat effectiveness. For example, direct interconnection between the three military tactical systems will effectively improve the rapid response capability, rapid maneuverability and coordinated combat capability of the troops. In addition, it is also very important to resolve the transmission delay, data loss and data inconsistency between the three military tactical C4I systems.

  In addition, we should proactively complete the construction of basic communication networks such as top-level design, system integration, continuous promotion of TACT (Tactical Information Communication Network), satellite communication network, etc., and accelerate the establishment of a unified and complete information platform and integrated information network.

In summary, the development direction of the Korean Army C4I system can be summarized as the following four points:

  First, the operational performance requirements (ROC) of the C4I system should be completed with the participation of R&D personnel and users. The system user interface and usage functions should be personalized, providing a strong foundation for situational awareness, command and control, and decision support. support.

  Second, the standardization of data between the Joint Chiefs of Staff and the three armed forces, sharing a unified data source (data source) and data standardization common operational map.

  Third, the application system of the C4I system realizes interconnection, interworking, interoperation, data retrieval and troubleshooting can all be performed in the same screen. In addition, in order to form a reasonable and scientific business process, business process analysis (BPA), business process modeling (BPM) and data modeling (DM: Data Modeling) are required.

  Fourth, timely reflect the user’s business needs, performance requirements and improvement requirements, and establish and improve the information system’s optimal maintenance system.

 In addition, the development direction of the Korean-American C4I system can be summarized as the following two points:

  First, learn from the CENTRIXS-K system and build the lower system of the AKJCCS system to ensure efficient and stable operation of the system.

  Second, realize the interaction of the Korean and American tactical C4I systems to ensure information sharing and collaboration between Korean and American tactical forces. Zhiyuan / Everest

Original Mandarin Chinese:

“網絡中心戰”是機械化戰爭形態向信息化戰爭形態演變過程中的一個重要標誌,是信息時代聯合作戰的高級形態,是相對“平台中心戰”的信息化戰場上的一種新型作戰模式。近年來。韓軍不斷深化對網絡中心戰的認識。加快了軍隊信息化建設的步伐。韓軍的網絡中心戰概念是通過韓軍指揮控制系統,軍事信息系統和韓美聯合作戰信息系統來體現的。本文以網絡中心戰為主線,從韓軍國防信息化組成,韓軍C4I系統建設情況,韓美聯合信息系統建設情況等方面分析了韓軍“網絡中心戰”建設現狀和未來發展趨勢。

一,國防信息化組成

韓國國防信息化領域由基礎體系,建模與仿真(M&S:Modeling&Simulation),互操作性與標準化,信息安全,應用系統等五大領域組成。基礎系統領域由通信網,服務器,計算機,基礎軟件等組成。建模與仿真領域指應對網絡中心戰(NCW:Network Centric Warfare)的訓練演習模擬系統和模擬分析系統,用於採辦管理工作的基於仿真的採辦(SBA:Simulation Based Acquisition)等。

互操作性及標準化是網絡中心戰理論得以實踐的前提條件。通過互操作性及標準化,可實現信息互聯,互通,互操作及作戰要素對戰場信息的實時感知與共享。互操作性及標準化的內容涵蓋技術標準化,系統建設標準化,用戶界面標準化等諸多方面。

信息網絡技術在給軍隊建設,作戰指揮帶來高效益的同時,也給軍隊信息安全帶來高風險。目前,信息網絡技術在韓軍各個領域得到廣泛應用,同時信息安全也面臨各種嚴峻挑戰。信息安全的主要內容包括:為了確保信息的完整性,可用性和保密性,制定無線局域網(LAN),ALL-IP環境下的安全制度,建立健全信息安全保障體系,確立韓美信息系統互聯互通安全方案等方面。

應用系統由戰場管理系統和資源管理系統組成。戰場管理系統由被稱為C4I系統的指揮控制系統,收集,處理及傳遞信息的軍事信息系統,韓美聯合作戰信息系統構成。韓軍的指揮控制系統由韓軍聯合指揮控制系統(KJCCS:韓國聯合指揮控制系統),地面戰術C4I系統(ATCIS:陸軍戰術指揮信息系統),海軍戰術C4I系統(KNCCS:韓國海軍指揮控制系統),空軍戰術C4I系統(AFCCS:空軍指揮控制系統),戰區聯合火力運用系統(JFOS-K:聯合火力作戰系統 – 韓國),後方地區戰術C4I系統,大隊級以下戰鬥指揮系統(B2CS:營戰指揮系統)組成。韓軍軍事信息系統由軍事信息綜合處理系統(MIMS:Military Intelligence Management System)組成。韓美聯合作戰信息系統由聯合作戰C4I系統 – 聯合指揮控制系統(AKJCCS:盟軍韓國聯合指揮控制系統),聯合軍事信息流通系統(MIMS-C)和美軍全球聯合情報交換系統 – 韓國分系統(CENTRIXS-K),美國太平洋司令部自動數據處理系統 – 韓國分系統(PASS-K:Pacific Command Automated Data Processing Server Site – 韓國)組成。

資源管理系統是用於提高國防資源利用效率的自動化信息系統,具體分企劃財政,人事動員,軍需設施,電子行政四大領域企劃財政領域有綜合財政信息系統,成果管理系統;人事動員領域有人事信息系統,綜合遠程教育系統,動員信息系統;軍需設施領域有軍需綜合信息系統,設施信息系統,運輸信息系統,彈藥信息系統,國防地形信息系統,醫療信息系統;電子行政領域有國防綜合知識管理系統,業務管理系統,記錄管理系統。

<圖1>國防信息化應用系統。
<圖1>國防信息化應用系統。
二,韓軍C4I系統建設情況
韓軍的戰場管理系統由KJCCS,ATCIS,KNCCS,AFCCS,MIMS等五大系統組成。截止到2010年為止,這些系統已全部建設完畢。2011年對ATCIS系統和AFCCS系統進行了性能改進,2012年起對KJCCS系統進行性能2010改進。年完成後方地區ATCIS系統的體系研發工作,2011年6月完成了實戰部署。2009年年起,進行了B2CS系統的研發工作和ATCIS系統的先期研究工作。2011年, B2CS系統研發和ATCIS系統性能改進研發項目全面推進。預計2015年,將完成體系開發和測試評估工作2020年實戰部署至軍級作戰單位。

KJCCS的性能改進工作主要是為第一集團軍,第三集團軍整合/合併後的地面作戰司令部的設立做準備。預計KJCCS性能改進後,在具備強大的全新功能的同時,在可靠性,生存性,安全性方面會有大幅提升。

後方地區ATCIS將在陸軍第2作戰司令部和各大隊間建立起信息共享系統。後方地區ATCIS將能夠有效適應第2作戰司令部擔負的作戰任務,作戰類型,具有很強的針對性和可操作另外,後方地區ATCIS還將能夠與KJCCS,MIMS等系統實現互聯互通互操作,為廣闊的後方地區戰場管理提供一體化信息環境,保證信息的高度共享。

B2CS系統為陸軍大隊至小隊作戰部隊使用的指揮控制系統.B2CS系統將以態勢感知,信息獲取為先導,實現多種數據信息共享和可視化交互,是集指揮,控制,通信,情報為一體的系統,可有效保障行動中的指揮和控制(C2OTM)。

