Category Archives: #Chinese #Quantum #technology

Chinese Military Analysis of Developing Intelligent Command and Information Systems

中國軍方對發展智慧指揮資訊系統的分析

現代英語:

The era of intelligent warfare has begun. Intelligent command and information systems will become the “central nervous system” of future intelligent combat command and control, serving as a supporting means for intelligent combat command and control. Accelerating the construction of intelligent command and information systems is an inherent requirement for the development of military intelligence. Only by clarifying the essence of intelligent command and information system development, grasping the key points of intelligent command and information system research and development, and exploring the essentials of intelligent command and information system development can we better promote the construction and development of intelligent command and information systems and gain a competitive advantage in future intelligent warfare.

Clarify the key points of the development of intelligent command and information systems

Intelligent command and information systems are an inevitable choice in the development of warfare towards informationized and intelligent warfare, a natural outcome of the technological revolution, and a contemporary demand for the intelligent development of the military. Clarifying the key points of intelligent command and information system development helps to grasp the direction of its construction and establish long-term goals.

Promoting the intelligent evolution of warfare. In future intelligent warfare, the battlefield situation will change rapidly and the battlefield environment will be complex and harsh. In order to gain the initiative on the battlefield, “intellectual superiority” will become the new commanding height. Intelligent command and information systems are undoubtedly an important support for future combat command and operations. Their intelligent development can help promote the intelligent evolution of warfare and is an important foundation for gaining the initiative and seeking victory in intelligent warfare.

Supporting Intelligent Innovation in Combat Concepts. Future intelligent warfare requires corresponding combat command concepts, and intelligent command information systems are a crucial foundation for the practical application of these concepts, serving as the fertile ground for their innovation and development. New intelligent combat command concepts such as human-machine hybrid command formations, data-driven command activities, open development command models, and intelligent convergence command processes all rely on the support of intelligent command information systems. These systems will act as an extension of the human brain, breaking through the physiological limits of the human body and achieving the organic integration of the art of combat command and intelligent technology.

Promoting the intelligent transformation of combat methods. The widespread application of artificial intelligence technology in the military field has brought about significant changes in the mechanisms of combat victory. Intelligence has surpassed firepower and information power to become the primary factor determining the outcome of war. The development and construction of intelligent command and control information systems will promote the transformation of combat methods towards intelligence, shifting combat methods from the “combat network + precision-guided weapons” of the information age to the “intelligent Internet of Things + manned/unmanned combat platforms” of the intelligent age. Correspondingly, the basic combat style is evolving from “network-centric warfare” to “cognition-centric warfare”.

Focus on the key points of intelligent command and information system research and development

Command and information systems are a product of the information warfare era. With the rapid development of military intelligence and the research and practical application of intelligent warfare mechanisms, the intelligent upgrading and construction of command and information systems is urgently needed. Emphasis should be placed on key functional development aspects to create a completely new intelligent command and information system.

“Super-brain-based” decision-making. In future intelligent warfare, the battlefield information data is massive and complex, and commanders are easily overwhelmed by the “sea of ​​information,” leading to confusion and affecting command and decision-making. With the emergence of intelligent decision-making technology and “cloud brains” and “digital advisors,” a new decision-making model based on the collaboration of “human brain + artificial intelligence” is quietly taking shape. Intelligent command information systems will break through the limits of human intelligence, acting as an extension of the human brain to assist commanders in their work, transforming war decision-making from purely human brain-based decision-making to super-brain-based command and decision-making combining “human brain + artificial intelligence.”

“All-dimensional” situational awareness. Future intelligent warfare will be characterized by multi-dimensional space, diverse forces, varied tactics, and accelerated pace. A comprehensive and flexible grasp of the battlefield situation will be fundamental to commanders’ decision-making. The integrated, intelligent, and dynamic presentation of the all-dimensional battlefield situation across multiple domains is an inevitable requirement for the development of command information systems. Command information systems are expanding their perception, understanding, integration, and prediction of battlefield situations, such as target identification, threat level assessment, operational action prediction, and future battle trajectory forecasting, from land, sea, air, space, electromagnetic, and cyberspace to the cognitive and social domains, achieving “all-dimensional” situational awareness.

“Intelligent connectivity” is crucial for future intelligent warfare. This will involve numerous intelligent command and control platforms and intelligent weapon platforms, connected by intelligent information and communication systems. Like the nerves and blood vessels of the human body, intelligent information and communication systems act as a link and lubricant in intelligent warfare. Therefore, it is essential to establish a comprehensive, uninterrupted intelligent information network to support the connectivity and control of intelligent equipment, enabling intelligent optimization of the network structure, intelligent reorganization to withstand network damage, and intelligent anti-interference capabilities. This will ensure intelligent collaborative operations between platforms and maximize overall combat effectiveness.

“Unmanned” Autonomous Collaboration. The extensive use of drones in recent local conflicts worldwide, playing a crucial role in determining the course of war, has attracted widespread attention. Unmanned weaponry is the material foundation of intelligent warfare, leading to disruptive combat styles such as intrusive lone-wolf operations, manned/unmanned collaborative system sabotage operations, independent operations by unmanned system formations, and drone swarm operations. While unmanned warfare is human-led, with machines granted a degree of autonomy from the backend, enabling unmanned operations on the front lines, the unmanned battlefield is constantly evolving. Disruptions to human-machine collaboration will become commonplace. Therefore, the command and control systems of unmanned intelligent equipment platforms must be more intelligent, capable of autonomous collaborative operations based on operational objectives.

“Proactive” information defense. Intelligent warfare will inevitably face diverse and multi-dimensional information attacks from powerful adversaries. The level of information security protection capabilities directly affects the outcome of the battle for “intellectual dominance” on the battlefield and is a key aspect of the construction of intelligent command information systems. Therefore, proactive measures should be taken to actively formulate and improve network protection strategies, enrich intrusion detection capabilities and authentication and identification methods, strengthen the application of advanced information security technologies, enhance the anti-interference and anti-interference capabilities of various wireless transmission methods, and build strong intelligent traceability and countermeasure capabilities to effectively curb information attacks.

Exploring the key points of intelligent command and information system development

The development of intelligent command and information systems is not merely a matter of technological innovation; it also requires further liberating our thinking and updating our concepts. To advance the development of intelligent command and information systems, we must change the traditional approach of simply adding hardware, building large networks, and collecting and storing various types of data. We must break through existing hierarchical structures, create open and service-oriented systems, and target the needs of intelligent combat command and action, exploring and researching the key aspects of intelligent command and information system development.

Innovation Concept. Guided by innovative thinking, and drawing on the development strategies of intelligent command and information systems for building a strong military, we will explore a development path with our own characteristics, tailored to actual needs. We must break away from traditional “chimney” approaches, adhere to top-level design and overall planning of the command and information system, unify interfaces, protocols, and standards, and form an open and sustainable system architecture. We must adhere to a system development approach that combines research, development, and application, formulating short-term, medium-term, and long-term development strategies to standardize the direction of system construction and development. We must adhere to iterative upgrades and optimization strategies to continuously improve the intelligence level of various subsystems, including command and control, intelligence reconnaissance, communication, information warfare, and comprehensive support, ensuring the continuous and healthy development of the intelligent command and information system.

Focusing on Key Capabilities. Concentrating on building key capabilities of intelligent command and information systems is crucial for intelligent warfare to leverage intelligence to achieve victory, and is key to gaining the “right to win” in intelligent warfare. Algorithms, computing power, and data are not only the intrinsic driving force and support for the development of artificial intelligence, but also the core capability requirements and advantages of intelligent command and information systems. The development of intelligent command and information systems must adhere to algorithmic innovation research to improve the system’s cognitive, speed, and decision-making advantages; accelerate the research and development of next-generation computers, such as quantum computers, to provide stronger computing power support for intelligent command and information systems; and deeply mine the deeper and broader information value from massive combat data resources to seek the initiative in victory.

Collective Efforts to Overcome Challenges. The construction and development of intelligent command and information systems is one of the major projects in military intelligence. It is a complex and collaborative project involving multiple fields, disciplines, departments, and units. The construction and development of intelligent command and information systems must adhere to the spirit of collective wisdom, collaborative problem-solving, and pioneering innovation. It should target strategic and forward-looking fields such as sensors, quantum information, network communication, integrated circuits, key software, big data, artificial intelligence, and blockchain. It should be driven by high-tech advancements and the demands of intelligent warfare, conducting in-depth research and exchanges across multiple fields, levels, and forms to continuously break through, innovate, and upgrade, making the functions of intelligent command and information systems more complete and intelligent.

Collaborative Development. To deeply promote the construction and development of intelligent command and information systems, it is essential to fully absorb advanced local technological achievements and integrate into the global trend of artificial intelligence innovation. Currently, artificial intelligence technology is booming worldwide, accumulating strong development momentum and technological advantages. Artificial intelligence technology has strong versatility in application, and its technological achievements have broad prospects for transformation and application, making it an important pathway to the construction and development of intelligent command and information systems. It is necessary to research and formulate general technical standards, break down barriers, overcome obstacles, and facilitate military-civilian cooperation to achieve the sharing and linkage of technological achievements. Through collaboration, it is also crucial to cultivate and shape new types of military personnel, enabling them to continuously adapt to the needs of various positions under intelligent conditions and fully leverage the effectiveness of intelligent command and information systems.

現代國語:

智慧化戰爭時代序幕已經拉開,具有智慧化特徵的指揮資訊系統將成為未來智慧化作戰指揮的“中樞神經”,是智慧化作戰指揮控制的支撐手段。加速智慧化指揮資訊系統建設是軍事智慧化發展的內在要求,只有明晰智能化指揮資訊系統發展要義,抓住智慧化指揮資訊系統研發要點,探索智能化指揮資訊系統發展要津,才能更好地推動智能化指揮資訊系統建設發展進程,贏得未來智能化作戰制勝先機。

明晰智能化指揮資訊系統發展要義

智慧化指揮資訊系統是戰爭形態朝向資訊化智能化戰爭發展的必然選擇,是科技革命發展的必然結果,也是軍事智能化發展的時代訴求。明晰智能化指揮資訊系統發展要義,有助於把脈智能化指揮資訊系統建設方向,確立系統發展長遠目標。

助推戰爭形態智能化演進。未來智能化作戰,戰場形勢瞬息萬變、戰場環境復雜嚴酷,要想在戰場上取得主動,「制智權」成為新的製高點,而智能化指揮資訊系統無疑是未來作戰指揮和行動的重要支撐手段,其智能化發展可助推戰爭形態向智能化演變,是智能化作戰贏得先機、謀求勝利的重要依托。

支撐作戰理念智能化創新。未來智慧化作戰,需要與之相適應的作戰指揮理念,而智慧化指揮資訊系統是作戰指揮理念實踐運用的重要依托,是智慧化作戰指揮理念創新、發展的土壤。如人機混合指揮編組、數據驅動指揮活動、開放發展指揮模式、智能聚力指揮過程等智能化作戰指揮新理念,都離不開智能化指揮信息系統的支撐,智能化指揮信息系統將作為人腦的外延,突破人體生理極限,實現作戰指揮藝術和智能技術的有機融合。

促進作戰方式智能化轉變。人工智慧技術在軍事領域的廣泛應用,使得作戰制勝機理發生重大變化,智慧超越火力、資訊力,成為決定戰爭勝負的首要因素。智慧化指揮資訊系統建設發展將促進作戰方式向智慧化轉變,使得作戰方法從資訊時代的「作戰網絡+精確制導武器」向智慧時代的「智慧物聯網+有人/無人作戰平台」轉變、基本作戰樣式相應地從「網絡中心戰」向「認知中心戰」演進。

抓住智慧化指揮資訊系統研發點

指揮資訊系統是資訊化戰爭時代的產物,隨著軍事智慧化的快速發展、智慧化作戰制勝機理的研究和實踐運用,指揮資訊系統智慧化升級建設迫在眉睫。應突顯功能研發點,打造全新智慧化指揮資訊系統。

“超腦化”輔助決策。未來智能化作戰,戰場資訊數據量龐大且複雜多變,指揮員在指揮過程中易陷入「資訊海洋」而導致資訊迷茫,影響指揮決策。隨著智慧輔助決策技術和「雲端大腦」「數字參謀」的出現,以「人腦+人工智慧」協作為基本方式的新決策模式正悄悄形成。智慧化指揮資訊系統將突破人類智力極限,作為人腦的外延,輔助指揮員工作,使戰爭決策由單純的人腦決策發展為「人腦+人工智慧」的超腦化指揮決策。

「全維化」態勢感知。未來智能化作戰,空間多維、力量多元、樣式多樣、節奏加快趨勢突出,全面靈動地掌握戰場態勢成為指揮員決策的基礎,多域一體、智能動態地呈現全維戰場態勢成為指揮資訊系統建設發展必然要求。指揮資訊系統對諸如目標識別、威脅等級估計、作戰行動預判和未來戰況走向預估等戰場態勢的感知、理解、融合和預測,正在從陸、海、空、天、電磁、網絡等空間擴展至認知域、社會域,實現「全維化」態勢感知。

「智聯化」網絡通聯。未來智慧化作戰將使用大量智慧指揮控制平台和智慧化武器平台,而連接指揮控制平台和武器平台的必然是智慧化的資訊通訊系統。如同人體的神經和血管,智慧化的資訊通訊系統在智慧化作戰中扮演連結和潤滑作用。因此,要建立全維度覆蓋、不間斷的智慧化資訊網絡,支撐智慧化裝備的連結和控制,形成網絡結構智能優化、網絡抗毀智能重組以及智能抗干擾能力,以確保平台間智能化的協同作戰,發揮最佳的整體作戰效能。

「無人化」自主協同。近期世界局部沖突中,無人機大量運用並起到決定戰爭走向的重要作用,引起了各方的廣泛關注。無人化武器裝備是智慧化作戰的物質基礎,並依此形成了顛覆式作戰樣式,如侵入式獨狼作戰、有人/無人協同體系破擊作戰、無人系統編隊獨立作戰、無人機蜂群集群作戰等。無人作戰雖是由人主導,並在後台賦予機器一定程度的自主行動權限,從而實現機器在一線無人作戰行動。然而無人作戰戰場瞬息萬變,人機協同被破壞將成為常態,無人智慧化裝備平台指控系統必須更加智慧,要能根據作戰目的進行自主協同作戰。

“主動化”訊息防禦。智慧化作戰必將面臨強敵全維多樣的資訊攻擊,資安防護能力的高低,直接影響戰場「制智權」鬥爭的勝負,是智慧化指揮資訊系統建設的關鍵環節。因此,應主動作為,積極制定及完善網絡防護策略,豐富入侵檢測能力及認證識別手段,加強資訊安全高新技術運用,強化各類無線傳輸方式的抗干擾、抗介入能力,建強智能化溯源反制能力,有效遏止資訊攻擊。

探索智慧化指揮資訊系統發展要津

智慧化指揮資訊系統發展不單單是技術的革新,更需要進一步解放思想、更新理念。推動智慧化指揮資訊系統發展,要改變傳統添硬體、建大「網」、收集存儲各類數據的思路,突破固有層級設定,打造開放式、服務型系統,瞄準智能化作戰指揮與行動需要,探索研究智能化指揮資訊系統發展要津。

創新理念。堅持以創新的思維理念為指引,借用軍事強國智慧化指揮資訊系統發展思路,結合實際需求,探索具有自身特色的發展道路。要打破傳統「樹煙囪」做法,堅持指揮資訊系統頂層設計和整體規劃,統一介面、協議和標準,形成開放式、可持續發展的系統架構佈局;堅持研建用相結合的系統研發策略,制定近期、中期、長期不同階段發展策略,規範系統建設發展方向;堅持迭代升級、優化持續策略,不斷提升指揮、長期不同階段發展策略,規範系統建設發展方向;堅持迭代升級、優化持續性策略,不斷提升指揮控制、長期不同階段發展策略、各分列系統建設發展方向;堅持版本

聚力關鍵。聚力智能化指揮資訊系統關鍵能力建設,是智慧化作戰以智聚優、以智制勝的重要依托,是智慧化作戰取得「制勝權」的關鍵。演算法、算力、數據既是人工智慧發展的內在動力和支撐,也是智慧化指揮資訊系統的核心能力要求和優勢。智慧化指揮資訊系統發展要堅持演算法創新研究,提高系統認知優勢、速度優勢和決策優勢;加快量子計算機等為代表的下一代計算機研發,為智能化指揮信息系統提供更強的算力支持;深度挖掘海量作戰數據資源中更深層次、更廣維度信息價值,謀求制勝先機。

集智攻關。智慧化指揮資訊系統建設發展是軍事智慧化的主要工程之一,是一個多領域、多學科交叉,多部門、多單位參與的大融合大聯動的攻堅工程。智慧化指揮資訊系統建設發展要堅持群策群力、集智攻關、開拓創新的精神,瞄準傳感器、量子信息、網絡通信、集成電路、關鍵軟件、大數據、人工智能、區塊鍊等戰略性前瞻領域,堅持高新技術推動、智能化作戰需求拉動,開展多領域、多層次、多形式深度研究交流,更加創新、進一步迭代創新

協作發展。深入推動智慧化指揮資訊系統建設發展,必須充分吸收地方先進技術成果,融入世界人工智慧創新發展的時代洪流。當前,世界人工智慧技術蓬勃發展,積蓄了強大發展動能和技術優勢,人工智慧技術應用通用性強,技術成果轉化應用前景廣闊,是智慧化指揮資訊系統建設發展的重要實現途徑。要研究制定通用技術標準,拆壁壘、破堅冰、暢通軍地合作,實現技術成果共享連結。要透過協作培養塑造新型軍事人才,使其不斷適應智慧化條件下各類崗位需求,充分發揮智慧化指揮資訊系統效能。

來源:解放軍報 作者:李建平 紀鳳珠 李琳 責任編輯:王鳳 2022-08-0x

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/8884917735.html

Chinese Military Research Application of Quantum Technology for Warfare Uses

中國軍方研究量子技術在戰爭中的應用

現代英語:

Quantum technology is considered one of the world-changing technologies of the 21st century and is a cutting-edge field of scientific and technological development, encompassing multiple aspects such as quantum communication, quantum computing, and quantum detection. In recent years, significant progress has been made in the preparation of quantum entangled states, the realization of quantum communication, and quantum computing. The latest advancements in quantum technology have brought revolutionary changes to the military field, and major military forces worldwide are paying close attention to its development and application. To this end, the National Strategy Research Institute of Shanghai Jiao Tong University has conducted a special study on the application of quantum technology in the military field. Excerpts of some of the research results are presented below:

I. Some major applications of quantum technology in the military field

1. Encrypted communication

Quantum communication technology utilizes the quantum entanglement effect for information transmission, offering unparalleled confidentiality compared to traditional communication methods. Quantum key distribution (QKD) is a secure communication technology based on the principles of quantum mechanics, ensuring the security of information during transmission. The U.S. military has been operating an experimental quantum key distribution network since 2003, and the White House and the Pentagon have also installed and are using quantum communication systems.

