Category Archives: Cognitive Confrontation

[Chinese National Defense] Establishing Correct Awareness to Contain China and Conduct Cognitive Warfare Operations

[中國國防]建立正確的意識,以遏制中國並進行認知戰爭行動

現代英語:

As the world continued to actively combat the COVID-19 pandemic, the British newspaper The Guardian reported in late May 2021 that Fazze, a public relations and marketing agency with close ties to Russian officials, was accused of providing funding to influential YouTubers, bloggers, and other opinion leaders in France, Germany, and other European countries to spread false information claiming that vaccines like Pfizer (BNT) and AstraZeneca (AZ) had caused hundreds of deaths. The false information also criticized the EU vaccine procurement system for harming public health in European countries, with the goal of sowing public distrust of Western vaccines and shifting public acceptance toward Russia’s Sputnik V vaccine. This is the most significant example of “perception warfare” in recent international history.

 In fact, human society has always adhered to the principle of “conquering the enemy without fighting” as the guiding principle for optimal military operations. While traditional warfare still primarily takes place in physical space, victory requires the physical capture of cities and territories, as well as the destruction of enemy forces. However, as humanity’s understanding of the nature of war deepens, the use of information technology has become a new trend in warfare, enabling the achievement of traditional combat effectiveness without the need for physical engagement. Given the increasing attention paid to “information warfare” and “hybrid warfare,” this article discusses the closely related concept of “cognitive warfare,” exploring the emerging threats facing our country and our national defense response strategy.

 Whether it’s what the US calls “hybrid warfare” or what Russia calls “information warfare,” the implications are quite similar: centered on the cognitive realm, the use of information to influence and manipulate targets, encompassing both peacetime public opinion and wartime decision-making. The rise of Nazi Germany after World War I was arguably the first modern regime to master the use of information to shape perceptions within its own country and even abroad. Its successful use of propaganda and lies, delivered through various communication technologies, was highly successful. Principles such as “repetition is power” and “negative information is more easily accepted and remembered than positive information” would later profoundly influence authoritarian governments, including Russia.

 Using information capabilities to subvert national regimes

 At the beginning of the 21st century, Russia began to pay attention to the situation where international discourse power was completely controlled by Western countries. It successively put forward theories such as “Information Warfare Theory” and “Sixth Generation Warfare Theory”, arguing that the sixth generation of warfare is a non-contact war that uses precision weapons and information warfare to traverse the battlefield. The purpose of war is no longer a devastating global war, but to achieve effects that cannot be achieved through traditional warfare by exploiting the enemy’s information capabilities to exploit its weaknesses, including changing social and cultural orientations and values, and thus subverting national regimes.

 In 2005, Russia established the international news channel “Russia Today.” Initially focused on soft power propaganda, it shifted its focus after the 2008 Georgian War to attacking negative aspects of Western society and fostering conspiracy theories. The 2014 Ukraine crisis became a training ground for Russian information warfare forces. Using electronic jamming and cyber theft, they intercepted Ukrainian communications, inferring subsequent Ukrainian actions and releasing damaging information at critical moments. They also targeted sensitive issues in eastern Ukraine, including the status of ethnic Russians and economic downturn, distributing a large amount of carefully selected, targeted information to resonate with the public, influencing their perceptions and behavior and gaining control of media opinion. In terms of “cognitive warfare,” Russia’s approach has been successful, and has become a model for the Chinese Communist Party.

 Manipulating “brain control” to control the public

 In 2014, the Chinese Communist Party (CCP) proposed the cognitive operational concept of “brain control,” building on its past “three warfares” of psychological warfare, legal warfare, and public opinion warfare, as well as Russia’s theoretical framework of “information warfare.” It states that a nation’s cognitive space is composed of the superposition of countless individuals, and that “brain control” uses national languages, propaganda media, and cultural products as weapons to comprehensively infiltrate and control the cognition, emotions, and consciousness of the general public and national elites, ultimately distorting, disintegrating, and reshaping their national spirit, values, ideology, history, and culture, thereby achieving the strategic goal of winning without fighting.

 Therefore, the CCP’s “cognitive operations” fall under the broad category of psychological warfare. In the era of information globalization, it integrates information warfare, psychological warfare, and public opinion warfare, becoming the core of the CCP’s overall strategy. Since the 2016 military reform, it has been led by the newly formed “Strategic Support Force” and implemented at all political and military levels. On the one hand, the PLA has adopted American operational thinking in the field of “cognitive operations,” using units such as the 311 Base, the National University of Defense Technology, and the Academy of Military Sciences to develop tactics such as “psychological operations,” “ideological operations,” “consciousness manipulation,” and “strategic communication” to strengthen the “cognitive operations” capabilities jointly constructed by military-civilian integration and joint combat systems. On the other hand, it uses professional personnel to operate media platforms, shape the public opinion environment, and introduce “cognitive operations” into the actual combat application stage.

 The CCP’s recent “cognitive warfare” offensive against Taiwan reveals its methods and tactics. First, the CCP primarily uses the internet to collect personal data from Taiwanese citizens, using big data databases to categorize information by target group, based on political leanings, age, occupation, and other factors. Second, it leverages intelligence gathering to launch targeted cognitive attacks on specific social media platforms, influencing the psychology of the targeted groups, particularly by releasing disinformation to weaken and distract Taiwanese society. Third, it employs online virtual organizations to set up fake social media accounts, infiltrate online communities, and disguise themselves as whistleblowers, deliberately spreading fabricated information to create confusion. Cybertroopers then massively repost and discuss this information, manipulating audience perceptions and creating a cycle of disrupting information retention, manipulating cognitive psychology, and altering thinking patterns.

 Identify fake news and fight back together

 At this stage, the CCP’s campaign for “brain control” over Taiwan aims to influence Taiwanese society’s cognition, distorting public opinion, devaluing democratic values, intensifying opposition, disrupting political conditions, and undermining public trust in the government. The following preventive measures can be taken within the national defense system:

 1. Strengthening educational functions

 Through national defense education in schools, institutions, and society, we will raise the public’s awareness of the threat posed by the CCP’s “cognitive warfare” and their ability to identify false information, and cultivate the habit of rationality, verification, and calmness.

 2. Follow the constraints

 Although there are currently no internationally accepted legal rules that can clearly define the extent to which cognitive warfare constitutes an act of war, making it even more difficult to hold people accountable, media platforms can still strengthen the review of their own reporting content in accordance with existing regulations, and the public can also refrain from spreading suspicious information and following the trend of tennis melee, so as to facilitate the establishment of information verification measures and mechanisms.

 3. Combining Military and Civilian Strength

 Incorporate information and communication-related institutions and industries into the national defense mobilization mechanism, coordinate in peacetime the review, analysis, and disposal of fake news, strengthen talent training and research cooperation, and enhance the capabilities of professional units of the government and the national army; in wartime, cooperate with the overall national actions and carry out countermeasures.

 Currently, Taiwan already has the National Security Bureau’s National Security Operations Center responsible for responding to controversial information from hostile foreign forces. There’s also the non-profit Taiwan Fact-Checking Center. Facing the challenges of cognitive warfare, we must continue to integrate various sectors, strive for international intelligence exchange and experience sharing, optimize the media environment, collaborate across multiple channels, and instantly identify the authenticity and source of information, jointly building our offensive capacity to respond to cognitive warfare.

 Conclusion

 In reality, all countries around the world face threats related to cognitive warfare and information-based psychological warfare. However, democratic and free societies are by no means vulnerable to cognitive warfare attacks and must instead rely on diverse strategies and methods to protect them. We aim to establish a more comprehensive and substantive framework, build a powerful counterforce, and enhance the quality and discernment of our citizens, thereby gaining immunity from the CCP’s cognitive warfare campaign to seize control of our minds.

(The author is a PhD candidate at the Institute of Strategic Studies, Tamkang University)

現代國語:

在全球持續積極對抗新冠疫情之際,英國《衛報》2021年5月下旬報道,與俄羅斯官員關係密切的公關和營銷機構Fazze被指控向法國、德國和其他歐洲國家頗具影響力的YouTube用戶、博主和其他意見領袖提供資金,用於傳播虛假信息,聲稱輝瑞(BNTAZ)和阿斯特利康(BNTAZ)和阿斯特疫苗已導致數百人死亡。這些假訊息也批評歐盟疫苗採購體系損害了歐洲國家的公共衛生,目的是挑起大眾對西方疫苗的不信任,並促使大眾接受俄羅斯的Sputnik V疫苗。這是近代國際史上最顯著的「感知戰」案例。

事實上,人類社會自古以來,均以「不戰而屈人之兵」作為最佳軍事行動指導原則,儘管傳統戰爭主要仍在物理空間進行,需透過實際攻城掠地、消滅敵有生力量,才能獲得勝利。然隨人類對戰爭本質認知深化,利用資訊科技,於不需實體短兵相接的情況下,卻能達到傳統戰爭效果,已成為新型態戰爭趨勢。鑑於「資訊戰」、「混合戰」日益受重視,謹就與其密切相關的「認知作戰」概念進行論述,並探討我國所面臨的新型威脅及全民國防因應策略。

無論是美國所稱的「混合戰」,或俄國所說的「資訊戰」,其實指涉意涵很相似,即以認知領域為核心,利用訊息影響、操控對象目標涵蓋承平時期輿論及戰時決策的認知功能。一戰後,逐漸興起的納粹德國,可謂當代首個擅長運用資訊形塑本國,甚至外國民眾認知的政權,其透過各種傳播技術的政治宣傳與謊言包裝,相當成功;而所謂「重複是一種力量」、「負面訊息總是比正面訊息,更容易讓人接受和印象深刻」等實踐原則,日後更深刻影響專制極權政府與現在的俄羅斯。

藉資訊能力 顛覆國家政權

俄國於進入21世紀初,開始注意國際話語權遭西方國家完全掌控的情形,陸續提出「資訊戰理論」、「第6代戰爭理論」等論述,主張第6代戰爭是以精確武器及資訊戰,縱橫戰場的非接觸式戰爭,戰爭目的不再是毀滅性的全球大戰,而是藉利用敵方弱點的資訊能力,達成傳統戰爭無法實現的效果,包括改變社會文化取向、價值觀,進而顛覆國家政權等。

2005年,俄國成立國際新聞頻道「Russia Today」,起初主要是軟實力宣傳,2008年「喬治亞戰爭」後,轉為攻擊西方社會負面問題與製造陰謀論;2014年「烏克蘭危機」,成為俄軍資訊戰部隊的練兵場,透過電子干擾、網路竊密等手段,截收烏國對外通聯訊息,依此推判烏方後續舉動,並選擇在關鍵時機,釋放對烏國政府不利消息;另選定烏東地區敏感議題,包括俄裔民族地位、經濟不振等,投放大量經篩選的特定資訊,引發民眾共鳴,從而影響烏東人民認知與行為,取得媒體輿論主動權。就「認知作戰」言,俄國作法是成功的,更成為中共的效法對象。

操弄「制腦權」 控制社會大眾

中共2014年於過去心理戰、法律戰、輿論戰等「三戰」基礎,以及俄國「資訊戰」理論架構上,提出「制腦權」認知操作概念,指國家認知空間係由無數個體疊加而成,「制腦」是以民族語言、宣傳媒體、文化產品為武器,全面滲透、控制社會大眾與國家精英之認知、情感與意識,最終扭曲、瓦解、重塑其民族精神、價值觀念、意識形態、歷史文化等,達致不戰而勝的戰略目標。

是以,中共「認知作戰」屬於廣義心理戰範疇,是資訊全球化時代,融合資訊戰、心理戰及輿論戰的戰法,成為中共整體戰略主軸,並自2016年「軍改」後,由新組建的「戰略支援部隊」操盤,在各政略、軍事層次開展執行。一方面,共軍擷取美國在「認知作戰」領域的操作思維,以311基地、國防科技大學、軍事科學院等單位研提「心理作戰」、「思想作戰」、「意識操縱」、「戰略傳播」等戰法,以加強軍民融合及聯戰體系共同建構的「認知作戰」能力;另一方面,則以專業人員操作媒體平臺,形塑輿論環境,將「認知作戰」導入實戰運用階段。

從近年中共對臺進行的「認知作戰」攻勢,可拆解其途徑與手段。首先,中共主要係以網路蒐集國人個資,透過大數據資料庫,劃分政治傾向、年齡、職業等不同目標族群資訊;其次,配合情報偵蒐,針對個別社群媒體展開認知精準打擊,影響目標群眾心理,尤其釋放假訊息,以削弱、分散臺灣社會注意力;再次,則運用網路虛擬組織設置社群媒體假帳號,打入網路族群,偽裝成揭密者、吹哨者,刻意傳散變造資訊,製造混亂,再由網軍大量轉傳、討論,操弄受眾認知,進入阻斷資訊記憶、操縱認知心理、改變思考模式的運作循環。

識別假訊息 全民齊反制

基於現階段,中共對臺「制腦權」作戰,影響臺灣社會認知的目的,在於扭曲輿論、貶低民主價值、激化對立、擾亂政情、減損民眾對政府信任等,於全民國防體系可採取的防制辦法包括:

一、強化教育功能

分別透過全民國防之學校教育、機關教育、社會教育途徑,提高公眾對中共「認知作戰」威脅的認識,與對假訊息識別能力,養成理性、查證、冷靜習慣。

二、遵循約束規範

儘管目前尚無國際通用的法律規則,可明確定義何種程度的認知作戰已構成戰爭行為,更難以究責;然各媒體平臺仍可按既有規範,對自身報導內容加強審查,民眾也可做到不傳播可疑訊息、不跟風網壇混戰,俾利訊息查證措施與機制建立。

三、結合軍民力量

將資訊與傳播相關機構、產業,納入全民防衛動員機制,平時協調因應假訊息審查、分析、處置,加強人才培訓、研究合作,提升政府、國軍專業單位能力;戰時則配合國家整體作為,執行反制任務。

目前我國已有國安局「國家安全作業中心」執行對境外敵對勢力爭議訊息應處有關工作,民間亦有非營利組織成立的「臺灣事實查核中心」。面對「認知作戰」挑戰,仍應持續整合各界力量,爭取國際情報交流與經驗共享,優化媒體環境,多管道合作,即時辨識訊息真偽與來源,共同建設應處「認知作戰」攻勢能量。

結語

事實上,世界各國都同樣面臨「認知作戰」、「資訊心理戰」等相關威脅,然民主自由的社會環境,絕非易受「認知作戰」攻擊的溫床,更需仰賴多元策略與方式守護。期以更完善周全的實質架構,建構強而有力的反制力量,並提升我國公民素質及識別能力,於中共奪取「制腦權」的認知作戰中,獲得免疫。

(作者為淡江大學戰略研究所博士)

中國原創軍事資源:https://www.ydn.com.tw/news/newsInsidePage?chapterID=1431550

Chinese Military Exercises Focused on Taiwan Conclude Signaling Joint Containment Strategy

中國軍事演習的重點是台灣結束信號的聯合遏制策略

現代英語:

The Chinese Communist Party announced the “Strait Thunder-2025A” exercise on the 2nd. The Ministry of National Defense detected 13 Chinese warships, 10 Coast Guard ships, and 8 ships from the Shandong aircraft carrier formation.

(Central News Agency reporter Wu Shuwei, Taipei, 2nd) The two-day Chinese Communist Party military exercise has concluded. Military scholars analyzed that the Chinese Communist Party’s military exercise is still led by politics, using a 70% political and 30% military approach to put pressure on Taiwan, raising the strategic level of “joint blockade” and enhancing the mission role of the Chinese Coast Guard.

The Eastern Theater Command of the People’s Liberation Army of China announced yesterday that it would organize the army, navy, air force, and rocket force to conduct joint exercises around Taiwan. Today, it said that the army will conduct long-range live-fire exercises in relevant waters of the East China Sea in accordance with the “Strait Thunder-2025A” exercise plan.

Regarding the characteristics of the CCP’s military exercise that are worthy of Taiwan’s attention, Chen Wenjia, a senior consultant at the National Policy Research Institute, told a Central News Agency reporter that the PLA’s exercise mobilized the army, navy, air force and rocket force to conduct joint combat drills to test the PLA’s coordinated combat capabilities and enhance the overall effectiveness of operations against Taiwan. Secondly, it is an operational practice exercise, including precision strikes on key infrastructure, blockades of ports and other practical subjects, and simulates scenarios of actual military operations against Taiwan, showing that the PLA’s combat preparations against Taiwan are becoming increasingly mature.

Chen Wenjia said that the Chinese Coast Guard also participated in the military exercise and carried out law enforcement patrols and other operations. The purpose was to exert pressure on Taiwan through gray zone harassment and increase the effectiveness of the “three warfares” of public opinion warfare, psychological warfare, and legal warfare against Taiwan.

Su Ziyun, director of the Institute of Defense Strategy and Resources at the National Defense Security Research Institute, said that the CCP’s military exercise this time is still 70% political and 30% military. Compared with the past “Joint Sword” military exercises against Taiwan, this time the CCP has raised the status of the coast guard and the implementation of “joint blockade” to a strategic level, and announced today that the exercises will practice verification and identification, warning and expulsion, and interception and detention. It is to think about non-war military actions with strategic thinking, and when necessary, cut off Taiwan’s sea transportation lines through isolation to force Taiwan to surrender.

Regarding the warning that the CCP’s military exercises send to Taiwan, Chen Wenjia said that as the PLA continues to conduct high-intensity military exercises around Taiwan, it shows that the military threat to Taiwan is escalating, and Taiwan needs to strengthen its own defense capabilities to ensure the security of the Taiwan Strait; secondly, the pressure in the gray zone is increasing, especially the participation of the coast guard force, which means that China is exerting more pressure in the gray zone. Taiwan needs to increase its vigilance against this non-traditional security threat and should formulate corresponding strategies as soon as possible.

Su Ziyun stated that the Chinese Communist Party’s military exercises highlight the importance of “air defense being the most urgent of all.” Whether the CCP intends to attack Taiwan’s ports or energy facilities, it will need to resort to air strikes, such as missile attacks. This means Taiwan’s air defense capabilities need to be strengthened. In response to Chinese Communist Party gray zone harassment, the Navy currently relies on destroyers and frigates as its main combat vessels. The Navy should emulate the British Navy’s deployment of surveillance vessels, such as River-class patrol vessels, to counter gray zone harassment and preserve the availability and capacity of its main combat vessels. (Editor: Yang Lanxuan) 1140402

現代國語:

中共2日宣布「海峽雷霆-2025A」演練,國防部偵獲共艦13艘、海警船10艘及山東號航艦編隊8艘。 (中央社製圖)

(中央社記者吳書緯台北2日電)中共兩天軍演落幕,軍事學者分析,中共此次軍演仍以政治掛帥,採7分政治、3分軍事的方式對台施壓,拉高「聯合封控」的戰略位階,提升中國海警的任務角色。

中國人民解放軍東部戰區昨天稱組織陸海空軍與火箭軍等兵力,在台灣週邊展開聯合演訓,今天則是稱陸軍部隊按「海峽雷霆-2025A」演練計畫,在東海相關海域實施遠程火力實彈射擊演練。

針對中共此次軍演值得台灣關注的特點,國策研究院資深顧問陳文甲告訴中央社記者,共軍此次演習動用了陸海空軍與火箭軍進行聯合作戰演練,測試共軍的協同作戰能力,提升對台作戰的整體效能,其次是操作實戰化科目演練,包括對關鍵基礎設施的精確打擊、封鎖港口等實戰化科目,並模擬對台灣進行實際軍事行動的場景,顯示共軍針對台灣的作戰整備日益成熟。

陳文甲表示,中國海警也參與此次軍演,並進行執法巡查等行動,目的在透過灰色地帶襲擾施加對台灣的壓力,增加對台灣進行輿論戰、心理戰、法律戰的「三戰」效果。

國防安全研究院國防戰略與資源研究所長蘇紫雲說,中共此次軍演仍是7分政治、3分軍事,和過去對台「聯合利劍」軍演相比,這次中共將海警與執行「聯合封控」的位階提高至戰略位階,並在今天宣稱演習演練查證識別、警告驅離及攔截扣押等課目,就是以戰略思維來思考非戰爭的軍事行動,在必要的時候透過隔離手段,切斷台灣的海上運輸線,來逼迫台灣投降。

對於中共此次軍演對台灣的警訊,陳文甲表示,隨著共軍持續在台灣週邊進行高強度軍事演習,顯示對台灣的軍事威脅不斷升級,台灣需強化自身防衛能力確保台海安全;其次是灰色地帶壓力增加,尤其是海警力量的參與,意味著中國在灰色地帶施加更多壓力,台灣需提高對此非傳統安全威脅的警覺,應盡速制定相應的策略。

蘇紫雲表示,中共軍演凸顯「萬事莫如防空急」,無論是中共要攻擊台灣港口或能源設施,都需要透過飛彈攻擊等空襲手段,代表台灣的防空能力還需加強,而在應對中共灰色地帶襲擾活動,海軍目前仍是以驅逐艦、巡防艦等主戰艦艇應對,應仿效英國海軍建置河級巡邏艦(River-class patrol vessel)等監視性質的艦艇,來應對共軍灰色地帶襲擾,保存主戰艦艇的妥善率和能量。 (編輯:楊蘭軒)1140402

中國原創軍事資源:https://www.cna.com.tw/news/aipl/202504020405.aspx

China’s Weaponized Communication in International Public Opinion Warfare: Scenarios and Risk Responses

中國在國際公眾輿論戰爭中的武器交流:場景和風險回應

現代英語:

【Abstract】 In the international public opinion war, weaponized communication has penetrated into military, economic, diplomatic and other fields, bringing imagination and practice “everything can be weaponized”. Weaponized communication manipulates public perception through technology, platforms, and policies, reflecting the complex interaction of power distribution and cultural games. Driven by globalization and digitalization, cognitive manipulation, social fragmentation, emotional polarization, digital surveillance, and information colonization have become new means of influencing national stability, which not only exacerbates competition between information-powerful and weak countries, but also provides information-weak countries with the opportunity to achieve reversal through flexible strategies and technological innovation. Under the global asymmetric communication landscape, how to find a point of convergence and balance between technological innovation and ethical responsibility, strategic goals and social balance will be key elements that will influence the future international public opinion landscape.

【Keywords】 Public opinion warfare; weaponized communication; information manipulation; asymmetric communication; information security

If “propaganda is a rational recognition of the modern world” [1], then weaponized communication is a rational application of modern technological means. In the “public opinion war”, each participating subject achieves strategic goals through different communication methods, making them superficially reasonable and concealed. Unlike traditional military conflicts, modern warfare involves not only physical confrontation, but also competition in several fields, including information, economics, psychology, and technology. With the advancement of technology and globalization, the shape of war has changed profoundly, and traditional physical confrontations have gradually shifted to multi-dimensional and multi-field integrated warfare. In this process, weaponized communication, as a modern form of warfare, becomes an invisible means of violence that affects the psychology, emotions and behavior of the opposing enemy or target audience by controlling, guiding and manipulating public opinion, thereby achieving political, military or strategic ends.》 “On War” believes that war is an act of violence that makes the enemy unable to resist and subservient to our will. [ 2] In modern warfare, the realization of this goal not only relies on the confrontation of military forces, but also requires support from non-traditional fields such as information, networks, and psychological warfare. Sixth Generation Warfare heralds a further shift in the shape of warfare, emphasizing the application of emerging technologies such as artificial intelligence, big data, and unmanned systems, as well as comprehensive games in the fields of information, networks, psychology, and cognition. The “frontline” of modern warfare has expanded to include social media, economic sanctions, and cyberattacks, requiring participants to have stronger information control and public opinion guidance capabilities.

At present, the spread of weaponization has penetrated into the military, economic, diplomatic and other fields, bringing with it the apprehension that “everything can be weaponized”. In the sociology of war, communication is seen as an extended tool of power, with information warfare penetrating deeply and accompanying traditional warfare. Weaponized communication is precisely under the framework of information control, by shaping public perceptions and emotions, consolidating or weakening the power of states, regimes or non-state actors. This process not only occurs in wartime, but also affects power relations within and outside the state in non-combatant states. In international political communication, information manipulation has become a key tool in the great power game, as countries try to influence global public opinion and international decision-making by spreading disinformation and launching cyberattacks. Public opinion warfare is not only a means of information dissemination, but also involves the adjustment of power games and diplomatic relations between countries, directly affecting the governance structure and power pattern of the international community. Based on this, this paper will delve into the conceptual evolution of weaponized communication, analyze the social mentality behind it, elaborate on the specific technical means and the risks they entail, and propose multidimensional strategies to deal with them at the national level.

1. From weaponization of communication to weaponization of communication: conceptual evolution and metaphor

Weapons have been symbols and tools of war throughout human history, and war is the most extreme and violent form of conflict in human society. Thus, “weaponized” refers to the use of certain tools for confrontation, manipulation or destruction in warfare, emphasizing the way in which these tools are used.“ Weaponization ”(weaponize) translated as“ makes it possible to use something to attack an individual or group of people”. In 1957, the term “weaponization” was proposed as a military term, and Werner von Braun, leader of the V-2 ballistic missile team, stated that his main work was “weaponizing the military’s ballistic missile technology‘ [3].

“Weaponization ”first appeared in the space field, during the arms race between the United States and the Soviet Union, and the two major powers tried to compete for dominance in outer space.“ Weaponization of space ”refers to the process of using space for the development, deployment or use of military weapons systems, including satellites, anti-satellite weapons and missile defense systems, etc., with the purpose of conducting strategic, tactical or defensive operations. From 1959 to 1962, the United States and the Soviet Union proposed a series of initiatives to ban the use of outer space for military purposes, especially the deployment of weapons of mass destruction in outer space orbit. In 2018, then-U.S. President Trump signed Space Policy Directive-3, launching the construction of the “Space Force” and treating space as an important combat area on the same level as land, air, and ocean. In 2019, the “Joint Statement of the People’s Republic of China and the Russian Federation on Strengthening Contemporary Global Strategic Stability” proposed “prohibiting the placement of any type of weapons in outer space” [4].

In addition to weaponization in the space sector, there is also a trend towards weaponization in the military, economic and diplomatic fields.“ Military weaponization” is the use of resources (such as drones, nuclear weapons, etc.) for military purposes, the deployment of weapons systems, or the development of military capabilities. During the Russo-Ukrainian War in 2022, a report from the Royal United Services Institute showed that Ukraine lost approximately 10,000 drones every month due to the impact of Russian jamming stations. [ 5] “weaponization” also often appears in expressions such as “financial war ”“diplomatic battlefield”. In the economic sphere, weaponization usually refers to the use of shared resources or mechanisms in the global financial system by countries or organizations; diplomatic weaponization is manifested in countries pursuing their own interests and exerting pressure on other countries through economic sanctions, diplomatic isolation, and manipulation of public opinion. Over time, the concept of “weaponization” has gradually expanded into the political, social, cultural and other fields, especially in the information field, and since the 2016 United States presidential election, manipulation of public opinion has become a universal tool in political struggles. David Petraeus, a former director of the CIA in the United States, once said at a National Institute for Strategic Studies conference that the time has come for “the weaponization of everything”.[ 6]

As a metaphor, “weaponization” not only refers to the use of actual physical tools, but also symbolizes the transformation of adversarial and aggressive behavior, emphasizing how the concept of “weapons” permeates daily life, cultural production, and political strategies, showing how social actors use various tools to achieve strategic goals. Nowadays, many areas that should remain neutral, such as the media, law and government agencies, are often described as “weaponized” to criticize their excessive politicization and improper use, highlighting their illegality and negative impact on society. Influence. Through this metaphor, one unconsciously contrasts the current political environment with an idealized and seemingly more moderate past, making one think that the political climate of the past was more rational and civilized, while the present appears too extreme and oppositional.[ 7] Therefore, the essence of “weaponization” is the process of political mediation, which is the use of various means and channels by political forces to influence or control areas that should remain neutral, making them political purposes and tools of political struggle.

In the field of information, the weaponization of communication is a long-standing and strategic means. During World War I and II, propaganda and public opinion warfare were widely used in various countries, and means of communication were used as a psychological tactic. Weaponized communication is the embodiment of the weaponization of communication in the modern information society. It uses algorithms and big data analysis to accurately control the speed and scope of information dissemination, and then controls public opinion and emotions. It reflects the combination of technology, platforms and strategies, making Political forces can more accurately and efficiently control the public perception and public opinion environment. As the ontology of public opinion, information is “weaponized” and used to influence social cognition and group behavior, and the concept of “war” has changed accordingly, no longer just traditional military confrontation, but also includes psychological warfare and cognitive warfare through information dissemination and public opinion manipulation. This shift has led to a range of new terms such as unrestricted warfare, new generation warfare, asymmetric warfare, and irregular warfare. Almost all of these terms are borrowed from “warfare” (warfare) to emphasize diverse conflicts in the information field, and information becomes the core content of “weaponization”.

Although there is some view that the term “war” does not apply to situations where hostilities are not formally declared [8], weaponized communication extends the concept of “war” by weakening the traditional political attributes of war and treating overt or covert forces and forms in various fields in general terms. as an act of communication. It is important to note that in English terms “weaponization” there are two formulations: one is “weaponized noun ”noun“, which means that something has been ”weaponized“ with a weapon function or purpose, and the other is ”weaponization of noun, which refers to the process of converting something into a weapon or having the nature of a weapon. In the academic sphere, Chinese translations differ, although weaponized communication and weaponization of communication are not yet strictly distinguished.“ Weaponized communication ”which focuses more on the means of communication or the message itself“ being weaponized” in order to achieve a certain strategic goal, and “weaponization of communication”, which emphasizes the process of communication itself as a transformation process of weapons. When discussing specific technical means, most academic papers adopt weaponized or weaponizing as a prefix to modify specific means of dissemination.

This article focuses on specific communication strategies in the international public opinion war, focusing on describing the weaponization phenomenon that has occurred, so unified use “weaponized communication” is a method of using communication means, technical tools and information platforms to accurately control information flow, public cognition and emotional response, a strategic communication method to achieve specific military, political or social purposes. Weaponized communication is also not a simple state of war or wartime, but a continuous communication phenomenon. It reflects the interaction and game between various subjects and is the flow of information sharing and meaning space.

2. Application scenarios and implementation strategies of weaponized communication

If at the end of the 1990s, weaponization in the information field was still a “dead topic”, and countries were mainly chasing upgrading competitions for physical weapons such as missiles and drones, then entering the 21st century, cyber wars have truly entered the public eye, and deeply embedded in people’s daily lives, through social media and smart devices, the public will inevitably be involved in the war of public opinion and unconsciously become participants or communication nodes. With the spread of technology, weaponized means gradually expanded from state-led instruments of war to socialized and politicized areas, and control over individuals and society shifted from explicit state apparatus to more covert conceptual manipulation. The exposure of Project Prism (PRISM) has raised strong global concerns about privacy breaches, highlighting the potential for states to use advanced technology for surveillance and control, seen as a new type of weaponization. Since Trump was elected President of the United States in 2016, the large-scale application of information weapons such as social robots has become a common phenomenon in the global political game. Information warfare ——including electronic warfare, computer network warfare, psychological warfare, and military deception—— is widely used to manipulate the flow of information and influence the landscape of public opinion. Not only do these methods work in military wars and political elections, but they also gradually permeate cultural conflicts, social movements and transnational games, perpetuating the traditional logic of information warfare. Nowadays, weaponized communication, as a socio-political tool, profoundly affects the ecology of public opinion, international relations and the daily lives of individuals.

(1) Information manipulation warfare in the military field

Information flow can directly influence the direction of military conflicts, shaping public and military perceptions and decisions, which in turn affects morale, strategic judgment, and social stability. In modern warfare, information is no longer a mere aid, and the field of information has become a central battleground. By manipulating the flow of information, the enemy’s situation assessment may be misled, the will to fight is weakened, and the trust and support of the people are shaken, which in turn affects the decision-making process and continuity of the war.

