Category Archives: #Chinese #Quantum #technology

Analyzing the Forms of Chinese Military Intelligent Combat

分析中國軍事情報作戰的形式

現代英語:

Operational form refers to the manifestation and state of combat under certain conditions, and is usually adapted to a certain form of warfare and combat method. With the development and widespread use of intelligent weapon systems, future intelligent warfare will inevitably present a completely different form from mechanized and informationized warfare.

  Cloud-based combat system

  The combat system is the fundamental basis for the aggregation and release of combat energy. An informationized combat system is based on a network information system, while an intelligent combat system is supported by a combat cloud. The combat cloud can organically reorganize dispersed combat resources into a flexible and dynamic combat resource pool. It features virtualization, connectivity, distribution, easy scalability, and on-demand services, enabling each combat unit to acquire resources on demand. It is a crucial support for achieving cross-domain collaboration and represents a new organizational form for intelligent combat systems.

  The cloud-supported combat system utilizes cloud technology to connect information, physical systems, and the ubiquitous Internet of Things. By configuring combat resource clouds at different levels and scales, it highly shares multi-dimensional combat data across land, sea, air, and space, achieving battlefield resource integration across combat domains such as land, sea, air, space, electronic, and cyber domains. This allows various combat elements to converge into the cloud, completing the network interaction of battlefield data.

  The cloud-connected combat system enables joint operations to integrate battlefield intelligence information widely distributed across various domains—space, air, ground, sea, and underwater—with the support of big data and cloud computing technologies. This allows for seamless, real-time, and on-demand distribution of information across these domains, achieving cross-domain information fusion and efficient sharing. It also enables command structures at all levels to leverage intelligent command and control systems for multi-dimensional intelligence analysis, battlefield situation assessment, operational optimization, decision-making, operational planning, and troop movement control. Furthermore, it allows combat forces to rapidly and flexibly adjust, optimize configurations, and recombine online based on real-time operational needs, forming adaptive task forces and implementing distributed, focused operations, supported by highly integrated cross-domain information technology. At the same time, through the cross-domain fusion capability of battlefield information in the combat cloud, it is also possible to form an integrated combat force with intelligent combat forces, traditional combat forces, manned combat forces and unmanned combat forces, and intangible space combat forces and tangible space combat forces. In the cloud, different combat units and combat elements in land, sea, air, space, electronic, and cyberspace can be highly integrated, coordinated, and have their strengths maximized. This enables cross-domain and cross-generational collaborative operations, transforming the overall combat effectiveness from the past gradual release and linear superposition of combat effects to non-linear, emergent, adaptive effects fusion and precise energy release.

  Decentralized and concentrated battlefield deployment

  Concentrating superior forces is an age-old principle of warfare. With the continuous improvement of network information systems and the widespread use of intelligent weapon systems, various combat forces, combat units, and combat elements can dynamically integrate into and rely on joint operations systems, disperse forces, quickly switch tasks, and dynamically aggregate effectiveness to cope with complex and ever-changing battlefield situations. This has become a force organization form that distinguishes intelligent warfare from information warfare.

  The battlefield deployment of dispersed and concentrated forces refers to the joint operations system supported by cloud computing, in which various participating forces rely on the high degree of information sharing and rapid flow. Through node-based deployment, networked mobility, and virtual centralization, it can combine various combat elements, weapon platforms, and combat support systems that are dispersed in a multi-dimensional and vast battlefield space in real time, dynamically and flexibly, so as to achieve the distributed deployment of combat forces, the on-demand reorganization of combat modules, and the cross-domain integration of combat effectiveness.

  The dispersed and concentrated battlefield deployment enables commanders at all levels to deeply perceive and accurately predict the battlefield situation through big data analysis, battlefield situation collection, and multi-source intelligence verification by intelligent command information systems. This allows for rapid and efficient situation assessment and early warning. Furthermore, the wide-area deployment and flexible configuration of various combat forces and units enable timely responses based on predetermined operational plans or ad-hoc collaborative needs. This allows for flexible and autonomous cross-domain coordination, rapid convergence and dispersal, and dynamic concentration of combat effectiveness. At critical times and in critical spaces, focusing on key nodes of the enemy’s operational system and high-value targets crucial to the overall strategic situation, it rapidly forms a system-wide operational advantage. Through a highly resilient and networked kill chain, it precisely releases combat effectiveness, generating an overall advantage spillover effect, thus forming an overwhelming advantage of multiple domains over one domain and the overall situation over the local situation. Especially during the release of combat effectiveness, each combat group, driven by “intelligence + data”, and based on pre-planned combat plans, can autonomously replan combat missions online around combat objectives, and automatically allocate targets online according to the actual combat functions and strengths of each combat unit within the group. This allows each unit to make the most of its strengths and advantages, and flexibly mobilize the free aggregation and dispersal of “materials + energy” in combat operations. Ultimately, this enables rapid matching and integration in terms of targets, situation, missions, capabilities, and timing, thereby forming a focused energy flow that releases systemic energy against the enemy.

  Human-machine integrated command and control

  The history of operational command development shows that decision-making and control methods in operational command activities always adapt to the development of the times. With the maturity of artificial intelligence technology and the continuous development of the self-generation, self-organization, and self-evolution of military intelligent systems, various weapon systems will evolve from information-based “low intelligence” to brain-like “high intelligence.” The combat style will evolve from information-based system combat to human-machine collaborative combat supported by the system. The autonomy of the war actors will become stronger, and the intelligence level of command and control systems will become higher. Fully leveraging the comparative advantages of “human and machine” and implementing decision-making and control through the “human-machine integration” model is a brand-new command form for future intelligent warfare.

  Human-machine integrated command and control, supported by a reasonable division of functions between humans and machines and efficient decision-making through human-machine interaction, fully leverages the complementary advantages of human brain and machine intelligence to achieve the integration of command art and technology. In the process of intelligent combat decision-making and action, it enables rapid, accurate, scientific, and efficient activities such as situation analysis and judgment, combat concept design, combat decision determination, combat plan formulation, and order issuance. It also adopts a “human-in-the-loop” monitoring mode that combines autonomous action by intelligent combat platforms with timely correction by operators to organize and implement combat operations.

  Human-machine integrated command and control, during planning and decision-making, can construct a combat cloud under the commander’s guidance through ubiquitous battlefield networks, intelligent auxiliary decision-making systems, and distributed intelligent combat platforms. Based on a model- and algorithm-driven intelligent “cloud brain,” it performs intelligent auxiliary decision-making, command and control, and evaluation simulations, combining “human strategy” with “machine strategy.” This leverages the respective strengths of both human and machine, achieving a deep integration of command strategy and intelligent support technologies, significantly improving the speed and accuracy of command decisions. During operational control, staff personnel can, based on operational intentions and missions, utilize intelligent battlefield perception systems, mission planning systems, and command and control systems, following a “synchronous perception—” approach. The basic principle of “rapid response and flexible handling” is based on a unified spatiotemporal benchmark and relies on a multi-dimensional networked reconnaissance and surveillance system to perceive changes in the battlefield situation in real time. It comprehensively uses auxiliary analysis tools to compare and analyze the differences between the current situation and the expected objectives and their impact, and makes timely adjustments to actions and adjusts troop movements on the spot to maintain combat advantage at all times. During the execution of operations, the command and control of intelligent combat platforms by operators of various weapon systems at all levels will be timely and precise to intervene according to the development and changes in the battlefield situation. While giving full play to the high speed, high precision and high autonomous combat capabilities of intelligent combat platforms, it ensures that they always operate under human control and always follow the overall combat intent.

  Autonomous and coordinated combat operations

  Implementing autonomous operations is crucial for commanders at all levels to seize opportunities, adapt to changing circumstances, and act rapidly on the ever-changing battlefield, gaining an advantage and preventing the enemy from making a move. This is a vital operational principle and requirement. Previously, due to constraints such as intelligence gathering, command and control methods, and battlefield coordination capabilities, truly autonomous and coordinated operations were difficult to achieve. However, with the continuous development and widespread application of information technology, collaborative control technology, and especially artificial intelligence in the military field, autonomous and coordinated operations will become the most prevalent form of collaboration in future intelligent warfare.

  Autonomous and coordinated combat operations refer to the rapid acquisition, processing, and sharing of battlefield situation information by various combat forces in a cloud environment supported by multi-dimensional coverage, seamless network links, on-demand extraction of information resources, and flexible and rapid organizational support. This is achieved by utilizing “edge response” intelligence processing systems and big data-based battlefield situation intelligent analysis systems. With little or no reliance on the control of higher command organizations, these forces can accurately and comprehensively grasp intelligence information related to their operations and actively and proactively organize combat and coordinated actions based on changes in the enemy situation and unified operational intentions.

  Autonomous and coordinated combat operations, while enhancing the autonomy of organizational operations at the local level, are further characterized by various intelligent weapon systems possessing the ability to understand combat intentions and highly adaptive and coordinated. They can automatically complete the “OODA” cycle with minimal or no human intervention, forming a complete closed-loop “adaptive” circuit. This enables them to efficiently execute complex and challenging combat missions. In rapidly changing battlefield environments, they can accurately and continuously conduct autonomous reconnaissance and detection of enemy situations, autonomously process battlefield situational information, autonomously identify friend or foe, autonomously track targets, and autonomously and flexibly select mission payloads, and autonomously launch attacks within the permissions granted by operators. Furthermore, during combat, intelligent weapon systems located in different spaces can, as the battlefield situation evolves and combat needs arise, form a combat power generation chain of “situational sharing—synchronous collaboration—optimal energy release” around a unified combat objective. Following the principle of “whoever is suitable, whoever leads; whoever has the advantage, whoever strikes,” they autonomously coordinate, precisely releasing dispersed firepower, information power, mobility, and protective power to the most appropriate targets at the most appropriate time and in the most appropriate manner, autonomously organizing combat operations. In addition, highly intelligent weapon systems can not only adapt to high-risk and complex combat environments and overcome human limitations in physiology and psychology, but also enter the extreme space of all domains and multiple dimensions to carry out missions. Moreover, they can conduct continuous combat with perception accuracy, computing speed and endurance far exceeding that of humans, autonomously carry out simultaneous cluster attacks and multi-wave continuous attacks, form a continuous high-intensity suppression posture against the enemy, and quickly achieve combat objectives.

[ Editor: Ding Yubing ]

現代國語:

作戰形式是指在特定條件下作戰的展現方式和狀態,通常與某種戰爭形式和作戰方法相適應。隨著智慧武器系統的發展和廣泛應用,未來的智慧戰爭必將呈現出與機械化戰爭和資訊化戰爭截然不同的形式。

雲端作戰系統

作戰系統是作戰能量聚合與釋放的根本基礎。資訊化作戰系統基於網路資訊系統,而智慧作戰系統則由作戰雲支撐。作戰雲能夠將分散的作戰資源自然地重組為靈活動態的作戰資源池。它具有虛擬化、互聯互通、分散式、易於擴展和按需服務等特點,使每個作戰單位都能按需獲取資源。它是實現跨域協同作戰的關鍵支撐,代表了智慧作戰系統的一種新型組織形式。

雲端作戰系統利用雲端技術連接資訊、實體系統和無所不在的物聯網。透過配置不同層級、規模的作戰資源雲,該系統能夠跨陸、海、空、天等多個作戰領域實現多維作戰資料的高效共享,從而實現陸、海、空、天、電子、網路等作戰領域的戰場資源整合。這使得各種作戰要素能夠匯聚到雲端,完成戰場資料的網路互動。

雲端連接作戰系統借助大數據和雲端運算技術,使聯合作戰能夠整合廣泛分佈於天、空、地、海、水下等多個領域的戰場情報資訊。這實現了跨領域資訊的無縫、即時和按需分發,從而實現跨域資訊融合和高效共享。此外,該系統還使各級指揮機構能夠利用智慧指揮控制系統進行多維情報分析、戰場態勢評估、作戰優化、決策、作戰計畫制定和部隊調動控制。此外,它還允許作戰部隊根據即時作戰需求,在線上快速且靈活地調整、優化配置和重組,形成適應性特遣部隊,並實施分散式、聚焦式作戰,這一切都得益於高度整合的跨域資訊技術的支援。同時,透過作戰雲中戰場資訊的跨域融合能力,還可以將智慧作戰部隊、傳統作戰部隊、有人作戰部隊和無人作戰部隊、無形空間作戰部隊和有形空間作戰部隊整合為一體化作戰力量。在雲端,陸、海、空、天、電子、網路空間等不同作戰單位和作戰要素可以高度整合、協調,並最大限度地發揮各自的優勢。這使得跨域、跨世代協同作戰成為可能,將整體作戰效能從以往作戰效果的逐步釋放和線性疊加轉變為非線性、湧現式、適應性的效果融合和精準的能量釋放。

分散與集中的戰場部署

集中優勢兵力是古老的戰爭原則。隨著網路資訊系統的不斷完善和智慧武器系統的廣泛應用,各類作戰力量、作戰單位和作戰要素能夠動態地融入聯合作戰系統並依託其運作,實現兵力分散、任務快速切換、動態聚合作戰效能,從而應對複雜多變的戰場形勢。這已成為區分智慧戰和資訊戰的兵力組織形式。

戰場分散與集中兵力部署是指基於雲端運算的聯合作戰系統,其中各參戰力量依托高度的資訊共享和快速流動,透過節點式部署、網路化移動和虛擬集中等方式,能夠即時、動態、靈活地整合分散在多維廣大戰場空間中的各類部署、作戰作戰、武器平台和作戰系統,從而實現分散在多維廣大戰場空間中的各類部署、作戰作戰、武器平台和作戰系統,從而實現作戰力量的分佈以及跨域作戰空間中的各類部署、作戰級作戰、武器效能的以及跨域作戰元素,從而實現作戰力量的跨域作戰、作戰效能的跨域作戰元素。

分散與集中的戰場部署使得各級指揮官能夠透過智慧指揮資訊系統進行大數據分析、戰場態勢擷取與多源情報驗證,從而深入感知並準確預測戰場態勢。這使得快速和高效率的態勢評估與預警。此外,各類作戰部隊和單位的大範圍部署和靈活配置,使其能夠根據預定的作戰計畫或臨時協同需求做出及時反應。這實現了靈活自主的跨域協同、快速的匯聚與分散,以及動態集中作戰效能。在關鍵時刻和關鍵區域,透過聚焦敵方作戰系統的關鍵節點和對整體戰略態勢至關重要的高價值目標,迅速形成系統級的作戰優勢。透過高韌性、網路化的殺傷鏈,精準釋放作戰效能,產生整體優勢的溢出效應,從而形成多域對單域的壓倒性優勢,以及整體態勢對局部態勢的壓倒性優勢。尤其是在釋放作戰效能的過程中,各作戰群在「情報+數據」的驅動下,基於預先制定的作戰計劃,能夠圍繞作戰目標自主地在線重新規劃作戰任務,並根據群內各作戰單位的實際作戰功能和實力,自動在線分配目標。這使得每個單位都能充分發揮自身優勢,靈活調動作戰行動中「物質+能量」的自由聚合與分散。最終,這能夠實現目標、態勢、任務、能力和時間等方面的快速匹配與整合,從而形成集中的能量流,釋放系統性能量對抗敵人。

人機一體化指揮控制

作戰指揮發展史表明,作戰指揮活動中的決策和控制方法始終與時俱進。隨著人工智慧技術的成熟以及軍事智慧系統自生成、自組織、自演化的不斷發展,各種武器系統將從基於資訊的「低智慧」向類腦的「高智慧」演進。作戰方式也將從資訊為基礎的系統作戰向系統支援的人機協同作戰演進。作戰主體的自主性將增強,指揮控制系統的智慧水準也將提高。充分發揮「人機」的比較優勢,透過「人機融合」模式進行決策與控制,是未來智慧戰爭的全新指揮形式。

人機融合指揮控制,以人機功能合理劃分與人機互動高效決策為基礎,充分發揮人腦與機器智慧的互補優勢,實現指揮藝術與科技的融合。在智慧作戰決策和行動過程中,能夠快速、準確、科學、有效率地進行態勢分析判斷、作戰概念設計、作戰決策確定、作戰計畫制定和命令下達等活動。同時,它採用「人機協同」監控模式,將智慧作戰平台的自主行動與操作人員的及時糾正相結合,組織和實施作戰行動。

人機融合指揮控制在計畫和決策階段,能夠透過無所不在的戰場網路、智慧輔助決策系統和分散式智慧作戰平台,在指揮官的指導下建構作戰雲。基於模型和演算法驅動的智慧“雲大腦”,該系統能夠進行智慧輔助決策、指揮控制和評估模擬,將“人機戰略”相結合,充分發揮人機各自的優勢,實現指揮戰略與智能支援技術的深度融合,顯著提升指揮決策的速度和準確性。在作戰控制過程中,參謀人員可以根據作戰意圖和任務,運用智慧戰場感知系統、任務規劃系統和指揮控制系統,遵循「同步感知」的原則。該系統以統一的時空基準為基礎,依托多維網路偵察監視系統,即時感知戰場態勢變化,並綜合運用輔助分析工具,對比分析當前態勢與預期目標之間的差異及其影響,及時調整行動,並根據實際情況調整部隊調動,始終保持作戰優勢。在作戰執行過程中,指揮人員能夠根據作戰意圖和任務,即時運用智慧輔助決策、指揮控制和評估模擬等手段,對戰場態勢變化進行即時感知和評估模擬。各級不同武器系統操作人員對智慧作戰平台的控制,將能夠根據戰場情勢的發展變化及時、精準地進行幹預。在充分發揮智慧作戰平台高速、高精度、高自主作戰能力的同時,確保其始終在人為控制下運行,並始終遵循整體作戰意圖。

自主協同作戰

對於各級指揮官而言,實施自主作戰至關重要,它能夠幫助他們抓住機會、適應不斷變化的環境、在瞬息萬變的戰場上迅速行動,取得優勢並阻止敵方行動。這是一項至關重要的作戰原則和要求。過去,由於情報收集、指揮控制方式以及戰場協同能力等方面的限制,真正實現自主協同作戰較為困難。然而,隨著資訊科技、協同控制技術,特別是人工智慧在軍事領域的不斷發展和廣泛應用,自主協同作戰將成為未來智慧戰爭中最普遍的協同作戰形式。

自主協同作戰是指在多維覆蓋、無縫網路鏈路、按需提取資訊資源以及靈活快速的組織支援等雲環境下,各作戰部隊快速獲取、處理和共享戰場態勢資訊。這主要透過利用「邊緣響應」情報處理系統和基於大數據技術的戰場態勢智慧分析系統來實現。這些部隊在幾乎無需依賴上級指揮機構的控制的情況下,能夠準確、全面地掌握與其作戰相關的情報信息,並根據敵情變化和統一作戰意圖,主動組織作戰和協同行動。

自主協同作戰在增強局部組織作戰自主性的同時,也具有多種智慧武器系統能夠理解作戰意圖並高度適應和協調的特徵。這些系統能夠在極少或無需人為幹預的情況下自動完成“OODA循環”,形成完整的閉環“自適應”迴路。這使得它們能夠有效率地執行複雜且具挑戰性的作戰任務。在瞬息萬變的戰場環境中,智慧武器系統能夠準確、持續地自主偵察敵情,自主處理戰場態勢訊息,自主辨識敵我,自主追蹤目標,自主靈活地選擇任務負荷,並在操作人員授權範圍內自主發動攻擊。此外,在戰鬥中,分佈於不同空間的智慧武器系統能夠隨著戰場態勢的演變和作戰需求的出現,圍繞著統一的作戰目標,形成「態勢共享—同步協同—最優能量釋放」的作戰能力生成鏈。遵循「適者先攻,優勢者出擊」的原則,它們自主協調,在最恰當的時間以最恰當的方式,將分散的火力、資訊能力、機動性和防護能力精準地釋放到最恰當的目標,自主組織作戰行動。此外,高度智慧化的武器系統不僅能夠適應高風險、複雜的作戰環境,克服人類生理和心理的限制,還能進入多域、多維度的極端空間執行任務。此外,它們能夠以遠超人類的感知精度、運算速度和續航能力進行持續作戰,自主執行同步集群攻擊和多波次連續攻擊,形成對敵持續高強度壓制態勢,並迅速達成作戰目標。

[ 編:丁玉冰 ]

中國原創軍事資源:https://mil.gmw.cn/2022-02/284/content_38585848178687.htm

Inclusive Plan for Building Chinese Artificial Intelligence Capabilities

建構中國人工智慧能力的包容性規劃

現代英語:

To bridge the digital and intelligent divide, and particularly to ensure the Global South benefits equitably from the development of artificial intelligence, China believes it is essential to uphold the UN’s coordinating role in international development cooperation, adhere to genuine multilateralism, and, based on the principles of sovereign equality, development orientation, people-centeredness, inclusiveness, and collaborative cooperation, effectively implement the UN General Assembly resolution on strengthening international cooperation in artificial intelligence capacity building ( A/RES/78/311 ) through North-South cooperation, South-South cooperation, and trilateral cooperation, thereby promoting the implementation of the UN 2030 Agenda for Sustainable Development. To this end, China has proposed the “Inclusive Plan for Artificial Intelligence Capacity Building” and calls on all parties to increase investment in artificial intelligence capacity building.