Research on the application of quantum technology in the military field 2.png

2. Navigation and Positioning

Quantum positioning technology is an emerging navigation and positioning technology that utilizes quantum accelerators and quantum gyroscopes to provide high-precision, lightweight navigation devices. These devices do not require periodic position correction via navigation satellites, significantly improving the autonomous navigation capabilities of military platforms. For example, the Royal Navy found that its submarine’s quantum navigation system had a positioning error of only 1 meter over 24 hours during testing.

Research on the application of quantum technology in the military field 3.png

Scientists are testing quantum gyroscopes.

3. Intelligence reconnaissance

Quantum imaging technology has important applications in military intelligence reconnaissance. It can simultaneously detect and identify multiple targets, offering advantages such as high imaging speed, anti-jamming capabilities, and anti-radiation properties. Furthermore, quantum imaging can precisely track and monitor moving targets, improving the efficiency and accuracy of intelligence gathering.

4. Data Processing

Quantum computing boasts the advantage of parallel processing, enabling the rapid aggregation and analysis of massive amounts of battlefield data. Following the laws of quantum mechanics, quantum computers utilize physical properties such as quantum superposition and entanglement, using qubits (quantum bits) composed of microscopic particles as their basic units, and achieving computational processing through the controlled evolution of quantum states. This will drive the real-time and efficient connection of battlefield IoT and various information terminals, realizing the intelligent and networked upgrade of the battlefield.

5. Battlefield decision support

Quantum technology can enhance the confidentiality of military network information, improve the accuracy of military navigation and positioning, and enable the efficient processing of massive amounts of intelligence, thus providing strong support for battlefield decision-making. The ultrafast computing power of quantum computers can help analyze complex battlefield situations, provide more accurate battlefield simulations and predictions, and assist commanders in making more informed strategic decisions.

The application of quantum technology in the military field will have a significant impact on the future form of warfare and combat methods. As quantum technology continues to develop and mature, its application in the military will become increasingly widespread, providing strong technical support for improving military operational efficiency, ensuring information security, and enhancing battlefield command capabilities.

II. Application Prospects of Quantum Technology in the Civilian Field

1. Quantum communication

Quantum communication is an important application area of ​​quantum technology, utilizing quantum entanglement and the no-cloning principle to achieve secure information transmission. Quantum key distribution (QKD) is a secure communication technology based on quantum mechanics principles, ensuring the security of information during transmission. Through quantum communication, metropolitan quantum communication networks, intercity quantum networks, and even long-distance quantum communication via satellite relay can be realized, providing secure data and information transmission for fields such as finance and government.

2. Quantum computing

Quantum computing leverages the superposition and entanglement properties of qubits to significantly surpass the computational capabilities of traditional computers for specific problems. Quantum computers have potential applications in areas such as cryptography, optimization problems, drug discovery, and materials science. For example, quantum factorization algorithms can break the widely used RSA encryption system, while quantum search algorithms can provide exponential speedups in areas such as database queries.

Research on the application of quantum technology in the military field 4.jpg

The same superconducting quantum computer as the “Zu Chongzhi” series

3. Quantum precision measurement

Quantum precision measurement leverages the hypersensitivity of quantum states to achieve measurement accuracy surpassing classical methods. This can be applied to gravitational wave detection, geophysics, biology, and other scientific fields, as well as improving the accuracy and reliability of navigation systems. For example, new approaches to gravitational wave detection can be achieved through quantum entangled light sources and precise optical clocks, or quantum mechanical nonlocality tests can be conducted over distances on the order of light seconds between the Earth and the Moon.

4. Quantum Simulation

Quantum simulators can simulate complex quantum systems, providing new tools for research in fields such as physics, chemistry, and materials science. Through quantum simulators, scientists can explore complex phenomena such as high-temperature superconductivity and quantum phase transitions, accelerating the development of new materials and drugs.

5. Quantum Networks

Quantum networks combine quantum communication and quantum computing, enabling the efficient transmission and processing of quantum information. The development of quantum networks will drive the formation of a quantum internet, providing a new platform for applications such as information security, telemedicine, and intelligent transportation.

6. Quantum Imaging

Quantum imaging technology utilizes the principles of quantum entanglement and quantum interference to achieve high-resolution imaging in low-light or high-noise environments. This has important applications in fields such as medical imaging, night vision systems, and remote sensing.

7. Quantum Sensing

Quantum sensors utilize the properties of quantum states to achieve extremely high-precision measurements of physical quantities. Quantum sensing technology can be applied to fields such as precision measurement, environmental monitoring, and geological exploration, improving the accuracy and reliability of measurements.

現代國語:

量子技術被認為是21世紀改變世界的技術之一,也是科技發展的前沿領域,涉及量子通訊、量子計算和量子探測等多個面向。近年來,量子糾纏態的製備、量子通訊的實現和量子計算等方面取得了顯著的進展,量子技術的最新進展為軍事領域帶來了革命性的變革可能,世界主要軍事力量高度關注量子技術的發展與應用。為此,上海交通大學國家戰略研究院對量子技術在軍事領域的應用進行了專題研究,現在將部分研究成果摘錄如下:

一、量子技術在軍事領域的一些主要應用方向

1.加密通信

量子通訊技術利用量子糾纏效應進行資訊傳遞,具有傳統通訊方式無法比擬的保密性。量子金鑰分發(QKD)是一種基於量子力學原理的安全通訊技術,能夠保證資訊在傳輸過程中的安全性。美軍自2003年起開始運行實驗性量子金鑰分發網絡,而白宮和五角大廈也已安裝使用量子通訊系統。

量子技術在軍事領域的應用研究2.png

2.導航定位

量子定位技術是近年來新興的導航定位技術,利用量子加速器和量子陀螺儀,可以提供高精度、重量輕的導航設備。這些設備無需定期通過導航衛星校正位置,大大提高了軍事平台的自主導航能力。例如,英國皇家海軍在測試潛水艇的量子導航系統時發現,其在24小時內的定位誤差僅1公尺。

量子技術在軍事領域的應用研究3.png

科學家在測試測試量子陀螺儀

3.情報偵察

量子成像技術在軍事情報偵察領域有重要應用。量子成像技術可以同時對多個目標進行探測識別,具有成像速度快、抗干擾、反輻射等優勢。此外,量子成像還可以對動態目標進行精確追蹤監視,並提高情報收集的效率和準確性。

4.數據處理

量子運算具有平行運算優勢,能夠實現對戰場海量資料的快速匯聚與分析計算。量子電腦遵循量子力學規律,利用量子疊加和糾纏等物理特性,以微觀粒子構成的量子位元為基本單元,透過量子態的受控演化實現計算處理。這將推動戰場物聯網及各類資訊終端即時高效連接,實現戰場智慧化、網路化升級。

5.戰場決策支持

量子技術可增強軍事網路資訊保密性,提高軍事導航定位精度,實現大量情報高效處理,進而為戰場決策提供強而有力的支援。量子電腦的超快運算能力可以幫助分析複雜的戰場情況,提供更精確的戰場模擬和預測,輔助指揮官做出更明智的戰略決策。

量子科技在軍事領域的應用將對未來戰爭形態和作戰方式產生重要影響。隨著量子技術的不斷發展和成熟,其在軍事領域的應用將越來越廣泛,為提高軍事作戰效率、保障資訊安全和提升戰場指揮能力提供強大的技術支援。

二、量子技術在民用領域的應用前景

1.量子通信

量子通訊是量子技術的一個重要應用領域,它利用量子糾纏和量子不可複製原理來實現資訊的安全傳輸。量子金鑰分發(QKD)是一種基於量子力學原理的安全通訊技術,能夠保證資訊在傳輸過程中的安全性。透過量子通信,可以實現城域量子通訊網路、城際量子網絡,甚至透過衛星中轉實現遠距離量子通信,為金融、政務等領域提供資料和資訊的安全傳輸。

2.量子計算

量子運算利用量子位元的疊加和糾纏特性,能夠在特定問題上大幅超越傳統電腦的運算能力。量子電腦在破解密碼、最佳化問題、藥物發現、材料科學等領域具有潛在的應用價值。例如,量子因數分解演算法可以破解目前廣泛使用的RSA加密體系,而量子搜尋演算法則能夠在資料庫查詢等方面提供指數級的加速。

量子技術在軍事領域的應用研究4.jpg

「祖沖之號」同款超導量子計算機

3.量子精密測量

量子精密測量利用量子態的超敏感性來實現超越經典方法的測量精度。這可以應用於重力波探測、地球物理學、生物學和其他科學領域,以及提高導航系統的精度和可靠性。例如,透過量子糾纏光源和精準的光鐘,可以實現重力波探測的新途徑,或在地球和月球之間進行光秒量級距離的量子力學非定域性檢驗。

4.量子模擬

量子模擬器可以模擬複雜的量子系統,為物理學、化學和材料科學等領域的研究提供新的工具。透過量子模擬器,科學家可以探索高溫超導、量子相變等複雜現象,加速新材料和藥物的開發。

5.量子網絡

量子網路結合了量子通訊和量子運算,可以實現量子資訊的高效傳輸和處理。量子網路的發展將推動量子網路的形成,為資訊安全、遠距醫療、智慧交通等應用提供新的平台。

6.量子成像

量子成像技術利用量子糾纏和量子乾涉原理,可以在低光照或高雜訊環境下實現高解析度成像。這在醫學影像、夜視系統、遙感偵測等領域有重要應用。

7.量子感測

量子感測器利用量子態的特性來實現對物理量的極高精度測量。量子感測技術可應用於精密測量、環境監測、地質探勘等領域,提升測量的準確性與可靠性。

中國原創軍事資源:https://niss.sjtu.edu.cn/web/main/cgcp/600ad41bb50841d2bb9283642a4d14d888e

The Chinese Communist Party’s Application of Quantum Technology in Warfare

中國共產黨在戰爭中應用量子技術

現代英語:

On November 1, 2022, Huawei, a major Chinese mobile phone manufacturer, announced its patent for a superconducting quantum chip, stating that the invention reduced crosstalk between quantum bits. Huawei has been investing in quantum chip research and development for more than 5 years and has published a number of quantum technology patents. In addition, it is rumored that the Chinese quantum computer “Wukong” will be unveiled soon, and the first quantum chip production line is being rushed to completion, using the “NDPT-100 non-destructive probe electrical measurement platform” developed by Origin Quantum in Hefei to improve yield. At the same time, the University of Science and Technology of China also announced on November 20 that it has achieved quantum storage of photons in the communication band, which can be directly connected to the existing fiber optic network, and may be able to build a long-distance, large-scale fiber optic quantum network in the future. [1]

On the other hand, the U.S. Department of Defense released the 2022 China Military Power Report on November 29, pointing out that the CCP discussed a new core operational concept in 2021—”Multi-Domain Precision Warfare”—using big data and artificial intelligence technologies to identify vulnerabilities in the opponent’s combat system and then carry out precise strikes. At the same time, the CCP has also acquired emerging technologies for both military and civilian use through its military-civilian integration strategy, such as artificial intelligence, autonomous systems, quantum technology, biotechnology, and advanced materials. [2]

Although quantum technology is still in the “proof of concept” (POC) stage and will take a considerable amount of time before it can be put into practical use, China’s quantum technology continues to make progress despite the strong technological blockade by the United States, and its application in combat may be prioritized, which deserves our special attention.II. Safety ImplicationsI. The CCP will take the lead in establishing a global quantum communication network.Quantum technology[3] is mainly divided into three major fields: quantum computing, quantum communication and quantum sensing.[4]

China’s quantum communication technology currently holds a leading position in the world and may be the first to complete industrialization.[5] Following the opening of the world’s first quantum communication network, the Hefei Metropolitan Area Quantum Communication Experimental Demonstration Network, in 2012, China successfully launched the world’s first quantum satellite, Micius, in 2016.

Subsequently, it achieved three major technological breakthroughs: quantum key distribution (QKD) between satellite and ground, quantum teleportation between ground and satellite, and quantum entanglement key distribution over a thousand kilometers. In 2017, the CCP opened the Beijing-Shanghai quantum communication line, which is more than 2,000 kilometers long. With the connection between the satellite “Micius” and the Beijing-Shanghai quantum communication line, the world’s first intercontinental (Beijing-Vienna) quantum communication video call was completed through the collaboration between Austrian scholar Anton Zeilinger[6] and Chinese quantum expert Pan Jianwei.The successful distribution of “space-to-ground quantum key” enables the CCP to use “low orbit satellites” (LEO) as relay stations to share keys between any two locations in the world.

If further combined with ground fiber optic quantum communication networks, a quantum communication network covering the whole world can be established. Currently, the CCP is planning to build a “national quantum internet” with a length of 35,000 kilometers, extending to Urumqi in Xinjiang and Lhasa in Tibet. In addition to ensuring that the content of messages is not intercepted or eavesdropped on, [7] “Quantum Digital Signature” (QDS) and “Quantum Secure Identification” (QSI) can also improve communication security. In military applications, in addition to ensuring the security of military communications, quantum communication networks can also be used as military 6G technology to assist quantum communication between space, special forces and different military branches, and solve the problem of underwater communication being susceptible to interference, thereby improving underwater combat capabilities. [8]

II. China’s quantum computing technology will accelerate the realization of unmanned intelligent warfare.The global quantum computing market is currently led by the United States and China, which are driving the development of related system software and algorithms. There are multiple technical approaches, with superconductivity and “ion trap” technology being the most advanced. On May 8, 2020, the CCP unveiled the superconducting quantum computer prototype “Zu Chongzhi”; on December 4 of the same year, it announced the successful construction of the photonic quantum computer prototype “Jiuzhang”. Currently, it is using ion trap technology to improve the computing power of photonic quantum chips. [9]

Quantum computers can combine artificial intelligence and big data analysis to process large amounts of information quickly, and are mainly used in chemical analogy, system optimization, password cracking, machine learning and other fields. In the military, in addition to being able to quickly crack public key cryptography and improve network combat capabilities,[10] quantum computing can also be used in battlefield simulation, wireless spectrum analysis, logistics management, energy management and other fields. It can also optimize existing combat command, deployment, decision-making, war game simulation, system verification, predictive analysis and other fields, and significantly shorten the time for weapon design and manufacturing, new material development and military battery research and development. Quantum edge computing can be applied to the collaborative operations of unmanned vehicles or unmanned weapons (see attached table). In addition, if the CCP can establish a battlefield “Internet of Military Things” (IoMT), it can realize precise, fast and highly complex unmanned intelligent operations in advance.

III. Quantum radar and quantum navigation capabilities will reverse the course of war.Quantum sensing technology uses quantum measurement of physical properties such as magnetic fields, electric fields, and gravity, which can greatly improve the accuracy of existing measurements. The main types include quantum radar, quantum navigation, and quantum imaging. Quantum sensing technology can identify targets in complex environments such as high noise, low light, and underwater, and the advantages of current ballistic missiles, stealth aircraft, and underwater nuclear submarines will no longer exist. [11]

In 2017, the CCP claimed that its “quantum imaging technology” (QI) could enable spy satellites to track US B-2 bombers and identify stealth fighters at night. [12]

China Electronics Technology Group Corporation (CETC) showcased the world’s first single-photon quantum radar prototype at the 2018 Zhuhai Airshow and recently claimed that it had completed a target detection test at a range of 100 kilometers in a real atmospheric environment, implying that its quantum radar was about to be launched. [13]

In addition, quantum positioning, timing and navigation (PNT) systems based on high-precision quantum clocks determine the coordinates of ground users by obtaining the time difference between the transmission of entangled photon pairs between the satellite and the ground through quantum satellites. [14]

Since it does not rely on the Global Positioning System (GPS), infrared or radar navigation, quantum navigation can not only greatly enhance the existing Global Navigation Satellite System (GNSS), but also function in environments where GPS cannot work, such as underwater, underground or in environments severely interfered with by electromagnetic waves. Once it is put into practical use, the CCP’s quantum navigation technology will improve the hit rate of its various weapons.

3. Trend Analysis

I. The CCP may be developing “quantum warfare”.Although the CCP acknowledges that its quantum technology still has many shortcomings and that it will take a considerable amount of time before it is commercialized, it has already identified quantum technology as a key technology for breaking through the US’s technological encirclement and establishing itself as a technologically powerful nation. The “second quantum revolution” will overturn existing technological, economic, and military models. It is conceivable that the CCP will continue to invest heavily in quantum technology development through a nationwide system. Under this general direction, the quantum industry and quantum military applications will be accelerated. In the future, as existing computers move towards miniaturization, cloud computing, and edge computing, quantum computers or quantum sensors may be deployed on smaller weapons and equipment, such as satellites, drones, or individual soldier mobile phones, and even for “quantum warfare” (see attached diagram).