目前,韓陸軍大隊級部隊僅配備有限的C4I終端和位置報告設備(PRE:Position Reporting Equipment),小隊級以下的指揮官根本沒有配備相關裝備.B2CS系統的實戰部署後,將通過與ATCIS的互聯互通,實現從軍到小隊的戰場信息可視化共享,為實現各種作戰力量的密切配合和實時協調行動以及指揮控制一體化提供基礎。

ATCIS系統性能改進項目是為現有系統搭建網絡平台,實現ATCIS系統與50個武器系統互動。另外,作為有線網絡的補充和延伸,還將為ATCIS系統構築指揮所無線局域網(LAN),以加強作戰網絡的靈活性。

為了應對戰時作戰指揮權移交,韓軍正在推進AKJCCS系統,MIMS-C系統,JFOS-K系統的研發工作。預計,AKJCCS系統將與CENTRIXS-K系統實現互動,CENTRIXS-K系統將於CENTRIXS- ķ系統實現互動,JFOS-K系統將與美軍的火力系統實現互動。

韓軍的戰場信息管理系統在使用過程中,發現了很多問題。目前,對KJCCS,ATCIS,AFCCS的系統改進工作正在進行,但KNCCS和MIMS卻在這個方面幾乎沒有任何進展。系統性能升級工作主要圍繞與其他系統互聯互通,完善認證系統,增加一些應用功能,多元化系統擴張等方面進行。

從目前的情況看,韓軍C4I系統建設工作主要存在如下問題:

第一,在戰場管理信息系統建設需求評估階段,提出的概念性的作戰性能要求(ROC,Required Operational Capability)被直接反映到概念研究階段,進而貫穿系統研發的整個過程。這樣,ROC只是根據研發人員的判斷做出的,與部隊的水平,類型,實際情況脫節,結合的不夠緊密。其結果戰場管理系統是單一化的,不能向作戰單位有針對性地提供所需情報,導致用戶通常只使用其中的部分功能。

為了解決這些問題,首先ROC應在研發人員和用戶的共同參與下完成。這樣就能充分反映用戶的需求,使系統更便於實際操作使用。用戶界面,使用功能也應該進行個性化配置,根據部隊不同的崗位,職責設定相應的功能,建設一批具有不同功能,既可隨機組合,效能聚合,又能自主適應,一體行動的節點,為作戰體系提供強大的基礎支撐。

第二,在戰場管理信息系統建設的具體推進階段,從通信網到應用系統建設都走了“煙囪式發展”的老路,導致彼此之間“煙囪林立”,互不相通,極大地限制了軍隊綜合作戰能力的提升。雖然韓國防部下發了一些規定和指針,要求從體系開發到系統建設都要遵循相關的技術標準,但是實際情況是這些規定並未能得到具體落實。其結果韓軍戰場管理系統信息間互聯互通不暢,三軍C4I系統-ATCIS,KNCCS,AFCCS和軍事信息系統MIMS只能通過KJCCS進行間接聯動。

在2009年和2010年的“關鍵決心/鷂鷹”聯合演習中通用作戰圖(COP:Common Operational Picture)出現問題,未能準確,實時地更新和完善戰場綜合感知情報信息。2011年監察院的審查結果也證實了這一內容。具體的錯誤內容為部隊位置,部隊數量,兵力規模,主要裝備情報等,其原因主要是編碼管理,系統互動,數據庫(DB)管理,信息輸入等方面出現嚴重漏洞。

為了解決這些問題,不但要引進類似美軍正在使用的指揮與控制個人計算機(C2PC)等為基礎的系統,還要實現COP數據標準化。通用作戰圖(COP)中的通用並非意味著信息系統中的所有用戶都在觀看同一畫面,通用實際上是指所有用戶在共享同樣的數據來源(數據源)。即,參聯會與三軍部隊共享著真正的標準化通用作戰圖數據,每個用戶看到的是自己所需的同一數據來源提供的不同的展示畫面。

第三,戰場管理信息系統的核心 – 應用系統雖然具備部隊執行任務所需的必備功能,但是目前只是實現了業務及功能的自動化而已,並不能實現各級指揮與控制的有機融合另外。 ,應用系統的功能開發缺乏頂層設計和系統規劃,缺乏溝通與協作,客觀造成系統間互聯互通水平低,無法滿足用戶的實際需求。從目前來看,很難向指揮官及作戰參謀提供資源優化配置方案和強有力的決策支持。

信息系統只是實現了自動化,意味著在系統開發過程中沒有進行業務流程分析(BPA:業務流程分析),沒有形成合理,科學的業務流程。可以說,系統開發中,最為重要的環節之一是業務流程分析(BPA)。在進行具體開發時,首先應進行當前業務流程狀況分析(AS-IS)。一旦發現問題或需要改進的方面,就要重新設計成用戶期望的(待)或優化了的流程類型。這樣,在分析現有業務流程的基礎上進行業務流程重組(BPR),可以產生新的更為合理的業務流程。

系統功能開發並非只包括軟件開發這一項。信息系統的研發人員通常認為,軟件開發是系統功能開發的全部內容,數據只是系統在運行過程中傳遞的內容而已。而事實上,軟件的目的是為了處理數據,並不是獨立存在著也就是說,在業務流程過程中,系統與數據應並行推進;在系統開發過程中,數據應被處理成用戶所需的形態這意味著業務流程建模(BPM:Business Process Modeling)和數據建模(DM:Data Modeling),業務標準化和數據標準化應同時進行。

第四,對於武器系統而言,開發完畢後,若發現需要改進的地方時,綜合所有問題後再進行性能改進工作,也不會有太多的問題。但是對於信息系統而言,即便功能非常完善,若特定用戶提出新的功能需求時,不能及時更新,及時改進,那麼就會直接影響到系統的實際使用。如果不能靈活可靠地滿足業務需求和性能需求,那麼信息系統就很難在提高作戰效能方面發揮作用。

建立起完善的信息系統優化維護體系,在系統的運營過程中,及時反映業務需求/性能需求等方面非常重要。這比直接推進性能改進項目更為簡單有效。所以,有必要指定系統研發機關負責系統整個生命週期內的優化升級工作。為此,投入相應的預算也是非常必要的。

三,韓美聯合信息系統建設情況

CENTRIXS-K系統和PASS-K系統是美軍為了與韓軍C4I系統和軍事信息系統實現信息共享而設計和使用的。特別值得一提的是,CENTRIXS-K系統是目前韓美聯合司令部主導下的韓美聯合作戰指揮控制系統。

戰時作戰指揮權移交後,戰時作戰指揮權將由現在的韓美聯合司令部主導,變成韓軍主導,美軍支援的新模式。這意味著指揮機構由現在的韓美聯合司令部單一體制變成韓軍,駐韓美軍兩個指揮體制。目前,韓美雙方正考慮韓美聯合司令部解體,韓參聯會機構改編,設立美國韓國司令部(US KORCOM)的方案。屆時,韓參聯會主席將負責指揮韓國軍隊,美國韓國司令部(駐韓美軍司令)將負責指揮美軍所轄部隊。另外,韓美還將新設合作機構,其中同盟軍事合作本部將協助軍事委員會(MC)進行戰略層面的合作;戰區級合作機構將負責韓參聯會與美國韓國司令部間的具體合作事項;作戰司令部級合作機構將負責韓美作戰司令部級部隊間的具體合作事項。