I. Vision and Goals

(a) Promoting the connectivity of artificial intelligence and digital infrastructure    

Improve the global interoperability of artificial intelligence and digital infrastructure, actively assist countries, especially the Global South, in developing artificial intelligence technologies and services, and help the Global South truly access artificial intelligence and keep up with the pace of its development.

(II) Promoting the application of “AI+” to empower various industries

Explore and promote the all-round, full-chain, and multi-scenario empowerment of the real economy by artificial intelligence, promote the application of artificial intelligence in industrial manufacturing, traditional agriculture, green transformation and development, climate change response, biodiversity protection and other fields, and promote the construction of a rich, diverse, healthy and benevolent artificial intelligence development ecosystem in accordance with local conditions.

(III) Strengthening AI literacy and talent cultivation

Actively promote the widespread application of artificial intelligence in education, carry out talent training and exchange in artificial intelligence, increase the sharing of general professional knowledge and best practices, cultivate public awareness of artificial intelligence, protect and strengthen the digital and intelligent rights of women and children, and share knowledge, achievements and experiences in artificial intelligence.

(iv) Enhance the security and diversity of artificial intelligence data

Cooperation will promote the lawful, orderly, and free cross-border flow of data, explore the establishment of a global mechanism platform for data sharing, and safeguard personal privacy and data security. It will also promote the equality and diversity of AI data corpora, eliminate racism, discrimination, and other forms of algorithmic bias, and promote, protect, and preserve the diversity of civilizations.

(v) Ensure that artificial intelligence is safe, reliable and controllable

Upholding the principles of fairness and non-discrimination, we support the establishment of a globally interoperable framework, standards, and governance system for AI security risk assessment that takes into account the interests of developing countries within the framework of the United Nations. We will jointly assess the risks of AI research and application, actively promote and improve technologies and policies to address AI security risks, and ensure that the design, research and development, use, and application of AI promote human well-being.

II. China’s Actions

(i) China is willing to carry out North-South cooperation, South-South cooperation and trilateral cooperation in the field of artificial intelligence with all countries, jointly implement the outcomes of the UN Future Summit, actively cooperate with all countries, especially developing countries, in the construction of artificial intelligence infrastructure, and jointly build joint laboratories.

(ii) China is willing to carry out cooperation in the research and development and empowerment of artificial intelligence models, especially to promote the application of artificial intelligence in poverty reduction, medical care, agriculture, education and industrial manufacturing, deepen international cooperation in the artificial intelligence production and supply chain, and unleash the dividends of artificial intelligence as a new type of productive force.

(III) China is willing to work with all countries, especially developing countries, to explore the potential of artificial intelligence to empower green development, climate change response, and biodiversity conservation, and contribute to global climate governance and sustainable development.

(iv) China is willing to build an international cooperation platform for artificial intelligence capacity building. China’s artificial intelligence industry and industry alliances are willing to carry out various forms of exchange activities with all countries, especially developing countries, to share best practices, and to build an open source community for artificial intelligence in a responsible manner, so as to promote the construction of a multi-level and multi-industry cooperation ecosystem.

(v) The Chinese government will organize short- and medium-term education and training programs for artificial intelligence capacity building in developing countries, share artificial intelligence education resources, and carry out joint programs and exchanges in artificial intelligence to help developing countries cultivate high-level artificial intelligence science and technology and application talents.

(vi) The Chinese government is willing to strengthen cooperation with developing countries in human resources assistance. Building on the first artificial intelligence capacity building workshop held this year, it will hold ten more training and seminar programs in the field of artificial intelligence, focusing on developing countries, by the end of 2025.

(vii) China is willing to work with all countries, especially developing countries, to cultivate public awareness of artificial intelligence, and promote the popularization and professional knowledge of artificial intelligence in a multi-dimensional, multi-level and multi-platform manner through a combination of online and offline methods, and strive to improve the artificial intelligence literacy and skills of our people, especially to protect and improve the digital rights of women and children.

(viii) China is willing to work with all countries, especially developing countries, to jointly develop artificial intelligence corpora, take positive measures to eliminate racial, algorithmic, and cultural discrimination, and commit to maintaining and promoting linguistic and cultural diversity.

(ix) China is willing to work with all countries, especially developing countries, to promote and improve data infrastructure and jointly promote the fair and inclusive use of global data.

(x) China is willing to work with all countries, especially developing countries, to strengthen the alignment of artificial intelligence strategies and policy exchanges, actively share policies and technical practices in artificial intelligence testing, evaluation, certification and regulation, and work together to address the ethical and security risks of artificial intelligence.

現代國語:

為彌合數位落差和智慧鴻溝,尤其要確保全球南方國家公平地受益於人工智慧發展,中國認為必須維護聯合國在國際發展合作中的協調作用,堅持真正的多邊主義,並本著主權平等、發展導向、以人為本、包容性和協作性原則,透過南北合作、南南合作和三方合作,切實落實聯合國大會關於加強人工智慧能力建構國際合作的決議(A/RES/78/311),從而推動落實聯合國2030年永續發展議程。為此,中國提出了“人工智慧能力建設包容性方案”,並呼籲各方加大對人工智慧能力建設的投入。

一、願景與目標

(a) 促進人工智慧與數位基礎設施的互聯互通

提升人工智慧與數位基礎設施的全球互通性,積極協助各國,特別是全球南方國家,發展人工智慧技術和服務,幫助全球南方國家真正獲得人工智慧,並跟上其發展步伐。

(II) 推動「AI+」賦能各產業

探索並推動人工智慧對實體經濟的全方位、全鏈、多場景賦能,推動人工智慧在工業製造、傳統農業、綠色轉型發展、氣候變遷因應、生物多樣性保護等領域的應用,並根據當地實際情況,推動建構豐富多元、健康向善的人工智慧發展生態系統。

(三)加強人工智慧素養與人才培養

積極推動人工智慧在教育領域的廣泛應用,進行人工智慧人才培訓和交流,加強一般專業知識和最佳實踐的分享,提升大眾對人工智慧的認識,保護和加強婦女兒童的數位和智慧權利,分享人工智慧領域的知識、成果和經驗。

(四)增強人工智慧資料的安全性與多樣性

合作將促進資料合法、有序、自由的跨境流動,探索建立全球資料共享機制平台,保障個人隱私和資料安全。同時,也將促進人工智慧資料語料庫的平等性和多樣性,消除種族主義、歧視和其他形式的演算法偏見,促進、保護和維護文明多樣性。

(五)確保人工智慧安全、可靠、可控

秉持公平、非歧視原則,我們支持在聯合國框架內建立兼顧發展中國家利益的全球互通人工智慧安全風險評估架構、標準和治理體系。我們將共同評估人工智慧研發和應用風險,積極推動和改善應對人工智慧安全風險的技術和政策,確保人工智慧的設計、研發、使用和應用促進人類福祉。

二、中國的行動

(一)中國願與各國在人工智慧領域進行南北合作、南南合作與三方合作,共同落實聯合國未來高峰會成果,積極與各國,特別是發展中國家合作建置人工智慧基礎設施,共同建置聯合實驗室。

(二)中國願在人工智慧模型研發和賦能方面開展合作,尤其是在推動人工智慧在減貧、醫療、農業、教育和工業製造等領域的應用方面,深化人工智慧生產和供應鏈領域的國際合作,釋放人工智慧作為新型生產力的紅利。

(三)中國願與各國,特別是發展中國家,共同探索人工智慧在賦能綠色發展、應對氣候變遷和保護生物多樣性方面的潛力,為全球氣候治理和永續發展做出貢獻。

(四)中國願建構人工智慧能力建構國際合作平台。中國人工智慧產業和產業聯盟願進行各種形式的合作。

與各國,特別是發展中國家進行交流活動,分享最佳實踐,負責任地建構人工智慧開源社區,以促進多層次、多產業的合作生態系統建設。

(五)中國政府將在發展中國家組織進行短期和中期人工智慧能力建構教育培訓項目,共享人工智慧教育資源,進行人工智慧聯合項目和交流,幫助發展中國家培養高水準人工智慧科技及應用人才。

(六)中國政府願加強與發展中國家在人力資源援助的合作。在今年舉辦的首屆人工智慧能力建構研討會的基礎上,到2025年底,中國將再舉辦十期人工智慧領域的培訓和研討會,重點是發展中國家。

(七)中國願同各國,特別是發展中國家,共同努力,透過線上線下相結合的方式,多維度、多層次、多平台地普及人工智慧知識,提高國民人工智慧素養和技能,尤其要保護和改善婦女兒童的數位權利。

(八)中國願同各國,特別是發展中國家,共同建構人工智慧語料庫,積極消除種族歧視、演算法歧視和文化歧視,致力於維護和促進語言文化多樣性。

(九)中國願同各國,特別是發展中國家,共同促進資料基礎建設,共同推動全球資料的公平、包容性利用。

(十)中國願與各國,特別是發展中國家,加強人工智慧戰略和政策交流的協調一致,積極分享人工智慧測試、評估、認證和監管方面的政策和技術實踐,共同應對人工智慧的倫理和安全風險。

中國原創軍事資源:https://www.mfa.gov.cn/web/wjbzhd/2028409/t2028409827_114984638.shtml

A Brief Analysis of the Characteristics and Patterns of Chinese Intelligent Warfare

中國情報戰的特徵和模式簡析

現代英語:

Currently, the rapid development of intelligent technologies, primarily artificial intelligence, has triggered a chain of breakthroughs in the military field, leading to significant changes in the concepts, elements, and methods of winning wars, and accelerating the evolution of warfare towards intelligence. Intelligent warfare, as a new form of warfare following mechanized and informationized warfare, represents a comprehensive upgrade and reshaping of force systems, combat methods, and battlefield space. A forward-looking analysis of the characteristics and patterns of intelligent warfare is crucial for accelerating the development of military intelligence, forging intelligent combat capabilities, seizing strategic initiative, and winning future intelligent wars.

Intellectual control becomes the core of winning wars.

Looking back at the history of human warfare, control of land, sea, air, and space has become the focus of contention in different historical periods. Control of physical space is crucial for winning mechanized warfare, while information warfare relies even more heavily on information superiority. Information superiority has surpassed physical space superiority to become the core superiority in information warfare. It is clear that technology has significantly influenced the historical trajectory of the evolution of war superiority. In the era of intelligent warfare, massive amounts of data need to be transmitted, acquired, and processed in real time. Manned, unmanned, and swarm combat platforms need to be more intelligent and autonomous, and the operational chain “OODA” (Output-Output-Action) needs to be efficiently and rapidly closed. All of these rely on intelligent technologies, primarily artificial intelligence, for empowerment. Intelligence superiority will dominate the outcome of future wars.

The pursuit of dominance in warfare has always been a relentless endeavor in the military practices of various countries. Since the 1990s, the Gulf War, the Kosovo War, the Afghanistan War, and the Iraq War have fully demonstrated the battlefield dominance brought about by information superiority. Currently, countries worldwide are vigorously promoting the military application of artificial intelligence, establishing relevant functional departments, and clarifying development priorities. The US Department of Defense’s “Data, Analytics, and Artificial Intelligence Adoption Strategy” and the UK Ministry of Defence’s “Defense Artificial Intelligence Strategy” are both aimed at building powerful militaries for the intelligent era. In the future, the competition among militaries for intelligent superiority will continue and intensify, pushing the control of intelligence to become a core element of victory in warfare.

Human-machine integration has become a basic form of combat force.

From the perspective of combat force development, the dominance of unmanned combat forces is an inevitable trend. The deployment of unmanned systems on the battlefield does not simply change the way humans fight, but rather alters the most basic unit involved in combat. Currently, unmanned combat forces have become a key focus of development for militaries worldwide. In August 2023, the US military announced the “Replicator” program, aiming to deploy thousands of low-cost, expendable unmanned autonomous systems within 18-24 months. In April 2025, the US Department of Defense released a memorandum titled “Army Transformation and Acquisition Reform,” planning to equip each combat division with approximately 1,000 drones. Early Russian military plans clearly stated that by 2025, unmanned equipment would account for over 30% of its force. In May 2025, the British Army released the “20-40-40” strategic doctrine, aiming for an overall unmanned force ratio of 80%. Objectively speaking, the level of intelligence of unmanned equipment currently used in the military is generally low, with most still relying on remote control by combat personnel. For a considerable period in the future, improving the autonomy of machines will remain a key focus and trend in the development of unmanned equipment, and this increased autonomy will, in turn, lead to wider application of unmanned equipment.

From the perspective of artificial intelligence technology development trends, human-machine integration is an inevitable choice for achieving complementary advantages between humans and machines while ensuring the safety and controllability of machines. On the one hand, human-machine integration is an inevitable choice for fully leveraging the respective strengths of biological and machine intelligence. Looking at the development history of artificial intelligence, machines possess advantages surpassing humans in computation and perception, excelling in data processing, classification and recognition, and real-time analysis. However, humans still retain advantages in situational awareness, forward-looking reasoning, and command and decision-making. Effectively leveraging the respective strengths of humans and machines is the optimal choice for solving complex problems. On the other hand, human-machine integration is an inevitable choice for ensuring the safety and controllability of machine intelligence. No matter how superior a machine’s performance, it cannot escape human control and cannot harm humanity itself. Human-machine integration enables macroscopic controllability and microscopic autonomy of machines, thereby achieving the optimal state where humans lead the operational intent while machines handle the operational details.

Unmanned intelligent warfare has become the main form of combat.

Currently, technologies such as artificial intelligence and unmanned autonomous systems are deeply embedded in the military field, driving the continuous upgrading and reshaping of combat styles. Engels once profoundly pointed out: “Once technological advancements can be used for military purposes and have been used for military purposes, they immediately, almost forcibly, and often against the will of the commanders, cause changes or even revolutions in the methods of warfare.” Unmanned warfare first appeared during World War II, but due to the limited technological development at the time, its application scenarios and combat functions were relatively simple. Since the 21st century, the functions of unmanned warfare have been continuously expanding. In the Afghan War, the US military used MQ-1 “Predator” drones to kill al-Qaeda leaders; in the Iraq War, the US-led coalition used more than 20 types of ground unmanned systems and unmanned underwater vehicles for reconnaissance, mine clearance, and obstacle removal. In the latest local wars, unmanned warfare has been widely used in reconnaissance and surveillance, fire strikes, terminal guidance, and communication relay missions. Meanwhile, manned/unmanned collaborative operations have become an important form, and unmanned swarm operations have played a crucial role. Practice shows that combat personnel are quietly moving away from the front lines, and unmanned warfare has become an important style of modern warfare. With continuous breakthroughs in intelligent technology, the intelligence and autonomy of equipment, as well as the degree of human-machine integration, will be significantly improved. At the same time, artificial intelligence will improve the speed, quality, and accuracy of commanders’ decision-making, and the intelligence chain, command and control chain, strike chain, and support chain will be efficiently linked, promoting a second-level response in the “observation-judgment-decision-action” closed loop. This will drive unmanned warfare to develop to a higher level of intelligence, such as intelligent “swarms,” ​​”Trojan horse” infiltration, and distributed autonomous combat styles, which will fundamentally change the form and rules of traditional warfare. Unmanned intelligent warfare will become the main combat mode of intelligent warfare.

Real-time, multi-dimensional, cross-domain operations have become a key requirement for the struggle for spacetime.

Time and space are the fundamental components and operational basis of warfare. In the era of intelligent warfare, the spatiotemporal perspective of war will undergo fundamental changes. First, time will be extremely compressed. Intelligent warfare has truly entered the “detect and destroy” era, significantly accelerating the pace of combat. The increasing autonomy of unmanned equipment further separates humans from equipment, continuously compressing the time for detection and strike. The intelligent interconnection of unmanned and manned equipment further enhances the ability to perceive the battlefield and respond to complex battlefield environments. The temporal segmentation of battlefield situation changes is more detailed and precise, with increasingly shorter time slots and smaller granularities, resulting in an unprecedented increase in the amount of combat content carried per unit of time and its utilization efficiency. Second, space will expand infinitely. The military application of unmanned intelligent technologies is constantly breaking through the logical limits of human thinking, the physiological limits of senses, and the physical limits of existence. The battlefield is further extending to polar regions, the deep sea, and deep space. The territory of war is expanding from physical space and information space to cognitive space, forming operational domains such as the physical domain and the information domain. Third, time and space will act in parallel. Intelligent warfare is subverting the spatiotemporal relationship of the traditional battlefield, making traditional strategies and tactics of trading time for space or space for time ineffective. With increasingly tighter combat schedules, expanded combat spaces, and more diverse combat methods, coupled with a more synchronized spatiotemporal relationship and a more integrated spatiotemporal effect, the human-machine collaborative approach of “humans leading the intent, machines executing the operation” may become the optimal solution. Intelligent auxiliary command and control systems can optimize various functional combinations from spatially distributed combat resources based on the characteristics and time-sensitive features of the targets. They can also dynamically adjust on the spot, forming a multi-target—multi-sensor—multi-shooter parallel strike mode with a multi-kill chain, leaving the enemy nowhere to hide spatially and no time to escape, maximizing the combined effect of spatiotemporal elements.

Self-learning can evolve into a new mode of combat power generation.

Combat power generation models are a relatively stable set of methods, approaches, and standard forms for forming and improving combat power. In the era of mechanized warfare, combat power generation mainly relied on the additive effect of personnel and weaponry; in the era of information warfare, it mainly relied on the multiplicative effect of personnel, weaponry, and information; in the era of intelligent warfare, it mainly relies on the exponential effect of personnel, weaponry, and intelligence. Intelligent technologies, represented by artificial intelligence, are endowing combat systems with the ability to learn, grow, and evolve on their own. Among these, algorithms are the “accelerators” of combat power generation. Combat power in the intelligent era is generated based on accelerated algorithmic processes. The sophistication of algorithms determines the “intelligence” of intelligent equipment. Algorithms can drive the acceleration of situational awareness through sensory elements, accelerate analysis and judgment through data fusion, and accelerate decision-making through precise calculations, detailed calculations, in-depth calculations, and deep reasoning. Data is the “multiplier” of combat power generation, influencing combat power through algorithms. The quantity and quality of data have a significant impact on combat power generation; more high-quality data results in higher algorithmic intelligence and more efficient combat power generation. Computing power is the “catalyst” for combat power generation. In past warfare, limited by technological development, war calculations were mostly rough estimates, and computing power played a minor, inconspicuous role in combat capability generation. In the era of intelligent warfare, however, computing power, through algorithms, significantly catalyzes combat capability generation, becoming an indispensable and crucial element. The rapidly developing artificial intelligence models of recent years, based on algorithmic improvements, large-scale high-quality data supply, and high-performance computing support, demonstrate powerful self-learning and evolutionary capabilities. This migration of capabilities to the military field will inevitably have a profound impact on combat capability generation models. The self-learning and evolutionary capabilities previously possessed only by biological organisms will become essential capabilities of intelligent combat systems, thus significantly distinguishing them from information-based combat systems.