II. Taiwan may need to develop quantum defense capabilities in advance.China’s quantum communication technology is currently ranked first in the world, and its quantum computing and quantum sensing technologies are ranked second in the world. Therefore, if China uses quantum technology to fight against us, our country may not have any ability to retaliate. In March 2022, China established a quantum national team, selected 17 industry-academia-research teams, and pointed out the development direction of quantum technology in the next 5 years. [15]

However, its plans are mostly biased towards the technological and economic aspects, and there are no defense measures against the Chinese Communist Party’s possible future attacks on us, such as password cracking, quantum navigation, quantum radar, and even quantum network warfare, quantum space warfare and quantum underwater warfare. Perhaps the Chinese Academy of Sciences should join the quantum national team in advance and cooperate with private industry-academia-research personnel to think about how to defend against the Chinese Communist Party’s future quantum warfare.Appendix: Examples of Military Applications of Quantum Technology

 fieldPossible applications
Quantum CommunicationQuantum key distribution ( QKD )Quantum communication technology is the most mature and is already commercially available.Long -distance quantum communication can be achieved through repeaters such as satellites.
Post-quantum cryptographyUsed to defend against attacks from quantum computersThe United States expects to complete standardization in 2023-2024.
Quantum Communication NetworkQuantum networks: quantum-secure direct communication in space, special forces, and between different military branches → military 6GQuantum digital signature ( QDS )Quantum Identity Recognition ( QSI )Quantum cryptography technology that requires specific locations to transmit and receive: military satellite communicationsQuantum clocks enable more precise time synchronization: C4ISR collaborative action
Quantum computingQuantum simulationBattlefield    simulation, weapon development, simulation and verification
Quantum optimizationOptimize    current operational deployments, exercises, system verification, predictive analysis, etc.Cracking    existing passwords
Big Data Analytics/Machine LearningWireless    spectrum analysis, logistics management, energy managementDecision    Analysis and Reference
Edge computingConsistency of action of unmanned    vehicles or unmanned weapons within the same time period   Cooperative operations between different military branches
Quantum sensingQuantum positioning, navigation, and timing ( PNT )High -precision quantum clockQuantum inertial navigation and quantum-enhanced navigation can be deployed on autonomous unmanned vehicles or missiles.Quantum navigation that does not rely on a global satellite navigation system
Quantum intelligence surveillanceSurface and subsurface monitoring: Quantum sensing technology deployed on low-Earth orbit satellites and unmanned vehicles
Quantum imaging: quantum 3D cameras, quantum gas sensors, low signal-to-noise ratio battlefield vision equipment, quantum rangefinders, quantum ghost imaging, etc.
Quantum Underwater WarfareQuantum inertial navigation can be applied to large submarines and underwater vehicles.Quantum magnetometers can assist in mapping the seabed, detecting underwater mines, and, in conjunction with other sensors, perform underwater detection and analysis.
Quantum radar and quantum laser radar, etc.Quantum laser radar: Short-range target illumination, applicable to anti-drone surveillance, short-range air defense, and small satellite detection in space.Quantum -enhanced radar: A high-precision, low-noise quantum radar that can be used to detect small, slow-moving objects such as drones.
otherCombat Applications Quantum electronic warfareSmaller general-purpose quantum antennas and array-type quantum radio frequency sensorsQuantum computing and quantum clocks can enhance the capabilities of existing electronic warfare systems.Quantum electronic warfare can interfere with, deceive, and obstruct the enemy.
Quantum Space WarfareDeployment and development of technologies such as quantum radar, quantum electronic warfare, quantum sensing, and quantum communication on low-Earth orbit satellites
Biochemical Simulation and DetectionAt least 200 qubits and more logic bits are required for simulation.It can be installed on drones and ground vehicles for detecting biochemical toxins in the environment.
quantum materialsDeveloping new military materials for camouflage, stealth, and high-temperature resistance by utilizing quantum properties such as superconductivity and topology.

Source: Table compiled by author Wang Xiuwen based on the literature. Michal Krelina, “Quantum Technology for Military Application,” EPJ Quantum Technology, (2021) 8:24,

Wang Xu Wen

https://reurl.cc/DXYWaj.

現代國語:

壹、新聞重點

2022年11月1日,中共手機大廠「華為」公司公布其「超導量子晶片」專利,指出該項發明降低了量子比特串擾。「華為」投入量子晶片研發超過5年,已公開多項量子技術專利。此外,據聞中共量子電腦「悟空」即將公開,第一條量子晶片產線正加緊趕工,並採用合肥「本源量子」公司研發的「NDPT-100無損探針電學測量平台」來提高良率。同時,中國科學技術大學也在11月20日宣布已實現通訊波段光子之量子存儲,可直接對接現行的光纖網路,未來可能建構出長距離、大尺度的光纖量子網。 [1]

另一方面,美國國防部11月29日公布《2022年中國軍力報告》(2022 China Military Power Report),指出中共在2021年曾討論新核心作戰概念──「多領域精確作戰」(Multi-Domain Precision Warfare),以大數據和人工智慧等技術,找出對手作戰系統之脆弱點後予以精準打擊。同時,中共也透過軍民融合戰略取得軍民兩用的新興技術,如:人工智慧、自主系統、量子技術、生物技術、先進材料等。[2]

儘管量子技術目前仍處於「概念驗證」(Proof of Concept, POC)階段,距離實用化尚需相當的時間,但是中共量子技術在美國強力的科技圍堵下仍持續進展,且作戰應用可能優先落實,值得我國特別注意。

貳、安全意涵

一、中共將率先建立全球量子通訊網

量子技術 [3]主要分為「量子計算」、「量子通訊」、「量子感測」三大領域,[4] 中共量子通訊技術目前持世界牛耳,且可能最先完成產業化。[5] 繼2012年開通全球第一個量子通訊網路「合肥城域量子通信試驗示範網」之後,中共2016年成功發射全球第一顆量子衛星「墨子號」,其後陸續達成「星地(衛星─地面)量子密鑰分發」(Quantum Key Distribution, QKD)、「地星(地面─衛星)量子隱形傳態」及「千公里級量子糾纏密鑰分發」三大技術突破。2017年,中共開通全長2,000餘公里的量子通訊線路「京滬幹線」,並在「墨子號」與「京滬幹線」之星地鏈結下,透過奧地利學者柴林格(Anton Zeilinger)[6] 和中國量子專家潘建偉之師徒合作,完成全球首次跨洲(北京─維也納)量子通訊之視訊通話。

「星地量子密鑰」分發成功,使中共能以「低軌衛星」(LEO)為中繼站,進行全球任意兩個地點之間的密鑰共享。若進一步結合地面光纖量子通訊網路,可建立覆蓋全球的量子通訊網。目前中共正計畫建構長達35,000公里的「全國量子互聯網」,範圍擴及新疆烏魯木齊和西藏拉薩。量子通訊除可確保訊息內容不被半途截取或竊聽之外,[7] 「量子數位簽名」(Quantum Digital Signature, QDS)和「量子身份識別」(Quantum Secure Identification, QSI)也可提高通訊安全。在軍事應用上,量子通訊網除了保障軍事通訊安全之外,也可作為軍用6G技術協助太空、特種部隊及不同軍種之間的量子通訊,並解決水下通訊易受到干擾之問題,提高水下作戰能力。 [8]

二、中共量子計算技術將加速無人智慧化戰爭之實現

全球量子計算市場目前以美國和中國為兩大領先者,推動相關系統軟體和演算法之發展,並有多種技術途徑,以超導和「離子陷阱」(Ion Trap)技術之發展較為超前。2020年5月8日,中共公開超導量子電腦原型機「祖沖之號」;同年12月4日又宣布光子量子電腦原型機「九章」建構成功,目前正運用離子陷阱技術提升光量子晶片之計算能力。 [9]

量子電腦可結合人工智慧和大數據分析,快速處理大量資訊,主要應用在化學類比、系統優化、密碼破解、機器學習等方面。在軍事上,量子計算除了可快速破解公鑰密碼、提高網路作戰能力之外,[10] 還可運用於戰場模擬、無線頻譜分析、後勤管理、能源管理等,也可優化現有的作戰指揮、部署、決策、兵棋推演、系統驗證、預測分析等,並大幅縮短武器設計製造、新材料開發、軍用電池研發之時間;量子邊緣運算則可應用於無人載具或無人武器之協同作戰(參見附表)。此外,中共若能建立戰場「軍事物聯網」(Internet of Military Things, IoMT),可提早實現精準快速且高度複雜的無人智慧化作戰。

三、量子雷達及量子導航等能力將扭轉戰爭態勢

量子感測技術是以量子測量磁場、電場、重力等物理性質,可大幅提昇現有測量之精度,主要有:量子雷達、量子導航、量子成像等。量子感測技術可在高噪音、光線微弱、水下等複雜環境中辨識出目標,現行彈道飛彈、隱形飛機、水下核潛艦等武器優勢將不復存在。[11]

中共2017年宣稱,其「量子成像技術」(Quantum Imaging,QI)已可使間諜衛星在夜間追蹤美國B-2轟炸機和辨識隱形戰機。[12] 「中國電科集團」則在2018年珠海航展中展示全球第一台單光子量子雷達樣機,最近更宣稱已在真實大氣環境下完成百公里級的目標探測試驗,暗指其量子雷達即將問世。 [13]

此外,以高精度量子時鐘為基礎的量子定位、授時和導航(PNT)系統,是透過量子衛星取得衛星與地面間傳遞糾纏光子對之時間差,來確定地面用戶座標。[14] 由於不依賴全球定位系統(GPS)、紅外線或雷達導航,量子導航除了可大幅增強現行全球衛星導航系統(GNSS)之外,在GPS無法作用之環境如:水下、地表下或被電磁波嚴重干擾之環境中也能發揮功能。一旦進入實用化,中共量子導航技術將提高其各種武器之命中率。

參、趨勢研判

一、中共或將發展出「量子戰爭」(Quantum Warfare)

雖然中共亦承認自身的量子技術仍有許多「短板」,且量子技術距離市場化仍需要不短的時間,但是量子技術已被中共視為突破美國科技圍堵、建立科技強國之關鍵技術。「第二次量子革命」將翻轉現有的科技、經濟和作戰模式,可以想見,中共未來仍將以舉國體制,加碼投入各種資源發展量子技術。在此大方向之下,量子產業及量子軍事應用都將加速落實。未來,隨著搭配現有電腦朝小型化、雲端化、邊緣運算方向發展,量子電腦或量子感測器可能部署在更小型的武器裝備上,如:衛星、無人機或單兵手機等,甚至進行「量子戰爭」(參見附圖)。

二、我國恐需預先發展量子防禦能力

中共量子通訊技術目前位居世界第一、量子計算和量子感測技術均居世界第二。因此,中共若將量子技術用於對我作戰,我國恐無任何還擊能力。我國在2022年3月成立量子國家隊,選出17個產學研團隊,並指出未來5年量子科技發展方向。[15] 但是,其規劃多半偏向科技面和經濟面,對於中共未來可能對我進行的密碼破解、量子導航、量子雷達,甚至量子網路戰、量子太空戰和量子水下戰等,沒有任何防禦對策。或許中科院應優先且早期加入量子國家隊,和民間產學研人士合作,共思如何防禦中共未來的量子作戰。

附表、量子技術軍事應用之例

 領域可能應用
量子通訊量子密鑰分發(QKD)ž 是量子通訊技術中最為成熟者,已可商用ž 透過衛星等中繼器,可進行遠距離量子通訊
後量子密碼ž 用於防禦量子電腦之攻擊ž 美國預計2023-2024年完成標準化
量子通訊網ž 量子網絡:太空、特種部隊、不同軍種間的量子安全直接通訊→軍用6Gž 量子數位簽名(QDS)ž 量子身份識別(QSI)ž 特定位置才能收發的量子密碼技術:軍事衛星通信ž 量子時鐘更精確的時間同步:C4ISR協同行動
量子計算量子模擬ž   戰場模擬、武器之開發、模擬和驗證
量子優化ž   優化現行作戰部署、演習、系統驗證、預測分析等ž   破解現有密碼
大數據分析∕機器學習ž   無線頻譜分析、後勤管理、能源管理ž   決策分析及參考
邊緣運算ž   無人載具或無人武器同一時間內之行動一致性ž   不同軍種之協同作戰
量子感測量子定位、導航及定時(PNT)ž 高精度量子時鐘ž 量子慣性導航、量子增強導航,可部署在自主無人載具或飛彈上ž 不需要依賴全球衛星導航系統之量子導航
量子情監偵ž 地表與地下監測:部署於低軌衛星、無人載具之量子感測技術
ž 量子成像:量子3D相機、量子氣體感測器、低信噪比之戰場視覺裝備、量子測距儀、量子鬼成像等
量子水下作戰ž 量子慣性導航可應用於大型潛艦和水下載具ž 量子磁力計可協助繪製海底地圖、探測水下水雷,配合其他感測器進行水下探測和分析
量子雷達與量子雷射雷達等ž 量子雷射雷達:短距離之目標照明,可運用於反無人機監視、短程防空、太空之小衛星探測ž 量子增強雷達:高精度低噪音量子雷達,可用於探測無人機等小型慢速移動物體
其他作戰應用 量子電子戰ž 更小型的通用量子天線、陣列式量子射頻感測器ž 量子計算及量子時鐘可增強現有的電子戰系統能力ž 量子電子作戰可對敵進行干擾、欺騙和阻攔
量子太空戰ž 量子雷達、量子電子戰、量子感測、量子通訊等技術在低軌衛星之部署和研發
生化模擬與檢測ž 至少需要200個以上的量子比特和更多的邏輯比特數量才可進行模擬ž 可安裝在無人機和地面車輛上,用於檢測環境中的生化毒物等
量子材料利用超導、拓樸等量子特性開發偽裝、隱形、耐高溫等新軍用材料

中國原創軍事資源:https://indsr.org.tw/respublicationcon?uid=12&resid=1928&pid=3582

Chinese Military & the Emerging Potential of Quantum Computing in Unconventional Warfare

中國軍事與量子運算在非常規戰爭中的新興潛力

現代英語:

The following article is from Zhuanzhi Intelligent Defense , authored by Zhuanzhi Defense.

Quantum computing represents a paradigm shift in computing technology, promising to revolutionize various industries, including national security and defense. While the capabilities of quantum computing remain largely theoretical, significant progress is underway. Experiments by companies like Google and IBM have demonstrated early instances of quantum supremacy, where quantum computers outperform classical systems in specific tasks. These breakthroughs suggest that quantum computing is not only imminent but is considered an inevitable advancement, and stakeholders should prepare now.

Unlike classical computers, which rely on binary bits (1s and 0s) to process information in a linear or symmetric manner, quantum computers utilize qubits, or “qubits,” which can exist in multiple states simultaneously. This may be a difficult concept to grasp, but this capability enables quantum computers to perform complex calculations at unprecedented speeds, solving problems that even the most powerful supercomputers currently cannot. As irregular warfare and gray-zone conflicts increasingly rely on advanced technologies, the application of quantum computing in these areas has the potential to pose new threats, but also new strategic advantages. Quantum computing may fundamentally change the way conflicts are managed and resolved in the 21st century.

Understanding Quantum Computing

Classical computing, the backbone of today’s digital infrastructure, operates on a binary system where data is represented by “bits” of “0” or “1”. These bits are processed sequentially, and classical computers execute tasks step by step. While powerful, this approach faces significant limitations when dealing with complex problems requiring vast amounts of computational resources. Quantum computing, however, utilizes the principles of quantum mechanics, allowing qubits (also known as “qubits”) to exist in multiple states simultaneously through a phenomenon called superposition. Essentially, classical bits must choose between 0 and 1, while qubits can represent both states at the same time. Entanglement, another quantum property, connects qubits so that the state of one qubit directly influences the state of another, regardless of distance.

To better understand the power of quantum computing, it’s helpful to intuitively see how it solves problems compared to classical computing. The podcast “Ask A Spaceman” uses a very relatable analogy to illustrate this. Imagine you have a complex task that requires searching through a vast number of possibilities, like finding a mouse hiding somewhere in a huge mansion. What better way to find the mouse than with a cat? In this scenario, a classical computer is like a cat, methodically searching room by room. The cat can only stay in one room at a time, and it must explore each room sequentially until it finds the mouse. If the mansion is large, this process is extremely time-consuming. Now imagine a quantum computer as a cat with a unique ability: it can be in every room of the mansion simultaneously. You could call it a “q cat.” This “q cat” doesn’t need to search room by room; instead, it can examine every possible location in the mansion at the same time. The mouse’s location can be found almost instantly, without the need for methodical exploration of each room. This analogy captures the essence of quantum computing: the ability to perform multiple computations simultaneously. By utilizing the principles of superposition and entanglement, quantum computers can solve problems several times faster than classical computers.

The impact of quantum computing on irregular warfare

As quantum computing moves from theoretical research into practical applications, it has the potential to dramatically alter the landscape of irregular warfare and gray-zone conflicts. For example, adversaries possessing quantum-enhanced decryption capabilities could intercept and decrypt military communications, weakening security operations and exposing critical intelligence. Similarly, quantum-based data processing allows adversaries to analyze massive amounts of intercepted data in real time, uncovering patterns of action or vulnerabilities. With the continued development of quantum computing, the ability to rapidly process and analyze massive amounts of data could shift the balance of power, introducing previously unimaginable new methods of conflict. The promise of quantum computing lies not only in strengthening existing strategies but also in its potential to create new methods of engagement, forcing state and non-state actors to rethink their modus operandi. Understanding the potential applications of quantum computing in irregular warfare is crucial for predicting future threats and developing effective countermeasures, especially when adversaries attempt to exploit these technologies for their own strategic gain.

Feasible applications of quantum computing in irregular warfare

The following section explores some of the most viable applications of quantum computing in irregular warfare, highlighting how this emerging technology can enhance strategic capabilities and provide a competitive advantage in increasingly complex and unpredictable conflict environments.

  • Enhanced cryptographic capabilities

One of the most anticipated applications of quantum computing is its ability to break traditional cryptographic systems. Classical encryption, the foundation for secure communications and intelligence, relies on the computational difficulty of factoring large prime numbers, a method easily cracked by quantum algorithms like the Shor algorithm. This will have profound implications, as state and non-state actors could potentially intercept and decrypt sensitive communications, disrupting operations on multiple levels. This emerging threat has sparked a global race in “post-quantum cryptography” to develop encryption methods resistant to quantum attacks. This arms race between offensive quantum decryption capabilities and defensive quantum-resistant encryption is expected to be a decisive aspect of the future conflict landscape. As the U.S. and our adversaries develop increasingly sophisticated tools, the stakes for national security, espionage, and the protection of critical infrastructure are higher than ever.

  • Optimize actions and decisions

The potential of quantum computing in optimizing complex operations is particularly relevant to the logistical and decision-making needs of irregular warfare. Quantum algorithms can process massive datasets simultaneously, thus simplifying logistics, resource allocation, and strategic planning. Just as the advent of radar during World War II revolutionized military operations, providing near real-time intelligence on enemy movements and fundamentally altering the nature and outcome of battles, quantum computing could also transform modern conflict by enabling predictive conflict management. This involves simultaneously analyzing geopolitical, economic, and social variables to predict potential conflict zones or flashpoints. A study published in *Stability* within the *International Journal of Security and Development* demonstrates the feasibility and added value of machine learning in conflict prediction, primarily using classical computational methods. However, the principles explored in this study can be directly applied to quantum computing, offering a glimpse into how advanced quantum algorithms can enhance predictive conflict management. This capability will enable military and intelligence agencies to preemptively deploy resources and personnel, reducing reaction time and managing conflict in a more proactive manner. As these technologies advance, quantum-enhanced decision-making processes could allow operators to navigate the unpredictability of conflicts with greater confidence and precision.