The Gulf War is regarded as the beginning of modern information warfare. In this war, the United States carried out systematic strikes against Iraq through high-tech means ——including electronic warfare, air strikes, and information operations——. The U.S. military used satellites and AWACS early warning aircraft to monitor the battlefield situation in real time, and induced the Iraqi army to surrender from a psychological level by airdropping leaflets and radio stations to convey to Iraqi soldiers the advantages of the U.S. military and its preferential treatment policy after surrender. The war marked the key place of information control in military conflicts, demonstrating the potential of information warfare in modern warfare. In the 21st century, cyberwarfare has become an important part of information warfare. Cyberwarfare involves not only the dissemination and manipulation of information, but also control over enemy social functions through attacks on critical infrastructure. In 2007, Estonia suffered a large-scale DDoS (Distributed Denial of Service Attack) attack, demonstrating a trend towards the fusion of information manipulation and cyberattacks. In the WannaCry ransomware incident in 2017, attackers used a Windows system vulnerability (EternalBlue) to encrypt the files of approximately 200,000 computers in 150 countries around the world and demanded a ransom, seriously affecting the British National Health Service (NHS) and causing the interruption of emergency services. and hospital system paralysis, further revealing the threat of cyber warfare to critical infrastructure. In addition, in long-term conflicts, infrastructure control is widely used to undermine the strategic capabilities of adversaries to compete for public information space due to its ability to directly determine the speed, scope, and direction of information dissemination. Israel has effectively weakened Palestinian communications capabilities by restricting the use of radio spectrum, controlling Internet bandwidth and disrupting communications facilities. At the same time, Israel also restricts the development of the Palestinian telecommunications market through economic sanctions and legal frameworks, suppresses Palestinian competitiveness in the flow of information, and consolidates its own strategic advantage in the conflict [9] in order to maintain the unequal flow of information.

Social media provides an immediate and extensive channel for information manipulation, allowing it to cross borders and influence global public sentiment and political situations, as well as shifting the focus of war from mere physical destruction to manipulation of public opinion. During the Russo-Ukrainian War, deepfake technology was used as a visual weapon, which significantly interfered with public perception and public opinion about the war. On March 15, 2022, a fake video of Ukrainian President Volodymyr Zelenskyy was circulated on Twitter, in which he “called” Ukrainian soldiers to lay down their weapons, triggering public confusion for a short period of time. Similarly, fake videos of Russian President Vladimir Putin have been used to confuse the public. Although the videos were promptly annotated “Stay informed” by the platform (pending instructions on understanding the situation), they still caused obvious interference to public emotions and perceptions within a short period of time. These events highlight the critical role of social media in modern information warfare, where state and non-state actors can exert interference in military conflicts through disinformation, emotional manipulation, and other means.

The complexity of information manipulation warfare is also reflected in its dual nature ——both a tool for attack and a means of defense. In the military sphere, states ensure national security, protect critical infrastructure, maintain military secrets, and in some cases influence adversary combat effectiveness versus decision-making by defending against and countering cyberattacks. In 2015 and 2017, Russian hackers launched large-scale cyber attacks against Ukraine (such as BlackEnergy and NotPetya). Ukraine successfully resisted some attacks and took countermeasures by quickly upgrading its cyber defense systems, avoiding larger-scale infrastructure paralysis. In addition, units such as the NATO Center of Excellence for Strategic Communications and the British 77th Brigade focus on researching public opinion shaping in peacetime [10], using strategic communications, psychological warfare, and social media monitoring to expand strategic control in the information field and strengthen defense and public opinion shaping capabilities, further increasing the strategic height of information warfare.

Today, information manipulation warfare is a key link in modern military conflicts. Through the high degree of integration of information technology and psychological manipulation, it not only changes the rules of traditional warfare, but also profoundly affects public perception and the global security landscape. By taking control of critical infrastructure and social media platforms, countries, multinational corporations or other actors can gain strategic advantages in the global information ecosystem by restricting the flow of information and manipulating communication paths.

(2) Public opinion intervention in political elections

Political elections are the most direct field of competition for power in democratic politics, and the dissemination of information has an important influence on voter decision-making in the process. By calculating propaganda and other means, external forces or political groups are able to manipulate the sentiments of voters and mislead the public, thereby influencing the results of elections, destabilizing politics or weakening the democratic process, and elections are thus the most effective application scenario for weaponized communication.

In recent years, global political elections have shown a trend towards polarization, with large ideological differences between groups with different political affiliations. Polarization leads the public to selectively accept information that is consistent with their own views, while excluding other information, and this “echo chamber effect” intensifies the public’s one-sided perception of positions, giving greater scope for public opinion intervention. And the rise of information dissemination technology, especially computational propaganda, has enabled external forces to more accurately manipulate public opinion and influence voter decision-making. Computational Propaganda refers to the use of computing technology, algorithms and automated systems to control the flow of information to disseminate political information, interfere with election results and influence public opinion. Its core characteristics are algorithm-driven accuracy and the scale of automated communication. By breaking through The limitations of traditional manual communication have significantly enhanced the effect of public opinion manipulation. In the 2016 U.S. presidential election, the Trump team analyzed Facebook user data through Cambridge Analytica and pushed customized political advertisements to voters, accurately affecting voters’ voting intentions [11]. This incident was seen as a classic case of computational propaganda interfering in elections, and also provided an operational template for other politicians, driving the widespread use of computational propaganda worldwide. In the 2017 French presidential election, candidate Emmanuel Macron’s team was hacked, and internal emails were stolen and made public, claiming that Macron had secret accounts overseas and was involved in tax evasion in an attempt to discredit his image. During the 2018 Brazilian presidential election, the team of candidate Jair Bolsonaro used WhatsApp groups to spread inflammatory political content, targeting and pushing a large number of images, videos and inflammatory messages to influence voter sentiment. According to statistics, from 2017 to 2019, the number of countries using computing for propaganda worldwide increased from 28 to 70, and in 2020 this number rose to 81. This suggests that computational propaganda is redefining the rules of public opinion in global elections through technical means and communication strategies.

Computational propaganda is also an important tool for state actors in the war of public opinion intervention. In 2011, the U.S. Defense Advanced Research Projects Agency (DARPA) launched Operation “Voice of Ernest” in the Middle East to distort conversations on Arabic-language social media by establishing and managing multiple false identities (sockpuppets). Russia also frequently uses computational propaganda to intervene, operating about 200,000 social media accounts in Canada, using far-right and far-left movements to spread pro-Russian rhetoric, create false social hot spots, and try to undermine Canada’s support for Ukraine [12]. As an important part of computing propaganda, social robots create the heat of public opinion through automation and scale, increase the exposure of information on social platforms through specific tags, and control the priority of issues. During the 2016 U.S. election, Russia used social robots to post content supporting Putin and attacking the opposition, covering up the opposition’s voice through information overload, and strengthening the pro-Putin public opinion atmosphere. [ 13] During the 2017 Gulf crisis, Saudi Arabia and Egypt used Twitter bots to create anti-Qatar hashtags#AlJazeeraInsultsKingSalman, which made it a hot topic and fictionalized the peak of anti-Qatar sentiment, which in turn affected global public opinion attitudes towards Qatar. [ 14] Deepfake technology further improves the accuracy and concealment of computing propaganda. In 2024, a fake video of U.S. President Joe Biden went viral on X (formerly Twitter), showing him using offensive language in the Oval Office, sparking controversy in public opinion and influencing voter sentiment. According to a survey by cybersecurity firm McAfee, 63% of respondents had watched a political deepfake video within two months, and nearly half said the content influenced their voting decisions.[ 15]

Globally, computing propaganda has infiltrated public opinion wars in various countries, affecting social stability and national security. The Israel Defense Forces waged a public opinion war against Palestine through digital weapons, Turkey cultivated “a patriotic troll army” to manipulate public opinion at home and abroad, and the Mexican government used botnets to influence public opinion. Computational propaganda is changing the landscape of global political communication as an important means of modern public opinion intervention warfare. With the development of technologies such as artificial intelligence and quantum computing, computing propaganda may also interfere with electoral processes through more covert and efficient means, or even directly threaten the core operating logic of democratic institutions.

(3) Symbolic identity war in the cultural field

Weaponized communication attempts to influence the public’s thoughts, emotions, and behaviors by manipulating information, symbols, and values, which in turn shapes or changes society’s collective cognition and cultural identity. This mode of communication consists not only in the transmission of information, but also in promoting the transmission and identification of a specific ideological or political idea through a specific narrative framework, cultural symbols and emotional resonance. Through the manipulation of cultural symbols, social emotions and collective memory, weaponized communication interferes with social structure and cultural identity in the cultural field, becoming a core means of symbolic identity warfare.

Memes, as a cultural symbol that combines visual elements and concise words, stimulate the emotional response of the audience in a humorous, satirical or provocative way, affecting their political attitudes and behaviors. Pepe the Frog began as a harmless comic book character that was repurposed and weaponized by far-right groups to spread hate speech, gradually evolving into a racist and anti-immigrant symbol. Memes transform complex political sentiments into easy-to-spread visual symbols that quickly stir up public distrust and anger over policy, seen as “weaponized iconoclastic weaponization” (Iconoclastic Weaponization). This process, by manipulating cultural symbols in order to achieve the purpose of political or social struggle [16], aggravates the public’s division of society and politics. For example, during Brexit, memes bearing the words “Take Back Control” Take Back Control spread rapidly, reinforcing nationalist sentiments.

In addition to the manufacture of cultural symbols, the screening and shielding of symbols are equally capable of shaping or deepening a certain cultural identity or political stance. Censorship has been an important means for power to control information since ancient times, and as early as the ancient Greek and Roman periods, governments censored public speeches and literary works to maintain social order and power stability. Entering the digital age, the rise of the Internet and social media has driven the modernization of censorship, and platform censorship has gradually replaced traditional censorship methods as a core tool for contemporary information control and public opinion guidance. Algorithm review detects sensitive topics, keywords, and user behavior data through artificial intelligence, automatically deletes or blocks content deemed “violations”, and the review team of social media manually screens user-generated content to ensure its compliance with platform policies and laws and regulations. The role of platform censorship is not only to limit the dissemination of certain content, but also to guide public opinion and shape the public perception framework through push, deletion and blocking. Although mainstream social platforms control the spread of information through strict content moderation mechanisms, some edge platforms such as Gab, Gettr, Bitchute, and others have become hotbeds of extreme speech and malicious information due to the lack of effective censorship. These platforms do not place sufficient restrictions on content publishing, allowing extreme views and disinformation to spread wantonly. For example, Gab has been repeatedly criticized for its extremist content and is accused of promoting violence and hatred. In the “echo chamber”, users can only access information that is consistent with their own views. This information environment further strengthens extreme ideas and leads to increased antagonism among social groups.[ 17]

Language, as a carrier and tool for information dissemination, can profoundly influence group behavior and cultural identity through emotional manipulation, symbolic politics, and social mobilization. The weaponization of language focuses on how language forms and cultural contexts affect the way information is received, emphasizing how language can be used to manipulate, guide or change people’s cognition and behavior. This involves not only the use of specific lexical and rhetorical devices, but also the construction of specific social meanings and cultural frameworks through linguistic representations. As another important tool of symbolic identity warfare, language shapes the narrative framework “of antagonism between the enemy and the enemy”. The Great Translation Movement spread the nationalist rhetoric of Chinese netizens to international social media platforms through selective translation, triggering negative perceptions of China. This language manipulation amplifies controversial content through emotional expression and deepens the cultural bias of the international community.

The deep logic of the weaponization of language lies in emotional and inflammatory forms of language. Western countries often justify acts of intervention by using the labels of justice such as “human rights” and “democracy”, legitimizing political or military action. White supremacists reshape ideologies using vague labels such as “alt-right”, transforming traditional “white supremacist” with strongly negative connotations into a more neutral concept, reducing the vocabulary’s social resistance, broadening the base of its supporters with a broad “umbrella” identity. Through the infiltration of secular discourse, hate politics and extreme speech are justified, gradually creating a political normality. Language is truly weaponized after the public routineizes this politics.[ 18] In Nigeria, hate-mongering content spreads through racial, religious and regional topics, profoundly deteriorating social relations. [ 19] Linguistic ambiguity and reasonable denial strategies have also become powerful tools for communicators to circumvent their responsibilities and spread complex social and political issues in simplified narratives. Through negative labeling and emotional discourse, Trump’s America First policy deliberately puts forward views that are opposed to mainstream opinions by opposing globalization, questioning climate change science, and criticizing traditional allies, stimulating public distrust of globalization, reshaping the cultural identity of national interests first. [ 20]

III Risks and challenges of weaponized dissemination: legitimacy and destructiveness

Although weaponized communication poses a great risk to the international public opinion landscape, it may be given some legitimacy by certain countries or groups through legal, political or moral frameworks in specific situations. For example, after the “9/11” incident, the United States passed the Patriot Act to expand the surveillance authority of intelligence agencies and implement extensive information control in the name of “anti-terrorism”. This “legitimacy” is often criticized as undermining civil liberties and eroding the core values of democratic society.

In the international political game, weaponized transmission is more often seen as a means of “Gray Zone” (Gray Zone). Confrontations between countries are no longer limited to economic sanctions or diplomatic pressure, but are waged through non-traditional means such as information manipulation and social media intervention. Some States use “the protection of national interests” as a pretext to disseminate false information, arguing that their actions are compliant and, although they may be controversial under international law, are often justified as necessary means “to counter external threats”. In some countries where the regulation of information lacks a strict legal framework, interference in elections is often tolerated or even seen as a “justified” political exercise. At the cultural level, certain countries attempt to shape their own cultural influence on a global scale by disseminating specific cultural symbols and ideologies. Western countries often promote the spread of their values in the name of “cultural sharing” and “communication of civilizations”, but in actual operations, they weaken the identity of other cultures by manipulating cultural symbols and narrative frameworks, leading to global cultural ecology. imbalance. The legal framework also provides support, to a certain extent, for the justification of weaponized dissemination. In the name of “counter-terrorism” and “against extremism”, some countries restrict the dissemination of so-called “harmful information” through information censorship, content filtering and other means. However, this justification often pushes moral boundaries, leading to information blockades and suppression of speech. Information governance on the grounds of “national security”, although internally recognized to a certain extent, provides space for the proliferation of weaponized communications.

Compared to legitimacy, the spread of weaponization is particularly devastating. At present, weaponized communication has become an important tool for power structures to manipulate public opinion. It not only distorts the content of information, but also profoundly affects public perception, social emotions, and international relations through privacy violations, emotional mobilization, and cultural penetration.

(1) Information distortion and cognitive manipulation

Distortion of information means that information is deliberately or unintentionally distorted during dissemination, resulting in significant differences between what the public receives and the original information. On social media, the spread of disinformation and misleading content is rampant, and generated content from artificial intelligence models (such as GPT) may be exacerbated by bias in training data. Gender, race, or social bias may be reflected in automatically generated text, amplifying the risk of information distortion. The fast-spreading nature of social media also makes it difficult for traditional fact-checking mechanisms to keep up with the spread of disinformation. Disinformation often dominates public opinion in a short period of time, and cross-platform dissemination and anonymity complicate clarification and correction. The asymmetries in communication undermine the authority of traditional news organizations, and the public’s preference for trusting instantly updated social platform information over in-depth coverage by traditional news organizations further diminishes the role of news organizations in resisting disinformation.

In addition to the distortion of the information itself, weaponized communication makes profound use of the psychological mechanisms of cognitive dissonance. Cognitive dissonance refers to the psychological discomfort that occurs when an individual is exposed to information that conflicts with their pre-existing beliefs or attitudes. By creating cognitive dissonance, communicators shake the established attitudes of their target audience and even induce them to accept new ideologies. In political elections, targeted dissemination of negative information often forces voters to re-examine their political positions or even change their voting tendencies. Weaponized communication further intensifies the formation of “information cocoon houses” through selective exposure, allowing audiences to tend to access information consistent with their own beliefs, ignoring or rejecting opposing views. This not only reinforces the cognitive biases of individuals, but also allows disinformation to spread rapidly within the group, making it difficult to be broken by external facts and rational voices, and ultimately forming a highly homogeneous ecology of public opinion.

(2) Privacy leakage and digital monitoring

In recent years, the abuse of deepfakes has exacerbated the problem of privacy violations. In 2019, the “ZAO” face-changing software was removed from the shelves due to default user consent to portrait rights, revealing the risk of overcollection of biometric data. Photos uploaded by users that have been processed through deep learning can either generate an accurate face-changing video or become a source of privacy leaks. What’s more, techniques such as deepfakes are abused for gender-based violence, the faces of multiple European and American actresses are illegally planted with fake sex videos and widely distributed, and although the platforms remove this content in some cases, the popularity of open-source programs makes it easy for malicious users to copy and share forged content. In addition, when users use social media, they tend to authorize the platform by default to access their devices’ photos, cameras, microphones and other app permissions. Through these rights, the platform not only collects a large amount of personal data, but also analyzes users’ behavioral characteristics, interest preferences, and social relationships through algorithms, allowing it to accurately deliver ads, recommend content, and even implement information manipulation. This large-scale data acquisition drives global discussion of privacy protections. In Europe, the General Data Protection Regulation attempts to strengthen the protection of individuals’ right to privacy through strict regulations on data collection and use. However, due to “implicit consent” or complex user agreements, platforms often bypass regulations that make the data-processing process less transparent, making it difficult for regular users to understand what the data is actually used for. Section 230 of the U.S. Communications Decency Act provides that online platforms are not legally responsible for user-generated content, a provision that has fueled the development of content moderation on platforms but has also left them with little incentive to respond to privacy infringements. Platforms, motivated by commercial interests, often lag behind in dealing with disinformation and privacy issues, leading to ongoing shelving of audit responsibilities.

In terms of digital surveillance, social platforms work with governments to make user data a core resource “of surveillance capitalism”. The National Security Agency (NSA) implements mass surveillance through phone records, Internet communications, and social media data, and works with large enterprises such as Google and Facebook to obtain users’ online behavioral data for intelligence gathering and behavioral analysis worldwide. The abuse of transnational surveillance technologies is what pushes privacy violations to an international level. Pegasus spyware developed by the Israeli cybersecurity company NSO, which compromises target devices through “zero-click attacks”, can steal private information and communication records in real time. In 2018, in the case of the murder of Saudi journalist Jamal Khashoggi, the Saudi government monitored its communications through Pegasus, revealing the profound threat this technology poses to individual privacy and international politics.

(3) Emotional polarization and social division

Emotions play a key role in influencing individual cognition and decision-making. Weaponized communication influences rational judgment by inciting feelings of fear, anger, sympathy, etc., and pushes the public to react irrationally, driven by emotions. War, violence and nationalism often become the main content of emotional mobilization. Through carefully designed topics, communicators implant elements such as patriotism and religious beliefs into information dissemination, quickly arousing public emotional resonance. The widespread adoption of digital technologies, particularly the combination of artificial intelligence and social media platforms, further amplifies the risk of emotional polarization. The rapid spread of disinformation and extreme speech on the platform comes not only from the sharing behavior of ordinary users, but is also driven by algorithms. Platforms tend to prioritize the push of emotional and highly interactive content, which often contains inflammatory language and extreme views, thus exacerbating the spread of hate speech and extreme views.

Social media hashtags and algorithmic recommendations play a key role in emotional polarization. After the Charlie Hebdo incident, the #StopIslam hashtag became a communication tool for hate speech, with the help of which users posted messages of hatred and violent tendencies. During the 2020 presidential election in the United States, extreme political rhetoric and misinformation on social platforms were also amplified in a bitter partisan struggle. Through precise emotional manipulation, weaponized communication not only tears apart public dialogue, but also greatly affects the democratic process of society. Another particular extremist mobilization tactic is “Weaponized Autism”, where far-right groups use the technical expertise of autistic individuals to implement emotional manipulation. These groups recruit technically competent but socially challenged individuals, transforming them into enforcers of information warfare by giving them a false sense of belonging. These individuals, guided by extremist groups, are used to spread hate speech, carry out cyberattacks and promote extremism. This phenomenon reveals not only the deep-seated mechanisms of emotional manipulation, but also how technology can be exploited by extremist groups to serve the larger political and social agenda.[ 21]

(4) Information colonization and cultural penetration

“Weaponized Interdependence” theory Weaponized Interdependence Theory reveals how states use key nodes in political, economic, and information networks to exert pressure on other states. [ 22] Especially in the field of information, developed countries further consolidate their cultural and political advantages by controlling the implementation of information flows “information colonization”. Digital platforms became the vehicles of this colonial process, the countries of the Global South were highly dependent on Western-dominated technology platforms and social networks for information dissemination, and in sub-Saharan Africa, Facebook has become synonymous with “the Internet”. This dependence not only generates huge advertising revenues for Western businesses, but also has a profound impact on indigenous African cultures and values through algorithmic recommendations, especially in terms of gender, family, and religious beliefs, making cultural penetration the norm.

Digital inequality is another manifestation of information colonization. The dominance of developed countries in digital technology and information resources has increasingly marginalized countries of the South in the economic, educational and cultural fields. Palestine’s inability to effectively integrate into the global digital economy due to inadequate infrastructure and technological blockade both limits local economic development and further weakens its voice in global information dissemination. Through technological blockades and economic sanctions, the world’s major economies and information powers restrict other countries’ access to key technological and innovation resources, which not only hinders the development of science and technology in target countries, but also exacerbates the rupture of the global technology and innovation ecosystem. Since withdrawing from the Iran Nuclear Deal in 2018, U.S. economic sanctions on Iran have blocked its development in the semiconductor and 5G sectors, and the asymmetry between technology and innovation has widened the gap in the global technology ecosystem, putting many countries at a disadvantage in information competition.

IV Reflection and discussion: the battle for the right to speak in the asymmetric communication landscape

In the competitive landscape of “Asymmetric Communication”, strong parties often dominate public opinion through channels such as mainstream media and international news organizations, while weak parties need to use innovative communication technologies and means to make up for their disadvantages and compete for the right to speak. At the heart of this communication landscape lies Information Geopolitics, the idea that the contest of power between states depends not only on geographical location, military power, or economic resources, but also on control over information, data, and technology. The game between the great powers is no longer limited to the control of physical space, but extends to the competition for public opinion space. These “information landscapes” involve the right to speak, information circulation and media influence in the global communication ecosystem. In this process, the country continuously creates landscapes to influence international public opinion and shape the global cognitive framework, thereby achieving its strategic goals. The strategy of asymmetric communication is not only related to the transmission of information content, but more importantly, how to bridge the gap between resources and capabilities with the help of various communication technologies, platforms and means. The core of information communication is no longer limited to the content itself, but revolves around the right to speak. The competition unfolds. With the rise of information warfare and cognitive warfare, whoever has the information will have a head start in global competition.

(1) Technology catching up under the advantage of latecomers

Traditional large countries or strong communicators control the dominance of global public opinion, and by contrast, weak countries often lack communication channels to compete with these large countries. The theory of latecomer advantage advocates that latecomer countries can rapidly rise and circumvent inefficient and outdated links in early technological innovation by leaping forward and bypassing traditional technological paths and introducing existing advanced technologies and knowledge. In the context of weaponized communication, this theory provides information-weak countries with a path to break through the barriers of communication in large countries through emerging technologies, helping them to catch up at the technical level. Traditional media are often constrained by resources, influence and censorship mechanisms, with slow dissemination of information, limited coverage and vulnerability to manipulation by specific countries or groups. The rise of digital media has brought about a fundamental change in the landscape of information dissemination, enabling disadvantaged countries, with the help of globalized Internet platforms, to directly target international audiences without having to rely on traditional news organizations and mainstream media. Through emerging technologies, disadvantaged countries can not only transmit information more precisely, but also rapidly expand their influence in international public opinion through targeted communication and emotional guidance. Later-developing countries can use advanced technologies (such as big data, artificial intelligence, 5G networks, etc.) to achieve precise information dissemination and create efficient communication channels. Taking “big data analysis” as an example, latecomer countries can gain an in-depth understanding of audience needs and public opinion trends, quickly identify the pulse of global public opinion, implement targeted communication, and quickly expand international influence. AI technology not only predicts the direction of public opinion development, but also optimizes communication strategies in real time. The popularization of 5G networks has greatly improved the speed and coverage of information dissemination, allowing latecomer countries to break through the limitations of traditional communication models in a low-cost and efficient manner and form unique communication advantages.

Through transnational cooperation, late-developing countries can integrate more communication resources and expand the breadth and depth of communication. For example, Argentina has established “Latin American News Network” with other Latin American countries to push Latin American countries to speak with a single voice in international public opinion and counter the single narrative of Western media through news content sharing. In Africa, South Africa has partnered with Huawei to promote the “Smart South Africa” project to build a modern information infrastructure and promote digital transformation and efficiency improvements in public services. Governments of late-developing countries should invest more in technological research and development and innovation, and encourage the development of local enterprises and talent. At the same time, attention should be paid to the export of culture and the construction of the media industry, so as to enhance the country’s voice in the international information space through globalized cooperation and decentralized communication models. Governments can fund digital cultural creations, support the growth of local social media platforms, and integrate more communication resources through an international cooperation framework.

(2) Construction of barriers in information countermeasures

Unlike a full-scale conflict that may be triggered by military action, or the risks that economic sanctions may pose, weaponized dissemination is able to achieve strategic objectives without triggering full-scale war, and it is extremely attractive based on cost and strategic considerations. Because weaponized communication is characterized by low cost and high returns, an increasing number of State and non-State actors have chosen to manipulate information in order to reach strategic objectives. The spread of this means of dissemination makes countries face even more complex and variable threats in the face of attacks involving information from outside and inside. With the increasing intensity of information warfare, mere traditional military defense can no longer meet the needs of modern warfare. Instead, building a robust information defense system becomes a key strategy for the country to maintain political stability, safeguard social identity, and enhance international competitiveness. Therefore, how to effectively deal with external interference in information and manipulation of public opinion, as well as counter-information, has become an urgent issue for all countries to address. A complete cybersecurity infrastructure is key to maintaining national security against the manipulation or tampering of sensitive information from outside. Take, for example, the European Union’s push to strengthen cybersecurity in member states through its “Digital Single Market” strategy, which requires internet companies to be more aggressive in dealing with disinformation and external interference. The EU’s cybersecurity directives also provide for member states to establish emergency response mechanisms to protect critical information infrastructure from cyberattacks. In addition, the EU has established cooperation with social platform companies, such as Facebook, Twitter and Google, to combat the spread of fake news by providing anti-disinformation tools and data analysis technologies. Artificial intelligence, big data, and automation technologies are becoming important tools for information defense, used to monitor information propagation paths in real time, identify potential disinformation, and resist public opinion manipulation. In the field of cybersecurity, big data analysis helps decision makers identify and warn against malicious attacks, and optimize countermeasures. The application of these technologies will not only enhance information defence capabilities at the domestic level, but also enhance national initiative and competitiveness in the international information space.

Counter-mechanisms are another important component of the information defence system, especially under pressure from international public opinion, where real-time monitoring of the spread of external information and timely correction of disinformation become key to safeguarding the initiative of public opinion. Since the 2014 Crimean crisis, Ukraine has built a rather large-scale cyber defense system through cooperation with NATO and the United States. Ukraine’s National Cyber Security Service has set up “information countermeasures teams” to counter cyberthreats, using social media and news release platforms to refute false Russian reports in real time, a tactic that has significantly boosted Ukraine’s reputation and trust in international public opinion.

(3) Agenda setting in public opinion guidance

In the global competitive landscape of informatization and digitalization, public opinion guidance involves not only the content of information dissemination, but more importantly, how to set the agenda and focus on hot topics of global concern. The agenda-setting theory suggests that whoever can take control of the topics of information circulation can guide the direction of public opinion. Agenda setting influences public attention and evaluation of events by controlling the scope and focus of discussion of topics, and the rise of social media provides a breakthrough for information-disadvantaged countries to compete for dominance in information dissemination through multi-platform linkage. In the case of Ukraine, for example, during the Russo-Ukrainian War, it disseminated the actual war situation through social media, not only publishing the actual combat situation, but also incorporating the emotional demands of the people, and using the tragic narrative of civilian encounters and urban destruction to inspire sympathy and attention from the international community. While resisting interference from external information, the State also needs to proactively disseminate positive narratives and tell cultural stories that can resonate with the international community. The story should correspond to the emotional needs of international public opinion, while at the same time showing the uniqueness of the country and strengthening the link with the international community. Taking my country’s “One Belt, One Road” co-construction as an example, in the “One Belt, One Road” co-construction country, my country has invested in and constructed a large number of infrastructure projects. These projects not only helped improve local economic basic conditions, but also demonstrated China’s globalization process. Responsibility provides a window for cultural cooperation and exchange activities, showing the rich history and culture of the Chinese nation to the world It has demonstrated the inclusiveness and responsibility of Chinese culture to the international community.

However, because countries of the Global South often face constraints in terms of resources, technology and international communication platforms, and have difficulty in competing directly with developed countries, they rely on more flexible and innovative means of communication to participate in the setting of the global agenda. For example, Brazil is under negative public opinion pressure from the Western media when it comes to dealing with issues of environmental protection and climate change, especially the deforestation of the Amazon forest. To this end, the Brazilian government actively creates the country’s image in the field of environmental protection by using social media to publish recent data and success stories about Amazon protection. At the same time, Brazil has strengthened its voice on climate issues by engaging with other developing countries in global climate change negotiations and promoting South-South cooperation. Large international events, humanitarian activities and the production of cultural products, among others, are also effective ways of telling national stories. International sports events such as the World Cup and the Olympic Games are not only a display platform for sports competitions, but also an exhibition venue for national image and cultural soft power. By hosting or actively participating in these global events, the country can show its strength, value and cultural charm to the world, promoting a positive public opinion agenda.

“War is nothing more than the continuation of politics through another means”[23]. This classic Clausewitz assertion is modernized in the context of weaponized communication. Weaponized communication breaks through the physical boundaries of traditional warfare and becomes a modern strategic means of integrating information warfare, cognitive warfare, and psychological warfare. It manipulates the flow of information and public perception in a non-violent form, so that State and non-State actors can achieve political goals without relying on direct military action, reflecting a highly strategic and targeted nature. By manipulating information, emotions and values, weaponized communication can achieve strategic goals while avoiding all-out war, and in global competition and conflict, it has become an important means of political suppression by powerful countries against weak ones.

The core of weaponized communication lies in weakening the enemy’s decision-making and operational capabilities through information manipulation, but its complexity makes the communication effect difficult to fully predict. Although information-powerful countries suppress information-weak countries through technological advantages and communication channels, the effectiveness of communication is uncertain. Especially in the context of the globalization of social media and digital platforms, the boundaries and effects of information flow are becoming increasingly difficult to control. This complexity offers the weak countries the opportunity to break through the hegemony of discourse and promote the reverse game of information dissemination. Weak countries can use these platforms to launch confrontations, challenge the information manipulation of powerful countries, and take their place in global public opinion. The asymmetric game reflects the dynamic balance of international public opinion, whereby communication is no longer one-way control, but more complex interaction and dialogue, giving the weak the possibility of influencing public opinion. The current international public opinion landscape is still dominated by the one-way suppression of information-weak countries by information-powerful countries, but this situation is not unbreakable. Information warfare has a high degree of asymmetry, and information-weak countries can counter it step by step with technological innovation, flexible strategies and transnational cooperation. By exerting “asymmetric advantages”, weak countries are not only able to influence global public opinion, but also to enhance their voice with the help of joint action and information-sharing. Transnational cooperation and the establishment of regional alliances provide the weak countries with a powerful tool to counter the powerful, enabling them to form a synergy in international public opinion and challenge the dominance of the information powers. Under the “war framework”, countries can flexibly adjust their strategies and proactively shape the information dissemination pattern, rather than passively accepting information manipulation by powerful countries.

Sociology of war emphasizes the role of social structure, cultural identity, and group behavior in warfare. Weaponized communication is not only a continuation of military or political behavior, but also profoundly affects the psychosocial, group emotions, and cultural identity. Powerful countries use information dissemination to shape other countries’ perceptions and attitudes in order to achieve their own strategic goals. However, from a sociological perspective, weaponized transmission is not a one-way suppression, but rather the product of complex social interactions and cultural responses. In this process, the information-weak countries are not completely vulnerable, but, on the contrary, they can counter external manipulation with “soft power” with the help of cultural communication, social mobilization and dynamic confrontation of global public opinion, shaping a new collective identity and demonstrating the legitimacy of “weak weapons”.