現代國語:

目前,以人工智慧為代表的智慧技術的快速發展,引發了軍事領域的一系列突破,導致戰爭理念、要素和方式發生重大變革,加速了戰爭向智慧化的演進。智能戰作為繼機械化戰爭和資訊化戰爭之後的新型戰爭形式,代表部隊體系、作戰方式和戰場空間的全面升級和重塑。對智慧戰的特徵和格局進行前瞻性分析,對於加速軍事情報發展、鍛造智慧作戰能力、奪取戰略主動權、贏得未來智能戰至關重要。

智力控製成為戰爭取勝的核心。

回顧人類戰爭史,陸海空四大領域的控制權在不同歷史時期都曾是爭奪的焦點。物理空間的控制是贏得機械化戰爭的關鍵,而資訊戰則更依賴資訊優勢。資訊優勢已超越實體空間優勢,成為資訊戰的核心優勢。顯而易見,科技對戰爭優勢演進的歷史軌跡產生了重大影響。在智慧戰爭時代,海量資料需要即時傳輸、取得和處理。有人、無人和集群作戰平台需要更智慧和自主化,作戰鏈「OODA」(輸出-輸出-行動)需要有效率快速地閉合。所有這些都依賴智慧技術,尤其是人工智慧,來賦能。情報優勢將主導未來戰爭的走向。

追求戰爭優勢一直是各國軍事實踐中不懈的努力。自1990年代以來,海灣戰爭、科索沃戰爭、阿富汗戰爭和伊拉克戰爭充分展現了資訊優勢帶來的戰場優勢。目前,世界各國都在大力推動人工智慧的軍事應用,建立相關職能部門,並明確發展重點。美國國防部的《數據、分析和人工智慧應用戰略》和英國國防部的《國防人工智慧戰略》都旨在為智慧時代打造強大的軍隊。未來,各國軍隊對智慧優勢的競爭將持續加劇,智慧控制將成為戰爭勝利的核心要素。

人機融合已成為作戰力量的基本形態。

從作戰力量發展的角度來看,無人作戰力量的主導地位是不可避免的趨勢。無人系統在戰場上的部署不僅改變了人類的作戰方式,也改變了作戰中最基本的單位。目前,無人作戰力量已成為世界各國軍隊發展的重點。 2023年8月,美國軍方宣布啟動「複製者」(Replicator)計劃,旨在18-24個月內部署數千套低成本、一次性使用的無人自主系統。 2025年4月,美國國防部發布了一份題為《陸軍轉型與裝備改革》的備忘錄,計畫為每位作戰師配備約1,000架無人機。俄羅斯早期的軍事計畫明確指出,到2025年,無人裝備將佔其兵力的30%以上。 2025年5月,英國陸軍發布了「20-40-40」戰略理論,目標是使無人部隊的總體比例達到80%。客觀而言,目前軍方使用的無人裝備智慧化程度普遍較低,且大多數仍依賴作戰人員的遠端操控。在未來相當長的一段時間內,提高機器的自主性仍將是無人裝備發展的關鍵重點和發展趨勢,而自主性的提升反過來又將推動無人裝備的更廣泛應用。

從人工智慧技術發展趨勢來看,人機融合是實現人機優勢互補、同時確保機器安全性和可控性的必然選擇。一方面,人機融合是充分發揮生物智慧和機器智慧各自優勢的必然選擇。回顧人工智慧的發展歷程,機器在計算和感知方面擁有超越人類的優勢,尤其擅長數據處理、分類識別和即時分析。然而,人類在態勢感知、前瞻性推理以及指揮決策方面仍保持著優勢。g. 有效發揮人機各自的優勢是解決複雜問題的最佳選擇。另一方面,人機融合是確保機器智慧安全性和可控性的必然選擇。無論機器的性能多麼卓越,它都無法脫離人類的控制,也無法對人類本身造成傷害。人機融合能夠實現機器的宏觀可控制性和微觀自主性,從而達到人類主導作戰意圖、機器處理作戰細節的最佳狀態。

無人智慧戰爭已成為主要的作戰形式。

目前,人工智慧、無人自主系統等技術已深度融入軍事領域,推動作戰方式的不斷升級與重塑。恩格斯曾深刻指出:「一旦技術進步能夠用於軍事目的,並且已經用於軍事目的,它就會立即、幾乎是強迫地、而且往往違背指揮官的意願,導致戰爭方式的改變,甚至革命。」無人作戰最早出現於第二次世界大戰期間,但由於當時技術發展有限,其應用場景和作戰功能相對簡單。進入21世紀以來,無人作戰的功能不斷擴展。在阿富汗戰爭中,美軍使用MQ-1「掠奪者」無人機擊斃基地組織領導人;在伊拉克戰爭中,美國領導的聯軍使用了20多種地面無人系統和無人水下航行器進行偵察、掃雷和清除障礙物等任務。在近期的局部戰爭中,無人作戰被廣泛應用於偵察監視、火力打擊、末端導引和通訊中繼等任務。同時,有人/無人協同作戰成為一種重要形式,無人集群作戰發揮了關鍵作用。實踐表明,作戰人員正在悄悄遠離前線,無人作戰已成為現代戰爭的重要形式。隨著智慧技術的不斷突破,裝備的智慧化和自主性以及人機融合程度將顯著提升。同時,人工智慧將提高指揮官決策的速度、品質和準確性,並使情報鏈、指揮控制鏈、打擊鍊和支援鏈高效銜接,推動「觀察-判斷-決策-行動」閉環中的二級回應。這將推動無人作戰朝向更高層次的智慧化發展,例如智慧「集群」、「特洛伊木馬」滲透和分散式自主作戰模式,從根本上改變傳統戰爭的形式和規則。無人智慧作戰將成為智慧戰爭的主要作戰模式。

即時、多維、跨域作戰已成為爭奪時空的關鍵要求。

時間和空間是戰爭的基本組成部分和作戰基礎。在智慧戰爭時代,戰爭的時空觀將會發生根本性的改變。首先,時間將被極大壓縮。智慧戰爭已真正進入「探測與摧毀」時代,顯著加快了作戰節奏。無人裝備自主性的不斷提高進一步拉開了人與裝備的距離,持續壓縮了探測與打擊的時間。無人裝備與有人裝備的智慧互聯進一步增強了對戰場的感知能力和對複雜戰場環境的反應能力。戰場態勢變化的時間分割更加細緻、精確,時間間隔越來越短,粒度越來越小,從而以前所未有的速度提升了單位時間內作戰內容的承載量及其利用效率。其次,空間將無限擴展。無人智慧技術的軍事應用不斷突破人類思維的邏輯極限、感官的生理極限以及存在的物理極限。戰場進一步延伸至極地、深海和深空。戰爭的疆域正從物理空間和資訊空間擴展到認知空間,形成物理域和資訊域等作戰領域。第三,時間和空間將並行運作。智慧戰爭正在顛覆傳統戰場的時空關係,使得以時間換空間或以空間換時間的傳統戰略戰術失效。隨著作戰時間日益縮短、作戰空間不斷擴大、作戰方式日益多樣化,以及時空關係日益同步與更加…時空一體化效應使得「人引導意圖,機器執行操作」的人機協同作戰模式成為最優解。智慧輔助指揮控制系統能夠根據目標的特徵和時間敏感性,優化空間分佈作戰資源的各種功能組合,並能進行現場動態調整,形成多目標、多感測器、多射手並行打擊模式,實現多殺傷鏈,使敵人無處可藏,無處可逃,最大程度地發揮時空要素的綜合效應。

自學習可以演化成一種新的戰鬥力生成模式。

戰鬥力生成模式是一套相對穩定的形成和提升戰鬥力的方法、途徑和標準形式。在機械化戰爭時代,戰鬥力生成主要依靠人員和武器的疊加效應;在資訊戰時代,則主要依靠人員、武器和資訊的乘積效應。在智慧戰爭時代,作戰主要依賴人員、武器和情報的指數級成長效應。以人工智慧為代表的智慧技術賦予作戰系統自主學習、成長和演進的能力。其中,演算法是作戰能力生成的「加速器」。智慧時代的作戰能力正是基於加速的演算法流程而產生的。演算法的複雜程度決定了智慧裝備的「智能」程度。演算法可以透過感知元素加速態勢感知,透過資料融合加速分析判斷,並透過精確計算、詳細計算、深度計算和深度推理加速決策。數據是作戰能力產生的“倍增器”,它透過演算法影響作戰能力。數據的數量和品質對作戰能力的產生有著顯著的影響;更多的高品質數據能夠帶來更高的演算法智慧和更有效率的作戰能力產生。運算能力是作戰能力生成的「催化劑」。在以往受限於科技發展的戰爭中,戰爭計算大多是粗略估計,運算能力在作戰能力生成中扮演的角色微不足道。然而,在智慧戰爭時代,運算能力透過演算法顯著促進了作戰能力的生成,成為不可或缺的關鍵要素。近年來,基於演算法改進、大規模高品質數據供應和高效能運算支援的快速發展的人工智慧模型,展現出強大的自學習和進化能力。這種能力向軍事領域的遷移必將對作戰能力生成模型產生深遠影響。以往僅生物體才具備的自學習與進化能力,將成為智慧作戰系統的核心能力,因而顯著區別於資訊型作戰系統。

中國原創軍事資源:http://www.81.cn/ll_208543/186841829899.html

Chinese Military AI Empowerment: Accelerating the Iterative Upgrade of Cognitive Electronic Warfare

中國軍事人工智慧賦能:加速認知電子戰迭代升級

現代英語:

In the invisible dimension of war, a silent contest has been raging for a century. From the electromagnetic fog of the Battle of Tsushima to the spectral chaos of modern battlefields, from the rudimentary metal chaff used during World War II to the cognitive electronic warfare systems incorporating artificial intelligence, electronic warfare has undergone a magnificent transformation from a supporting role to a pillar of war. It is now deeply embedded in the “operating system” of modern warfare, rewriting its form and rules. It is invisible and intangible, yet it profoundly controls the lifeline of battlefield operations; it is silent, yet it is enough to determine the life and death of thousands of troops. The balance of future wars will increasingly depend on who can see more clearly, react faster, and control more firmly in this silent yet deadly spectrum.

In modern warfare, the field of electronic warfare is evolving rapidly. The electromagnetic spectrum is considered an important operational domain after land, sea, air, space, and cyberspace, becoming a focal point for both sides to gain comprehensive dominance in joint operations. As warfare accelerates its evolution towards intelligence, cognitive electronic warfare, which integrates artificial intelligence and machine learning technologies, is increasingly demonstrating its autonomous countermeasure advantages, becoming a crucial tool for paralyzing entities in the electromagnetic space.

New Needs of Intelligent Warfare

In informationized and intelligent warfare, information equipment is widely distributed, and unmanned intelligent equipment is deployed, making the battlefield electromagnetic environment increasingly complex. Due to the adoption of cognitive and adaptive technologies, radar and communication equipment are becoming increasingly resistant to interference, rendering traditional electronic countermeasures inadequate. Therefore, it is necessary to leverage artificial intelligence and machine learning to endow electronic warfare systems with the ability to self-identify threats, extract threat source signals in real time, quickly organize and analyze them, determine the threat level and weaknesses of the signals, and promptly and effectively counteract them.

The need for precise perception. In modern warfare, to increase battlefield “transparency,” both sides extensively utilize electronic information equipment. Simultaneously, unmanned equipment and “swarm” systems are widely employed. On a battlefield filled with numerous information devices and massive amounts of electromagnetic signals, a single electronic warfare device may simultaneously receive radiation from dozens or even hundreds of other electronic devices, making signal identification extremely difficult. This necessitates that electronic warfare systems break through existing technological limitations, integrate big data analysis and deep learning technologies, enhance their perception capabilities, and comprehensively identify various electromagnetic radiation targets on the battlefield.

The need for intelligent countermeasures. Driven by emerging technologies, agile radar, frequency-hopping radios, and other equipment have been deployed extensively on the battlefield. These devices form a closed loop between transmission and reception, and can autonomously adjust their operating modes, transmission parameters, and waveform selection according to the environment, possessing autonomous interference avoidance capabilities. Traditional electronic warfare equipment, based on existing experience and pre-set interference rule libraries, has rigid functions and poor flexibility, making it unable to cope with emerging adaptive electronic targets. This necessitates that electronic warfare systems integrate intelligent algorithms to become “smarter,” possessing adaptive countermeasure capabilities of “using intelligence against intelligence.”

The need to disrupt networked systems. The winning mechanism of modern combat systems, when mapped onto the information domain, has spurred the networked operation of radar and communication systems. The aim is to eliminate the global loss of control caused by interference with a single device or part of the link through information fusion and redundant design, leveraging the resilience of the network system. Faced with networked information systems, electronic warfare systems need to embed intelligent countermeasure analysis and reasoning technologies, possessing the ability to effectively identify networked information systems in order to discover key nodes and critical parts, and implement targeted, integrated hardware and software attacks.

A New Transformation Driven by Digital Intelligence

Cognitive electronic warfare can be considered a combination of electronic warfare and artificial intelligence. It is a new generation of electronic warfare systems with autonomous perception, intelligent decision-making, and adaptive jamming capabilities, representing a major upgrade to traditional electronic warfare.

The shift from human to machine cognition. Advances in modern electronic technology have enabled electronic information equipment to offer diverse functions and multiple modes. Traditional electronic warfare systems rely on manually analyzed threat databases for countermeasures, which are only effective against known signal patterns and become significantly less effective against unknown threats. Cognitive electronic warfare systems, through autonomous interactive swarm learning and intelligent algorithms, can quickly intercept and identify signal patterns, analyze changing patterns, make autonomous decisions based on changes in the electromagnetic environment, optimize interference signal waveforms, and autonomously complete the operational cycle of “observation-judgment-decision-action.”

The focus is shifting from precision-driven to data-driven. Electronic warfare systems rely on the measurement and sensing of electronic signals as their fundamental premise. However, with the rise of new technologies, the sensitivity and resolution of these systems are approaching their limits, hindering their development and upgrades. Recognizing that electronic warfare systems can break through traditional models by utilizing big data analytics and mining large datasets can not only efficiently intercept and accurately identify unknown signals, but also predict the timing of frequency changes, mode adjustments, and power conversions. This allows for the correlation analysis of the electronic target’s operational patterns, enabling proactive adjustments to jamming strategies, rules, and parameters to conduct targeted electronic attacks.

The focus has shifted from jamming single targets to disrupting networked targets. Driven by network technology, new-generation radar and communication equipment are beginning to network, using system advantages to compensate for the shortcomings of single points. Traditional electronic warfare jamming relies on human experience and knowledge, lacking sufficient self-learning capabilities. It is mainly used to jam point and chain-like electronic targets, and cannot effectively jam networked targets. Cognitive electronic warfare systems utilize deep learning technology to perceive the network structure and operating modes of new networked systems such as radar and communication. Based on logical reasoning, it can identify nodes, hubs, and key links in the networked system, thereby implementing precise jamming and making it possible to disrupt the system.

New forms of structural reshaping

Cognitive electronic warfare systems, based on the traditional open-loop structure, introduce behavioral learning processes and reshape the modular architecture, enabling them to evaluate the effectiveness of interference and optimize interference strategies based on interference feedback, thus completing a closed loop of “reconnaissance-interference-evaluation” countermeasures.

Reconnaissance and Sensing Module. Reconnaissance and sensing is the primary link in electronic warfare and a crucial prerequisite for the successful implementation of cognitive electronic warfare. This module utilizes deep learning and feature learning techniques to continuously learn from the surrounding environment through constant interaction with the battlefield electromagnetic environment. It performs parameter measurement and sorting of signals, analyzes and extracts characteristic data of target threat signals with the support of prior knowledge, assesses behavioral intent, determines the threat level, and transmits the data to the decision-making and effectiveness evaluation module.

Decision-Making Module. The decision-making module is the core of the cognitive electronic warfare system, primarily responsible for generating interference strategies and optimizing interference waveforms. Based on the analysis and identification results of reconnaissance and perception, the feedback effect of interference assessment, and a dynamic knowledge base, this module uses machine learning algorithms to predict threat characteristics, generates countermeasures through reasoning from past experience, rapidly formulates attack strategies and optimizes interference waveforms, automatically allocates interference resources, and ultimately completes autonomous attacks on target signals.

Effectiveness assessment module. Effectiveness assessment is key to the closed-loop operation of cognitive electronic warfare systems, playing a crucial role in linking all modules. This module analyzes the target’s response to the jamming measures based on feedback information after the signals sensed by reconnaissance are jammed. It calculates and assesses the degree of jamming or damage to the target online, and then feeds the results back to the decision-making module to help adjust jamming strategies and optimize waveforms.

The dynamic knowledge base module primarily provides basic information and data support, including a threat target base, an interference rule base, and a prior knowledge base. This module provides prior information such as models, parameters, and data for reconnaissance and perception, decision-making, and performance evaluation. It utilizes feedback information for cognitive learning, accumulates learning results into experience, and updates the knowledge graph, knowledge rules, and reasoning models in the knowledge base, achieving real-time updates to the knowledge base.

New applications that enhance efficiency

With further breakthroughs in algorithm models and learning reasoning technologies, information-based and intelligent warfare will lead to more mature and sophisticated cognitive electronic warfare systems. Their role in empowering and enhancing efficiency will become more prominent, their application scenarios will become more diverse, and they will become an indispensable weapon on the battlefield.

Precision energy release for strike operations. Under informationized and intelligent conditions, the battlefield situation is presented in real time, command and decision-making are timely and efficient, and combat operations are controlled in real time, enabling precision operations to move from scenario conception to the real battlefield. At the same time, with the connection of cyber information facilities, the combat system has a higher degree of coupling and stronger resilience, becoming an important support for the implementation of joint operations. The cognitive electronic warfare system possesses high-precision perception capabilities and strong directional jamming capabilities. Through its distributed deployment across a wide battlefield, it can work in conjunction with troop assaults and fire strikes, under the unified command of joint operations commanders, to conduct precise attacks on key nodes and important links of the combat system. This includes precise targeting, precise frequency coverage, and precise and consistent modulation patterns, thereby blinding and degrading the effectiveness of enemy early warning detection and command and control systems, and facilitating the implementation of system disruption operations.

Networked Collaborative Swarm Warfare. In future warfare, unmanned swarms such as drones, unmanned vehicles, and unmanned boats will be the main force in combat, making the construction of a low-cost, highly redundant force system crucial for victory. Facing unmanned combat systems like “swarms,” ​​”wolf packs,” and “fish schools,” cognitive electronic warfare systems possess a natural advantage in evolving into unmanned electronic warfare swarms. Based on networked collaborative technologies, reconnaissance and jamming payloads are deployed on unmanned swarm platforms. Information and data exchange between platforms is achieved through information links. With the support of intelligent algorithms, cognitive electronic warfare systems can optimize the combination of jamming functions and dynamically allocate resources based on the battlefield electromagnetic situation. Based on autonomous collaborative guidance and centralized control, they can conduct swarm-to-swarm electronic attacks.

Electronic warfare and cyber warfare are two fundamentally different modes of combat. Electronic warfare focuses on low-level confrontation at the physical and signal layers, while cyber warfare focuses on high-level confrontation at the logical and information layers. However, with information networks covering the electromagnetic spectrum, the convergence of electronic and cyber warfare has become increasingly possible. Breakthroughs in wireless access and encryption technologies have enabled cognitive electronic warfare systems to infiltrate network infrastructure, achieving seamless integration of cyber and electronic space situational awareness and mission decision-making. By combining autonomous learning, pattern evaluation, and algorithmic prediction, a closed-loop system integrating cyber and electronic space perception, evaluation, decision-making, and feedback can be established, enabling integrated cyber and electronic warfare offense and defense.