  • Simulation and Modeling: The ability to simulate and model complex battlefield environments is another key area where quantum computing promises to have a significant impact. Traditional simulation methods often struggle to capture the unpredictability inherent in conflicts employing decentralized and variable tactics. Quantum-enhanced war games can revolutionize this process, enabling military strategists to run countless potential scenarios in parallel, exploring not only known strategies but also new and unforeseen outcomes. These simulations will provide unprecedented insights into adversary behavior, operational risks, and tactical opportunities, leading to more effective strategic planning. Beyond battlefield tactics, quantum computing can also simulate highly interconnected cyber-physical systems, such as power grids, transportation networks, and communication infrastructure. This helps identify vulnerabilities caused by unconventional threats like cyberattacks or sabotage and predict cascading failures. This ability to test the resilience of critical infrastructure in real time will provide decision-makers with actionable insights to mitigate risks and strengthen defenses, ensuring operational stability even under mixed or gray zone pressures.
  • Influence operations and information warfare

Quantum computing’s unparalleled data processing capabilities can significantly enhance influence operations and information warfare, which are central to modern irregular warfare and gray-zone conflicts. Quantum computing can analyze massive amounts of social media and information network data to identify patterns, trends, and anomalies that may indicate an adversary’s attempts to manipulate public opinion or spread disinformation. Beyond identifying these activities, quantum-enhanced disinformation countermeasures can go even further. By simulating how disinformation spreads in networks, quantum computers can generate counter-narratives on a massive scale in real time, dismantling adversary influence operations before they gain traction. This would mark a significant advancement in countering cognitive warfare tactics and information manipulation.

  • Addressing hybrid threats

Hybrid threats, often combining conventional warfare, cyberattacks, misinformation, and irregular tactics, are particularly challenging to address due to their multifaceted nature. Quantum computing offers a powerful solution through quantum-enhanced human topography mapping—a capability distinct from battlefield simulation. Unlike simulations that primarily focus on operational and tactical scenarios, human topography mapping centers on the socio-political and economic environment at the time of conflict. This speculative yet feasible application can rapidly analyze large datasets, such as demographic sentiment, resource distribution, and political instability, to identify patterns and trends indicating social unrest, insurgency, or emerging cross-regional conflicts.

For example, quantum-enhanced systems can integrate data from social media, economic reports, and historical conflict patterns to map areas of escalating tensions and predict where hybrid threats are most likely to occur. By providing a nuanced understanding of the human environment, military and intelligence organizations can develop tailored strategies to mitigate risks before they escalate. This capability will complement battlefield simulations, addressing the broader contextual factors driving conflict and providing a more comprehensive approach to addressing hybrid threats. These advances in human topography mapping, along with the continued development of quantum computing, could transform how policymakers navigate the complexities of gray zone conflicts, where the lines between peace and war are intentionally blurred.

Future Applications

While many of the potential uses of quantum computing in irregular warfare are near-term viability, some speculative ideas push the boundaries of current technology. These unconventional concepts offer glimpses into how quantum computing could radically alter future conflicts, introducing capabilities currently unattainable but potentially becoming a reality as technology advances.

  • Quantum autonomous systems

One of the most intriguing yet fascinating applications of quantum computing in irregular warfare is the development of quantum-driven artificial intelligence (AI)-controlled autonomous systems. Unlike current AI models that rely on the limitations of classical computing, quantum AI can process and adapt to massive amounts of battlefield data in real time. This will enable autonomous drones or ground systems to operate with unprecedented agility, making decisions faster and more accurately in highly dynamic and unpredictable operational environments. These systems can evolve and learn in ways that current machine learning models cannot match, leading to a new generation of adaptive warfare technologies. Such quantum-driven autonomous systems could alter the balance of power in conflict zones, creating advantages where rapid adaptability is crucial. Furthermore, these systems can operate across decentralized networks, coordinating seamlessly without continuous human intervention, further enhancing their effectiveness in conflict scenarios.

  • Quantum-supported surveillance evasion

A more speculative yet equally transformative application may involve quantum entanglement to develop untraceable communication networks. Quantum-supported surveillance evasion would leverage the principles of quantum mechanics to create detection systems that can evade traditional surveillance methods. By using entangled particles, information can be transmitted in such a way that any attempt to intercept or observe the communication alters its state, effectively rendering the transmission undetectable. This would provide a game-changing stealth capability, enabling agents or military assets to communicate and maneuver without fear of detection. This would have profound potential implications for covert operations, intelligence gathering, and reconnaissance missions. If fully realized, this technology would render traditional surveillance methods obsolete, requiring adversaries to develop entirely new methods to counter these stealthy quantum systems.

  • Strategic deception at the quantum levelQuantum mechanics elevates the concepts of false alarms and deception to a whole new level. It allows for the creation of false alarms or decoy signals that appear legitimate before being observed—a phenomenon deeply rooted in quantum mechanics itself. This will revolutionize deception operations. By exploiting the unique property of quantum superposition, quantum-based deception can simultaneously present multiple layers of false information, making it nearly impossible for the adversary to distinguish between real and fabricated data. Quantum-level strategic deception will provide a tactical advantage, forcing the adversary to waste resources and time on misleading targets. Furthermore, quantum-based deception can be used to manipulate decision-making processes, creating confusion or hesitation within enemy ranks. In an era where perception is often as important as reality, quantum mechanics can provide a powerful tool to shape the information environment in unpredictable and deceptive ways.

Quantum Limitations and Challenges

While quantum computing holds great promise, several major technical challenges must be addressed to fully realize its potential, particularly in military applications. The most significant of these is scalability. Current quantum computers remain experimental, with most systems capable of handling only a limited number of qubits. This limitation restricts their ability to handle the large-scale computations required for complex defense scenarios. Furthermore, quantum systems are highly sensitive to environmental factors such as temperature and electromagnetic interference, which can cause qubits to lose their quantum states during decoherence. This instability severely impacts the reliability of quantum computers, posing a significant obstacle to their widespread adoption.

Error correction is another key challenge. While error correction techniques in classical computing are quite mature, the situation is different for quantum systems. Due to the inherent fragility of qubits, quantum systems require much more complex methods. However, significant progress is being made in this area, and researchers are developing new quantum error correction techniques to mitigate these challenges. Although these advances show promise, creating scalable, stable quantum systems capable of real-time error correction remains crucial for deploying quantum systems in future warfare environments.

Beyond the technological challenges, the application of quantum computing in warfare raises significant strategic questions, particularly the potential for a quantum arms race. As nations strive to develop advanced quantum capabilities, the rapid pace of technological innovation risks escalating into a competition for quantum dominance. This competition could lead to instability, as nations prioritize offensive quantum technologies such as encryption breaking systems and autonomous combat capabilities, while others rush to build defensive systems to counter these emerging threats. The ability to decrypt secure communications, manipulate information on an unprecedented scale, or deploy autonomous quantum systems could disrupt the balance of power, putting pressure on nations to outpace each other technologically. Furthermore, quantum technologies could be misused for disinformation campaigns, elusive surveillance, or sabotage of critical infrastructure, further complicating the global security landscape. As quantum computing continues to advance, establishing an international framework to regulate its use in conflict is crucial to mitigating the risks posed by the unchecked development of quantum technologies.

in conclusion

As quantum computing continues its transition from theoretical exploration to practical applications, a comprehensive understanding of its potential and risks is crucial to shaping the future of irregular warfare. Integrating quantum technology into conflict scenarios will not only redefine strategic capabilities but also necessitate the establishment of robust international norms, regulatory frameworks, and multilateral agreements. These structures are essential to ensuring that the rapid development of quantum computing does not trigger an out-of-control arms race, exacerbate global tensions, or undermine geopolitical stability. While the full impact of quantum computing on irregular warfare remains to be seen, its disruptive potential is undeniable. As nations grapple with the opportunities and challenges presented by this revolutionary technology, quantum computing is poised to become a central element in the ongoing evolution of conflict dynamics in the 21st century.

Reference source: irregular warfare center

Reprinted from: Zhuanzhi Intelligent Defense

現代國語:

以下文章來自專知智能國防 ,作者專知國防

量子運算代表著運算技術的典範轉移,有望徹底改變包括國家安全和國防在內的各行各業。儘管量子運算的能力在很大程度上仍停留在理論層面,但它正在取得重大進展。谷歌和 IBM 等公司的實驗已經展示了量子優越性的早期實例,即量子電腦在特定任務中的表現優於經典系統。這些突破表明,量子計算不僅即將到來,而且被認為是一種不可避免的進步,而利益相關者現在就應該做好準備。

與依靠二進位位元(1 和 0)以線性或對稱方式處理資訊的經典電腦不同,量子電腦利用的是量子位元或 “量子位元”,它們可以同時以多種狀態存在。這可能是一個很難理解的概念,但這種能力使量子電腦能夠以前所未有的速度進行複雜計算,解決目前即使是最強大的超級電腦也無法解決的問題。隨著非正規戰爭和灰色地帶衝突越來越依賴先進技術,量子運算在這些領域的應用有可能帶來新的威脅,同時也有可能帶來新的戰略優勢。量子運算可能從根本上改變 21 世紀管理和解決衝突的方式。

了解量子計算
經典計算是當今數位基礎設施的支柱,它在二進位系統上運行,數據的 “比特 ”以 “0 ”或 “1 ”表示。這些比特按順序處理,經典計算機按部就班地執行任務。這種方法雖然功能強大,但在面對需要大量運算資源的複雜問題時,卻面臨很大的限制。然而,量子運算利用量子力學原理,透過一種稱為疊加的現象,允許量子位元(也稱為 “量子位元”)同時存在於多種狀態中。從本質上講,經典位元必須在 0 或 1 之間做出選擇,而量子位元則可以同時代表這兩種狀態。糾纏是量子的另一個特性,它使量子位元相互連接,使一個量子位元的狀態直接影響另一個量子位元的狀態,而不受距離的影響。

要更理解量子計算的威力,直觀地了解它與經典計算相比是如何解決問題的,會很有幫助。播客 「Ask A Spaceman 」使用了一個非常貼近生活的比喻來說明這一點。想像一下,你有一項複雜的任務,需要在大量的可能性中進行搜索,就像在一座巨大的豪宅中尋找一隻藏在某處的小老鼠。有什麼辦法比用一隻貓在大宅裡找到老鼠更好呢?在這種情況下,經典計算機就像一隻貓,有條不紊地一個房間一個房間地搜索。貓一次只能待在一個房間裡,它必須按順序探索每個房間,直到找到老鼠為止。如果豪宅面積很大,這個過程就會非常耗時。現在把量子電腦想像成一隻具有獨特能力的貓:它可以同時出現在大宅的每個房間裡。可以說是一隻 “q 貓”。這隻 「q 貓 」不需要一個房間一個房間地搜索,而是可以同時檢查大宅中每一個可能的位置。老鼠的位置幾乎可以瞬間找到,而不需要有條不紊地探索每個房間。這個比喻抓住了量子計算的精髓:同時執行多項計算的能力。利用疊加和糾纏原理,量子電腦解決問題的速度是經典電腦的數倍。

量子計算對非正規戰爭的影響
隨著量子計算開始從理論研究進入實際應用,它有​​可能極大地改變非正規戰爭和灰色地帶衝突的模式。例如,擁有量子增強解密能力的敵對國家可以攔截和解密軍事通信,使安全行動變得脆弱,並揭露關鍵情報。同樣,量子化數據處理可以讓對手即時分析大量截獲的數據,發現行動模式或漏洞。隨著量子運算的不斷發展,快速處理和分析大量資料的能力可能會改變力量平衡,為衝突引入以前無法想像的全新方法。量子運算的前景不僅在於加強現有策略,還在於有可能創造新的交戰方法,迫使國家和非國家行為者重新考慮他們的行動方式。了解量子運算在非正規戰爭中的可能應用,對於預測未來威脅和製定有效對策至關重要,尤其是在對手試圖利用這些技術為自己謀取戰略利益的時候。

量子計算在非正規戰爭中的可行應用
下文探討了量子運算在非正規戰爭中的一些最可行的應用,重點介紹了這項新興技術如何在日益複雜和不可預測的衝突環境中增強戰略能力並提供競爭優勢。

增強密碼能力

量子運算最受期待的應用之一是其破解傳統密碼系統的能力。經典加密方法是確保通訊和情報安全的基礎,它依賴大素數因式分解的計算難度,而像肖爾這樣的量子演算法可以輕鬆破解這種方法。這將產生深遠的影響,因為國家和非國家行為者有可能攔截和解密敏感的通信,從而在多個層面上破壞行動。這種新出現的威脅引發了一場全球性的 “後量子密碼學 ”競賽,旨在開發能夠抵禦量子攻擊的加密方法。這種進攻性量子解密能力與防禦性抗量子加密技術之間的軍備競賽預計將成為未來衝突格局的決定性面向。隨著美國和我們的對手開發出越來越複雜的工具,國家安全、間諜活動和關鍵基礎設施保護的利害關係比以往任何時候都要大。

優化行動和決策

量子運算在優化複雜行動的潛力與非正規戰爭的後勤和決策需求特別相關。量子演算法能夠同時處理龐大的資料集,因此可以簡化後勤、資源分配和策略規劃。二戰期間雷達的出現徹底改變了軍事行動,它提供了關於敵機動向的近乎即時的情報,從根本上改變了戰鬥的方式和勝負。同樣,量子計算也可以透過實現預測性衝突管理,對地緣政治、經濟和社會變數進行同步分析,預測潛在的衝突地區或爆發點,從而徹底改變現代衝突。國際安全與發展期刊》(International Journal of Security and Development)在《穩定》(Stability:國際安全與發展期刊》(International Journal of Security and Development)上發表的一項研究證明了機器學習在衝突預測中的可行性和附加價值,該研究主要使用經典計算方法。突管理。

模擬和建模 模擬和建模複雜戰場環境的能力是量子運算有望產生重大影響的另一個關鍵領域。傳統的模擬方法往往難以捕捉到採用分散和多變戰術的衝突所固有的不可預測性。量子增強的戰爭博弈可以徹底改變這個過程,使軍事戰略家能夠並行運行無數潛在的場景,不僅探索已知的戰略,而且探索新的、不可預見的結果。這些模擬將為了解對手行為、作戰風險和戰術機會提供前所未有的洞察力,從而製定更有效的戰略計劃。除戰場戰術外,量子運算還能模擬高度互聯的網路實體系統,如電網、交通網路和通訊基礎設施,這有助於識別網路攻擊或破壞等非常規威脅造成的漏洞並預測連鎖故障。這種即時測試關鍵基礎設施復原力的能力將為決策者提供可操作的見解,以降低風險並加強防禦措施,確保即使在混合或灰色地帶壓力下也能保持行動穩定。

影響力行動與資訊戰

量子運算無與倫比的資料處理能力可以大大增強影響行動和資訊戰,而影響行動和資訊戰是現代非正規戰爭和灰色地帶衝突的核心。量子運算可以分析大量社群媒體和資訊網路數據,識別可能表明對手試圖左右公眾輿論或傳播虛假訊息的模式、趨勢和異常現象。除了辨識這些活動,量子增強的假訊息反制措施還能更進一步。透過模擬假訊息在網路中的傳播方式,量子電腦可以即時大規模地產生反擊敘事,在對手的影響行動獲得牽引力之前就將其瓦解。這將標誌著在抵禦認知戰戰術和資訊操縱方面取得了重大進展。

應對混合威脅

混合威脅往往融合了常規戰爭、網路攻擊、錯誤訊息和非正規戰術,由於其多面性,應對起來尤其具有挑戰性。量子運算可以透過量子增強的人體地形圖繪製提供強大的解決方案–這種能力有別於戰場模擬。與主要關注作戰和戰術場景的模擬不同,人類地形測繪以衝突發生時的社會政治和經濟環境為中心。這種推測性但可行的應用可以快速分析大量資料集,如人口情緒、資源分佈和政治不穩定性,以確定顯示社會動盪、叛亂活動或跨地區新興衝突的模式和趨勢。

例如,量子增強系統可以整合來自社群媒體、經濟報告和歷史衝突模式的數據,繪製緊張局勢加劇地區的地圖,並預測混合威脅最有可能在哪些地方發生。透過提供對人類環境的細緻入微的了解,軍事和情報組織可以製定量身定制的策略,在風險升級之前將其降低。這種能力將補充戰場模擬,解決驅動衝突的更廣泛的背景因素,為應對混合威脅提供更全面的方法。隨著量子運算的不斷發展,人類地形測繪的這些進步可能會改變決策者駕馭灰色地帶衝突複雜性的方式,因為在灰色地帶衝突中,和平與戰爭的界限被有意地模糊了。

未來應用
雖然量子計算在非正規戰爭中的許多潛在用途都具有近期可行性,但也有一些推測性想法突破了當前技術的界限。這些突破常規的概念讓我們得以一窺量子運算如何徹底改變未來的衝突,引入目前無法企及的能力,但隨著技術的發展,這些能力可能很快就會成為現實。

量子自主系統

量子運算在非正規戰爭中的一個最令人猜測但最引人入勝的應用是開發由量子驅動的人工智慧(AI)控制自主系統。與目前依賴經典運算限制的人工智慧模型不同,量子人工智慧可以即時快速處理和適應大量戰場數據。這將使自主無人機或地面系統以前所未有的敏捷性運行,在高度動態和不可預測的作戰環境中更快更準確地做出決策。這些系統可以以當前機器學習模型無法比擬的方式進化和學習,從而產生新一代自適應戰爭技術。這種量子驅動的自主系統可以改變衝突地區的力量平衡,在快速適應性至關重要的情況下創造優勢。此外,這些系統還可以在分散的網路中運行,無需人類持續幹預即可無縫協調,進一步提高其在衝突場景中的有效性。

量子支援的監控規避

一種更具猜測性但同樣具有變革性的應用可能涉及量子糾纏,以開發不可追蹤的通訊網路。量子支援的監控規避將利用量子力學原理來創建可​​規避傳統監控方法的探測系統。透過使用糾纏粒子,訊息可以這樣的方式傳輸,即任何試圖攔截或觀察通訊的嘗試都會改變其狀態,從而有效地使傳輸變得無法檢測。這將提供一種改變遊戲規則的隱形能力,使特工或軍事資產能夠在不擔心被發現的情況下進行通訊和機動。這將對秘密行動、情報收集和偵察任務產生深遠的潛在影響。如果完全實現,這項技術將使傳統的監視手段變得過時,這就要求對手開發全新的方法來對抗這些隱身的量子化系統。

量子層面的戰略欺騙

量子力學將誤報和欺騙的概念提升到了一個全新的高度,可以利用量子力學製造誤報或誘餌訊號,這些訊號在被觀察到之前看起來是合法的,這種現象深深植根於量子力學本身。這將徹底改變欺騙行動。透過利用量子疊加的特殊性質,基於量子的欺騙行動可以同時呈現多層次的虛假訊息,使對手幾乎無法區分真實數據和偽造數據。量子層面的戰略欺騙將提供戰術優勢,迫使對手將資源和時間浪費在誤導目標上。此外,基於量子的欺騙還可用於操縱決策過程,在敵方隊伍中製造混亂或猶豫。在這個感知往往與現實同等重要的時代,量子力學可以提供一個強大的工具,以不可預測和迷惑性的方式塑造資訊環境。
量子限制與挑戰
雖然量子運算前景廣闊,但要充分發揮其潛力,特別是在軍事應用方面,還必須解決幾個重大的技術挑戰。其中最主要的是可擴展性。目前的量子電腦仍處於實驗階段,大多數系統只能處理有限數量的量子位元。這種限制限制了它們處理複雜防禦場景所需的大規模計算的能力。此外,量子系統對溫度和電磁幹擾等環境因素高度敏感,會導致量子位元在退相干過程中失去量子態。這種不穩定性嚴重影響了量子電腦的可靠性,對其廣泛應用構成了巨大障礙。

糾錯是另一個關鍵挑戰。經典計算的糾錯技術已經非常成熟,而量子系統則不同,由於量子位元本身的脆弱性,量子系統需要更複雜的方法。不過,這一領域正在取得顯著進展,研究人員正在開發新的量子糾錯技術,以減輕這些挑戰。雖然這些進展顯示了前景,但創建可擴展、穩定且能即時糾錯的量子系統對於未來在戰爭環境中部署量子系統仍然至關重要。

除了技術挑戰,量子運算在戰爭中的應用也引發了重要的戰略問題,特別是量子軍備競賽的可能性。隨著各國努力發展先進的量子能力,技術創新的快速步伐有可能升級為量子主導地位的競爭,這種風險越來越大。這種競爭可能會導致不穩定,因為各國會優先發展進攻性量子技術,如加密破解系統和自主作戰能力,而其他國家則急於建立防禦系統,以應對這些新興威脅。解密安全通訊、以前

中國原創軍事資源:https://www.c2.org.cn/h-nd-1667.html

Military Intelligence Drives Accelerated Development of Chinese Army Cyberspace Operations

軍事情報推動中國軍隊網路空間作戰加速發展

現代英語:

The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.

