Category Archives: #Chinese #Quantum #technology

Military Intelligence Drives Accelerated Development of Chinese Army Cyberspace Operations

軍事情報推動中國軍隊網路空間作戰加速發展

現代英語:

The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.

Military intelligence leads to accelerated development of cyberspace operations

■Respect the soldiers Zhou Dewang and Huang Anwei

Three major technologies support the intelligence of cyberspace weapons

Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:

First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.

Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.

Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.

The intelligent trend of network-controlled weapons has become increasingly prominent

Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.

In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.

Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.

Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.

Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.

Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.

Intelligent command information system changes traditional combat command methods

Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.

In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.

In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.

To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.

In the future battlefield, fighting courage requires more fighting “wisdom”

■Yang Jian and Zhao Lu

At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.

Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.

It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.

In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.

現代國語:

資料來源:中國軍網綜合作者:敬兵 周德旺 皇安偉 等責任編輯:胡雪珂

黨的十九大報告指出,要「加速軍事智慧化發展,提升基於網路資訊體系的聯合作戰能力、全域作戰能力」。今天的《解放軍報》刊發文章指出,軍事智能化是機械化、資訊化之後軍事領域發展的新趨勢和新方向,我們要在現有機械化和資訊化基礎上發展智能化,同時用智能化牽引機械化和信息化向更高水平、更高層次發展。網路空間作為新型作戰領域,是科技含量高、最具創新活力的新領域,在軍事智慧化的牽引下,正迎來快速發展的機會期。

軍事智慧化牽引網路空間作戰加速發展

■敬兵 週德旺 皇安偉

三大技術支撐網路空間武器智慧化

智能是一種智慧和能力,是一切有生命週期的系統對規律的感應、認知與運用,智能化就是把這種智慧和能力固化下來,成為一種狀態。網路空間武器是網路空間遂行作戰任務的武器,其形態以軟體和程式碼為主,本質上是一段資料。網路空間武器的智慧化主要體現在以下三個方面:

一是智慧化漏洞挖掘。漏洞是網路武器設計的基礎,今年5月在全球傳播的勒索病毒軟體,就是利用了微軟作業系統漏洞,為網路安全界帶來了巨大震動。漏洞價格昂貴,零日漏洞價值幾萬到幾十萬美元不等。過去漏洞的發現,主要依靠有經驗的駭客,利用軟體工具對程式碼進行檢查和分析。今年中國網路安全大會期間舉辦的國際網路安全技術對抗聯賽總決賽中,參賽人員示範由智慧機器人現場進行漏洞挖掘,然後透過漏洞編寫網路程式碼,形成網路武器,攻破目標系統,奪取旗幟。這項變化,意味著漏洞挖掘進入了智慧化時代。

二是智能化訊號分析和密碼破譯。訊號是網路資料傳輸的載體,密碼是網路資料安全的最後屏障,訊號分析和密碼破解是網路空間作戰的核心技術,突破訊號和密碼是進入網路空間的基本路徑,也是網路武器攻擊的首要目標。智慧化訊號分析將訊號的協定分析、調變辨識、個體辨識等問題,透過大數據、雲端運算、深度學習等技術來解決。密碼破解是計算科學“皇冠上的明珠”,智能化密碼破譯通過對密碼數據樣本的積累,不斷學習、尋找規律,能找到破譯的鑰匙,從而打開網絡數據“保險櫃”的最後一扇門,解決網絡入侵和接入的關鍵環節。

三是智慧化武器平台設計。美軍在2009年提出「網路飛行器」項目,為網路空間作戰提供像戰車、艦艇、飛機這樣的平台,可以實現在網路空間裡自動偵察、載入網路武器、自主協同、自主攻擊,受到威脅時自我銷毀、清除痕跡,具備了一定的智慧化特徵。未來「網路飛行器」載入的武器,不是軟體人員編好的程式碼,而是根據偵察結果直接對發現的漏洞,現場即時進行智慧化網路武器設計,實現「訂購式」開發,從而大大提高網路空間作戰的針對性。

網控武器的智慧化趨勢愈加凸顯

受網路空間控制的武器簡稱網路武器,是透過網路連接,接受網路空間指令,執行跨域任務,在實體空間達成作戰效果的武器。未來的各種作戰武器平台,大多是聯網的武器平台,這樣軍事資訊網本質上就是物聯網,上聯衛星、雷達、無人機等網路實體,從感知到發現、追蹤、定位、打擊都可透過網路空間控制,網控武器的智慧化已在陸海空天電等戰場蓬勃發展。

2015年,敘利亞利用俄羅斯機器人軍團擊潰武裝分子,行動採用了包括6個履帶式機器人、4個輪式機器人、1個自動化火砲群、數架無人機和1套指揮系統。指揮官透過指揮系統調度無人機偵察發現武裝分子,機器人向武裝分子發動衝鋒,同時伴隨火砲和無人機攻擊力量支援,對武裝分子進行了致命打擊。這只是一場小規模的戰鬥,卻開啟了機器人「組團」作戰的先河。

海空戰場網控智慧武器正在大量研發驗證。 2014年,美國海軍使用13艘無人水面艇,示範驗證無人艇集群攔截敵方艦艇,主要透過交換感測器數據,取得了不錯的效果。 2016年再次試驗時,新增了協同任務分配、戰術配合等功能,「蜂群意識」成為其智慧化的顯著特徵。

用於空中作戰的小微型無人機蜂群也正在快速發展。近年來,美國國防部多次試驗「山銻」微型無人機,可一次投放數十架乃至上百架,透過提升其執行偵察任務時的協同能力,在無人機編隊、指揮、控制、智慧化管理等方面都取得了進展。

空天網控武器越來越「聰明」。空天領域主要包含偵察和打擊兩類網控武器,各種功能的衛星主要執行偵察任務,是典型的偵察感測器。隨著各種小微衛星群的出現,使衛星表現出新的特徵:體積小、發射快、數量多、更聰明。小微衛星群在執行偵察和通訊任務時,有了更大的彈性和可靠性,目前世界衛星強國都在積極制定覆蓋範圍更廣的小微衛星群計畫。

各種高超音速打擊武器在空天巡航,彷彿懸在人們頭頂的利劍。美國空軍研究室稱「高速打擊武器」將在2018年前後啟動飛行試驗,其它各國也正積極研發類似武器。這類武器最大的特色是速度快、航程遠、智能化程度高。

智慧化指揮資訊系統改變傳統作戰指揮方式

網路空間武器和受網路空間控制的武器,是智慧化戰爭的“拳頭”,而指揮這些武器運用的指揮資訊系統是智慧化戰爭的“大腦”,網路空間作戰指揮資訊系統要同步跟上智慧化的進程。目前,幾乎全球的指揮資訊系統都面臨著「智慧滯後」的難題,未來戰爭需要快速決策、自主決策,這對智慧輔助系統提出了更高要求。

2007年,美國國防部高級研究計劃局啟動關於指揮控制系統的研發計劃——“深綠色計劃”,以期能實現計算機輔助指揮官快速決策贏得制勝先機。這是一個戰役戰術級的指揮資訊系統,其研發目的是將該系統嵌入美國陸軍旅級C4ISR戰時指揮資訊系統中去,實現指揮官的智慧化指揮。直到今天,美軍也沒有放鬆對智慧化指揮資訊系統的發展。

在網路空間作戰中,網路目標表現為一個接取網路的IP位址,數量眾多導致人工難以有效率操作,作戰更需要智慧化指揮資訊系統的輔助支撐。目前,智慧化指揮資訊系統需要實現智慧情報分析、智慧感知、智慧導航定位、智慧輔助決策、智慧協同、智慧評估、智慧化無人作戰等功能,尤其是實現對無人網控系統的集群作戰操控,這都對智慧化指揮資訊系統提出了迫切需求,需要加快相應關鍵技術的研發和運用。

綜上所述,智慧化的網路武器和網路控制武器,透過智慧化的資訊系統調度,將形成巨大的作戰能力,基本能遂行現行作戰樣式中的所有行動。未來戰爭,從指揮力量編組、到目標選擇、行動方式、戰法運用等,都將在智能化的背景下展開,戰爭「遊戲化」的特徵將更顯著,作戰指揮方式也將發生重大變化。

未來戰場 鬥勇更需鬥“智”

■楊建 趙璐

目前,人工智慧發展進入嶄新階段,並開始向各個領域加速滲透。受此一進程的影響,各國圍繞智慧化的軍事競爭已揭開序幕。我軍歷來是一支英勇頑強、敢打必勝的人民軍隊,未來戰場上應繼續發揚光榮傳統,同時要更加廣泛地掌握和利用最新的科技成果,研製出更多智能化的武器裝備,在未來戰場上掌握制勝先機。

智慧化是人類社會發展的趨勢,智慧化戰爭正加速到來。正是由於超越原有體系結構計算模型的成功創新、奈米製造技術的逐步普及,以及對人腦機制研究的突破性進展,軍事智慧化發展才擁有了堅實的基礎。因此,智慧化武器裝備的表現日益突出,並在情報分析、戰鬥反應等方面開始超越並取代人類。此外,在人力需求、綜合保障、運作成本等方面,智慧化武器裝備也具有明顯的優勢,日益成為戰爭的主導力量。

事實證明,智慧化武器裝備的發展應用,拓展了軍事行動的能力範圍,大幅提升了部隊的作戰效能。在阿富汗和伊拉克戰場上,無人機已承擔了大部分偵察、情報、監視等作戰保障任務,並承擔了約三分之一的空中打擊任務。近兩年,俄羅斯在敘利亞戰場上也曾多次使用較高智慧化程度的無人偵察機、戰鬥機器人等裝備。智慧化武器裝備正愈來愈地展現出超越傳統武器的重要價值。

未來戰爭中,作戰體系智能化的較量將是高手過招、巔峰對決的勝利關鍵。隨著以科技為支撐的軍事手段發展的不平衡性越來越大,誰先具備實施智能化作戰的能力,誰就更能掌握戰場的主動權,擁有技術代差優勢的強者會盡可能將戰爭成本降到最低,而弱者必然遭受巨大損失,付出慘重代價。我們不僅要加緊核心技術創新、武器裝備研製,還要研究探索適應軍事智能化發展的組織結構、指揮方式和運用模式,更要培養一支能夠擔起推進軍事智能化發展、鍛造智能化作戰能力的人才隊伍,充分發揮我軍作戰體系的整體效能,在與對手的較量中,以更加“智慧”的方式贏得戰爭。

中國原創軍事資源:http://www.81.cn/jwzl/2017-11/24/content_7841895888.htm

Chinese Military Research on Conceptual System-based Superior Warfare – How to Fight in Information Warfare System Operations? Analysis of Nine Typical Combat Styles

中國軍事體系優勢作戰概念研究-資訊化作戰體系如何作戰?九種典型作戰風格分析

現代英語:

System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole. 


       In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze .

       System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“
        1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence
        2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations
       3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure
       4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control
       5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
       6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma
       7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support
       8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics
       9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system

        For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body
       The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.


       1. Overall deterrence
       Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.


       1.1 Emphasis on multi-domain joint deterrence
       Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.

1.2 The implementation of overall deterrence should have three major elements
       Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.


       Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.


       1.3 Strong overall strength is the core of achieving effective deterrence
       The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war.
       In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.


       2. Electromagnetic Disturbance Warfare
       Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.


       2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.


       2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.


       2.3 Crack effective tactics for unmanned cluster operations
     “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.


       3. Cyber-sabotage
       Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities.
       The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.


      4. Cognitively Controlled Disturbance Warfare
      Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage.
      Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.


       4.1 Control the cognitive rights of situational awareness and compete for information advantages
       In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.


       4.2 Control and command decision-making power and compete for decision-making advantages
       Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.


