Joint operations are the basic form of combat in modern warfare. They emphasize the strength of more than two services and arms and other participating forces, and jointly implement operations in multi-domain space under unified command. “Single domain” and “multidomain” interdependence and interaction in joint operations are a pair of important military categories. Grasping the relationship between single domain and multi-domain is the core content and key to solving the “internal interface” problem in the construction and application of joint combat forces. The relationship between the two should be viewed dialectically and correctly handled, and the winning mechanism of joint operations should be continuously enriched to promote joint operations. Really achieve cross-domain integration, energy gathering and efficiency improvement.
“Single domain” is the constituent element and development basis of “multi-domain”
Joint operations emphasize the formation of advantageous multi-domains based on advantageous single domains, and place higher demands on the coupling relationship between each single domain that makes up the multi-domain. The development of a single domain can provide a solid foundation for the development of multiple domains and create prerequisites for achieving cross-domain integration.
In terms of historical process, single domain to multi-domain is the process of domain expansion. Throughout human history, the wars of each era have applied the techniques of their own era, imprinted the imprint of their own era, and developed with the time and space of the war. War in the agricultural era, with cold weapons as the main military equipment, battlefield fighting is mainly limited to land and offshore waters. It is a lower-level “full contact” war, and the combat domain is relatively single, making early operations “loose” Joint characteristics.
Entering the industrial era, with the invention and use of steam engines and internal combustion engines, air combat weapons represented by combat aircraft appeared on the battlefield. The combat space broke through the limitations of land and sea areas, forming a three-dimensional battlefield between land, sea and air. The war turned “semi-contact”, making joint operations take on “cooperative” joint characteristics. Entering the information age, the combat space breaks through the three-dimensional geographical space and forms a multi-domain integration of land, sea, air, space, electricity, network, and cognitive fields, making joint operations present multi-domain “integrated” characteristics. With the development of single domain to multi-domain, single-domain control rights such as land control, sea control, air control, heaven control, and information control have continued to appear, and the subsequent importance of single-domain control has continued to increase, promoting the connotation of multi-domain control. Expanding and changing, the competition for comprehensive control has become the first priority in the confrontation between ourselves and the enemy.
In terms of development form, single domain to multi-domain is a process of clustering into a network. Restricted by technical conditions and other constraints, combat activities before the information age, whether in terms of battlefield time, battlefield space, or the deployment and use of combat forces, have clear sections between single domains and clear levels of action at all levels, showing a strong Sequential and progressive, showing a single-domain chain development form.
Entering the information age, under the full “adhesion” of the network system, the multi-domain force formation develops from “combination” to “convergence”, forming an elastic structure with spatial dispersion and deployment, time coordination, and multi-dimensional energy release. According to the battlefield situation and changes in the situation, combat activities use the network information system as a “link” to connect the “links” of the combat single domain into a “network” shape, forming the focus of similar strong points and complementary advantages, and realizing each single domain “shape and spirit gathering” and “gathering fingers into fists”, The transition from single-domain chain to multi-domain network was achieved.
In terms of performance index, single domain to multi-domain is a process of energy aggregation and efficiency. Both opposing sides in the war tried to exert their overall combat power in order to achieve combat victory. However, due to the clear boundaries and loose connections of each single domain in the past, improving the overall combat power can only be achieved through the linearity “superposition” of each combat domain. With the development of information technology and intelligent technology, especially the widespread application of information systems in the military, the network information system realizes the command and control of each single domain force and can seamlessly link each combat domain. Each combat force maximizes The advantages of spatial multidimensionality and power diversity have been realized, and the strength and strength of each single domain and each level have been realized The high degree of integration, multi-dimensional cohesion, overall linkage and integrated energy release in terms of means and actions has achieved the effect of complementary advantages, synergy and cohesion, which is conducive to achieving a comprehensive advantage or local overwhelming advantage over the enemy.