Military intelligence leads to accelerated development of cyberspace operations

■Respect the soldiers Zhou Dewang and Huang Anwei

Three major technologies support the intelligence of cyberspace weapons

Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:

First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.

Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.

Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.

The intelligent trend of network-controlled weapons has become increasingly prominent

Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.

In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.

Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.

Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.

Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.

Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.

Intelligent command information system changes traditional combat command methods

Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.

In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.

In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.

To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.

In the future battlefield, fighting courage requires more fighting “wisdom”

■Yang Jian and Zhao Lu

At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.

Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.

It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.

In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.

現代國語:

資料來源:中國軍網綜合作者:敬兵 周德旺 皇安偉 等責任編輯:胡雪珂

黨的十九大報告指出,要「加速軍事智慧化發展,提升基於網路資訊體系的聯合作戰能力、全域作戰能力」。今天的《解放軍報》刊發文章指出,軍事智能化是機械化、資訊化之後軍事領域發展的新趨勢和新方向,我們要在現有機械化和資訊化基礎上發展智能化,同時用智能化牽引機械化和信息化向更高水平、更高層次發展。網路空間作為新型作戰領域,是科技含量高、最具創新活力的新領域,在軍事智慧化的牽引下,正迎來快速發展的機會期。

軍事智慧化牽引網路空間作戰加速發展

■敬兵 週德旺 皇安偉

三大技術支撐網路空間武器智慧化

智能是一種智慧和能力,是一切有生命週期的系統對規律的感應、認知與運用,智能化就是把這種智慧和能力固化下來,成為一種狀態。網路空間武器是網路空間遂行作戰任務的武器,其形態以軟體和程式碼為主,本質上是一段資料。網路空間武器的智慧化主要體現在以下三個方面:

一是智慧化漏洞挖掘。漏洞是網路武器設計的基礎,今年5月在全球傳播的勒索病毒軟體,就是利用了微軟作業系統漏洞,為網路安全界帶來了巨大震動。漏洞價格昂貴,零日漏洞價值幾萬到幾十萬美元不等。過去漏洞的發現,主要依靠有經驗的駭客,利用軟體工具對程式碼進行檢查和分析。今年中國網路安全大會期間舉辦的國際網路安全技術對抗聯賽總決賽中,參賽人員示範由智慧機器人現場進行漏洞挖掘,然後透過漏洞編寫網路程式碼,形成網路武器,攻破目標系統,奪取旗幟。這項變化,意味著漏洞挖掘進入了智慧化時代。

二是智能化訊號分析和密碼破譯。訊號是網路資料傳輸的載體,密碼是網路資料安全的最後屏障,訊號分析和密碼破解是網路空間作戰的核心技術,突破訊號和密碼是進入網路空間的基本路徑,也是網路武器攻擊的首要目標。智慧化訊號分析將訊號的協定分析、調變辨識、個體辨識等問題,透過大數據、雲端運算、深度學習等技術來解決。密碼破解是計算科學“皇冠上的明珠”,智能化密碼破譯通過對密碼數據樣本的積累,不斷學習、尋找規律,能找到破譯的鑰匙,從而打開網絡數據“保險櫃”的最後一扇門,解決網絡入侵和接入的關鍵環節。

三是智慧化武器平台設計。美軍在2009年提出「網路飛行器」項目,為網路空間作戰提供像戰車、艦艇、飛機這樣的平台,可以實現在網路空間裡自動偵察、載入網路武器、自主協同、自主攻擊,受到威脅時自我銷毀、清除痕跡,具備了一定的智慧化特徵。未來「網路飛行器」載入的武器,不是軟體人員編好的程式碼,而是根據偵察結果直接對發現的漏洞,現場即時進行智慧化網路武器設計,實現「訂購式」開發,從而大大提高網路空間作戰的針對性。

網控武器的智慧化趨勢愈加凸顯

受網路空間控制的武器簡稱網路武器,是透過網路連接,接受網路空間指令,執行跨域任務,在實體空間達成作戰效果的武器。未來的各種作戰武器平台,大多是聯網的武器平台,這樣軍事資訊網本質上就是物聯網,上聯衛星、雷達、無人機等網路實體,從感知到發現、追蹤、定位、打擊都可透過網路空間控制,網控武器的智慧化已在陸海空天電等戰場蓬勃發展。

2015年,敘利亞利用俄羅斯機器人軍團擊潰武裝分子,行動採用了包括6個履帶式機器人、4個輪式機器人、1個自動化火砲群、數架無人機和1套指揮系統。指揮官透過指揮系統調度無人機偵察發現武裝分子,機器人向武裝分子發動衝鋒,同時伴隨火砲和無人機攻擊力量支援,對武裝分子進行了致命打擊。這只是一場小規模的戰鬥,卻開啟了機器人「組團」作戰的先河。

海空戰場網控智慧武器正在大量研發驗證。 2014年,美國海軍使用13艘無人水面艇,示範驗證無人艇集群攔截敵方艦艇,主要透過交換感測器數據,取得了不錯的效果。 2016年再次試驗時,新增了協同任務分配、戰術配合等功能,「蜂群意識」成為其智慧化的顯著特徵。

用於空中作戰的小微型無人機蜂群也正在快速發展。近年來,美國國防部多次試驗「山銻」微型無人機,可一次投放數十架乃至上百架,透過提升其執行偵察任務時的協同能力,在無人機編隊、指揮、控制、智慧化管理等方面都取得了進展。

空天網控武器越來越「聰明」。空天領域主要包含偵察和打擊兩類網控武器,各種功能的衛星主要執行偵察任務,是典型的偵察感測器。隨著各種小微衛星群的出現,使衛星表現出新的特徵:體積小、發射快、數量多、更聰明。小微衛星群在執行偵察和通訊任務時,有了更大的彈性和可靠性,目前世界衛星強國都在積極制定覆蓋範圍更廣的小微衛星群計畫。

各種高超音速打擊武器在空天巡航,彷彿懸在人們頭頂的利劍。美國空軍研究室稱「高速打擊武器」將在2018年前後啟動飛行試驗,其它各國也正積極研發類似武器。這類武器最大的特色是速度快、航程遠、智能化程度高。

智慧化指揮資訊系統改變傳統作戰指揮方式

網路空間武器和受網路空間控制的武器,是智慧化戰爭的“拳頭”,而指揮這些武器運用的指揮資訊系統是智慧化戰爭的“大腦”,網路空間作戰指揮資訊系統要同步跟上智慧化的進程。目前,幾乎全球的指揮資訊系統都面臨著「智慧滯後」的難題,未來戰爭需要快速決策、自主決策,這對智慧輔助系統提出了更高要求。

2007年,美國國防部高級研究計劃局啟動關於指揮控制系統的研發計劃——“深綠色計劃”,以期能實現計算機輔助指揮官快速決策贏得制勝先機。這是一個戰役戰術級的指揮資訊系統,其研發目的是將該系統嵌入美國陸軍旅級C4ISR戰時指揮資訊系統中去,實現指揮官的智慧化指揮。直到今天,美軍也沒有放鬆對智慧化指揮資訊系統的發展。

在網路空間作戰中,網路目標表現為一個接取網路的IP位址,數量眾多導致人工難以有效率操作,作戰更需要智慧化指揮資訊系統的輔助支撐。目前,智慧化指揮資訊系統需要實現智慧情報分析、智慧感知、智慧導航定位、智慧輔助決策、智慧協同、智慧評估、智慧化無人作戰等功能,尤其是實現對無人網控系統的集群作戰操控,這都對智慧化指揮資訊系統提出了迫切需求,需要加快相應關鍵技術的研發和運用。

綜上所述,智慧化的網路武器和網路控制武器,透過智慧化的資訊系統調度,將形成巨大的作戰能力,基本能遂行現行作戰樣式中的所有行動。未來戰爭,從指揮力量編組、到目標選擇、行動方式、戰法運用等,都將在智能化的背景下展開,戰爭「遊戲化」的特徵將更顯著,作戰指揮方式也將發生重大變化。

未來戰場 鬥勇更需鬥“智”

■楊建 趙璐

目前,人工智慧發展進入嶄新階段,並開始向各個領域加速滲透。受此一進程的影響,各國圍繞智慧化的軍事競爭已揭開序幕。我軍歷來是一支英勇頑強、敢打必勝的人民軍隊,未來戰場上應繼續發揚光榮傳統,同時要更加廣泛地掌握和利用最新的科技成果,研製出更多智能化的武器裝備,在未來戰場上掌握制勝先機。

智慧化是人類社會發展的趨勢,智慧化戰爭正加速到來。正是由於超越原有體系結構計算模型的成功創新、奈米製造技術的逐步普及,以及對人腦機制研究的突破性進展,軍事智慧化發展才擁有了堅實的基礎。因此,智慧化武器裝備的表現日益突出,並在情報分析、戰鬥反應等方面開始超越並取代人類。此外,在人力需求、綜合保障、運作成本等方面,智慧化武器裝備也具有明顯的優勢,日益成為戰爭的主導力量。

事實證明,智慧化武器裝備的發展應用,拓展了軍事行動的能力範圍,大幅提升了部隊的作戰效能。在阿富汗和伊拉克戰場上,無人機已承擔了大部分偵察、情報、監視等作戰保障任務,並承擔了約三分之一的空中打擊任務。近兩年,俄羅斯在敘利亞戰場上也曾多次使用較高智慧化程度的無人偵察機、戰鬥機器人等裝備。智慧化武器裝備正愈來愈地展現出超越傳統武器的重要價值。

未來戰爭中,作戰體系智能化的較量將是高手過招、巔峰對決的勝利關鍵。隨著以科技為支撐的軍事手段發展的不平衡性越來越大,誰先具備實施智能化作戰的能力,誰就更能掌握戰場的主動權,擁有技術代差優勢的強者會盡可能將戰爭成本降到最低,而弱者必然遭受巨大損失,付出慘重代價。我們不僅要加緊核心技術創新、武器裝備研製,還要研究探索適應軍事智能化發展的組織結構、指揮方式和運用模式,更要培養一支能夠擔起推進軍事智能化發展、鍛造智能化作戰能力的人才隊伍,充分發揮我軍作戰體系的整體效能,在與對手的較量中,以更加“智慧”的方式贏得戰爭。

中國原創軍事資源:http://www.81.cn/jwzl/2017-11/24/content_7841895888.htm

Chinese Military Research on Conceptual System-based Superior Warfare – How to Fight in Information Warfare System Operations? Analysis of Nine Typical Combat Styles

中國軍事體系優勢作戰概念研究-資訊化作戰體系如何作戰?九種典型作戰風格分析

現代英語:

System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole. 


       In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze .

       System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“
        1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence
        2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations
       3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure
       4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control
       5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
       6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma
       7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support
       8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics
       9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system

        For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body
       The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.


       1. Overall deterrence
       Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.


       1.1 Emphasis on multi-domain joint deterrence
       Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.

1.2 The implementation of overall deterrence should have three major elements
       Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.


       Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.


       1.3 Strong overall strength is the core of achieving effective deterrence
       The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war.
       In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.


       2. Electromagnetic Disturbance Warfare
       Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.


       2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.


       2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.


       2.3 Crack effective tactics for unmanned cluster operations
     “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.


       3. Cyber-sabotage
       Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities.
       The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.


      4. Cognitively Controlled Disturbance Warfare
      Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage.
      Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.


       4.1 Control the cognitive rights of situational awareness and compete for information advantages
       In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.


       4.2 Control and command decision-making power and compete for decision-making advantages
       Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.


       4.3 Control “brain” power and seize the advantage of brain control
       Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.


      5. Agile Mobile Warfare
      Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.

Table 1 Connotation of the concept of agile warfare


      5.1 Efficient and fast decision-making
      To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.


      5.2 High efficiency forms a favorable combat situation
      It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.


      5.3 Efficient and instant gathering of combat power
      To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.


      5.4 Agile mobile warfare is an innovative development of traditional mobile warfare
      In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.


       6. Unmanned cluster autonomous warfare
       Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.


       6.1 It is conducive to forming a system advantage to suppress the enemy
       Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.


       6.2 Conducive to enhancing combat effectiveness
       In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.


       6.3 Conducive to getting into enemy combat difficulties
       Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.


       7. Pointkill Battle
       “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.


      7.1 Achieve efficient combat cost ratio
      Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.


       7.2 Targeting key nodes is an important option
       The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.


       7.3 Large-scale system support is the basic condition
       The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.


       7.4 It is inseparable from precise intelligence support
       In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.


       8. Supply-breaking
       Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.


       8.1 The supply guarantee chain has a huge impact on the overall combat situation
       Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.


       8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain
       The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.


       8.3 The key is to choose the right time and make full use of tactics
       It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.


       9. System “paralysis battle”
       System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.


       9.1 The combat goal is to disorderly operate the enemy’s combat system
       In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.


       9.2 A key node in the heavy strike combat system
       Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.


       9.3 Implement soft strikes against the enemy’s combat system
       When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat. 

現代國語:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制資訊權,進而贏得作戰主動;三是網路破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通信網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速回應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間訊息「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理信息,還要採取網絡輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假信息,破壞、擾亂敵對戰場態勢的感知、認知,最大限度地製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施法實作「攻芯」,透過反義程式定義、原則性反制勝;
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志”的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進信息作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵對決策,或使其失能,實現隱形敵作戰。如以人的認知思維為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施“注入”“侵入”式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵

5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提高作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全局作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人群聚自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘敵實施幹擾、欺騙,或配合主戰兵器實施分佈式協同攻擊,實現整體分散式協同攻擊者。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦探測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以作出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點與關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞著實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使線路、通信和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱密性突然打擊;隱形奇襲戰,使用潛艦、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確補給
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整和重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連接、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界有關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,基於網絡的各種戰爭資源,可以快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2基本著眼導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通信聯絡及資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱整個作戰控制能力,使敵軍系統失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊資訊網路和物理設施,摧毀敵人實體武器。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷和硬摧毀行動,破壞敵之網路體系,使敵能作戰系統整體下降甚至失能作戰。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運作機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟性打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強電磁幹擾,使其信息失靈,陷入戰爭迷霧之中;網絡戰,使用網絡進攻力量對敵網絡信息體系實施攻擊,使敵指揮通信系統和計算機網絡受到嚴重破壞,使其指揮失靈,陷入信息孤島乃至戰爭孤島;心理戰和作戰論戰,使用心理戰、輿論手段,對敵對認知,打擊其戰爭論戰,使用心理戰、輿論手段,對敵對心理打擊行為論組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗。

中國原創軍事資源:http://www.81it.com/2022/0901/13716888.html

Future Proofing China’s National Defense & Military An Important Aspect of Chinese-style Modernization

面向未來的中國國防和軍隊是中國式現代化的重要面向

現代英語:

Soldiers are a major event for the country. In the great journey of “building a powerful country and rejuvenating the nation, and against the background of the accelerated evolution of major changes unseen in the world in a century, building and consolidating national defense and a strong people’s army are directly related to the future and destiny of the country and the nation”. The Third Plenary Session of the 20th Central Committee of the Communist Party of China pointed out that “national defense and military modernization are important components of Chinese-style modernization”, which fully reflects the great importance that the Party Central Committee with Comrade Xi Jinping as the core attaches to national defense and military construction, and provides guidance for national defense and military modernization on the new journey. Modernization points out the direction.

  The modernization of the national defense and military is the security guarantee and strategic support for Chinese-style modernization

  ”If you fall behind, you will be beaten. Only when the army is strong can the country be safe”. Without a strong army, there can be no strong state. After the Opium War in 1840, modern China was repeatedly defeated in its battles with Western powers. The vast country gradually became a semi-colonial and semi-feudal society, with the country humiliated, the people in trouble, and civilization in dust. History has inspired us that the Chinese nation’s emergence from suffering and the liberation of the Chinese people depend on a heroic people’s army; to comprehensively promote the great cause of building a powerful country and national rejuvenation with Chinese-style modernization, we must place national defense and military modernization as a barrier to national security, plan and deploy in strategic positions based on career development, and accelerate the construction and consolidation of national defense and a strong people’s army.

  The modernization of the national defense and military is closely linked and internally unified with Chinese-style modernization. Without the modernization of national defense and the military, there would be no Chinese-style modernization. Comrade Mao Zedong once profoundly pointed out “the original requirements for building socialism were industrial modernization, agricultural modernization, scientific and cultural modernization, and now we must add national defense modernization”; Comrade Deng Xiaoping also emphasized “four modernizations, one of which is national defense modernization”, these all reflect the great importance our party attaches to national defense and military construction.

  Since the 18th National Congress of the Communist Party of China, President Xi has always adhered to the integrated operation of strengthening the country and the military, put national defense and military modernization in the chess game of Chinese-style modernization, and opened up the road to strengthening the military with Chinese characteristics, forming a new strategy for national defense and military modernization by 2027, 2035, and the middle of this century, a new “three-step” strategy for national defense and military modernization that connects near, medium and long-term goals Created a new situation in the cause of strengthening the military. Guided by the party’s goal of strengthening the military in the new era, we will comprehensively implement the strategy of reforming and strengthening the military, promote the reform of the leadership and command system, the reform of scale structure and force organization, and the reform of military policies and systems. Our military’s organizational structure will achieve historic changes, and the force system will achieve revolutionary changes. Reshaping, the basic framework of the socialist military policy system with Chinese characteristics has been constructed and formed. Our military system has been completely new, its structure has been completely new, its pattern has been completely new, and its appearance has been completely new It has laid a solid foundation for the modernization of national defence and the army.