面對這種組織結構變化,韓軍有必要加強韓國主導指揮控制及韓美合作機制所需的系統建設。為此,韓參聯正在開發AKJCCS系統和MIMS-C系統。預計,AKJCCS系統和MIMS -C系統將作為韓美兩國間戰區級信息流通,聯合作戰指揮控制,聯合作戰功能支援,軍事合作機構合作手段等來使用。其結果,就將會給韓美聯合信息系統中的指揮控制系統,支援系統帶來變化即,韓軍通過KJCCS系統,美軍通過CENTRIXS-K系統對各自的作戰力量進行指揮控制;韓軍的參聯會及韓軍各作戰司令部通過KJCCS系統使用AKJCCS系統的主要功能,美國韓國司令部及美軍各作戰司令部通過CENTRIXS-K系統使用AKJCCS系統主要功能。

2015年,戰時作戰指揮權移交後,韓軍的戰場管理信息系統和美軍的C4I系統將實現相當水平的互聯,互通,互操作韓軍的戰場管理將通過KJCCS系統及三軍C4I系統 – ATCIS系統,KNCCS系統,AFCCS系統來實施,韓美聯合作戰將通過CENTRIXS-K系統和AKJCCS系統來實施。韓美空軍/海軍作戰部隊間將保持現有系統互動機制,另外韓美陸軍/海軍陸戰隊作戰部隊間系統不互通的狀態將會繼續持續下去。

MIMS-C系統目前正處於研發階段,MIMS系統只作為韓軍自己的軍事信息系統來使用。

從聯合作戰的角度來看,AKJCCS系統在與CENTRIXS-K的互聯互通中,盡可能多地發揮作用非常重要.CENTRIXS-K系統運行數據都是由各種下層系統提供的,但是AKJCCS系統卻不具備這樣的下層系統應用支援體系,因此CENTRIXS-K系統的部分功能很難在AKJCCS系統上運行。這些功能主要有危機處置標準操作程序(CASOP:危機行動標準操作程序),綜合決策支持框架(IDSF) :綜合決策支持框架),指揮官重要信息需求(CCIR:指揮官的關鍵信息要求),5X8卡,主要狀況(SIGEVENT:重大事件)等。預計戰時作戰指揮權移交後,AKJCCS系統將能夠通過網絡鏈結的方式從CENTRIXS-K系統獲取上述功能所提供的信息。

CENTRIXS-K系統的下層系統由參聯的C4I-全球指揮控制系統(GCCS:全球指揮控制系統),美地面部隊戰術C4I系統 – 陸軍作戰指揮系統(ABCS:陸軍作戰指揮控制系統)的機動控制系統(MCS:機動控制系統),高級野戰砲兵戰術數據系統(AFATDS:AdvancedField Artillery Tactical Data System),防空和導彈防禦工作站(AMDWS:Air&Missile Defense Workstation),全信源分析系統(ASAS) ,美海軍戰術C4I系統(CENTRIXS-M),美空軍戰術C4I系統(ACC-COIN:空中部隊司令部 – 興趣網絡),防空系統(ADSI:防空系統集成商),全球廣播服務(GBS:Global廣播服務),聯合監視目標攻擊雷達系統(JSTARS:聯合監視和目標攻擊雷達系統),聯合報警與報告網絡(聯合警報和報告網絡),聯合氣象影響系統(聯合天氣影響系統),戰區作戰管理中心系統(Theatre Battle Management Core Sy ():戰區彈道導彈預警(TBMW:Theatre Ballistic Missile Warning)等.CENTRIXS-K系統能夠和如此多的系統實現有效互聯,互通,互操作,所以指揮控制,信息共享,合作協調,業務支援等功能十分優異,運行非常流暢,不存在任何問題和障礙。但是韓軍的AKJCCS系統只能從KJCCS系統獲取有限的資料,所以在功能上有很大的局限性。因此,韓軍也有必要建設AKJCCS系統的下層系統,以保證AKJCCS系統安全高效,穩定運行。

四,韓軍及韓美聯合信息系統建設趨勢

從韓軍單獨作戰的角度來看,提高戰場管理系統體系戰鬥力,必須具備任務所需的必要性能。

首先,需實現韓美戰術級C4I系統的互動,保證韓美戰術部隊間的信息共享與協作即實現韓美地面部隊間 – 韓軍ATCIS系統與美軍ABCS系統,韓美海軍間 – 韓軍KNTDS系統與美軍CENTRIXS-M系統,韓美空軍間 – 韓軍AFCCS系統與美空軍戰術C4I系統(ACC-COIN),韓美海軍陸戰隊間 – 韓軍ATCIS系統與美海軍陸戰隊系統實時或近實時系統互動,信息共享是非常重要的。

其次,應改變目前以KJCCS系統為中心的三軍戰術系統–ATICS系統,KNCCS系統,AFCCS系統的互動模式,這種模式已限制了作戰效能的提升。如三軍戰術系統間直接互聯互通,將能夠有效提高部隊快速反應能力,快速機動能力及協同作戰能力。此外,解決三軍戰術C4I系統間傳輸遲延,數據丟失,數據不一致現象也是非常重要的。

另外,還應積極主動地完成頂層設計,系統集成,持續推進戰術信息通信系統(TICN:戰術信息通信網絡),衛星通信網等基礎通信網絡建設,加快建立統一完善的信息平台及綜合信息網絡。

綜上所述,韓軍C4I系統的發展方向可以概括為以下四點:

第一,C4I系統的作戰性能要求(ROC)應在研發人員和用戶的共同參與下完成,系統用戶界面和使用功能應進行個性化配置,為態勢感知,指揮控制,決策支持等提供強大的基礎支撐。

第二,參聯會與三軍間實現數據標準化,共享統一的數據來源(數據源)和數據標準化通​​用作戰圖。

第三,C4I系統的應用系統實現互聯,互通,互操作,數據檢索和故障排除都可以在同一畫面中進行。另外,為了形成合理,科學的業務流程,要進行業務流程分析(BPA),業務流程建模(BPM:Business Process Modeling)和數據建模(DM:Data Modeling)。

第四,及時反映用戶業務需求,性能需求及改進要求,建立完善信息系統的優化維護體系。

另外,韓美C4I系統的發展方向可以概括為以下兩點:

第一,借鑒CENTRIXS-K系統的做法,建設AKJCCS系統的下層系統,保證系統高效,穩定運行。

第二,實現韓美戰術級C4I系統的互動,保證韓美戰術部隊間的信息共享與協作。知遠/珠峰

Original Referring url:

 

Chinese Military Review: From Army Information Construction to Construction of Information Army // 中國軍事評論:從軍隊信息建設到建設信息化軍隊

Chinese Military Review: From Army Information Construction to Construction of Information Army //

中國軍事評論:從軍隊信息建設到建設信息化軍隊

2006年04月20日 22:00

From the Army Information Construction to the Construction of Informatized Army——Opening the Eyes to See the New Military Revolution in the World

  Li Bingyan

  A few years ago, there was a curtain factory abroad that was on the verge of bankruptcy and turned to the consulting company. The consulting company only asked them to change the curtain factory to a shading technology factory, and the factory would survive.