       4.3 Control “brain” power and seize the advantage of brain control
       Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.


      5. Agile Mobile Warfare
      Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.

Table 1 Connotation of the concept of agile warfare


      5.1 Efficient and fast decision-making
      To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.


      5.2 High efficiency forms a favorable combat situation
      It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.


      5.3 Efficient and instant gathering of combat power
      To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.


      5.4 Agile mobile warfare is an innovative development of traditional mobile warfare
      In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.


       6. Unmanned cluster autonomous warfare
       Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.


       6.1 It is conducive to forming a system advantage to suppress the enemy
       Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.


       6.2 Conducive to enhancing combat effectiveness
       In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.


       6.3 Conducive to getting into enemy combat difficulties
       Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.


       7. Pointkill Battle
       “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.


      7.1 Achieve efficient combat cost ratio
      Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.


       7.2 Targeting key nodes is an important option
       The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.


       7.3 Large-scale system support is the basic condition
       The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.


       7.4 It is inseparable from precise intelligence support
       In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.


       8. Supply-breaking
       Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.


       8.1 The supply guarantee chain has a huge impact on the overall combat situation
       Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.


       8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain
       The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.


       8.3 The key is to choose the right time and make full use of tactics
       It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.


       9. System “paralysis battle”
       System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.


       9.1 The combat goal is to disorderly operate the enemy’s combat system
       In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.


       9.2 A key node in the heavy strike combat system
       Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.


       9.3 Implement soft strikes against the enemy’s combat system
       When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat. 

現代國語:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制資訊權,進而贏得作戰主動;三是網路破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通信網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速回應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間訊息「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理信息,還要採取網絡輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假信息,破壞、擾亂敵對戰場態勢的感知、認知,最大限度地製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施法實作「攻芯」,透過反義程式定義、原則性反制勝;
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志”的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進信息作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵對決策,或使其失能,實現隱形敵作戰。如以人的認知思維為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施“注入”“侵入”式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵

5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提高作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全局作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人群聚自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘敵實施幹擾、欺騙,或配合主戰兵器實施分佈式協同攻擊,實現整體分散式協同攻擊者。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦探測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以作出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點與關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞著實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使線路、通信和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱密性突然打擊;隱形奇襲戰,使用潛艦、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確補給
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整和重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連接、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界有關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,基於網絡的各種戰爭資源,可以快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2基本著眼導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通信聯絡及資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱整個作戰控制能力,使敵軍系統失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊資訊網路和物理設施,摧毀敵人實體武器。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷和硬摧毀行動,破壞敵之網路體系,使敵能作戰系統整體下降甚至失能作戰。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運作機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟性打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強電磁幹擾,使其信息失靈,陷入戰爭迷霧之中;網絡戰,使用網絡進攻力量對敵網絡信息體系實施攻擊,使敵指揮通信系統和計算機網絡受到嚴重破壞,使其指揮失靈,陷入信息孤島乃至戰爭孤島;心理戰和作戰論戰,使用心理戰、輿論手段,對敵對認知,打擊其戰爭論戰,使用心理戰、輿論手段,對敵對心理打擊行為論組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗。

中國原創軍事資源:http://www.81it.com/2022/0901/13716888.html

Future Proofing China’s National Defense & Military An Important Aspect of Chinese-style Modernization

面向未來的中國國防和軍隊是中國式現代化的重要面向

現代英語:

Soldiers are a major event for the country. In the great journey of “building a powerful country and rejuvenating the nation, and against the background of the accelerated evolution of major changes unseen in the world in a century, building and consolidating national defense and a strong people’s army are directly related to the future and destiny of the country and the nation”. The Third Plenary Session of the 20th Central Committee of the Communist Party of China pointed out that “national defense and military modernization are important components of Chinese-style modernization”, which fully reflects the great importance that the Party Central Committee with Comrade Xi Jinping as the core attaches to national defense and military construction, and provides guidance for national defense and military modernization on the new journey. Modernization points out the direction.

  The modernization of the national defense and military is the security guarantee and strategic support for Chinese-style modernization

  ”If you fall behind, you will be beaten. Only when the army is strong can the country be safe”. Without a strong army, there can be no strong state. After the Opium War in 1840, modern China was repeatedly defeated in its battles with Western powers. The vast country gradually became a semi-colonial and semi-feudal society, with the country humiliated, the people in trouble, and civilization in dust. History has inspired us that the Chinese nation’s emergence from suffering and the liberation of the Chinese people depend on a heroic people’s army; to comprehensively promote the great cause of building a powerful country and national rejuvenation with Chinese-style modernization, we must place national defense and military modernization as a barrier to national security, plan and deploy in strategic positions based on career development, and accelerate the construction and consolidation of national defense and a strong people’s army.

  The modernization of the national defense and military is closely linked and internally unified with Chinese-style modernization. Without the modernization of national defense and the military, there would be no Chinese-style modernization. Comrade Mao Zedong once profoundly pointed out “the original requirements for building socialism were industrial modernization, agricultural modernization, scientific and cultural modernization, and now we must add national defense modernization”; Comrade Deng Xiaoping also emphasized “four modernizations, one of which is national defense modernization”, these all reflect the great importance our party attaches to national defense and military construction.

  Since the 18th National Congress of the Communist Party of China, President Xi has always adhered to the integrated operation of strengthening the country and the military, put national defense and military modernization in the chess game of Chinese-style modernization, and opened up the road to strengthening the military with Chinese characteristics, forming a new strategy for national defense and military modernization by 2027, 2035, and the middle of this century, a new “three-step” strategy for national defense and military modernization that connects near, medium and long-term goals Created a new situation in the cause of strengthening the military. Guided by the party’s goal of strengthening the military in the new era, we will comprehensively implement the strategy of reforming and strengthening the military, promote the reform of the leadership and command system, the reform of scale structure and force organization, and the reform of military policies and systems. Our military’s organizational structure will achieve historic changes, and the force system will achieve revolutionary changes. Reshaping, the basic framework of the socialist military policy system with Chinese characteristics has been constructed and formed. Our military system has been completely new, its structure has been completely new, its pattern has been completely new, and its appearance has been completely new It has laid a solid foundation for the modernization of national defence and the army.

  Military means, as a means of guaranteeing the realization of great dreams, can only stop a war if it can be fought. The current and future periods are critical periods for comprehensively promoting the great cause of building a powerful country and rejuvenating the nation through Chinese-style modernization, and will inevitably encounter various risks, challenges and even turbulent waves. We must comprehensively modernize our national defense and military, build the People’s Army into a world-class military, effectively guarantee Chinese-style modernization, and safeguard national sovereignty, security, and development interests.

   Comprehensive and accurate grasp of the scientific connotation of national defense and military modernization

  Since the 18th National Congress of the Communist Party of China, President Xi has issued a series of important expositions around “Chinese-style modernization”, summarizing the Chinese characteristics, essential requirements and major principles for the formation of Chinese-style modernization, building a theoretical system for Chinese-style modernization, and promoting the new era and new journey. Chinese-style modernization provides scientific guidance and also carries out strategic design and scientific deployment for national defense and military modernization.

  The most fundamental thing about modernizing the national defense and military is to uphold the absolute leadership of the party over the military. The leadership of the Party is the fundamental guarantee of Chinese-style modernization, which determines the fundamental nature of Chinese-style modernization, and it must also determine the fundamental nature of national defense and military modernization. To promote the modernization of national defense and the military on the new journey, we must fully implement a series of fundamental principles and systems for the party to lead the people’s army, comprehensively and thoroughly implement the chairman’s responsibility system of the Military Commission, and effectively unify thoughts and actions into the decisions and arrangements of the Party Central Committee and President Xi; Adhere to the party’s management of cadres and talents, and highlight political standards and combat capabilities Ensure that the barrel of the gun is always in the hands of those who are loyal and reliable to the party; improve the comprehensive and strict governance of the party system, enhance the political and organizational functions of party organizations at all levels, and integrate the party’s leadership throughout the entire process of continuing to deepen national defense and military reforms in all aspects.

  To modernize national defense and the military is to modernize military doctrine, military organization, military personnel, and weapons and equipment. This reflects the inherent requirements for the construction of military forces resulting from changes in the concept of victory in modern warfare, elements of victory and methods of victory, and clarifies the main signs of the basic realization of national defence and military modernization. To realize the modernization of military theory is to keep pace with the times, innovate war and strategic guidance, and form a military theoretical system that is contemporary, leading, and unique; to realize the modernization of organizational form is to deepen the reform of national defense and the military, and the military force structure layout is scientific and reasonable, strategic deterrence capabilities are consolidated and improved, new areas and new quality combat forces continue to grow, and elite operations, system support, and joint victory have become the basic application models; To realize the modernization of military personnel is to deeply implement the strategy of strengthening the military with talents in the new era, promote the comprehensive transformation and upgrading of military personnel’s capabilities, structural layout, and development management, and forge high-quality, professional new military talents with both ability and political integrity; to realize the modernization of weapons and equipment, It is necessary to focus on strengthening national defense scientific and technological innovation and accelerating the development of strategic, cutting-edge and disruptive technologies Accelerate the upgrading of weapons and equipment and the development of intelligent weapons and equipment.

  For the modernization of national defence and the military, we must adhere to the integrated development of mechanization, informatization and intelligence. The military conflicts and local wars that have taken place in recent years have shown that new qualitative combat capabilities generated based on intelligent combat systems are increasingly becoming core military capabilities. Based on mechanization, dominated by informatization, and oriented by intelligence, the three superimpose, penetrate, and support each other, jointly giving rise to new forms of warfare and methods of warfare. Only by accelerating the integrated development of mechanization, informatization and intelligence and keeping up with the new military revolutionary trends in the world can we seize the opportunity and take the initiative in seizing the commanding heights of the military struggle.

  The modernization of national defence and the army is a guarantee of security for insisting on the path of peaceful development. Since ancient times, soldiers have not been warlike. Chinese-style modernization is modernization on the path of peaceful development. Building a consolidated national defense and a strong military commensurate with international status and national security and development interests is a strategic task of China’s socialist modernization drive and an insistence on taking the path of peaceful development. Safety guarantee is an inevitable choice for summarizing historical experience. China has always pursued a defensive defence policy and adhered to the strategic idea of active defence, and no matter how far it develops, China will never seek hegemony or engage in expansion. To promote the modernization of national defense and the military on the “new journey”, we must faithfully implement the concept of a community with a shared future for mankind, resolutely oppose all forms of hegemony and bullying, and contribute China’s strength to building a beautiful world of lasting peace and universal security.

   Advancing the modernization of national defence and the military at a new historical starting point

  The Third Plenary Session of the 20th Central Committee of the Communist Party of China included “continuous deepening of national defense and military reforms into the overall plan for further comprehensive deepening of reforms, and made a series of major strategic arrangements for improving the leadership and management system and mechanism of the people’s army, deepening the reform of the joint operations system, and deepening cross-military and civilian reforms”. On the new journey, we must deeply understand and grasp the themes, major principles, major measures, and fundamental guarantees for further comprehensively deepening reforms, resolutely implement the new “three-step” strategy for national defense and military modernization, and accelerate the modernization of military theory, military organizational form, and military personnel. Modernize and modernize weapons and equipment, and lead the modernization of national defense and the military to move forward with better strategies, higher efficiency, and faster speed.