  Military means, as a means of guaranteeing the realization of great dreams, can only stop a war if it can be fought. The current and future periods are critical periods for comprehensively promoting the great cause of building a powerful country and rejuvenating the nation through Chinese-style modernization, and will inevitably encounter various risks, challenges and even turbulent waves. We must comprehensively modernize our national defense and military, build the People’s Army into a world-class military, effectively guarantee Chinese-style modernization, and safeguard national sovereignty, security, and development interests.

   Comprehensive and accurate grasp of the scientific connotation of national defense and military modernization

  Since the 18th National Congress of the Communist Party of China, President Xi has issued a series of important expositions around “Chinese-style modernization”, summarizing the Chinese characteristics, essential requirements and major principles for the formation of Chinese-style modernization, building a theoretical system for Chinese-style modernization, and promoting the new era and new journey. Chinese-style modernization provides scientific guidance and also carries out strategic design and scientific deployment for national defense and military modernization.

  The most fundamental thing about modernizing the national defense and military is to uphold the absolute leadership of the party over the military. The leadership of the Party is the fundamental guarantee of Chinese-style modernization, which determines the fundamental nature of Chinese-style modernization, and it must also determine the fundamental nature of national defense and military modernization. To promote the modernization of national defense and the military on the new journey, we must fully implement a series of fundamental principles and systems for the party to lead the people’s army, comprehensively and thoroughly implement the chairman’s responsibility system of the Military Commission, and effectively unify thoughts and actions into the decisions and arrangements of the Party Central Committee and President Xi; Adhere to the party’s management of cadres and talents, and highlight political standards and combat capabilities Ensure that the barrel of the gun is always in the hands of those who are loyal and reliable to the party; improve the comprehensive and strict governance of the party system, enhance the political and organizational functions of party organizations at all levels, and integrate the party’s leadership throughout the entire process of continuing to deepen national defense and military reforms in all aspects.

  To modernize national defense and the military is to modernize military doctrine, military organization, military personnel, and weapons and equipment. This reflects the inherent requirements for the construction of military forces resulting from changes in the concept of victory in modern warfare, elements of victory and methods of victory, and clarifies the main signs of the basic realization of national defence and military modernization. To realize the modernization of military theory is to keep pace with the times, innovate war and strategic guidance, and form a military theoretical system that is contemporary, leading, and unique; to realize the modernization of organizational form is to deepen the reform of national defense and the military, and the military force structure layout is scientific and reasonable, strategic deterrence capabilities are consolidated and improved, new areas and new quality combat forces continue to grow, and elite operations, system support, and joint victory have become the basic application models; To realize the modernization of military personnel is to deeply implement the strategy of strengthening the military with talents in the new era, promote the comprehensive transformation and upgrading of military personnel’s capabilities, structural layout, and development management, and forge high-quality, professional new military talents with both ability and political integrity; to realize the modernization of weapons and equipment, It is necessary to focus on strengthening national defense scientific and technological innovation and accelerating the development of strategic, cutting-edge and disruptive technologies Accelerate the upgrading of weapons and equipment and the development of intelligent weapons and equipment.

  For the modernization of national defence and the military, we must adhere to the integrated development of mechanization, informatization and intelligence. The military conflicts and local wars that have taken place in recent years have shown that new qualitative combat capabilities generated based on intelligent combat systems are increasingly becoming core military capabilities. Based on mechanization, dominated by informatization, and oriented by intelligence, the three superimpose, penetrate, and support each other, jointly giving rise to new forms of warfare and methods of warfare. Only by accelerating the integrated development of mechanization, informatization and intelligence and keeping up with the new military revolutionary trends in the world can we seize the opportunity and take the initiative in seizing the commanding heights of the military struggle.

  The modernization of national defence and the army is a guarantee of security for insisting on the path of peaceful development. Since ancient times, soldiers have not been warlike. Chinese-style modernization is modernization on the path of peaceful development. Building a consolidated national defense and a strong military commensurate with international status and national security and development interests is a strategic task of China’s socialist modernization drive and an insistence on taking the path of peaceful development. Safety guarantee is an inevitable choice for summarizing historical experience. China has always pursued a defensive defence policy and adhered to the strategic idea of active defence, and no matter how far it develops, China will never seek hegemony or engage in expansion. To promote the modernization of national defense and the military on the “new journey”, we must faithfully implement the concept of a community with a shared future for mankind, resolutely oppose all forms of hegemony and bullying, and contribute China’s strength to building a beautiful world of lasting peace and universal security.

   Advancing the modernization of national defence and the military at a new historical starting point

  The Third Plenary Session of the 20th Central Committee of the Communist Party of China included “continuous deepening of national defense and military reforms into the overall plan for further comprehensive deepening of reforms, and made a series of major strategic arrangements for improving the leadership and management system and mechanism of the people’s army, deepening the reform of the joint operations system, and deepening cross-military and civilian reforms”. On the new journey, we must deeply understand and grasp the themes, major principles, major measures, and fundamental guarantees for further comprehensively deepening reforms, resolutely implement the new “three-step” strategy for national defense and military modernization, and accelerate the modernization of military theory, military organizational form, and military personnel. Modernize and modernize weapons and equipment, and lead the modernization of national defense and the military to move forward with better strategies, higher efficiency, and faster speed.

  Strengthening the Party’s theoretical and scientific leadership in military guidance. Our party insists on combining the basic principles of Marxism with the practice of building the people’s army, absorbing the essence of China’s excellent traditional military culture, and constantly exploring new realms in the development of contemporary Chinese Marxist military theory and military practice. As an important part of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, Xi Jinping Thought on Strengthening the Military has achieved a new leap forward in the Sinicization and modernization of Marxist military theory. It is the fundamental guiding ideology of our party building and military governance in the new era. We must unremittingly arm our minds with Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, further firmly establish the guiding position of Xi Jinping Thought on Strengthening the Military in national defense and military construction, and build and consolidate national defense and a strong people’s army under the guidance of Xi Jinping Thought on Strengthening the Military. Take new and greater steps on the road to strengthening the military with Chinese characteristics.

  Efforts should be made to make the main responsibility and business of war preparation more solid and effective. The People’s Army is an armed group that performs the party’s political tasks. It must be both politically strong and capable. In the final analysis, this ability can win wars. To accelerate the modernization of national defense and the military, we must firmly grasp the fundamental direction of winning wars, establish the only fundamental standard of combat effectiveness, focus all our energy on fighting wars, and work hard on fighting wars. Conscientiously implement the military strategic policy for the new era, operate war preparation and cessation, deterrence and actual combat, war operations and the use of military forces in peacetime as a whole, innovate strategies, tactics and tactics, effectively shape the situation, manage crises, contain wars, and win wars. Adhere to the principle of “training troops as they fight, and comprehensively improve the actual combat level of military training and the ability to perform missions and tasks”.

  Promote high-quality development of national defense and military construction through “reform and innovation”. Reform is a key move that will determine the growth of our army and its future. On the new journey, we must put innovation at the core of the overall military construction and development, transform development concepts, innovate development models, enhance development momentum, and promote the transformation of national defense and military modernization from quantitative growth to qualitative improvement. Focus on integrating national defense and military construction into the national economic and social development system on a wider scale, at a higher level, and to a deeper extent, continuously improve the quality and efficiency of national defense and military modernization, promote the simultaneous improvement of national defense strength and economic strength, and consolidate and improve the integration National strategic system and capabilities, and constantly write a new chapter of strengthening the country and the military.

現代國語:

時間:2024年11月15日 08:20 來源:解放軍報
兵者,國之大事。在強國建設、民族復興偉大征程中,在世界百年未有之大變局加速演進的背景下,建構鞏固國防和強大人民軍隊直接關係國家和民族的前途命運。黨的二十屆三中全會指出,“國防和軍隊現代化是中國式現代化的重要組成部分”,充分體現了以習近平同志為核心的黨中央對國防和軍隊建設的高度重視,為新征程上國防和軍隊現代化建設指明了方向。

國防與軍隊現代化是中國式現代化的安全保障與戰略支撐

落後就要挨打,軍強才能國安。沒有一支強大的軍隊,就不可能有強大的國家。 1840年鴉片戰爭以後,近代中國在與西方列強的較量中屢屢戰敗,泱泱大國逐步淪為半殖民地半封建社會,國家蒙辱、人民蒙難、文明蒙塵。歷史啟示我們,中華民族走出苦難、中國人民實現解放,有賴於一支英雄的人民軍隊;以中國式現代化全面推進強國建設、民族復興偉業,必須把國防和軍隊現代化擺在國家安全之屏障、事業發展之依託的戰略位置來策劃和部署,加快建設鞏固國防和強大人民軍隊。

國防與軍隊現代化與中國式現代化緊密聯繫、內在統一。沒有國防和軍隊的現代化,就沒有中國式現代化。毛澤東同誌曾深刻指出“建設社會主義,原來要求是工業現代化,農業現代化,科學文化現代化,現在要加上國防現代化”;鄧小平同志也曾強調“四個現代化,其中就有一個國防現代化”,這些都體現了我們黨對國防和軍隊建設的高度重視。

黨的十八大以來,習主席始終堅持強國強軍一體運籌,把國防和軍隊現代化放在中國式現代化大棋局中謀劃推進,開闢出中國特色強軍之路,形成了到2027年、2035年、本世紀中葉,近、中、遠目標梯次行動」,開創三步和現代化軍階的國防和軍事戰略。以黨在新時代的強軍目標為引領,全面實施改革強軍戰略,推進領導指揮體制改革、規模結構和力量編成改革、軍事政策制度改革,我軍組織架構實現歷史性變革,力量體系實現革命性重塑,中國特色社會主義軍事政策制度體系基本框架構建形成,我軍體制一新、結構一新、一新、一現代化新格局新化,為國防和軍事基礎一化。

軍事手段作為實現偉大夢想的保底手段,能戰方能止戰。當前和今後一個時期,是以中國式現代化全面推進強國建設、民族復興偉業的關鍵時期,必然會遇到各種風險挑戰甚至驚濤駭浪。我們必須全面推動國防和軍隊現代化,把人民軍隊建設成為世界一流軍隊,有力保障中國式現代化建設,保障國家主權、安全、發展利益。

全面準確掌握國防與軍隊現代化的科學內涵

黨的十八大以來,習主席圍繞中國式現代化發表一系列重要論述,概括形成中國式現代化的中國特色、本質要求和重大原則,構建起中國式現代化的理論體系,為新時代新征程推進中國式現代化提供了科學指引,也為國防和軍隊現代化進行了戰略設計和科學部署。

國防與軍事現代化,最根本的是堅持黨對軍隊絕對領導。黨的領導是中國式現代化的根本保證,決定了中國式現代化的根本性質,也必然決定了國防和軍隊現代化的根本性質。新征程上推動國防和軍隊現代化,必須全面貫徹黨領導人民軍隊的一系列根本原則和製度,全面深入貫徹軍委主席負責制,切實把思想和行動統一到黨中央、習主席決策部署上來;堅持黨管幹部、黨管人才,突顯政治標準和打仗能力,確保槍桿子始終掌握在對黨忠誠可靠的人手中;健全全面從嚴治黨體系,增強各級黨組織政治功能和組織功能,把黨的領導貫穿持續深化國防和軍事改革各方面全過程。

國防與軍隊現代化,就是要實現軍事理論、軍隊組織形態、軍事人員、武器裝備的現代化。這反映了現代戰爭制勝觀念、制勝要素、制勝方式變化對軍事力量建設的內在要求,明確了基本實現國防和軍隊現代化的主要標誌。實現軍事理論現代化,就是要與時俱進創新戰爭和戰略指導,形成具有時代性、引領性、獨特性的軍事理論體系;實現組織形態現代化,就是要深化國防和軍事改革,軍隊力量結構佈局科學合理,戰略威懾能力鞏固提高,新域新質作戰力量不斷壯大,精製作戰、體系支撐、聯合戰略威懾成為基本運作模式;實現軍事人員現代化,就是要深入實施新時代人才強軍戰略,推動軍事人員能力素質、結構佈局、開發管理全面轉型升級,鍛造德才兼備的高素質、專業化新型軍事人才;實現武器裝備現代化,就是要聚力加強國防科技創新,加速戰略性、前沿性、顛覆性技術發展,加速武器裝備升級和智能化武器裝備升級。

國防與軍隊現代化,必須堅持機械化資訊化智慧化融合發展。近年來發生的軍事衝突和局部戰爭表明,基於智慧化作戰體系所產生的新質作戰能力越來越成為核心軍事能力。以機械化為基礎,以資訊化為主導,以智慧化為方向,三者相互疊加、相互滲透、相互支撐,共同催生新的戰爭形態和作戰方式。只有加速機械化資訊化智慧化融合發展,跟上世界新軍事革命潮流,才能在搶佔軍事鬥爭制高點中占得先機、贏得主動。

國防與軍隊現代化,是堅持走和平發展道路的安全保障。自古知兵非好戰。中國式現代化是走和平發展道路的現代化,建立同國際地位相稱、同國家安全和發展利益相適應的鞏固國防和強大軍隊,是中國社會主義現代化建設的戰略任務,是堅持走和平發展道路的安全保障,是總結歷史經驗的必然選擇。中國始終奉行防禦性國防政策,堅持積極防禦戰略思想,無論發展到什麼程度,中國永遠不稱霸、永遠不搞擴張。在新征程上推動國防和軍隊現代化,必須忠實踐行人類命運共同體理念,堅決反對一切形式的霸權霸道欺凌,為建設持久和平、普遍安全的美好世界貢獻中國力量。

在新的歷史起點上推進國防和軍隊現代化

黨的二十屆三中全會將持續深化國防和軍事改革納入進一步全面深化改革的大盤子,對完善人民軍隊領導管理體制機制、深化聯合作戰體系改革、深化跨軍地改革作出一系列重大戰略部署。新旅程上,要深刻領會和把握進一步全面深化改革的主題、重大原則、重大舉措、根本保證,堅決貫徹國防和軍隊現代化新「三步走」戰略,加快軍事理論現代化、軍隊組織形態現代化、軍事人員現代化、武器裝備現代化,引領國防和軍事現代化以更優策略、更高效益、更快速度向前推進。

強化黨的軍事指導理論科學領導。我們黨堅持把馬克思主義基本原理同人民軍隊建設實踐結合,汲取中華優秀傳統軍事文化精華,不斷拓拓當代中國馬克思主義軍事理論和軍事實踐發展新境界。習近平強軍思想作為習近平新時代中國特色社會主義思想的重要組成部分,實現了馬克思主義軍事理論中國化時代化的新飛躍,是新時代我們黨建軍治軍強軍的根本指導思想。我們必須堅持不懈用習近平新時代中國特色社會主義思想武裝頭腦,進一步牢固確立習近平強軍思想在國防和軍隊建設中的指導地位,在習近平強軍思想引領下建設鞏固國防和強大人民軍隊,在中國特色強軍之路上邁出新的更大步伐。

著力把備戰打仗的主責主業抓得更加紮實有效。人民軍隊是執行黨的政治任務的武裝集團,既要政治過硬,也要本領高強,這個本領說到底就是能打勝仗。加快推進國防和軍隊現代化,必須緊緊扭住能打勝仗的根本指向,樹牢戰鬥力這個唯一的根本的標準,全部精力向打仗聚焦,全部工作向打仗用勁。認真貫徹新時代軍事戰略方針,把備戰與止戰、威懾與實戰、戰爭行動與和平時期軍事力量運用作為一個整體加以運籌,創新戰略戰術與戰法打法,有效塑造態勢、管控危機、遏制戰爭、打贏戰爭。堅持仗怎麼打兵就怎麼練,全面提升部隊軍事訓練實戰化水準和履行使命任務的能力。

以改革創新推動國防和軍隊建設高品質發展。改革是決定我軍發展壯大、制勝未來的關鍵一招。新征程上,要把創新擺在軍隊建設發展全局的核心位置,轉變發展理念、創新發展模式、增強發展動能,推動國防和軍隊現代化由量的成長轉向質的提升。著力在更廣範圍、更高層次、更深程度上將國防和軍隊建設融入國家經濟社會發展體系之中,不斷提高國防和軍隊現代化質量效益,促進國防實力和經濟實力同步提升,鞏固提高一體化國家戰略體系和能力,不斷書寫強國強軍新篇章。

中國原創軍事資源:https://www.mva.gov.cn/sy/zt/zt1/xxgcddsjdjs/qwjd/202411/t20241120_453942888.html

Chinese Military’s Brief Analysis of Multi-dimensional Central Warfare

中國軍隊多維中心戰淺析

現代英語:

2023-09-27 11:58:xx

Source: Guangming Military

Since the 1990s, the concepts of multi-dimensional central warfare, such as network-centric warfare, personnel-centric warfare, action-centric warfare, and decision-centric warfare, have been proposed one after another. The evolution of the concept of multi-dimensional central warfare reflects the overall goal of seeking advantages such as platform effectiveness, information empowerment, and decision-making intelligence by relying on military science and technology advantages, and also reflects the contradictory and unified relationship between people and equipment, strategy and skills, and the strange and the normal. Dialectically understanding these contradictory and unified relationships with centralized structured thinking makes it easier to grasp the essential connotation of its tactics and its methodological significance.

Strengthen the integration of the “human” dimension in the combination of people and equipment

The concepts of personnel-centric warfare and platform-centric warfare largely reflect the relationship between people and weapons and equipment. Some have specially formulated human dimension strategies, emphasizing continuous investment in the human dimension of combat effectiveness, which is the most reliable guarantee for dealing with an uncertain future. Since the beginning of the 21st century, with the rapid development of intelligent weapons and equipment, unmanned combat has emerged, and voices questioning the status and role of people have arisen one after another. It is imperative to strengthen the integration of the human dimension and enhance the synergy of the human dimension.

First, we need to enhance spiritual cohesion. Marxism believes that consciousness is the reflection of objective matter in the human mind. Tactics are the expression and summary of combat experience, and they themselves have spiritual or conscious forms. When studying tactics, we naturally need to put spiritual factors first. Some scholars believe that war is still fundamentally a contest of human will. In the information age, people’s spirits are richer and more complex, and enhancing the spiritual cohesion of the human dimension is more challenging and difficult. To enhance people’s spiritual cohesion, we need to coordinate the cultivation of collective spirit and individual spirit, maximize the satisfaction of individual spiritual needs in leading the collective spirit, realize individual spiritual pursuits in shaping the value of collective spirit, and empower people’s spirit with all available and useful information; we need to coordinate the cultivation of critical spirit and innovative spirit, adhere to the tactical epistemology of dialectical materialism, resolutely oppose idealism and mechanism in tactical cognition, and constantly inherit and innovate in criticism; we need to coordinate the cultivation of fighting spirit and scientific spirit, and promote the revolutionary spirit of facing death with courage and winning, and promote the spirit of winning by science and technology.