  A name change has broadened the horizon of development; a concept change has opened up the mind shackles. Updating the concept is inseparable from the concept of renewal. In the new military revolution, we need to adopt new concepts in a timely manner to show new development ideas.

  Although the ongoing new military revolution still does not see the other side, it is clear that the change has entered a new stage.

  This new military revolution was triggered by a new technological revolution centered on information technology. In the 1990s, the revolutionary impact of information technology on the military mainly remained at the stage of “construction”, that is, information technology embedding, networking, networking, and integration within the framework of the mechanized military organization. Technology strengthens mechanization and enhances mechanization. The theoretical community often refers to this stage of change as a revolution in the military field, which is to promote the army.

Information construction. At that time, the digital division and the digital army to be built by the US Army were carried out within the structure of the original mechanized army. Later, the US military learned from the experience of informatization of some large enterprises and multinational corporations in the society and changed the way of thinking.

  In the past, military changes were first to change military technology, weapons and equipment, and finally to complete the transformation of the military organizational system to adapt to the new methods of warfare. The new military revolution, characterized by informatization, especially the post-launch army, should be reversed. The experience of the business community is also “first rationalization of organizational structure, re-automation, informationization.”

  Before the 1990s, the US business community carried out informatization construction, focusing only on improving work efficiency. Although effective, it still cannot be changed. Ford Motor Company has spent a lot of money on automation, and its office efficiency has improved significantly. For example, the financial department of the North American branch has reduced the number of employees from 500 to 400 after office automation. The company leaders think it is good. Later, they learned about Japan.

Mazda Motor Company did the same job and used only five people. In contrast, Ford’s leadership was shocked. After in-depth investigation, they found that Mazda started to adjust the organizational structure, first change the workflow, and then engage in office automation. Ford’s financial system, organizational structure or traditional model has caused a lot of useless work. Later, Ford Company optimized its structure, re-engineered its business processes, and started office automation on this basis. The company’s financial staff was compressed to a quarter.

  In the development of human society, there is a phenomenon of “path dependence”. After a social system is formed, it will continue to strengthen itself in the actual operation, so that people will not be able to get rid of the influence of the original ideas afterwards.

  In addition, the organizational structure does not change, it is difficult to make the right decision in information. Usually, people are standing in their own units and planning work in this department, forming a “professional syndrome.” The research informatization is first of all the informationization of the unit, beyond the scope of construction of the unit, the leadership vision will not be achieved. This has led to the emergence of new “isomorphic diseases” – large and complete, small and complete, you have me, can not be interconnected, interoperable, interoperable. In this regard, some people call it the “potato effect”: a sack of potatoes, all sprouting, each self-contained system, self-enclosed, and not connected. Building these systems may be reasonable from a local perspective, but it may not be scientific or irrational from the overall perspective of informatization.

  In the practice, the foreign military realized that if informationization is not detoured, it should start with rationalizing the system and adjusting the command system. Otherwise, all levels and departments are busy with informationization. It is likely that the faster and the more the action is now, the greater the losses will be caused once reworked in the future.

  The rationalization of the organizational structure, the consideration of informationization, or the rationalization of organizational structure and informationization, and the simultaneous development have become a new consensus on the new military revolution. After entering the 21st century, the US military proposed a military transformation, marking a new stage in military transformation. At this stage, information technology has shifted from a “construction” role to a “deconstruction” role. That is: instead of strengthening mechanization, it is reorganizing mechanization. As a result, the army’s informatization construction has turned to the construction of an information-based army; the changes in the military field have turned to real military changes.

  In the theoretical preparation stage of the US military, the future army that was designed was: the sensor army, the precision strike army, the dominant mobile army, and the logistics army. In the transition, after a new argument, the future goals of the US military reorganization are proposed: the full-dimensional battlefield perception army, the precision firepower strike army, the efficient command and control army, and the intelligent logistics support army.

  In 2005, Germany proposed the idea of ​​building a “new three armed forces”, namely: rapid reaction forces, standing combat troops, and logistics support forces.

  At the end of last year, the Russian General Staff Department completed the reform of the armed forces. The Russian military’s new round of structural reforms eliminated the arms, military regions and fleets and re-established three functional headquarters and three regional headquarters. The three functional commands are: Strategic Nuclear Power Command, Transportation Command, and Aerospace Defense Command. The three regional commands are: Western European Command, Central Asian Command and Far East Command.

  Generally speaking, although the structural changes of the military have their own characteristics, the common point is that they tend to be integrated and tend to be integrated, and the boundaries between the traditional arms and services are increasingly blurred. The informationized army is not just a technology, but a new structure that is linked to new technologies – ultimately, a structural decision function.

Original Mandarin Chinese:

從軍隊信息建設到建設信息化軍隊——放開眼界看世界新軍事變革

李炳彥

幾年前,國外有一家窗簾廠,瀕臨倒閉之際,求助於諮詢公司。諮詢公司只讓他們把窗簾廠改為遮光技術廠,這個廠子便活了起來。

一個名字改變,拓寬了發展視野;一個概念更換,撬開了心智枷鎖。更新觀念,離不開更新概念。在新軍事變革中,我們需要適時採用新的概念,來展現新的發展思路。

持續發生的新軍事變革雖然至今仍看不到彼岸,但清晰可見變革已經進入到一個新階段。

這場新軍事變革,是由以信息技術為核心的新技術革命引發的。上個世紀90年代,信息技術對軍隊的革命性影響,主要還停留於“建構”階段,即在機械化軍隊的組織結構框架內進行信息技術嵌入、建網、聯網、集成,實際上是用信息技術加強機械化、提昇機械化。理論界常把這一階段的變革,稱之為軍事領域裡的變革,是推動軍隊

信息化建設。當時,美陸軍要建設的數字化師、數字化軍,都是在原來機械化軍隊的結構內進行的。後來,美軍汲取社會上一些大企業、跨國公司進行信息化的經驗,改變了變革的思路。
以往的軍事變革,都是先變革軍事技術、武器裝備,最後完成軍事組織體制的變革,以適應新的作戰方式。而信息化為標誌的新軍事變革,特別是後發之軍,應當反過來進行。企業界的經驗也是“先組織結構合理化,再自動化、信息化”。

上個世紀90年代以前,美國企業界進行信息化建設,只著眼於提高工作效率,雖有成效,但還談不上變革。美福特汽車公司,曾花大筆金錢搞自動化,辦公效率明顯提高,如北美分公司的財務部,實現辦公自動化後,人員由原來的500人減少到400人,公司領導自認為不錯。後來,他們得知日本

馬自達汽車公司做同樣的工作,一共只用了5個人。兩者相對照,福特公司的領導大吃一驚。他們深入調查後發現,馬自達公司從調整組織結構入手,先改變工作流程,再搞辦公自動化。福特公司的財務制度、組織結構還是傳統模式,造成許多無用功。後來,福特公司經過優化結構,再造業務流程,在此基礎上搞辦公自動化,公司財務員工壓縮到了原來的四分之一。
人類社會在發展中,存在一種“路徑依賴”現象,即一個社會系統形成後,必將在實際運作中不斷自我強化,以致後來人們改進它的種種嘗試,都難以擺脫原有思路的影響。