  Strengthening the Party’s theoretical and scientific leadership in military guidance. Our party insists on combining the basic principles of Marxism with the practice of building the people’s army, absorbing the essence of China’s excellent traditional military culture, and constantly exploring new realms in the development of contemporary Chinese Marxist military theory and military practice. As an important part of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, Xi Jinping Thought on Strengthening the Military has achieved a new leap forward in the Sinicization and modernization of Marxist military theory. It is the fundamental guiding ideology of our party building and military governance in the new era. We must unremittingly arm our minds with Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, further firmly establish the guiding position of Xi Jinping Thought on Strengthening the Military in national defense and military construction, and build and consolidate national defense and a strong people’s army under the guidance of Xi Jinping Thought on Strengthening the Military. Take new and greater steps on the road to strengthening the military with Chinese characteristics.

  Efforts should be made to make the main responsibility and business of war preparation more solid and effective. The People’s Army is an armed group that performs the party’s political tasks. It must be both politically strong and capable. In the final analysis, this ability can win wars. To accelerate the modernization of national defense and the military, we must firmly grasp the fundamental direction of winning wars, establish the only fundamental standard of combat effectiveness, focus all our energy on fighting wars, and work hard on fighting wars. Conscientiously implement the military strategic policy for the new era, operate war preparation and cessation, deterrence and actual combat, war operations and the use of military forces in peacetime as a whole, innovate strategies, tactics and tactics, effectively shape the situation, manage crises, contain wars, and win wars. Adhere to the principle of “training troops as they fight, and comprehensively improve the actual combat level of military training and the ability to perform missions and tasks”.

  Promote high-quality development of national defense and military construction through “reform and innovation”. Reform is a key move that will determine the growth of our army and its future. On the new journey, we must put innovation at the core of the overall military construction and development, transform development concepts, innovate development models, enhance development momentum, and promote the transformation of national defense and military modernization from quantitative growth to qualitative improvement. Focus on integrating national defense and military construction into the national economic and social development system on a wider scale, at a higher level, and to a deeper extent, continuously improve the quality and efficiency of national defense and military modernization, promote the simultaneous improvement of national defense strength and economic strength, and consolidate and improve the integration National strategic system and capabilities, and constantly write a new chapter of strengthening the country and the military.

現代國語:

時間:2024年11月15日 08:20 來源:解放軍報
兵者,國之大事。在強國建設、民族復興偉大征程中,在世界百年未有之大變局加速演進的背景下,建構鞏固國防和強大人民軍隊直接關係國家和民族的前途命運。黨的二十屆三中全會指出,“國防和軍隊現代化是中國式現代化的重要組成部分”,充分體現了以習近平同志為核心的黨中央對國防和軍隊建設的高度重視,為新征程上國防和軍隊現代化建設指明了方向。

國防與軍隊現代化是中國式現代化的安全保障與戰略支撐

落後就要挨打,軍強才能國安。沒有一支強大的軍隊,就不可能有強大的國家。 1840年鴉片戰爭以後,近代中國在與西方列強的較量中屢屢戰敗,泱泱大國逐步淪為半殖民地半封建社會,國家蒙辱、人民蒙難、文明蒙塵。歷史啟示我們,中華民族走出苦難、中國人民實現解放,有賴於一支英雄的人民軍隊;以中國式現代化全面推進強國建設、民族復興偉業,必須把國防和軍隊現代化擺在國家安全之屏障、事業發展之依託的戰略位置來策劃和部署,加快建設鞏固國防和強大人民軍隊。

國防與軍隊現代化與中國式現代化緊密聯繫、內在統一。沒有國防和軍隊的現代化,就沒有中國式現代化。毛澤東同誌曾深刻指出“建設社會主義,原來要求是工業現代化,農業現代化,科學文化現代化,現在要加上國防現代化”;鄧小平同志也曾強調“四個現代化,其中就有一個國防現代化”,這些都體現了我們黨對國防和軍隊建設的高度重視。

黨的十八大以來,習主席始終堅持強國強軍一體運籌,把國防和軍隊現代化放在中國式現代化大棋局中謀劃推進,開闢出中國特色強軍之路,形成了到2027年、2035年、本世紀中葉,近、中、遠目標梯次行動」,開創三步和現代化軍階的國防和軍事戰略。以黨在新時代的強軍目標為引領,全面實施改革強軍戰略,推進領導指揮體制改革、規模結構和力量編成改革、軍事政策制度改革,我軍組織架構實現歷史性變革,力量體系實現革命性重塑,中國特色社會主義軍事政策制度體系基本框架構建形成,我軍體制一新、結構一新、一新、一現代化新格局新化,為國防和軍事基礎一化。

軍事手段作為實現偉大夢想的保底手段,能戰方能止戰。當前和今後一個時期,是以中國式現代化全面推進強國建設、民族復興偉業的關鍵時期,必然會遇到各種風險挑戰甚至驚濤駭浪。我們必須全面推動國防和軍隊現代化,把人民軍隊建設成為世界一流軍隊,有力保障中國式現代化建設,保障國家主權、安全、發展利益。

全面準確掌握國防與軍隊現代化的科學內涵

黨的十八大以來,習主席圍繞中國式現代化發表一系列重要論述,概括形成中國式現代化的中國特色、本質要求和重大原則,構建起中國式現代化的理論體系,為新時代新征程推進中國式現代化提供了科學指引,也為國防和軍隊現代化進行了戰略設計和科學部署。

國防與軍事現代化,最根本的是堅持黨對軍隊絕對領導。黨的領導是中國式現代化的根本保證,決定了中國式現代化的根本性質,也必然決定了國防和軍隊現代化的根本性質。新征程上推動國防和軍隊現代化,必須全面貫徹黨領導人民軍隊的一系列根本原則和製度,全面深入貫徹軍委主席負責制,切實把思想和行動統一到黨中央、習主席決策部署上來;堅持黨管幹部、黨管人才,突顯政治標準和打仗能力,確保槍桿子始終掌握在對黨忠誠可靠的人手中;健全全面從嚴治黨體系,增強各級黨組織政治功能和組織功能,把黨的領導貫穿持續深化國防和軍事改革各方面全過程。

國防與軍隊現代化,就是要實現軍事理論、軍隊組織形態、軍事人員、武器裝備的現代化。這反映了現代戰爭制勝觀念、制勝要素、制勝方式變化對軍事力量建設的內在要求,明確了基本實現國防和軍隊現代化的主要標誌。實現軍事理論現代化,就是要與時俱進創新戰爭和戰略指導,形成具有時代性、引領性、獨特性的軍事理論體系;實現組織形態現代化,就是要深化國防和軍事改革,軍隊力量結構佈局科學合理,戰略威懾能力鞏固提高,新域新質作戰力量不斷壯大,精製作戰、體系支撐、聯合戰略威懾成為基本運作模式;實現軍事人員現代化,就是要深入實施新時代人才強軍戰略,推動軍事人員能力素質、結構佈局、開發管理全面轉型升級,鍛造德才兼備的高素質、專業化新型軍事人才;實現武器裝備現代化,就是要聚力加強國防科技創新,加速戰略性、前沿性、顛覆性技術發展,加速武器裝備升級和智能化武器裝備升級。

國防與軍隊現代化,必須堅持機械化資訊化智慧化融合發展。近年來發生的軍事衝突和局部戰爭表明,基於智慧化作戰體系所產生的新質作戰能力越來越成為核心軍事能力。以機械化為基礎,以資訊化為主導,以智慧化為方向,三者相互疊加、相互滲透、相互支撐,共同催生新的戰爭形態和作戰方式。只有加速機械化資訊化智慧化融合發展,跟上世界新軍事革命潮流,才能在搶佔軍事鬥爭制高點中占得先機、贏得主動。

國防與軍隊現代化,是堅持走和平發展道路的安全保障。自古知兵非好戰。中國式現代化是走和平發展道路的現代化,建立同國際地位相稱、同國家安全和發展利益相適應的鞏固國防和強大軍隊,是中國社會主義現代化建設的戰略任務,是堅持走和平發展道路的安全保障,是總結歷史經驗的必然選擇。中國始終奉行防禦性國防政策,堅持積極防禦戰略思想,無論發展到什麼程度,中國永遠不稱霸、永遠不搞擴張。在新征程上推動國防和軍隊現代化,必須忠實踐行人類命運共同體理念,堅決反對一切形式的霸權霸道欺凌,為建設持久和平、普遍安全的美好世界貢獻中國力量。

在新的歷史起點上推進國防和軍隊現代化

黨的二十屆三中全會將持續深化國防和軍事改革納入進一步全面深化改革的大盤子,對完善人民軍隊領導管理體制機制、深化聯合作戰體系改革、深化跨軍地改革作出一系列重大戰略部署。新旅程上,要深刻領會和把握進一步全面深化改革的主題、重大原則、重大舉措、根本保證,堅決貫徹國防和軍隊現代化新「三步走」戰略,加快軍事理論現代化、軍隊組織形態現代化、軍事人員現代化、武器裝備現代化,引領國防和軍事現代化以更優策略、更高效益、更快速度向前推進。

強化黨的軍事指導理論科學領導。我們黨堅持把馬克思主義基本原理同人民軍隊建設實踐結合,汲取中華優秀傳統軍事文化精華,不斷拓拓當代中國馬克思主義軍事理論和軍事實踐發展新境界。習近平強軍思想作為習近平新時代中國特色社會主義思想的重要組成部分,實現了馬克思主義軍事理論中國化時代化的新飛躍,是新時代我們黨建軍治軍強軍的根本指導思想。我們必須堅持不懈用習近平新時代中國特色社會主義思想武裝頭腦,進一步牢固確立習近平強軍思想在國防和軍隊建設中的指導地位,在習近平強軍思想引領下建設鞏固國防和強大人民軍隊,在中國特色強軍之路上邁出新的更大步伐。

著力把備戰打仗的主責主業抓得更加紮實有效。人民軍隊是執行黨的政治任務的武裝集團,既要政治過硬,也要本領高強,這個本領說到底就是能打勝仗。加快推進國防和軍隊現代化,必須緊緊扭住能打勝仗的根本指向,樹牢戰鬥力這個唯一的根本的標準,全部精力向打仗聚焦,全部工作向打仗用勁。認真貫徹新時代軍事戰略方針,把備戰與止戰、威懾與實戰、戰爭行動與和平時期軍事力量運用作為一個整體加以運籌,創新戰略戰術與戰法打法,有效塑造態勢、管控危機、遏制戰爭、打贏戰爭。堅持仗怎麼打兵就怎麼練,全面提升部隊軍事訓練實戰化水準和履行使命任務的能力。

以改革創新推動國防和軍隊建設高品質發展。改革是決定我軍發展壯大、制勝未來的關鍵一招。新征程上,要把創新擺在軍隊建設發展全局的核心位置,轉變發展理念、創新發展模式、增強發展動能,推動國防和軍隊現代化由量的成長轉向質的提升。著力在更廣範圍、更高層次、更深程度上將國防和軍隊建設融入國家經濟社會發展體系之中,不斷提高國防和軍隊現代化質量效益,促進國防實力和經濟實力同步提升,鞏固提高一體化國家戰略體系和能力,不斷書寫強國強軍新篇章。

中國原創軍事資源:https://www.mva.gov.cn/sy/zt/zt1/xxgcddsjdjs/qwjd/202411/t20241120_453942888.html

Chinese Military’s Brief Analysis of Multi-dimensional Central Warfare

中國軍隊多維中心戰淺析

現代英語:

2023-09-27 11:58:xx

Source: Guangming Military

Since the 1990s, the concepts of multi-dimensional central warfare, such as network-centric warfare, personnel-centric warfare, action-centric warfare, and decision-centric warfare, have been proposed one after another. The evolution of the concept of multi-dimensional central warfare reflects the overall goal of seeking advantages such as platform effectiveness, information empowerment, and decision-making intelligence by relying on military science and technology advantages, and also reflects the contradictory and unified relationship between people and equipment, strategy and skills, and the strange and the normal. Dialectically understanding these contradictory and unified relationships with centralized structured thinking makes it easier to grasp the essential connotation of its tactics and its methodological significance.