(Fund Project: Research results of the National Social Science Fund Major Project to Study and Interpret the Spirit of the Third Plenary Session of the 20th Central Committee of the Communist Party of China “Research on Promoting the Integrated Management of News Publicity and Online Public Opinion” (Project No.: 24ZDA084))

現代國語:

作者:

郭小安 康如诗来源:

  发布时间:

2025-05-06

【摘要】在國際輿論戰中,武器化傳播已滲透軍事、經濟、外交等領域,帶來“一切皆可武器化”的想像與實踐。武器化傳播通過技術、平台和政策操控公眾認知,體現了權力分配與文化博弈的複雜互動。在全球化和數字化的推動下,認知操控、社會分裂、情感極化、數字監控、信息殖民已成為影響國家穩定的新型手段,這不僅加劇了信息強國與弱國間的競爭,也為信息弱國提供了通過靈活策略和技術創新實現逆轉的機會。在全球非對稱傳播格局下,如何在技術創新與倫理責任、戰略目標與社會平衡間找到契合點和平衡點,將是影響未來國際輿論格局的關鍵要素。

【關鍵詞】輿論戰;武器化傳播;信息操縱;非對稱傳播;信息安全

如果說“宣傳是對現代世界的理性認可”[1],那麼武器化傳播則是對現代技術手段的理性應用。在輿論戰中,各參與主體通過不同傳播手段實現戰略目標,做到表面合理且隱蔽。與傳統軍事衝突不同,現代戰爭不僅涉及物理對抗,還涵蓋信息、經濟、心理及技術等多個領域的競爭。隨著技術進步和全球化的推動,戰爭形態發生深刻變化,傳統的物理對抗逐漸轉向多維度、多領域的綜合作戰。在這一過程中,武器化傳播作為一種現代戰爭形式,成為通過控制、引導和操縱輿論,影響敵對方或目標受眾的心理、情感與行為,進而實現政治、軍事或戰略目的的隱形暴力手段。 《戰爭論》認為,戰爭是讓敵人無力抵抗,且屈從於我們意志的一種暴力行為。 [2]在現代戰爭中,這一目標的實現不僅依賴於軍事力量的對抗,更需要信息、網絡與心理戰等非傳統領域的支持。第六代戰爭(Sixth Generation Warfare)預示戰爭形態的進一步轉變,強調人工智能、大數據、無人系統等新興技術的應用,以及信息、網絡、心理和認知領域的全面博弈。現代戰爭的“前線”已擴展到社交媒體、經濟制裁和網絡攻擊等層面,要求參與者俱備更強的信息控制與輿論引導能力。

當前,武器化傳播已滲透到軍事、經濟、外交等領域,帶來“一切皆可武器化”的憂慮。在戰爭社會學中,傳播被視為權力的延伸工具,信息戰爭深刻滲透並伴隨傳統戰爭。武器化傳播正是在信息控制的框架下,通過塑造公眾認知與情感,鞏固或削弱國家、政權或非國家行為者的權力。這一過程不僅發生在戰時,也在非戰斗狀態下影響著國家內外的權力關係。在國際政治傳播中,信息操控已成為大國博弈的關鍵工具,各國通過傳播虛假信息、發動網絡攻擊等手段,試圖影響全球輿論和國際決策。輿論戰不僅是信息傳播的手段,更涉及國家間權力博弈與外交關係的調整,直接影響國際社會的治理結構與權力格局。基於此,本文將深入探討武器化傳播的概念流變,分析其背後的社會心態,闡述具體的技術手段及所帶來的風險,並從國家層面提出多維應對策略。

一、從傳播武器化到武器化傳播:概念流變及隱喻

武器在人類歷史上一直是戰爭的象徵和工具,戰爭則是人類社會中最極端、暴力的衝突形式。因此,“被武器化”是指將某些工具用於戰爭中的對抗、操控或破壞,強調這些工具的使用方式。 “武器化”(weaponize)譯為“使得使用某些東西攻擊個人或團體成為可能”。 1957年,“武器化”一詞作為軍事術語被提出,V-2彈道導彈團隊的領導者沃納·馮·布勞恩表示,他的主要工作是“將軍方的彈道導彈技術‘武器化’”[3]。

“武器化”最早出現在太空領域,時值美蘇軍備競賽時期,兩個大國力圖爭奪外太空主導權。 “太空武器化”是指將太空用於發展、部署或使用軍事武器系統的過程,包括衛星、反衛星武器和導彈防禦系統等,目的是進行戰略、戰術或防禦性行動。 1959年至1962年,美蘇提出了一系列倡議,禁止將外太空用於軍事目的,尤其是禁止在外層空間軌道部署大規模毀滅性武器。 2018年,當時的美國總統特朗普簽署了《空間政策指令-3》,啟動“太空軍”建設,將太空視為與陸地、空中、海洋同等的重要作戰領域。 2019年,《中華人民共和國和俄羅斯聯邦關於加強當代全球戰略穩定的聯合聲明》中倡議“禁止在外空放置任何類型武器”[4]。

除太空領域的武器化外,軍事、經濟、外交等領域也顯現武器化趨勢。 “軍事武器化”是將資源(如無人機、核武器等)用於軍事目的、部署武器系統或發展軍事能力。 2022年俄烏戰爭期間,英國皇家聯合軍種研究所的報告顯示,烏克蘭每月因俄羅斯干擾站的影響,損失約10000架無人機。 [5]“武器化”也常出現在“金融戰爭”“外交戰場”等表述中。在經濟領域,武器化通常指國家或組織對全球金融系統中的共享資源或機制的利用;外交武器化則表現為國家通過經濟制裁、外交孤立、輿論操控等手段,追求自身利益並對他國施加壓力。隨著時間的推移,“武器化”概念逐漸擴展到政治、社會、文化等領域,尤其在信息領域,自2016年美國總統大選以來,輿論操縱已成為政治鬥爭的普遍工具。美國前中央情報局局長戴維·彼得雷烏斯曾在國家戰略研究所會議上表示,“萬物武器化”(the weaponization of everything)的時代已經來臨。 [6]

作為一種隱喻,“武器化”不僅指實際物理工具的使用,還像徵著對抗性和攻擊性行為的轉化,強調“武器”這一概念如何滲透至日常生活、文化生產和政治策略中,展現社會行動者如何利用各種工具達成戰略目的。時下,許多本應保持中立的領域,如媒體、法律和政府機構,常被描述為“武器化”,用以批判它們的過度政治化和被不正當利用,突出其非法性及對社會的負面影響。通過這一隱喻,人們無意識地將當前的政治環境與理想化的、看似更溫和的過去進行對比,使人們認為過去的政治氛圍更加理性和文明,而現今則顯得過於極端和對立。 [7]因此,“武器化”的實質是政治中介化的過程,是政治力量通過各種手段和渠道,影響或控製本應保持中立的領域,使其成為政治目的和政治鬥爭的工具。

在信息領域,傳播武器化是長期存在的一種戰略手段。第一、二次世界大戰期間,各國就廣泛使用了宣傳和輿論戰,傳播手段被作為一種心理戰術使用。武器化傳播是傳播武器化在現代信息社會中的體現,其利用算法和大數據分析精準地控制信息的傳播速度和範圍,進而操控輿論和情感,反映了技術、平台和策略的結合,使得政治力量可以更加精準和高效地操控公眾認知與輿論環境。信息作為輿論的本體,被“武器化”並用於影響社會認知和群體行為,“戰爭”的概念也隨之變化,不再只是傳統的軍事對抗,還包括通過信息傳播和輿論操控實現的心理戰和認知戰。這種轉變促生了一系列新術語,例如無限制戰爭(unrestricted warfare)、新一代戰爭(new generation warfare)、非對稱戰爭(asymmetric warfare)和非常規戰爭(irregular warfare)等。這些術語幾乎都藉用“戰爭”(warfare)強調信息領域中的多樣化衝突,信息成為被“武器化”的核心內容。

儘管有部分觀點認為“戰爭”一詞不適用於未正式宣布敵對行動的情況[8],但武器化傳播通過弱化戰爭的傳統政治屬性,將各領域的公開或隱蔽的力量和形式籠統地視作傳播行為,從而擴展了“戰爭”這一概念的外延。值得注意的是,在英文術語中“武器化”有兩種表述方式:一種是“weaponized noun(名詞)”,即表示某物已經“被武器化”,具備武器功能或用途;另一種是“weaponization of noun”,指將某物轉化為武器或具有武器性質的過程。在學術領域,儘管weaponized communication和weaponization of communication尚未嚴格區分,但中文翻譯有所區別。 “武器化傳播”更側重於傳播手段或信息本身“被武器化”,以實現某種戰略目標;“傳播武器化”則強調傳播過程本身作為武器的轉化過程。在討論具體技術手段時,多數學術論文采用weaponed或weaponizing作為前綴,以修飾具體的傳播手段。

本文重點討論的是國際輿論戰中的具體傳播策略,著重描述已經發生的武器化現象,故統一使用“武器化傳播”,其是一種利用傳播手段、技術工具和信息平台,通過精確操控信息流動、公眾認知與情感反應,達到特定軍事、政治或社會目的的策略性傳播方式。武器化傳播也並非單純的戰爭或戰時狀態,而是一種持續的傳播現象,它反映了各主體間的互動與博弈,是信息共享和意義空間的流動。

二、武器化傳播的應用場景及實施策略

如果說20世紀90年代末,信息領域的武器化仍是一個“死話題”,各國主要追逐導彈、無人機等實體武器的升級競賽,那麼步入21世紀,網絡戰爭則真正衝進了公眾視野,並深刻嵌入人們的日常生活,經由社交媒體和智能設備,公眾不可避免地捲入輿論戰爭,不自覺地成為參與者或傳播節點。隨著技術的普及,武器化手段逐漸從國家主導的戰爭工具擴展到社會化和政治化領域,對個人和社會的控制從顯性的國家機器轉向更隱蔽的觀念操控。棱鏡計劃(PRISM)的曝光引發了全球對隱私洩露的強烈擔憂,凸顯了國家利用先進技術進行監視和控制的潛力,這被視為一種新型的武器化。自2016年特朗普當選美國總統以來,社交機器人等信息武器的大規模應用,成為全球政治博弈中的常見現象。信息作戰——包括電子戰、計算機網絡作戰、心理戰和軍事欺騙——被廣泛用於操控信息流動,影響輿論格局。這些手段不僅在軍事戰爭和政治選舉中發揮作用,還逐漸滲透到文化衝突、社會運動及跨國博弈之中,傳統的信息作戰邏輯得以延續。如今,武器化傳播作為一種社會政治工具,深刻影響著輿論生態、國際關係以及個人的日常生活。

(一)軍事領域的信息操縱戰

信息流能夠直接影響軍事衝突的走向,塑造公眾和軍隊的認知與決策,進而影響士氣、戰略判斷和社會穩定。在現代戰爭中,信息不再是單純的輔助工具,信息領域已成為核心戰場。通過操控信息流向,敵方的形勢評估可能被誤導,戰鬥意志被削弱,民眾的信任與支持被動搖,進而影響戰爭的決策過程與持續性。

海灣戰爭(Gulf War)被視為現代信息戰的開端。在這場戰爭中,美國通過高科技手段——包括電子戰、空中打擊和信息操作——實施了對伊拉克的系統性打擊。美軍利用衛星和AWACS預警機實時監控戰場態勢,通過空投傳單和廣播電台向伊拉克士兵傳遞美軍優勢及投降後的優待政策,從心理層面誘使伊軍投降。這場戰爭標誌著信息控制在軍事衝突中的關鍵地位,展示了信息戰在現代戰爭中的潛力。進入21世紀,網絡戰成為信息戰的重要組成部分。網絡戰不僅涉及信息的傳播和操控,還包括通過攻擊關鍵基礎設施實現對敵方社會功能的控制。 2007年愛沙尼亞遭遇大規模DDoS(Distributed Denial of Service Attack)攻擊,展示了信息操縱與網絡攻擊融合的趨勢。 2017年在WannaCry勒索軟件事件中,攻擊者利用Windows系統漏洞(EternalBlue)加密全球150個國家約20萬台計算機文件,要求支付贖金,嚴重影響英國國家健康服務體系(NHS),導致急診服務中斷和醫院系統癱瘓,進一步揭示了網絡戰對關鍵基礎設施的威脅。此外,在長期衝突中,基礎設施控制因能夠直接決定信息傳播的速度、範圍和方向,被廣泛用於削弱對手的戰略能力,爭奪公共信息空間。以色列通過限制無線電頻譜使用、控制互聯網帶寬和破壞通信設施,有效削弱了巴勒斯坦的通信能力。同時,以色列還通過經濟制裁和法律框架限制巴勒斯坦電信市場的發展,壓制巴勒斯坦在信息流動中的競爭力,鞏固自身在衝突中的戰略優勢[9],以維持信息的不平等流動。

社交媒體為信息操縱提供了即時、廣泛的信息傳播渠道,使其能夠跨越國界,影響全球公眾情緒和政治局勢,也使戰爭焦點從單純的物理破壞轉向輿論操控。俄烏戰爭期間,深度偽造技術作為視覺武器,對公眾認知和戰爭輿論產生了顯著干擾。 2022年3月15日,烏克蘭總統澤連斯基的偽造視頻在Twitter上傳播,視頻中他“呼籲”烏克蘭士兵放下武器,引發了短時間內的輿論混亂。同樣,俄羅斯總統普京的偽造視頻也被用以混淆視聽。儘管這些視頻被平台迅速標註“Stay informed”(等待了解情況)的說明,但其在短時間內仍然對公眾情緒和認知造成明顯干擾。這些事件凸顯了社交媒體在現代信息戰中的關鍵作用,國家和非國家行為體可以通過虛假信息、情感操控等手段對軍事衝突施加干擾。

信息操縱戰的複雜性還體現在其雙重特性上——既是攻擊工具,也是防禦的手段。在軍事領域,各國通過防禦和反擊網絡攻擊來確保國家安全、保護關鍵基礎設施、維護軍事機密,並在某些情況下影響對手的戰鬥力與決策。 2015年和2017年,俄羅斯黑客發起了針對烏克蘭的大規模網絡攻擊(如BlackEnergy和NotPetya),烏克蘭通過迅速升級網絡防禦系統,成功抵禦部分攻擊並採取反制措施,避免了更大規模的基礎設施癱瘓。此外,北約戰略傳播卓越中心和英國第77旅等單位專注研究和平時期的輿論塑造[10],利用戰略傳播、心理戰和社交媒體監控等手段,擴大信息領域的戰略控制,並強化了防禦與輿論塑造能力,進一步提高了信息戰的戰略高度。

如今,信息操縱戰已經成為現代軍事衝突中的關鍵環節。通過信息技術與心理操控的高度結合,它不僅改變了傳統戰爭的規則,也深刻影響著公眾認知和全球安全格局。國家、跨國公司或其他行為體通過掌控關鍵基礎設施和社交媒體平台,限制信息流動、操控傳播路徑,從而在全球信息生態中獲得戰略優勢。

(二)政治選舉的輿論干預戰

政治選舉是民主政治中最直接的權力競爭場域,信息傳播在此過程中對選民決策具有重要影響。通過計算宣傳等手段,外部勢力或政治團體能夠操縱選民情緒、誤導公眾認知,從而左右選舉結果、破壞政治穩定或削弱民主進程,選舉因此成為武器化傳播最具效果的應用場景。

近年來,全球政治選舉呈現極化趨勢,持不同政治立場的群體之間存在巨大的意識形態差異。極化導致公眾選擇性接受與自身觀點一致的信息,同時排斥其他信息,這種“回音室效應”加劇了公眾對立場的片面認知,為輿論干預提供了更大的空間。而信息傳播技術,尤其是計算宣傳的興起,使外部勢力能夠更加精準地操控輿論和影響選民決策。計算宣傳(Computational Propaganda)指利用計算技術、算法和自動化系統操控信息流動,以傳播政治信息、干預選舉結果和影響輿論,其核心特徵在於算法驅動的精準性和自動化傳播的規模化,通過突破傳統人工傳播的限制,顯著增強了輿論操控的效果。 2016年美國總統選舉中,特朗普團隊通過劍橋分析公司分析Facebook用戶數據,為選民定向推送定制化的政治廣告,精準影響了選民的投票意向[11]。這一事件被視為計算宣傳干預選舉的典型案例,也為其他政客提供了操作模板,推動了計算宣傳在全球範圍內的廣泛應用。 2017年法國總統選舉中,候選人埃馬紐埃爾·馬克龍(Emmanuel Macron)團隊遭遇黑客攻擊,內部郵件被竊取並公開,內容稱馬克龍在海外擁有秘密賬戶並涉及逃稅,企圖抹黑其形象。 2018年巴西總統選舉期間,候選人雅伊爾·博索納羅(Jair Bolsonaro)團隊利用WhatsApp群組傳播煽動性政治內容,定向推送大量圖像、視頻和煽動性消息以影響選民情緒。據統計,自2017年至2019年,全球採用計算宣傳的國家由28個增加至70個,2020年這一數量上升至81個。這表明,計算宣傳正通過技術手段和傳播策略,重新定義全球選舉中的輿論規則。

計算宣傳也是國家行為者在輿論干預戰中的重要工具。 2011年,美國國防高級研究計劃局(DARPA)在中東地區開展“歐內斯特之聲”行動,通過建立和管理多個虛假身份(sockpuppets),扭曲阿拉伯語社交媒體的對話。俄羅斯也頻繁利用計算宣傳實施干預,在加拿大操作約20萬個社交媒體賬戶,借助極右翼和極左翼運動散佈親俄言論,製造虛假的社會熱點,試圖破壞加拿大對烏克蘭的支持[12]。作為計算宣傳的重要組成部分,社交機器人通過自動化和規模化手段製造輿論熱度,藉由特定標籤在社交平台上增加信息的曝光率,操控議題的優先級。 2016年美國大選期間,俄羅斯利用社交機器人發布支持普京和攻擊反對派的內容,通過信息過載(information overload)掩蓋反對派聲音,強化親普京的輿論氛圍。 [13]2017年海灣危機期間,沙特阿拉伯和埃及通過Twitter機器人製造反卡塔爾標籤#AlJazeeraInsultsKingSalman的熱度,使其成為熱門話題,虛構了反卡塔爾情緒的高峰,進而影響了全球範圍內對卡塔爾的輿論態度。 [14]深度偽造技術則進一步提升了計算宣傳的精準性與隱蔽性。 2024年,美國總統喬·拜登的偽造視頻在X(原Twitter)上迅速傳播,視頻顯示其在橢圓形辦公室使用攻擊性語言,引發輿論爭議並影響選民情緒。據網絡安全公司McAfee調查,63%的受訪者在兩個月內觀看過政治深度偽造視頻,近半數表示這些內容影響了他們的投票決定。 [15]

在全球範圍內,計算宣傳已滲透各國輿論戰中,影響著社會穩定與國家安全。以色列國防軍通過數字武器對巴勒斯坦展開輿論戰,土耳其培養了“愛國巨魔軍隊”操控國內外輿論,墨西哥政府利用殭屍網絡影響輿論。作為現代輿論干預戰的重要手段,計算宣傳正在改變全球政治傳播的格局。隨著人工智能、量子計算等技術的發展,計算宣傳還可能通過更隱蔽和高效的方式乾預選舉流程,甚至直接威脅民主制度的核心運行邏輯。

(三)文化領域的符號認同戰

武器化傳播通過操控信息、符號和價值觀,試圖影響公眾的思想、情感和行為,進而塑造或改變社會的集體認知與文化認同。這種傳播方式不僅在於信息的傳遞,更通過特定的敘事框架、文化符號和情感共鳴,推動某種特定的意識形態或政治理念的傳播與認同。通過操縱文化符號、社會情感和集體記憶,武器化傳播在文化領域干擾社會結構與文化認同,成為符號認同戰的核心手段。

模因(Meme)作為一種集視覺元素和簡潔文字於一體的文化符號,以幽默、諷刺或挑釁的方式激發觀眾的情感反應,影響他們的政治態度和行為。佩佩模因(Pepe the Frog)起初是一個無害的漫畫角色,被極右翼群體重新利用並武器化,用以傳播仇恨言論,逐漸演變為種族主義和反移民的象徵。模因將復雜的政治情緒轉化為便於傳播的視覺符號,迅速激起公眾對政策的不信任和憤怒,被視為“武器化的偶像破壞主義”(Iconoclastic Weaponization)。這一過程通過操控文化符號,以達到政治或社會鬥爭的目的[16],加劇了公眾對社會和政治的分裂。例如,在英國脫歐期間,帶有“Take Back Control”(奪回控制權)字樣的模因迅速傳播,強化了民族主義情緒。

除了文化符號的製造外,符號的篩选和屏蔽同樣能夠塑造或加深某種文化認同或政治立場。審查制度自古以來就是權力控制信息的重要手段,早在古希臘和古羅馬時期,政府就對公共演講和文學作品進行審查,以維持社會秩序和權力穩定。進入數字時代,互聯網和社交媒體的興起推動了審查制度的現代化,平台審查逐漸取代傳統的審查方式,成為當代信息控制和輿論引導的核心工具。算法審查通過人工智能檢測敏感話題、關鍵詞和用戶行為數據,自動刪除或屏蔽被視為“違規”的內容,社交媒體的審核團隊會對用戶生成的內容進行人工篩選,確保其符合平台政策和法律法規。平台審查的作用不僅是限制某些內容的傳播,更是通過推送、刪除和屏蔽等方式引導輿論,塑造公眾認知框架。儘管主流社交平台通過嚴格的內容審核機制控制信息傳播,但一些邊緣平台,如Gab、Gettr、Bitchute等因缺乏有效審查,成為極端言論和惡意信息的溫床。這些平台未對內容髮布做出足夠限制,極端觀點和虛假信息得以肆意擴散,例如,Gab因極端主義內容屢遭批評,被指助長暴力和仇恨。在迴聲室中,用戶只能接觸與自身觀點一致的信息,這種信息環境更強化了極端思想,導致社會群體間的對立加劇。 [17]

語言作為信息傳播的載體和工具,能夠通過情感操控、符號政治和社會動員等方式,深刻影響群體行為和文化認同。語言武器化聚焦於語言形式和文化語境如何影響信息的接收方式,強調語言如何被用來操控、引導或改變人們的認知與行為。這不僅涉及特定詞彙和修辭手法的使用,更包括通過語言表述建構特定的社會意義和文化框架。作為符號認同戰的另一重要工具,語言塑造了“敵我對立”的敘事框架。大翻譯運動(Great Translation Movement)通過選擇性翻譯中國網民的民族主義言論,將其傳播到國際社交媒體平台,引發了對中國的負面認知。這種語言操控通過情緒化表達放大了爭議性內容,加深了國際社會的文化偏見。

語言武器化的深層邏輯在於情緒化和煽動性的語言形式。西方國家常以“人權”與“民主”等正義化標籤為乾預行為辯護,合法化政治或軍事行動。白人至上主義者使用“另類右翼”等模糊標籤重塑意識形態,將傳統的帶有強烈負面含義的“白人至上主義”轉化為一個較為中立的概念,降低了該詞彙的社會抵抗力,用寬泛的“傘式”身份擴大其支持者的基礎。通過對世俗話語的滲透,仇恨政治和極端言論被正當化,逐漸形成一種政治常態。當公眾將這種政治日常化後,語言實現了真正的武器化。 [18]在尼日利亞,煽動仇恨的內容通過種族、宗教和地區話題擴散,深刻惡化了社會關係。 [19]語言的模糊性和合理否認策略也成為傳播者規避責任的有力工具,在被簡化的敘事中傳播複雜的社會和政治議題。特朗普的美國優先(America First)政策通過否定性標籤和情緒化話語,以反對全球化、質疑氣候變化科學、抨擊傳統盟友等方式,故意提出與主流意見相對立的觀點,激發公眾對全球化的不信任,重塑國家利益優先的文化認同。 [20]

三、武器化傳播的風險與挑戰:正當性與破壞性

儘管武器化傳播給國際輿論格局帶來了巨大風險,但特定情形下,其可能會被某些國家或團體通過法律、政治或道德框架賦予一定的正當性。如“9·11”事件後,美國通過《愛國法案》擴大了情報部門的監控權限,以“反恐”為名實施廣泛的信息控制,這種“正當性”常被批評為破壞公民自由,侵蝕了民主社會的核心價值。

在國際政治博弈中,武器化傳播更常被視為“灰色區域”(Gray Zone)的手段。國家間的對抗不再局限於經濟制裁或外交壓力,而是通過信息操控、社交媒體干預等非傳統方式展開。部分國家以“保護國家利益”為藉口傳播虛假信息,辯稱其行為是合規的,儘管這些行為可能在國際法上存在爭議,但往往被合理化為“反制外部威脅”的必要手段。在一些信息監管缺乏嚴格法律框架的國家,選舉的干預行為往往被容忍,甚至被視為一種“正當”的政治活動。在文化層面,某些國家通過傳播特定的文化符號和意識形態,試圖在全球範圍內塑造自身的文化影響力。西方國家常以“文化共享”和“文明傳播”為名,推動其價值觀的傳播,而在實際操作中,卻通過操控文化符號和敘事框架,削弱其他文化的認同感,導致全球文化生態的不平衡。法律框架也在一定程度上為武器化傳播的正當性提供了支持。一些國家以“反恐”和“反對極端主義”為名,通過信息審查、內容過濾等手段限制所謂“有害信息”的傳播。然而,這種正當性往往突破了道德邊界,導致信息封鎖和言論壓制。以“國家安全”為理由的信息治理,雖然在一定程度上獲得了內部認可,卻為武器化傳播的氾濫提供了空間。

相較於正當性,武器化傳播的破壞性尤為顯著。目前,武器化傳播已成為權力結構操控輿論的重要工具,其不僅扭曲了信息內容,還通過隱私侵犯、情感動員和文化滲透等方式,深刻影響了公眾認知、社會情緒以及國際關係。

(一)信息失真與認知操控

信息失真指信息在傳播過程中被故意或無意扭曲,導致公眾接收到的內容與原始信息存在顯著差異。在社交媒體上,虛假信息和誤導性內容的傳播日益猖獗,人工智能模型(如GPT)的生成內容,可能因訓練數據的偏見而加劇這一問題。性別、種族或社會偏見可能被反映在自動生成的文本中,放大信息失真的風險。社交媒體的快速傳播特性也使傳統的事實核查機制難以跟上虛假信息的擴散速度。虛假信息在短時間內往往佔據輿論主導地位,跨平台傳播和匿名性使得澄清與糾正變得更加複雜。傳播的不對稱性削弱了傳統新聞機構的權威性,公眾更傾向於相信即時更新的社交平台信息,而非傳統新聞機構的深入報導,這進一步削弱了新聞機構在抵制虛假信息中的作用。

除了信息本身的失真,武器化傳播還深刻利用了認知失調的心理機制。認知失調指個體接觸到與其已有信念或態度相衝突的信息時產生的心理不適感。傳播者通過製造認知失調,動搖目標受眾的既有態度,甚至誘導其接受新的意識形態。在政治選舉中,定向傳播負面信息常迫使選民重新審視政治立場,甚至改變投票傾向。武器化傳播通過選擇性暴露進一步加劇了“信息繭房”的形成,讓受眾傾向於接觸與自身信念一致的信息,忽視或排斥相反觀點。這不僅強化了個體的認知偏見,也讓虛假信息在群體內部快速擴散,難以被外界的事實和理性聲音打破,最終形成高度同質化的輿論生態。

(二)隱私洩露與數字監控

近年來,深度偽造技術的濫用加劇了隱私侵權問題。 2019年,“ZAO”換臉軟件因默認用戶同意肖像權而被下架,揭示了生物特徵數據的過度採集風險。用戶上傳的照片經深度學習處理後,既可能生成精確的換臉視頻,也可能成為隱私洩露的源頭。更嚴重的是,深度偽造等技術被濫用於性別暴力,多名歐美女演員的面孔被非法植入虛假性視頻並廣泛傳播,儘管平台在部分情況下會刪除這些內容,但開源程序的普及讓惡意用戶能夠輕鬆複製和分享偽造內容。此外,用戶在使用社交媒體時,往往默認授權平台訪問其設備的照片、相機、麥克風等應用權限。通過這些權限,平台不僅收集了大量個人數據,還能夠通過算法分析用戶的行為特徵、興趣偏好和社交關係,進而精準投放廣告、內容推薦甚至實施信息操控。這種大規模數據採集推動了對隱私保護的全球討論。在歐洲,《通用數據保護條例》(General Data Protection Regulation)試圖通過嚴格的數據收集和使用規定,加強個人隱私權保障。然而,由於“隱性同意”或複雜的用戶協議,平台常常繞過相關規定,使數據處理過程缺乏透明度,導致普通用戶難以了解數據的實際用途。美國《通信規範法》第230條規定,網絡平台無需為用戶生成的內容承擔法律責任,這一規定推動了平台內容審核的發展,但也使其在應對隱私侵權時缺乏動力。平台出於商業利益的考慮,往往滯後處理虛假信息和隱私問題,導致審核責任被持續擱置。

在數字監控方面,社交平台與政府的合作使用戶數據成為“監控資本主義”的核心資源。美國國家安全局(NSA)通過電話記錄、互聯網通信和社交媒體數據,實施大規模監控,並與Google、Facebook等大型企業合作,獲取用戶的在線行為數據,用於全球範圍內的情報收集和行為分析。跨國監控技術的濫用更是將隱私侵犯推向國際層面。以色列網絡安全公司NSO開發的Pegasus間諜軟件,通過“零點擊攻擊”入侵目標設備,可實時竊取私人信息和通信記錄。 2018年,沙特記者賈馬爾·卡舒吉(Jamal Khashoggi)被謀殺一案中,沙特政府通過Pegasus監聽其通信,揭示了這種技術對個體隱私和國際政治的深遠威脅。

(三)情感極化與社會分裂

情感在影響個體認知與決策中起著關鍵作用。武器化傳播通過煽動恐懼、憤怒、同情等情緒,影響理性判斷,推動公眾在情緒驅動下做出非理性反應。戰爭、暴力和民族主義常成為情感動員的主要內容,傳播者通過精心設計的議題,將愛國主義、宗教信仰等元素植入信息傳播,迅速引發公眾情感共鳴。數字技術的廣泛應用,特別是人工智能和社交媒體平台的結合,進一步放大了情感極化的風險。虛假信息與極端言論在平台上的快速傳播,不僅來自普通用戶的分享行為,更受到算法的驅動。平台傾向優先推送情緒化和互動性高的內容,這些內容常包含煽動性語言和極端觀點,從而加劇了仇恨言論和偏激觀點的傳播。

社交媒體標籤和算法推薦在情感極化中扮演著關鍵角色。在查理周刊事件後,#StopIslam標籤成為仇恨言論的傳播工具,用戶借助該標籤發布仇視和暴力傾向的信息。在美國2020年總統選舉期間,社交平台上的極端政治言論和錯誤信息也在激烈的黨派鬥爭中被放大。通過精確的情感操控,武器化傳播不僅撕裂了公共對話,還極大影響了社會的民主進程。另一種特殊的極端主義動員策略是“武器化自閉症”(Weaponized Autism),即極右翼團體利用自閉症個體的技術專長,實施情感操控。這些團體招募技術能力較強但有社交障礙的個體,通過賦予虛假的歸屬感,將其轉化為信息戰的執行者。這些個體在極端組織的指引下,被用於傳播仇恨言論、執行網絡攻擊和推動極端主義。這種現像不僅揭示了情感操控的深層機制,也表明技術如何被極端團體利用來服務於更大的政治和社會議程。 [21]

(四)信息殖民與文化滲透

“武器化相互依賴”理論(Weaponized Interdependence Theory)揭示了國家如何利用政治、經濟和信息網絡中的關鍵節點,對其他國家施加壓力。 [22]特別是在信息領域,發達國家通過控制信息流實施“信息殖民”,進一步鞏固其文化和政治優勢。數字平台成為這一殖民過程的載體,全球南方國家在信息傳播中高度依賴西方主導的技術平台和社交網絡,在撒哈拉以南非洲地區,Facebook已成為“互聯網”的代名詞。這種依賴不僅為西方企業帶來了巨大的廣告收入,還通過算法推薦對非洲本土文化和價值觀,尤其是在性別、家庭和宗教信仰等方面,產生了深遠影響,使文化滲透成為常態。

數字不平等是信息殖民的另一表現。發達國家在數字技術和信息資源上的主導地位,使南方國家在經濟、教育和文化領域日益邊緣化。巴勒斯坦因基礎設施不足和技術封鎖,難以有效融入全球數字經濟,既限制了本地經濟發展,又進一步削弱了其在全球信息傳播中的話語權。全球主要經濟體和信息強國通過技術封鎖和經濟制裁,限制他國獲取關鍵技術與創新資源,這不僅阻礙了目標國的科技發展,也加劇了全球技術與創新生態的斷裂。自2018年退出《伊朗核協議》以來,美國對伊朗的經濟制裁導致其在半導體和5G領域發展受阻,技術與創新的不對稱拉大了全球技術生態的差距,使許多國家在信息競爭中處於劣勢。