現代國語:

在戰爭的無形維度中,一場無聲的較量已持續了一個世紀。從馬海戰的電磁迷霧到現代戰場的光譜混亂,從二戰時期簡陋的金屬箔條到融合人工智慧的認知電子戰系統,電子戰經歷了從輔助角色到戰爭支柱的華麗蛻變。如今,它已深深融入現代戰爭的“操作系統”,改寫了戰爭的形式和規則。它無形無質,卻深刻地掌控著戰場行動的生命線;它悄無聲息,卻足以決定成千上萬士兵的生死。未來戰爭的勝負將越來越取決於誰能更清晰地洞察、更快地反應、更牢固地掌控這片無聲卻致命的頻譜。

在現代戰爭中,電子戰領域正快速發展。電磁頻譜被視為繼陸地、海洋、空中、太空和網路空間之後的重要作戰領域,成為交戰雙方在聯合作戰中爭奪全面優勢的關鍵所在。隨著戰爭加速朝向智慧化演進,融合人工智慧和機器學習技術的認知電子戰正日益展現其自主對抗優勢,成為癱瘓電磁空間目標的關鍵工具。

智慧戰爭的新需求

在資訊化和智慧化戰爭中,資訊裝備廣泛分佈,無人智慧裝備也投入使用,使得戰場電磁環境日益複雜。由於認知和自適應技術的應用,雷達和通訊裝備的抗干擾能力不斷增強,傳統的電子對抗手段已難以應對。因此,必須利用人工智慧和機器學習技術,賦予電子戰系統自主識別威脅、即時提取威脅源訊號、快速整理分析、判斷威脅等級和訊號弱點並及時有效對抗的能力。

精準感知的需求。在現代戰爭中,為了提高戰場“透明度”,交戰雙方廣泛使用電子資訊裝備。同時,無人裝備和「集群」系統也被廣泛應用。在充斥著大量資訊設備和海量電磁訊號的戰場上,單一電子戰設備可能同時接收來自數十甚至數百個其他電子設備的輻射,使得訊號識別極為困難。這就要求電子戰系統突破現有技術限制,融合大數據分析與深度學習技術,增強感知能力,並全面辨識戰場上各種電磁輻射目標。

智能對抗的需求。在新興技術的推動下,敏捷雷達、跳頻無線電等設備已廣泛部署於戰場。這些設備在收發之間形成閉環,能夠根據環境自主調整工作模式、發射參數和波形選擇,並具備自主抗干擾能力。傳統的電子戰設備基於現有經驗和預設的干擾規則庫,功能僵化,靈活性差,難以應對新興的自適應電子目標。這就要求電子戰系統融合智慧演算法,變得更加“智慧”,具備“以智制智”的自適應對抗能力。

顛覆網路化系統的需求。現代作戰系統的致勝機制,一旦映射到資訊領域,便會推動雷達和通訊系統的網路化運作。其目標是透過資訊融合和冗餘設計,利用網路系統的韌性,消除因單一設備或連結某部分受到干擾而導致的全局失控。面對網路化資訊系統,電子戰系統需要嵌入智慧對抗分析和推理技術,具備有效識別網路化資訊系統的能力,從而發現關鍵節點和重要部件,並實施有針對性的軟硬體一體化攻擊。

數位智慧驅動的新轉型

認知電子戰可以被視為電子戰與人工智慧的結合。它是新一代電子戰系統,具備自主感知、智慧決策和自適應幹擾能力。智慧電子戰系統代表傳統電子戰的重大升級。

認知方式的轉變:從人腦認知轉向機器認知。現代電子技術的進步使得電子資訊設備能夠提供多樣化的功能和多種模式。傳統的電子戰系統依賴人工分析的威脅資料庫進行對抗,而這種方法僅對已知的訊號模式有效,而對未知威脅的對抗效果則顯著降低。認知電子戰系統透過自主互動群體學習和智慧演算法,能夠快速截獲和識別訊號模式,分析變化的模式,根據電磁環境的變化做出自主決策,優化干擾訊號波形,並自主完成「觀察-判斷-決策-行動」的作戰循環。

電子戰的重點正從精度驅動轉向數據驅動。電子戰系統以測量和感知電子訊號為基本前提。然而,隨著新技術的出現,這些系統的靈敏度和解析度正接近極限,阻礙了其發展和升級。認識到電子戰系統可以透過利用大數據分析和挖掘大型資料集來突破傳統模式,不僅可以高效截獲和準確識別未知訊號,還可以預測頻率變化、模式調整和功率轉換的時機。這使得對電子目標的運作模式進行關聯分析成為可能,從而能夠主動調整幹擾策略、規則和參數,並實施有針對性的電子攻擊。

幹擾的重點已從單一目標轉向幹擾網路化目標。在網路技術的驅動下,新一代雷達和通訊設備開始連網,利用系統優勢彌補單點目標的不足。傳統的電子戰幹擾依賴人的經驗和知識,缺乏足夠的自學習能力,主要用於幹擾點狀和鏈狀電子目標,無法有效幹擾網路化目標。認知電子戰系統利用深度學習技術感知雷達、通訊等新型網路化系統的網路結構與運作模式。基於邏輯推理,該系統能夠識別網路系統中的節點、樞紐和關鍵鏈路,從而實現精準幹擾,並有可能破壞系統。

新型結構重塑

認知電子戰系統在傳統開環結構的基礎上,引入行為學習過程並重塑模組化架構,使其能夠評估幹擾效果,並基於乾擾反饋優化干擾策略,從而形成「偵察-幹擾-評估」對抗的閉環。

偵察感知模組。偵察感知是電子戰的核心環節,也是成功實施認知電子戰的關鍵前提。本模組利用深度學習和特徵學習技術,透過與戰場電磁環境的持續交互,不斷學習周圍環境。它對訊號進行參數測量和分類,在先驗知識的支持下分析和提取目標威脅訊號的特徵數據,評估行為意圖,確定威脅等級,並將數據傳輸至決策和效果評估模組。

決策模組。決策模組是認知電子戰系統的核心,主要負責產生幹擾策略和最佳化干擾波形。此模組基於偵察感知的分析識別結果、幹擾評估的回饋效果以及動態知識庫,利用機器學習演算法預測威脅特徵,透過對過往經驗的推理生成對抗措施,快速制定攻擊策略並優化干擾波形,自動分配幹擾資源,最終完成對目標訊號的自主攻擊。

效果評估模組。效果評估是認知電子戰系統閉環運作的關鍵,在連接所有模組中發揮至關重要的作用。此模組在偵察感知到訊號被幹擾後,基於回饋資訊分析目標對幹擾措施的反應,在線上計算和評估目標受到的干擾或損害程度,並將結果回饋給決策模組,以幫助調整幹擾策略和優化波形。

動態知識庫模組主要提供…此模組提供基礎資訊和資料支持,包括威脅目標庫、幹擾規則庫和先驗知識庫。它提供先驗信息,例如用於偵察感知、決策和性能評估的模型、參數和數據。它利用回饋資訊進行認知學習,將學習結果累積為經驗,並更新知識庫中的知識圖譜、知識規則和推理模型,從而實現知識庫的即時更新。

提升效率的新應用

隨著演算法模型和學習推理技術的進一步突破,資訊化和智慧化戰爭將催生更成熟和精密的認知電子戰系統。它們在增強作戰效率方面的作用將更加突出,應用場景將更加多樣化,並將成為戰場上不可或缺的武器。

精確能量釋放用於打擊行動。在資訊化和智慧化條件下,戰場態勢即時呈現,指揮決策及時高效,作戰行動即時控制,使精確打擊行動能夠從場景構思到實際戰場。同時,隨著網路資訊設施的互聯互通,作戰系統具有更高的耦合度和更強的韌性,成為聯合作戰的重要支撐。認知電子戰系統具備高精度感知能力及強大的定向幹擾能力。透過其在廣大戰場上的分散部署,該系統可在聯合作戰指揮官的統一指揮下,與部隊突擊和火力打擊協同作戰,對作戰系統的關鍵節點和重要環節進行精確打擊。這種打擊包括精確目標定位、精確頻率覆蓋以及精確一致的調製模式,從而乾擾和削弱敵方預警和指揮控制系統的效能,並為系統破壞作戰的實施提供便利。

網路協同集群作戰。在未來的戰爭中,無人機、無人車輛、無人艇等無人集群將成為作戰的主力,因此建造低成本、高冗餘度的作戰系統對於取得勝利至關重要。面對「集群」、「狼群」和「魚群」等無人作戰系統,認知電子戰系統在演進為無人電子戰集群方面具有天然優勢。基於網路協同技術,偵察和乾擾載荷部署在無人集群平台上。平台間的資訊和資料交換透過​​資訊鏈路實現。在智慧演算法的支援下,認知電子戰系統能夠根據戰場電磁態勢優化干擾功能組合併動態分配資源。基於自主協同導引和集中控制,它們可以進行群集間的電子攻擊。

電子戰和網路戰是兩種截然不同的作戰模式。電子戰著重於實體層和訊號層的低層對抗,而網路戰則著重於邏輯層和資訊層的高層對抗。然而,隨著資訊網路覆蓋電磁頻譜,電子戰和網路戰的融合變得越來越可能。無線存取和加密技術的突破使得認知電子戰系統能夠滲透網路基礎設施,實現網路空間和電子空間態勢感知及任務決策的無縫融合。透過結合自主學習、模式評估和演算法預測,可以建立一個整合網路空間和電子空間感知、評估、決策和回饋的閉環系統,從而實現網路戰和電子戰的一體化攻防。

王志勇 楊連山 崔怡然

來源:中國軍網-解放軍報 作者:王志勇 楊連山 崔怡然 責任編輯:林詩清 發布:2026-01-22

中國原創軍事資源:http://www.81.cn/ll_208543/168483878784.html

Reshaping the PLA’s force Structure to Ensure Winning Future Battlefields

重塑解放軍部隊結構,確保贏得未來戰場

現代英語:

The reason why outstanding professional athletes can maximize their physical capabilities compared to ordinary people lies in the fact that long-term scientific training strengthens their bones, removes excess fat and bulges their muscles, and achieves a perfect proportion and coordination of the body’s functional elements. Similarly, those armies that can dominate the battlefield and fully exert their combat effectiveness are all powerful forces that have achieved an optimized combination of military force systems in their respective eras.

“Military tactics are ever-changing, just as water has no fixed shape.” Since its inception, the People’s Liberation Army has continuously innovated its force structure in response to changes in the situation and tasks and the needs of actual military struggles. In particular, the several major streamlining and reorganizations since the reform and opening up have promoted the continuous optimization of the PLA’s size, structure, and force composition, effectively liberating and developing its combat capabilities.

“Standard systems cannot meet the demands of change, and one approach cannot address all situations.” Faced with the rapidly evolving nature of warfare in the world today and the new requirements for the expansion of the PLA’s missions and tasks, the shortcomings and weaknesses in the PLA’s force structure have once again become prominent. Problems such as excessive size and scale, imbalance in major proportions, insufficient proportion of new combat capabilities, and low degree of modularization and integration of troops have become bottlenecks affecting and restricting the improvement of the PLA’s combat capabilities and its ability to win future battlefields.

In matters of the world, “what must be seized is the momentum, and what must not be missed is the opportunity.” Only by assessing the situation and seizing the moment can one “easily gain advantage.” The world today faces unprecedented changes. The rapid development of global technological and military revolutions has historically converged with the deepening of my country’s efforts to strengthen its military. Changes in warfare, technology, and the overall landscape of struggle are profoundly impacting national security and military strategy. The historical responsibility of reshaping and rebuilding the PLA’s force structure, and constructing a modern military force system with Chinese characteristics capable of winning informationized wars and effectively fulfilling its missions, has been placed before the People’s Liberation Army.

The system determines the structure and function. The composition of the military’s force system determines the size of the military’s energy and the form, scale, and effect of releasing that energy in the appropriate time and space. The Party Central Committee, the Central Military Commission, and President Xi Jinping, after careful consideration and decisive decision-making, comprehensively launched reforms to the size, structure, and force composition of the military, undertaking a holistic and revolutionary reshaping of the PLA’s force system. This strategic deployment is a crucial step in rationally allocating and optimizing the PLA’s force system, gaining the initiative in future fierce military competition by “strengthening its muscles and bones.”

“One part planning, nine parts implementation”—the restructuring of the PLA’s force system has been rapidly and steadily unfolding. The total number of officers has decreased, with a batch of civilian personnel or soldiers in brand-new uniforms filling the original officer positions, thus optimizing the officer-to-soldier ratio. The number of active-duty personnel in regimental-level and above organs has been significantly reduced, resulting in a marked optimization of the ratio between organs and troops, and between combat and non-combat units. Despite the reduction in the overall size of the military, the number of personnel in combat units has increased rather than decreased, making the “muscle” stronger. The size of the army has been reduced, with traditional branches and outdated equipment units being repurposed for new combat forces, optimizing the structure of the services and increasing the proportion of new combat capabilities, making the “skeleton” stronger. With a more streamlined size, more scientific organization, and more optimized layout, the PLA is continuously transforming from a quantity-oriented to a quality- and efficiency-oriented force, and from a labor-intensive to a technology-intensive force. The organization of troops is developing towards being more robust, integrated, multi-functional, and flexible, and a joint combat force system with elite combat forces as its main body has been basically formed.

The reshaping of the force structure has unlocked the full potential for combat effectiveness, enabling the PLA to take solid steps toward achieving the Party’s goal of building a strong military under the new circumstances. This provides a stronger guarantee for effectively safeguarding my country’s sovereignty, security, and development interests, and for making greater contributions to maintaining world peace and stability.

With sails hoisted high, the People’s Liberation Army embarks on a journey across vast oceans. Reborn and transformed, the People’s Liberation Army will surely achieve new leaps forward on the path to building a strong military with Chinese characteristics and stride towards an even more glorious future!

現代國語:

優秀專業運動員與一般人相比,之所以能把人體機能發揮到極限,關鍵在於長期的科學訓練強壯了骨骼,去除了多餘的贅肉與脂肪,實現了人體機能要素群的完美比例與配合。同樣道理,那些能夠笑傲疆場充分發揮出戰鬥力能效的軍隊,無不是在其所處時代實現了軍事力量體系優化組合的雄師勁旅。

「兵無常勢,水無常形。」人民軍隊自誕生以來,力量體系構成一直隨著形勢任務的變化和現實軍事鬥爭的需要而不斷自我革新。特別是改革開放以來幾次大的精簡整編,推動了我軍規模結構和力量編成的不斷優化,有效解放和發展了戰鬥力。

「常制不可以待變化,一塗不可以應萬方。」面對當今世界戰爭形態加速演變新趨勢、我軍使命任務拓展新要求,我軍力量體系構成方面的不足和短板再次凸顯,規模體量偏大、重大比例關係失衡、新質戰鬥力比重偏小、部隊模組化合成化程度低等問題,成為影響力、制約軍場戰鬥力提升、制約軍場等問題,成為影響力、制約軍場的戰鬥力提升、制約軍場等問題,成為影響力、制約軍場戰鬥力提升、制約軍場等問題,成為影響力、制約軍場等問題,成為影響力、制約軍場等問題,成為影響力、制約軍場戰鬥力提升、制約軍戰的未來。

天下事,“所當乘者勢也,不可失者時也”,審時度勢,乘勢而上,才能“取之易也”。當今世界面臨前所未有之大變局,世界科技革命、軍事革命迅速發展與我國強軍興軍事業的深入推進歷史性地交匯在一起,戰爭之變、科技之變、鬥爭格局之變深刻影響國家安全和軍事戰略全局。實現我軍力量體系的重塑再造,建構能夠打贏資訊化戰爭、有效履行使命任務的中國特色現代軍事力量體系,這一重任歷史性地擺在人民軍隊面前。

體系決定結構和功能,軍隊的力量體系構成,決定了軍隊能量的大小及其在適當的時間和空間內釋放能量的形態、規模與效果。黨中央、中央軍委會和習主席審時度勢、果斷決策,全面啟動軍隊規模結構與力量編成改革,對我軍力量體系進行整體性、革命性重塑。這項戰略部署是對我軍力量體系進行合理編配與優化組合,透過「強肌、壯骨骼」贏得未來激烈軍事競爭主動權的關鍵一環。

“一分部署,九分落實”,我軍力量體系重塑快速而穩健地鋪開。軍官總數減少,一群身穿嶄新制服的文職人員或士兵補充到原軍官崗位上,官兵比例得到優化。團級以上機關現役員額明顯壓縮,機關與部隊比例、作戰部隊與非戰鬥單位比例已明顯優化。在軍隊總規模壓下來以後,作戰部隊人員不減反增,「肌肉」更豐滿了。壓縮陸軍規模,傳統兵種及老舊裝備部隊為新型作戰力量“騰籠換鳥”,軍兵種結構得到優化,新質戰鬥力的比重增加,“骨骼”更加強壯了。規模更精幹、編成更科學、佈局更優化,不斷推動我軍由數量規模型向質量效能型、由人力密集型向科技密集型的轉變,部隊編成向充實、合成、多能、靈活方向發展,以精銳作戰力量為主體的聯合作戰力量體系基本形成。

力量體系的重塑打通了激活戰鬥力的“任督二脈”,我軍向著實現黨在新形勢下的強軍目標邁出了堅實步伐,為有效捍衛我國主權安全發展利益、為維護世界和平穩定作出更大貢獻提供了更加堅強有力的保證。

雲帆已高掛,征程濟滄海。換羽重生的人民軍隊一定能夠在中國特色強軍之路上實現新的跨越、邁向更光輝的未來!

中國軍網 國防部網
2018年12月18日 星期二

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2018-12/18/content_282834834.htm

Chinese Military Analysis of Developing Intelligent Command and Information Systems

中國軍方對發展智慧指揮資訊系統的分析

現代英語:

The era of intelligent warfare has begun. Intelligent command and information systems will become the “central nervous system” of future intelligent combat command and control, serving as a supporting means for intelligent combat command and control. Accelerating the construction of intelligent command and information systems is an inherent requirement for the development of military intelligence. Only by clarifying the essence of intelligent command and information system development, grasping the key points of intelligent command and information system research and development, and exploring the essentials of intelligent command and information system development can we better promote the construction and development of intelligent command and information systems and gain a competitive advantage in future intelligent warfare.

Clarify the key points of the development of intelligent command and information systems

Intelligent command and information systems are an inevitable choice in the development of warfare towards informationized and intelligent warfare, a natural outcome of the technological revolution, and a contemporary demand for the intelligent development of the military. Clarifying the key points of intelligent command and information system development helps to grasp the direction of its construction and establish long-term goals.

Promoting the intelligent evolution of warfare. In future intelligent warfare, the battlefield situation will change rapidly and the battlefield environment will be complex and harsh. In order to gain the initiative on the battlefield, “intellectual superiority” will become the new commanding height. Intelligent command and information systems are undoubtedly an important support for future combat command and operations. Their intelligent development can help promote the intelligent evolution of warfare and is an important foundation for gaining the initiative and seeking victory in intelligent warfare.

Supporting Intelligent Innovation in Combat Concepts. Future intelligent warfare requires corresponding combat command concepts, and intelligent command information systems are a crucial foundation for the practical application of these concepts, serving as the fertile ground for their innovation and development. New intelligent combat command concepts such as human-machine hybrid command formations, data-driven command activities, open development command models, and intelligent convergence command processes all rely on the support of intelligent command information systems. These systems will act as an extension of the human brain, breaking through the physiological limits of the human body and achieving the organic integration of the art of combat command and intelligent technology.

Promoting the intelligent transformation of combat methods. The widespread application of artificial intelligence technology in the military field has brought about significant changes in the mechanisms of combat victory. Intelligence has surpassed firepower and information power to become the primary factor determining the outcome of war. The development and construction of intelligent command and control information systems will promote the transformation of combat methods towards intelligence, shifting combat methods from the “combat network + precision-guided weapons” of the information age to the “intelligent Internet of Things + manned/unmanned combat platforms” of the intelligent age. Correspondingly, the basic combat style is evolving from “network-centric warfare” to “cognition-centric warfare”.

Focus on the key points of intelligent command and information system research and development

Command and information systems are a product of the information warfare era. With the rapid development of military intelligence and the research and practical application of intelligent warfare mechanisms, the intelligent upgrading and construction of command and information systems is urgently needed. Emphasis should be placed on key functional development aspects to create a completely new intelligent command and information system.

“Super-brain-based” decision-making. In future intelligent warfare, the battlefield information data is massive and complex, and commanders are easily overwhelmed by the “sea of ​​information,” leading to confusion and affecting command and decision-making. With the emergence of intelligent decision-making technology and “cloud brains” and “digital advisors,” a new decision-making model based on the collaboration of “human brain + artificial intelligence” is quietly taking shape. Intelligent command information systems will break through the limits of human intelligence, acting as an extension of the human brain to assist commanders in their work, transforming war decision-making from purely human brain-based decision-making to super-brain-based command and decision-making combining “human brain + artificial intelligence.”

“All-dimensional” situational awareness. Future intelligent warfare will be characterized by multi-dimensional space, diverse forces, varied tactics, and accelerated pace. A comprehensive and flexible grasp of the battlefield situation will be fundamental to commanders’ decision-making. The integrated, intelligent, and dynamic presentation of the all-dimensional battlefield situation across multiple domains is an inevitable requirement for the development of command information systems. Command information systems are expanding their perception, understanding, integration, and prediction of battlefield situations, such as target identification, threat level assessment, operational action prediction, and future battle trajectory forecasting, from land, sea, air, space, electromagnetic, and cyberspace to the cognitive and social domains, achieving “all-dimensional” situational awareness.

“Intelligent connectivity” is crucial for future intelligent warfare. This will involve numerous intelligent command and control platforms and intelligent weapon platforms, connected by intelligent information and communication systems. Like the nerves and blood vessels of the human body, intelligent information and communication systems act as a link and lubricant in intelligent warfare. Therefore, it is essential to establish a comprehensive, uninterrupted intelligent information network to support the connectivity and control of intelligent equipment, enabling intelligent optimization of the network structure, intelligent reorganization to withstand network damage, and intelligent anti-interference capabilities. This will ensure intelligent collaborative operations between platforms and maximize overall combat effectiveness.