Strengthen the integration of the “human” dimension in the combination of people and equipment

The concepts of personnel-centric warfare and platform-centric warfare largely reflect the relationship between people and weapons and equipment. Some have specially formulated human dimension strategies, emphasizing continuous investment in the human dimension of combat effectiveness, which is the most reliable guarantee for dealing with an uncertain future. Since the beginning of the 21st century, with the rapid development of intelligent weapons and equipment, unmanned combat has emerged, and voices questioning the status and role of people have arisen one after another. It is imperative to strengthen the integration of the human dimension and enhance the synergy of the human dimension.

First, we need to enhance spiritual cohesion. Marxism believes that consciousness is the reflection of objective matter in the human mind. Tactics are the expression and summary of combat experience, and they themselves have spiritual or conscious forms. When studying tactics, we naturally need to put spiritual factors first. Some scholars believe that war is still fundamentally a contest of human will. In the information age, people’s spirits are richer and more complex, and enhancing the spiritual cohesion of the human dimension is more challenging and difficult. To enhance people’s spiritual cohesion, we need to coordinate the cultivation of collective spirit and individual spirit, maximize the satisfaction of individual spiritual needs in leading the collective spirit, realize individual spiritual pursuits in shaping the value of collective spirit, and empower people’s spirit with all available and useful information; we need to coordinate the cultivation of critical spirit and innovative spirit, adhere to the tactical epistemology of dialectical materialism, resolutely oppose idealism and mechanism in tactical cognition, and constantly inherit and innovate in criticism; we need to coordinate the cultivation of fighting spirit and scientific spirit, and promote the revolutionary spirit of facing death with courage and winning, and promote the spirit of winning by science and technology.

The second is to enhance the organizational structure. Organizations are the organs of the military, and people are the cells of the organization. The settings of military organizations in different countries have their own characteristics and commonalities. For example, the Ministry of National Defense is generally set up to distinguish between the structure of military branches, hierarchical structures and regional structures, and to distinguish between peacetime and wartime organizations. Although the purpose of construction and war is the same, the requirements for the unity of construction and the flexibility of war are different. To enhance the organizational structure and promote the consistency of war and construction, it is necessary to smooth the vertical command chain, reasonably define the command power and leadership power, command power and control power, so that the government and orders complement each other, and enhance the vertical structural strength of the organization; it is necessary to open up horizontal coordination channels, explore the establishment of normalized cross-domain (organizations, institutions, departments) coordination channels, change the simple task-based coordination model, and enhance the horizontal structural strength of the organization; it is necessary to improve the peace-war conversion mechanism, focus on the organization connection, adjustment and improvement in the change of leadership or command power of the troops, and maintain the stability and reliability of the organizational structure network.

The third is to enhance material support. The spiritual strength of people in combat can be transformed into material strength, but spiritual strength cannot be separated from the support of material strength. To enhance material support and thus realize the organic unity of material and spirit, it is necessary to ensure combat equipment, bedding, food, and medical care, build good learning venues, training facilities, and re-education channels, provide good technical services in combat regulations, physiological medicine, etc., help design diversified and personalized capacity improvement plans and career development plans, and provide strong material and technical support for the development of people’s physical fitness, skills, and intelligence, and thus comprehensively improve people’s adaptability and combat effectiveness in the uncertain battlefield environment of the future.
             

Deepen the practice of the “skill” dimension in the combination of combat and skills

The combination of combat skills is an important principle of tactical application. The technology includes not only the technology at the practical operation level (such as shooting technology), but also the technology at the theoretical application level (such as information technology). It can be said that tactics, technology, art and procedures together constitute its “combat methodology”. Scientific and technological development and scientific technology are important characteristics of scientific and technological development. To deepen the combination of combat skills, it is necessary to correctly grasp the relationship between technology and tactics, art and procedures, and continuously deepen the practice of the “skill” dimension.

First, promote the tacticalization of advanced technology. Technology determines tactics, which is the basic view of dialectical materialism’s tactical theory. The evolution of the concept of multi-dimensional central warfare is also an example of technology driving the development and change of tactics. Engels once pointed out: “The entire organization and combat methods of the army and the related victory or defeat… depend on the quality and quantity of the population and on technology.” However, technology-driven tactics have a “lag effect”, especially in the absence of actual combat traction. This requires actively promoting the military transformation of advanced civilian technologies and the tactical application of advanced military technologies. On the one hand, we must actively introduce advanced civilian technologies, especially accelerate the introduction and absorption of cutting-edge technologies such as deep neural networks and quantum communication computing; on the other hand, we must strengthen tactical training of advanced technology equipment, closely combine technical training with tactical training, and promote the formation of new tactics and new combat capabilities with new equipment as soon as possible.

Second, promote the technicalization of command art. “Art” is a highly subjective concept. Some Chinese and foreign scholars believe that “the art of command is rooted in the commander’s ability to implement leadership to maximize performance”, while others believe that “the art of command is the way and method for commanders to implement flexible, clever and creative command”. Chinese and foreign scholars generally regard command as an art. The main reason is that although command has objective basis and support such as combat regulations, superior orders and technical support, the more critical factor lies in the commander’s subjective initiative and creativity, which is difficult to quantify by technical means. With the development of disciplines and technologies such as cognitive psychology and cognitive neuroscience, the cognitive structure and mechanism of command will become more explicit, the mysterious veil of “command art” will gradually fade, and the technicalization of command art will become an inevitable trend. This requires continuous strengthening of technical thinking, continuous deepening of the construction of artificial intelligence-assisted command decision-making means, continuous deepening of the application of human brain decision-making mechanisms, practical use of technology to deconstruct art, and continuous promotion of the technicalization of command art.

The third is to promote the regulation of combat technology. Many scholars place technology on a position that is almost as important as tactics. This insistence on the integrated development of tactical regulation and the regulation of specialized military technology and special combat technology is an important way to promote the systematic and standardized construction of combat regulations and further achieve the integration and unification of tactics and technology at the legal level.
              

Seeking the advantage of the “odd” dimension in combining the odd and the regular

The odd and the even are a basic contradictory structure of tactics, with inherent identity. Without the odd, there is no even, and without the even, there is no odd; either the odd or the even, ever-changing. The choice of the odd and the even is the category of decision-centered warfare, and the application of the odd and the even is the category of action-centered warfare. In the 1990s, the theories of asymmetric warfare, non-contact warfare, and non-linear warfare were proposed. If “symmetric warfare, contact warfare, and linear warfare” are even, then “asymmetric warfare, non-contact warfare, and non-linear warfare” can be called odd. From the perspective of natural science, “symmetry, contact, and linear” are general, and “asymmetry, non-contact, and non-linear” are detailed. It is an inevitable requirement to grasp the dimension of “odd” in the combination of odd, odd, and even, and to seek the advantages of the “three nons”.

First, seek “asymmetric” advantages. “Symmetry” and “asymmetry” originally refer to the morphological characteristics of things or space. Symmetrical warfare is a battle between two troops of the same type, and asymmetric warfare is a battle between two different types of troops. The theory of asymmetric warfare requires the scientific and reasonable organization of troops, combat forces and weapon systems of different military services, deployment in a wide area, and the concentration of superior forces to deal a fatal blow to the enemy at the best combat opportunity, and then quickly redeploy the forces. Due to the limited combat power, the troops have positive asymmetric advantages and negative asymmetric disadvantages. Seeking asymmetric advantages and avoiding asymmetric disadvantages is the common expectation of the warring parties, which will lead to such a situation that the warring parties cycle back and forth between symmetry and asymmetry. Therefore, to seek “asymmetric” advantages, it is necessary to seek asymmetry in combat power, combat capability, combat command and other aspects, adhere to and carry forward “avoid the strong and attack the weak, avoid the real and attack the virtual”, “you fight yours, I fight mine”, and effectively play advantages and avoid disadvantages in asymmetry. For example, when weapons and equipment are symmetrical, strive to gain an asymmetric advantage in personnel capabilities; when forces are symmetrical, strive to gain an asymmetric advantage in command art.

The second is to seek “non-contact” advantages. “Contact” and “non-contact” are a description of the distance between different things. Contact in the military field is usually defined by the projection distance of weapons. The concept of “non-contact combat” originated from World War II and was created during the Cold War. The connotation of contact combat and non-contact combat changes with the change of the striking distance of weapons and equipment. The warring parties always seek to attack each other at a farther distance or in a wider space without being threatened. Since the 1990s, the theory of “non-contact combat” has been used in many local wars. Non-contact combat is a combat action style that implements long-range precision strikes outside the defense zone while being far away from the opponent. Non-contact combat embodies the idea of winning by technology, flexible mobility, and center of gravity strikes. With the rapid development of military science and technology, the armies of major countries in the world will have the ability to perceive and strike globally, and the connotation of “non-contact” will be further compressed to space, cognitive domain and other space fields. To this end, on the one hand, we must base ourselves on the reality of “contact combat”, learn from each other’s strengths and overcome our weaknesses in contact, and continuously accumulate advantages; on the other hand, we must expand the space for “non-contact combat”, seize the initiative and seize the opportunity in non-contact, and continuously expand our advantages.

The third is to seek “nonlinear” advantages. “Linear” and “nonlinear” usually refer to people’s thinking or behavior patterns. The movement of all things in the universe is complex and mostly nonlinear, while human cognition always tends to be simple, abstract, and linear, and has invented concepts such as logic lines, time lines, and linear mathematics. In military science, the transition from linear operations to nonlinear operations reflects the development and progress of military technology theory. Since the second half of the 20th century, nonlinear operations have been on the historical stage. Some scholars have pointed out that in linear operations, each unit mainly acts in a coordinated manner along a clear front line of its own side. The key is to maintain the relative position between its own units to enhance the safety of the units; in nonlinear operations, each unit simultaneously carries out combat operations from multiple selected bases along multiple combat lines. The key is to create specific effects at multiple decision points against the target. Linear operations mainly reflect the action-centered warfare idea, while nonlinear operations mainly reflect the target-centered warfare idea. To this end, on the one hand, we must deepen the use of linear warfare and make full use of its practical value in facilitating command, coordination and support; on the other hand, we must boldly try non-linear warfare and maximize its potential advantages of extensive mobility and full-dimensional jointness. (Yin Tao, Deng Yunsheng, Sun Dongya)

現代國語:

2023-09-27 11:58:xx

來源:光明軍事
自1990年代以來,網路中心戰、人員中心戰、行動中心戰、決策中心戰等多維度的中心戰概念先後被提出。多維度中心戰概念的演變,反映了依靠軍事科技優勢尋求平台效能、資訊賦能、決策智能等優勢的總體目標,更反映了人與裝、謀與技、奇與正等方面的對立統一關係。以中心式結構化思維辯證地認識這些對立統一關係,更便於掌握其戰術的本質內涵及其方法論意義。
強化人裝結合中「人」維度融合
人員中心戰與平台中心戰概念很大程度上反映的是人與武器裝備的關係。有的專門制定人維度策略,強調在戰鬥力的人維度進行持續投入,對於應對不確定的未來是最可靠的保障。進入21世紀以來,隨著智慧化武器裝備的快速發展,無人作戰異軍突起,對人的地位作用的質疑聲音此起彼伏,強化人維度的融合、增強人維度的合力勢在必行。
一是增強精神凝聚力。馬克思主義認為,意識是客觀物質在人腦中的反映。戰術是戰鬥經驗的表現與概括,本身俱有精神或意識上的形態,研究戰術自然要把精神因素放在第一位。有學者認為,戰爭從根本上來說仍然是人類意志的較量。在資訊化時代,人的精神更加豐富複雜,增強人維度精神上的凝聚力,挑戰和難度更高。增強人的精神凝聚力,需要統籌培養集體精神與個體精神,在引領集體精神中最大限度滿足個體精神需求,在培塑集體精神價值中實現個體精神追求,用一切可用、有用的信息賦能人的精神;需要統籌培養批判精神與創新精神,堅持辯證唯物論的戰術知識論,堅決反對戰術認識上的唯心論和機械論,不斷在批判中繼承、在繼承中創新;需要統籌培養戰鬥精神與科學精神,既要弘揚視死如歸、敢打必勝的革命精神,又要發揚科學制勝、技術制勝的精神。