四、反思與討論:非對稱傳播格局中的話語權爭奪

在國際非對稱傳播(Asymmetric Communication)競爭格局下,強勢方常常通過主流媒體和國際新聞機構等渠道佔據輿論的主導地位,而弱勢方則需要藉助創新傳播技術和手段來彌補劣勢,爭奪話語權。這一傳播格局的核心在於信息地緣政治(Information Geopolitics),即國家之間的權力較量不僅僅取決於地理位置、軍事力量或經濟資源,更取決於對信息、數據和技術的控制。大國間的博弈已不再僅限於物理空間的控制,而擴展至輿論空間的爭奪。這些“信息景觀”涉及全球傳播生態中的話語權、信息流通和媒體影響力等,在這一過程中,國家通過不斷製造景觀,以影響國際輿論、塑造全球認知框架,進而實現其戰略目標。非對稱傳播的策略不僅關乎信息內容的傳遞,更重要的是如何借助各種傳播技術、平台和手段彌補資源與能力上的差距,信息傳播的核心不再局限於內容本身,而圍繞著話語權的爭奪展開。隨著信息戰和認知戰的興起,誰掌握了信息,誰就能在全球競爭中占得先機。

(一)後發優勢下的技術赶超

傳統的大國或強勢傳播者掌控著全球輿論的主導權,相比之下,弱勢國家往往缺乏與這些大國抗衡的傳播渠道。後發優勢理論主張後發國家能夠通過跳躍式發展,繞過傳統的技術路徑,引進現有的先進技術和知識,從而迅速崛起並規避早期技術創新中的低效和過時環節。在武器化傳播的背景下,這一理論為信息弱國提供了通過新興科技突破大國傳播壁壘的路徑,有助於其在技術層面上實現赶超。傳統媒體往往受到資源、影響力和審查機制的限制,信息傳播速度慢、覆蓋面有限,且容易受到特定國家或集團的操控。數字媒體的崛起使信息傳播的格局發生了根本性變化,弱勢國家能夠借助全球化的互聯網平台,直接面向國際受眾,而不必依賴傳統的新聞機構和主流媒體。通過新興技術,弱勢國家不僅能更精準地傳遞信息,還能通過定向傳播和情感引導,迅速擴大其在國際輿論中的影響力。後發國家可以利用先進技術(如大數據、人工智能、5G網絡等)實現精準的信息傳播,打造高效的傳播渠道。以大數據分析為例,後發國家可以深入了解受眾需求和輿情趨勢,快速識別全球輿論脈搏,實施定向傳播,快速擴大國際影響力。人工智能技術不僅能夠預測輿論發展方向,還能實時優化傳播策略。 5G網絡的普及大大提升了信息傳播的速度與覆蓋範圍,使後發國家能夠以低成本、高效率的方式突破傳統傳播模式的局限,形成獨特的傳播優勢。

通過跨國合作,後發國家可以整合更多的傳播資源,擴大傳播的廣度與深度。例如,阿根廷與拉美其他國家共同建立了“拉美新聞網絡”,通過新聞內容共享,推動拉美國家在國際輿論中發出統一的聲音,反擊西方媒體的單一敘事。在非洲,南非與華為合作推動“智慧南非”項目,建設現代化信息基礎設施,促進數字化轉型和公共服務效率的提升。後發國家政府應加大對技術研發和創新的投入,鼓勵本土企業和人才的發展。同時,還應注重文化輸出和媒體產業建設,通過全球化合作和去中心化傳播模式提升國家在國際信息空間中的話語權。政府可以資助數字文化創作,支持本地社交媒體平台的成長,並通過國際合作框架整合更多傳播資源。

(二)信息反制中的壁壘構建

與軍事行動可能引發的全面衝突,或經濟制裁可能帶來的風險不同,武器化傳播能夠在不觸發全面戰爭的情況下實現戰略目標,基於成本和戰略考量,其具有極大的吸引力。由於武器化傳播具備低成本、高回報的特點,越來越多的國家和非國家行為體選擇通過操控信息來達到戰略目標。這種傳播手段的普及,使得國家在面對來自外部和內部的信息攻擊時,面臨更加複雜和多變的威脅。隨著信息戰爭的日益激烈,單純的傳統軍事防禦已經無法滿足現代戰爭的需求。相反,構建強有力的信息防禦體系,成為國家保持政治穩定、維護社會認同和提升國際競爭力的關鍵策略。因此,如何有效應對外部信息干擾和輿論操控,並進行信息反制,已成為各國迫切需要解決的問題。完善的網絡安全基礎設施是維護國家安全的關鍵,用以防范敏感信息不被外部操控或篡改。以歐盟為例,歐盟通過“數字單一市場”戰略推動成員國加強網絡安全建設,要求互聯網公司更積極地應對虛假信息和外部干預。歐盟的網絡安全指令還規定各成員國建立應急響應機制,保護重要信息基礎設施免受網絡攻擊。此外,歐盟還與社交平台公司,如Facebook、Twitter和Google等建立合作,通過提供反虛假信息工具和數據分析技術來打擊假新聞傳播。人工智能、大數據和自動化技術正在成為信息防禦的重要工具,被用以實時監控信息傳播路徑,識別潛在的虛假信息和抵禦輿論操控。在網絡安全領域,大數據分析幫助決策者識別和預警惡意攻擊,並優化反制策略。這些技術的應用不僅能夠在國內層面增強信息防禦能力,還能提高國家在國際信息空間中的主動性和競爭力。

反制機制是信息防禦體系的另一重要組成部分,尤其是在國際輿論壓力下,實時監控外部信息傳播並及時糾正虛假信息成為維護輿論主動權的關鍵。烏克蘭自2014年克里米亞危機以來,通過與北約和美國合作,建立了頗具規模的網絡防禦體系。烏克蘭的國家網絡安全局為應對網絡威脅設立了“信息反制小組”,利用社交媒體和新聞發布平台實時駁斥俄羅斯的虛假報導,這一策略顯著提升了烏克蘭在國際輿論中的聲譽和信任度。

(三)輿論引導中的議程設置

在信息化和數字化的全球競爭格局中,輿論引導不僅涉及信息傳播內容,更關鍵的是如何設置議程並聚焦全球關注的熱點話題。議程設置理論表明,誰能掌控信息流通的議題,誰就能引導輿論的方向。議程設置通過控制話題的討論範圍和焦點,影響公眾對事件的關注與評價,社交媒體的興起為信息弱勢國提供了突破口,使其可以通過多平台聯動來爭奪信息傳播的主導權。以烏克蘭為例,其在俄烏戰爭中通過社交媒體傳播戰爭實況,不僅發布戰鬥實況,還融入民眾的情感訴求,借助平民遭遇和城市破壞的悲情敘事,激發國際社會的同情與關注。在抵禦外部信息干擾的同時,國家還需要主動傳播正面敘事,講述能夠引發國際社會共鳴的文化故事。故事應該符合國際輿論的情感需求,同時展現國家的獨特性,強化與國際社會的聯繫。以我國的“一帶一路”共建為例,在“一帶一路”共建國家,我國投資建設了大量基礎設施項目,這些項目不僅幫助改善了當地的經濟基礎條件,也展示了中國在全球化進程中的責任擔當,更為文化合作和交流活動提供了窗口,向世界展示了中華民族豐富的歷史文化,為國際社會展現了中華文化的包容性和責任感。

但由於全球南方國家往往面臨資源、技術與國際傳播平台的限制,難以直接與發達國家競爭,因此它們依賴更加靈活、創新的傳播手段來參與全球議程的設置。例如,巴西在應對環保和氣候變化議題上,尤其是亞馬遜森林的砍伐問題,面臨來自西方媒體的負面輿論壓力。為此,巴西政府利用社交媒體發布關於亞馬遜保護的最新數據和成功案例,積極塑造國家在環境保護領域的形象。同時,巴西通過與其他發展中國家合作,參與全球氣候變化談判,推動南南合作,增強了在氣候問題上的話語權。大型國際事件、人道主義活動和製作文化產品等,也是講述國家故事的有效方式。國際體育賽事如世界杯、奧運會等,不僅是體育競技的展示平台,更是國家形象和文化軟實力的展現場所,通過承辦或積極參與這些全球性事件,國家能夠向世界展示其實力、價值和文化魅力,推動積極的輿論議程。

“戰爭無非是政治通過另一種手段的延續”[23]。這一克勞塞維茨的經典論斷在武器化傳播的語境下得到了現代化的詮釋。武器化傳播突破了傳統戰爭的物理邊界,成為一種融合信息戰、認知戰和心理戰的現代戰略手段。它以非暴力的形式操控信息流向和公眾認知,使國家和非國家行為者無須依賴直接軍事行動即可實現政治目標,體現出極強的戰略性和目標性。通過操控信息、情緒和價值觀,武器化傳播能夠在避免全面戰爭的同時達成戰略目的,在全球競爭和衝突中,已成為強國對弱國進行政治壓制的重要手段。

武器化傳播的核心在於通過信息操控削弱敵方的決策力與行動能力,但其複雜性使得傳播效果難以完全預測。儘管信息強國通過技術優勢和傳播渠道壓制信息弱國,傳播效果卻充滿不確定性。尤其是在社交媒體和數字平台全球化的背景下,信息流動的邊界和效果愈加難以控制。這種複雜性為弱國提供了突破話語霸權的機會,推動信息傳播的反向博弈。弱國可以利用這些平台發起對抗,挑戰強國的信息操控,在全球輿論中佔據一席之地。非對稱性博弈反映了國際輿論的動態平衡,傳播不再是單向的控制,而是更為複雜的交互和對話,賦予弱者影響輿論的可能性。當前國際輿論格局仍以信息強國對信息弱國的單向壓制為主,但這一局面並非不可打破。信息戰爭具有高度的不對稱性,信息弱國可以憑藉技術創新、靈活策略和跨國合作逐步反制。通過發揮“非對稱優勢”,弱國不僅能夠影響全球輿論,還能藉助聯合行動和信息共享提升話語權。跨國合作與地區聯盟的建立,為弱國提供了反制強國的有力工具,使其能夠在國際輿論上形成合力,挑戰信息強國的主導地位。在戰爭框架下,各國可以靈活調整策略,主動塑造信息傳播格局,而非被動接受強國的信息操控。

戰爭社會學強調社會結構、文化認同和群體行為在戰爭中的作用。武器化傳播不僅是軍事或政治行為的延續,更深刻影響社會心理、群體情感和文化認同。強國利用信息傳播塑造他國的認知與態度,以實現自己的戰略目標。然而,從社會學視角來看,武器化傳播並非單向的壓制,而是複雜的社會互動和文化反應的產物。在這一過程中,信息弱國並非完全處於弱勢,相反,它們可以藉助文化傳播、社會動員和全球輿論的動態對抗,以“軟實力”反擊外部操控,塑造新的集體認同,展示“弱者武器”的正當性。

(基金項目:研究闡釋黨的二十屆三中全會精神國家社科基金重大專項“推進新聞宣傳和網絡輿論一體化管理研究”(項目編號:24ZDA084)的研究成果)

References:

[1] Lasswell H D Propaganda techniques in the world wars [M] Beijing: Renmin University Press, 2003

[2] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978.

[3]Herrman J. If everything can be ‘weaponized,’ what should we fear? [EB/OL]. (2017-03-14)[2024-12-20].https://www.nytimes.com/2017/03/14/magazine/if-everything-can-be-weaponized-what-should-we-fear.html.

[4] Ministry of Foreign Affairs of the People’s Republic of China Joint statement by the People’s Republic of China and the Russian Federation on strengthening contemporary global strategic stability (full text) [EB/OL].https://www.mfa.gov.cn/web/ziliao_674904/1179_674909/201906/t20190606_7947892.shtml.

[5]Mazarr M J, Casey A, Demus A, et al. Hostile social manipulation: present realities and emerging trends[M]. Santa Monica, CA USA: Rand Corporation, 2019.

[6]Bob Y J. Ex-CIA director Petraeus: Everything can be hijacked, weaponized[EB/OL].(2018-01-30)[2024-12-20].https://www.jpost.com/israel-news/ex-cia-director-petraeus-everything-can-be-hijacked-weaponized-540235.

[7]Mattson G. Weaponization: Metaphorical Ubiquity and the Contemporary Rejection of Politics[EB/OL].OSF(2019-01-08)[2024-12-20].osf.io/5efrw.

[8]Robinson L, Helmus T C, Cohen R S, et al. Modern political warfare[J]. Current practises and possible responses, 2018.

[9]Kreitem H M. Weaponization of Access, Communication Inequalities as a Form of Control: Case of Israel/Palestine[J]. Digital Inequalities in the Global South, 2020: 137-157.

[10]Laity M. The birth and coming of age of NATO StratCom: a personal history[J]. Defence Strategic Communications, 2021, 10(10): 21-70.

[11]Confessore N. Cambridge Analytica and Facebook: The scandal and the fallout so far[J]. The New York Times, 2018(4).

[12]McQuinn B, Kolga M, Buntain C, et al. Russia Weaponization of Canada’s far Right and far Left to Undermine Support for Ukraine[J]. International Journal,(Toronto,Ont),2024,79(2):297-311.

[13]Stukal D, Sanovich S, Bonneau R, et al. Why botter: how pro-government bots fight opposition in Russia[J]. American political science review, 2022, 116(3): 843-857.

[14]Jones M O. The gulf information war| propaganda, fake news, and fake trends: The weaponization of twitter bots in the gulf crisis[J]. International journal of communication13(2019):27.

[15]Genovese D. Nearly 50% of voters said deepfakes had some influence on election decision. [EB/OL].(2024-10-30)[2024-12-20].https://www.foxbusiness.com/politics/nearly-50-voters-said-deepfakes-had-some-influence-election-decision.

[16]Peters C, Allan S. Weaponizing memes: The journalistic mediation of visual politicization[J]. Digital Journalism, 2022, 10(02):217-229.

[17]Gorissen S. Weathering and weaponizing the# TwitterPurge: digital content moderation and the dimensions of deplatforming[J]. Communication and Democracy, 2024, 58(01): 1-26.

[18]Pascale C M. The weaponization of language: Discourses of rising right-wing authoritarianism[J]. Current Sociology, 2019, 67(06): 898-917.

[19]Ridwa1ah A O, Sule S Y, Usman B, et al. Politicization of Hate and Weaponization of Twitter/X in a Polarized Digital Space in Nigeria[J]. Journal of Asian and African Studies, 2024.

[20]Mercieca J R. Dangerous demagogues and weaponized communication[J]. Rhetoric Society Quarterly, 2019, 49(03): 264-279.

[21]Welch C, Senman L, Loftin R, et al. Understanding the use of the term “Weaponized autism” in an alt-right social media platform[J]. Journal of Autism and Developmental Disorders, 2023, 53(10): 4035-4046.

[22]Farrell H, Newman A L. Weaponized interdependence: How global economic networks shape state coercion[J]. International security,2019,44(01):42-79.

[23] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978

作者簡介:郭小安,重慶大學新聞學院教授、博士生導師,重慶市哲學社會科學智能傳播與城市國際推廣重點實驗室執行主任(重慶 400044);康如詩,重慶大學新聞學院碩士生(重慶 400044)。

中國原創軍事資源:https://www.cjwk.cn/journal/guidelinesDetails/192031322246497484888

Chinese Military’s Brief Analysis of Multi-dimensional Central Warfare

中國軍隊多維中心戰淺析

現代英語:

2023-09-27 11:58:xx

Source: Guangming Military

Since the 1990s, the concepts of multi-dimensional central warfare, such as network-centric warfare, personnel-centric warfare, action-centric warfare, and decision-centric warfare, have been proposed one after another. The evolution of the concept of multi-dimensional central warfare reflects the overall goal of seeking advantages such as platform effectiveness, information empowerment, and decision-making intelligence by relying on military science and technology advantages, and also reflects the contradictory and unified relationship between people and equipment, strategy and skills, and the strange and the normal. Dialectically understanding these contradictory and unified relationships with centralized structured thinking makes it easier to grasp the essential connotation of its tactics and its methodological significance.

Strengthen the integration of the “human” dimension in the combination of people and equipment

The concepts of personnel-centric warfare and platform-centric warfare largely reflect the relationship between people and weapons and equipment. Some have specially formulated human dimension strategies, emphasizing continuous investment in the human dimension of combat effectiveness, which is the most reliable guarantee for dealing with an uncertain future. Since the beginning of the 21st century, with the rapid development of intelligent weapons and equipment, unmanned combat has emerged, and voices questioning the status and role of people have arisen one after another. It is imperative to strengthen the integration of the human dimension and enhance the synergy of the human dimension.

First, we need to enhance spiritual cohesion. Marxism believes that consciousness is the reflection of objective matter in the human mind. Tactics are the expression and summary of combat experience, and they themselves have spiritual or conscious forms. When studying tactics, we naturally need to put spiritual factors first. Some scholars believe that war is still fundamentally a contest of human will. In the information age, people’s spirits are richer and more complex, and enhancing the spiritual cohesion of the human dimension is more challenging and difficult. To enhance people’s spiritual cohesion, we need to coordinate the cultivation of collective spirit and individual spirit, maximize the satisfaction of individual spiritual needs in leading the collective spirit, realize individual spiritual pursuits in shaping the value of collective spirit, and empower people’s spirit with all available and useful information; we need to coordinate the cultivation of critical spirit and innovative spirit, adhere to the tactical epistemology of dialectical materialism, resolutely oppose idealism and mechanism in tactical cognition, and constantly inherit and innovate in criticism; we need to coordinate the cultivation of fighting spirit and scientific spirit, and promote the revolutionary spirit of facing death with courage and winning, and promote the spirit of winning by science and technology.

The second is to enhance the organizational structure. Organizations are the organs of the military, and people are the cells of the organization. The settings of military organizations in different countries have their own characteristics and commonalities. For example, the Ministry of National Defense is generally set up to distinguish between the structure of military branches, hierarchical structures and regional structures, and to distinguish between peacetime and wartime organizations. Although the purpose of construction and war is the same, the requirements for the unity of construction and the flexibility of war are different. To enhance the organizational structure and promote the consistency of war and construction, it is necessary to smooth the vertical command chain, reasonably define the command power and leadership power, command power and control power, so that the government and orders complement each other, and enhance the vertical structural strength of the organization; it is necessary to open up horizontal coordination channels, explore the establishment of normalized cross-domain (organizations, institutions, departments) coordination channels, change the simple task-based coordination model, and enhance the horizontal structural strength of the organization; it is necessary to improve the peace-war conversion mechanism, focus on the organization connection, adjustment and improvement in the change of leadership or command power of the troops, and maintain the stability and reliability of the organizational structure network.

The third is to enhance material support. The spiritual strength of people in combat can be transformed into material strength, but spiritual strength cannot be separated from the support of material strength. To enhance material support and thus realize the organic unity of material and spirit, it is necessary to ensure combat equipment, bedding, food, and medical care, build good learning venues, training facilities, and re-education channels, provide good technical services in combat regulations, physiological medicine, etc., help design diversified and personalized capacity improvement plans and career development plans, and provide strong material and technical support for the development of people’s physical fitness, skills, and intelligence, and thus comprehensively improve people’s adaptability and combat effectiveness in the uncertain battlefield environment of the future.
             

Deepen the practice of the “skill” dimension in the combination of combat and skills

The combination of combat skills is an important principle of tactical application. The technology includes not only the technology at the practical operation level (such as shooting technology), but also the technology at the theoretical application level (such as information technology). It can be said that tactics, technology, art and procedures together constitute its “combat methodology”. Scientific and technological development and scientific technology are important characteristics of scientific and technological development. To deepen the combination of combat skills, it is necessary to correctly grasp the relationship between technology and tactics, art and procedures, and continuously deepen the practice of the “skill” dimension.

First, promote the tacticalization of advanced technology. Technology determines tactics, which is the basic view of dialectical materialism’s tactical theory. The evolution of the concept of multi-dimensional central warfare is also an example of technology driving the development and change of tactics. Engels once pointed out: “The entire organization and combat methods of the army and the related victory or defeat… depend on the quality and quantity of the population and on technology.” However, technology-driven tactics have a “lag effect”, especially in the absence of actual combat traction. This requires actively promoting the military transformation of advanced civilian technologies and the tactical application of advanced military technologies. On the one hand, we must actively introduce advanced civilian technologies, especially accelerate the introduction and absorption of cutting-edge technologies such as deep neural networks and quantum communication computing; on the other hand, we must strengthen tactical training of advanced technology equipment, closely combine technical training with tactical training, and promote the formation of new tactics and new combat capabilities with new equipment as soon as possible.

Second, promote the technicalization of command art. “Art” is a highly subjective concept. Some Chinese and foreign scholars believe that “the art of command is rooted in the commander’s ability to implement leadership to maximize performance”, while others believe that “the art of command is the way and method for commanders to implement flexible, clever and creative command”. Chinese and foreign scholars generally regard command as an art. The main reason is that although command has objective basis and support such as combat regulations, superior orders and technical support, the more critical factor lies in the commander’s subjective initiative and creativity, which is difficult to quantify by technical means. With the development of disciplines and technologies such as cognitive psychology and cognitive neuroscience, the cognitive structure and mechanism of command will become more explicit, the mysterious veil of “command art” will gradually fade, and the technicalization of command art will become an inevitable trend. This requires continuous strengthening of technical thinking, continuous deepening of the construction of artificial intelligence-assisted command decision-making means, continuous deepening of the application of human brain decision-making mechanisms, practical use of technology to deconstruct art, and continuous promotion of the technicalization of command art.

The third is to promote the regulation of combat technology. Many scholars place technology on a position that is almost as important as tactics. This insistence on the integrated development of tactical regulation and the regulation of specialized military technology and special combat technology is an important way to promote the systematic and standardized construction of combat regulations and further achieve the integration and unification of tactics and technology at the legal level.
              

Seeking the advantage of the “odd” dimension in combining the odd and the regular

The odd and the even are a basic contradictory structure of tactics, with inherent identity. Without the odd, there is no even, and without the even, there is no odd; either the odd or the even, ever-changing. The choice of the odd and the even is the category of decision-centered warfare, and the application of the odd and the even is the category of action-centered warfare. In the 1990s, the theories of asymmetric warfare, non-contact warfare, and non-linear warfare were proposed. If “symmetric warfare, contact warfare, and linear warfare” are even, then “asymmetric warfare, non-contact warfare, and non-linear warfare” can be called odd. From the perspective of natural science, “symmetry, contact, and linear” are general, and “asymmetry, non-contact, and non-linear” are detailed. It is an inevitable requirement to grasp the dimension of “odd” in the combination of odd, odd, and even, and to seek the advantages of the “three nons”.

First, seek “asymmetric” advantages. “Symmetry” and “asymmetry” originally refer to the morphological characteristics of things or space. Symmetrical warfare is a battle between two troops of the same type, and asymmetric warfare is a battle between two different types of troops. The theory of asymmetric warfare requires the scientific and reasonable organization of troops, combat forces and weapon systems of different military services, deployment in a wide area, and the concentration of superior forces to deal a fatal blow to the enemy at the best combat opportunity, and then quickly redeploy the forces. Due to the limited combat power, the troops have positive asymmetric advantages and negative asymmetric disadvantages. Seeking asymmetric advantages and avoiding asymmetric disadvantages is the common expectation of the warring parties, which will lead to such a situation that the warring parties cycle back and forth between symmetry and asymmetry. Therefore, to seek “asymmetric” advantages, it is necessary to seek asymmetry in combat power, combat capability, combat command and other aspects, adhere to and carry forward “avoid the strong and attack the weak, avoid the real and attack the virtual”, “you fight yours, I fight mine”, and effectively play advantages and avoid disadvantages in asymmetry. For example, when weapons and equipment are symmetrical, strive to gain an asymmetric advantage in personnel capabilities; when forces are symmetrical, strive to gain an asymmetric advantage in command art.

The second is to seek “non-contact” advantages. “Contact” and “non-contact” are a description of the distance between different things. Contact in the military field is usually defined by the projection distance of weapons. The concept of “non-contact combat” originated from World War II and was created during the Cold War. The connotation of contact combat and non-contact combat changes with the change of the striking distance of weapons and equipment. The warring parties always seek to attack each other at a farther distance or in a wider space without being threatened. Since the 1990s, the theory of “non-contact combat” has been used in many local wars. Non-contact combat is a combat action style that implements long-range precision strikes outside the defense zone while being far away from the opponent. Non-contact combat embodies the idea of winning by technology, flexible mobility, and center of gravity strikes. With the rapid development of military science and technology, the armies of major countries in the world will have the ability to perceive and strike globally, and the connotation of “non-contact” will be further compressed to space, cognitive domain and other space fields. To this end, on the one hand, we must base ourselves on the reality of “contact combat”, learn from each other’s strengths and overcome our weaknesses in contact, and continuously accumulate advantages; on the other hand, we must expand the space for “non-contact combat”, seize the initiative and seize the opportunity in non-contact, and continuously expand our advantages.

The third is to seek “nonlinear” advantages. “Linear” and “nonlinear” usually refer to people’s thinking or behavior patterns. The movement of all things in the universe is complex and mostly nonlinear, while human cognition always tends to be simple, abstract, and linear, and has invented concepts such as logic lines, time lines, and linear mathematics. In military science, the transition from linear operations to nonlinear operations reflects the development and progress of military technology theory. Since the second half of the 20th century, nonlinear operations have been on the historical stage. Some scholars have pointed out that in linear operations, each unit mainly acts in a coordinated manner along a clear front line of its own side. The key is to maintain the relative position between its own units to enhance the safety of the units; in nonlinear operations, each unit simultaneously carries out combat operations from multiple selected bases along multiple combat lines. The key is to create specific effects at multiple decision points against the target. Linear operations mainly reflect the action-centered warfare idea, while nonlinear operations mainly reflect the target-centered warfare idea. To this end, on the one hand, we must deepen the use of linear warfare and make full use of its practical value in facilitating command, coordination and support; on the other hand, we must boldly try non-linear warfare and maximize its potential advantages of extensive mobility and full-dimensional jointness. (Yin Tao, Deng Yunsheng, Sun Dongya)

現代國語:

2023-09-27 11:58:xx

來源:光明軍事
自1990年代以來,網路中心戰、人員中心戰、行動中心戰、決策中心戰等多維度的中心戰概念先後被提出。多維度中心戰概念的演變,反映了依靠軍事科技優勢尋求平台效能、資訊賦能、決策智能等優勢的總體目標,更反映了人與裝、謀與技、奇與正等方面的對立統一關係。以中心式結構化思維辯證地認識這些對立統一關係,更便於掌握其戰術的本質內涵及其方法論意義。
強化人裝結合中「人」維度融合
人員中心戰與平台中心戰概念很大程度上反映的是人與武器裝備的關係。有的專門制定人維度策略,強調在戰鬥力的人維度進行持續投入,對於應對不確定的未來是最可靠的保障。進入21世紀以來,隨著智慧化武器裝備的快速發展,無人作戰異軍突起,對人的地位作用的質疑聲音此起彼伏,強化人維度的融合、增強人維度的合力勢在必行。
一是增強精神凝聚力。馬克思主義認為,意識是客觀物質在人腦中的反映。戰術是戰鬥經驗的表現與概括,本身俱有精神或意識上的形態,研究戰術自然要把精神因素放在第一位。有學者認為,戰爭從根本上來說仍然是人類意志的較量。在資訊化時代,人的精神更加豐富複雜,增強人維度精神上的凝聚力,挑戰和難度更高。增強人的精神凝聚力,需要統籌培養集體精神與個體精神,在引領集體精神中最大限度滿足個體精神需求,在培塑集體精神價值中實現個體精神追求,用一切可用、有用的信息賦能人的精神;需要統籌培養批判精神與創新精神,堅持辯證唯物論的戰術知識論,堅決反對戰術認識上的唯心論和機械論,不斷在批判中繼承、在繼承中創新;需要統籌培養戰鬥精神與科學精神,既要弘揚視死如歸、敢打必勝的革命精神,又要發揚科學制勝、技術制勝的精神。


二是增強組織結構力。組織是軍隊的器官,人是組織的細胞。不同國家軍事組織的設置有其特性,也有其共通性。例如普遍設有國防部,區分軍種結構、層級結構與區域結構,區分平時編制與戰時編成。儘管建與戰在目的上是一致的,但是建的統一性與戰的彈性在要求上不盡相同。增強組織結構力進而促進戰建一致,需要暢通縱向指揮鏈路,合理界定指揮權與領導權、指揮權與控制權,做到政令相長,增強組織的縱向結構力;需要打通橫向協同管道,探索建立常態化的跨領域(組織、機構、部門)協同途徑,改變單純的任務式協同模式,增強組織的橫向結構力;需要健全平戰轉換機制,重點關注部隊領導權或指揮權變更中組織銜接、調整和健全等工作,保持組織結構網絡的穩定性、可靠性。
三是增強物質保障力。戰鬥中人的精神力量可以轉化為物質力量,但精神力量也離不開物質力量的支撐。增強物質保障力進而實現物質與精神的有機統一,需要像為決策保障情報、為槍砲保障彈藥、為車輛保障油料一樣,保障好戰鬥裝具、被裝、伙食、醫療,建設好學習場地、訓練設施和再教育渠道,提供好戰條令、生理醫學等方面技術服務,幫助設計多樣化個人化的能力提升計劃、職業發展規劃,為發展人的體能、技能和智能,進而全面提高人在未來不確定性戰場環境中的適應性和戰鬥力,提供堅強的物質和技術支撐。

深化戰技結合中「技」維度實踐
戰技結合是戰術運用的重要原則。其中的技術不僅包括實務操作層面的技術(如射擊技術),也包括理論應用層面的技術(如資訊科技)。可以認為,戰術、技術、藝術和程序共同構成了其「戰鬥方法論」。科學技術化和技術科學化是科學技術發展的重要特徵。深化戰技結合,需要正確掌握技術與戰術、藝術、程序的關係,不斷深化「技」維度實踐。


一是推動先進技術戰術化。技術決定戰術,是辯證唯物論戰術論的基本觀點。多維度中心戰概念的演變,也是技術推動戰術發展變革的例子。恩格斯曾指出:“軍隊的全部組織和作戰方式以及與之有關的勝負……,取決於居民的質與量和取決於技術。”然而,技術推動戰術具有“滯後效應”,尤其在缺少實戰牽引的情況下。這就需要主動推進先進民用技術的軍事轉化和先進軍事技術的戰術應用。一方面,要積極引進民用先進技術,尤其要加速推進深度神經網路、量子通訊運算等尖端技術的引進吸收;另一方面,要加強先進技術裝備戰術訓練,把練技術與練戰術緊密結合起來,推動新裝備盡快形成新戰術和新戰力。
二是推動指揮藝術技術化。 「藝術」是一個具有較強主體性的概念。中外學者有的認為“指揮藝術根植於指揮官實施領導以最大限度提高績效的能力”,有的認為“指揮藝術是指揮官實施靈活巧妙和富有創造性指揮的方式與方法”。中外學者普遍將指揮視為藝術,主要原因在於:指揮儘管有作戰條令、上級命令和技術保障等客觀方面的依據和支撐,但更關鍵的因素在於指揮員的主觀能動性和創造性,而這是比較難以用技術手段加以量化的。隨著認知心理學、認知神經科學等學科和技術的發展,指揮的認知結構和作用機制將更加顯性化,「指揮藝術」的神秘面紗將逐漸退去,指揮藝術技術化將會成為必然趨勢。這需要不斷強化技術思維,持續深化人工智慧輔助指揮決策手段建設,持續深化人類大腦決策機理運用,切實用技術解構藝術,不斷推動指揮藝術技術化。


三是推動戰鬥技術條令化。不少學者把技術置於與戰術近乎同等重要的地位。這種堅持戰術條令化與兵種專業技術和專門戰鬥技術條令化的融合發展,是推動戰鬥條令體系化規範化建設,進而實現戰術與技術在法規層面融合統一的重要途徑。

謀求奇正結合中「奇」維度優勢
奇與正是戰術的一種基本矛盾結構,具有內在同一性。無奇便無正,無正也無奇;或奇或正,千變萬化。奇與正的選擇是決策中心戰的範疇,奇與正的運用是行動中心戰的範疇。 1990年代,非對稱作戰、非接觸作戰、非線式作戰理論被提出。若稱「對稱作戰、接觸作戰、線式作戰」為正,則可稱「非對稱作戰、非接觸作戰、非線式作戰」為奇。從自然科學角度來看,「對稱、接觸、線式」是概述的,「非對稱、非接觸、非線式」是詳實的。把握好奇正結合中「奇」的維度,謀取「三非」優勢是必然要求。
一是謀取「非對稱」優勢。 「對稱」與「非對稱」本來是對事物或空間的形態特徵的指稱。對稱作戰是兩種相同類型部隊之間的交戰,非對稱作戰是兩種不同類型部隊之間的交戰。非對稱作戰理論要求對不同軍兵種部隊、作戰力量和武器系統進行科學合理編組,在寬廣的地域展開部署,在最佳的作戰時機集中優勢力量給敵人以致命的打擊,然後迅速重新部署力量。由於作戰力量的有限性,部隊有正面的非對稱優勢,就有負面的非對稱劣勢。謀取非對稱優勢、規避非對稱劣勢是交戰雙方的共同期望,進而造成這樣一種局面──交戰雙方在對稱與非對稱之間往復循環。因此,謀取“非對稱”優勢,要謀取作戰力量、作戰能力、作戰指揮等多方面上的非對稱,堅持和發揚“避強擊弱、避實擊虛”“你打你的,我打我的”,在非對稱中有效發揮優勢、規避劣勢。例如,在武器裝備對稱時爭取佔據人員能力上的非對稱優勢,在力量對稱時爭取佔據指揮藝術上的非對稱優勢。
二是謀取「非接觸」優勢。 「接觸」與「非接觸」是對不同事物之間距離狀態的一種描述。軍事領域的接觸通常是以武器的投射距離來界定的。 「非接觸作戰」的概念起源於二戰,產生於冷戰時期。接觸作戰與非接觸作戰的內涵是隨著武器裝備打擊距離的改變而改變的。交戰雙方也總是謀求在免受威脅的更遠距離或更廣空間攻擊對方。自1990年代以來,「非接觸作戰」理論在多場局部戰爭中被運用。非接觸作戰是在遠離對方的情況下實施防區外遠程精確打擊的作戰行動樣式。非接觸作戰體現了技術制勝、靈活機動、重心打擊的思想。隨著軍事科技的快速發展,世界主要國家軍隊將具備全球感知和全球打擊的能力,「非接觸」的內涵將進一步壓縮至太空、認知域等太空領域。為此,一方面要立足「接觸作戰」實際,在接觸中取長補短、固強補弱,不斷積蓄勝勢;另一方面要拓展「非接觸作戰」空間,在非接觸中搶抓先手、搶佔先機,不斷拓展優勢。
三是謀取「非線式」優勢。 「線式」與「非線式」通常是指人的思維或行為模式。宇宙萬物運動是複雜的,大抵是非線式的,而人類的認知總是傾向於簡單的、抽象的、線式的,並發明了邏輯線、時間線以及線性數學等概念。軍事學中,從線式作戰到非線式作戰,反映了軍事技術理論的發展進步。 20世紀下半葉起,非線作戰就登上歷史舞台。有學者指出,線式作戰中各部隊主要沿著明確的己方前沿協調一致行動,關鍵是保持己方部隊之間的相對位置,以增強部隊的安全性;非線式作戰中各部隊從選定的多個基地沿多條作戰線同時實施作戰行動,關鍵是針對目標在多個決定點製造特定效果。線式作戰體現的主要是行動中心戰思想,非線式作戰體現的主要是目標中心戰思想。為此,一方面要深化運用線式作戰,充分利用其便於指揮、協同和保障的實用價值;另一方面要大膽嘗試非線式作戰,最大限度地發揮其廣泛機動、全維聯合的潛在優勢。 (殷濤、鄧雲生、孫東亞)

中國原創軍事資源:http://www.81it.com/2023/0927/14581888.html

Cognitive Domain Warfare The New Main Chinese Battlefield for Language Confrontation

認知領域戰爭:中國語言對抗的新主戰場

現代英語:

Cognitive domain warfare refers to the important form of public opinion propaganda, psychological attack and defense, winning people’s hearts, subverting confidence, influencing beliefs, fighting for thinking, and ideological struggle, guided by modern cognitive theory and science, calling on multi-domain means such as public opinion, psychology, and law, and using multi-dimensional technologies such as modern networks, media, text, pictures, videos, and numbers, aiming to fight for people’s initiative in thinking, beliefs, values, personal attitudes, emotions, identification, and judgment tendencies. Cognitive domain warfare is a complex collection of traditional public opinion warfare, psychological warfare, legal warfare, trade warfare, diplomatic warfare, scientific and technological warfare, ideological warfare, and other multi-domain warfare.