另外,組織結構不改變,很難做出信息化的正確決策。通常,人們都是站在本單位、本部門謀劃工作,形成了一種“職業官能症”。研究信息化首先是本單位的信息化,超出本單位的建設範圍,領導視野就達不到了。致使出現新的“同構病”——大而全、小而全,你有我也有,不能互聯、互通、互操作。對此,有人稱之為“馬鈴薯效應”:一麻袋馬鈴薯,個個都發芽,個個自成小系統,自我封閉,互不相聯。建這些系統,從局部來看可能合理,但從信息化的全局看可能並不科學、不合理。

外軍在實踐中認識到:要想信息化不走彎路,還應從理順編制體制、調整指揮體系入手。否則,各級、各部門都忙著信息化,很可能現在動作愈快、投入愈多,將來一旦返工,造成的損失就愈大。

先組織結構合理化,在信息化,或者組織結構合理化與信息化一併考慮,同時進行,成了新軍事變革的一種新共識。進入21世紀後,美軍提出軍隊轉型,標誌著軍事變革進入了一個新階段。在這個階段,信息技術從“建構”作用,轉向“解構”作用。即:不是加強機械化,而是重組機械化。由此,軍隊信息化建設,轉向了建設信息化軍隊;軍事領域裡的變革,轉向真正的軍事變革。

美軍在理論準備階段,曾設計出的未來軍隊是:傳感器軍,精確打擊軍,主導機動軍,聚焦後勤軍。在轉型中,經過新的論證,提出美軍重組的未來目標:全維戰場感知軍,精確火力打擊軍,高效指揮控制軍,智能後勤保障軍。

德國於2005年,提出了建設“新三軍”設想,即:快速反應部隊,常備作戰部隊,後勤支援部隊。

去年底,俄軍總參謀部完成了關於武裝力量改革方案。俄軍新一輪結構改革方案,取消了軍兵種、軍區和艦隊,重新成立三個職能司令部和三個地區司令部。三個職能司令部是:戰略核力量司令部、運輸司令部、空天防禦司令部。三個地區司令部是:西歐司令部、中亞司令部和遠東司令部。

從總體上看,軍隊結構變革雖然各國都有自己的特色,但共同點是趨於綜合、趨於一體化,傳統的軍兵種之間的界限日益模糊。信息化軍隊不只是技術,重要的是與新技術相聯繫的新的結構方式——最終還是結構決定功能。

Original Referring url: http://mil.news.sina.com.cn/2006-04-20/

Chinese Military Analysis of American Information Warfare Strategy Theory and Its Practical Conception // 中國對美國信息戰戰略理論的軍事分析及其實踐觀

Chinese Military Analysis of American Information Warfare Strategy Theory and Its Practical Conception //