The second is to enhance the organizational structure. Organizations are the organs of the military, and people are the cells of the organization. The settings of military organizations in different countries have their own characteristics and commonalities. For example, the Ministry of National Defense is generally set up to distinguish between the structure of military branches, hierarchical structures and regional structures, and to distinguish between peacetime and wartime organizations. Although the purpose of construction and war is the same, the requirements for the unity of construction and the flexibility of war are different. To enhance the organizational structure and promote the consistency of war and construction, it is necessary to smooth the vertical command chain, reasonably define the command power and leadership power, command power and control power, so that the government and orders complement each other, and enhance the vertical structural strength of the organization; it is necessary to open up horizontal coordination channels, explore the establishment of normalized cross-domain (organizations, institutions, departments) coordination channels, change the simple task-based coordination model, and enhance the horizontal structural strength of the organization; it is necessary to improve the peace-war conversion mechanism, focus on the organization connection, adjustment and improvement in the change of leadership or command power of the troops, and maintain the stability and reliability of the organizational structure network.

The third is to enhance material support. The spiritual strength of people in combat can be transformed into material strength, but spiritual strength cannot be separated from the support of material strength. To enhance material support and thus realize the organic unity of material and spirit, it is necessary to ensure combat equipment, bedding, food, and medical care, build good learning venues, training facilities, and re-education channels, provide good technical services in combat regulations, physiological medicine, etc., help design diversified and personalized capacity improvement plans and career development plans, and provide strong material and technical support for the development of people’s physical fitness, skills, and intelligence, and thus comprehensively improve people’s adaptability and combat effectiveness in the uncertain battlefield environment of the future.
             

Deepen the practice of the “skill” dimension in the combination of combat and skills

The combination of combat skills is an important principle of tactical application. The technology includes not only the technology at the practical operation level (such as shooting technology), but also the technology at the theoretical application level (such as information technology). It can be said that tactics, technology, art and procedures together constitute its “combat methodology”. Scientific and technological development and scientific technology are important characteristics of scientific and technological development. To deepen the combination of combat skills, it is necessary to correctly grasp the relationship between technology and tactics, art and procedures, and continuously deepen the practice of the “skill” dimension.

First, promote the tacticalization of advanced technology. Technology determines tactics, which is the basic view of dialectical materialism’s tactical theory. The evolution of the concept of multi-dimensional central warfare is also an example of technology driving the development and change of tactics. Engels once pointed out: “The entire organization and combat methods of the army and the related victory or defeat… depend on the quality and quantity of the population and on technology.” However, technology-driven tactics have a “lag effect”, especially in the absence of actual combat traction. This requires actively promoting the military transformation of advanced civilian technologies and the tactical application of advanced military technologies. On the one hand, we must actively introduce advanced civilian technologies, especially accelerate the introduction and absorption of cutting-edge technologies such as deep neural networks and quantum communication computing; on the other hand, we must strengthen tactical training of advanced technology equipment, closely combine technical training with tactical training, and promote the formation of new tactics and new combat capabilities with new equipment as soon as possible.

Second, promote the technicalization of command art. “Art” is a highly subjective concept. Some Chinese and foreign scholars believe that “the art of command is rooted in the commander’s ability to implement leadership to maximize performance”, while others believe that “the art of command is the way and method for commanders to implement flexible, clever and creative command”. Chinese and foreign scholars generally regard command as an art. The main reason is that although command has objective basis and support such as combat regulations, superior orders and technical support, the more critical factor lies in the commander’s subjective initiative and creativity, which is difficult to quantify by technical means. With the development of disciplines and technologies such as cognitive psychology and cognitive neuroscience, the cognitive structure and mechanism of command will become more explicit, the mysterious veil of “command art” will gradually fade, and the technicalization of command art will become an inevitable trend. This requires continuous strengthening of technical thinking, continuous deepening of the construction of artificial intelligence-assisted command decision-making means, continuous deepening of the application of human brain decision-making mechanisms, practical use of technology to deconstruct art, and continuous promotion of the technicalization of command art.

The third is to promote the regulation of combat technology. Many scholars place technology on a position that is almost as important as tactics. This insistence on the integrated development of tactical regulation and the regulation of specialized military technology and special combat technology is an important way to promote the systematic and standardized construction of combat regulations and further achieve the integration and unification of tactics and technology at the legal level.
              

Seeking the advantage of the “odd” dimension in combining the odd and the regular

The odd and the even are a basic contradictory structure of tactics, with inherent identity. Without the odd, there is no even, and without the even, there is no odd; either the odd or the even, ever-changing. The choice of the odd and the even is the category of decision-centered warfare, and the application of the odd and the even is the category of action-centered warfare. In the 1990s, the theories of asymmetric warfare, non-contact warfare, and non-linear warfare were proposed. If “symmetric warfare, contact warfare, and linear warfare” are even, then “asymmetric warfare, non-contact warfare, and non-linear warfare” can be called odd. From the perspective of natural science, “symmetry, contact, and linear” are general, and “asymmetry, non-contact, and non-linear” are detailed. It is an inevitable requirement to grasp the dimension of “odd” in the combination of odd, odd, and even, and to seek the advantages of the “three nons”.

First, seek “asymmetric” advantages. “Symmetry” and “asymmetry” originally refer to the morphological characteristics of things or space. Symmetrical warfare is a battle between two troops of the same type, and asymmetric warfare is a battle between two different types of troops. The theory of asymmetric warfare requires the scientific and reasonable organization of troops, combat forces and weapon systems of different military services, deployment in a wide area, and the concentration of superior forces to deal a fatal blow to the enemy at the best combat opportunity, and then quickly redeploy the forces. Due to the limited combat power, the troops have positive asymmetric advantages and negative asymmetric disadvantages. Seeking asymmetric advantages and avoiding asymmetric disadvantages is the common expectation of the warring parties, which will lead to such a situation that the warring parties cycle back and forth between symmetry and asymmetry. Therefore, to seek “asymmetric” advantages, it is necessary to seek asymmetry in combat power, combat capability, combat command and other aspects, adhere to and carry forward “avoid the strong and attack the weak, avoid the real and attack the virtual”, “you fight yours, I fight mine”, and effectively play advantages and avoid disadvantages in asymmetry. For example, when weapons and equipment are symmetrical, strive to gain an asymmetric advantage in personnel capabilities; when forces are symmetrical, strive to gain an asymmetric advantage in command art.

The second is to seek “non-contact” advantages. “Contact” and “non-contact” are a description of the distance between different things. Contact in the military field is usually defined by the projection distance of weapons. The concept of “non-contact combat” originated from World War II and was created during the Cold War. The connotation of contact combat and non-contact combat changes with the change of the striking distance of weapons and equipment. The warring parties always seek to attack each other at a farther distance or in a wider space without being threatened. Since the 1990s, the theory of “non-contact combat” has been used in many local wars. Non-contact combat is a combat action style that implements long-range precision strikes outside the defense zone while being far away from the opponent. Non-contact combat embodies the idea of winning by technology, flexible mobility, and center of gravity strikes. With the rapid development of military science and technology, the armies of major countries in the world will have the ability to perceive and strike globally, and the connotation of “non-contact” will be further compressed to space, cognitive domain and other space fields. To this end, on the one hand, we must base ourselves on the reality of “contact combat”, learn from each other’s strengths and overcome our weaknesses in contact, and continuously accumulate advantages; on the other hand, we must expand the space for “non-contact combat”, seize the initiative and seize the opportunity in non-contact, and continuously expand our advantages.

The third is to seek “nonlinear” advantages. “Linear” and “nonlinear” usually refer to people’s thinking or behavior patterns. The movement of all things in the universe is complex and mostly nonlinear, while human cognition always tends to be simple, abstract, and linear, and has invented concepts such as logic lines, time lines, and linear mathematics. In military science, the transition from linear operations to nonlinear operations reflects the development and progress of military technology theory. Since the second half of the 20th century, nonlinear operations have been on the historical stage. Some scholars have pointed out that in linear operations, each unit mainly acts in a coordinated manner along a clear front line of its own side. The key is to maintain the relative position between its own units to enhance the safety of the units; in nonlinear operations, each unit simultaneously carries out combat operations from multiple selected bases along multiple combat lines. The key is to create specific effects at multiple decision points against the target. Linear operations mainly reflect the action-centered warfare idea, while nonlinear operations mainly reflect the target-centered warfare idea. To this end, on the one hand, we must deepen the use of linear warfare and make full use of its practical value in facilitating command, coordination and support; on the other hand, we must boldly try non-linear warfare and maximize its potential advantages of extensive mobility and full-dimensional jointness. (Yin Tao, Deng Yunsheng, Sun Dongya)

現代國語:

2023-09-27 11:58:xx

來源:光明軍事
自1990年代以來,網路中心戰、人員中心戰、行動中心戰、決策中心戰等多維度的中心戰概念先後被提出。多維度中心戰概念的演變,反映了依靠軍事科技優勢尋求平台效能、資訊賦能、決策智能等優勢的總體目標,更反映了人與裝、謀與技、奇與正等方面的對立統一關係。以中心式結構化思維辯證地認識這些對立統一關係,更便於掌握其戰術的本質內涵及其方法論意義。
強化人裝結合中「人」維度融合
人員中心戰與平台中心戰概念很大程度上反映的是人與武器裝備的關係。有的專門制定人維度策略,強調在戰鬥力的人維度進行持續投入,對於應對不確定的未來是最可靠的保障。進入21世紀以來,隨著智慧化武器裝備的快速發展,無人作戰異軍突起,對人的地位作用的質疑聲音此起彼伏,強化人維度的融合、增強人維度的合力勢在必行。
一是增強精神凝聚力。馬克思主義認為,意識是客觀物質在人腦中的反映。戰術是戰鬥經驗的表現與概括,本身俱有精神或意識上的形態,研究戰術自然要把精神因素放在第一位。有學者認為,戰爭從根本上來說仍然是人類意志的較量。在資訊化時代,人的精神更加豐富複雜,增強人維度精神上的凝聚力,挑戰和難度更高。增強人的精神凝聚力,需要統籌培養集體精神與個體精神,在引領集體精神中最大限度滿足個體精神需求,在培塑集體精神價值中實現個體精神追求,用一切可用、有用的信息賦能人的精神;需要統籌培養批判精神與創新精神,堅持辯證唯物論的戰術知識論,堅決反對戰術認識上的唯心論和機械論,不斷在批判中繼承、在繼承中創新;需要統籌培養戰鬥精神與科學精神,既要弘揚視死如歸、敢打必勝的革命精神,又要發揚科學制勝、技術制勝的精神。


二是增強組織結構力。組織是軍隊的器官,人是組織的細胞。不同國家軍事組織的設置有其特性,也有其共通性。例如普遍設有國防部,區分軍種結構、層級結構與區域結構,區分平時編制與戰時編成。儘管建與戰在目的上是一致的,但是建的統一性與戰的彈性在要求上不盡相同。增強組織結構力進而促進戰建一致,需要暢通縱向指揮鏈路,合理界定指揮權與領導權、指揮權與控制權,做到政令相長,增強組織的縱向結構力;需要打通橫向協同管道,探索建立常態化的跨領域(組織、機構、部門)協同途徑,改變單純的任務式協同模式,增強組織的橫向結構力;需要健全平戰轉換機制,重點關注部隊領導權或指揮權變更中組織銜接、調整和健全等工作,保持組織結構網絡的穩定性、可靠性。
三是增強物質保障力。戰鬥中人的精神力量可以轉化為物質力量,但精神力量也離不開物質力量的支撐。增強物質保障力進而實現物質與精神的有機統一,需要像為決策保障情報、為槍砲保障彈藥、為車輛保障油料一樣,保障好戰鬥裝具、被裝、伙食、醫療,建設好學習場地、訓練設施和再教育渠道,提供好戰條令、生理醫學等方面技術服務,幫助設計多樣化個人化的能力提升計劃、職業發展規劃,為發展人的體能、技能和智能,進而全面提高人在未來不確定性戰場環境中的適應性和戰鬥力,提供堅強的物質和技術支撐。

深化戰技結合中「技」維度實踐
戰技結合是戰術運用的重要原則。其中的技術不僅包括實務操作層面的技術(如射擊技術),也包括理論應用層面的技術(如資訊科技)。可以認為,戰術、技術、藝術和程序共同構成了其「戰鬥方法論」。科學技術化和技術科學化是科學技術發展的重要特徵。深化戰技結合,需要正確掌握技術與戰術、藝術、程序的關係,不斷深化「技」維度實踐。


一是推動先進技術戰術化。技術決定戰術,是辯證唯物論戰術論的基本觀點。多維度中心戰概念的演變,也是技術推動戰術發展變革的例子。恩格斯曾指出:“軍隊的全部組織和作戰方式以及與之有關的勝負……,取決於居民的質與量和取決於技術。”然而,技術推動戰術具有“滯後效應”,尤其在缺少實戰牽引的情況下。這就需要主動推進先進民用技術的軍事轉化和先進軍事技術的戰術應用。一方面,要積極引進民用先進技術,尤其要加速推進深度神經網路、量子通訊運算等尖端技術的引進吸收;另一方面,要加強先進技術裝備戰術訓練,把練技術與練戰術緊密結合起來,推動新裝備盡快形成新戰術和新戰力。
二是推動指揮藝術技術化。 「藝術」是一個具有較強主體性的概念。中外學者有的認為“指揮藝術根植於指揮官實施領導以最大限度提高績效的能力”,有的認為“指揮藝術是指揮官實施靈活巧妙和富有創造性指揮的方式與方法”。中外學者普遍將指揮視為藝術,主要原因在於:指揮儘管有作戰條令、上級命令和技術保障等客觀方面的依據和支撐,但更關鍵的因素在於指揮員的主觀能動性和創造性,而這是比較難以用技術手段加以量化的。隨著認知心理學、認知神經科學等學科和技術的發展,指揮的認知結構和作用機制將更加顯性化,「指揮藝術」的神秘面紗將逐漸退去,指揮藝術技術化將會成為必然趨勢。這需要不斷強化技術思維,持續深化人工智慧輔助指揮決策手段建設,持續深化人類大腦決策機理運用,切實用技術解構藝術,不斷推動指揮藝術技術化。


三是推動戰鬥技術條令化。不少學者把技術置於與戰術近乎同等重要的地位。這種堅持戰術條令化與兵種專業技術和專門戰鬥技術條令化的融合發展,是推動戰鬥條令體系化規範化建設,進而實現戰術與技術在法規層面融合統一的重要途徑。

謀求奇正結合中「奇」維度優勢
奇與正是戰術的一種基本矛盾結構,具有內在同一性。無奇便無正,無正也無奇;或奇或正,千變萬化。奇與正的選擇是決策中心戰的範疇,奇與正的運用是行動中心戰的範疇。 1990年代,非對稱作戰、非接觸作戰、非線式作戰理論被提出。若稱「對稱作戰、接觸作戰、線式作戰」為正,則可稱「非對稱作戰、非接觸作戰、非線式作戰」為奇。從自然科學角度來看,「對稱、接觸、線式」是概述的,「非對稱、非接觸、非線式」是詳實的。把握好奇正結合中「奇」的維度,謀取「三非」優勢是必然要求。
一是謀取「非對稱」優勢。 「對稱」與「非對稱」本來是對事物或空間的形態特徵的指稱。對稱作戰是兩種相同類型部隊之間的交戰,非對稱作戰是兩種不同類型部隊之間的交戰。非對稱作戰理論要求對不同軍兵種部隊、作戰力量和武器系統進行科學合理編組,在寬廣的地域展開部署,在最佳的作戰時機集中優勢力量給敵人以致命的打擊,然後迅速重新部署力量。由於作戰力量的有限性,部隊有正面的非對稱優勢,就有負面的非對稱劣勢。謀取非對稱優勢、規避非對稱劣勢是交戰雙方的共同期望,進而造成這樣一種局面──交戰雙方在對稱與非對稱之間往復循環。因此,謀取“非對稱”優勢,要謀取作戰力量、作戰能力、作戰指揮等多方面上的非對稱,堅持和發揚“避強擊弱、避實擊虛”“你打你的,我打我的”,在非對稱中有效發揮優勢、規避劣勢。例如,在武器裝備對稱時爭取佔據人員能力上的非對稱優勢,在力量對稱時爭取佔據指揮藝術上的非對稱優勢。
二是謀取「非接觸」優勢。 「接觸」與「非接觸」是對不同事物之間距離狀態的一種描述。軍事領域的接觸通常是以武器的投射距離來界定的。 「非接觸作戰」的概念起源於二戰,產生於冷戰時期。接觸作戰與非接觸作戰的內涵是隨著武器裝備打擊距離的改變而改變的。交戰雙方也總是謀求在免受威脅的更遠距離或更廣空間攻擊對方。自1990年代以來,「非接觸作戰」理論在多場局部戰爭中被運用。非接觸作戰是在遠離對方的情況下實施防區外遠程精確打擊的作戰行動樣式。非接觸作戰體現了技術制勝、靈活機動、重心打擊的思想。隨著軍事科技的快速發展,世界主要國家軍隊將具備全球感知和全球打擊的能力,「非接觸」的內涵將進一步壓縮至太空、認知域等太空領域。為此,一方面要立足「接觸作戰」實際,在接觸中取長補短、固強補弱,不斷積蓄勝勢;另一方面要拓展「非接觸作戰」空間,在非接觸中搶抓先手、搶佔先機,不斷拓展優勢。
三是謀取「非線式」優勢。 「線式」與「非線式」通常是指人的思維或行為模式。宇宙萬物運動是複雜的,大抵是非線式的,而人類的認知總是傾向於簡單的、抽象的、線式的,並發明了邏輯線、時間線以及線性數學等概念。軍事學中,從線式作戰到非線式作戰,反映了軍事技術理論的發展進步。 20世紀下半葉起,非線作戰就登上歷史舞台。有學者指出,線式作戰中各部隊主要沿著明確的己方前沿協調一致行動,關鍵是保持己方部隊之間的相對位置,以增強部隊的安全性;非線式作戰中各部隊從選定的多個基地沿多條作戰線同時實施作戰行動,關鍵是針對目標在多個決定點製造特定效果。線式作戰體現的主要是行動中心戰思想,非線式作戰體現的主要是目標中心戰思想。為此,一方面要深化運用線式作戰,充分利用其便於指揮、協同和保障的實用價值;另一方面要大膽嘗試非線式作戰,最大限度地發揮其廣泛機動、全維聯合的潛在優勢。 (殷濤、鄧雲生、孫東亞)

中國原創軍事資源:http://www.81it.com/2023/0927/14581888.html

United States Continuing Promoting Use of Artificial Intelligence During Combat Operations

美國繼續推動在作戰行動中使用人工智慧

現代英語:

The US military is accelerating the application of artificial intelligence technology in actual combat.