At present, cognitive domain warfare has become an important support for countries to carry out military struggles and struggles in other fields. Language confrontation driven by cognitive domain goals has become an important form of cognitive domain warfare and deserves high attention.

Language confrontation: a new area for exerting influence on combat targets

Cognitive domain operations are a result of the development of contemporary cognitive science research. They are an emerging field of operations that emerged after people actively explored the cognitive activities of the brain to gain a more complex, abstract and thorough understanding of the brain. They are also a high-end form of influence in language confrontation that targets the advanced, deep and hidden activities of the audience’s brain. Whether it is the object of information action, the producer of information, the information content itself or the channel of information, cognitive domain operations are all permeated with cognitive characteristics, and always emphasize taking action at the cognitive level.

In terms of the recipients of information, this cognition targets the deep cognitive aspects of the opponent’s audience, including its people, military, military commanders or important leaders, important figures in the political and business circles, and even directly includes the leaders of the other country or specific important generals of the army, etc. It can also be a specific group of people or the public. It can involve the cognitive preferences, cognitive shortcomings, cognitive habits, cognitive biases, and cognitive misunderstandings of individuals or groups; it can also be the beliefs, values, political identity, national identity, social and cultural identity, and emotional attitudes of individuals and groups.

From the perspective of the distributor and content of information, it should be infused with the cognitive design and arrangement of the information producer, which includes the unique cognition of the text, such as the discourse mode of the text, the narrative mode of the text, the observation perspective of things, the cognitive focus and depth of the narrative, the organization form of the sentence, the value concept and other tendencies of the sentence, the acceptability of the concept of the sentence to the other party, etc.

In terms of the channels for information issuance and dissemination, the form of text is closer to multimedia and multimodal forms, closer to the needs of cyberspace, closer to the advantages of contemporary smart phones, and closer to the characteristics of the current emerging media era, that is, it is more in line with the cognitive characteristics, cognitive habits and cognitive tendencies accepted by the audience. The dissemination form of text fully considers the cognitive effects in international communication, especially cross-cultural, cross-linguistic, cross-media and cross-group cognitive communication. In this way, the text will better influence the audience from a cognitive level.

Language confrontation responds to changes in combat styles and generates new tactics

Throughout human history, it is not difficult to find that the style of military struggle has been constantly changing. From the initial physical struggle with cold weapons to the contest of hot weapons and mechanical forces, and then to the balance and counter-balance of information capabilities under high-tech warfare conditions, in recent years, it has developed towards the intelligent decision-making competition in the direction of intelligence and unmanned. Each change has brought profound changes in tactics. In the current transitional stage of coexistence of mechanization, informatization and intelligence, people not only pay attention to the competition for dominance in the physical and information domains of the battlefield, but also pay more attention to the control of the cognitive domain that affects the main body of war, that is, the competition in the fields of thinking, cognitive patterns and styles, values, emotional attitudes, cultural models, communication patterns, psychological strengths and weaknesses, cognitive preferences, cultural and knowledge maps, and ideological identity of the personnel on both sides of the war. The latter involves the basic situation of social personnel and social existence, that is, the emerging field of cognitive domain warfare, and its tactics have strong particularity.

Flexibility of topics: Cognitive domain operations can select many topics in the cognitive domain and carry out flexible and flexible combat operations. According to the current situation and needs, topics can be selected from the relatively macroscopic strategic level (such as the ideology and system of the opponent’s entire society, etc.), the mesoscopic campaign level (such as social problems in the local field or direction of the opponent’s society: social welfare policy or environmental protection policy, etc.), and very microscopic tactical issues in society (such as the unfairness, injustice, and non-beautiful side of society reflected by a certain person or a specific event). Macro, meso, and micro cognitive domain issues are interconnected and transformed into each other. It is very likely that a microscopic topic will also become a major macroscopic strategic topic. The raising of issues depends on the relationship with the entire military operation. Cognitive domain operations should be subject to the overall combat operations and serve the needs of the macroscopic political and diplomatic situation. More importantly, topics should be prepared in peacetime, and data on various topics should be collected in peacetime, especially paying attention to various important data in the real society. Once needed, these data can be quickly transformed into arrows, bullets, and shells shot at the enemy’s cognitive domain, and even become strategic weapons that affect the overall situation.

Controllability of the operational level: The important design of cognitive operations is that it can be controlled and regulated as a whole at the operational level, and can be upgraded or reduced in dimension according to changes in the situation. If it is necessary at the strategic level, the commander can open the strategic level design and force investment; if it is necessary at the campaign level, it can also be controlled at the corresponding campaign level; if it is only necessary at the level of specific small problems, it can also be controlled at the corresponding niche local level, so that the entire action serves the needs of the overall combat operation. The strategic campaign tactics here refer more to operational design and force investment. Since the battlefield situation may change rapidly, some issues may also change at the level, with strategic issues affecting the effects of the campaign and tactical levels; some issues, due to the particularity of tactical issues, become campaign and strategic level issues that affect the overall situation.

Dominance of emerging media: The main influence channel of cognitive domain has shifted from traditional paper media and print media to emerging media. Traditional media mainly rely on single media, such as newspapers, magazines, books, flyers, posters, etc. to convey information; the emergence of television in the later period brought three-dimensional media. In the Internet era, especially the Internet 2.0 era and the birth of smart communication devices, people rely more on multi-media, multi-modal, short videos and short texts to convey information. The introduction of various advanced devices such as smart phones, smart tablets, smart players, and the birth of various emerging social software and tools have made emerging media the main tool for people to communicate and exchange. Emerging media, emerging social software and tools have become an important space for various forces to play games and struggle in social security, public opinion security, ideological security, social security and political security. Internet security, especially whether the security of new social media, emerging social software and tools can be mastered, is, to some extent, the key to whether a country’s cognitive domain can be secure. Information in emerging media tools and new media space has become the main battlefield, main position and main space for competition in cognitive operations of various countries. It is worth pointing out that ideas and theories that influence people’s cognition will become the most influential weapons at all levels of cognitive domain operations.

Language confrontation adapts to the intelligent era, cognitive computing enhances new computing power

In the era of artificial intelligence, based on the substantial improvement in big data analysis and application, supercomputing capabilities, intelligent computing capabilities, natural language processing capabilities, smartphone communication capabilities, and new generation network communication capabilities, humans have begun to accurately model and analyze language culture, psychological cognition, group emotions, and social behavior for the entire society, the entire network domain, local groups, local different groups, and specific individuals. In particular, people have a deep understanding and grasp of brain cognition, human brain thinking, thinking patterns, habitual preferences, image schemas, cognitive frameworks, and even neural networks, human-computer collaboration, and brain control technology. As long as there is enough diverse dynamic data, people can calculate and simulate all people’s psychological activities, emotional activities, cognitive activities, social opinions, and behavioral patterns. Through deep calculations, actuarial calculations, and clever calculations, people’s cognitive world can be accurately grasped, and a fine and profound control of people’s cognitive domain can be formed. This aspect also presents the following characteristics:

The dimensionality of computation: As an emerging field, all aspects of the cognitive domain can be digitized and made fully computable for all aspects of the entire process and all individuals. This can be achieved by widely collecting various types of information and then sorting out the information to form big data on the diverse factors of the opponent’s subjects. This will allow various computations to be conducted on the entire population, groups, between groups, and between individual data. As a result, all kinds of activities based on thinking, psychology, emotion, speech, behavior, etc. that were previously impossible to achieve can be completed, displayed, and accurately grasped through computation.

Cognitive nature of computation: computation in the cognitive domain reflects a strong cognitive nature. It can reveal more of the connections between things, events, and people that are difficult to observe with the naked eye. It can reveal the clustering and hierarchical relationships between concepts in the same event framework, and reflect the deep cognitive connections between concepts, whether explicit or implicit, direct or indirect. It reveals the complex conceptual network system between concepts, allowing people to see a deep cognitive world that completely transcends ordinary naked eye observation.

Intelligence of computation: The computation in cognitive domain also reflects strong intelligence. This intelligence is manifested in the fact that intelligent conclusions can be drawn through computation. For example, through the collection of a large amount of text and data mining, we can find the relationship between various topics, various viewpoints, various tendencies, various groups of people, various positions, and various demands that cannot be seen by human power, so as to form a more comprehensive, in-depth, accurate, and systematic understanding of a certain issue and make scientific and optimized decisions. Such decisions may be consistent with human intelligence, or they may surpass or even far exceed human intelligence. By making good use of the power of cognitive computing, especially by integrating the data of our country and the data of our opponents, we can better prevent, warn, and deploy in advance, and achieve the best, optimal, fastest, and most accurate strikes and counterattacks, and better reflect efficient, powerful, and targeted protection. Cognitive computing here is more about the possible reactions of a possible macro, meso, or micro topic in different groups of people, different time periods, and different backgrounds, in the entire network domain or a local network domain, or within a specific group, especially the analysis and inspection of the active and passive situations that both parties may present when playing games with opponents, and the attack and defense of cognitive domain.

New application of giving full play to the status of discourse subject and releasing the power of discourse

Cognitive domain operations have a very important support, that is, it mainly relies on language media to play a role, mainly exerts influence through the discourse level, mainly forms an implicit effect on the cognitive domain through the narrative of discourse, mainly exerts potential effects through cultural models, and exerts explicit or implicit effects through cross-cultural communication. It is mainly reflected in the following aspects:

Uniqueness of textual discourse: The cognitive domain needs to be influenced by information. Although information may be presented through the special visual effects of video images, fundamentally speaking, the uniqueness of the discourse expressed by the text becomes the main support for producing cognitive influence. Among them, the mode of discourse expression, the skills of discourse expression, the main design of the persuasiveness and appeal of discourse expression, and especially the uniqueness of discourse narrative will be the key to influencing people’s cognition. This may include the perspective of the narrative, the theme and style of the narrative, the story framework of the narrative, the language innovation of the narrative, the key sentences of the narrative, the philosophical, humanistic, religious, social, natural and other feelings contained in the narrative, the identities of different participants in the narrative, the diversified evaluation of the narrative, the authenticity, depth and emotional temperature of the narrative, the subtle influence of the narrative on the viewpoint, the personal emotions, values, ideology, and position evaluation released by the narrative. The uniqueness of textual discourse is an important reliance for cognitive domain operations to exert cognitive influence through text. Making full use of the complexity of the text, giving play to the respective advantages of diverse texts, and giving play to the role of implicit and explicit cognitive influence of the text connotation have become the key to cognitive domain operations of textual discourse. The most important thing is to innovate the text discourse, win readers with newer words, more novel expressions, and more unique expressions, so that readers can understand and feel the ideas in the text imperceptibly, and accept the ideas of the text silently.

Potentiality of cultural models: In cognitive domain operations, we must deeply grasp the characteristics and models of different countries and national cultures. Different countries and different nationalities have different cultural models. Their philosophical thinking, traditional culture, religious beliefs, customs, and ways of thinking are all obviously different. Citizens of different cultures also have different national psychology and national cognitive models. They should also have typical cognitive preferences belonging to their own national culture, as well as corresponding shortcomings and weaknesses. Some of them obviously have a huge difference in understanding from other nationalities in their own country, and even misunderstandings and hostility. Therefore, cognitive domain operations at the cultural level are to grasp the overall cultural models of different countries, build cultural models of different groups in different countries, build different cognitive models of different countries on different things, and fully grasp the overall attitude and behavior of a country on a series of things and issues, especially for some typical cases, cultural taboos, religious requirements, spiritual pursuits, and overall concepts. With the help of existing theories and discoveries, we should comprehensively construct the basic performance of different groups of people in the cognitive field on some typical problems, sensitive problems, and important problems, so as to provide important reference and guidance for the next step of cognitive operations. Strengthening the study of the cultural patterns of different enemy personnel, especially military personnel, personnel in key positions, including the study and construction of the basic cultural characteristics and models of enemy generals, officers, soldiers, etc., such as the character’s psychological cognitive behavior and cultural model portrait, has become the core practice of cognitive domain operations. The cognitive analysis of ordinary enemy personnel, especially the general public, citizens, and specific groups, including special non-governmental organizations, is also of great value.

Cross-cultural strategic communication: Cognitive domain operations are international language and cultural communications, and need to follow the laws of international communication. We must grasp the basic paradigm of international communication, skillfully combine our own stories with international expressions, and skillfully combine the other party’s language and culture with our own stories and ideas; we must be good at combining different art forms, including text, pictures, paintings, music (sound), video and other means or multimodal means to achieve international communication of information. At the same time, we must coordinate multi-dimensional macro communication at the strategic level: we must use various means to carry out communication through military-civilian integration, military-civilian coordination, and military-civilian integration; in addition to non-governmental organizations, we must especially rely on civilian forces, experts, opinion leaders, and ordinary people to help the military carry out cognitive domain operations; we must unify the setting of topics, speak out in multiple locations and dimensions, form a strategic communication situation, and form a good situation for emergency solutions for major actions, major issues, and major crisis management, form a good public opinion atmosphere, create positive effects, and eliminate or extinguish adverse effects. In particular, we must establish a capable team that is proficient in foreign languages, understands cross-cultural skills, knows the laws of international communication, and can speak out skillfully on international multi-dimensional platforms. These people can usually conduct extensive topic perception, information collection and discussion, and use common or special topics to build personal connections and establish fan communities. More importantly, at critical moments, they can exert influence through their fan groups and complete strategic communication tasks.

At present, with the prevalence of hybrid warfare, multi-domain warfare and global warfare, cognitive domain warfare has become a common means of mixing and blending. The process of cognitive domain warfare from unfamiliarity, emerging, development to growth is also the advanced stage, complex stage and upgraded stage of the development of traditional public opinion warfare, psychological warfare and legal warfare. Its rise is more deceptive, ambiguous, concealed, embedded, implanted and unobservable, especially considering its deep integration with the entry of contemporary emerging media, and it is constantly learning and drawing on new ideas, new technologies and new means that integrate into multiple disciplines, cross-disciplines and cross-disciplinary disciplines. As a result, cognitive domain warfare has become a form of warfare that we must be highly vigilant and guard against. (Liang Xiaobo, professor and doctoral supervisor at the College of Arts and Sciences of the National University of Defense Technology)

[This article is a phased result of the National Social Science Fund Major Project “National Defense Language Capacity Building in the Perspective of National Defense and Military Reform”]

(Source: China Social Sciences Network)

(Editors: Chen Yu, Huang Zijuan)

現代國語:

認知域作戰指的是以現代認知理論和科學為指導,調用輿論、心理、法律等多域手段,運用現代網絡、傳媒、文字、圖片、視頻、數字等多維技術,開展輿論宣傳、心理攻防、人心爭取、信心顛覆、信仰影響、思維爭奪以及意識形態斗爭的重要形式,意在爭奪人們在思維、信仰、價值觀、個人態度、情感、認同與評判傾向方面主動權。認知域作戰是傳統輿論戰、心理戰、法律戰及貿易戰、外交戰、科技戰、思想戰等多域戰的復合集合體。

當前,認知域作戰已成為國家間開展軍事斗爭和其他領域斗爭的重要依托,認知域目標驅動的語言對抗已經成為認知域作戰的重要形式,值得高度關注。

語言對抗針對作戰對象施加影響的新領域

認知域作戰是當代認知科學研究發展的伴隨結果,是人們積極探索大腦認知活動獲得對大腦更為復雜更為抽象更為透徹的理解后產生的一種新興作戰領域,更是語言對抗以受眾大腦的高級深層隱性活動為作用對象的高端影響形式。不管是從信息作用的對象、信息的生產者、信息內容本身還是信息的渠道,認知域作戰都無不貫穿了認知的特點,自始至終都突出從認知層面開展行動。

從信息的接受對象來說,這個認知針對的是對手受眾大腦深層的認知方面,包括其民眾、軍隊、軍事指揮員或者重要領導、政界商界的重要人物,甚至直接包括對方國家領導人或者軍隊的特定重要將領等,也可以是特定的人群或者民眾。它可以涉及個人或者群體的認知偏好、認知短板、認知習慣、認知偏差、認知誤區﹔也可以是個人和群體的信仰、價值觀念、政治認同、民族認同以及社會和文化認同與情感態度。

從信息的投放者和內容來說,它應該是注入了信息生產者的認知設計和安排,這個包括文本的獨特認知性,比如文本的話語模式、文本的敘事模式、事物的觀察視角、敘事的認知焦點與深度、語句的組織形式、語句的價值觀念等傾向性、語句的概念的對方可接受性等。

從信息發出和傳播的渠道來說,文本的形式更加貼近多媒體多模態形式,更加貼近網絡空間的需要,更加貼近當代智能手機的優勢,更加貼近當下新興媒體時代的特點,也就是更加符合受眾接受的認知特點認知習慣和認知傾向。文本的傳播形式充分考慮國際傳播中的認知效果,特別是跨文化、跨語言、跨媒體、跨群體的認知傳播。如此,文本將會從認知層面,更好地對受眾施加影響。

語言對抗應對作戰樣式變革生成新戰法

縱觀人類歷史,我們不難發現,軍事斗爭的樣式一直在不斷變化。從最初的借助冷兵器的體力纏斗發展成為熱兵器機械力量的較量,又發展成為高科技戰爭條件下的信息化能力的制衡與反制衡,近年來又向著智能化無人化方向的智能決策比拼發展,每一次變革都帶來深刻的戰法變化。當下的機械化信息化智能化的共處過渡階段,人們不僅重視戰場的物理域和信息域主導權的爭奪,更重視影響戰爭主體——人的認知域的掌控,也就是作戰雙方人員的思維方式、認知模式與風格、價值觀念、情感態度、文化模型、溝通模式、心理強弱項、認知偏好、文化與知識圖譜、意識形態認同等領域的爭奪。后者涉及社會人員和社會存在的基本態勢,也就是認知域作戰施加影響的新興領域,其戰法有著強烈的特殊性。

議題靈活機動性:認知域作戰可挑選認知域的諸多議題,開展靈活機動的作戰行動。議題根據當下的情況與需要,既可以選擇涉及較為宏觀的戰略層面(如對方全社會的意識形態與制度等),也可以選擇中觀的戰役層面(如對方社會局部領域或方向的社會問題:社會福利政策或環境保護政策等),還可以選擇涉及社會中非常微觀的戰術問題(如某個人、某個具體事件所折射出的社會的非公平、非正義、非美好的一面)。宏觀、中觀、微觀的認知域問題相互聯系、相互轉化,很有可能一個微觀的議題也會成為一個宏觀的重大戰略性議題。而問題的提出要視與整個軍事行動的關系,要使認知域作戰服從於全局的作戰行動,服務於宏觀的政治、外交大局的需要。更為重要的是,議題要准備在平時,要把各種議題的數據收集在平時,特別是要關注現實社會中的各種重要數據。一旦需要,這些數據就可以迅速轉變為射向敵方認知域的箭頭、子彈、炮彈,甚至成為影響全局的戰略性武器。

作戰層次可控性:認知作戰其重要的設計是,在作戰的層面上,是整體可以控制的,也是可以調控的,可以根據形勢的變化,做出相應的升級或者降維。如果需要戰略層面的,指揮人員可以開通戰略層面的設計和力量投入﹔如果需要戰役級別的,也可以控制在相應戰役層面﹔如果僅僅需要是在特定的小問題層面,也可以將其控制在相應的小眾局域層面,使得整個行動服務於整體作戰行動的需要。這裡的戰略戰役戰術,更多的指的是作戰設計和力量的投入。由於戰場態勢可能瞬息萬變,有些議題也有可能在層級上發生變化,由戰略性的議題影響到戰役和戰術級的效果﹔有些議題,則由於戰術議題的特殊性,成為影響全局的戰役戰略級議題。

新興媒介主導性:認知域的主要影響渠道,已經從傳統的紙質媒體和平面媒體轉向了新興媒體。傳統媒介主要依靠單一媒介,如報紙、雜志、書籍、傳單、海報等來傳遞信息﹔后期電視的產生帶來了立體媒體。到了互聯網時代,特別是互聯網2.0時代和智能通訊設備的誕生,人們更加依靠多媒介、多模態以及短視頻、短文本的形式來傳遞信息。各種智能手機、智能平板、智能播放器等高級設備的推陳出新,各種新興社交軟件和工具的誕生,使得新興媒體成為當下人們開展溝通和交流的主要工具。新興媒體、新興社交軟件和工具已經成為當下各種力量在社會安全、輿論安全、意識形態安全、社會安全和政治安全展開博弈和斗爭的重要空間。互聯網安全,特別是能否掌握住新型的社交媒體、新興社交軟件和工具等的安全,在某種程度上說,是一國認知域能否安全的關鍵。新興媒體工具和新型媒體空間的信息已經成為各個國家認知作戰的主戰場、主陣地和主要爭奪空間。值得指出的是,左右人們認知的思想和理論將成為認知域作戰各層面的最為有影響力的武器。

語言對抗適應智能時代認知計算增強新算力

人工智能時代,在大數據分析與運用、超級計算能力、智能計算能力、自然語言處理能力、智能手機傳播能力以及新一代網絡通信能力大幅提高的基礎上,人類已經開始可以對全社會、全網域、局部群體、局部不同群體以及特定個體開展精准的語言文化、心理認知、群體情感、社會行為建模和分析。特別是人們對大腦認知、人腦思維、思維模式、習慣偏好、意象圖式、認知框架、乃至神經網絡、人機協同、腦控技術等的深刻認識和把握,隻要有足夠多樣化的動態數據,人們就可以把人們的心理活動、情感活動、認知活動、社會輿論以及行為方式等全部計算模擬出來,通過深算、精算、妙算,可以精准地把握人們的認知世界,形成對人們認知域的精細和深刻的掌控。這方面又呈現以下特征:

計算的全維性:認知域作為一個新興領域,其涉及的方方面面都可以被數據化並實現全方位全過程全個體可計算,可以通過廣泛的收集各類型信息,經過信息梳理進而可體現為關於作戰對手主體因素多樣化的大數據,從而可以就此開展面向全體、群體、群體之間以及個體數據及其之間的各種計算,由此,以往無法實現的基於思維、心理、情感、言論、行為等方面的各種活動都可以通過計算來完成、展示和精准把握。

計算的認知性:認知域的計算體現了了強烈的認知性,它更多地可以揭示各種事物、事件、人物之間的難以用肉眼觀察到的關聯關系,可以揭示同一事件框架中各種概念之間的聚類和層級關系,體現各概念之間或明或暗、或直接或間接的深層認知聯系,揭示概念之間的復雜概念網絡體系,使人們看到完全超越一般肉眼觀察的深層認知世界。

計算的智能性:認知域的計算又體現了強烈的智能性。這種智能性表現為通過計算,會得出具有智慧性的結論。譬如可以通過大量文本收集和數據挖掘,尋找人工力量受限而看不到的各種主題、各種觀點、各種傾向、各種人群、各種立場、各種訴求之間的關系,形成對某一問題的更為全面、縱深、精確、系統的認識,做出科學優化的決策。這類決策既可能是與人類智能相符,也可能是超越甚至遠遠勝過人類的智能。運用好認知計算的力量,特別是綜合本國的數據和對手的數據,可以更好地做到提前預防、提前預警、提前開展布局,並能夠實現最好最優最快最精准地打擊和反擊,也能夠更好地體現高效有力有針對性的防護。這裡的認知計算,更多的是對某一可能的宏觀中觀或微觀的議題在不同人群、不同時間段、不同背景下,在全網域或者某一局域網域、某一特定群體內部可能產生的反響,特別是對與對手展開博弈時雙方可能呈現的主動、被動的態勢開展分析和檢視,對認知域的攻防等。

發揮話語主體地位釋放話語力量的新運用

認知域作戰有一個非常重要的依托,就是它主要依托語言媒介來發揮作用,主要通過話語層面來施加影響,主要通過話語的敘事性來形成對認知域的隱性作用,主要通過文化模式來施加潛在作用,通過跨文化的傳播來施加或明或暗的作用。其主要體現為以下方面:

文本話語獨特性:認知域是需要用信息來施加影響的。盡管信息可能依托視頻圖片的特殊視覺效果來展現,但從根本上說,文本所綜合表達話語的獨特性成為產生認知影響的主要依托。這其中,話語表達的模式、話語表達的技巧、話語表達說服力和感染力的主要設計,特別是話語敘事獨特性將是影響人們認知的關鍵。這可能會包括敘事的視角,敘事的主題、風格,敘事的故事框架,敘事的語言創新,敘事的關鍵語句,敘事蘊含的哲學、人文、宗教、社會、自然等情懷,敘事的不同參與者身份,敘事的多樣化評價,敘事的真實度、深度和情感溫度,敘事對於觀點的潛移默化影響作用,敘事釋放的個人情感、價值觀念、意識形態、立場評價等。文本話語的獨特性,是認知域作戰以文本施加認知影響的重要依靠。充分利用文本的復雜性,發揮多樣化文本各自優勢,發揮文本內涵的隱性和顯性認知影響的作用,已經成為文本話語認知域作戰的關鍵。其中最為重要的,就是要創新文本話語,用更加嶄新的話語、更加新奇的表述,更加獨特的表達來贏得讀者,使讀者了解並在潛移默化中感受文本中的思想,並在無聲無息中接受文本的思想。

文化模式潛在性:認知域作戰,一定要深刻把握不同國家和民族文化的特點和模式。不同國家、不同民族,其文化的模型不一樣,哲學思維、傳統文化、宗教信仰、風俗習慣、思維方式皆有明顯不同﹔不同文化下的國民,也有著不同樣的民族心理、民族性的認知模式,還應該有典型的屬於本民族本文化的認知偏好,也有相應的短處與弱點,有的還明顯存在與本國其他民族有巨大差異的認識,甚至還有誤解和敵意。因此,認知域作戰在文化層面,就是要把握好不同國家的總體文化模型,建設不同國家不同群體的文化模型,建設不同國家在不同事物上的不同認知模型,充分把握某一國家在一系列事物和議題上的總體態度和行事方式,特別是針對一些典型案例、文化禁忌、宗教要求、精神追求、總體觀念等。要借助現有理論和發現,綜合構建在認知領域不同人群對一些典型問題、敏感問題、重要問題的基本表現,為下一步開展認知作戰提供重要的參考和指導。加強對敵方不同人員的文化模式研究,特別是軍隊人員,重點崗位的人員,包括對方將領、軍官、士兵等的基本文化特點和模型的研究與構建,譬如人物心理認知行為與文化模型畫像,已經成為認知域作戰的核心做法。對對方普通人員,特別是一般國民、市民的認知模式,以及特定人群,包括特殊的非政府組織力量等的認知分析,也同樣具有重要價值。

跨文化戰略傳播性:認知域作戰,是面向國際的語言傳播和文化傳播,需要遵循國際傳播的規律。要把握好國際傳播的基本范式,要把本國故事與國際表達巧妙結合,要將對方語言與文化和本國的故事與思想巧妙結合﹔要善於結合不同的藝術形式,包括文字、圖片、繪畫、音樂(聲音)、視頻等手段或者多模態的手段來實現信息的國際傳播。同時,還要在戰略層面統籌多維宏觀的傳播:要利用各種手段,依靠軍民融合軍民協同軍民一體開展傳播﹔除了非政府組織之外,特別是要依靠民間力量,依靠專家、意見領袖、普通民眾來幫助軍隊來開展認知域作戰﹔要統一設置議題,多點多位多維發聲,形成戰略傳播態勢,為重大行動、重大議題、重大危機管控等形成應急解決的良好態勢,形成良好輿論氛圍,營造積極效應,消除不利影響或者扑滅不利影響。特別是要建立一支能夠精通外語、懂得跨文化技巧、知曉國際傳播規律、能在國際多維平台巧妙發聲的精干隊伍。這些人員平時可以開展廣泛的議題感知、收集和討論,借助普通議題或者特殊議題建立人脈關系,建立粉絲群落﹔更重要的是,在關鍵時刻,通過他們的粉絲群體,施加影響,完成戰略傳播任務。

當前,隨著混合戰多域戰全域戰的大行其道,認知域作戰已經成為雜糅其間、混合其間的常用手段,認知域作戰由陌生、新興、發展到壯大的歷程,更是傳統輿論戰、心理戰、法律戰發展的高級階段復雜階段升級階段。它的興起,更具有欺騙性、模糊性、隱蔽性、嵌入性、植入性和不可觀察性,特別是考慮它與當代新興媒體進場深度接軌深度融合,而且還不斷學習借鑒融入多學科、跨學科、交叉學科的新思想、新技術、新手段。由此,認知域作戰已然成為我們必須高度警惕高度提防的作戰形式。(國防科技大學文理學院教授、博士生導師梁曉波)

【本文系國家社科基金重大項目“國防與軍隊改革視野下的國防語言能力建設”階段性成果】

(來源:中國社會科學網)

(責編:陳羽、黃子娟)

2022年05月17日10:xx | 

中國原創軍事資源:https://military.people.com.cn/BIG5/n1/2022/0517/c1011-32423539888.html

Chinese Military to Utilize Artificial Intelligence Empowering Cognitive Confrontation Success on the Modern Battlefield

中國軍隊將利用人工智慧增強現代戰場認知對抗的成功

現代英語:

With the advent of the “smart +” era, artificial intelligence is widely used in the military field, and conventional warfare in physical space and cognitive confrontation in virtual space are accelerating integration. Deeply tapping the potential of artificial intelligence to empower cognitive confrontation is of great significance to improving the efficiency of cross-domain resource matching and controlling the initiative in future operations.