中國對美國信息戰戰略理論的軍事分析及其實踐觀

By 胡 堅

 From various news media, we can often read reports of hacking attacks on US information systems and computer networks, especially when the United States is arrogant and provocative in the world. . As a country with the most reliance on computers and information technology and the most popular application in the world, the vulnerability of the US information system and the vulnerability caused by its huge number are obvious. However, we must not forget that the United States is not only the only superpower in the world today, but also the number one information technology power. The importance of the United States to information warfare and the depth of research are unmatched by any country in the world. In addition to theoretical research, the United States has conducted several information warfare simulations and practical exercises of varying sizes. The US information war strategy is consistent with the starting point of its global military strategic thinking and is based on aggressiveness and expansion. While arguing and even exaggerating hackers pose a serious threat to its information infrastructure, on the other hand, the United States is quietly taking an active position in its information warfare in the future, and even launching large-scale information to other countries. Attack and make positive preparations. Therefore, people should not take it lightly and relax their vigilance. This article intends to briefly explain some important viewpoints of the United States on the strategic theory of information warfare for reference. 
    I. The United States’ definition of information warfare The 
    United States has been studying information warfare theory for a long time, and has published a large number of research literatures in this area, but the definition of information warfare has been constantly revised and improved. At the beginning of 1996, the Joint Chiefs of Staff of the United States gave an earlier definition of 
    information warfare : information warfare refers to the impact of capturing information superiority, the enemy information systems and computer networks, and the existing information systems and Facilities such as computer networks are protected and information is taken.
    The above includes two aspects of attack and protection of the information infrastructure (NII). In October 1998, the Joint Chiefs of Staff made a perfection and supplement to the definition of information warfare in the newly promulgated “Information Warfare Common Dogma”. The most striking thing is that it is the first time in the form of government documents. The National Information Infrastructure (NII) is included in the scope of the information warfare. There are two main points: First, civilian facilities such as telephone, electric power and air traffic control systems will become the targets of information warfare attacks; second, the act of using any means to interfere with and destroy the enemy’s information decision-making process has been put into practice. . 
    The above definition shows that in order to achieve its strategic goals, the United States will not hesitate to destroy the vital infrastructure of a country as a means to force the other party to submit, in the process, it does not care about any loss that may be caused to civilians. With casualties. This was fully taught in the conflict that erupted in Kosovo from April to June 1999. 
    Second, the enemy 
    of information warfare The definition of the enemy of the information warfare in the United States is very complicated and ambiguous. The definition in the “Information Warfare Common Dogma” is as follows: 
    “The enemy of information warfare refers to the influence of my decision makers. Information threats and terrorist acts that are organized, premeditated and politically motivated or politically motivated. Hackers, individuals or organized criminals, internal apostates, industrial and economic agents who attack attacks on protected information systems and Terrorists are among the following. 
    From this definition, we can find that under certain circumstances, the United States can include foreign individuals or organizations, even a sovereign country, among its opponents of information warfare. Let us take an analogy: an energy company in a third world country negotiates with a US company and intends to purchase the electric equipment produced by the latter. Since the energy company’s information management system was purchased from the Netherlands and managed by Dutch engineering and technical personnel, these managers inadvertently learned about the transaction and reported the home country company, which led to the involvement of Dutch power equipment manufacturing companies. Competing with US companies ultimately led to major changes in the outcome of the deal. So the Dutch contender has in fact become a hostile party to the US information warfare. 
    Third, the strategic considerations of information warfare
    The US information war strategy is one of the means of dismantling the enemy and forcing the opponent to obey the will of the United States and act according to the will of the United States. The explanation in the “Information Warfare Common Dogma” is as follows: 
    “In the peace year and the initial stage of the crisis, information warfare may be the best deterrent means to exert influence on the other party. Information warfare is to resolve the crisis and shorten the confrontation cycle. Enhancing the effectiveness of intelligence, diplomacy, economic and military means, and avoiding the use of mercenaries in conflict zones will play a major role.” 
    Please pay close attention to the “best deterrent measures in peace years…” In a word, this is a very threatening phrase because it shows that the United States can initiate an information attack from any country that it considers to be an opponent without declaring war. That is to say, in the form of a formal program document, the United States has unambiguously stated to the world that information warfare will be an effective tool for intervening in other countries’ internal affairs and interfering in other countries’ internal affairs during the years of peace. 
    US information warfare expert William Church From the above theory, several different types of conflicts or crises in the world that may occur in the future, information warfare is proposed to solve several hypothetical means: 
    one hypothetical: war territorial dispute triggered by 
the first Second British, Ama Island War. The traditional war process is considered to be that Argentina once again sent troops and reclaimed the Malvinas Islands (Falkland Islands). The United Kingdom is convinced that Argentina is difficult to find international carriers because it does not have aircraft carriers and intercontinental ballistic missiles. Holding the island, the end of the war will still be the same as last time, with the British sending a powerful fleet to attack the island, Argentina defeated and summed, Britain won the return to the island. 
    But after considering the factors of information warfare, another situation may arise. Since information warfare will become an important weapon in future wars, Argentina can make full use of it to change its obvious weakness and counterattack Britain. And the final peace talks opportunity may also be created by the clever use of information warfare. In the war, the information warfare that Argentina can implement has the following aspects:
    1. Obstructing each other’s war preparations: Through the means of information attacks, the British military’s communication systems and equipment are ineffective, destroying the British military’s personnel and equipment database, delaying the preparations for war in the UK, and increasing the huge expenditure for this. In the end, it may even force the British government to reconsider its ability and feasibility to take military action. 
    2. Psychological warfare changes the public opinion of the British public: psychological warfare can be varied, from spreading rumors to creating false news and stories that can dominate the entire paradox. The effect of using psychological warfare alone may not be ideal, but if combined with other means of information warfare, it can produce excellent results. 
    3. Creating a national information infrastructure crisis: If Argentina can launch an effective attack on the UK’s telecommunications, telephone, rail and air traffic control information infrastructure, it will be paralyzed or awkward. In this case, the British government wants to The determination to send troops to a war thousands of miles away will be difficult. In the half-month voyage of the aircraft carrier battle group to the destination, the voices and plans for seeking a peaceful solution that accompanied the domestic panic are likely to be brewing or negotiating. 
    4. Destroy the economic and financial means of maintaining war in the UK: weaknesses and shortcomings in the financial system can be exploited to create financial crises and panic. In 1998, there was an incident in the US stock market that caused the stock index to fall 200 points in just a few minutes due to computer program errors. The cause of the incident was that when a computer program reported the proceeds of several investment funds, the data was wrong due to incorrect programming. As a result, the stock price fluctuations of these funds caused a French businessman to be shocked and first hit. The order of immediately throwing the disk, the result triggered a panic that should not have occurred, causing the stock market to plummet, and many companies and shareholders suffered heavy losses. Information warfare experts believe that such defects can be replicated by means of information. It can attract the attention of the government and create a serious illusion of economic problems, thus affecting the government’s decision-making and financial support for war. 
    Hypothesis 2: Disagreements caused by economic dependence
    Singapore is a city with a combination of international trading port, Far East financial center and Southeast Asian sea transportation center. It is economically developed and the people are rich, but it is a small country. The neighboring Malaysia is vast, but it is very poor and backward. Due to the small size of the country, Singapore’s air routes will pass through the southern part of Malaysia. This route is called the “air corridor” and it is a lifeline of Singapore. Although the two countries are both ASEAN countries, the relationship is still good, but there have been differences in how to use the “air corridor.” If one day Malaysia refuses to continue to use Singapore’s route through its airspace, the differences between the two countries may develop into a confrontation. 
    Information warfare can have many different ways of expression in this dispute. The most noticeable thing is that Singapore refused to provide advanced air traffic control services to Malaysia to pressure Malaysia to surrender and was forced to sit down and negotiate to solve the problem. And disputes. Because there is no binding clause in international law for such retaliation, once such incidents occur, it will surely attract strong attention from the international community. 
    The illusion of three: 
    a typical example of military confrontation and nuclear competition is the nuclear race and long-term military confrontation between India and Pakistan. Information weapons are likely to play a key role in resolving and eliminating this growing competition. The use of advanced electromagnetic pulse weapons, or the use of hacker infiltration methods to smash the nuclear weapons control information system and destroy the database of research data, can shake the nuclear weapons research programs of these two countries. This approach can also be extended to attack and destroy all important manufacturing, production and test equipment. 
    The illusion of the fourth: to change the attitude of a country from the eradication of the economy 
    In the information war, do not underestimate the impact of the National Information Infrastructure (NII) attack, it can give attackers an ideal opportunity to manipulate the economic situation of the other side. The direct result is that it can force hostile countries to greatly reduce their military spending, turn their financial resources to restore the economy, or force hostile countries to move from confrontation to easing.
    Let us use an imaginary information attack example to illustrate its great destructiveness: A country confronts with B. During this period, State A found that B has an important water conservancy project (such as the river dam) and the national economy and people’s livelihood. It is closely related, so the country took the means of information attack, invaded and took over the monitoring and management system of the dam, and by changing the water storage capacity of the dam reservoir, it achieved the purpose of significantly changing the climate dry humidity in a certain area of ​​B; Further, if State A puts a virus or destructive code in the dam’s control system, the reservoir’s control and regulation system suddenly fails at critical moments (such as the flood season), and as a result, the reservoir is lost due to flooding. The role of flooding, causing serious natural disasters and economic losses, in the end, the original economic advantages of the country B completely lost, under the pressure of internal and external, the country B had to succumb to the country. 
    The illusion of the fifth: the use of information weapons to obtain the same effect of using weapons of mass destruction in information warfare research, a problem that US information warfare experts are very interested in is: using information attacks, can create similar pearls of the year The massive damage effect of the Hong Kong incident? The conclusion is that, in theory, this possibility is completely present and necessary in hostile action, because it can greatly weaken the other’s ability to respond, resulting in the same possible military cost. effect. However, to achieve this, it is impossible to achieve without careful planning and sufficient resources to support and support. The US research program in this area is highly classified and unknown to outsiders. 
    The US military strategy theory believes that a country’s infrastructure can be greatly weakened by exerting a long-lasting military strike against it. But the ultimate goal of this is to clear the obstacles for the peace talks and force the other party to accept harsh conditions for peace talks. To this end, not only detailed and thorough target strike plans and multiple simulation rehearsals for attack plans, but also contingency measures in case of retaliatory counterattacks, as well as a complete command and logistics support system, etc., are required. Wait. NATO’s humanitarian signage and the brutal invasion of the Federal Republic of Yugoslavia are an actual rehearsal of this theory. 
    four. The traditional strategic defense priority theory faces severe challenges
    In the spring of 1998, American military experts Stephen Van Evra and Charles L. Glazer published the “Attack, Defence, and War Causes” in the American Journal of International Security, Vol. 22, No. 4. “The concept of “attack and defense balance point and its measurement” and many other articles, that during the Cold War after World War II, it belongs to the era of strategic defense theory. At that time, the confrontational East and West sides were evenly matched and indifferent to each other in terms of the quantity and quality of their own conventional weapons and nuclear weapons. They always tried to avoid direct conflicts and confrontation. The main concern of both sides at the time was the balance and constraints of each other. 
    But nowadays, due to the emergence of a new war mode—-the emergence of information warfare, it is possible to use information attacks to directly attack the infrastructure of a country. Especially in information warfare, the cost of the attacker is far less than that of the defender. Therefore, some military experts in the United States believe that the old strategic theory must be revised to meet the needs of the new situation. In addition, they also stressed that implementation of the new strategic theory, depends on three factors simultaneously: 
    · On the basis of a strong military machine as a backup and security, and gradually reduce the investment in traditional military equipment; 
    · globalization The neoliberal trend of thought and the appreciation and acceptance of global market mechanisms; 
    • The dependence of developed and developing countries on information infrastructure is growing. The heart of speculation can be seen here. 
    American military critic Lawrence Friedman made a profound understanding and elaboration of the above-mentioned theory among American military personnel: “Western countries (the United States and NATO) have never considered the ultimate in developing military capabilities. The way of thinking has developed to such a dangerous point: if the military strength cannot reach the full overwhelming tendency of the enemy and the enemy has no power to fight, it cannot be regarded as qualified; the purpose of military action is to follow the set. The plan creates a very favorable negotiating position for one’s own side. Therefore, this time (the introduction of the new strategic theory), it is also necessary to take the lead in the comprehensive consideration of various factors.”