“Unmanned” Autonomous Collaboration. The extensive use of drones in recent local conflicts worldwide, playing a crucial role in determining the course of war, has attracted widespread attention. Unmanned weaponry is the material foundation of intelligent warfare, leading to disruptive combat styles such as intrusive lone-wolf operations, manned/unmanned collaborative system sabotage operations, independent operations by unmanned system formations, and drone swarm operations. While unmanned warfare is human-led, with machines granted a degree of autonomy from the backend, enabling unmanned operations on the front lines, the unmanned battlefield is constantly evolving. Disruptions to human-machine collaboration will become commonplace. Therefore, the command and control systems of unmanned intelligent equipment platforms must be more intelligent, capable of autonomous collaborative operations based on operational objectives.

“Proactive” information defense. Intelligent warfare will inevitably face diverse and multi-dimensional information attacks from powerful adversaries. The level of information security protection capabilities directly affects the outcome of the battle for “intellectual dominance” on the battlefield and is a key aspect of the construction of intelligent command information systems. Therefore, proactive measures should be taken to actively formulate and improve network protection strategies, enrich intrusion detection capabilities and authentication and identification methods, strengthen the application of advanced information security technologies, enhance the anti-interference and anti-interference capabilities of various wireless transmission methods, and build strong intelligent traceability and countermeasure capabilities to effectively curb information attacks.

Exploring the key points of intelligent command and information system development

The development of intelligent command and information systems is not merely a matter of technological innovation; it also requires further liberating our thinking and updating our concepts. To advance the development of intelligent command and information systems, we must change the traditional approach of simply adding hardware, building large networks, and collecting and storing various types of data. We must break through existing hierarchical structures, create open and service-oriented systems, and target the needs of intelligent combat command and action, exploring and researching the key aspects of intelligent command and information system development.

Innovation Concept. Guided by innovative thinking, and drawing on the development strategies of intelligent command and information systems for building a strong military, we will explore a development path with our own characteristics, tailored to actual needs. We must break away from traditional “chimney” approaches, adhere to top-level design and overall planning of the command and information system, unify interfaces, protocols, and standards, and form an open and sustainable system architecture. We must adhere to a system development approach that combines research, development, and application, formulating short-term, medium-term, and long-term development strategies to standardize the direction of system construction and development. We must adhere to iterative upgrades and optimization strategies to continuously improve the intelligence level of various subsystems, including command and control, intelligence reconnaissance, communication, information warfare, and comprehensive support, ensuring the continuous and healthy development of the intelligent command and information system.

Focusing on Key Capabilities. Concentrating on building key capabilities of intelligent command and information systems is crucial for intelligent warfare to leverage intelligence to achieve victory, and is key to gaining the “right to win” in intelligent warfare. Algorithms, computing power, and data are not only the intrinsic driving force and support for the development of artificial intelligence, but also the core capability requirements and advantages of intelligent command and information systems. The development of intelligent command and information systems must adhere to algorithmic innovation research to improve the system’s cognitive, speed, and decision-making advantages; accelerate the research and development of next-generation computers, such as quantum computers, to provide stronger computing power support for intelligent command and information systems; and deeply mine the deeper and broader information value from massive combat data resources to seek the initiative in victory.

Collective Efforts to Overcome Challenges. The construction and development of intelligent command and information systems is one of the major projects in military intelligence. It is a complex and collaborative project involving multiple fields, disciplines, departments, and units. The construction and development of intelligent command and information systems must adhere to the spirit of collective wisdom, collaborative problem-solving, and pioneering innovation. It should target strategic and forward-looking fields such as sensors, quantum information, network communication, integrated circuits, key software, big data, artificial intelligence, and blockchain. It should be driven by high-tech advancements and the demands of intelligent warfare, conducting in-depth research and exchanges across multiple fields, levels, and forms to continuously break through, innovate, and upgrade, making the functions of intelligent command and information systems more complete and intelligent.

Collaborative Development. To deeply promote the construction and development of intelligent command and information systems, it is essential to fully absorb advanced local technological achievements and integrate into the global trend of artificial intelligence innovation. Currently, artificial intelligence technology is booming worldwide, accumulating strong development momentum and technological advantages. Artificial intelligence technology has strong versatility in application, and its technological achievements have broad prospects for transformation and application, making it an important pathway to the construction and development of intelligent command and information systems. It is necessary to research and formulate general technical standards, break down barriers, overcome obstacles, and facilitate military-civilian cooperation to achieve the sharing and linkage of technological achievements. Through collaboration, it is also crucial to cultivate and shape new types of military personnel, enabling them to continuously adapt to the needs of various positions under intelligent conditions and fully leverage the effectiveness of intelligent command and information systems.

現代國語:

智慧化戰爭時代序幕已經拉開,具有智慧化特徵的指揮資訊系統將成為未來智慧化作戰指揮的“中樞神經”,是智慧化作戰指揮控制的支撐手段。加速智慧化指揮資訊系統建設是軍事智慧化發展的內在要求,只有明晰智能化指揮資訊系統發展要義,抓住智慧化指揮資訊系統研發要點,探索智能化指揮資訊系統發展要津,才能更好地推動智能化指揮資訊系統建設發展進程,贏得未來智能化作戰制勝先機。

明晰智能化指揮資訊系統發展要義

智慧化指揮資訊系統是戰爭形態朝向資訊化智能化戰爭發展的必然選擇,是科技革命發展的必然結果,也是軍事智能化發展的時代訴求。明晰智能化指揮資訊系統發展要義,有助於把脈智能化指揮資訊系統建設方向,確立系統發展長遠目標。

助推戰爭形態智能化演進。未來智能化作戰,戰場形勢瞬息萬變、戰場環境復雜嚴酷,要想在戰場上取得主動,「制智權」成為新的製高點,而智能化指揮資訊系統無疑是未來作戰指揮和行動的重要支撐手段,其智能化發展可助推戰爭形態向智能化演變,是智能化作戰贏得先機、謀求勝利的重要依托。

支撐作戰理念智能化創新。未來智慧化作戰,需要與之相適應的作戰指揮理念,而智慧化指揮資訊系統是作戰指揮理念實踐運用的重要依托,是智慧化作戰指揮理念創新、發展的土壤。如人機混合指揮編組、數據驅動指揮活動、開放發展指揮模式、智能聚力指揮過程等智能化作戰指揮新理念,都離不開智能化指揮信息系統的支撐,智能化指揮信息系統將作為人腦的外延,突破人體生理極限,實現作戰指揮藝術和智能技術的有機融合。

促進作戰方式智能化轉變。人工智慧技術在軍事領域的廣泛應用,使得作戰制勝機理發生重大變化,智慧超越火力、資訊力,成為決定戰爭勝負的首要因素。智慧化指揮資訊系統建設發展將促進作戰方式向智慧化轉變,使得作戰方法從資訊時代的「作戰網絡+精確制導武器」向智慧時代的「智慧物聯網+有人/無人作戰平台」轉變、基本作戰樣式相應地從「網絡中心戰」向「認知中心戰」演進。

抓住智慧化指揮資訊系統研發點

指揮資訊系統是資訊化戰爭時代的產物,隨著軍事智慧化的快速發展、智慧化作戰制勝機理的研究和實踐運用,指揮資訊系統智慧化升級建設迫在眉睫。應突顯功能研發點,打造全新智慧化指揮資訊系統。

“超腦化”輔助決策。未來智能化作戰,戰場資訊數據量龐大且複雜多變,指揮員在指揮過程中易陷入「資訊海洋」而導致資訊迷茫,影響指揮決策。隨著智慧輔助決策技術和「雲端大腦」「數字參謀」的出現,以「人腦+人工智慧」協作為基本方式的新決策模式正悄悄形成。智慧化指揮資訊系統將突破人類智力極限,作為人腦的外延,輔助指揮員工作,使戰爭決策由單純的人腦決策發展為「人腦+人工智慧」的超腦化指揮決策。

「全維化」態勢感知。未來智能化作戰,空間多維、力量多元、樣式多樣、節奏加快趨勢突出,全面靈動地掌握戰場態勢成為指揮員決策的基礎,多域一體、智能動態地呈現全維戰場態勢成為指揮資訊系統建設發展必然要求。指揮資訊系統對諸如目標識別、威脅等級估計、作戰行動預判和未來戰況走向預估等戰場態勢的感知、理解、融合和預測,正在從陸、海、空、天、電磁、網絡等空間擴展至認知域、社會域,實現「全維化」態勢感知。

「智聯化」網絡通聯。未來智慧化作戰將使用大量智慧指揮控制平台和智慧化武器平台,而連接指揮控制平台和武器平台的必然是智慧化的資訊通訊系統。如同人體的神經和血管,智慧化的資訊通訊系統在智慧化作戰中扮演連結和潤滑作用。因此,要建立全維度覆蓋、不間斷的智慧化資訊網絡,支撐智慧化裝備的連結和控制,形成網絡結構智能優化、網絡抗毀智能重組以及智能抗干擾能力,以確保平台間智能化的協同作戰,發揮最佳的整體作戰效能。

「無人化」自主協同。近期世界局部沖突中,無人機大量運用並起到決定戰爭走向的重要作用,引起了各方的廣泛關注。無人化武器裝備是智慧化作戰的物質基礎,並依此形成了顛覆式作戰樣式,如侵入式獨狼作戰、有人/無人協同體系破擊作戰、無人系統編隊獨立作戰、無人機蜂群集群作戰等。無人作戰雖是由人主導,並在後台賦予機器一定程度的自主行動權限,從而實現機器在一線無人作戰行動。然而無人作戰戰場瞬息萬變,人機協同被破壞將成為常態,無人智慧化裝備平台指控系統必須更加智慧,要能根據作戰目的進行自主協同作戰。

“主動化”訊息防禦。智慧化作戰必將面臨強敵全維多樣的資訊攻擊,資安防護能力的高低,直接影響戰場「制智權」鬥爭的勝負,是智慧化指揮資訊系統建設的關鍵環節。因此,應主動作為,積極制定及完善網絡防護策略,豐富入侵檢測能力及認證識別手段,加強資訊安全高新技術運用,強化各類無線傳輸方式的抗干擾、抗介入能力,建強智能化溯源反制能力,有效遏止資訊攻擊。

探索智慧化指揮資訊系統發展要津

智慧化指揮資訊系統發展不單單是技術的革新,更需要進一步解放思想、更新理念。推動智慧化指揮資訊系統發展,要改變傳統添硬體、建大「網」、收集存儲各類數據的思路,突破固有層級設定,打造開放式、服務型系統,瞄準智能化作戰指揮與行動需要,探索研究智能化指揮資訊系統發展要津。

創新理念。堅持以創新的思維理念為指引,借用軍事強國智慧化指揮資訊系統發展思路,結合實際需求,探索具有自身特色的發展道路。要打破傳統「樹煙囪」做法,堅持指揮資訊系統頂層設計和整體規劃,統一介面、協議和標準,形成開放式、可持續發展的系統架構佈局;堅持研建用相結合的系統研發策略,制定近期、中期、長期不同階段發展策略,規範系統建設發展方向;堅持迭代升級、優化持續策略,不斷提升指揮、長期不同階段發展策略,規範系統建設發展方向;堅持迭代升級、優化持續性策略,不斷提升指揮控制、長期不同階段發展策略、各分列系統建設發展方向;堅持版本

聚力關鍵。聚力智能化指揮資訊系統關鍵能力建設,是智慧化作戰以智聚優、以智制勝的重要依托,是智慧化作戰取得「制勝權」的關鍵。演算法、算力、數據既是人工智慧發展的內在動力和支撐,也是智慧化指揮資訊系統的核心能力要求和優勢。智慧化指揮資訊系統發展要堅持演算法創新研究,提高系統認知優勢、速度優勢和決策優勢;加快量子計算機等為代表的下一代計算機研發,為智能化指揮信息系統提供更強的算力支持;深度挖掘海量作戰數據資源中更深層次、更廣維度信息價值,謀求制勝先機。

集智攻關。智慧化指揮資訊系統建設發展是軍事智慧化的主要工程之一,是一個多領域、多學科交叉,多部門、多單位參與的大融合大聯動的攻堅工程。智慧化指揮資訊系統建設發展要堅持群策群力、集智攻關、開拓創新的精神,瞄準傳感器、量子信息、網絡通信、集成電路、關鍵軟件、大數據、人工智能、區塊鍊等戰略性前瞻領域,堅持高新技術推動、智能化作戰需求拉動,開展多領域、多層次、多形式深度研究交流,更加創新、進一步迭代創新

協作發展。深入推動智慧化指揮資訊系統建設發展,必須充分吸收地方先進技術成果,融入世界人工智慧創新發展的時代洪流。當前,世界人工智慧技術蓬勃發展,積蓄了強大發展動能和技術優勢,人工智慧技術應用通用性強,技術成果轉化應用前景廣闊,是智慧化指揮資訊系統建設發展的重要實現途徑。要研究制定通用技術標準,拆壁壘、破堅冰、暢通軍地合作,實現技術成果共享連結。要透過協作培養塑造新型軍事人才,使其不斷適應智慧化條件下各類崗位需求,充分發揮智慧化指揮資訊系統效能。

來源:解放軍報 作者:李建平 紀鳳珠 李琳 責任編輯:王鳳 2022-08-0x

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/8884917735.html

Chinese Military Research Application of Quantum Technology for Warfare Uses

中國軍方研究量子技術在戰爭中的應用

現代英語:

Quantum technology is considered one of the world-changing technologies of the 21st century and is a cutting-edge field of scientific and technological development, encompassing multiple aspects such as quantum communication, quantum computing, and quantum detection. In recent years, significant progress has been made in the preparation of quantum entangled states, the realization of quantum communication, and quantum computing. The latest advancements in quantum technology have brought revolutionary changes to the military field, and major military forces worldwide are paying close attention to its development and application. To this end, the National Strategy Research Institute of Shanghai Jiao Tong University has conducted a special study on the application of quantum technology in the military field. Excerpts of some of the research results are presented below:

I. Some major applications of quantum technology in the military field

1. Encrypted communication

Quantum communication technology utilizes the quantum entanglement effect for information transmission, offering unparalleled confidentiality compared to traditional communication methods. Quantum key distribution (QKD) is a secure communication technology based on the principles of quantum mechanics, ensuring the security of information during transmission. The U.S. military has been operating an experimental quantum key distribution network since 2003, and the White House and the Pentagon have also installed and are using quantum communication systems.

Research on the application of quantum technology in the military field 2.png

2. Navigation and Positioning

Quantum positioning technology is an emerging navigation and positioning technology that utilizes quantum accelerators and quantum gyroscopes to provide high-precision, lightweight navigation devices. These devices do not require periodic position correction via navigation satellites, significantly improving the autonomous navigation capabilities of military platforms. For example, the Royal Navy found that its submarine’s quantum navigation system had a positioning error of only 1 meter over 24 hours during testing.

Research on the application of quantum technology in the military field 3.png

Scientists are testing quantum gyroscopes.

3. Intelligence reconnaissance

Quantum imaging technology has important applications in military intelligence reconnaissance. It can simultaneously detect and identify multiple targets, offering advantages such as high imaging speed, anti-jamming capabilities, and anti-radiation properties. Furthermore, quantum imaging can precisely track and monitor moving targets, improving the efficiency and accuracy of intelligence gathering.

4. Data Processing

Quantum computing boasts the advantage of parallel processing, enabling the rapid aggregation and analysis of massive amounts of battlefield data. Following the laws of quantum mechanics, quantum computers utilize physical properties such as quantum superposition and entanglement, using qubits (quantum bits) composed of microscopic particles as their basic units, and achieving computational processing through the controlled evolution of quantum states. This will drive the real-time and efficient connection of battlefield IoT and various information terminals, realizing the intelligent and networked upgrade of the battlefield.

5. Battlefield decision support

Quantum technology can enhance the confidentiality of military network information, improve the accuracy of military navigation and positioning, and enable the efficient processing of massive amounts of intelligence, thus providing strong support for battlefield decision-making. The ultrafast computing power of quantum computers can help analyze complex battlefield situations, provide more accurate battlefield simulations and predictions, and assist commanders in making more informed strategic decisions.

The application of quantum technology in the military field will have a significant impact on the future form of warfare and combat methods. As quantum technology continues to develop and mature, its application in the military will become increasingly widespread, providing strong technical support for improving military operational efficiency, ensuring information security, and enhancing battlefield command capabilities.

II. Application Prospects of Quantum Technology in the Civilian Field

1. Quantum communication

Quantum communication is an important application area of ​​quantum technology, utilizing quantum entanglement and the no-cloning principle to achieve secure information transmission. Quantum key distribution (QKD) is a secure communication technology based on quantum mechanics principles, ensuring the security of information during transmission. Through quantum communication, metropolitan quantum communication networks, intercity quantum networks, and even long-distance quantum communication via satellite relay can be realized, providing secure data and information transmission for fields such as finance and government.

2. Quantum computing

Quantum computing leverages the superposition and entanglement properties of qubits to significantly surpass the computational capabilities of traditional computers for specific problems. Quantum computers have potential applications in areas such as cryptography, optimization problems, drug discovery, and materials science. For example, quantum factorization algorithms can break the widely used RSA encryption system, while quantum search algorithms can provide exponential speedups in areas such as database queries.

Research on the application of quantum technology in the military field 4.jpg

The same superconducting quantum computer as the “Zu Chongzhi” series

3. Quantum precision measurement

Quantum precision measurement leverages the hypersensitivity of quantum states to achieve measurement accuracy surpassing classical methods. This can be applied to gravitational wave detection, geophysics, biology, and other scientific fields, as well as improving the accuracy and reliability of navigation systems. For example, new approaches to gravitational wave detection can be achieved through quantum entangled light sources and precise optical clocks, or quantum mechanical nonlocality tests can be conducted over distances on the order of light seconds between the Earth and the Moon.

4. Quantum Simulation

Quantum simulators can simulate complex quantum systems, providing new tools for research in fields such as physics, chemistry, and materials science. Through quantum simulators, scientists can explore complex phenomena such as high-temperature superconductivity and quantum phase transitions, accelerating the development of new materials and drugs.

5. Quantum Networks

Quantum networks combine quantum communication and quantum computing, enabling the efficient transmission and processing of quantum information. The development of quantum networks will drive the formation of a quantum internet, providing a new platform for applications such as information security, telemedicine, and intelligent transportation.

6. Quantum Imaging

Quantum imaging technology utilizes the principles of quantum entanglement and quantum interference to achieve high-resolution imaging in low-light or high-noise environments. This has important applications in fields such as medical imaging, night vision systems, and remote sensing.

7. Quantum Sensing

Quantum sensors utilize the properties of quantum states to achieve extremely high-precision measurements of physical quantities. Quantum sensing technology can be applied to fields such as precision measurement, environmental monitoring, and geological exploration, improving the accuracy and reliability of measurements.