Data mining expands the boundaries of experience and cognition

Data-driven, knowing the enemy and knowing yourself. With the advancement of big data-related technologies, data information has become cognitive offensive and defensive ammunition, and information advantage has become increasingly important on the battlefield. Empowering traditional information processing processes with artificial intelligence technology can enhance the ability to analyze related information, accelerate information integration across domains through cross-domain data collection and false information screening, and enhance dynamic perception capabilities. Artificial intelligence can also help alleviate battlefield data overload, organically integrate enemy information, our own information, and battlefield environment information, and build a holographic intelligent database to provide good support for cognitive confrontation.

Everything is connected intelligently, and humans and machines collaborate. Modern warfare is increasingly integrated between the military and civilians, and the boundaries between peace and war are blurred. Technology has redefined the way people interact with each other, people with equipment, and equipment with equipment, and battlefield data is constantly flowing. Through big data mining and cross-domain comparative analysis, unstructured data such as images, audio, and video can be refined, and the truth can be retained to expand the boundaries of experience cognition and improve the level of human-machine collaboration. The in-depth application of the Internet of Things and big data technologies has promoted the continuous improvement of the intelligent level of data acquisition, screening, circulation, and processing processes, laying a solid foundation for the implementation of cognitive domain precision attacks.

Break through barriers and achieve deep integration. Relying on battlefield big data can effectively break through the barriers of full-domain integration, help connect isolated information islands, promote cross-domain information coupling and aggregation, accelerate barrier-free information flow, and promote the transformation of data fusion and information fusion to perception fusion and cognitive fusion. The comprehensive penetration of intelligent equipment into the command system can accelerate the deep integration of situation awareness, situation prediction and situation shaping, optimize multi-dimensional information screening and cognitive confrontation layout, and promote the continuous iteration and upgrading of cognitive domain combat styles.

Intelligent algorithms enhance decision-making efficiency

Accelerate decision-making and cause confusion to the enemy. The outcome of cognitive confrontation depends to a certain extent on the game of commanders’ wisdom and strategy. Through full-dimensional cross-domain information confrontation and decision-making games, with the help of intelligent technology, we can analyze and intervene in the opponent’s cognition and behavior, and finally gain the initiative on the battlefield. At present, artificial intelligence has become a catalyst for doubling combat effectiveness. In peacetime, it can play the role of an intelligent “blue army” to simulate and deduce combat plans; in wartime, through intelligent decision-making assistance, it can improve the quality and efficiency of the “detection, control, attack, evaluation, and protection” cycle, create chaos for the enemy, and paralyze its system.

Autonomous planning and intelligent formation. In the future intelligent battlefield, “face-to-face” fighting will increasingly give way to “key-to-key” offense and defense. In cognitive domain operations, the use of intelligent algorithms to accurately identify identity information, pre-judge the opponent’s intentions, and control key points in advance can quickly transform information advantages into decision-making advantages and action advantages. Using intelligent algorithms to support cognitive domain operations can also help identify the weaknesses of the enemy’s offense and defense system, autonomously plan combat tasks according to the “enemy”, intelligently design combat formations, and provide real-time feedback on combat effects. Relying on data links and combat clouds to strengthen intelligent background support, we can strengthen combat advantages in dynamic networking and virtual-real interaction.

Make decisions before the enemy and attack with precision. Intelligent algorithms can assist commanders in predicting risks, dynamically optimizing combat plans according to the opponent’s situation, and implementing precise cognitive attacks. In future intelligent command and control, the “cloud brain” can be used to provide algorithm support, combined with intelligent push to predict the situation one step ahead of the enemy, make decisions one step faster than the enemy, and completely disrupt the opponent’s thinking and actions. We should focus on using intelligent technology to collect and organize, deeply analyze the opponent’s decision-making and behavioral preferences, and then customize plans to actively induce them to make decisions that are beneficial to us, aiming at the key points and unexpectedly delivering a fatal blow to them.

Powerful computing power improves the overall operation level

Plan for the situation and create momentum, and suppress with computing power. “He who wins before the battle has more calculations; he who loses before the battle has less calculations.” The situation of cognitive confrontation is complex and changeable, and it is difficult to deal with it only by relying on the experience and temporary judgment of commanders. Intelligent tools can be used to strengthen the penetration of enemy thinking before the battle, actively divide and disintegrate the cognitive ability of the enemy team, and improve our battlefield control ability and combat initiative. At the same time, we should use powerful intelligent computing power to improve flexible command and overall planning capabilities, take advantage of the situation, build momentum, and actively occupy the main position of cognitive confrontation.

Smart soft attack, computing power raid. The rapid development of artificial intelligence has promoted the transformation of war from “hard destruction” to “soft killing”, which is expected to completely subvert the traditional war paradigm. For example, the latest technical concepts can be used to gain in-depth insights into the operating mechanism of the enemy system, actively familiarize oneself with the opponent, and mobilize the opponent. It is also possible to use the psychological anchoring effect and the network superposition amplification effect to interfere with the opponent’s cognitive loop link, disrupt the opponent’s command decision-making, and slow down the opponent’s reaction speed.

Cross-domain coordination and computing power support. To win the proactive battle of cognitive confrontation, we must coordinate across domains, gather forces in multiple dimensions, use intelligent tools to autonomously control the flow of information, realize the integrated linkage of physical domain, information domain and cognitive domain, lead forward-looking deployment and distributed coordination, launch a comprehensive parallel offensive, and form cognitive control over the enemy. Effectively carry out joint actions of virtual and real interaction in the entire domain, intervene in the enemy’s cognition, emotions and will, and use powerful computing power to take the initiative and fight proactive battles.

China Military Network Ministry of National Defense Network

Thursday, April 20, 2023

Chen Jialin, Xu Jun, Li Shan

現代國語:

伴隨「智慧+」時代的到來,人工智慧廣泛應用於軍事領域,物理空間的常規戰爭與虛擬空間的認知對抗加速融合。深度挖掘人工智慧潛力為認知對抗賦權,對提升跨域資源匹配效率,掌控未來作戰主動權具有重要意義。

資料挖潛拓展經驗認知邊界

數據驅動,知彼知己。隨著大數據相關技術的進步,數據資訊已成為認知攻防彈藥,資訊優勢在戰場上變得越來越重要。運用人工智慧技術賦能傳統資訊加工流程,可強化關聯資訊分析能力,透過跨領域資料擷取、虛假資訊甄別,加速資訊全局融合,強化動態感知能力。人工智慧還可協助緩解戰場數據過載,有機整合敵情、我情、戰場環境訊息,建立全像智慧資料庫,為認知對抗提供良好支撐。

萬物智聯,人機協同。現代戰爭日漸軍民一體、平戰界線模糊,技術重新定義了人與人、人與裝備、裝備與裝備的互動方式,戰場資料源源不絕。透過大數據探勘與跨域比較分析,可對影像、音訊、視訊等非結構化資料去粗取精、去偽存真,拓展經驗認知邊界,提升人機協同水準。物聯網、大數據技術的深度運用,推動資料取得、篩選、流轉、加工流程的智慧化程度不斷提升,為實施認知域精準攻擊夯實基礎。

打通壁壘,深度融合。依靠戰場大數據可有效突破全域融合的壁壘,有助於聯通條塊分割的資訊孤島,促進跨域資訊耦合聚合,加速資訊無障礙流通,推動資料融合與資訊融合向感知融合與認知融合轉化。智慧裝備全面滲透進入指揮體系,能夠加速態勢感知、態勢預測與態勢塑造的深度融合,優化多維資訊篩選與認知對抗佈局,推動認知域作戰樣式不斷迭代升級。

智慧演算法強化輔助決策效能

加速決策,致敵混亂。認知對抗的勝負,某種程度上取決於指揮家智慧謀略的博弈。可透過全維度跨域資訊對抗與決策博弈,借助智慧技術分析並介入對手認知與行為,最終贏得戰場主動。目前,人工智慧已成為戰鬥力倍增的催化劑,平時可扮演智慧「藍軍」模擬推演作戰方案;戰時透過智慧輔助決策,提升「偵、控、打、評、保」循環品質效率,給敵方製造混亂,促使其體系癱瘓。

自主規劃,智能編組。未來智慧化戰場上,「面對面」的拼殺將越來越多地讓位給「鍵對鍵」的攻防。在認知域作戰中,利用智慧演算法精準甄別身分資訊、預先研判對手企圖、事先扼控關鍵要點,能夠將資訊優勢快速轉化為決策優勢與行動優勢。利用智慧演算法支撐認知域作戰,還可協助摸清敵方攻防體系弱點,因「敵」制宜自主規劃作戰任務,智慧設計作戰編組,即時回饋作戰效果,依托資料鏈、作戰雲強化智慧後台支撐,在動態組網、虛實互動中強化作戰勝勢。

先敵決策,精準攻擊。智慧演算法可輔助指揮者預判風險,根據對手狀況動態優化作戰方案,實施精準認知攻擊。在未來智慧化指揮控制中,可利用「雲端大腦」提供演算法支撐,結合智慧推送先敵一步預判態勢,快敵一招制定決策,徹底打亂對手思路和行動。應著重運用智慧科技收集整理、深度分析對手決策和行為偏好,進而專項客製化計劃,積極誘導其作出有利於我的決策,瞄準要害出其不意地對其進行致命一擊。

強大算力提升全域運籌水平

謀勢造勢,算力壓制。 「夫未戰而廟算勝者,得算多也;未戰而廟算不勝者,得算少也。」認知對抗態勢複雜多變,僅靠指揮經驗和臨時判斷難以應對,可利用智能工具在戰前即對敵思維認知加強滲透,積極分化瓦解敵方團隊認知力,提升我戰場控局能力和作戰性。同時,應藉助強大智能算力,提升靈活指揮與全局運籌能力,順勢謀勢、借勢造勢,積極佔領認知對抗主陣地。

巧打軟攻,算力突襲。人工智慧的快速發展,推動戰爭進一步從「硬摧毀」轉向「軟殺傷」,可望徹底顛覆傳統戰爭範式。如可運用最新技術理念,深入洞察敵方體系運作機理,積極熟悉對手、調動對手。還可利用心理沉錨效應和網路疊加放大效應,幹擾對手認知循環鏈路,打亂對手指揮決策,遲滯對手反應速度。

跨域統籌,算力支撐。打贏認知對抗主動仗須全域跨域統籌、多維同向聚力,利用智慧工具自主控制資訊的流量流向,實現物理域、資訊域與認知域的一體聯動,引領前瞻性布勢與分散式協同,全面展開並行攻勢,形成對敵認知控制。有效進行全域虛實相生的聯合行動,對敵認知、情緒和意志實施幹預,借助強大算力下好先手棋、打好主動仗。

中國軍網 國防部網 // 2023年4月20日 星期四

陳佳琳 徐 珺 李 山

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2023-04/20/content_338002888.htm

Develop Chinese Military Operational Concepts Design China’s Future War Success

發展中國軍事作戰理念,規劃中國未來戰爭勝利

中國軍網 國防部網
2022年6月22日 星期三

現代英語:

Since the 21st century, with the deepening of the world’s new military revolution, the world’s military powers have put forward a series of new operational concepts and continuously improved them in war practice, thus driving the accelerated evolution of war. With the rapid development of information technologies such as cloud computing, blockchain, artificial intelligence, and big data, and their widespread application in the military field, people’s understanding of war has gradually changed from summarizing actual combat experience to studying and judging future wars. At present, as the source of military capability building, the strength of operational concept development capabilities will directly affect the seizure of victory opportunities. In particular, the vigorous development of the world’s new military revolution is calling for innovation in operational theory all the time. Only by developing new operational concepts and designing future wars with a forward-looking vision can we gain the initiative in military struggle preparation.

The concept of combat fundamentally solves the problem of how to fight a war.

First-rate armies design wars, second-rate armies respond to wars, and third-rate armies follow wars. The so-called “real wars happen before wars” means that before a war starts, the theory, style, and method of fighting have already been designed. How can we not win if we fight according to the designed war? The key to designing a war is to design and develop new combat concepts based on understanding the characteristics and laws of war, promote innovation in combat styles and tactics, and fundamentally solve the problem of “how to fight a war.”

In designing wars, theories come first. In recent years, the U.S. military has proposed new concepts such as “network-centric warfare”, “air-sea integrated warfare” and “hybrid warfare”, and the Russian military has proposed theories such as “non-nuclear containment strategy”, “strategic air-space campaign” and “national information security doctrine”, reflecting that the world’s military powers are vigorously studying operational theories and seizing military commanding heights. To a certain extent, operational concepts are the “organizational cells” for the formation of operational theories. Without a perfect concept generation capability, it is difficult to give birth to advanced theories. When an operational theory is proposed, it is necessary to develop relevant operational concepts so that the operational theory can be “sunk” and visualized, and better improved and transformed into military practice. When there is no operational theory concept, operational concept innovation can provide “raw materials” for the study of operational theories. The military field is the most uncertain field, and people’s understanding of war is constantly evolving. However, operational theory innovation cannot wait for the understanding to mature before starting, but needs to be based on the existing understanding, through active development and innovation of operational concepts, constructing future operational scenarios, exploring future winning mechanisms, and guiding and guiding military practice, in order to seize the initiative in war. Therefore, operational concept innovation is becoming a strategic fulcrum and lever for military construction and development.

The development of operational concepts focuses on designing core operational concepts. The core operational concept is the nucleus and embryo of the operational concept, which reflects the essential requirements of operations and contains the “genetic genes” for the growth of operational concepts. The entire concept system is derived and developed from this. At present, the understanding of the winning mechanism of informationized and intelligent warfare is becoming clearer, and it is time to focus the design of war on the development of major operational theories and key operational concepts.

Operational concept is an abstract expression of operational thinking.

The term “operational concept” originated from the US military. It is a description of how to fight in the future and is increasingly becoming an important tool for promoting the development of the military. The US Army Training and Doctrine Command Concept Development Guide points out that the operational concept is a concept, idea, and overall understanding. It is based on the inference of specific events in the combat environment. In the broadest sense, it outlines what will be done and describes how to fight in more specific measures. The US Marine Corps Combat Development Command Operations Development and Integration Directive points out that the operational concept is an expression of how to fight, used to describe future combat scenarios and how to use military art and scientific capabilities to meet future challenges. The US Air Force Operational Concept Development Directive points out that the operational concept is a conceptual description at the level of war theory, which realizes the established operational concept and intention through the orderly organization of combat capabilities and combat tasks.

In summary, the operational concept can be understood as an abstract cognition of operational ideas and action plans that is refined for specific operational problems at present or in the future. Generally speaking, the operational concept includes three parts: the first is the description of the operational problem, that is, the background of the operational concept, the operational environment, the operational opponent, etc.; the second is the description of the solution, that is, the concept connotation, application scenario, action style, winning mechanism, capability characteristics and advantages, etc.; the third is the description of capability requirements, that is, the equipment technology, basic conditions, and implementation means required to implement the operational concept. It can be seen that the operational concept should have the characteristics of pertinence, scientificity, adaptability and feasibility, and its connotation and extension will be constantly adjusted with the changes in factors such as strategic background, military policy, threat opponent, time and space environment, and capability conditions.

In a sense, operational concepts are actually transitional forms of operational theories, and their ultimate value is to guide military practice. The purpose and destination of developing new operational concepts is to tap into and enhance the combat effectiveness of the military. Only by transforming operational concepts into operational regulations and operational plans can their value be fully realized.

Innovation in combat concepts drives changes in combat styles

Since the beginning of the 21st century, the world’s military powers have, in accordance with national strategic requirements and in response to new threats and challenges, developed new operational concepts as a key means of transforming military capabilities, promoting changes in operational styles, and seeking to gain the upper hand in future battlefields. In order to further strengthen their military advantages, the world’s military powers are accelerating the introduction of a series of new operational concepts.

The US military has actively seized the opportunities brought about by scientific and technological progress, comprehensively used cutting-edge technologies such as new-generation information technology, artificial intelligence technology, unmanned autonomous technology, and proposed a series of new combat concepts such as mosaic warfare, multi-domain warfare, distributed lethality, decision-center warfare, and joint global command and control, promoting fundamental changes in combat thinking, combat style, combat space, and combat systems.

Unlike the U.S. military, the Russian military has achieved iterative innovation in operational concepts in military practice. Recently, the Russian military has been committed to promoting the construction of joint combat capabilities, accelerating the development and deployment of new unmanned equipment, focusing on building advantages in the network information battlefield, and constantly enriching the connotation of its traditional operational concepts, integrating them with new operational concepts such as hybrid warfare and mental warfare to guide war practice.

In general, in recent years, the new operational concepts proposed by the world’s military powers are driving profound changes in combat styles. Their capabilities, characteristics and advantages are mainly reflected in the following five aspects: First, the unmanned combat equipment. The proportion of unmanned equipment systems based on the new operational concept has increased significantly, and manned-unmanned collaborative combat has become one of the main combat styles, forming an advantage of unmanned over manned; second, the deployment method is decentralized. The force deployment based on the new operational concept is distributed, and the systems are interconnected and interoperable, forming an advantage of division over combination; third, the kill network is complicated. The kill network based on the new operational concept has more diverse functions. A single system can perform multiple tasks, and its failure has little impact on the combat system, forming an advantage of many over single; fourth, the response time is agile. The new operational concept emphasizes quick battles and quick decisions, taking the initiative to catch the enemy off guard, forming an advantage of fast over slow; fifth, the combat field is multidimensional. The new operational concept pays more attention to multi-domain linkage, expanding the battlefield from the traditional land, sea and air to the electromagnetic, network and cognitive domains, forming an advantage of invisible over visible.

The development of combat concepts should adhere to the systematic design approach

Using operational concepts to guide military force construction is a common practice among the world’s military powers. In comparison, the US military’s operational concept development mechanism is relatively complete, and a relatively complete operational concept development system has been established, consisting of concept types, organizational structures, normative standards, and support means.

In terms of concept types, the U.S. military’s combat concepts can basically be divided into three categories: First, a series of combat concepts developed by each service, mainly from the perspective of the service, to study potential enemies and future battlefields, redefine combat styles, and seek new ways to win. Second, a series of joint combat concepts developed by the Joint Chiefs of Staff, mainly composed of three levels: top-level concepts, action concepts, and supporting concepts. Third, combat concepts developed by academia, think tanks, etc., the number of such combat concepts is not as large as the first two categories, but it is still an important part of the combat concept system. Through this system, the U.S. military has implemented the grand military strategy through combat concepts layer by layer into various combat operations, various combat capabilities, and various types of weapons and equipment performance for the troops, guiding the construction of joint forces and various services.

In terms of organizational structure, taking the development of joint operational concepts as an example, the US military has established a working system consisting of five types of institutions. The first is the Joint Concept Working Group, whose main responsibility is to review the overall issues of the concept outline and concept development; the second is the Joint Concept Steering Committee, whose main responsibility is to supervise and guide the concept development plan; the third is the core writing team, whose main responsibility is to transform the original ideas in the concept outline into joint operational concepts; the fourth is the concept development team, whose main responsibility is to provide operational concept development methods and plans; the fifth is the independent red team, whose main responsibility is to conduct independent evaluations to judge the rigor and scientificity of the concept.

In terms of norms and standards, the U.S. military has a complete system of institutions to constrain and guide the development of joint operational concepts, making them standardized, standardized, and procedural, so as to manage the entire chain of concept development, which is mainly reflected in a series of directives of the Chairman of the Joint Chiefs of Staff and joint publications. For example, the “Joint Concept Development and Implementation Guide” aims to establish a governance structure for joint concept development, clarify the framework for joint operational concept planning, execution, and evaluation, and promote the implementation of joint operational concepts; the “Joint Regulations Preparation Process” aims to standardize the preparation process of joint regulations and provide a clear process framework for converting operational concepts into operational regulations.

In terms of support means, the design, development and verification of operational concepts is a systematic project that cannot be separated from the support of various development tools and means. For example, tools such as the DODAF2.0 model, IDEFO model and SYSML modeling language can provide standardized structured analysis models and logical description models for operational concept designers; model-based system engineering methods can provide operational concept designers and evaluation and verification personnel with capability models of equipment elements in operational concepts for designing and building operational concept frameworks. The U.S. military’s joint operational concept development uses network-based digital software with strong interconnection capabilities. All institutions involved in the development can share information in real time to improve development efficiency.

The development of combat concepts requires collaboration among multiple parties

Developing operational concepts is a multidisciplinary and multi-field task that involves many fields such as military science, philosophy, operations research, and systems science. It requires collaboration among multiple parties to ensure that it is both advanced and forward-looking in theory and applicable and feasible in practice.

Establish a small core and large peripheral research team. The department initiating the development of the operational concept should give full play to its leading role, coordinate and dispatch the research work from a global perspective; establish a joint research and development team, give full play to the collective wisdom, and widely obtain various new ideas, new methods and new viewpoints on the research of operational concepts from all parties; establish a cross-domain and cross-departmental expert committee to supervise, review and guide related work from multiple angles.

Form a multi-departmental working mechanism. To ensure smooth communication and efficient operation among departments, we must first clarify their respective tasks and responsibilities. For example, the concept initiating department is responsible for overall planning and implementation, the laboratory is responsible for technical verification, the industrial department is responsible for equipment research and development, and the combat troops are responsible for actual combat testing. Secondly, relevant normative documents should be formulated to ensure that all work has rules to follow and is carried out in an orderly manner, providing institutional guarantees for the development of combat concepts. Finally, it is also necessary to establish demand traction mechanisms, collaborative research mechanisms, iterative feedback mechanisms, etc., to open up the link from research and development to practical application of combat concepts.

Promote the organic combination of theory and practice. Only through the iterative cycle of “design research-deduction verification-actual troop test” can the operational concept be gradually adjusted, optimized and improved, and the development of war theory can be driven. Therefore, the development of operational concepts should pay special attention to the combination of theoretical innovation and practical application, and achieve the fundamental purpose of driving the generation of new quality combat power through the mutual drive of theory and practice. Specific methods include timely incorporating mature operational concepts into operational regulations, compiling training outlines or teaching materials accordingly, and gradually promoting them to troops for use; organizing relevant exercises or tests to test the maturity and feasibility of operational concepts under conditions close to actual combat, and finding and solving problems; using the capability indicators determined by the operational concept as a reference for equipment demand demonstration, driving the development of equipment technology, and promoting the improvement of combat capabilities.

The rapid development of science and technology in the new era has brought many new opportunities and challenges to the construction of military capabilities. The development of new operational concepts will help us to seize the military opportunities brought by scientific and technological progress, actively respond to the threats and challenges formed by scientific and technological development, and timely grasp the direction and laws of the evolution of war forms, which can provide important support for leading future war styles and seizing the first chance to win. At present, the international security situation is complex and changeable. To win the future information war, we need to take the development of operational concepts as the origin of national defense and military construction, actively carry out military technological innovation, promote the upgrading of weapons and equipment, achieve leapfrog development, and thus lead the trend of the new military revolution.

(Author’s unit: Second Academy of China Aerospace Science and Industry Corporation)

現代國語:

宋曉明

中國軍網 國防部網
2022年6月22日 星期三

自21世紀以來,隨著世界新軍事革命的深入推進,世界軍事強國提出了一系列新作戰概念,並在戰爭實踐中不斷改進,從而牽引戰爭加速演變。隨著雲端運算、區塊鏈、人工智慧、大數據等資訊科技的日新月異,以及在軍事領域的廣泛應用,人們理解戰爭的模式逐漸由歸納總結實戰經驗向研判未來戰爭轉變。目前,作為軍事能力建構源頭,作戰概念開發能力強弱,將直接影響勝戰先機的奪取。尤其是世界新軍事革命蓬勃發展,無時無刻不在呼喚作戰理論創新,只有以前瞻眼光開發新作戰概念、設計未來戰爭,才能獲得軍事鬥爭準備的主動權。

作戰概念從根本解決仗怎麼打

一流軍隊設計戰爭,二流軍隊應對戰爭,三流軍隊尾隨戰爭。所謂“真正的戰爭,發生在戰爭之前”,意思是戰爭開打之前,戰爭的理論、樣式、打法早已被設計出來。依照設計好的戰爭來打,豈有不勝之理?設計戰爭,關鍵在於摸清戰爭特徵規律的基礎上,設計發展新作戰概念,推動作戰樣式和戰法創新,從根本上解決「仗怎麼打」。

設計戰爭,理論先行。近年來,美軍先後提出「網路中心戰」「空海一體戰」等理論,反映了世界軍事強國都在大力研究作戰理論,搶佔軍事制高點。從某種程度上說,作戰概念是作戰理論形成的“組織細胞”,沒有完善的概念生成能力,很難催生先進的理論。當一個作戰理論提出時,需要發展相關作戰概念,才能使作戰理論「下沉」具象化,更好地完善並向軍事實踐轉化。當沒有作戰理論構想時,作戰概念創新可以為研究作戰理論提供「原料」。軍事領域是最具不確定性的領域,人們對戰爭的認知始終在不斷發展。但是,作戰理論創新不能坐等認識成熟後再起步,而是需要在現有認識的基礎上,透過主動開發、創新作戰概念,構設未來作戰圖景,探索未來制勝機理,牽引並指導軍事實踐,才能掌握戰爭主動權。因此,作戰概念創新,正成為軍隊建設與發展的戰略支點與槓桿。

作戰概念開發,重點在於設計核心作戰概念。核心作戰概念,是作戰概念的細胞核、胚胎,集中反映作戰本質要求,包含著作戰概念生長的“遺傳基因”,整個概念體係由此衍生與發展。目前,對資訊化、智慧化戰爭的致勝機理等的認識漸趨清晰,將設計戰爭的重心聚焦到主要作戰理論、關鍵作戰概念開發正當其時。

作戰概念是作戰思想的抽象表達

「作戰概念」一詞源自美軍,是對未來如何作戰的描述,正日益成為推進軍隊建設發展的重要抓手。美《陸軍訓練與條令司令部概念開髮指南》指出,作戰概念是理念、想法、總體認識,是依據作戰環境中具體事件的推斷,在最廣泛的意義上勾勒將要做什麼,在更具體的舉措上描述仗怎麼打。美《海軍陸戰隊作戰發展司令部作戰發展與一體化指令》指出,作戰概念是表達如何打仗,用來描述未來作戰景象及如何利用軍事藝術和科學能力迎接未來挑戰。美《空軍作戰概念發展條令》則指出,作戰概念是戰爭理論層面的概念描述,透過對作戰能力和作戰任務的有序組織,實現既定的作戰構想和意圖。

綜上所述,作戰概念可以理解為是針對當前或未來的具體作戰問題,提煉的對作戰思想與行動方案的抽象認知。一般而言,作戰概念包括三部分內容:一是對作戰問題的描述,即作戰概念的提出背景、作戰環境、作戰對手等;二是對解決方案的描述,即概念內涵、應用場景、行動樣式、制勝機理、能力特徵及優勢等;三是對能力需求的描述,即實施該作戰概念所需的裝備技術、基礎條件、實現手段等。可以看出,作戰概念應具備針對性、科學性、適應性與可行性等特徵,其內涵與外延會隨著戰略背景、軍事方針、威脅對手、時空環境、能力條件等因素的變化而不斷調整。

從某種意義上說,作戰概念其實是作戰理論的過渡形態,最終價值是指導牽引軍事實踐。發展新作戰概念的目的和歸宿,是挖掘和提升軍隊戰鬥力,只有把作戰概念轉化為作戰條令、作戰計劃,才能充分發揮其價值。

作戰概念創新牽引作戰樣式變革

進入21世紀以來,世界軍事強國根據國家戰略要求,針對新威脅挑戰,把開發新作戰概念作為軍事能力轉型的關鍵抓手,推動作戰樣式變革,謀求贏得在未來戰場中的製勝先機。為進一步強化軍事上的領先優勢,世界軍事強國正加速推出一系列新作戰概念。

美軍積極搶奪科技進步帶來的機遇,綜合運用新一代資訊科技、人工智慧技術、無人自主技術等尖端技術,提出馬賽克戰、多域作戰、分散式殺傷、決策中心戰、聯合全局指揮控制等一系列新作戰概念,推動作戰思想、作戰樣式、作戰空間和作戰體系發生根本性變化。

與美軍不同,俄軍是在軍事實踐中實現作戰概念的迭代創新。近期,俄軍致力於推動聯合作戰能力建設,加速發展部署新型無人裝備,注重打造網路資訊戰場優勢,不斷豐富其傳統作戰概念的內涵,並與混合戰爭、心智戰等新作戰概念相集成,用以指導戰爭實踐。

整體而言,近幾年,世界軍事強國提出的新作戰概念正牽引作戰樣式發生深刻變化,其能力特徵及優勢主要體現在以下五個方面:一是作戰裝備無人化,基於新作戰概念的無人裝備體系佔比顯著提高,有人無人協同作戰成為主要作戰樣式之一,形成以無人制有人的優勢;二是部署方式分散化,基於新作戰概念的力量部署呈分佈式,系統間互聯互通,具備互操作能力,形成以分制合的優點;三是殺傷網複雜化,基於新作戰概念的殺傷網功能更加多樣,單一系統可執行多種任務,且其失效對作戰體系影響較小,形成以多製單的優勢;四是響應時間敏捷化,新作戰概念更強調速戰速決,先發制人使敵方措手不及,形成以快製慢的優勢;五是作戰領域多維化,新作戰概念更注重多域聯動,將戰場從傳統的陸海空拓展到電磁、網絡和認知域,形成以無形制有形的優勢。

作戰概念開發應堅持體系化設計思路

以作戰概念指導軍事力量建設,是世界軍事強國的共同做法。比較而言,美軍的作戰概念開發機制較為完善,建構了相對完整的作戰概念開發體系,由概念類型、組織架構、規範標準、支撐手段等部分組成。

在概念類型方面,美軍作戰概念基本上可分為三類:一是各軍種主導開發的系列作戰概念,主要從本軍種角度出發,研判潛在敵人和未來戰場,對作戰樣式進行重新定義,謀求打贏的新途徑。二是參會主導開發的一系列聯合作戰概念,主要由頂層概念、行動概念和支持性概念等三個層次構成。三是學術界、智庫等主導開發的作戰概念,這類作戰概念的數量沒有前兩類那麼多,但仍是作戰概念體系的重要組成部分。透過此體系,美軍把宏大的軍事戰略透過作戰概念逐層落實為面向部隊的各類作戰行動、各種作戰能力、各型武器裝備性能,指導聯合部隊及各軍兵種建設。

在組織架構方面,以聯合作戰概念發展為例,美軍建立了由五類機構組成的工作體系。一是聯合概念工作小組,主要職責是審查概念大綱及概念研發的整體問題;二是聯合概念指導委員會,主要職責是對概念研發計畫進行監督指導;三是核心編寫團隊,主要職責是將概念大綱中原始理念轉化為聯合作戰概念;

在規範標準方面,針對聯合作戰概念的開發,美軍有完善的製度體系約束、指導,使其規範化、標準化、程序化,以便對概念開發進行全鏈條管理,主要體現在一系列參謀長聯席會議主席指令及聯合出版物中。例如,《聯合概念開發與實施指南》旨在為聯合概念發展建立治理結構,明確聯合作戰概念規劃、執行和評估的框架,推動聯合作戰概念落實;《聯合條令編制流程》旨在對聯合條令的編制流程進行規範,為把作戰概念轉化為作戰條令提供一個明確的流程框架。

在支撐手段方面,作戰概念的設計開發與驗證是一項系統工程,離不開各類開發工具與手段的支撐。例如,DODAF2.0模型、IDEFO模型及SYSML建模語言等工具,可為作戰概念設計人員提供規範的結構化分析模型與邏輯描述模型;基於模型的系統工程方法,可為作戰概念設計人員和評估驗證人員提供作戰概念中裝備要素的能力模型,用於設計並搭建作戰概念框架。美軍聯合作戰概念開發使用了基於網路的數位化軟體,具有較強的互聯互通能力,所有參與開發的機構都可以即時共享訊息,提高開發效率。

作戰概念開發成熟需要多方協同合作

發展作戰概念是一項多學科、多領域交叉的工作,涉及軍事學、哲學、運籌學、系統科學等諸多領域,需要多方協同合作,以確保其既在理論層面具備先進性、前瞻性,又在實踐層面具備適用性、可行性。

組成小核心大外圍研究團隊。作戰概念開發發起部門要充分發揮群體智慧作用,從全局角度出發,對研究工作進行統籌與調度;成立聯合研發團隊,充分發揮群體智慧作用,廣泛獲取各方對作戰概念研究的各種新方法與新觀點;設立跨領域、跨部門的專家委員會,多角度對相關工作進行監督、審查與指導。

形成多部門連動的工作機制。為確保各部門之間溝通順暢、運作高效,首先要明確各自的任務與職責。例如,概念發起部門負責總體計畫與實施、實驗室負責技術驗證、工業部門負責裝備研發、作戰部隊負責實戰檢驗。其次,要製定相關規範文件,確保各項工作有章可循、有序推進,為作戰概念研發提供製度保障。最後,還要建立需求牽引機制、協同攻關機制、迭代回授機制等,打通作戰概念從研發到實務運用的連結。

推動理論與實務有機結合。作戰概念只有透過「設計研究—推演驗證—實兵檢驗」的循環迭代,才能逐步調整、優化、完善,牽引戰爭理論發展。因此,作戰概念發展要特別注重理論創新與實務運用結合,透過理論與實務的相互驅動,達成牽引新質戰鬥力生成的根本目的。具體方式包括,將開發成熟的作戰概念及時納入作戰條令,相應地編寫訓練大綱或教材,逐步推廣至部隊使用;透過組織相關演訓或試驗,在貼近實戰條件下檢驗作戰概念的成熟度與可行性,查找並解決問題;把作戰概念確定的能力指標作為裝備需求論證的參考,促進引裝備技術發展,尋找並解決問題;把作戰概念確定的能力指標作為裝備需求論證的參考,促進引裝備技術發展,找到並解決問題;把作戰概念確定的能力指標作為裝備需求論證的參考,促進引裝備技術發展,找到並解決問題;把作戰概念確定的能力指標作為裝備需求論證的參考,促進引裝備技術發展,作戰能力提升。

新時代科技發展態勢迅猛,為軍事能力建設帶來許多新機會與新挑戰。發展新作戰概念,有助於敏銳抓住科技進步帶來的軍事機遇,積極應對科技發展形成的威脅與挑戰,及時掌握戰爭形態演進方向與規律,可為主導未來戰爭樣式、搶佔制勝先機提供重要支撐。當前,國際安全情勢複雜多變,打贏未來資訊化戰爭,需要我們把作戰概念開發作為國防和軍隊建設的原點,積極開展軍事技術創新,推進武器裝備更新換代,實現跨越式發展,從而引領新軍事革命潮流。

(作者單位:中國航太科工集團第二研究院)

中國原創軍事資源:http://www.81.cn/gfbmap/content/2022-06/22/content_31822288.htm

China’s Military Meeting Challenges of Intelligent Warfare with New Concepts

中國軍隊以新概念應對智慧化戰爭挑戰

現代英語:

Preface

The breakthrough achievements of artificial intelligence technology marked by deep learning and its application in various fields have pushed intelligence to a new high in the global wave and become the focus of attention from all parties. In the military field, which has never been willing to lag behind in technological innovation and application, a new revolution is also being actively nurtured. We must accurately grasp the evolution of intelligent warfare and analyze the inner essence of intelligent warfare in order to welcome and control intelligent warfare with a brand new look.