二是增強組織結構力。組織是軍隊的器官,人是組織的細胞。不同國家軍事組織的設置有其特性,也有其共通性。例如普遍設有國防部,區分軍種結構、層級結構與區域結構,區分平時編制與戰時編成。儘管建與戰在目的上是一致的,但是建的統一性與戰的彈性在要求上不盡相同。增強組織結構力進而促進戰建一致,需要暢通縱向指揮鏈路,合理界定指揮權與領導權、指揮權與控制權,做到政令相長,增強組織的縱向結構力;需要打通橫向協同管道,探索建立常態化的跨領域(組織、機構、部門)協同途徑,改變單純的任務式協同模式,增強組織的橫向結構力;需要健全平戰轉換機制,重點關注部隊領導權或指揮權變更中組織銜接、調整和健全等工作,保持組織結構網絡的穩定性、可靠性。
三是增強物質保障力。戰鬥中人的精神力量可以轉化為物質力量,但精神力量也離不開物質力量的支撐。增強物質保障力進而實現物質與精神的有機統一,需要像為決策保障情報、為槍砲保障彈藥、為車輛保障油料一樣,保障好戰鬥裝具、被裝、伙食、醫療,建設好學習場地、訓練設施和再教育渠道,提供好戰條令、生理醫學等方面技術服務,幫助設計多樣化個人化的能力提升計劃、職業發展規劃,為發展人的體能、技能和智能,進而全面提高人在未來不確定性戰場環境中的適應性和戰鬥力,提供堅強的物質和技術支撐。

深化戰技結合中「技」維度實踐
戰技結合是戰術運用的重要原則。其中的技術不僅包括實務操作層面的技術(如射擊技術),也包括理論應用層面的技術(如資訊科技)。可以認為,戰術、技術、藝術和程序共同構成了其「戰鬥方法論」。科學技術化和技術科學化是科學技術發展的重要特徵。深化戰技結合,需要正確掌握技術與戰術、藝術、程序的關係,不斷深化「技」維度實踐。


一是推動先進技術戰術化。技術決定戰術,是辯證唯物論戰術論的基本觀點。多維度中心戰概念的演變,也是技術推動戰術發展變革的例子。恩格斯曾指出:“軍隊的全部組織和作戰方式以及與之有關的勝負……,取決於居民的質與量和取決於技術。”然而,技術推動戰術具有“滯後效應”,尤其在缺少實戰牽引的情況下。這就需要主動推進先進民用技術的軍事轉化和先進軍事技術的戰術應用。一方面,要積極引進民用先進技術,尤其要加速推進深度神經網路、量子通訊運算等尖端技術的引進吸收;另一方面,要加強先進技術裝備戰術訓練,把練技術與練戰術緊密結合起來,推動新裝備盡快形成新戰術和新戰力。
二是推動指揮藝術技術化。 「藝術」是一個具有較強主體性的概念。中外學者有的認為“指揮藝術根植於指揮官實施領導以最大限度提高績效的能力”,有的認為“指揮藝術是指揮官實施靈活巧妙和富有創造性指揮的方式與方法”。中外學者普遍將指揮視為藝術,主要原因在於:指揮儘管有作戰條令、上級命令和技術保障等客觀方面的依據和支撐,但更關鍵的因素在於指揮員的主觀能動性和創造性,而這是比較難以用技術手段加以量化的。隨著認知心理學、認知神經科學等學科和技術的發展,指揮的認知結構和作用機制將更加顯性化,「指揮藝術」的神秘面紗將逐漸退去,指揮藝術技術化將會成為必然趨勢。這需要不斷強化技術思維,持續深化人工智慧輔助指揮決策手段建設,持續深化人類大腦決策機理運用,切實用技術解構藝術,不斷推動指揮藝術技術化。


三是推動戰鬥技術條令化。不少學者把技術置於與戰術近乎同等重要的地位。這種堅持戰術條令化與兵種專業技術和專門戰鬥技術條令化的融合發展,是推動戰鬥條令體系化規範化建設,進而實現戰術與技術在法規層面融合統一的重要途徑。

謀求奇正結合中「奇」維度優勢
奇與正是戰術的一種基本矛盾結構,具有內在同一性。無奇便無正,無正也無奇;或奇或正,千變萬化。奇與正的選擇是決策中心戰的範疇,奇與正的運用是行動中心戰的範疇。 1990年代,非對稱作戰、非接觸作戰、非線式作戰理論被提出。若稱「對稱作戰、接觸作戰、線式作戰」為正,則可稱「非對稱作戰、非接觸作戰、非線式作戰」為奇。從自然科學角度來看,「對稱、接觸、線式」是概述的,「非對稱、非接觸、非線式」是詳實的。把握好奇正結合中「奇」的維度,謀取「三非」優勢是必然要求。
一是謀取「非對稱」優勢。 「對稱」與「非對稱」本來是對事物或空間的形態特徵的指稱。對稱作戰是兩種相同類型部隊之間的交戰,非對稱作戰是兩種不同類型部隊之間的交戰。非對稱作戰理論要求對不同軍兵種部隊、作戰力量和武器系統進行科學合理編組,在寬廣的地域展開部署,在最佳的作戰時機集中優勢力量給敵人以致命的打擊,然後迅速重新部署力量。由於作戰力量的有限性,部隊有正面的非對稱優勢,就有負面的非對稱劣勢。謀取非對稱優勢、規避非對稱劣勢是交戰雙方的共同期望,進而造成這樣一種局面──交戰雙方在對稱與非對稱之間往復循環。因此,謀取“非對稱”優勢,要謀取作戰力量、作戰能力、作戰指揮等多方面上的非對稱,堅持和發揚“避強擊弱、避實擊虛”“你打你的,我打我的”,在非對稱中有效發揮優勢、規避劣勢。例如,在武器裝備對稱時爭取佔據人員能力上的非對稱優勢,在力量對稱時爭取佔據指揮藝術上的非對稱優勢。
二是謀取「非接觸」優勢。 「接觸」與「非接觸」是對不同事物之間距離狀態的一種描述。軍事領域的接觸通常是以武器的投射距離來界定的。 「非接觸作戰」的概念起源於二戰,產生於冷戰時期。接觸作戰與非接觸作戰的內涵是隨著武器裝備打擊距離的改變而改變的。交戰雙方也總是謀求在免受威脅的更遠距離或更廣空間攻擊對方。自1990年代以來,「非接觸作戰」理論在多場局部戰爭中被運用。非接觸作戰是在遠離對方的情況下實施防區外遠程精確打擊的作戰行動樣式。非接觸作戰體現了技術制勝、靈活機動、重心打擊的思想。隨著軍事科技的快速發展,世界主要國家軍隊將具備全球感知和全球打擊的能力,「非接觸」的內涵將進一步壓縮至太空、認知域等太空領域。為此,一方面要立足「接觸作戰」實際,在接觸中取長補短、固強補弱,不斷積蓄勝勢;另一方面要拓展「非接觸作戰」空間,在非接觸中搶抓先手、搶佔先機,不斷拓展優勢。
三是謀取「非線式」優勢。 「線式」與「非線式」通常是指人的思維或行為模式。宇宙萬物運動是複雜的,大抵是非線式的,而人類的認知總是傾向於簡單的、抽象的、線式的,並發明了邏輯線、時間線以及線性數學等概念。軍事學中,從線式作戰到非線式作戰,反映了軍事技術理論的發展進步。 20世紀下半葉起,非線作戰就登上歷史舞台。有學者指出,線式作戰中各部隊主要沿著明確的己方前沿協調一致行動,關鍵是保持己方部隊之間的相對位置,以增強部隊的安全性;非線式作戰中各部隊從選定的多個基地沿多條作戰線同時實施作戰行動,關鍵是針對目標在多個決定點製造特定效果。線式作戰體現的主要是行動中心戰思想,非線式作戰體現的主要是目標中心戰思想。為此,一方面要深化運用線式作戰,充分利用其便於指揮、協同和保障的實用價值;另一方面要大膽嘗試非線式作戰,最大限度地發揮其廣泛機動、全維聯合的潛在優勢。 (殷濤、鄧雲生、孫東亞)

中國原創軍事資源:http://www.81it.com/2023/0927/14581888.html

United States Continuing Promoting Use of Artificial Intelligence During Combat Operations

美國繼續推動在作戰行動中使用人工智慧

現代英語:

The US military is accelerating the application of artificial intelligence technology in actual combat.

According to foreign media reports, the US Department of Defense recently released a strategic planning document on artificial intelligence technology to strengthen top-level design and promote the rapid development of related technologies. At the same time, the US military has also continued to strengthen its combat use of artificial intelligence technology.

Release of strategic planning documents

Recently, U.S. Deputy Secretary of Defense Hicks signed the strategic document “Responsible Artificial Intelligence Strategy and Implementation Approach”, which clarified the basic principles and main framework for the U.S. Department of Defense to implement the artificial intelligence strategy. The main contents include the following two aspects.

Sort out the “demand side”. First, adjust the management structure and process, and continue to follow up on the development of artificial intelligence technology in the Ministry of National Defense. Second, pay attention to the research and development and procurement of artificial intelligence products, and adjust the speed of artificial intelligence technology development in a timely manner. Third, use the demand verification procedure to ensure that artificial intelligence capabilities are consistent with operational requirements.

Optimize the “R&D end”. First, create a trustworthy AI system and AI-enabled system. Second, promote a common understanding of the concept of “responsible AI” through domestic and international cooperation. Third, improve the theoretical and operational level of AI-related personnel in the Ministry of National Defense.

In addition to the military’s strategic planning report, American think tanks have recently made recommendations on the cooperation between the United States and its allies in the application of artificial intelligence technology. The Center for Security and Emerging Technologies at Georgetown University in the United States released a report stating that the U.S. government, universities, research institutions and the private sector should promote artificial intelligence technology research cooperation with Australia, India and Japan in various ways to achieve an open, accessible and secure technology ecosystem and improve the performance of relevant U.S. military weapons and equipment.

Accelerate the pace of technology application

In addition to formulating a “roadmap” for the development of artificial intelligence technology in top-level design, the US military has also taken a number of measures recently to try to apply relevant mature technologies to military practice.

From the perspective of military construction, the Army’s “Integration Plan”, the Navy’s “Winning Plan” and the Air Force’s “Advanced Combat Management System” are the three major artificial intelligence programs of the US military. All three programs are being promoted simultaneously. Recently, the US Army Contracting Command awarded a US military contractor Engineering and Computer Simulation a contract totaling $63.28 million to design and develop new artificial intelligence algorithms. Kitchener, commander of the US Navy’s surface forces, said that the US Navy’s surface forces will focus on integrating capabilities such as artificial intelligence and machine learning in the near future to significantly enhance their combat advantages. The US Air Force recently successfully demonstrated an artificial intelligence algorithm called Artuu, which can automatically manipulate U-2 reconnaissance aircraft to search for enemy missile launchers and generate real-time combat maps of cross-domain threats.