現代國語:

量子技術被認為是21世紀改變世界的技術之一,也是科技發展的前沿領域,涉及量子通訊、量子計算和量子探測等多個面向。近年來,量子糾纏態的製備、量子通訊的實現和量子計算等方面取得了顯著的進展,量子技術的最新進展為軍事領域帶來了革命性的變革可能,世界主要軍事力量高度關注量子技術的發展與應用。為此,上海交通大學國家戰略研究院對量子技術在軍事領域的應用進行了專題研究,現在將部分研究成果摘錄如下:

一、量子技術在軍事領域的一些主要應用方向

1.加密通信

量子通訊技術利用量子糾纏效應進行資訊傳遞,具有傳統通訊方式無法比擬的保密性。量子金鑰分發(QKD)是一種基於量子力學原理的安全通訊技術,能夠保證資訊在傳輸過程中的安全性。美軍自2003年起開始運行實驗性量子金鑰分發網絡,而白宮和五角大廈也已安裝使用量子通訊系統。

量子技術在軍事領域的應用研究2.png

2.導航定位

量子定位技術是近年來新興的導航定位技術,利用量子加速器和量子陀螺儀,可以提供高精度、重量輕的導航設備。這些設備無需定期通過導航衛星校正位置,大大提高了軍事平台的自主導航能力。例如,英國皇家海軍在測試潛水艇的量子導航系統時發現,其在24小時內的定位誤差僅1公尺。

量子技術在軍事領域的應用研究3.png

科學家在測試測試量子陀螺儀

3.情報偵察

量子成像技術在軍事情報偵察領域有重要應用。量子成像技術可以同時對多個目標進行探測識別,具有成像速度快、抗干擾、反輻射等優勢。此外,量子成像還可以對動態目標進行精確追蹤監視,並提高情報收集的效率和準確性。

4.數據處理

量子運算具有平行運算優勢,能夠實現對戰場海量資料的快速匯聚與分析計算。量子電腦遵循量子力學規律,利用量子疊加和糾纏等物理特性,以微觀粒子構成的量子位元為基本單元,透過量子態的受控演化實現計算處理。這將推動戰場物聯網及各類資訊終端即時高效連接,實現戰場智慧化、網路化升級。

5.戰場決策支持

量子技術可增強軍事網路資訊保密性,提高軍事導航定位精度,實現大量情報高效處理,進而為戰場決策提供強而有力的支援。量子電腦的超快運算能力可以幫助分析複雜的戰場情況,提供更精確的戰場模擬和預測,輔助指揮官做出更明智的戰略決策。

量子科技在軍事領域的應用將對未來戰爭形態和作戰方式產生重要影響。隨著量子技術的不斷發展和成熟,其在軍事領域的應用將越來越廣泛,為提高軍事作戰效率、保障資訊安全和提升戰場指揮能力提供強大的技術支援。

二、量子技術在民用領域的應用前景

1.量子通信

量子通訊是量子技術的一個重要應用領域,它利用量子糾纏和量子不可複製原理來實現資訊的安全傳輸。量子金鑰分發(QKD)是一種基於量子力學原理的安全通訊技術,能夠保證資訊在傳輸過程中的安全性。透過量子通信,可以實現城域量子通訊網路、城際量子網絡,甚至透過衛星中轉實現遠距離量子通信,為金融、政務等領域提供資料和資訊的安全傳輸。

2.量子計算

量子運算利用量子位元的疊加和糾纏特性,能夠在特定問題上大幅超越傳統電腦的運算能力。量子電腦在破解密碼、最佳化問題、藥物發現、材料科學等領域具有潛在的應用價值。例如,量子因數分解演算法可以破解目前廣泛使用的RSA加密體系,而量子搜尋演算法則能夠在資料庫查詢等方面提供指數級的加速。

量子技術在軍事領域的應用研究4.jpg

「祖沖之號」同款超導量子計算機

3.量子精密測量

量子精密測量利用量子態的超敏感性來實現超越經典方法的測量精度。這可以應用於重力波探測、地球物理學、生物學和其他科學領域,以及提高導航系統的精度和可靠性。例如,透過量子糾纏光源和精準的光鐘,可以實現重力波探測的新途徑,或在地球和月球之間進行光秒量級距離的量子力學非定域性檢驗。

4.量子模擬

量子模擬器可以模擬複雜的量子系統,為物理學、化學和材料科學等領域的研究提供新的工具。透過量子模擬器,科學家可以探索高溫超導、量子相變等複雜現象,加速新材料和藥物的開發。

5.量子網絡

量子網路結合了量子通訊和量子運算,可以實現量子資訊的高效傳輸和處理。量子網路的發展將推動量子網路的形成,為資訊安全、遠距醫療、智慧交通等應用提供新的平台。

6.量子成像

量子成像技術利用量子糾纏和量子乾涉原理,可以在低光照或高雜訊環境下實現高解析度成像。這在醫學影像、夜視系統、遙感偵測等領域有重要應用。

7.量子感測

量子感測器利用量子態的特性來實現對物理量的極高精度測量。量子感測技術可應用於精密測量、環境監測、地質探勘等領域,提升測量的準確性與可靠性。

中國原創軍事資源:https://niss.sjtu.edu.cn/web/main/cgcp/600ad41bb50841d2bb9283642a4d14d888e

The Chinese Communist Party’s Application of Quantum Technology in Warfare

中國共產黨在戰爭中應用量子技術

現代英語:

On November 1, 2022, Huawei, a major Chinese mobile phone manufacturer, announced its patent for a superconducting quantum chip, stating that the invention reduced crosstalk between quantum bits. Huawei has been investing in quantum chip research and development for more than 5 years and has published a number of quantum technology patents. In addition, it is rumored that the Chinese quantum computer “Wukong” will be unveiled soon, and the first quantum chip production line is being rushed to completion, using the “NDPT-100 non-destructive probe electrical measurement platform” developed by Origin Quantum in Hefei to improve yield. At the same time, the University of Science and Technology of China also announced on November 20 that it has achieved quantum storage of photons in the communication band, which can be directly connected to the existing fiber optic network, and may be able to build a long-distance, large-scale fiber optic quantum network in the future. [1]

On the other hand, the U.S. Department of Defense released the 2022 China Military Power Report on November 29, pointing out that the CCP discussed a new core operational concept in 2021—”Multi-Domain Precision Warfare”—using big data and artificial intelligence technologies to identify vulnerabilities in the opponent’s combat system and then carry out precise strikes. At the same time, the CCP has also acquired emerging technologies for both military and civilian use through its military-civilian integration strategy, such as artificial intelligence, autonomous systems, quantum technology, biotechnology, and advanced materials. [2]

Although quantum technology is still in the “proof of concept” (POC) stage and will take a considerable amount of time before it can be put into practical use, China’s quantum technology continues to make progress despite the strong technological blockade by the United States, and its application in combat may be prioritized, which deserves our special attention.II. Safety ImplicationsI. The CCP will take the lead in establishing a global quantum communication network.Quantum technology[3] is mainly divided into three major fields: quantum computing, quantum communication and quantum sensing.[4]

China’s quantum communication technology currently holds a leading position in the world and may be the first to complete industrialization.[5] Following the opening of the world’s first quantum communication network, the Hefei Metropolitan Area Quantum Communication Experimental Demonstration Network, in 2012, China successfully launched the world’s first quantum satellite, Micius, in 2016.

Subsequently, it achieved three major technological breakthroughs: quantum key distribution (QKD) between satellite and ground, quantum teleportation between ground and satellite, and quantum entanglement key distribution over a thousand kilometers. In 2017, the CCP opened the Beijing-Shanghai quantum communication line, which is more than 2,000 kilometers long. With the connection between the satellite “Micius” and the Beijing-Shanghai quantum communication line, the world’s first intercontinental (Beijing-Vienna) quantum communication video call was completed through the collaboration between Austrian scholar Anton Zeilinger[6] and Chinese quantum expert Pan Jianwei.The successful distribution of “space-to-ground quantum key” enables the CCP to use “low orbit satellites” (LEO) as relay stations to share keys between any two locations in the world.

If further combined with ground fiber optic quantum communication networks, a quantum communication network covering the whole world can be established. Currently, the CCP is planning to build a “national quantum internet” with a length of 35,000 kilometers, extending to Urumqi in Xinjiang and Lhasa in Tibet. In addition to ensuring that the content of messages is not intercepted or eavesdropped on, [7] “Quantum Digital Signature” (QDS) and “Quantum Secure Identification” (QSI) can also improve communication security. In military applications, in addition to ensuring the security of military communications, quantum communication networks can also be used as military 6G technology to assist quantum communication between space, special forces and different military branches, and solve the problem of underwater communication being susceptible to interference, thereby improving underwater combat capabilities. [8]

II. China’s quantum computing technology will accelerate the realization of unmanned intelligent warfare.The global quantum computing market is currently led by the United States and China, which are driving the development of related system software and algorithms. There are multiple technical approaches, with superconductivity and “ion trap” technology being the most advanced. On May 8, 2020, the CCP unveiled the superconducting quantum computer prototype “Zu Chongzhi”; on December 4 of the same year, it announced the successful construction of the photonic quantum computer prototype “Jiuzhang”. Currently, it is using ion trap technology to improve the computing power of photonic quantum chips. [9]

Quantum computers can combine artificial intelligence and big data analysis to process large amounts of information quickly, and are mainly used in chemical analogy, system optimization, password cracking, machine learning and other fields. In the military, in addition to being able to quickly crack public key cryptography and improve network combat capabilities,[10] quantum computing can also be used in battlefield simulation, wireless spectrum analysis, logistics management, energy management and other fields. It can also optimize existing combat command, deployment, decision-making, war game simulation, system verification, predictive analysis and other fields, and significantly shorten the time for weapon design and manufacturing, new material development and military battery research and development. Quantum edge computing can be applied to the collaborative operations of unmanned vehicles or unmanned weapons (see attached table). In addition, if the CCP can establish a battlefield “Internet of Military Things” (IoMT), it can realize precise, fast and highly complex unmanned intelligent operations in advance.

III. Quantum radar and quantum navigation capabilities will reverse the course of war.Quantum sensing technology uses quantum measurement of physical properties such as magnetic fields, electric fields, and gravity, which can greatly improve the accuracy of existing measurements. The main types include quantum radar, quantum navigation, and quantum imaging. Quantum sensing technology can identify targets in complex environments such as high noise, low light, and underwater, and the advantages of current ballistic missiles, stealth aircraft, and underwater nuclear submarines will no longer exist. [11]

In 2017, the CCP claimed that its “quantum imaging technology” (QI) could enable spy satellites to track US B-2 bombers and identify stealth fighters at night. [12]

China Electronics Technology Group Corporation (CETC) showcased the world’s first single-photon quantum radar prototype at the 2018 Zhuhai Airshow and recently claimed that it had completed a target detection test at a range of 100 kilometers in a real atmospheric environment, implying that its quantum radar was about to be launched. [13]

In addition, quantum positioning, timing and navigation (PNT) systems based on high-precision quantum clocks determine the coordinates of ground users by obtaining the time difference between the transmission of entangled photon pairs between the satellite and the ground through quantum satellites. [14]

Since it does not rely on the Global Positioning System (GPS), infrared or radar navigation, quantum navigation can not only greatly enhance the existing Global Navigation Satellite System (GNSS), but also function in environments where GPS cannot work, such as underwater, underground or in environments severely interfered with by electromagnetic waves. Once it is put into practical use, the CCP’s quantum navigation technology will improve the hit rate of its various weapons.

3. Trend Analysis

I. The CCP may be developing “quantum warfare”.Although the CCP acknowledges that its quantum technology still has many shortcomings and that it will take a considerable amount of time before it is commercialized, it has already identified quantum technology as a key technology for breaking through the US’s technological encirclement and establishing itself as a technologically powerful nation. The “second quantum revolution” will overturn existing technological, economic, and military models. It is conceivable that the CCP will continue to invest heavily in quantum technology development through a nationwide system. Under this general direction, the quantum industry and quantum military applications will be accelerated. In the future, as existing computers move towards miniaturization, cloud computing, and edge computing, quantum computers or quantum sensors may be deployed on smaller weapons and equipment, such as satellites, drones, or individual soldier mobile phones, and even for “quantum warfare” (see attached diagram).

II. Taiwan may need to develop quantum defense capabilities in advance.China’s quantum communication technology is currently ranked first in the world, and its quantum computing and quantum sensing technologies are ranked second in the world. Therefore, if China uses quantum technology to fight against us, our country may not have any ability to retaliate. In March 2022, China established a quantum national team, selected 17 industry-academia-research teams, and pointed out the development direction of quantum technology in the next 5 years. [15]

However, its plans are mostly biased towards the technological and economic aspects, and there are no defense measures against the Chinese Communist Party’s possible future attacks on us, such as password cracking, quantum navigation, quantum radar, and even quantum network warfare, quantum space warfare and quantum underwater warfare. Perhaps the Chinese Academy of Sciences should join the quantum national team in advance and cooperate with private industry-academia-research personnel to think about how to defend against the Chinese Communist Party’s future quantum warfare.Appendix: Examples of Military Applications of Quantum Technology

 fieldPossible applications
Quantum CommunicationQuantum key distribution ( QKD )Quantum communication technology is the most mature and is already commercially available.Long -distance quantum communication can be achieved through repeaters such as satellites.
Post-quantum cryptographyUsed to defend against attacks from quantum computersThe United States expects to complete standardization in 2023-2024.
Quantum Communication NetworkQuantum networks: quantum-secure direct communication in space, special forces, and between different military branches → military 6GQuantum digital signature ( QDS )Quantum Identity Recognition ( QSI )Quantum cryptography technology that requires specific locations to transmit and receive: military satellite communicationsQuantum clocks enable more precise time synchronization: C4ISR collaborative action
Quantum computingQuantum simulationBattlefield    simulation, weapon development, simulation and verification
Quantum optimizationOptimize    current operational deployments, exercises, system verification, predictive analysis, etc.Cracking    existing passwords
Big Data Analytics/Machine LearningWireless    spectrum analysis, logistics management, energy managementDecision    Analysis and Reference
Edge computingConsistency of action of unmanned    vehicles or unmanned weapons within the same time period   Cooperative operations between different military branches
Quantum sensingQuantum positioning, navigation, and timing ( PNT )High -precision quantum clockQuantum inertial navigation and quantum-enhanced navigation can be deployed on autonomous unmanned vehicles or missiles.Quantum navigation that does not rely on a global satellite navigation system
Quantum intelligence surveillanceSurface and subsurface monitoring: Quantum sensing technology deployed on low-Earth orbit satellites and unmanned vehicles
Quantum imaging: quantum 3D cameras, quantum gas sensors, low signal-to-noise ratio battlefield vision equipment, quantum rangefinders, quantum ghost imaging, etc.
Quantum Underwater WarfareQuantum inertial navigation can be applied to large submarines and underwater vehicles.Quantum magnetometers can assist in mapping the seabed, detecting underwater mines, and, in conjunction with other sensors, perform underwater detection and analysis.
Quantum radar and quantum laser radar, etc.Quantum laser radar: Short-range target illumination, applicable to anti-drone surveillance, short-range air defense, and small satellite detection in space.Quantum -enhanced radar: A high-precision, low-noise quantum radar that can be used to detect small, slow-moving objects such as drones.
otherCombat Applications Quantum electronic warfareSmaller general-purpose quantum antennas and array-type quantum radio frequency sensorsQuantum computing and quantum clocks can enhance the capabilities of existing electronic warfare systems.Quantum electronic warfare can interfere with, deceive, and obstruct the enemy.
Quantum Space WarfareDeployment and development of technologies such as quantum radar, quantum electronic warfare, quantum sensing, and quantum communication on low-Earth orbit satellites
Biochemical Simulation and DetectionAt least 200 qubits and more logic bits are required for simulation.It can be installed on drones and ground vehicles for detecting biochemical toxins in the environment.
quantum materialsDeveloping new military materials for camouflage, stealth, and high-temperature resistance by utilizing quantum properties such as superconductivity and topology.

Source: Table compiled by author Wang Xiuwen based on the literature. Michal Krelina, “Quantum Technology for Military Application,” EPJ Quantum Technology, (2021) 8:24,

Wang Xu Wen

https://reurl.cc/DXYWaj.

現代國語:

壹、新聞重點

2022年11月1日,中共手機大廠「華為」公司公布其「超導量子晶片」專利,指出該項發明降低了量子比特串擾。「華為」投入量子晶片研發超過5年,已公開多項量子技術專利。此外,據聞中共量子電腦「悟空」即將公開,第一條量子晶片產線正加緊趕工,並採用合肥「本源量子」公司研發的「NDPT-100無損探針電學測量平台」來提高良率。同時,中國科學技術大學也在11月20日宣布已實現通訊波段光子之量子存儲,可直接對接現行的光纖網路,未來可能建構出長距離、大尺度的光纖量子網。 [1]

另一方面,美國國防部11月29日公布《2022年中國軍力報告》(2022 China Military Power Report),指出中共在2021年曾討論新核心作戰概念──「多領域精確作戰」(Multi-Domain Precision Warfare),以大數據和人工智慧等技術,找出對手作戰系統之脆弱點後予以精準打擊。同時,中共也透過軍民融合戰略取得軍民兩用的新興技術,如:人工智慧、自主系統、量子技術、生物技術、先進材料等。[2]

儘管量子技術目前仍處於「概念驗證」(Proof of Concept, POC)階段,距離實用化尚需相當的時間,但是中共量子技術在美國強力的科技圍堵下仍持續進展,且作戰應用可能優先落實,值得我國特別注意。

貳、安全意涵

一、中共將率先建立全球量子通訊網

量子技術 [3]主要分為「量子計算」、「量子通訊」、「量子感測」三大領域,[4] 中共量子通訊技術目前持世界牛耳,且可能最先完成產業化。[5] 繼2012年開通全球第一個量子通訊網路「合肥城域量子通信試驗示範網」之後,中共2016年成功發射全球第一顆量子衛星「墨子號」,其後陸續達成「星地(衛星─地面)量子密鑰分發」(Quantum Key Distribution, QKD)、「地星(地面─衛星)量子隱形傳態」及「千公里級量子糾纏密鑰分發」三大技術突破。2017年,中共開通全長2,000餘公里的量子通訊線路「京滬幹線」,並在「墨子號」與「京滬幹線」之星地鏈結下,透過奧地利學者柴林格(Anton Zeilinger)[6] 和中國量子專家潘建偉之師徒合作,完成全球首次跨洲(北京─維也納)量子通訊之視訊通話。

「星地量子密鑰」分發成功,使中共能以「低軌衛星」(LEO)為中繼站,進行全球任意兩個地點之間的密鑰共享。若進一步結合地面光纖量子通訊網路,可建立覆蓋全球的量子通訊網。目前中共正計畫建構長達35,000公里的「全國量子互聯網」,範圍擴及新疆烏魯木齊和西藏拉薩。量子通訊除可確保訊息內容不被半途截取或竊聽之外,[7] 「量子數位簽名」(Quantum Digital Signature, QDS)和「量子身份識別」(Quantum Secure Identification, QSI)也可提高通訊安全。在軍事應用上,量子通訊網除了保障軍事通訊安全之外,也可作為軍用6G技術協助太空、特種部隊及不同軍種之間的量子通訊,並解決水下通訊易受到干擾之問題,提高水下作戰能力。 [8]

二、中共量子計算技術將加速無人智慧化戰爭之實現

全球量子計算市場目前以美國和中國為兩大領先者,推動相關系統軟體和演算法之發展,並有多種技術途徑,以超導和「離子陷阱」(Ion Trap)技術之發展較為超前。2020年5月8日,中共公開超導量子電腦原型機「祖沖之號」;同年12月4日又宣布光子量子電腦原型機「九章」建構成功,目前正運用離子陷阱技術提升光量子晶片之計算能力。 [9]

量子電腦可結合人工智慧和大數據分析,快速處理大量資訊,主要應用在化學類比、系統優化、密碼破解、機器學習等方面。在軍事上,量子計算除了可快速破解公鑰密碼、提高網路作戰能力之外,[10] 還可運用於戰場模擬、無線頻譜分析、後勤管理、能源管理等,也可優化現有的作戰指揮、部署、決策、兵棋推演、系統驗證、預測分析等,並大幅縮短武器設計製造、新材料開發、軍用電池研發之時間;量子邊緣運算則可應用於無人載具或無人武器之協同作戰(參見附表)。此外,中共若能建立戰場「軍事物聯網」(Internet of Military Things, IoMT),可提早實現精準快速且高度複雜的無人智慧化作戰。

三、量子雷達及量子導航等能力將扭轉戰爭態勢

量子感測技術是以量子測量磁場、電場、重力等物理性質,可大幅提昇現有測量之精度,主要有:量子雷達、量子導航、量子成像等。量子感測技術可在高噪音、光線微弱、水下等複雜環境中辨識出目標,現行彈道飛彈、隱形飛機、水下核潛艦等武器優勢將不復存在。[11]

中共2017年宣稱,其「量子成像技術」(Quantum Imaging,QI)已可使間諜衛星在夜間追蹤美國B-2轟炸機和辨識隱形戰機。[12] 「中國電科集團」則在2018年珠海航展中展示全球第一台單光子量子雷達樣機,最近更宣稱已在真實大氣環境下完成百公里級的目標探測試驗,暗指其量子雷達即將問世。 [13]

此外,以高精度量子時鐘為基礎的量子定位、授時和導航(PNT)系統,是透過量子衛星取得衛星與地面間傳遞糾纏光子對之時間差,來確定地面用戶座標。[14] 由於不依賴全球定位系統(GPS)、紅外線或雷達導航,量子導航除了可大幅增強現行全球衛星導航系統(GNSS)之外,在GPS無法作用之環境如:水下、地表下或被電磁波嚴重干擾之環境中也能發揮功能。一旦進入實用化,中共量子導航技術將提高其各種武器之命中率。

參、趨勢研判

一、中共或將發展出「量子戰爭」(Quantum Warfare)