Original Mandarin Chinese:

從各種新聞媒體上,我們經常可以讀到美國的信息系統和計算機網絡遭到黑客攻擊的報導,特別是當美國在世界上蠻橫霸道、挑起事端時,這種攻擊就愈發激烈。作為世界上對計算機和信息技術依賴最重、應用最普及的一個國家,美國信息系統的易受攻擊性和由其龐大數量所帶來的脆弱性,是顯而易見的。但是,我們不要忘了,美國不僅是當今世界上唯一的超級大國,而且也是頭號信息技術強國,美國對信息戰的重視程度和研究的深度,是世界上任何一個國家都無法比擬的。除理論研究外,美國還進行過多次規模不等的信息戰模擬和實戰演習。美國的信息戰戰略,與其全球軍事戰略思想的出發點一致,也是建立在攻擊性和擴張性基礎上的。在大肆宣揚甚至誇張黑客對其信息基礎設施構成了嚴重威脅的同時,另一方面,美國卻在不聲不響地為其未來在信息戰戰爭中佔據主動地位、乃至向他國發動大規模的信息攻擊,進行著積極的準備。因此,人們切不可以掉以輕心,放鬆警惕。本文擬對美國在信息戰戰略理論上的一些重要觀點做一簡要的闡述,以供參考。
一、美國對信息戰的定義
美國對信息戰理論的研究由來已久,並發布過大量這方面的研究文獻,但對信息戰的定義卻一直在不斷地修改​​和完善之中。 1996年初,美國參謀長聯席會議曾給信息戰下過一個較早的定義:
信息戰是指為奪取信息優勢,對敵方信息系統與計算機網絡等設施施加影響,並對已方的信息系統和計算機網絡等設施進行保護,所採取的信息行動。
上述的內容包括對信息基礎設施(NII)的攻擊與防護兩個方面。 1998年10月,參謀長聯席會議在最新頒布的《信息戰共同教條》中,又對信息戰的定義做了完善和補充,其中最引人注目的,就是它首次以政府文件的形式,把國家信息基礎設施(NII)列入了信息戰打擊的對象範圍之內。其要點有二:一是民用設施如電話、電力與空中交通管制系統等,將會成為信息戰攻擊的目標;二是把用任何手段干擾和破壞敵方信息決策過程的行為,付諸了條文。
上述定義說明,為了實現自己的戰略目標,美國將不惜以摧毀一個國家生死攸關的基礎設施為手段,來達到迫使對方就範的目的,而在此過程中,它並不在乎可能給平民帶來的任何損失與傷亡。 1999年4-6月在科索沃爆發的衝突中,人們就充分領教了這一點。
二、信息戰的敵方
美國對於信息戰敵對一方的定義,是十分複雜而又含混的,在《信息戰共同教條》中的定義如下:
“信息戰的敵方,是指影響我決策者的有組織、有預謀並帶有政治目的或受政治動機所激發的信息威脅與恐怖行為。對受保護的信息系統發動攻擊的黑客、個人或有組織的罪犯、內部變節者、工業和經濟間諜及恐怖主義分子,均屬此列。”
從該定義中我們可以發現,在特定情況下,美國可以把國外的個人或組織、甚至某個主權國家,都納入其信息戰的對手之列。我們不妨來打一個比方:某個第三世界國家的能源公司與美國某企業進行商談,打算購買後者生產的電力設備。由於該能源公司的信息管理系統購自荷蘭,且受荷蘭工程技術人員管理,這些管理人員在無意中知悉了這一交易,並報告了母國公司,結果使荷蘭的電力設備製造公司也介入進來,與美國公司開展競爭,最終使這筆交易的結果發生了很大的變化。於是荷蘭的這個競爭者,事實上就成了美國信息戰的敵對一方。
三、信息戰的戰略考慮
美國的信息戰戰略,是把它作為瓦解敵方,強制對手順從美國的意願,按美國的意志行事的手段之一。在《信息戰共同教條》中的闡述如下:
“在和平年月以及危機爆發的最初階段,信息戰有可能是對對方施加影響的最好的威懾手段。信息戰對於化解危機、縮短對抗週期,增強情報、外交、經濟與軍事手段的效能,盡量避免在衝突地區採用僱傭軍等,都將發揮重大的作用。”
請仔細注意上文中“在和平年月……的最好的威懾手段”這一段話,這是非常具有威脅性的辭句,因為它表明美國可以從自身的利益出發,在不宣戰的情況下向任何一個它認為是對手的國家發起信息攻擊。也就是說,美國以正式的綱領文件的形式,向世人明白無誤地聲明了信息戰將是它在和平年月時介入別國內部事務、干涉別國內政的一個有效的工具。
美國信息戰專家威廉·丘奇從上述理論出發,對未來世界上可能發生的幾種不同類型的衝突或危機,提出了幾種假想的信息戰解決手段:
假想之一:領土爭端引發的戰爭
第二次英、阿馬島戰爭。傳統的戰爭進程考慮是,阿根廷再次出兵,收回了馬爾維納斯群島(福克蘭群島),英國確信阿根廷由於沒有航空母艦和洲際彈道導彈,以及難以尋求到國際上的實質性援助,所以很難守住馬島,因此戰爭的結局仍會同上次一樣,以英國派出強大的艦隊向馬島發起進攻,阿根廷戰敗求和,英國奪回馬島而告終。
但是考慮信息戰的因素後,就可能出現另外的情況,由於信息戰在未來戰爭中必將成為一個重要的武器,阿根廷可以充分利用它來改變自己的明顯弱勢,反擊英國。並且最終的和談機會,也可能由對信息戰的巧妙運用而營造出來。在戰爭中,阿根廷可以實施的信息戰手段有以下幾個方面:
1.阻礙對方的戰爭準備:通過信息攻擊手段,使英國軍方的通信系統和設備喪失效能,破壞英軍的人員和裝備數據庫,遲緩英國的戰爭準備,並使其為此增加巨大的開支。最終,甚至可能迫使英國政府重新考慮它採取軍事行動的能力和可行性。
2.以心理戰改變英國公眾的輿論向背:心理戰的方式可以有多種多樣,從散佈各種謠言,到製造能夠主導整個輿論向背的虛假新聞和故事等等,不一而足。單獨採用心理戰的手法效果可能不會很理想,但若是與信息戰的其他手段結合使用,則可以產生出色的效果。
3.製造國家信息基礎設施危機:如果阿根廷能對英國的電信、電話、鐵路與航空管制等信息基礎設施發起有效的攻擊,使其陷入癱瘓或半癱瘓,在這種情況下,英國政府要想出兵進行一場遠在幾千英里之外的戰爭,其決心將會是很難下的。在航空母艦戰鬥群開赴目的地的半個多月航程中,伴隨著國內恐慌而誕生的尋求和平解決的呼聲及方案,很可能就已經在醞釀或商談之中。