From the perspective of combat power generation, the U.S. military is accelerating the application of artificial intelligence technology in actual combat. The U.S. National Interest bimonthly website recently published an article saying that the U.S. Navy and Air Force are developing a new generation of training systems to help their fighters better deal with new air threats. This intelligent technology, called the “P5 Combat Training System,” can help U.S. military pilots conduct virtual training in high-threat, high-confrontation combat scenarios.

The Defense Advanced Research Projects Agency (DARPA) is busy verifying an “autonomous cyber attack system based on artificial intelligence chips”. It is reported that the system can generate a set of attack codes every 24 hours and dynamically adjust the attack program according to the real-time network environment. Since the attack code is newly generated, it is difficult for antivirus systems that rely on existing virus libraries and behavior recognition to identify it, and the code is highly concealed and destructive. The Defense Advanced Research Projects Agency (DARPA) believes that the system has extremely high application potential and can help the US military gain technological advantages in future cyber operations.

Triggering a cutting-edge military competition

Overall, the US military has been active in the development of artificial intelligence recently, and related developments may trigger a new round of global cutting-edge military competition.

On the one hand, the US military is promoting the idea of ​​”everything can be intelligent” internally. The US military claims that fighter jets, tanks, ground control stations and surface ships can not only serve as entities with combat capabilities, but also as nodes for monitoring battlefields and obtaining war information. To achieve this goal, artificial intelligence will play an irreplaceable role. Combined with the US military’s strategic planning documents, it is not difficult to see that in order to create more nodes, the US military will give full play to the enabling role of artificial intelligence in the next step to help various weapon platforms find and strike targets faster.

On the other hand, it will have an external impact on the global military development pattern. The US military and its allies are vigorously promoting the development of artificial intelligence technology, mainly to use these advanced technologies to suppress rival countries, and the backlash effect of related practices may be immediate. At present, many countries in the world are vigorously developing related technologies. It can be foreseen that with the rapid development and support of technologies such as artificial intelligence, the future battlefield will accelerate the transition to an intelligent and unmanned battlefield. Cross-domain collaborative operations such as land, sea, air, space, and the Internet will become the main combat style of future wars, driving the development and application of equipment technology, and promoting major changes in the global military development pattern.

現代國語:

據外媒報道,近期,美國國防部發布人工智能技術戰略規劃文件,強化頂層設計,推動相關技術快速發展。與此同時,美軍也持續加強對人工智能技術的作戰運用。

出台戰略規劃文件

近期,美國防部常務副部長希克斯簽署《負責任的人工智能戰略和實施途徑》戰略文件,明確美國防部實施人工智能戰略的基本原則和主體框架,主要內容包括以下兩個方面。

理順“需求端”。一是調整管理結構和流程,持續跟進國防部人工智能技術發展。二是關注人工智能產品的研發和采購,適時調整人工智能技術開發速度。三是使用需求驗證程序,確保人工智能能力與作戰需求保持一致。

優化“研發端”。一是創建可信的人工智能系統和人工智能賦能系統。二是通過國內、國際合作,促進對“負責任的人工智能”概念的共同理解。三是提高國防部人工智能相關人員的理論和操作水平。

除軍方的戰略規劃報告外,近期,美國智庫也對美國與盟友的人工智能技術應用合作提出建議。美國喬治城大學安全和新興技術中心發布報告稱,美國政府、大學、研究機構和私營部門應通過多種方式,促進與澳大利亞、印度和日本3國的人工智能技術研究合作,以實現開放、可訪問和安全的技術生態系統,提升美軍相關武器裝備性能。

加快技術應用步伐

除在頂層設計上為人工智能技術發展制定“路線圖”外,美軍近期還多措並舉,試圖將相關成熟技術運用於軍事實踐。

從軍種建設層面看,陸軍的“融合計劃”、海軍的“制勝計劃”和空軍的“先進作戰管理系統”是美軍當前三大人工智能計劃。三大計劃均在同步推進。近期,美陸軍合同司令部授予美軍事承包商工程與計算機模擬公司一份總金額6328萬美元的合同,以設計和開發新的人工智能算法。美海軍水面部隊指揮官基奇納表示,美海軍水面部隊近期將重點整合人工智能與機器學習等能力,以大幅提升作戰優勢。美空軍近期成功演示了一種名為Artuu的人工智能算法,能自動操縱U-2偵察機尋找敵方的導彈發射器,生成跨域威脅實時作戰圖。

從戰力生成層面看,美軍正在加速人工智能技術在實戰方面的應用。美國《國家利益》雙月刊網站近日刊文稱,美海軍和空軍正在研發新一代訓練系統,幫助其戰斗機更好地應對新的空中威脅。這種名為“P5作戰訓練系統”的智能技術,可幫助美軍飛行員進行高威脅、高對抗作戰場景下的虛擬訓練。

美國防高級研究計劃局則在忙於驗證一款“基於人工智能芯片的自主網絡攻擊系統”。據悉,該系統每24小時可生成一套攻擊代碼,並能根據網絡實時環境,對攻擊程序進行動態調整。由於攻擊代碼是全新生成的,因此,依托現有病毒庫和行為識別的防病毒系統難以識別,代碼的隱蔽性和破壞性強。美國防高級研究計劃局認為,該系統具有極高的應用潛力,能夠在未來的網絡作戰中幫助美軍獲得技術優勢。

引發前沿軍事競賽

總體來看,近期美軍在人工智能建設方面動作頻頻。相關動向或將引發新一輪全球前沿軍事競賽。

一方面,對內推動“萬物皆可智能”。美軍宣稱,無論是戰斗機、坦克、地面控制站還是水面艦船,不僅可作為一個具有作戰能力的實體,還可作為一個監視戰場和獲取戰爭信息的節點。要實現這個目標,人工智能將發揮不可替代的作用。結合美軍戰略規劃文件不難看出,為打造更多節點,美軍下一步將充分發揮人工智能的賦能作用,助力各類武器平台更快地發現和打擊目標。

另一方面,對外影響全球軍事發展格局。美軍及其盟友大力推動人工智能技術發展的做法,主要目的是利用這些先進技術打壓對手國家,相關做法的反噬效應或將立竿見影。目前,世界多國都在大力發展相關技術。可以預見,在人工智能等技術的快速發展和支撐下,未來戰場將加速向智能化、無人化戰場過渡,陸、海、空、天、網等跨域協同作戰,將成為未來戰爭的主要作戰樣式,牽引裝備技術發展和運用轉化,推動全球軍事發展格局發生重大變化。

來源:中國軍網-中國國防報 作者:傅 波 責任編輯:尚曉敏

中國原創軍事資源:http://www.81.cn/wj_208604/10169848888.html

China’s first optical quantum computer shows off its computing power comparable to top “supercomputers”

我國首台光量子電腦展現媲美頂級「超級電腦」的運算能力

現代英語:

In today’s era of rapid technological development, the technological competition between China and the United States is like a war without gunpowder, especially in cutting-edge technology fields such as lithography machines and chips. The United States has relied on its technological advantages to blockade and suppress my country, trying to curb the pace of my country’s technological rise. However, things suddenly turned around, and pressure can often be transformed into motivation. my country’s technology companies did not retreat, but instead accelerated the pace of independent research and development. Recently, the first appearance of a new generation of domestic optical quantum computers is undoubtedly a shining star in my country’s science and technology field, illuminating the road to future technological development.

Stunning debut, showing strength

This device, called “TurningQ Gen2 Large-Scale Programmable Optical Quantum Computing System”, attracted countless eyes. It looks like a double-door refrigerator, seemingly ordinary, but contains huge scientific and technological energy. The device is mainly composed of three core components: quantum light source unit, quantum computing unit, and detection unit. Each component embodies the hard work and wisdom of scientific researchers.

According to relevant persons in charge of Turing Quantum, this optical quantum computer has a quantum superiority level of 56 photons. When solving certain specific problems, its computing power is almost comparable to that of the top supercomputer, Tianhe-2. As an outstanding representative of my country’s supercomputers, Tianhe-2 has been ranked among the top in the global supercomputer rankings many times. Its powerful computing power has provided strong support for many scientific research and engineering fields. Today, the computing power of domestic optical quantum computers on specific problems is comparable to that of Tianhe-2, which is undoubtedly a major breakthrough in my country’s quantum computing field.

What is even more surprising is that compared with Tianhe-2, this optical quantum computer has obvious advantages in terms of floor space and energy consumption. Supercomputers usually require huge computer rooms and a large amount of energy supply to maintain operation, while optical quantum computers are only the size of a refrigerator, which greatly saves space and energy. This not only reduces the cost of use, but also makes it possible for the widespread application of quantum computers.

Key components, simultaneously unveiled

At the exhibition, the key device for the industrialization of this quantum computer, the photonic chip based on 110 nanometer technology, was also unveiled. The photonic chip is one of the core components of the optical quantum computer. It uses photons to transmit and process information and has the advantages of high speed and low energy consumption. The emergence of the photonic chip based on 110 nanometer technology marks that my country has made important progress in photonic chip manufacturing technology.

The development and production of photonic chips require high-precision manufacturing processes and advanced equipment. Through unremitting efforts, Chinese researchers have overcome technical difficulties one after another and successfully developed photonic chips based on 110-nanometer technology. This achievement not only lays a solid foundation for the industrialization of my country’s optical quantum computers, but also wins my country an advantage in the development of photonic chips.

Future prospects, unlimited potential

With the continuous advancement of quantum computing technology, the further optimization of CPO optoelectronic co-packaging and related micro-nano processing technologies, quantum computers are expected to significantly improve computing power while reducing their size to the size of a laptop computer. This prospect is exciting and will bring revolutionary changes to the popularization and application of quantum computers.

In the field of scientific research, quantum computers will provide powerful tools for solving complex scientific problems. For example, in the fields of quantum chemistry, materials science, biomedicine, etc., quantum computers can simulate the structure and properties of molecules and accelerate the process of new drug development and material design. In the financial field, quantum computers can be used for risk assessment, portfolio optimization, etc. to improve the accuracy and efficiency of financial decision-making. In the field of artificial intelligence, quantum computers can accelerate the training of machine learning and deep learning algorithms and promote the development of artificial intelligence technology.

In addition, the widespread application of quantum computers will also drive the development of related industries. From the manufacture of photon chips to the assembly and debugging of quantum computers, to the development and application of quantum computing software, a huge industrial chain will be formed. This will inject new impetus into my country’s economic development and create a large number of employment opportunities.

Independent innovation, forging ahead

The debut of the new generation of domestic optical quantum computers is another major achievement of my country’s independent scientific and technological innovation. In the face of the blockade and suppression of the United States, my country’s technology companies did not choose to rely on imports, but firmly embarked on the path of independent research and development. This spirit of independent innovation is the core driving force of my country’s scientific and technological development.

However, we must also be aware that there is still a certain gap between my country and the world’s advanced level in the field of quantum computing. In future development, we need to continue to increase investment in scientific research, cultivate more scientific and technological talents, strengthen international cooperation and exchanges, and continuously enhance my country’s core competitiveness in the field of quantum computing.

The debut of the new generation of domestic optical quantum computers is an important milestone in the history of my country’s scientific and technological development. It allows us to see the huge potential and broad prospects of my country in the field of quantum computing. I believe that in the near future, quantum computers will enter our lives and bring more surprises and changes to the development of human society. Let us look forward to the arrival of this day and work hard for the brilliant future of my country’s science and technology!