雖然中共亦承認自身的量子技術仍有許多「短板」,且量子技術距離市場化仍需要不短的時間,但是量子技術已被中共視為突破美國科技圍堵、建立科技強國之關鍵技術。「第二次量子革命」將翻轉現有的科技、經濟和作戰模式,可以想見,中共未來仍將以舉國體制,加碼投入各種資源發展量子技術。在此大方向之下,量子產業及量子軍事應用都將加速落實。未來,隨著搭配現有電腦朝小型化、雲端化、邊緣運算方向發展,量子電腦或量子感測器可能部署在更小型的武器裝備上,如:衛星、無人機或單兵手機等,甚至進行「量子戰爭」(參見附圖)。

二、我國恐需預先發展量子防禦能力

中共量子通訊技術目前位居世界第一、量子計算和量子感測技術均居世界第二。因此,中共若將量子技術用於對我作戰,我國恐無任何還擊能力。我國在2022年3月成立量子國家隊,選出17個產學研團隊,並指出未來5年量子科技發展方向。[15] 但是,其規劃多半偏向科技面和經濟面,對於中共未來可能對我進行的密碼破解、量子導航、量子雷達,甚至量子網路戰、量子太空戰和量子水下戰等,沒有任何防禦對策。或許中科院應優先且早期加入量子國家隊,和民間產學研人士合作,共思如何防禦中共未來的量子作戰。

附表、量子技術軍事應用之例

 領域可能應用
量子通訊量子密鑰分發(QKD)ž 是量子通訊技術中最為成熟者,已可商用ž 透過衛星等中繼器,可進行遠距離量子通訊
後量子密碼ž 用於防禦量子電腦之攻擊ž 美國預計2023-2024年完成標準化
量子通訊網ž 量子網絡:太空、特種部隊、不同軍種間的量子安全直接通訊→軍用6Gž 量子數位簽名(QDS)ž 量子身份識別(QSI)ž 特定位置才能收發的量子密碼技術:軍事衛星通信ž 量子時鐘更精確的時間同步:C4ISR協同行動
量子計算量子模擬ž   戰場模擬、武器之開發、模擬和驗證
量子優化ž   優化現行作戰部署、演習、系統驗證、預測分析等ž   破解現有密碼
大數據分析∕機器學習ž   無線頻譜分析、後勤管理、能源管理ž   決策分析及參考
邊緣運算ž   無人載具或無人武器同一時間內之行動一致性ž   不同軍種之協同作戰
量子感測量子定位、導航及定時(PNT)ž 高精度量子時鐘ž 量子慣性導航、量子增強導航,可部署在自主無人載具或飛彈上ž 不需要依賴全球衛星導航系統之量子導航
量子情監偵ž 地表與地下監測:部署於低軌衛星、無人載具之量子感測技術
ž 量子成像:量子3D相機、量子氣體感測器、低信噪比之戰場視覺裝備、量子測距儀、量子鬼成像等
量子水下作戰ž 量子慣性導航可應用於大型潛艦和水下載具ž 量子磁力計可協助繪製海底地圖、探測水下水雷,配合其他感測器進行水下探測和分析
量子雷達與量子雷射雷達等ž 量子雷射雷達:短距離之目標照明,可運用於反無人機監視、短程防空、太空之小衛星探測ž 量子增強雷達:高精度低噪音量子雷達,可用於探測無人機等小型慢速移動物體
其他作戰應用 量子電子戰ž 更小型的通用量子天線、陣列式量子射頻感測器ž 量子計算及量子時鐘可增強現有的電子戰系統能力ž 量子電子作戰可對敵進行干擾、欺騙和阻攔
量子太空戰ž 量子雷達、量子電子戰、量子感測、量子通訊等技術在低軌衛星之部署和研發
生化模擬與檢測ž 至少需要200個以上的量子比特和更多的邏輯比特數量才可進行模擬ž 可安裝在無人機和地面車輛上,用於檢測環境中的生化毒物等
量子材料利用超導、拓樸等量子特性開發偽裝、隱形、耐高溫等新軍用材料

中國原創軍事資源:https://indsr.org.tw/respublicationcon?uid=12&resid=1928&pid=3582

Chinese Military & the Emerging Potential of Quantum Computing in Unconventional Warfare

中國軍事與量子運算在非常規戰爭中的新興潛力

現代英語:

The following article is from Zhuanzhi Intelligent Defense , authored by Zhuanzhi Defense.

Quantum computing represents a paradigm shift in computing technology, promising to revolutionize various industries, including national security and defense. While the capabilities of quantum computing remain largely theoretical, significant progress is underway. Experiments by companies like Google and IBM have demonstrated early instances of quantum supremacy, where quantum computers outperform classical systems in specific tasks. These breakthroughs suggest that quantum computing is not only imminent but is considered an inevitable advancement, and stakeholders should prepare now.

Unlike classical computers, which rely on binary bits (1s and 0s) to process information in a linear or symmetric manner, quantum computers utilize qubits, or “qubits,” which can exist in multiple states simultaneously. This may be a difficult concept to grasp, but this capability enables quantum computers to perform complex calculations at unprecedented speeds, solving problems that even the most powerful supercomputers currently cannot. As irregular warfare and gray-zone conflicts increasingly rely on advanced technologies, the application of quantum computing in these areas has the potential to pose new threats, but also new strategic advantages. Quantum computing may fundamentally change the way conflicts are managed and resolved in the 21st century.

Understanding Quantum Computing

Classical computing, the backbone of today’s digital infrastructure, operates on a binary system where data is represented by “bits” of “0” or “1”. These bits are processed sequentially, and classical computers execute tasks step by step. While powerful, this approach faces significant limitations when dealing with complex problems requiring vast amounts of computational resources. Quantum computing, however, utilizes the principles of quantum mechanics, allowing qubits (also known as “qubits”) to exist in multiple states simultaneously through a phenomenon called superposition. Essentially, classical bits must choose between 0 and 1, while qubits can represent both states at the same time. Entanglement, another quantum property, connects qubits so that the state of one qubit directly influences the state of another, regardless of distance.

To better understand the power of quantum computing, it’s helpful to intuitively see how it solves problems compared to classical computing. The podcast “Ask A Spaceman” uses a very relatable analogy to illustrate this. Imagine you have a complex task that requires searching through a vast number of possibilities, like finding a mouse hiding somewhere in a huge mansion. What better way to find the mouse than with a cat? In this scenario, a classical computer is like a cat, methodically searching room by room. The cat can only stay in one room at a time, and it must explore each room sequentially until it finds the mouse. If the mansion is large, this process is extremely time-consuming. Now imagine a quantum computer as a cat with a unique ability: it can be in every room of the mansion simultaneously. You could call it a “q cat.” This “q cat” doesn’t need to search room by room; instead, it can examine every possible location in the mansion at the same time. The mouse’s location can be found almost instantly, without the need for methodical exploration of each room. This analogy captures the essence of quantum computing: the ability to perform multiple computations simultaneously. By utilizing the principles of superposition and entanglement, quantum computers can solve problems several times faster than classical computers.

The impact of quantum computing on irregular warfare

As quantum computing moves from theoretical research into practical applications, it has the potential to dramatically alter the landscape of irregular warfare and gray-zone conflicts. For example, adversaries possessing quantum-enhanced decryption capabilities could intercept and decrypt military communications, weakening security operations and exposing critical intelligence. Similarly, quantum-based data processing allows adversaries to analyze massive amounts of intercepted data in real time, uncovering patterns of action or vulnerabilities. With the continued development of quantum computing, the ability to rapidly process and analyze massive amounts of data could shift the balance of power, introducing previously unimaginable new methods of conflict. The promise of quantum computing lies not only in strengthening existing strategies but also in its potential to create new methods of engagement, forcing state and non-state actors to rethink their modus operandi. Understanding the potential applications of quantum computing in irregular warfare is crucial for predicting future threats and developing effective countermeasures, especially when adversaries attempt to exploit these technologies for their own strategic gain.

Feasible applications of quantum computing in irregular warfare

The following section explores some of the most viable applications of quantum computing in irregular warfare, highlighting how this emerging technology can enhance strategic capabilities and provide a competitive advantage in increasingly complex and unpredictable conflict environments.

  • Enhanced cryptographic capabilities

One of the most anticipated applications of quantum computing is its ability to break traditional cryptographic systems. Classical encryption, the foundation for secure communications and intelligence, relies on the computational difficulty of factoring large prime numbers, a method easily cracked by quantum algorithms like the Shor algorithm. This will have profound implications, as state and non-state actors could potentially intercept and decrypt sensitive communications, disrupting operations on multiple levels. This emerging threat has sparked a global race in “post-quantum cryptography” to develop encryption methods resistant to quantum attacks. This arms race between offensive quantum decryption capabilities and defensive quantum-resistant encryption is expected to be a decisive aspect of the future conflict landscape. As the U.S. and our adversaries develop increasingly sophisticated tools, the stakes for national security, espionage, and the protection of critical infrastructure are higher than ever.

  • Optimize actions and decisions

The potential of quantum computing in optimizing complex operations is particularly relevant to the logistical and decision-making needs of irregular warfare. Quantum algorithms can process massive datasets simultaneously, thus simplifying logistics, resource allocation, and strategic planning. Just as the advent of radar during World War II revolutionized military operations, providing near real-time intelligence on enemy movements and fundamentally altering the nature and outcome of battles, quantum computing could also transform modern conflict by enabling predictive conflict management. This involves simultaneously analyzing geopolitical, economic, and social variables to predict potential conflict zones or flashpoints. A study published in *Stability* within the *International Journal of Security and Development* demonstrates the feasibility and added value of machine learning in conflict prediction, primarily using classical computational methods. However, the principles explored in this study can be directly applied to quantum computing, offering a glimpse into how advanced quantum algorithms can enhance predictive conflict management. This capability will enable military and intelligence agencies to preemptively deploy resources and personnel, reducing reaction time and managing conflict in a more proactive manner. As these technologies advance, quantum-enhanced decision-making processes could allow operators to navigate the unpredictability of conflicts with greater confidence and precision.

  • Simulation and Modeling: The ability to simulate and model complex battlefield environments is another key area where quantum computing promises to have a significant impact. Traditional simulation methods often struggle to capture the unpredictability inherent in conflicts employing decentralized and variable tactics. Quantum-enhanced war games can revolutionize this process, enabling military strategists to run countless potential scenarios in parallel, exploring not only known strategies but also new and unforeseen outcomes. These simulations will provide unprecedented insights into adversary behavior, operational risks, and tactical opportunities, leading to more effective strategic planning. Beyond battlefield tactics, quantum computing can also simulate highly interconnected cyber-physical systems, such as power grids, transportation networks, and communication infrastructure. This helps identify vulnerabilities caused by unconventional threats like cyberattacks or sabotage and predict cascading failures. This ability to test the resilience of critical infrastructure in real time will provide decision-makers with actionable insights to mitigate risks and strengthen defenses, ensuring operational stability even under mixed or gray zone pressures.
  • Influence operations and information warfare

Quantum computing’s unparalleled data processing capabilities can significantly enhance influence operations and information warfare, which are central to modern irregular warfare and gray-zone conflicts. Quantum computing can analyze massive amounts of social media and information network data to identify patterns, trends, and anomalies that may indicate an adversary’s attempts to manipulate public opinion or spread disinformation. Beyond identifying these activities, quantum-enhanced disinformation countermeasures can go even further. By simulating how disinformation spreads in networks, quantum computers can generate counter-narratives on a massive scale in real time, dismantling adversary influence operations before they gain traction. This would mark a significant advancement in countering cognitive warfare tactics and information manipulation.

  • Addressing hybrid threats

Hybrid threats, often combining conventional warfare, cyberattacks, misinformation, and irregular tactics, are particularly challenging to address due to their multifaceted nature. Quantum computing offers a powerful solution through quantum-enhanced human topography mapping—a capability distinct from battlefield simulation. Unlike simulations that primarily focus on operational and tactical scenarios, human topography mapping centers on the socio-political and economic environment at the time of conflict. This speculative yet feasible application can rapidly analyze large datasets, such as demographic sentiment, resource distribution, and political instability, to identify patterns and trends indicating social unrest, insurgency, or emerging cross-regional conflicts.

For example, quantum-enhanced systems can integrate data from social media, economic reports, and historical conflict patterns to map areas of escalating tensions and predict where hybrid threats are most likely to occur. By providing a nuanced understanding of the human environment, military and intelligence organizations can develop tailored strategies to mitigate risks before they escalate. This capability will complement battlefield simulations, addressing the broader contextual factors driving conflict and providing a more comprehensive approach to addressing hybrid threats. These advances in human topography mapping, along with the continued development of quantum computing, could transform how policymakers navigate the complexities of gray zone conflicts, where the lines between peace and war are intentionally blurred.

Future Applications

While many of the potential uses of quantum computing in irregular warfare are near-term viability, some speculative ideas push the boundaries of current technology. These unconventional concepts offer glimpses into how quantum computing could radically alter future conflicts, introducing capabilities currently unattainable but potentially becoming a reality as technology advances.

  • Quantum autonomous systems

One of the most intriguing yet fascinating applications of quantum computing in irregular warfare is the development of quantum-driven artificial intelligence (AI)-controlled autonomous systems. Unlike current AI models that rely on the limitations of classical computing, quantum AI can process and adapt to massive amounts of battlefield data in real time. This will enable autonomous drones or ground systems to operate with unprecedented agility, making decisions faster and more accurately in highly dynamic and unpredictable operational environments. These systems can evolve and learn in ways that current machine learning models cannot match, leading to a new generation of adaptive warfare technologies. Such quantum-driven autonomous systems could alter the balance of power in conflict zones, creating advantages where rapid adaptability is crucial. Furthermore, these systems can operate across decentralized networks, coordinating seamlessly without continuous human intervention, further enhancing their effectiveness in conflict scenarios.

  • Quantum-supported surveillance evasion

A more speculative yet equally transformative application may involve quantum entanglement to develop untraceable communication networks. Quantum-supported surveillance evasion would leverage the principles of quantum mechanics to create detection systems that can evade traditional surveillance methods. By using entangled particles, information can be transmitted in such a way that any attempt to intercept or observe the communication alters its state, effectively rendering the transmission undetectable. This would provide a game-changing stealth capability, enabling agents or military assets to communicate and maneuver without fear of detection. This would have profound potential implications for covert operations, intelligence gathering, and reconnaissance missions. If fully realized, this technology would render traditional surveillance methods obsolete, requiring adversaries to develop entirely new methods to counter these stealthy quantum systems.

  • Strategic deception at the quantum levelQuantum mechanics elevates the concepts of false alarms and deception to a whole new level. It allows for the creation of false alarms or decoy signals that appear legitimate before being observed—a phenomenon deeply rooted in quantum mechanics itself. This will revolutionize deception operations. By exploiting the unique property of quantum superposition, quantum-based deception can simultaneously present multiple layers of false information, making it nearly impossible for the adversary to distinguish between real and fabricated data. Quantum-level strategic deception will provide a tactical advantage, forcing the adversary to waste resources and time on misleading targets. Furthermore, quantum-based deception can be used to manipulate decision-making processes, creating confusion or hesitation within enemy ranks. In an era where perception is often as important as reality, quantum mechanics can provide a powerful tool to shape the information environment in unpredictable and deceptive ways.

Quantum Limitations and Challenges

While quantum computing holds great promise, several major technical challenges must be addressed to fully realize its potential, particularly in military applications. The most significant of these is scalability. Current quantum computers remain experimental, with most systems capable of handling only a limited number of qubits. This limitation restricts their ability to handle the large-scale computations required for complex defense scenarios. Furthermore, quantum systems are highly sensitive to environmental factors such as temperature and electromagnetic interference, which can cause qubits to lose their quantum states during decoherence. This instability severely impacts the reliability of quantum computers, posing a significant obstacle to their widespread adoption.

Error correction is another key challenge. While error correction techniques in classical computing are quite mature, the situation is different for quantum systems. Due to the inherent fragility of qubits, quantum systems require much more complex methods. However, significant progress is being made in this area, and researchers are developing new quantum error correction techniques to mitigate these challenges. Although these advances show promise, creating scalable, stable quantum systems capable of real-time error correction remains crucial for deploying quantum systems in future warfare environments.

Beyond the technological challenges, the application of quantum computing in warfare raises significant strategic questions, particularly the potential for a quantum arms race. As nations strive to develop advanced quantum capabilities, the rapid pace of technological innovation risks escalating into a competition for quantum dominance. This competition could lead to instability, as nations prioritize offensive quantum technologies such as encryption breaking systems and autonomous combat capabilities, while others rush to build defensive systems to counter these emerging threats. The ability to decrypt secure communications, manipulate information on an unprecedented scale, or deploy autonomous quantum systems could disrupt the balance of power, putting pressure on nations to outpace each other technologically. Furthermore, quantum technologies could be misused for disinformation campaigns, elusive surveillance, or sabotage of critical infrastructure, further complicating the global security landscape. As quantum computing continues to advance, establishing an international framework to regulate its use in conflict is crucial to mitigating the risks posed by the unchecked development of quantum technologies.

in conclusion

As quantum computing continues its transition from theoretical exploration to practical applications, a comprehensive understanding of its potential and risks is crucial to shaping the future of irregular warfare. Integrating quantum technology into conflict scenarios will not only redefine strategic capabilities but also necessitate the establishment of robust international norms, regulatory frameworks, and multilateral agreements. These structures are essential to ensuring that the rapid development of quantum computing does not trigger an out-of-control arms race, exacerbate global tensions, or undermine geopolitical stability. While the full impact of quantum computing on irregular warfare remains to be seen, its disruptive potential is undeniable. As nations grapple with the opportunities and challenges presented by this revolutionary technology, quantum computing is poised to become a central element in the ongoing evolution of conflict dynamics in the 21st century.