How far are we from intelligent warfare?

Intelligent warfare is a war that is mainly supported by artificial intelligence technology. It has been the dream of people for thousands of years to endow weapon platforms with human intelligence and replace humans in the battlefield. With the powerful impact brought to the world by artificial intelligence systems represented by AlphaGo and Atlas, and the emergence of new combat concepts and new platforms such as swarm warfare and flying aircraft carriers, the door to intelligent warfare seems to be quietly opening.

The law of historical development indicates that intelligent warfare will inevitably enter the battlefield. The progress of science and technology promotes the evolution of weapons and equipment, triggers fundamental changes in military organization, combat methods and military theories, and ultimately forcibly promotes historical changes in the form of war. The arrival of intelligent warfare also conforms to this inevitable law of historical development. Looking back at the evolution of human warfare, every major progress in science and technology has promoted major changes in the military. The invention of black powder has made human warfare evolve to the era of hot weapons. Infantry and cavalry formations were completely wiped out under the line-of-gun warfare. The use of steam engines in the military has made human warfare evolve to the mechanized era, and has further given rise to large-scale mechanized warfare led by armored ships, tanks, and airplanes. The emergence and application of intelligent technology will profoundly change human cognition, war thinking, and combat methods, and once again set off major changes in the military. Intelligent warfare will inevitably enter the war stage.

The development of artificial intelligence technology determines the pace of intelligent warfare. The continuous development and widespread application of artificial intelligence technology have pushed intelligent warfare from chaos to reality. It has begun to sprout, grow gradually, and come to us step by step. To truly enter intelligent warfare, artificial intelligence technology needs to reach four levels. The first level is computational intelligence, which means breaking through the limitations of computing power and storage space to achieve near-real-time computing power and storage capacity, which is far beyond the reach of large computers and huge servers. The widespread application of cloud computing has steadily brought humans to the first level. The second level is perceptual intelligence, which means that the machine can understand what it hears, see what it sees, distinguish what is true, and recognize what it knows clearly, and can communicate directly with people. Natural language understanding, image and graphic recognition, and biometric recognition technologies based on big data have allowed humans to reach the second level. The third level is cognitive intelligence, which means that the machine can understand human thinking, think and reason like humans, and make judgments and decisions like humans. Knowledge mining, knowledge graphs, artificial neural networks, and decision tree technologies driven by deep learning algorithms have allowed humans to strive to move towards the third level. The fourth stage is human-machine fusion enhanced intelligence, which is to combine the perception, reasoning, induction, and learning that humans are good at with the search, calculation, storage, and optimization that machines are good at, to complement each other’s advantages and interact in a two-way closed loop. Virtual reality enhancement technology, brain-like cognitive technology, and brain-like neural network technology are exploring how humans can move towards the fourth stage. When humans stepped onto the second stage, intelligent warfare began to approach us; when we step onto the fourth stage, the era of intelligent warfare will be fully opened.

Self-learning growth accelerates the sudden arrival of intelligent warfare changes. The ability to “learn” is the core ability of artificial intelligence. Once a machine can learn by itself, its learning speed is amazing. Once a machine has the ability to self-learn, it will enter a rapid growth track of “improving intelligence and accelerating evolution” repeatedly. All technical difficulties in the direction of intelligent warfare will be solved as “learning” deepens. The era of intelligent warfare is likely to arrive suddenly in a way that people can’t imagine!

What will intelligent warfare change?

Intelligent warfare will break through the limits of traditional time and space cognition. In intelligent warfare, artificial intelligence technology can collect, calculate, and push all kinds of action information of all forces in combat in real time and in all domains, enabling humans to break through the logical limits of thinking, the physiological limits of senses, and the physical limits of existence, greatly improving the scope of cognition of time and space, and being able to accurately control all actions of all forces in real time, and to achieve rapid jump, gathering, and attack of superior combat resources in multi-dimensional space and multi-dimensional domains. Any space at any time may become a time and space point for winning the war.

Intelligent warfare will reconstruct the relationship between humans and weapons and equipment. With the rapid advancement of intelligent technology and the continuous improvement of the level of intelligence, weapon platforms and combat systems can not only passively and mechanically execute human instructions, but also can, based on deep understanding and deep prediction, super-amplify through the calculation, storage, and query that machines are good at, so as to autonomously and actively perform specific tasks in a certain sense. It can be said that weapon platforms and combat systems can also actively exert human consciousness to a certain extent, even beyond the scope of human cognition, and complete combat tasks autonomously and even creatively according to specific procedures. The distinction between humans and weapons and equipment in the traditional sense has become blurred, and it is even difficult to distinguish whether it is humans or machines that are playing a role. People exclaimed that “humans and weapons and equipment will become a partnership.” Therefore, in intelligent warfare, although humans are still the most important factor in combat effectiveness, the change in the way humans and weapons and equipment are combined has enriched the connotation of combat effectiveness, and the traditional relationship between humans and weapons and equipment will also be reconstructed on this basis.

Intelligent warfare will give rise to the emergence of new combat methods. The epoch-making progress of science and technology will inevitably bring about revolutionary changes in combat methods; major progress in intelligent technology will inevitably bring about an active period of change in combat methods. On the one hand, the continuous emergence of new technologies in the fields of deep cognition, deep learning, deep neural network, etc. driven by computing, data, algorithms, and biology, as well as the cross-integration of achievements in the fields of information, biology, medicine, engineering, manufacturing, etc., will inevitably promote the emergence of new combat methods. On the other hand, the fierce confrontation between intelligent weapon platforms and combat systems will inevitably become the goal and driving force of innovative combat methods. In war, the more intelligent the parts are, the more they become the focus of confrontation. The differences in advantages in terms of space-time cognitive limits, massive information storage and computing capabilities, and neural network organization generation capabilities will bring about new areas of “blinding”, “deafening”, and “paralyzing” combat methods.

Intelligent warfare will incubate a completely new command and control method. The advantages of command and control are the focus of attention in the field of warfare, and intelligent warfare calls for a completely new command and control method. First, human-machine collaborative decision-making has become the main command and decision-making method in intelligent warfare. In previous wars, command and decision-making were all led by commanders, with technical means as auxiliary decision-making. In intelligent warfare, intelligent auxiliary decision-making systems will actively urge or urge commanders to make decisions based on new battlefield situation changes. This is because in the face of massive and rapidly changing battlefield situation information data, the human brain can no longer quickly accommodate and efficiently process it, and human senses can no longer withstand the extraordinary speed of change. In this case, decisions made solely by commanders are likely to be late and useless. Only human-machine collaborative decision-making driven by intelligent decision-making assistance systems can make up for the time and space differences and the machine-computer differences and ensure the command decision-making advantage. Second, brain neural control has become the main command control method in intelligent warfare. In previous wars, commanders issued commands to command and control troops step by step through documents, radios, and telephones in the form of documents or voice. In intelligent warfare, commanders use intelligent brain-like neurons to issue commands to troops through the neural network combat system platform, which reduces the conversion process of command expression forms, shortens the conversion time of commands across media, and is faster and more efficient. When the combat system platform is partially damaged by an attack, this command and control method can autonomously repair or reconstruct the neural network, quickly restore the main function or even all functions, and have stronger anti-attack capabilities.

How should we prepare for intelligent warfare?

In the research and exploration of intelligent warfare, we must not be content to lag behind, but must aim to win future wars and meet the challenges of intelligent warfare with a more proactive attitude, advanced concepts, and positive actions.

Use breakthroughs in intelligent technology to promote the leap in the effectiveness of intelligent combat systems. Although the development of intelligent technology has made great progress in neural network algorithms, intelligent sensing and networking technology, data mining technology, knowledge graph technology, etc., it is still in the weak intelligence stage overall and is far from reaching the advanced stage of strong intelligence. There is still broad room for development in the future. We must strengthen basic research on artificial intelligence, follow the laws of scientific and technological development, scientifically plan the direction of intelligent technology development, select technical breakthroughs, and strengthen key core technologies of artificial intelligence, especially basic research that plays a supporting role. Highlight research on key military technologies. Guided by military needs, we will develop intelligent reconnaissance and perception systems, command and control systems, weapon equipment systems, combat support systems and other weapons and equipment around key military technologies such as intelligent perception, intelligent decision-making, intelligent control, intelligent strike, and intelligent support. We will focus on military-civilian scientific and technological collaborative innovation, give full play to the advantages of civilian intelligent technology development, rely on the superior resources of the military and the local area, strengthen military-civilian strategic cooperation, build a service platform for the joint research and sharing of artificial intelligence scientific and technological achievements, the joint construction and sharing of conditions and facilities, and the joint connection of general standards between the military and the local area, and form a new situation of open, integrated, innovative and development of intelligent combat technology.

Leading innovation in combat methods with the concept of intelligent warfare. To meet the arrival of intelligent warfare, changing concepts is a prerequisite. Concepts are the forerunner of action. If our concepts remain at the traditional level, it will be difficult to adapt to the needs of intelligent warfare. Intelligent warfare has undergone profound changes in technical support, combat power, and winning mechanisms. We must first establish the concept of intelligent warfare and use it to lead the innovation of our army’s future combat methods. First, we must strengthen the competition for “intellectual property rights.” Artificial intelligence is the foundation of intelligent warfare. Depriving and weakening the opponent’s ability to use intelligence in combat and maintaining the freedom of one’s own intelligence use are the basis for ensuring the smooth implementation of intelligent warfare. The armies of developed Western countries are exploring various means such as electromagnetic interference, electronic suppression, high-power microwave penetration and takeover control to block the opponent’s intelligent application capabilities, seize “intelligence control”, and thus seize battlefield advantages. Second, innovate intelligent combat methods. We must focus on giving full play to the overall effectiveness of the intelligent combat system, strengthen the research on new intelligent combat methods such as human-machine collaborative intelligent combat, intelligent robot combat, and intelligent unmanned swarm combat, as well as the processes and methods of intelligent combat command and intelligent combat support. Focus on effectively responding to the enemy’s intelligent combat threats and study strategies to defeat the enemy, such as intelligent blocking warfare and intelligent disruption warfare.

Use intelligent training innovation to promote the transformation of combat power generation mode. Intelligent warfare will be a war jointly implemented by humans and machines, and combat forces with intelligent unmanned combat systems as the main body will play an increasingly important role. It is necessary to adapt to the new characteristics of the intelligent warfare force system, innovate and develop intelligent training concepts, and explore new models for the generation of intelligent warfare combat power. On the one hand, it is necessary to strengthen the training of “people” driving intelligent systems. Relying on big data, cloud computing, VR technology, etc., create a new training environment, continuously improve people’s intelligent literacy, improve the quality of human-machine cognition, understanding, and interaction, and enhance the ability of people to drive intelligent combat systems. On the other hand, it is necessary to explore a new training model with “machines” as the main object. In the past, training was basically human-centered, focusing on people’s proficiency in mastering and using weapons and equipment in a specific environment to improve combat effectiveness. In order to adapt to the new characteristics of the intelligent warfare force system, the training object should change the traditional human-centered training organization concept and model, focus on improving the self-command, self-control, and self-combat capabilities of the intelligent combat system, make full use of the characteristics of the intelligent system’s ability to self-game and self-grow, and form a training system, training environment, and training mechanism specifically for the intelligent combat system, so that the intelligent combat system can obtain a geometric leap in combat capability after a short period of autonomous reinforcement training.

現代國語:

來源:解放軍報 作者:李始江 楊子明 陳分友 責任編輯:喬楠楠 2018-07-26 08:23:16
前言

以深度學習為標志的人工智慧技術突破性成果及其在各領域的應用,將智慧化推上了全球浪潮的新高,也成為各方關注的焦點。在科技創新與應用從未甘落後的軍事領域,也正在積極孕育一場新的變革。我們必須準確把握智能化戰爭的演進脈搏,透析智能化戰爭的內在本質,才能以嶄新的面貌迎接和駕馭智能化戰爭。

智慧化戰爭究竟離我們有多遠?

智能化戰爭,是以人工智慧技術為主要支撐的戰爭。賦予武器平台以人的智慧並取代人在戰場上廝殺,是千百年來人們夢寐以求的願望。隨著AlphaGo和Atlas為代表的人工智慧系統帶給世人的強大沖擊,蜂群作戰、飛行航空母艦等作戰新概念、新平台的初露端倪,智慧化戰爭大門彷彿正在悄然打開。

歷史發展規律預示著智慧化戰爭必將走上戰爭舞台。科學技術的進步推動武器裝備的演進,引發軍隊編成、作戰方式和軍事理論的根本性變化,並最終強制推動戰爭形態的歷史性變革。智能化戰爭的到來也符合這個歷史發展的必然規律。回顧人類戰爭的演變歷程,每一次科學技術的重大進步,都推動著軍事上的重大變革。黑火藥的發明使人類戰爭進化到熱兵器時代,步兵方陣、騎兵方陣在火槍線式作戰方式下被消滅的蕩然無存;蒸汽機在軍事上的運用使人類戰爭進化到機械化時代,並進而催生了以裝甲艦、坦克、飛機引領的大規模機械化戰爭。智慧化技術的出現與應用,必將深刻改變人類認知、戰爭思維與作戰方式,再一次掀起軍事上的重大變革,智慧化戰爭必將走上戰爭舞台。

人工智慧技術的發展進程決定著智慧化戰爭邁進的腳步。人工智慧技術的不斷發展與廣泛應用,推動智慧化戰爭從混沌走向現實,開始萌芽、逐漸成長,一步一步向我們走來。真正進入到智慧化戰爭,人工智慧技術需要邁上四階。第一級台階是計算智能,即突破計算能力的限制、突破存儲空間的限制,實現近乎實時的計算能力和存儲能力,這種能力是大型計算機和龐大服務器遠遠不可比擬的。雲計算的廣泛應用已經將人類穩穩地送上了第一級台階。第二級台階是感知智能,即機器能夠聽得懂、看得懂、辨得真、識得清,能夠與人進行直接交流對話。以大數據為基礎的自然語言理解、圖像圖形認知、生物特徵識別技術,讓人類走上了第二級台階。第三級台階是認知智能,即機器能夠理解人類的思維,能夠像人類一樣進行思考與推理,像人類一樣進行判斷和決策。以深度學習演算法為驅動的知識挖掘、知識圖譜、人工神經網絡、決策樹技術,讓人類努力邁向第三級台階。第四級台階是人機融合式增強型智能,即將人類擅長的感知、推理、歸納、學習,與機器擅長的搜尋、計算、儲存、優化,進行優勢互補、雙向閉環互動。虛擬現實增強技術、類腦認知技術、類腦神經網絡技術,正在探索人類如何邁向第四級。當人類走上第二級台階,智慧化戰爭開始向我們走來;當我們踏上第四級台階時,智慧化戰爭的時代就將全面開啟。

自我學習成長加速著智慧化戰爭變革的突然降臨。 「學習」能力是人工智慧最核心的能力,一旦機器能夠自我學習,其學習速度是驚人的。機器一旦具備自我學習的能力,就會進入一個不斷反復的「提升智慧、加快進化」的快速成長軌道,邁向智慧化戰爭的所有技術困難將隨著「學習」的深入迎刃而解,智能化戰爭時代很可能會以人們意想不到的方式突然降臨!

智能化戰爭究竟會改變什麼?

智能化戰爭將突破傳統時空認知的極限。在智慧化戰爭中,人工智慧技術能夠全時、全局對作戰中全部力量的各種行動信息,進行實時收集、實時計算、實時推送,使人類能夠突破思維的邏輯極限、感官的生理極限和存在的物理極限,大大提高對時間空間的認知範疇,能夠實時精準地掌控所有力量的所有行動,能夠在多維空間、多維空間、多維領域的優勢

智慧化戰爭將重構人與武器裝備的關系。隨著智慧化技術的快速進步,智慧化程度的不斷提升,武器平台和作戰體係不僅能夠被動、機械地執行人的指令,而且能夠在深度理解和深度預測的基礎上,通過機器擅長的算、存、查進行超級放大,從而在一定意義上自主、能動地執行特定任務。可以說,武器平台和作戰體係也可以在某種程度上主動地發揮出人的意識,甚至是超出人類的認識範疇,根據特定程序自主地、甚至是創造性地完成作戰任務,傳統意義上人與武器裝備的區別變得模糊,甚至難以區分是人在發揮作用還是機器在發揮作用,人們驚呼“人與武器裝備將成為夥伴關系”。因此,在智慧化戰爭中,人雖然仍是戰鬥力中最主要的因素,但人與武器裝備結合方式的改變豐富了戰鬥力的內涵,人與武器裝備的傳統關係也將在此基礎上進行重構。

智慧化戰爭將催生新型作戰方式的湧現。科學技術劃時代的進步,必然使作戰方式發生革命性的變化;智慧化技術的重大進步,必然帶來作戰方式變革的活躍期。一方面,以計算、數據、演算法、生物為驅動力的深度認知、深度學習、深度神經等領域不斷湧現的新技術,以及與資訊、生物、醫學、工程、製造等領域成果的交叉融合,必然推動新型作戰方式井噴式的湧現。另一方面,智慧化武器平台與作戰體系的激烈對抗,必然成為創新作戰方式的目標與動力。戰爭中智慧化技術程度越高的部位,越成為對抗中的焦點,時空認知極限、海量資訊存儲計算能力、神經網絡組織生成能力等方面的優勢差,將會帶來新領域的「致盲」「致聾」「致癱」作戰方式。

智慧化戰爭將孵化全新的指揮控制方式。指揮控制的優勢是戰爭領域的關注焦點,智慧化戰爭呼喚全新的指揮控制方式。一是人機協同決策成為智慧化戰爭中主要的指揮決策方式。以往戰爭中的指揮決策,都是以指揮為主導,牽引技術手段的輔助決策。在智慧化戰爭中,智慧輔助決策系統將根據新的戰場態勢變化,主動督促或催促指揮員做出決策。這是因為面對海量的、瞬息萬變的戰場態勢資訊數據,人的大腦已經無法快速容納和高效處理、人的感官已經無法承受超常規的變化速度。在這種情況下,單純依靠指揮員形成的決策很可能是遲到的、無用的決策。只有在智慧化輔助決策系統推動下的人機協同決策,才能夠彌補時空差和機腦差,確保指揮決策優勢。二是腦神經控製成為智慧化戰爭中主要的指令控制方式。以往戰爭中,指揮員透過文件、電台、電話,以文書或語音的形式,逐級下達指令指揮控制部隊。在智慧化戰爭中,指揮員用智慧化類腦神經元,透過神經網絡作戰體系平台向部隊下達指令,減少了指令表現形式的轉換過程,縮短了指令跨媒體的轉換時間,節奏更快、效率更高。當作戰體系平台遭到攻擊部分破壞時,這種指揮控制方式能夠自主修復或自主重構神經網絡,迅速恢復主體功能甚至全部功能,抗打擊能力更強。

我們應該如何迎接智能化戰爭?

在智慧化作戰的研究與探索中,絕不能甘於落後追隨,必須瞄準打贏未來戰爭,要以更主動的姿態、先進的理念、積極的行動,迎接智慧化戰爭的挑戰。

以智慧化技術突破推動智慧化作戰體系效能躍升。智慧化技術的發展目前雖然在神經網絡演算法、智慧傳感與組網技術、數據挖掘技術、知識圖譜技術等方面有了較大進展,但總體而言仍處於弱智能階段,遠未達到強智能高級階段,未來仍有廣闊的發展空間。要強化人工智慧基礎研究,遵循科學技術發展的規律,科學規劃智慧化技術發展方向,選好技術突破口,加強人工智慧關鍵核心技術,特別是起支撐作用的基礎性研究。突出軍用關鍵技術研究。以軍事需求為牽引,圍繞智慧感知、智慧決策、智慧控制、智慧打擊、智慧保障等軍用關鍵技術,發展智慧化偵察感知系統、指揮控制系統、武器裝備系統、作戰保障系統等武器裝備。抓好軍民科技協同創新,充分發揮民用智慧技術發展優勢,依托軍地優勢資源,強化軍地戰略協作,搭建人工智慧科技成果共研共享、條件設施共建共用、通用標準軍地銜接的服務平台,形成智慧化作戰科技開放融合創新發展新局面。

以智能化作戰理念引領作戰方式創新。迎接智能化戰爭的到來,轉變觀念才是前提。觀念是行動的先導,如果我們的觀念還停留在傳統層面,就難以適應智慧化戰爭的需要。智慧化戰爭在技術支撐、作戰力量、制勝機理等方面都發生了深刻變化,要求我們必須先確立智慧化戰爭理念,並以此引領我軍未來作戰方式創新。一是要強化「制智權」爭奪。人工智慧是智慧化戰爭的基礎,作戰中剝奪和削弱對手智慧運用能力,保持己方智慧運用的自由,是確保智慧化作戰順利實施的基礎。西方發達國家軍隊正探索通過電磁幹擾、電子壓制、高功率微波穿透和接管控制等多種手段,阻斷對手的智能運用能力,奪取“制智權”,從而奪取戰場優勢。二是創新智能化作戰方式方法。要著眼於充分發揮智慧化作戰體系整體效能,加強人機協同智慧作戰、智慧化機器人作戰、智慧無人群聚作戰等的新的智慧化作戰方式方法研究,以及智慧化作戰指揮、智慧化作戰保障的流程與方式方法等。著眼有效應對敵智能化作戰威脅,研究克敵制勝之策,如智慧阻斷戰、智慧擾亂戰等。

以智慧化訓練創新催生戰鬥力生成模式轉變。智慧化戰爭將是人機結合共同實施的戰爭,以智慧化無人作戰系統為主體的作戰力量將發揮越來越重要的作用。必須適應智慧化戰爭力量體系新特點,創新發展智慧化訓練概念,探索智慧化戰爭戰鬥力生成新模式。一方面,要強化「人」駕馭智慧系統訓練。依託大數據、雲計算、VR技術等創設新型訓練環境,不斷提升人的智慧化素養,改善人機認知、理解、互動品質,提升人駕馭智慧化作戰系統的能力。另一方面,要探索以「機」為主體對象的新型訓練模式。過去的訓練基本是以人為主體對象的訓練,聚焦於人在特定環境下熟練掌握和使用武器裝備提高作戰效能。適應智慧化戰爭力量體系構成新特點,在訓練的對像上改變傳統訓練中以人為中心的訓練組織理念和模式,聚焦於智能化作戰系統自我指揮、自我控制、自我作戰能力的提升,充分利用智能化系統能夠自我博弈、自我成長的特點,形成專門針對智能化作戰系統訓練體系、訓練環境和訓練機制,從而使智能化作戰系統獲得短期的自主訓練即可升躍獲得短期能力強化的倍數。

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/482056188.html?

Satellite Navigation for the Chinese Military’s Intelligent Battlefield

中國軍隊智慧戰場的衛星導航

現代英語:

The satellite navigation system, also known as the global satellite navigation system, is an air-based radio navigation and positioning system that can provide users with all-weather three-dimensional coordinates, speed and time information at any location on the earth’s surface or in near-Earth space.

The satellite navigation system is an important space infrastructure for mankind. It is an indispensable tool for a country’s national security and economic and social development. It has a profound impact on the form of war, combat style, and people’s production and lifestyle.

At present, there are four major global satellite navigation systems in the world, namely, the United States’ GPS, Russia’s GLONASS, Europe’s Galileo and China’s Beidou. Global competition in satellite navigation technology is becoming increasingly fierce.

Standing at a new starting point of profound changes in the world’s military, and looking at the future battlefield with a high degree of integration of informatization and intelligence, intelligent navigation systems will come into being and play an important role.

Satellite navigation becomes a “standard” element of the intelligent battlefield

The future intelligent battlefield will present the characteristics of high-tech warfare, which will comprehensively use intelligent weapons and means under information conditions, realize efficient command and control, and implement precise and flexible strikes. Satellite navigation technology can provide high-precision, all-weather, large-scale and multi-purpose positioning, navigation and timing services for various objects on land, sea, air and space.

Provide a unified time and space benchmark for systematic operations. For the intelligent battlefield, there are many linked elements and the situation changes rapidly, which requires accurate positioning of combat units to achieve intelligence reconnaissance, command and control, battlefield maneuvers, offensive and defensive operations, and support and guarantee under a unified time and space benchmark, ensuring that all elements of the entire battlefield form a coordinated organic whole.

The basic function of satellite navigation is to provide accurate time and space references for various combat elements. Without an accurate and unified time and space reference, the precise command of joint operations may be out of balance, combat operations may be out of control, and intelligence fusion and target identification cannot be achieved. If the time error is one hundredth of a second, a target locked by more than a dozen radars will become more than a dozen targets, and accurate defense and counterattack will not be possible.

Under a unified standard time and geographic coordinate system, satellite navigation provides precision guidance for various weapon platforms, fine frequency calibration for electronic warfare weapons, and all-weather positioning and navigation for individual combatants, significantly improving the coordination and strike effectiveness of joint firepower strikes.

Provide synchronous situation cognition for combat command and control. Accurately grasping the battlefield situation is the premise and basis for commanders to flexibly and accurately implement command and control. The satellite navigation system provides strong support for battlefield situation awareness.

Since the 1990s, the U.S. military has developed a “Blue Force Tracking” system based on GPS and satellite communications to build a precise command and control system. The “Blue Force Tracking” system has effectively supported the U.S. military in forming a networked information advantage on the ground battlefield and effectively solved the problem of “where are we, our friends, and our enemies?”

Relying on the two major services of navigation positioning and position reporting of the global satellite network, the military has realized battlefield situation monitoring and sharing, which has become an important means for the military to “know itself”. At the same time, it has optimized the combat operation process, realized the issuance of combat orders at the minute level, and accelerated the development of the military’s command and control mode towards “integration” and “flattening”.

Providing a tool to enhance the precision strike of weapons and ammunition. In the intelligent battlefield, precision-guided weapons have become the “trump card” that determines victory or defeat. Using the satellite navigation system, the flight process of the missile can be corrected throughout to ensure the accuracy of the hit. It can be said that the satellite navigation system is a tool to enhance the precision strike of weapon platforms.

In recent local wars, the proportion of GPS precision-guided weapons of the US military has continued to rise: 7.6% in the Gulf War in 1991, 35% in the Kosovo War in 1999, 60% in the Afghanistan War in 2001, 68.3% in the Iraq War in 2003, and 100% in the Syrian War in 2018.

Intelligent battlefield requires satellite navigation to have new “responsibilities”

As the core and cornerstone of the precise and unified space-time system, the modern satellite navigation system must take on new responsibilities in response to the development needs of future intelligent battlefields.

In the era of intelligence, new combat elements represented by “AI, cloud, network, group, and terminal” will reconstruct the battlefield ecology and completely change the winning mechanism of war. Satellite navigation services need to adapt to the characteristics of the intelligent battlefield with wider dimensions, higher precision, and stronger system.

Navigation positioning and timing have a wider range and higher accuracy. The current satellite navigation system has achieved coverage of the earth’s surface. However, on the intelligent battlefield, it needs to extend to deep space and under the sea. The combat time domain and air domain are wider, requiring the construction of a comprehensive service system covering land, sea, air and space, with unified standards, high efficiency and intelligence, to form time and space information coverage at all times and everywhere, and to achieve more powerful, safer and more reliable time and space service capabilities.

For example, in the intelligent battlefield, unmanned combat has become the basic form. Autonomous driving of unmanned vehicles, precision approach of drones, and measurement of intelligent missile positions all urgently need to be improved by an order of magnitude on the basis of existing navigation accuracy to ensure higher navigation integrity, faster first positioning time, and stronger cross-domain capabilities of land, sea, air, and space.