現代國語:

在當今科技快速發展的時代,中美之間的科技競爭猶如一場沒有硝煙的戰爭,在光刻機、晶片等前沿科技領域尤為激烈。美國憑藉其技術優勢對我國進行封鎖和打壓,試圖遏制我國科技崛起的腳步。然而,事情突然反轉了,壓力往往能轉化為動力,我國科技企業並未因此退縮,反而加快了自主研發的腳步。近日,國產新一代光量子電腦首次亮相,無疑是我國科技領域的璀璨明星,照亮了未來科技發展的道路。

驚艷首秀,實力彰顯

這台名為「TurningQ Gen2大規模可程式光量子計算系統」的設備吸引了無數目光。它外觀猶如一台對開門冰箱,看似普通,卻蘊含著巨大的科技能量。該設備主要由量子光源單元、量子計算單元、探測單元三大核心組件所構成,每個組件都凝聚著科研人員的心血與智慧。

據圖靈量子相關負責人介紹,這台光量子電腦具備56光子的量子優越性等級規模。在求解某些特定問題時,其運算能力幾乎可媲美頂尖超級電腦——天河二號。天河二號作為我國超算的傑出代表,曾多次在全球超算排行榜上名列前茅,其強大的運算能力為許多科學研究和工程領域提供了有力支持。而如今,國產光量子電腦在特定議題上的運算能力與之相當,這無疑是我國在量子運算領域的重大突破。

更令人驚訝的是,與天河二號相比,這台光量子電腦在佔地面積和能耗方面具有明顯優勢。超算通常需要龐大的機房和大量的能源供應來維持運行,而光量子電腦僅相當於一台冰箱的大小,大大節省了空間和能源。這不僅降低了使用成本,也為量子電腦的廣泛應用提供了可能。

關鍵裝置,同步亮相

在展會現場,與這台量子電腦實現產業化的關鍵裝置-基於110奈米製程的光子晶片也同步亮相。光子晶片是光量子電腦的核心元件之一,它利用光子進行資訊傳輸和處理,具有高速、低能耗等優點。基於110奈米製程的光子晶片的出現,標誌著我國在光子晶片製造技術上取得了重要進展。

光子晶片的研發和生產需要高精度的製造流程和先進的設備。我國科學研究人員經過不懈努力,攻克了一個又一個技術難題,成功研發了基於110奈米製程的光子晶片。這項成果不僅為我國光量子電腦的產業化奠定了堅實基礎,也為我國在光子晶片領域的發展贏得了先機。

未來展望,潛力無限

隨著量子運算技術的不斷進步,CPO光電共封裝以及相關微納加工製程的進一步優化,量子電腦有望在大幅提升運算能力的同時,將尺寸縮小到筆記型電腦大小。這一前景令人振奮,它將為量子電腦的普及和應用帶來革命性的變化。

在科學研究領域,量子電腦將為複雜科學問題的求解提供強大的工具。例如,在量子化學、材料科學、生物醫學等領域,量子電腦可以模擬分子的結構和性質,加速新藥研發和材料設計的進程。在金融領域,量子電腦可以用於風險評估、投資組合最佳化等,提高財務決策的準確性和效率。在人工智慧領域,量子電腦可以加速機器學習和深度學習演算法的訓練,推動人工智慧技術的發展。

此外,量子電腦的廣泛應用也將帶動相關產業的發展。從光子晶片的製造到量子電腦的組裝和調試,再到量子運算軟體的開發和應用,都將形成一個龐大的產業鏈。這將為我國經濟發展注入新的動力,創造大量的就業機會。

自主創新,砥礪前行

國產新一代光量子電腦的首秀,是我國科技自主創新的另一個重大成果。在面對美國的封鎖和打壓時,我國科技企業並沒有選擇依賴進口,而是堅定地走上了自主研發的道路。這種自主創新的精神是我國科技發展的核心動力。

然而,我們也要清醒地體認到,我國在量子運算領域與世界先進水準仍有一定的差距。在未來的發展中,我們需要持續加大科研投入,培養更多的科技人才,加強國際合作與交流,不斷提升我國在量子運算領域的核心競爭力。

國產新一代光量子電腦的首秀,是我國科技發展史上的重要里程碑。它讓我們看到了我國在量子運算領域的巨大潛力和廣闊前景。相信在不久的將來,量子電腦將走進我們的生活,為人類社會的發展帶來更多的驚喜和改變。讓我們共同期待這一天的到來,為我國科技的輝煌未來而奮鬥!

中國原創軍事資源:https://www.163.com/dy/article/K2OHRN700540MBP1888.html

Quantum Technology Has Great Potential For Future Chinese Warfare Success

量子科技對中國未來戰爭的成功有巨大潛力

現代英語:

On October 16, the Political Bureau of the CPC Central Committee held a collective study on the research and application prospects of quantum technology. General Secretary Xi Jinping emphasized that we must fully recognize the importance and urgency of promoting the development of quantum technology, strengthen the strategic planning and systematic layout of quantum technology development, grasp the general trend, and take the initiative.

As the mystery of quantum is unveiled, people are increasingly aware that quantum technology represents the future of human society, is a strategic field that concerns national security and high-quality social and economic development, is a major disruptive technological innovation that impacts and reconstructs the traditional technological system, and will lead a new round of scientific and technological revolution and industrial transformation. It has a bright future.

The United States, the European Union, Australia, Russia and other world powers and regional organizations have been conducting research on quantum technology for many years and have done a lot of preliminary work in the field of quantum information. my country has also pressed the “accelerator” in the development of quantum technology.

Quantum thinking opens up your mind

Do you think quantum technology is very high-end, sounds vague, and even a bit illusory? Not only do you think so, but even Niels Bohr, the founder of quantum physics, once said: “If someone is not confused by quantum mechanics, he does not understand it.”

In fact, we live in the quantum world every day. Quantum is the basic unit of matter: if you divide the physical quantity piece by piece until it is small enough that it cannot be divided any further, it is a quantum. For example, a photon is the basic unit of light energy and it is impossible to divide it into half a photon.

So why can’t we feel its existence at all, and even find it difficult to understand the phenomena of the quantum world? This is because the scale we are familiar with is too different from the quantum scale. For example, a table is on the meter scale, a hair is on the millimeter scale, and the object of quantum physics is tens of millions or even hundreds of millions times smaller than the scale of a hair. If a person is reduced to a size of tens of millions of times the diameter of a hair, then the world in which humans live will follow a completely different set of rules.

In the Newtonian classical thinking model that we are familiar with, “the world is accurately measurable”, everything is an objective, precise, mechanically connected, describable and quantifiable mathematical model, just like you can calculate and analyze the whole process of a wooden block sliding down a slope with a pen. However, several key words of quantum thinking may subvert all this:

Keyword 1: “Probability”. The world is jumpy, unpredictable, and uncertain, or in other words, it is extremely complex and interconnected like the butterfly effect.

Keyword 2: “Overlap”. The world is “plural”. Before we make a choice, the choices are infinite and changing. Only when we finally make a choice, other possibilities “collapse”. At the same time, this choice provides us with infinite options for the next choice.

Keyword three: “Observer”. This is even weirder – if you observe a quantum system, it changes immediately! In other words, the state of the quantum depends on the observer.

Einstein described the quantum world as “ghost-like”. There, many natural laws that people firmly believe in will become invalid, and the perspective of understanding the universe will be completely changed. Before opening the door to the quantum world, you need to abandon all the common sense you have acquired in the macroscopic world, replace it with quantum thinking, keep your mind open, and be ready to exclaim: “How is this possible?!”

A tiny quantum has brought about two revolutions

With quantum thinking, you may understand the two “unique skills” of quantum: one is “clone” – quantum superposition, a quantum can exist in several states at the same time; the other is “remote telepathy” – quantum entanglement, a pair of entangled quantum is like a pair of twins with telepathy. At the same time, quantum is also very “weird” – indivisible and non-cloneable.

It is precisely these magical properties that enable such tiny quantum to burst out with huge energy, setting off two technological waves in human history.

As early as 1900, German physicist Planck proposed the concept of quantum, which split the “hard core” of the real world and ushered in the quantum era. A group of talented scientists such as Heisenberg, Schrödinger, and Bohr basically completed the theoretical framework of quantum mechanics.

Quantum mechanics is one of the greatest scientific discoveries of the last century. Based on quantum mechanics, modern technologies such as transistors, lasers, nuclear fusion, mobile communications, and global positioning systems have emerged, allowing humans to enter the information age, and then developed into the ubiquitous computers and the Internet, creating further prosperity for society. This is the first quantum revolution.

In the 1980s, quantum information technology was born in the information field based on quantum mechanics. For example, quantum computers, quantum cryptography, quantum sensors, etc., not only are based on quantum mechanics, but the devices themselves also have quantum world characteristics such as superposition, entanglement, non-locality, and non-cloning, breaking through the physical limits of classical technology and finding new research directions. The birth of quantum information technology is called the second quantum revolution.

Quantum technology is one of the most cutting-edge technologies at present. It is moving out of the laboratory and achieving unprecedented leapfrog development in various fields. Some even predict that, like steam engines, electricity and computers, quantum technology will become the symbol of the fourth technological revolution.

“A pair of twin stars rises”

Academician Guo Guangcan of the University of Science and Technology of China once said vividly: “The computing power of quantum computers compared with electronic computers is equivalent to the computing power of electronic computers compared with abacus.” The computers we use use the two states of bits 0 and 1 as information processing units, and can only process a single state bit that is either 0 or 1 at a time; while the quantum computing processing unit is a quantum bit, which can process 0 and 1 at the same time due to the superposition effect, just like Sun Wukong can split into dozens of bodies to fight monsters. If a light quantum computer is made using quantum technology, the computing time of a classical computer that takes hundreds of thousands of years will be shortened to a few seconds.

Therefore, as the number of quantum bits continues to increase, the more “clones” there are, the faster the calculation will be. When the number of quantum bits reaches 50, that is, 250 states exist simultaneously, how huge is this number? Converted into the thickness of a 0.1 mm A4 paper folded in half 50 times, this number is 100 million kilometers, which is close to 3/4 of the distance from the earth to the sun. When a quantum computer can reach 100 bits, it may be 100 billion times faster than a supercomputer in some directions.

How should we use such powerful computing power?

First, large-scale, high-dimensional computing problems that were difficult or impossible to solve in the past can now be quickly solved, such as typical search problems and combinatorial optimization problems, such as optimal route selection, code cracking, network threat prediction, urban traffic planning, and so on.

Secondly, artificial quantum systems can be used to simulate natural quantum systems to explore the dynamic properties of molecules. For example, once we simulate and analyze the mechanism of high-temperature superconductivity, we can design some new superconducting materials. This will open a new door for drug design, new material exploration, weather forecasting, space exploration, chemical engineering and other fields, and has great economic and social value.

What is particularly worth looking forward to is that artificial intelligence and quantum technology will coexist and evolve at the same time, “rising like a pair of twin stars.”

Gordon Moore, the founder of Intel, proposed the famous Moore’s Law: Computer computing speed doubles every 18 months or so. Without the exponential growth of silicon transistors in chips and the increasing computing power, artificial intelligence would not have achieved such remarkable results in recent years. However, today, the size of a transistor is much smaller than a flu virus, approaching the physical limit, and computer computing speed is about to reach a “bottleneck”, and artificial intelligence may face a “cold winter”.

Scientists are convinced that only quantum computing, which goes beyond classical computing, can be a strong backing for artificial intelligence to break through its limits. In particular, machine learning technology, which relies on large-scale data processing, will benefit greatly from quantum computing and generate unlimited possibilities; at the same time, artificial intelligence technology can realize self-calibration and evaluation of quantum computing, and evolve with it.

In a foreseeable period, quantum computing will gradually transition from solving optimization problems, quantum encryption communications, and molecular structure research to integrating artificial intelligence, and infiltrating various industries such as smart manufacturing, smart logistics and smart retail, and smart finance. Cloud services will be a new form of service that quantum computing can provide.