4.破壞英國維持戰爭的經濟和財源手段:金融體制上的弱點和缺陷,可以被利用來製造金融危機和恐慌。 1998年,美國股市曾發生一起因電腦程序錯誤導致在短短幾分鐘內股指狂跌200點的事件。事件的起因是,一個電腦程序在報告幾個投資基金的收益時,由於程序設計有誤使數據出錯,結果引起這幾個基金股價的波動,一位法國商人見狀大驚失色,首先打出“立即拋盤”的指令,結果引發了一場本來不該發生的恐慌,造成股市大跌,不少企業和股東損失慘重。信息戰專家認為,這種缺陷是可以利用信息手段進行複制的,它可以吸引政府的注意力,造成一種經濟問題嚴重的假象,從而影響政府對戰爭的決策與財力支持。
假想之二:經濟依存關係導致的分歧
新加坡是一個集國際貿易港、遠東金融中心、東南亞海上交通中心於一身的城市國家,經濟發達、人民富裕,但卻是個彈丸小國;而毗鄰的馬來西亞國土遼闊,但卻十分貧困和落後。由於國土很小,新加坡的空中航線要穿過馬來西亞的南部地區,這段航線被叫做“空中走廊”,它是新加坡的一條生命線。兩國雖同屬東盟國家,關係尚好,但在如何使用“空中走廊”上一直存在分歧。如果有一天馬來西亞拒絕新加坡繼續使用穿越其領空的這條航線,兩國之間的分歧就可能會發展成為一種對抗。
信息戰在這場糾紛中可以有很多不同的表現方式,而最能引起人們注意的,就是新加坡以拒絕向馬來西亞提供先進的空中交通管制服務,來壓馬來西亞屈服,最終被迫坐下來談判解決問題和糾紛。因為國際法中沒有對這種報復行為的約束條款,一旦這類事件發生,必將引起國際社會強烈的注意。
假象之三:軍事對峙與核競賽
這方面的典型例子是印度、巴基斯坦的核競賽與長期軍事對峙。而信息武器在化解和消弭這場愈演愈烈的對抗賽中,有可能發揮關鍵的作用。利用先進的電磁脈衝武器,或者採取黑客滲透的方法來癱瘓雙方核武器的控制信息系統、破壞其存放研究資料的數據庫,可以動搖這兩個國家的核武器研究計劃。這種方法還能夠擴大到對所有重要的製造、生產與試驗設備進行攻擊和破壞。
假象之四:從搞垮經濟入手轉變一個國家的態度
在信息戰中,切不要小看對國家信息基礎設施(NII)的攻擊效果,它可以使攻擊者獲得一個理想的操縱對方經濟形勢的機會,其直接的結果,就是能夠迫使敵對國大大減少其軍事開支、將財力轉向恢復經濟,或者使敵對國被迫從對抗走向緩和。
讓我們用一個假象的信息攻擊的例子,來說明它的巨大破壞性:甲國與乙國發生對抗,在此期間,甲國發現乙國有一個重要的水利工程(如攔河大壩)與國計民生息息相關,於是甲國採取信息攻擊的手段,入侵並接管了這個大壩的監控管理系統,並通過改變大壩水庫蓄水量的做法,達到了明顯改變乙國某地區氣候乾濕度的目的;更進一步,如果甲國在大壩的控制系統中安放了病毒或破壞性的代碼,使水庫的控制調節系統在關鍵時刻(如洪澇季節)突然失靈,結果在洪水來臨時水庫喪失了應有的調節作用,造成洪水氾濫,產生嚴重的自然災害和經濟損失,最終,乙國原有的經濟優勢完全喪失,在內外壓力下,乙國不得不屈服於甲國。
假象之五:用信息武器獲得採用大規模毀傷性武器得到的同樣效果在信息戰研究中,美國的信息戰專家們很感興趣的一個問題是:利用信息攻擊手段,能否創造出類似當年珍珠港事件那樣的大規模毀傷效果?結論是,從理論上講,這種可能性是完全存在的,而且在敵對行動中非常必要,因為它能夠大大削弱對方的應變能力,從而產生要花極大的軍事代價才有可能得到的同樣效果。但是,要想做到這一點,沒有周密的計劃和足夠的資源配合與支持,是不可能實現的。美國在這​​方面的研究計劃被列入高度機密,外人無從知曉。
美國的軍事戰略理論認為,一個國家的基礎設施,可以通過對其施以長時間持續不斷的軍事打擊,來予以大大削弱。但這樣做的最終目的,是為和談掃清障礙,迫使對方接受苛刻的和談條件。為此,不但需要詳細而又周密的目標打擊計劃和針對攻擊行動方案的多次模擬預演,還要製定在遭到對方報復性反擊情況下的應變措施,以及完善的指揮與後勤保障系統,等等。北約打著人道主義招牌,對南聯盟實施的野蠻入侵行為,就是對這一理論的一次實際預演。
四.傳統的戰略防禦優先理論面臨嚴峻的挑戰
1998年春,美國軍事專家斯蒂芬·範·埃弗拉與查爾斯·L·格拉澤等人,在美國出版的刊物《國際安全》第22卷第4期上,發表了“進攻,防禦與戰爭的起因”、“攻防平衡點的概念及其度量”等多篇文章,認為二戰後的冷戰期間,屬於戰略防禦理論優先的時代。那時,對峙的東、西雙方在各自擁有的常規武器和核武器的數量與質量上,勢均力敵、難分伯仲,彼此都忌憚三分,因此總是力求避免爆發直接的衝突和對抗。當時雙方關注的主要問題,是相互的平衡與製約。
但是如今,由於新的戰爭模式—-信息戰的出現,使利用信息攻擊手段直接打擊一個國家的基礎設施成為了可能,尤其是在信息戰中,進攻方的代價要遠遠小於防禦方,因此美國的一些軍事專家們認為,必須修改舊的戰略理論,以適應新的形勢發展的需要。此外,他們還強調新的戰略理論的實施,有賴於以下三個因素的同步進行:
·在有強大軍事機器作為後盾和保障的基礎上,逐步降低在傳統軍事裝備上的投資;
·對全球化的新自由主義思潮,以及全球市場機制採取讚賞和接受的態度;
·發達國家和發展中國家對信息基礎設施的依賴越來越大。叵測之心,於此可窺一斑。
美國軍事評論家勞倫斯·弗里德曼,對美國軍方人士中的上述理論,作了深刻的認識和闡述:“西方國家(美國和北約)在發展軍事能力上,是永遠沒有終極考慮的。其思想方式已經發展到瞭如此危險的地步:軍事實力若不能達到對敵呈完全壓倒之勢、使敵方毫無招架之力,則不能算做合格;軍事行動的目的,就是要按照即定的計劃,為己方製造出一個極為有利的談判地位。因此這一次(新的戰略理論思想的提出),同樣是在綜合考慮各種因素的前提下,要想把先機佔盡。”

Original Referring url: http://old.globalview.cn/