The military navigation confrontation system is more complete and more powerful. The means of navigation confrontation in the information age is a simple confrontation form based on signal energy enhancement and interference attack. Navigation in the intelligent era is intertwined with detection, perception, communication, command, and decision-making. It requires a navigation capability level with higher power and faster effectiveness in any region of the world, the ability to intelligently adjust navigation signals, and the development of multiple navigation means such as quantum navigation, pulsar navigation, and deep-sea navigation. It is necessary to integrate navigation methods with different principles, methods, and carriers to achieve navigation confrontation capabilities at the system level and system level.

The bandwidth of navigation information interaction is larger and the access is wider. In the intelligent era, the role of cyberspace in the combat system is gradually increasing, and it is integrated with the navigation space-time system. The navigation information and cyberspace system that provide space-time position will connect the scattered combat forces and combat elements into a whole, forming a networked and systematic combat capability. This requires support for ubiquitous perception, left-right collaboration, and reliable and reconfigurable navigation capabilities, support for highly reliable, highly anti-interference, and readily accessible signaling channels, and timely acquisition of required navigation auxiliary information such as geography, maps, and images. On this basis, the real integration of communication and navigation is realized, achieving the effect of “one domain combat, multi-domain support”.

Adapting to the needs of military intelligence development and promoting the construction of intelligent navigation system

Judging from the development trend of the world’s military powers, facing the future intelligent battlefield, intelligent navigation systems are gradually building a space-time reference network and navigation information service network that integrates the earth and the sky, with space-based, systematized, on-demand and cloud-based as the main characteristics, forming a comprehensive navigation, positioning and timing system with unified reference, seamless coverage, security and reliability, high efficiency and convenience, and strong practicality.

The core of the transformation from a basic navigation system to an intelligent navigation system is to upgrade from “positioning navigation service” to “intelligent navigation service”, and the focus is on achieving the following four aspects of transformation:

The space-time benchmark is shifting from relying on ground systems to autonomous space-time benchmark maintenance. The space-time benchmark maintenance equipment of the ground system will gradually be transferred to the satellite, and the satellite will be equipped with higher-precision optical clocks and astronomical measurement equipment to form a more stable and reliable space-based space benchmark through high-precision anchoring and laser intersatellite measurement. The use of intelligent navigation systems can make ordinary navigation positioning accuracy reach sub-meter level, the timing accuracy will be increased by about 5 times, and the precision positioning service can achieve fast convergence of centimeter-level accuracy. Intelligent navigation can fully support the cross-domain integration of combat platforms, the doubling of the effectiveness of distributed lethal weapons, and the precise navigation of the entire process of air-space integrated drones from cruising to precision approach.

The satellite power confrontation mode is transformed into a navigation system confrontation. In terms of navigation confrontation services, the traditional satellite power confrontation mode will no longer meet the needs of the intelligent battlefield. Navigation system confrontation is the only way for the development of intelligent equipment in order to enhance the ability of troops to quickly adapt to the battlefield environment. Specifically, it includes precise release of navigation performance, heterogeneous backup of constellations, and global hotspot mobility. The main features are intelligent navigation signals and flexible theater reinforcements. Based on controllable point beam energy enhancement technology, energy delivery in hotspot areas, enhanced area expansion, deception or blocking interference, and digital transmission service guarantee are realized. In a high-interference and blocking environment, ensure service continuity and accuracy, and gradually release strength as the war progresses.

The simple integration of communication and navigation will be transformed into integrated on-demand services. It will provide deeper and broader navigation information services, deeply integrate into the military information network, and provide high, medium and low-speed classified and hierarchical navigation information services to users on land, sea, air and space. Reuse the favorable conditions of global multiple continuous coverage of navigation satellites to meet users’ communication and navigation needs in a global range and in any posture, and realize high reliability and strong interference-resistant search and rescue, position reporting, and signaling transmission. The navigation satellite space-based network interacts with the ground network information to build inter-satellite and satellite-to-ground high-speed backbone networks. Through miniaturized laser terminals and enhanced space routers, a stable and reliable space network is formed, equipped with a complete and standardized protocol system to support the autonomous and intelligent operation of hybrid constellation networks.

The computing resources of payload modules are separated and transformed into cloud computing resources of constellation. It will provide more intelligent space-based cloud computing services and reliable space-based intelligent support for intelligent weapon platforms. The main features are virtualization of onboard hardware resources and balancing of task loads. Through the configuration of public onboard computing modules, large-capacity storage units, and high-speed bus networks on navigation satellites, a ubiquitous space network shared resource pool is formed. The powerful data processing capability can support the autonomous establishment and maintenance of space-based space-time benchmarks, intelligent maintenance of navigation signal quality, and autonomous management of space networks. At the same time, it can provide computing, push, and storage services for complex information such as spatial position for various high-end users in the sky, air, land, and sea.

(The author is an academician of the Chinese Academy of Engineering)

Above: Schematic diagram of satellite navigation system supporting operations.

現代國語:谭述森

中國軍網 國防部網

2021年11月12日 星期五

衛星導航系統,即全球衛星導航系統,是能在地球表面或近地空間任何地點,為使用者提供全天候三維座標和速度以及時間資訊的空基無線電導航定位系統。

衛星導航系統是人類重要的太空基礎設施,堪稱一個國家安全和經濟社會發展不可或缺的重器,對戰爭形態、作戰樣式和人們生產生活方式有深遠影響。

目前,全球有四大全球衛星導航系統,分別是美國的GPS、俄羅斯的格洛納斯、歐洲的伽利略和中國的北斗,衛星導航技術全球競爭日益激烈。

站在世界軍事深刻變革的新起點,瞭望資訊化智能化高度融合的未來戰場,智慧導航體系將應運而生,並發揮重要作用。

衛星導航成為智慧化戰場的「標配」要素

未來智慧化戰場,將呈現資訊化條件下綜合運用智慧化武器和手段、實現高效指揮控制及實施精確靈巧打擊的高技術作戰特性。衛星導航技術,能高精度、全天候、大範圍、多用途地為陸、海、空、天各種物件提供定位、導航、授時服務。

為體系化作戰提供統一時空基準。對於智慧化戰場來說,連結要素多、情況瞬息萬變,要求對作戰單元進行準確定位,實現統一時空基準下的情報偵察、指揮控制、戰場機動、攻防行動、支援保障,確保整個戰場各類要素形成統籌協調的有機整體。

衛星導航的基本功能是,為各個作戰要素提供精確的時空基準。如果沒有精確統一的時空基準,聯合作戰精準指揮可能失調,作戰行動就可能失控,情報融合、目標辨識就無法實現。時間誤差百分之一秒,十幾部雷達鎖定的一個目標就會變成十幾個目標,精準防禦反擊將無法實現。

在統一標準時間與地理座標系下,衛星導航提供各類武器平台精確導引,給予電子戰武器精細校頻,給予作戰單兵全天候定位導航,顯著提升聯合火力打擊的協同程度、打擊效能。

為作戰指揮控制提供態勢同步認知。準確掌握戰場態勢,是指揮官靈活準確實施指揮控制的前提與基礎。衛星導航系統為戰場態勢感知提供了強大支撐。

美軍從1990年代開始,研發以GPS和衛星通訊為基礎的「藍軍追蹤」系統,用來建構精確化指揮控制系統。 「藍軍追蹤」系統有力支撐著美軍形成地面戰場網路化資訊優勢,有效解決了「我、友、敵在哪裡」的難題。

軍隊依托全球衛星網路的導航定位和位置報告兩大服務,實現了戰場態勢監視共享,成為軍隊「知己」的重要手段。同時,優化了作戰行動流程,實現了作戰指令分秒下達,加速了軍隊指揮控制方式向「一體化」「扁平化」方向發展。

為武器彈藥精確打擊提供增效利器。在智慧化戰場上,精確導引武器已成為關乎勝負的「撒手鐧」。使用衛星導航系統,能對飛彈的飛行過程進行全程修正,確保命中精度。可以說,衛星導航系統是武器平台精準打擊的增效利器。

在近幾場局部戰爭中,美軍GPS精確導引武器比例不斷攀升:1991年海灣戰爭為7.6%,1999年科索沃戰爭為35%,2001年阿富汗戰爭為60%,2003年伊拉克戰爭為68.3%,2018年敘利亞戰爭達100%。

智慧化戰場需要衛星導航有新的“擔當”

現代衛星導航系統作為精確統一時空體系的核心與基石,面向未來智慧化戰場的發展需求,要有新的「擔當」。

智能化時代,以「AI、雲、網、群、端」為代表的全新作戰要素,將重建戰場生態,完全改變戰爭的勝利機制。衛星導航服務,需要適應智慧化戰場維度更廣、精準度更高、系統更強的特性。

導航定位授時範圍更廣精度更高。目前的衛星導航系統,實現了地球表面覆蓋。但在智慧化戰場上,需要向深空、海下延伸。作戰時域空域更廣,要求建構覆蓋陸海空天、基準統一、高效智慧的綜合服務體系,形成無時不有、無所不在的時空資訊覆蓋,實現更強大、更安全、更可靠的時空服務能力。

如智慧化戰場上,無人化作戰成為基本形態。無人車自動駕駛、無人機精密進場、智慧飛彈陣地測量等,都迫切需要在現有導航精度基礎上再提升一個量級,確保導航完好性更高、首次定位時間更快、陸海空天跨域能力更強。

軍事導航對抗體系更全更給力。資訊時代的導航對抗手段,是以訊號能量增強與幹擾攻擊為主的簡單對抗形態。智慧時代的導航與探測、感知、通訊、指揮、決策相互交織影響,需要全球任意區域、功率更高、生效更快的導航能力水平,需要導航訊號智慧調整能力,需要發展量子導航、脈衝星導航、深海導航等多元導航手段,把不同原理、不同方式、不同載體的導航方法融合在一起,實現體系級、系統級的導航對抗能力。

導航資訊互動頻寬更大存取更廣。智慧時代的網路空間,在作戰體系中地位作用逐步上升,並與導航時空體系合為一體。提供時空位置的導航資訊與網路空間系統,將把分散的作戰力量、作戰要素連結為一個整體,形成網路化體系化作戰能力。這就需要支援泛在感知、左右協作、可信賴的導航能力,支援高可靠、強抗干擾、隨遇接取的訊號通道,及時取得所需的地理、地圖和影像等導航輔助資訊。在此基礎上,實現真正意義上的通訊導航一體化,達到「一域作戰、多域支援」效果。

適應軍事智慧化發展需要推動智慧導航體系建設

從世界軍事強國發展趨勢來看,面向未來智慧化戰場,智慧導航系統在逐步建構天地一體化的時空基準網和導航資訊服務網,以天基化、體系化、按需化、雲端化為主要特徵,形成基準統一、覆蓋無縫、安全可信、高效便捷、實戰性強的綜合導航定位授時體系。

從基本導航系統轉變為智慧導航系統,其核心是從“定位導航服務”升級為“智慧導航服務”,並專注於以下4個面向轉變:

時空基準依賴地面系統維持轉變為時空基準天基自主維持。地面系統時空基準維持設備將逐步向星上轉移,衛星將配置更高精度的光鐘、天文測量設備,透過高精度錨固和雷射星間測量,形成更穩定可靠的天基空間基準。智慧導航系統的使用,可使一般導航定位精度達到亞米級,授時精度將提升5倍左右,精密定位服務達到快速收斂的公分精度。智慧導航可完整支撐作戰平台跨域融合、分散式殺傷武器效能倍增、空天一體無人機從巡航到精密進場的全過程精準導航。

衛星功率對抗模式向導航體系化對抗轉變。在導航對抗服務方面,傳統的衛星功率對抗模式將不再滿足智慧化戰場需求,導航體系化對抗是智慧裝備發展的必經之路,以便提升部隊快速適應戰場環境能力。具體包括導航性能精準釋放、星座異構備份、全球熱點機動,主要特徵是導航訊號智能化、戰區增援靈活化。基於可控制點波束能量增強技術,實現熱點區域能量傳遞、增強區域擴展、欺騙或阻塞幹擾、數傳服務保障。在高幹擾阻塞環境下,確保服務連續性和精確度,並隨著戰事進程逐步釋放實力。

通訊導航簡單整合向通導一體按需服務轉變。將提供更深更廣的導航資訊服務,深度融入軍事資訊網絡,向陸、海、空、天用戶的高、中、低速分類分層次導航資訊服務。重複利用導航衛星全球多重連續覆蓋的有利條件,滿足用戶在全球範圍、任意姿態的通導需求,實現高可靠性、抗強幹擾的搜救、位置報告、信令傳輸。導航衛星天基網路與地面網路資訊交互,建構星間、星地高速骨幹網路。透過小型化雷射終端和增強型空間路由器,形成穩定可靠的空間網絡,裝載完備、標準統一的協議體系,支援混合星座網絡自主智慧運作。

載重模組運算資源分離向星座運算資源雲端化轉變。將提供更智慧的天基雲端運算服務,為智慧武器平台提供可信賴的天基智慧支撐。主要特徵是,星載硬體資源虛擬化、任務負載平衡化。透過導航衛星配置公用的星載運算模組、大容量儲存單元、高速匯流排網絡,形成泛在的空間網路共享資源池。強大的資料處理能力,在支撐天基時空基準自主建立與維持、導航訊號品質智慧維持、空間網路自主管理等任務功能的同時,可為天、空、地、海各類高階用戶,提供空間位置等複雜資訊的運算、推播與儲存服務。

(作者係中國工程院院士)

上圖:衛星導航系統支援作戰示意圖。

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2021-11/12/content_30291788.htm

China’s Military Ponders Integration Concept That Will be Adopted During Information Warfare

中國軍方思考資訊戰中將採用的一體化概念

現代英語:

The basic form of information warfare is system confrontation. Different from any form of warfare in history, information warfare is not a discrete confrontation or local decentralized warfare with the simple superposition of various combat units and elements, but a holistic confrontation between systems. The system integration capability of war determines the effectiveness of combat and the achievement of war objectives; achieving effective integration of various systems is the fundamental way to win information warfare.

Multi-space fusion

The battlefield space is the stage for the war hostile parties to compete. Due to the widespread use of high-tech weapons, the battlefield space of informationized warfare has been greatly expanded, forming a multi-dimensional battlefield space of land, sea, air, space, and information. Under the strong “bonding” of information technology, each battlefield space is integrated around a unified combat purpose. First, the three-dimensional, all-round reconnaissance and surveillance network covers the battlefield. Under the conditions of informatization, the military reconnaissance and surveillance capabilities have been unprecedentedly improved. The large-scale, three-dimensional, multi-means, and automated intelligence reconnaissance and surveillance network connects outer space, high altitude, medium altitude, low altitude, ground (sea), and underground (underwater) into one, thereby obtaining battlefield intelligence information in multiple fields. Second, long-range, high-precision informationized weapons are densely distributed and threaten the battlefield. The extraordinary combat capability of the informationized weapon system to cover and strike targets in the entire battlefield space has realized that discovery means destruction, and promoted the high integration of various battlefield spaces. In addition, the development of space and air power has made strikes more precise, means more flexible, and combat efficiency higher, and the battlefield space has become an integrated battlefield of sea, land, air, and space. This integrated battlefield structure has a high degree of integration of multiple spaces, and multiple spaces and multiple fields restrict each other. Third, the battlefield is restricted by electromagnetic and information competition in all time and space and throughout the entire process. The development of military information technology not only realizes the integration of tangible battlefields on land, sea, air and space through reconnaissance and strikes, but also opens up the competition for invisible battlefields in the electromagnetic and information fields. Electromagnetic and information are the soul of informationized warfare and the link between the battlefields on land, sea, air and space. They exist in the entire time and space of combat, act on all elements of war, run through the entire process of combat, and deeply affect the tangible battlefields on land, sea, air and space.

It can be seen that the informationized battlefield is precisely through the increasingly mature information technology, centering on the purpose of war and combat needs, closely integrating the multi-dimensional space of land, sea, air, space, information, etc., forming an inseparable and interdependent organic unity. Leaving any dimension of the battlefield space, or losing control of any dimension, will directly affect the overall combat effectiveness, thus leading to the failure of the war.

Fusion of multiple forces

War power is the protagonist of the battle between the two opposing sides of a war. The “integrated joint combat force” of system integration is a prominent feature of information warfare. Various participating forces in information warfare are highly integrated. Regardless of their affiliation and combat mission, they will be equal users and resources of the entire combat system and integrated into a unified large system. First, the participating forces are united. Information warfare is a joint operation in which the army, navy, air force, aerospace, special operations, information operations and other forces participate. Each participating force has advantages that other participating forces do not have or cannot replace. They communicate and connect through information technology to achieve “seamless connection” and form a force system that can play to its strengths and avoid its weaknesses and complement each other’s advantages, becoming an organic whole that combines “soft” strike and “hard” destruction capabilities, combat and support capabilities, mobility and assault capabilities, and attack and defense capabilities. Second, the participants are diversified. With the development of information networks, wars in the information age no longer have a distinction between the front and the rear, and the networking of combat systems can also make home a “battlefield”. In the industrial age, wars were “over, go home”; in the information age, wars can also be “go home and fight”. Participants in war are not limited to the military forces of countries and political groups. Non-governmental and group-based people can join the “battlefield” as long as they have high-tech knowledge and are proficient in computer applications. Third, the support force is socialized. With the development of science and technology, the mutual tolerance, intercommunication and compatibility of military and civilian technologies have been greatly enhanced. A large number of combat facilities and platforms will rely more on local basic resources. Not only does the material support in combat need to be socialized, but also the technical support and information support need to be socialized.

It can be seen that the victory or defeat of the informationized battlefield depends on the overall strength of the warring parties. Various combat forces are both interrelated and mutually influential, but any single force is difficult to determine the outcome of the war. Only when multiple forces work closely together and learn from each other’s strengths and weaknesses can the overall combat system benefits be brought into play and victory be ultimately achieved.

Multi-level integration

The war level is the pattern of the war between the two hostile parties. In information warfare, the distinction between strategy, campaign and battle is no longer as clear as in traditional warfare. Instead, there is a mutual integration of you and me, and the distinction between levels has become relatively vague. First, the war path is simplified. With the centralized use of a large number of informationized weapons and equipment and their information systems, the precision strike capability of the troops has been unprecedentedly improved. A small-scale combat operation and a high-efficiency information offensive operation can effectively achieve certain strategic goals. A battle, a campaign or a carefully planned information operation may be a war. The path to achieve the purpose of war is becoming simpler and the convergence of war, campaign and even battle in purpose and time and space is prominent. Second, command and control is real-time. The widespread use of automated command and control systems on the battlefield has greatly enhanced the command and control function. Campaign commanders and even the highest political and military leadership of the country can plan and command and control all participating forces and specific combat operations in a unified manner, and directly intervene in campaigns, battles and even the actions of individual soldiers or combat platforms in near real time. Combat and campaign operations are similar to strategic engagements. Third, the combat process is fast-tracked. Quick victory and quick decision are important features of information warfare. The combat time is showing a trend of shortening. There is no concept of time for all combat operations. More often, the participating forces at all levels are carried out simultaneously in different fields. The beginning and the end are closely linked. The combat operations in various battlefield spaces penetrate each other, are closely linked, and gradually merge into an integrated and coordinated system, which is difficult to distinguish at the level.

It can be seen that information warfare has a strong overall nature. Campaigns, as a bridge for achieving strategic and even war objectives, are gradually integrated into battles. Combat, as the most basic combat activity in war, is also gradually sublimated into strategies and campaigns. All levels are intertwined and serve to achieve the purpose of war. Only by comprehensively exerting the combat capabilities of all levels and achieving overall effects can we seize the initiative in the war.

Fusion of various styles

The combat style is the carrier for the war hostile parties to compete. Informationized warfare is a process of confrontation between multiple forces and multiple fields, and is manifested in multiple combat actions and confrontation styles. Various combat actions are inseparable from the overall combat situation, and various actions are closely linked, mutually conditional, coordinated, and integrated to form an overall combat power. The first is the unity of combat actions. The victory or defeat of informationized warfare is the result of the system confrontation between the two warring parties. Isolated and single combat actions are often difficult to work. This requires multiple military services to adopt a variety of combat styles in different combat spaces and combat fields, while the combat style dominated by a single military service can only “live” in the overall joint action as a sub-combat action, and all combat actions are unified in the system confrontation. The second is the integration of combat actions. Informationized warfare is a form of war that pursues high efficiency. Objectively, it requires that multiple combat styles and actions must be highly “integrated” from the perspective of system effectiveness. Comprehensively use a variety of combat styles and tactics, combine tangible combat actions with intangible combat actions, combine non-linear combat with non-contact combat and asymmetric combat, combine psychological warfare with public opinion warfare and legal warfare, combine regular combat with irregular combat, and combine soft strikes with hard destruction to form an overall advantage. The third is the mutation of combat actions. In information warfare, while integrating various combat resources and exerting overall power, both hostile parties strive to find the “center of gravity” and “joint points” of the other side. Once the enemy’s weak points are found, all combat forces and actions are linked as a whole and autonomously coordinated, and various styles and means of destruction are adopted to cause a sudden change in the enemy’s combat capability and a comprehensive “collapse” of the combat system, so as to achieve combat initiative and advantage.

It can be seen that information warfare is a practical activity in which various forces use a variety of combat styles and means to compete in multiple battlefield spaces and combat fields. Only when multiple combat styles and means cooperate, support and complement each other can a multiplier effect be produced, thereby exerting the maximum combat effectiveness of the entire system.

Multi-method integration

The means of war are methods used to achieve the purpose of war. In addition to powerful military means, information warfare must also use all available ways and means to cooperate with each other, organically integrate, and form a whole to achieve a favorable situation. First, the use of war means is comprehensive. All wars have a distinct political nature and serve certain political purposes. With the influence of factors such as the globalization of the world economy and the multipolarization of international politics, information warfare is more based on military means, and military means are used in combination with various means such as economy, diplomacy, culture, and technology. Second, the use of war means is gradient. With the development of the times, war as a means of maintaining and seeking power and interests has been increasingly restricted by international law and international public opinion. In addition, resorting to war requires a high price. Therefore, in the information age, the use of war means presents a gradual development gradient, usually starting from retaliation, display of force, and violent retaliation (strike) in the sense of international law, and finally developing into local or even large-scale wars. Third, the use of war means is systematic. Information warfare is a contest of the comprehensive national strength of the hostile parties. The victory of the war depends on the comprehensive and systematic use of various war means. In specific combat operations, various means of warfare have different functions and natures, occupying different positions and playing different roles in the war. Only by closely combining various effective means of warfare into an organic whole can we form a combat system that fully utilizes our strengths and avoids our weaknesses, and maximize the overall combat effectiveness.

It can be seen that information warfare is subject to more restrictive factors, simpler war objectives, and newer combat styles. In the process of decision-making and action, only by coordinating and integrating with struggle actions in other fields such as politics, economy, culture, and diplomacy can the overall goal of the war be achieved efficiently.

現代國語:

中國軍網 國防部網

2019年12月10日 星期二

張自廉 馬代武

資訊化戰爭的基本形式是體系對抗。與歷史上任何一種戰爭形態都不同,資訊化戰爭不是各作戰單元、要素簡單疊加的離散式對抗或局部分散式作戰,而是體系對體系的整體對抗。戰爭的體系融合能力,決定作戰效能的發揮和戰爭目的達成;實現各系統的有效融合,是打贏資訊化戰爭的根本途徑。

多空間融合

戰場空間是戰爭敵對雙方較量的舞台。由於高技術兵器的廣泛運用,資訊化戰爭戰場空間大為拓展,形成了陸、海、空、天、資訊等多維戰場空間。各戰場空間在資訊科技的強力「黏合」下,圍繞著統一的作戰目的融為一體。一是立體化、全方位的偵察與監視網覆蓋透視戰場。在資訊化條件下,軍事偵察與監視能力空前提高,大範圍、立體化、多手段、自動化的情報偵察與監視網,將外層空間、高空、中空、低空、地面(海上)、地下(水下)連為一體,進而獲取多領域的戰場情報資訊。二是遠射程、高精準度的資訊化武器密布威脅戰場。資訊化武器系統所具有的覆蓋和打擊戰場全空間目標的超常作戰能力,實現了發現即意味著摧毀,促進了各戰場空間的高度融合。加之太空和空中力量的發展,使打擊更精確,手段更靈活,作戰效益更高,戰場空間成為海陸空天一體化戰場。這種一體化的戰場結構,多空間高度融合,多空間、多領域相互制約。第三是全時空、全過程的電磁和資訊爭奪滲透制約戰場。軍事資訊科技的發展,不僅透過偵察、打擊等手段實現有形的陸海空天戰場一體化,也開闢了電磁和資訊領域無形戰場的爭奪。電磁和訊息是資訊化戰爭之魂,是連結陸海空天戰場的紐帶,存在於作戰的全時空,作用於戰爭的全要素,貫穿作戰的整個過程,深度影響著陸海空天各維有形的戰場。

可見,資訊化戰場正是透過日益成熟的資訊技術,圍繞著戰爭目的和作戰需要,把陸、海、空、天、資訊等多維空間緊密地融合在一起,形成不可分割、唇齒相依的有機統一體。離開了哪一維戰場空間,或是失去哪一維的控制權,都會直接影響全域作戰效能,進而導致戰爭失敗。

多力量融合

戰爭力量是戰爭敵對雙方較量的主角。體系融合的「一體化聯合作戰力量」是資訊化戰爭的突出特徵。資訊化戰爭各種參戰力量高度一體化,無論其隸屬關係如何、作戰任務如何,都將作為整個作戰系統的平等用戶和資源,融合成為一個統一的大系統。一是參戰部隊聯合化。資訊化戰爭是陸、海、空軍以及航太、特種作戰、資訊作戰等部隊參與的聯合作戰。各參戰部隊都具有其他參戰部隊所不具備或無法替代的優勢,它們通過信息技術溝通和聯繫,實現“無縫鏈接”,形成可以揚長避短、優勢互補的力量體系,成為具備“軟”打擊與“硬”摧毀能力、作戰與保障能力、機動與突擊能力、攻擊與防護能力相結合的有機整體。二是參加人員多元化。隨著資訊網路的發展,資訊時代的戰爭,不再有前方後方之分,作戰系統的網路化使家中也可能成為「戰場」。工業時代的戰爭,「結束了,回家去」;資訊時代的戰爭,也可以「回家,打仗去」。戰爭的參與者不僅只局限於國家和政治集團的軍事力量,非政府和團體性質的民眾,只要具有高技術知識就能投身“戰場”,只要熟練計算機應用都可能成為參與戰鬥的一員。三是保障力量社會化。科學技術的發展,軍用、民用技術的互容、互通和相容性大大增強,大量作戰設施和平台將更加依靠地方基礎資源,不僅作戰中的物資保障需要社會化,而且技術保障與資訊支援也需要社會化。

可見,資訊化戰場的勝負取決於交戰雙方整體力量的強弱,多種作戰力量既相互關聯,又相互影響,但其中任何單一的力量都難以決定戰爭的勝負。只有多種力量密切配合、取長補短,才能發揮整體作戰的系統效益,最終贏得勝利。

多層級融合

戰爭層級是戰爭敵對雙方較量的格局。在資訊化戰爭中,戰略、戰役、戰鬥之間已不再像傳統戰爭那樣涇渭分明,更多的是,你中有我,我中有你,層級區分變得相對模糊。一是戰爭途徑簡約化。大量資訊化武器裝備及其資訊系統的集中運用,部隊的精確打擊能力空前提高,一次小規模的作戰行動和高效益的資訊進攻行動,就能有效達成一定的戰略目的。一場戰鬥、一場戰役或一次周密計畫的資訊行動可能就是一場戰爭。達成戰爭目的的途徑不斷走向簡約,戰爭與戰役甚至戰鬥在目的和時空上的趨同性突出。二是指揮控制即時化。自動化指揮控制系統在戰場上的廣泛運用,指揮控制功能大大增強,戰役指揮員甚至國家最高政治、軍事領導層能夠對所有參戰力量和具體的作戰行動進行統一籌劃和指揮控制,近乎實時地直接幹預戰役、戰鬥甚至單兵或作戰平台的行動,戰鬥和戰役行動趨同於戰略交戰。三是作戰進程速決化。速戰速決是信息化戰爭的一個重要特徵,作戰時間呈現出縮短的趨勢,所有作戰行動已無時間上的概念,更多的是各層次的參戰力量在不同領域同時進行,開始與結束緊密相連,各戰場空間的作戰行動互相滲透、緊密聯繫、逐漸融合成一個整體聯動的綜合體系,難以作層級上的區分。

可見,資訊化戰爭整體性強,戰役作為戰鬥達成戰略乃至戰爭目的的橋樑,逐漸融合在戰鬥中;戰鬥作為戰爭中最基本的作戰活動,也逐漸昇華到戰略、戰役裡面,各層次之間,相互交融,共同為達成戰爭目的服務。只有綜合發揮各層級的作戰能力,達到整體效應,才能奪取戰爭的主動權。

多樣式融合

作戰樣式是戰爭敵對雙方較量的承載。資訊化戰爭是多力量、多領域實施對抗的過程,並表現為多種作戰行動和對抗樣式。各種作戰行動對於作戰全局來說都是不可分割的,各種行動之間也是緊密聯繫,互為條件,相互協調,融為一體,從而形成整體作戰威力。一是作戰行動的統一性。資訊化戰爭的勝負是交戰雙方體系對抗的結果,孤立、單一的作戰行動往往是難以發揮的。這就要求多個軍兵種在不同的作戰空間、作戰領域綜合採取多種作戰樣式,而單一軍兵種為主的作戰樣式將只能作為子作戰行動「棲身」於整體的聯合行動之中,所有的作戰行動統一於體系對抗之中。二是作戰行動的整合性。資訊化戰爭是追求高效益的戰爭形態,客觀上要求必須從系統效能出發,將多種作戰樣式和行動高度「整合」。綜合運用多種作戰樣式和戰法,把有形的作戰行動與無形的作戰行動結合起來,把非線式作戰與非接觸作戰、非對稱作戰結合起來,把心理戰與輿論戰、法律戰結合起來,把正規作戰與非正規作戰結合起來,把軟打擊與硬摧毀結合起來,形成整體優勢。三是作戰行動的突變性。在資訊戰爭中,敵對雙方在整合己方各種作戰資源、發揮整體威力的同時,都著力尋找對方“體系重心”“關節點”,一旦發現敵薄弱部位,所有作戰力量和行動通過整體聯動和自主協同,採取多樣式、多手段的破擊行動,造成敵作戰能力的突變和主動作戰體系的全面作戰,以實現“崩塌與優勢”,以崩潰與作戰能力的全面作戰。

可見,資訊化戰爭是各種力量在多個戰場空間、作戰領域中綜合運用多種戰鬥樣式和作戰手段同場競技的實踐活動。只有多種戰鬥樣式、作戰手段相互配合、相互支援、互補,才能產生倍增效應,進而發揮整個系統的最大作戰效能。

多手融合

戰爭手段是為達成戰爭目的而運用的方法。資訊化戰爭除了強大的軍事手段外,還必須動用一切可以動用的方式和手段,相互配合,有機融合,形成整體,以取得有利的態勢。一是戰爭手段運用綜合化。凡戰爭都有鮮明的政治性,都是為一定的政治目的服務的。隨著世界經濟全球化、國際政治多極化等因素的影響,資訊化戰爭更多的是以軍事手段為主,軍事手段與經濟、外交、文化、科技等多種手段的綜合運用。二是戰爭手段運用梯度化。隨著時代的發展,戰爭作為維護、謀求權力與利益的手段受到了國際法和國際輿論越來越多的限制,加上諸戰爭需付出高昂代價,所以信息化時代在戰爭手段運用上,呈現出逐步發展的梯度性,通常先由國際法意義上的報復、顯示武力、暴力性報復(打擊),最後發展至局部戰爭。三是戰爭手段運用的系統化。資訊化戰爭是敵對雙方綜合國力的較量,戰爭的取勝,有賴於各種戰爭手段綜合、系統運用。在具體的作戰行動中,各種戰爭手段因其功能、性質的不同,在戰爭中居於不同的地位,扮演不同的角色。只有把各種有效的戰爭手段緊密地結合成一個有機連結的整體,才能形成充分揚己之長、避己之短的作戰體系,最大限度地發揮整體作戰效能。

可見,資訊化戰爭受制因素增多、戰爭目的簡約、作戰樣式翻新,在決策與行動過程中,只有與政治、經濟、文化、外交等其他領域鬥爭行動互相配合,融為一體,才能高效地達成戰爭總體目標。

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2019-12/10/content_24955988.htm