According to foreign media reports, the US Department of Defense recently released a strategic planning document on artificial intelligence technology to strengthen top-level design and promote the rapid development of related technologies. At the same time, the US military has also continued to strengthen its combat use of artificial intelligence technology.

Release of strategic planning documents

Recently, U.S. Deputy Secretary of Defense Hicks signed the strategic document “Responsible Artificial Intelligence Strategy and Implementation Approach”, which clarified the basic principles and main framework for the U.S. Department of Defense to implement the artificial intelligence strategy. The main contents include the following two aspects.

Sort out the “demand side”. First, adjust the management structure and process, and continue to follow up on the development of artificial intelligence technology in the Ministry of National Defense. Second, pay attention to the research and development and procurement of artificial intelligence products, and adjust the speed of artificial intelligence technology development in a timely manner. Third, use the demand verification procedure to ensure that artificial intelligence capabilities are consistent with operational requirements.

Optimize the “R&D end”. First, create a trustworthy AI system and AI-enabled system. Second, promote a common understanding of the concept of “responsible AI” through domestic and international cooperation. Third, improve the theoretical and operational level of AI-related personnel in the Ministry of National Defense.

In addition to the military’s strategic planning report, American think tanks have recently made recommendations on the cooperation between the United States and its allies in the application of artificial intelligence technology. The Center for Security and Emerging Technologies at Georgetown University in the United States released a report stating that the U.S. government, universities, research institutions and the private sector should promote artificial intelligence technology research cooperation with Australia, India and Japan in various ways to achieve an open, accessible and secure technology ecosystem and improve the performance of relevant U.S. military weapons and equipment.

Accelerate the pace of technology application

In addition to formulating a “roadmap” for the development of artificial intelligence technology in top-level design, the US military has also taken a number of measures recently to try to apply relevant mature technologies to military practice.

From the perspective of military construction, the Army’s “Integration Plan”, the Navy’s “Winning Plan” and the Air Force’s “Advanced Combat Management System” are the three major artificial intelligence programs of the US military. All three programs are being promoted simultaneously. Recently, the US Army Contracting Command awarded a US military contractor Engineering and Computer Simulation a contract totaling $63.28 million to design and develop new artificial intelligence algorithms. Kitchener, commander of the US Navy’s surface forces, said that the US Navy’s surface forces will focus on integrating capabilities such as artificial intelligence and machine learning in the near future to significantly enhance their combat advantages. The US Air Force recently successfully demonstrated an artificial intelligence algorithm called Artuu, which can automatically manipulate U-2 reconnaissance aircraft to search for enemy missile launchers and generate real-time combat maps of cross-domain threats.

From the perspective of combat power generation, the U.S. military is accelerating the application of artificial intelligence technology in actual combat. The U.S. National Interest bimonthly website recently published an article saying that the U.S. Navy and Air Force are developing a new generation of training systems to help their fighters better deal with new air threats. This intelligent technology, called the “P5 Combat Training System,” can help U.S. military pilots conduct virtual training in high-threat, high-confrontation combat scenarios.

The Defense Advanced Research Projects Agency (DARPA) is busy verifying an “autonomous cyber attack system based on artificial intelligence chips”. It is reported that the system can generate a set of attack codes every 24 hours and dynamically adjust the attack program according to the real-time network environment. Since the attack code is newly generated, it is difficult for antivirus systems that rely on existing virus libraries and behavior recognition to identify it, and the code is highly concealed and destructive. The Defense Advanced Research Projects Agency (DARPA) believes that the system has extremely high application potential and can help the US military gain technological advantages in future cyber operations.

Triggering a cutting-edge military competition

Overall, the US military has been active in the development of artificial intelligence recently, and related developments may trigger a new round of global cutting-edge military competition.

On the one hand, the US military is promoting the idea of ​​”everything can be intelligent” internally. The US military claims that fighter jets, tanks, ground control stations and surface ships can not only serve as entities with combat capabilities, but also as nodes for monitoring battlefields and obtaining war information. To achieve this goal, artificial intelligence will play an irreplaceable role. Combined with the US military’s strategic planning documents, it is not difficult to see that in order to create more nodes, the US military will give full play to the enabling role of artificial intelligence in the next step to help various weapon platforms find and strike targets faster.

On the other hand, it will have an external impact on the global military development pattern. The US military and its allies are vigorously promoting the development of artificial intelligence technology, mainly to use these advanced technologies to suppress rival countries, and the backlash effect of related practices may be immediate. At present, many countries in the world are vigorously developing related technologies. It can be foreseen that with the rapid development and support of technologies such as artificial intelligence, the future battlefield will accelerate the transition to an intelligent and unmanned battlefield. Cross-domain collaborative operations such as land, sea, air, space, and the Internet will become the main combat style of future wars, driving the development and application of equipment technology, and promoting major changes in the global military development pattern.

現代國語:

據外媒報道,近期,美國國防部發布人工智能技術戰略規劃文件,強化頂層設計,推動相關技術快速發展。與此同時,美軍也持續加強對人工智能技術的作戰運用。

出台戰略規劃文件

近期,美國防部常務副部長希克斯簽署《負責任的人工智能戰略和實施途徑》戰略文件,明確美國防部實施人工智能戰略的基本原則和主體框架,主要內容包括以下兩個方面。

理順“需求端”。一是調整管理結構和流程,持續跟進國防部人工智能技術發展。二是關注人工智能產品的研發和采購,適時調整人工智能技術開發速度。三是使用需求驗證程序,確保人工智能能力與作戰需求保持一致。

優化“研發端”。一是創建可信的人工智能系統和人工智能賦能系統。二是通過國內、國際合作,促進對“負責任的人工智能”概念的共同理解。三是提高國防部人工智能相關人員的理論和操作水平。

除軍方的戰略規劃報告外,近期,美國智庫也對美國與盟友的人工智能技術應用合作提出建議。美國喬治城大學安全和新興技術中心發布報告稱,美國政府、大學、研究機構和私營部門應通過多種方式,促進與澳大利亞、印度和日本3國的人工智能技術研究合作,以實現開放、可訪問和安全的技術生態系統,提升美軍相關武器裝備性能。

加快技術應用步伐

除在頂層設計上為人工智能技術發展制定“路線圖”外,美軍近期還多措並舉,試圖將相關成熟技術運用於軍事實踐。

從軍種建設層面看,陸軍的“融合計劃”、海軍的“制勝計劃”和空軍的“先進作戰管理系統”是美軍當前三大人工智能計劃。三大計劃均在同步推進。近期,美陸軍合同司令部授予美軍事承包商工程與計算機模擬公司一份總金額6328萬美元的合同,以設計和開發新的人工智能算法。美海軍水面部隊指揮官基奇納表示,美海軍水面部隊近期將重點整合人工智能與機器學習等能力,以大幅提升作戰優勢。美空軍近期成功演示了一種名為Artuu的人工智能算法,能自動操縱U-2偵察機尋找敵方的導彈發射器,生成跨域威脅實時作戰圖。

從戰力生成層面看,美軍正在加速人工智能技術在實戰方面的應用。美國《國家利益》雙月刊網站近日刊文稱,美海軍和空軍正在研發新一代訓練系統,幫助其戰斗機更好地應對新的空中威脅。這種名為“P5作戰訓練系統”的智能技術,可幫助美軍飛行員進行高威脅、高對抗作戰場景下的虛擬訓練。

美國防高級研究計劃局則在忙於驗證一款“基於人工智能芯片的自主網絡攻擊系統”。據悉,該系統每24小時可生成一套攻擊代碼,並能根據網絡實時環境,對攻擊程序進行動態調整。由於攻擊代碼是全新生成的,因此,依托現有病毒庫和行為識別的防病毒系統難以識別,代碼的隱蔽性和破壞性強。美國防高級研究計劃局認為,該系統具有極高的應用潛力,能夠在未來的網絡作戰中幫助美軍獲得技術優勢。

引發前沿軍事競賽

總體來看,近期美軍在人工智能建設方面動作頻頻。相關動向或將引發新一輪全球前沿軍事競賽。

一方面,對內推動“萬物皆可智能”。美軍宣稱,無論是戰斗機、坦克、地面控制站還是水面艦船,不僅可作為一個具有作戰能力的實體,還可作為一個監視戰場和獲取戰爭信息的節點。要實現這個目標,人工智能將發揮不可替代的作用。結合美軍戰略規劃文件不難看出,為打造更多節點,美軍下一步將充分發揮人工智能的賦能作用,助力各類武器平台更快地發現和打擊目標。

另一方面,對外影響全球軍事發展格局。美軍及其盟友大力推動人工智能技術發展的做法,主要目的是利用這些先進技術打壓對手國家,相關做法的反噬效應或將立竿見影。目前,世界多國都在大力發展相關技術。可以預見,在人工智能等技術的快速發展和支撐下,未來戰場將加速向智能化、無人化戰場過渡,陸、海、空、天、網等跨域協同作戰,將成為未來戰爭的主要作戰樣式,牽引裝備技術發展和運用轉化,推動全球軍事發展格局發生重大變化。

來源:中國軍網-中國國防報 作者:傅 波 責任編輯:尚曉敏

中國原創軍事資源:http://www.81.cn/wj_208604/10169848888.html

China’s first optical quantum computer shows off its computing power comparable to top “supercomputers”

我國首台光量子電腦展現媲美頂級「超級電腦」的運算能力

現代英語:

In today’s era of rapid technological development, the technological competition between China and the United States is like a war without gunpowder, especially in cutting-edge technology fields such as lithography machines and chips. The United States has relied on its technological advantages to blockade and suppress my country, trying to curb the pace of my country’s technological rise. However, things suddenly turned around, and pressure can often be transformed into motivation. my country’s technology companies did not retreat, but instead accelerated the pace of independent research and development. Recently, the first appearance of a new generation of domestic optical quantum computers is undoubtedly a shining star in my country’s science and technology field, illuminating the road to future technological development.

Stunning debut, showing strength

This device, called “TurningQ Gen2 Large-Scale Programmable Optical Quantum Computing System”, attracted countless eyes. It looks like a double-door refrigerator, seemingly ordinary, but contains huge scientific and technological energy. The device is mainly composed of three core components: quantum light source unit, quantum computing unit, and detection unit. Each component embodies the hard work and wisdom of scientific researchers.

According to relevant persons in charge of Turing Quantum, this optical quantum computer has a quantum superiority level of 56 photons. When solving certain specific problems, its computing power is almost comparable to that of the top supercomputer, Tianhe-2. As an outstanding representative of my country’s supercomputers, Tianhe-2 has been ranked among the top in the global supercomputer rankings many times. Its powerful computing power has provided strong support for many scientific research and engineering fields. Today, the computing power of domestic optical quantum computers on specific problems is comparable to that of Tianhe-2, which is undoubtedly a major breakthrough in my country’s quantum computing field.

What is even more surprising is that compared with Tianhe-2, this optical quantum computer has obvious advantages in terms of floor space and energy consumption. Supercomputers usually require huge computer rooms and a large amount of energy supply to maintain operation, while optical quantum computers are only the size of a refrigerator, which greatly saves space and energy. This not only reduces the cost of use, but also makes it possible for the widespread application of quantum computers.

Key components, simultaneously unveiled

At the exhibition, the key device for the industrialization of this quantum computer, the photonic chip based on 110 nanometer technology, was also unveiled. The photonic chip is one of the core components of the optical quantum computer. It uses photons to transmit and process information and has the advantages of high speed and low energy consumption. The emergence of the photonic chip based on 110 nanometer technology marks that my country has made important progress in photonic chip manufacturing technology.

The development and production of photonic chips require high-precision manufacturing processes and advanced equipment. Through unremitting efforts, Chinese researchers have overcome technical difficulties one after another and successfully developed photonic chips based on 110-nanometer technology. This achievement not only lays a solid foundation for the industrialization of my country’s optical quantum computers, but also wins my country an advantage in the development of photonic chips.

Future prospects, unlimited potential

With the continuous advancement of quantum computing technology, the further optimization of CPO optoelectronic co-packaging and related micro-nano processing technologies, quantum computers are expected to significantly improve computing power while reducing their size to the size of a laptop computer. This prospect is exciting and will bring revolutionary changes to the popularization and application of quantum computers.

In the field of scientific research, quantum computers will provide powerful tools for solving complex scientific problems. For example, in the fields of quantum chemistry, materials science, biomedicine, etc., quantum computers can simulate the structure and properties of molecules and accelerate the process of new drug development and material design. In the financial field, quantum computers can be used for risk assessment, portfolio optimization, etc. to improve the accuracy and efficiency of financial decision-making. In the field of artificial intelligence, quantum computers can accelerate the training of machine learning and deep learning algorithms and promote the development of artificial intelligence technology.

In addition, the widespread application of quantum computers will also drive the development of related industries. From the manufacture of photon chips to the assembly and debugging of quantum computers, to the development and application of quantum computing software, a huge industrial chain will be formed. This will inject new impetus into my country’s economic development and create a large number of employment opportunities.

Independent innovation, forging ahead

The debut of the new generation of domestic optical quantum computers is another major achievement of my country’s independent scientific and technological innovation. In the face of the blockade and suppression of the United States, my country’s technology companies did not choose to rely on imports, but firmly embarked on the path of independent research and development. This spirit of independent innovation is the core driving force of my country’s scientific and technological development.

However, we must also be aware that there is still a certain gap between my country and the world’s advanced level in the field of quantum computing. In future development, we need to continue to increase investment in scientific research, cultivate more scientific and technological talents, strengthen international cooperation and exchanges, and continuously enhance my country’s core competitiveness in the field of quantum computing.

The debut of the new generation of domestic optical quantum computers is an important milestone in the history of my country’s scientific and technological development. It allows us to see the huge potential and broad prospects of my country in the field of quantum computing. I believe that in the near future, quantum computers will enter our lives and bring more surprises and changes to the development of human society. Let us look forward to the arrival of this day and work hard for the brilliant future of my country’s science and technology!

現代國語:

在當今科技快速發展的時代,中美之間的科技競爭猶如一場沒有硝煙的戰爭,在光刻機、晶片等前沿科技領域尤為激烈。美國憑藉其技術優勢對我國進行封鎖和打壓,試圖遏制我國科技崛起的腳步。然而,事情突然反轉了,壓力往往能轉化為動力,我國科技企業並未因此退縮,反而加快了自主研發的腳步。近日,國產新一代光量子電腦首次亮相,無疑是我國科技領域的璀璨明星,照亮了未來科技發展的道路。

驚艷首秀,實力彰顯

這台名為「TurningQ Gen2大規模可程式光量子計算系統」的設備吸引了無數目光。它外觀猶如一台對開門冰箱,看似普通,卻蘊含著巨大的科技能量。該設備主要由量子光源單元、量子計算單元、探測單元三大核心組件所構成,每個組件都凝聚著科研人員的心血與智慧。

據圖靈量子相關負責人介紹,這台光量子電腦具備56光子的量子優越性等級規模。在求解某些特定問題時,其運算能力幾乎可媲美頂尖超級電腦——天河二號。天河二號作為我國超算的傑出代表,曾多次在全球超算排行榜上名列前茅,其強大的運算能力為許多科學研究和工程領域提供了有力支持。而如今,國產光量子電腦在特定議題上的運算能力與之相當,這無疑是我國在量子運算領域的重大突破。

更令人驚訝的是,與天河二號相比,這台光量子電腦在佔地面積和能耗方面具有明顯優勢。超算通常需要龐大的機房和大量的能源供應來維持運行,而光量子電腦僅相當於一台冰箱的大小,大大節省了空間和能源。這不僅降低了使用成本,也為量子電腦的廣泛應用提供了可能。

關鍵裝置,同步亮相

在展會現場,與這台量子電腦實現產業化的關鍵裝置-基於110奈米製程的光子晶片也同步亮相。光子晶片是光量子電腦的核心元件之一,它利用光子進行資訊傳輸和處理,具有高速、低能耗等優點。基於110奈米製程的光子晶片的出現,標誌著我國在光子晶片製造技術上取得了重要進展。

光子晶片的研發和生產需要高精度的製造流程和先進的設備。我國科學研究人員經過不懈努力,攻克了一個又一個技術難題,成功研發了基於110奈米製程的光子晶片。這項成果不僅為我國光量子電腦的產業化奠定了堅實基礎,也為我國在光子晶片領域的發展贏得了先機。

未來展望,潛力無限

隨著量子運算技術的不斷進步,CPO光電共封裝以及相關微納加工製程的進一步優化,量子電腦有望在大幅提升運算能力的同時,將尺寸縮小到筆記型電腦大小。這一前景令人振奮,它將為量子電腦的普及和應用帶來革命性的變化。

在科學研究領域,量子電腦將為複雜科學問題的求解提供強大的工具。例如,在量子化學、材料科學、生物醫學等領域,量子電腦可以模擬分子的結構和性質,加速新藥研發和材料設計的進程。在金融領域,量子電腦可以用於風險評估、投資組合最佳化等,提高財務決策的準確性和效率。在人工智慧領域,量子電腦可以加速機器學習和深度學習演算法的訓練,推動人工智慧技術的發展。

此外,量子電腦的廣泛應用也將帶動相關產業的發展。從光子晶片的製造到量子電腦的組裝和調試,再到量子運算軟體的開發和應用,都將形成一個龐大的產業鏈。這將為我國經濟發展注入新的動力,創造大量的就業機會。

自主創新,砥礪前行

國產新一代光量子電腦的首秀,是我國科技自主創新的另一個重大成果。在面對美國的封鎖和打壓時,我國科技企業並沒有選擇依賴進口,而是堅定地走上了自主研發的道路。這種自主創新的精神是我國科技發展的核心動力。

然而,我們也要清醒地體認到,我國在量子運算領域與世界先進水準仍有一定的差距。在未來的發展中,我們需要持續加大科研投入,培養更多的科技人才,加強國際合作與交流,不斷提升我國在量子運算領域的核心競爭力。

國產新一代光量子電腦的首秀,是我國科技發展史上的重要里程碑。它讓我們看到了我國在量子運算領域的巨大潛力和廣闊前景。相信在不久的將來,量子電腦將走進我們的生活,為人類社會的發展帶來更多的驚喜和改變。讓我們共同期待這一天的到來,為我國科技的輝煌未來而奮鬥!

中國原創軍事資源:https://www.163.com/dy/article/K2OHRN700540MBP1888.html