Reference source: irregular warfare center

Reprinted from: Zhuanzhi Intelligent Defense

現代國語:

以下文章來自專知智能國防 ,作者專知國防

量子運算代表著運算技術的典範轉移,有望徹底改變包括國家安全和國防在內的各行各業。儘管量子運算的能力在很大程度上仍停留在理論層面,但它正在取得重大進展。谷歌和 IBM 等公司的實驗已經展示了量子優越性的早期實例,即量子電腦在特定任務中的表現優於經典系統。這些突破表明,量子計算不僅即將到來,而且被認為是一種不可避免的進步,而利益相關者現在就應該做好準備。

與依靠二進位位元(1 和 0)以線性或對稱方式處理資訊的經典電腦不同,量子電腦利用的是量子位元或 “量子位元”,它們可以同時以多種狀態存在。這可能是一個很難理解的概念,但這種能力使量子電腦能夠以前所未有的速度進行複雜計算,解決目前即使是最強大的超級電腦也無法解決的問題。隨著非正規戰爭和灰色地帶衝突越來越依賴先進技術,量子運算在這些領域的應用有可能帶來新的威脅,同時也有可能帶來新的戰略優勢。量子運算可能從根本上改變 21 世紀管理和解決衝突的方式。

了解量子計算
經典計算是當今數位基礎設施的支柱,它在二進位系統上運行,數據的 “比特 ”以 “0 ”或 “1 ”表示。這些比特按順序處理,經典計算機按部就班地執行任務。這種方法雖然功能強大,但在面對需要大量運算資源的複雜問題時,卻面臨很大的限制。然而,量子運算利用量子力學原理,透過一種稱為疊加的現象,允許量子位元(也稱為 “量子位元”)同時存在於多種狀態中。從本質上講,經典位元必須在 0 或 1 之間做出選擇,而量子位元則可以同時代表這兩種狀態。糾纏是量子的另一個特性,它使量子位元相互連接,使一個量子位元的狀態直接影響另一個量子位元的狀態,而不受距離的影響。

要更理解量子計算的威力,直觀地了解它與經典計算相比是如何解決問題的,會很有幫助。播客 「Ask A Spaceman 」使用了一個非常貼近生活的比喻來說明這一點。想像一下,你有一項複雜的任務,需要在大量的可能性中進行搜索,就像在一座巨大的豪宅中尋找一隻藏在某處的小老鼠。有什麼辦法比用一隻貓在大宅裡找到老鼠更好呢?在這種情況下,經典計算機就像一隻貓,有條不紊地一個房間一個房間地搜索。貓一次只能待在一個房間裡,它必須按順序探索每個房間,直到找到老鼠為止。如果豪宅面積很大,這個過程就會非常耗時。現在把量子電腦想像成一隻具有獨特能力的貓:它可以同時出現在大宅的每個房間裡。可以說是一隻 “q 貓”。這隻 「q 貓 」不需要一個房間一個房間地搜索,而是可以同時檢查大宅中每一個可能的位置。老鼠的位置幾乎可以瞬間找到,而不需要有條不紊地探索每個房間。這個比喻抓住了量子計算的精髓:同時執行多項計算的能力。利用疊加和糾纏原理,量子電腦解決問題的速度是經典電腦的數倍。

量子計算對非正規戰爭的影響
隨著量子計算開始從理論研究進入實際應用,它有​​可能極大地改變非正規戰爭和灰色地帶衝突的模式。例如,擁有量子增強解密能力的敵對國家可以攔截和解密軍事通信,使安全行動變得脆弱,並揭露關鍵情報。同樣,量子化數據處理可以讓對手即時分析大量截獲的數據,發現行動模式或漏洞。隨著量子運算的不斷發展,快速處理和分析大量資料的能力可能會改變力量平衡,為衝突引入以前無法想像的全新方法。量子運算的前景不僅在於加強現有策略,還在於有可能創造新的交戰方法,迫使國家和非國家行為者重新考慮他們的行動方式。了解量子運算在非正規戰爭中的可能應用,對於預測未來威脅和製定有效對策至關重要,尤其是在對手試圖利用這些技術為自己謀取戰略利益的時候。

量子計算在非正規戰爭中的可行應用
下文探討了量子運算在非正規戰爭中的一些最可行的應用,重點介紹了這項新興技術如何在日益複雜和不可預測的衝突環境中增強戰略能力並提供競爭優勢。

增強密碼能力

量子運算最受期待的應用之一是其破解傳統密碼系統的能力。經典加密方法是確保通訊和情報安全的基礎,它依賴大素數因式分解的計算難度,而像肖爾這樣的量子演算法可以輕鬆破解這種方法。這將產生深遠的影響,因為國家和非國家行為者有可能攔截和解密敏感的通信,從而在多個層面上破壞行動。這種新出現的威脅引發了一場全球性的 “後量子密碼學 ”競賽,旨在開發能夠抵禦量子攻擊的加密方法。這種進攻性量子解密能力與防禦性抗量子加密技術之間的軍備競賽預計將成為未來衝突格局的決定性面向。隨著美國和我們的對手開發出越來越複雜的工具,國家安全、間諜活動和關鍵基礎設施保護的利害關係比以往任何時候都要大。

優化行動和決策

量子運算在優化複雜行動的潛力與非正規戰爭的後勤和決策需求特別相關。量子演算法能夠同時處理龐大的資料集,因此可以簡化後勤、資源分配和策略規劃。二戰期間雷達的出現徹底改變了軍事行動,它提供了關於敵機動向的近乎即時的情報,從根本上改變了戰鬥的方式和勝負。同樣,量子計算也可以透過實現預測性衝突管理,對地緣政治、經濟和社會變數進行同步分析,預測潛在的衝突地區或爆發點,從而徹底改變現代衝突。國際安全與發展期刊》(International Journal of Security and Development)在《穩定》(Stability:國際安全與發展期刊》(International Journal of Security and Development)上發表的一項研究證明了機器學習在衝突預測中的可行性和附加價值,該研究主要使用經典計算方法。突管理。

模擬和建模 模擬和建模複雜戰場環境的能力是量子運算有望產生重大影響的另一個關鍵領域。傳統的模擬方法往往難以捕捉到採用分散和多變戰術的衝突所固有的不可預測性。量子增強的戰爭博弈可以徹底改變這個過程,使軍事戰略家能夠並行運行無數潛在的場景,不僅探索已知的戰略,而且探索新的、不可預見的結果。這些模擬將為了解對手行為、作戰風險和戰術機會提供前所未有的洞察力,從而製定更有效的戰略計劃。除戰場戰術外,量子運算還能模擬高度互聯的網路實體系統,如電網、交通網路和通訊基礎設施,這有助於識別網路攻擊或破壞等非常規威脅造成的漏洞並預測連鎖故障。這種即時測試關鍵基礎設施復原力的能力將為決策者提供可操作的見解,以降低風險並加強防禦措施,確保即使在混合或灰色地帶壓力下也能保持行動穩定。

影響力行動與資訊戰

量子運算無與倫比的資料處理能力可以大大增強影響行動和資訊戰,而影響行動和資訊戰是現代非正規戰爭和灰色地帶衝突的核心。量子運算可以分析大量社群媒體和資訊網路數據,識別可能表明對手試圖左右公眾輿論或傳播虛假訊息的模式、趨勢和異常現象。除了辨識這些活動,量子增強的假訊息反制措施還能更進一步。透過模擬假訊息在網路中的傳播方式,量子電腦可以即時大規模地產生反擊敘事,在對手的影響行動獲得牽引力之前就將其瓦解。這將標誌著在抵禦認知戰戰術和資訊操縱方面取得了重大進展。

應對混合威脅

混合威脅往往融合了常規戰爭、網路攻擊、錯誤訊息和非正規戰術,由於其多面性,應對起來尤其具有挑戰性。量子運算可以透過量子增強的人體地形圖繪製提供強大的解決方案–這種能力有別於戰場模擬。與主要關注作戰和戰術場景的模擬不同,人類地形測繪以衝突發生時的社會政治和經濟環境為中心。這種推測性但可行的應用可以快速分析大量資料集,如人口情緒、資源分佈和政治不穩定性,以確定顯示社會動盪、叛亂活動或跨地區新興衝突的模式和趨勢。

例如,量子增強系統可以整合來自社群媒體、經濟報告和歷史衝突模式的數據,繪製緊張局勢加劇地區的地圖,並預測混合威脅最有可能在哪些地方發生。透過提供對人類環境的細緻入微的了解,軍事和情報組織可以製定量身定制的策略,在風險升級之前將其降低。這種能力將補充戰場模擬,解決驅動衝突的更廣泛的背景因素,為應對混合威脅提供更全面的方法。隨著量子運算的不斷發展,人類地形測繪的這些進步可能會改變決策者駕馭灰色地帶衝突複雜性的方式,因為在灰色地帶衝突中,和平與戰爭的界限被有意地模糊了。

未來應用
雖然量子計算在非正規戰爭中的許多潛在用途都具有近期可行性,但也有一些推測性想法突破了當前技術的界限。這些突破常規的概念讓我們得以一窺量子運算如何徹底改變未來的衝突,引入目前無法企及的能力,但隨著技術的發展,這些能力可能很快就會成為現實。

量子自主系統

量子運算在非正規戰爭中的一個最令人猜測但最引人入勝的應用是開發由量子驅動的人工智慧(AI)控制自主系統。與目前依賴經典運算限制的人工智慧模型不同,量子人工智慧可以即時快速處理和適應大量戰場數據。這將使自主無人機或地面系統以前所未有的敏捷性運行,在高度動態和不可預測的作戰環境中更快更準確地做出決策。這些系統可以以當前機器學習模型無法比擬的方式進化和學習,從而產生新一代自適應戰爭技術。這種量子驅動的自主系統可以改變衝突地區的力量平衡,在快速適應性至關重要的情況下創造優勢。此外,這些系統還可以在分散的網路中運行,無需人類持續幹預即可無縫協調,進一步提高其在衝突場景中的有效性。

量子支援的監控規避

一種更具猜測性但同樣具有變革性的應用可能涉及量子糾纏,以開發不可追蹤的通訊網路。量子支援的監控規避將利用量子力學原理來創建可​​規避傳統監控方法的探測系統。透過使用糾纏粒子,訊息可以這樣的方式傳輸,即任何試圖攔截或觀察通訊的嘗試都會改變其狀態,從而有效地使傳輸變得無法檢測。這將提供一種改變遊戲規則的隱形能力,使特工或軍事資產能夠在不擔心被發現的情況下進行通訊和機動。這將對秘密行動、情報收集和偵察任務產生深遠的潛在影響。如果完全實現,這項技術將使傳統的監視手段變得過時,這就要求對手開發全新的方法來對抗這些隱身的量子化系統。

量子層面的戰略欺騙

量子力學將誤報和欺騙的概念提升到了一個全新的高度,可以利用量子力學製造誤報或誘餌訊號,這些訊號在被觀察到之前看起來是合法的,這種現象深深植根於量子力學本身。這將徹底改變欺騙行動。透過利用量子疊加的特殊性質,基於量子的欺騙行動可以同時呈現多層次的虛假訊息,使對手幾乎無法區分真實數據和偽造數據。量子層面的戰略欺騙將提供戰術優勢,迫使對手將資源和時間浪費在誤導目標上。此外,基於量子的欺騙還可用於操縱決策過程,在敵方隊伍中製造混亂或猶豫。在這個感知往往與現實同等重要的時代,量子力學可以提供一個強大的工具,以不可預測和迷惑性的方式塑造資訊環境。
量子限制與挑戰
雖然量子運算前景廣闊,但要充分發揮其潛力,特別是在軍事應用方面,還必須解決幾個重大的技術挑戰。其中最主要的是可擴展性。目前的量子電腦仍處於實驗階段,大多數系統只能處理有限數量的量子位元。這種限制限制了它們處理複雜防禦場景所需的大規模計算的能力。此外,量子系統對溫度和電磁幹擾等環境因素高度敏感,會導致量子位元在退相干過程中失去量子態。這種不穩定性嚴重影響了量子電腦的可靠性,對其廣泛應用構成了巨大障礙。

糾錯是另一個關鍵挑戰。經典計算的糾錯技術已經非常成熟,而量子系統則不同,由於量子位元本身的脆弱性,量子系統需要更複雜的方法。不過,這一領域正在取得顯著進展,研究人員正在開發新的量子糾錯技術,以減輕這些挑戰。雖然這些進展顯示了前景,但創建可擴展、穩定且能即時糾錯的量子系統對於未來在戰爭環境中部署量子系統仍然至關重要。

除了技術挑戰,量子運算在戰爭中的應用也引發了重要的戰略問題,特別是量子軍備競賽的可能性。隨著各國努力發展先進的量子能力,技術創新的快速步伐有可能升級為量子主導地位的競爭,這種風險越來越大。這種競爭可能會導致不穩定,因為各國會優先發展進攻性量子技術,如加密破解系統和自主作戰能力,而其他國家則急於建立防禦系統,以應對這些新興威脅。解密安全通訊、以前

中國原創軍事資源:https://www.c2.org.cn/h-nd-1667.html

Military Intelligence Drives Accelerated Development of Chinese Army Cyberspace Operations

軍事情報推動中國軍隊網路空間作戰加速發展

現代英語:

The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.

Military intelligence leads to accelerated development of cyberspace operations

■Respect the soldiers Zhou Dewang and Huang Anwei

Three major technologies support the intelligence of cyberspace weapons

Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:

First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.

Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.

Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.

The intelligent trend of network-controlled weapons has become increasingly prominent

Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.

In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.

Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.

Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.

Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.

Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.

Intelligent command information system changes traditional combat command methods

Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.

In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.

In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.

To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.

In the future battlefield, fighting courage requires more fighting “wisdom”

■Yang Jian and Zhao Lu

At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.

Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.

It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.

In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.

現代國語:

資料來源:中國軍網綜合作者:敬兵 周德旺 皇安偉 等責任編輯:胡雪珂

黨的十九大報告指出,要「加速軍事智慧化發展,提升基於網路資訊體系的聯合作戰能力、全域作戰能力」。今天的《解放軍報》刊發文章指出,軍事智能化是機械化、資訊化之後軍事領域發展的新趨勢和新方向,我們要在現有機械化和資訊化基礎上發展智能化,同時用智能化牽引機械化和信息化向更高水平、更高層次發展。網路空間作為新型作戰領域,是科技含量高、最具創新活力的新領域,在軍事智慧化的牽引下,正迎來快速發展的機會期。

軍事智慧化牽引網路空間作戰加速發展

■敬兵 週德旺 皇安偉

三大技術支撐網路空間武器智慧化

智能是一種智慧和能力,是一切有生命週期的系統對規律的感應、認知與運用,智能化就是把這種智慧和能力固化下來,成為一種狀態。網路空間武器是網路空間遂行作戰任務的武器,其形態以軟體和程式碼為主,本質上是一段資料。網路空間武器的智慧化主要體現在以下三個方面:

一是智慧化漏洞挖掘。漏洞是網路武器設計的基礎,今年5月在全球傳播的勒索病毒軟體,就是利用了微軟作業系統漏洞,為網路安全界帶來了巨大震動。漏洞價格昂貴,零日漏洞價值幾萬到幾十萬美元不等。過去漏洞的發現,主要依靠有經驗的駭客,利用軟體工具對程式碼進行檢查和分析。今年中國網路安全大會期間舉辦的國際網路安全技術對抗聯賽總決賽中,參賽人員示範由智慧機器人現場進行漏洞挖掘,然後透過漏洞編寫網路程式碼,形成網路武器,攻破目標系統,奪取旗幟。這項變化,意味著漏洞挖掘進入了智慧化時代。

二是智能化訊號分析和密碼破譯。訊號是網路資料傳輸的載體,密碼是網路資料安全的最後屏障,訊號分析和密碼破解是網路空間作戰的核心技術,突破訊號和密碼是進入網路空間的基本路徑,也是網路武器攻擊的首要目標。智慧化訊號分析將訊號的協定分析、調變辨識、個體辨識等問題,透過大數據、雲端運算、深度學習等技術來解決。密碼破解是計算科學“皇冠上的明珠”,智能化密碼破譯通過對密碼數據樣本的積累,不斷學習、尋找規律,能找到破譯的鑰匙,從而打開網絡數據“保險櫃”的最後一扇門,解決網絡入侵和接入的關鍵環節。

三是智慧化武器平台設計。美軍在2009年提出「網路飛行器」項目,為網路空間作戰提供像戰車、艦艇、飛機這樣的平台,可以實現在網路空間裡自動偵察、載入網路武器、自主協同、自主攻擊,受到威脅時自我銷毀、清除痕跡,具備了一定的智慧化特徵。未來「網路飛行器」載入的武器,不是軟體人員編好的程式碼,而是根據偵察結果直接對發現的漏洞,現場即時進行智慧化網路武器設計,實現「訂購式」開發,從而大大提高網路空間作戰的針對性。

網控武器的智慧化趨勢愈加凸顯

受網路空間控制的武器簡稱網路武器,是透過網路連接,接受網路空間指令,執行跨域任務,在實體空間達成作戰效果的武器。未來的各種作戰武器平台,大多是聯網的武器平台,這樣軍事資訊網本質上就是物聯網,上聯衛星、雷達、無人機等網路實體,從感知到發現、追蹤、定位、打擊都可透過網路空間控制,網控武器的智慧化已在陸海空天電等戰場蓬勃發展。

2015年,敘利亞利用俄羅斯機器人軍團擊潰武裝分子,行動採用了包括6個履帶式機器人、4個輪式機器人、1個自動化火砲群、數架無人機和1套指揮系統。指揮官透過指揮系統調度無人機偵察發現武裝分子,機器人向武裝分子發動衝鋒,同時伴隨火砲和無人機攻擊力量支援,對武裝分子進行了致命打擊。這只是一場小規模的戰鬥,卻開啟了機器人「組團」作戰的先河。

海空戰場網控智慧武器正在大量研發驗證。 2014年,美國海軍使用13艘無人水面艇,示範驗證無人艇集群攔截敵方艦艇,主要透過交換感測器數據,取得了不錯的效果。 2016年再次試驗時,新增了協同任務分配、戰術配合等功能,「蜂群意識」成為其智慧化的顯著特徵。

用於空中作戰的小微型無人機蜂群也正在快速發展。近年來,美國國防部多次試驗「山銻」微型無人機,可一次投放數十架乃至上百架,透過提升其執行偵察任務時的協同能力,在無人機編隊、指揮、控制、智慧化管理等方面都取得了進展。

空天網控武器越來越「聰明」。空天領域主要包含偵察和打擊兩類網控武器,各種功能的衛星主要執行偵察任務,是典型的偵察感測器。隨著各種小微衛星群的出現,使衛星表現出新的特徵:體積小、發射快、數量多、更聰明。小微衛星群在執行偵察和通訊任務時,有了更大的彈性和可靠性,目前世界衛星強國都在積極制定覆蓋範圍更廣的小微衛星群計畫。

各種高超音速打擊武器在空天巡航,彷彿懸在人們頭頂的利劍。美國空軍研究室稱「高速打擊武器」將在2018年前後啟動飛行試驗,其它各國也正積極研發類似武器。這類武器最大的特色是速度快、航程遠、智能化程度高。

智慧化指揮資訊系統改變傳統作戰指揮方式

網路空間武器和受網路空間控制的武器,是智慧化戰爭的“拳頭”,而指揮這些武器運用的指揮資訊系統是智慧化戰爭的“大腦”,網路空間作戰指揮資訊系統要同步跟上智慧化的進程。目前,幾乎全球的指揮資訊系統都面臨著「智慧滯後」的難題,未來戰爭需要快速決策、自主決策,這對智慧輔助系統提出了更高要求。

2007年,美國國防部高級研究計劃局啟動關於指揮控制系統的研發計劃——“深綠色計劃”,以期能實現計算機輔助指揮官快速決策贏得制勝先機。這是一個戰役戰術級的指揮資訊系統,其研發目的是將該系統嵌入美國陸軍旅級C4ISR戰時指揮資訊系統中去,實現指揮官的智慧化指揮。直到今天,美軍也沒有放鬆對智慧化指揮資訊系統的發展。

在網路空間作戰中,網路目標表現為一個接取網路的IP位址,數量眾多導致人工難以有效率操作,作戰更需要智慧化指揮資訊系統的輔助支撐。目前,智慧化指揮資訊系統需要實現智慧情報分析、智慧感知、智慧導航定位、智慧輔助決策、智慧協同、智慧評估、智慧化無人作戰等功能,尤其是實現對無人網控系統的集群作戰操控,這都對智慧化指揮資訊系統提出了迫切需求,需要加快相應關鍵技術的研發和運用。

綜上所述,智慧化的網路武器和網路控制武器,透過智慧化的資訊系統調度,將形成巨大的作戰能力,基本能遂行現行作戰樣式中的所有行動。未來戰爭,從指揮力量編組、到目標選擇、行動方式、戰法運用等,都將在智能化的背景下展開,戰爭「遊戲化」的特徵將更顯著,作戰指揮方式也將發生重大變化。

未來戰場 鬥勇更需鬥“智”

■楊建 趙璐

目前,人工智慧發展進入嶄新階段,並開始向各個領域加速滲透。受此一進程的影響,各國圍繞智慧化的軍事競爭已揭開序幕。我軍歷來是一支英勇頑強、敢打必勝的人民軍隊,未來戰場上應繼續發揚光榮傳統,同時要更加廣泛地掌握和利用最新的科技成果,研製出更多智能化的武器裝備,在未來戰場上掌握制勝先機。

智慧化是人類社會發展的趨勢,智慧化戰爭正加速到來。正是由於超越原有體系結構計算模型的成功創新、奈米製造技術的逐步普及,以及對人腦機制研究的突破性進展,軍事智慧化發展才擁有了堅實的基礎。因此,智慧化武器裝備的表現日益突出,並在情報分析、戰鬥反應等方面開始超越並取代人類。此外,在人力需求、綜合保障、運作成本等方面,智慧化武器裝備也具有明顯的優勢,日益成為戰爭的主導力量。

事實證明,智慧化武器裝備的發展應用,拓展了軍事行動的能力範圍,大幅提升了部隊的作戰效能。在阿富汗和伊拉克戰場上,無人機已承擔了大部分偵察、情報、監視等作戰保障任務,並承擔了約三分之一的空中打擊任務。近兩年,俄羅斯在敘利亞戰場上也曾多次使用較高智慧化程度的無人偵察機、戰鬥機器人等裝備。智慧化武器裝備正愈來愈地展現出超越傳統武器的重要價值。

未來戰爭中,作戰體系智能化的較量將是高手過招、巔峰對決的勝利關鍵。隨著以科技為支撐的軍事手段發展的不平衡性越來越大,誰先具備實施智能化作戰的能力,誰就更能掌握戰場的主動權,擁有技術代差優勢的強者會盡可能將戰爭成本降到最低,而弱者必然遭受巨大損失,付出慘重代價。我們不僅要加緊核心技術創新、武器裝備研製,還要研究探索適應軍事智能化發展的組織結構、指揮方式和運用模式,更要培養一支能夠擔起推進軍事智能化發展、鍛造智能化作戰能力的人才隊伍,充分發揮我軍作戰體系的整體效能,在與對手的較量中,以更加“智慧”的方式贏得戰爭。

中國原創軍事資源:http://www.81.cn/jwzl/2017-11/24/content_7841895888.htm