Quantum communication “weaves” quantum internet

This is the most amazing phenomenon in the quantum world: independent particles can be completely “entangled” together. Even if the two particles are at the two ends of the universe, both sides can “sense” each other’s state; as long as the state of one of the particles changes, the state of the other particle will also change instantly.

At the same time, quantum is in multiple possible superposition states, and its true state cannot be determined before it is observed. We can achieve absolutely secure communication with subversive significance by constructing particles with quantum entanglement.

With the help of the magical properties of quantum, scientists have found an unbreakable code, the only unconditionally secure encryption method currently available to humans, and the most critical link in quantum communication – quantum key distribution.

Quantum keys use single photons as carriers. Once an eavesdropper takes action, the first layer of “firewall” will be triggered – the quantum state of particles will change. The eavesdropping behavior will be immediately discovered by the user transmitting the information, and the sender and receiver will immediately stop using the key to encrypt the information content. As a “spy”, since quantum state particles cannot be copied, can’t you just intercept and measure them directly? Sorry, doing so will trigger the second layer of “firewall” – the uncertainty principle. Even if you are intercepted by an eavesdropper, there is no way to get the correct information. Quantum satellites are the most promising way to achieve ultra-long-distance quantum communication. In August 2016, the world’s first quantum science experimental satellite “Mozi” was successfully launched in China.

Quantum communication technology and quantum resources have given rise to a new functional network – quantum Internet. It will bring about a leap forward in network security, computing and science, and has broad application prospects: in addition to achieving unconditional secure communication, it can also connect multiple quantum computers to build a distributed quantum computing system, forming a large-scale computing capability that a single quantum computer cannot achieve; forming a sensor network to increase the accuracy of navigation networks such as the global positioning system from the meter level to the millimeter level; connecting optical telescopes thousands of kilometers apart to obtain a resolution equivalent to that of a monocular telescope of the same diameter, and so on.

In May 2020, the European Union stated that it would promote the integration of quantum communications with traditional network infrastructure and applications, develop satellite-based quantum cryptography that can be used for global secure key distribution, and lay the foundation for the future “quantum internet” vision.

China Military Network Ministry of National Defense Network
Friday , November 13, 2020

現代國語:

10月16日,中共中央政治局就量子科技研究和應用前景舉行集體學習。習近平總書記強調,要充分認識推動量子科技發展的重要性和迫切性,加強量子科技發展戰略規劃和系統佈局,把握大趨勢,下好先手棋。

揭開量子的神秘面紗,人們愈來愈認識到,量子科技代表著人類社會未來,是事關國家安全和社會經濟高品質發展的戰略領域,是對傳統技術體系產生衝擊、進行重構的重大顛覆性技術創新,將引領新一輪科技革命和產業變革,可謂「前途」無量。

對於量子科技的研究,美國、歐盟、澳洲、俄羅斯等世界大國和區域組織已持續多年,在量子資訊領域都做了大量前期部署工作。我國在發展量子科技上,也按下了「加速鍵」。

量子思維讓腦洞大開

您是不是覺得量子科技非常高冷,聽起來似懂非懂,甚至有點亦真亦幻?不光您這麼想,連量子物理奠基人尼爾斯·玻爾都曾說過:“如果誰不對量子力學感到困惑,他就沒有理解它。”

其實,我們每天都生活在量子世界裡。量子是物質的基本單元:如果把物理量一份一份往下分,分到無法再分的小塊,就是量子。例如,光量子就是光能量的基本單元,不可能再分成半個光量子。

那麼,我們為何完全感覺不到它的存在,甚至很難理解量子世界的現象?這是因為我們熟悉的尺度和量子尺度相差太大。例如,一張桌子是米尺度,一根頭髮絲是毫米尺度,而量子物理學的研究對像比頭髮絲的尺度還小幾千萬倍甚至幾億倍。如果人類縮小成頭髮直徑的幾千萬分之一大小,那麼人類生活的世界將完全遵循另一套規則。

在我們熟知的牛頓經典思維模式下,“世界是測得準的”,一切都是客觀的、精準的、機械聯繫的、可描述可量化的數學模型,好比您提起筆就能計算分析出一個木塊從斜坡滑落的全過程。但量子思維的幾大關鍵字,可能顛覆這一切——

關鍵字一:「機率」。世界是跳躍的、不可預測的、測不準的,或者說是像蝴蝶效應那樣異常複雜關聯的。

關鍵字二:「重疊」。世界是「複數」的,在我們選定之前,選擇是無限的和變化的。直到最終選定了,其他可能性才「崩塌」。同時,這個選擇為我們下一次選擇又提供了無限的選項。

關鍵字三:「觀測者」。這個就更加詭異了——如果您去觀測測量子系統,它立刻就變了!換句話說,量子的狀態取決於觀測者。

愛因斯坦形容量子世界「如幽靈一般」。在那裡,人們堅信不疑的許多自然法則都會失效,理解宇宙的角度會徹底改變。在推開量子世界大門前,您需要拋棄在宏觀世界所獲得的一切常識,換上量子思維,保持腦洞大開狀態,並隨時準備驚呼:“這怎麼可能?!”

小小量子掀起兩次革命

有了量子思維,也許您就好理解量子所擁有的兩個「絕技」了:一是「分身術」——量子疊加,一個量子可同時存在好幾種狀態;另一個是「遠程心靈感應」——量子糾纏,一對糾纏的量子就好像一對有心靈感應的雙胞胎一樣。同時,量子還很「古怪」——不可分割和不可複製。

正是具備這些神奇特性,使如此微小的量子爆發出巨大能量,在人類歷史上掀起兩波科技浪潮。

早在1900年,德國物理學家普朗克提出量子概念,現實世界的「硬核」就此被劈開,隨之開啟量子時代。海森堡、薛丁格、玻爾等一群天才科學家基本上完成了量子力學的理論架構。

量子力學是上世紀最偉大的科學發現之一。基於量子力學,才有了晶體管、雷射、核融合、行動通訊、全球定位系統等現代技術,使人類進入資訊時代,繼而發展產生了當下無處不在的電腦和互聯網, 造就了社會進一步繁榮。這便是第一次量子革命。

在1980年代,基於量子力學,在資訊領域誕生了量子資訊技術。例如量子電腦、量子密碼、量子感測等,不僅其原理是量子力學,裝置本身也具備了疊加、糾纏、非局域性、不可複製性等量子世界特性,突破了經典技術的物理極限,找到了新的研究方向。量子資訊科技的誕生稱為第二次量子革命。

量子科技是目前最前沿的科技之一,它正走出實驗室,在各個領域實現前所未有的跨越式發展。甚至有人預言,就像蒸汽機、電力和電腦一樣,量子科技將成為第四次科技革命的象徵。

“升起一對雙子星”

中國科技大學郭光燦院士曾經形像地說:「量子電腦的運算能力同電子計算機相比,等同於電子計算機的運算能力同算盤相比。」我們所使用的計算機,是以比特0和1兩個狀態作為資訊處理單元,一次只能處理一個非0即1的單一狀態比特;而量子計算處理單元是量子比特,由於疊加效應,一次只能處理一個非0即1的單一狀態比特;而一個量子計算如果利用量子技術製造一台光量子計算機,那麼經典計算機幾十萬年的運算時間將縮短為幾秒鐘。

所以,當量子位元數不斷增加,「分身」就越多,運算速度就會呈指數級成長。當量子位元達到50個,也就是250種狀態同時存在時,這個數字究竟巨大到什麼程度?換算成一張0.1毫米的A4紙對折50次的厚度,這個數字是1億公里,接近從地球到太陽距離的3/4。當量子電腦能達到100個位元時,在某些方向就可能比超級電腦快百億億倍了。

這麼強大的算力我們該怎麼使用?

首先,過去很難或無法解決的大規模、高維度計算難題,這下可以快速解決了。例如典型的搜尋問題、組合最佳化問題,諸如最優路線選擇、密碼破解、網路威脅預測、城市交通規劃,等等。

其次,可利用人造量子系統模擬自然量子系統,進而探索分子的動力學性質。例如高溫超導現象,一旦我們把高溫超導的機制模擬分析出來,就能設計出一些超導新材料。這將為藥物設計、新材料探索、天氣預測、太空探索、化學等領域打開一扇新的大門,具有重大經濟和社會價值。

特別值得期待的是,人工智慧與量子科技將相生相伴、同時進化,「升起一對雙子星」。

英特爾的創辦人戈登·摩爾提出了著名的摩爾定律:每18個月左右,電腦的運算速度就會增加一倍。如果沒有晶片中矽電晶體的指數級成長、實現算力越來越強,近年來人工智慧不可能成績斐然。然而今天,一枚晶體管的尺寸已遠小於一個流感病毒,逼近物理極限,計算機計算速度即將陷入“瓶頸”,人工智能或將面臨“寒冬”。

科學家確信,只有超越經典計算的量子運算,才能成為人工智慧突破極限的強大後盾。特別是依賴大規模資料處理的機器學習技術,將大大受益於量子運算,產生無限可能;同時人工智慧技術可實現對量子計算的自校準評估,相伴進化發展。

在一個可預測的期間,量子運算將逐步從解決最佳化問題、量子加密通訊、分子結構研究,過渡到融入人工智慧,滲透進智慧製造、智慧物流與智慧零售、智慧金融等各產業。而雲端服務將是量子運算可提供的服務新形態。

量子通訊「編織」量子互聯網

這是量子世界最奇妙的現象:相互獨立的粒子可以完全「糾纏」在一起,就算這兩個粒子分別處於宇宙的兩端,雙方都能「感應」到對方的狀態;只要其中一個粒子的狀態發生變化,另一個粒子也會瞬間發生狀態改變。

同時,量子處於多種可能的疊加狀態,在對其觀測前,無法確定其真實狀態。我們可透過建構有著量子糾纏態的粒子,實現具有顛覆意義的絕對安全通訊。

借助量子的神奇特性,科學家們已尋找到無法被破解的密碼、人類目前唯一無條件安全的加密方式、量子通訊中最關鍵的一環——量子金鑰分發。

量子金鑰採用單光子作為載體,竊密者一旦行動,就會觸發第一層「防火牆」——量子態的粒子改變。竊聽行為馬上會被傳遞訊息的用戶發覺,收發雙方立即不再使用該金鑰來加密訊息內容。作為“竊取者”,既然量子態的粒子不能被複製,截取後直接測量不就可以了嗎?對不起,這麼做會觸發第二層「防火牆」——測不準原理。就算是被竊聽者截住,也沒有辦法得到正確資訊。量子衛星是實現超遠距離量子通訊最有希望的途徑。 2016年8月,世界首顆量子科學實驗衛星「墨子號」在中國發射成功。

量子通訊技術和量子資源,催生了新型功能網路—量子網路。它將帶來網路安全、計算以及科學上的飛躍,應用前景廣闊:除了可實現無條件安全通信外,還可連接多個量子計算機,構建分佈式量子計算系統,形成單個量子計算機無法實現的規模計算能力;形成傳感器網絡,將全球定位系統等導航網絡的精度從米級提高到毫米級;連接相距數千公里的光學望遠鏡,將全球定位系統等導航網絡的精度從米級提高到毫米級;連接相距數千公里的光學遠鏡,可獲得遠分辨率距,可獲得一個同等的望遠鏡等;連接相距數千公里的光學遠鏡,可獲得遠分辨率,可獲得遠1分辨率。

2020年5月,歐盟表示,將推動量子通訊與傳統網路基礎設施和應用結合,開發可用於全球安全金鑰分發、基於衛星的量子密碼,為未來「量子網路」遠景奠定基礎。

中國軍網 國防部網
2020年11月13日 星期五

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2020-11/13/content_275729888.htm