“Multi-domain” is the direction-dominant and powerful dominance of “single-domain”
The essence of the winning mechanism of joint operations lies in cross-domain integration to achieve excellence and efficiency, which requires that single domain and multi-domain must be functionally “unified in the same direction”. “Multi-domain” stipulates the status and role of each single domain in combat. Each single domain must start from the overall functional needs of joint operations, focus on providing the ultimate contribution rate to the combat system, and achieve synchronous cross-domain maneuvering, cross-domain coordination, and cross-domain strike, to achieve system advantages in overall confrontation. Currently, the multi-domain dominates and dominates the single-domain in the direction of forming a resultant force with the system mainly from the following aspects.
Transition of multidomain operational requirements to hybrid war threats. At present, conventional threats are expanding and unconventional threats are becoming new and present threats, with the boundaries between regular and irregular battlefields tending to be blurred, between combatants and non-combatants and between physical and virtual dimensions. Joint operations are still the basic form of operations, but specific combat styles show a trend towards combining multiple styles. Various threats from traditional or non-traditional, formal or informal, high-intensity or low-intensity exist on land, sea, air, space, electricity, network, cognition and other multi-domains. These threats add a new dimension to the concept of war. Therefore, it is necessary not only to do a good job in the fight against a single threat, but also to develop the ability to integrate into multi-domain operations to deal with hybrid warfare.
The focus of multi-domain operations shifts to the network information system. Several informatization local wars that have broken out in recent years have shown that no war, no alliance, no alliance, no victory, the network information system that condenses various single-domain combat elements has become the focus of operations, and the combat command information system that gathers the combat power of the network information system has become the main basis for military operations “nerve center” and has become the key point for opponents to attack. The degree of integration of command and information systems is getting higher and higher, and the command systems of each single domain must converge and move closer to the overall command system, so as to achieve system integration of various services and combat units and deep coupling of various combat elements. In line with this, the information domain, the cognitive domain, and the electromagnetic domain, as emerging fields of warfare, have increased in their core status and importance, and have increasingly become the core operational domains for opposing sides to compete for control, becoming capable of causing enemy “blind, incapacitated, and mentally retarded” key operational domains. Therefore, each single domain must strengthen its ability to organically integrate into the network information system within the framework of a unified standard system and achieve interconnection and interoperability between each single domain, so as to ensure that it provides basic support in multi-domain precision warfare and thus wins overall advantages.
Transformation of multi-domain combat forces into joint combat units. Integrated joint operations have the characteristics of platform operations, system support and tactical operations, and strategic support. Strategic-level planning, campaign-level command, and tactical-level operations will become the norm in future wars. Large-scale corps operations may become increasingly rare and will be replaced by joint battles more often on multi-domain battlefields. The joint combat unit will bring together various single-domain combat forces and cover various combat elements. The level of the joint is reflected in the tactical level, presenting an independent combat capability that includes early warning and reconnaissance, information support, combat command, multi-domain attack and defense, combat support and other elements. Joint tactical unit form. Each “single-domain combat force” has a closer coupling relationship, and its own characteristics and advantages will become more prominent.
Accelerate the expansion of “single-domain advantages” to “multi-domain advantages”
For the dialectical unity of a single domain and a multi-domain, we must not only see the unity of a multi-domain, but also respect the independence of a single domain; we must neither completely oppose the two, nor erase the connection between them. In view of the actual situation of combat opponents, combat environment, own strength, etc., and taking into account various political, economic, technological, cultural and other factors, we should accelerate the expansion of “single-domain advantage” to “multi-domain advantage”, so as to form an information advantage, decision-making advantage and operational advantage against the enemy.
First, we must consolidate and expand the advantages of single domain.“ Metcalfe’s law ” tells us that increasing a network entity is capable of producing nonlinear exponential convergence of the combat power of the system. Multi-domain operations are deeply integrated system operations. As the basic element of multi-domain existence, the strength of each single domain’s construction will definitely affect the effectiveness of multi-domain integration. The essence of forming a multi-domain advantage is to deeply aggregate the advantages of each single domain. It is necessary to continuously strengthen the construction of single domain capabilities to form a single domain advantage and limit the opponent’s strength advantage to the limit. In fact, consolidating and expanding the advantages of single domains is not only to enhance single domain performance, but also to serve the purpose of multi-domain convergence. Single-domain construction requires strengthening top-level design, formulating standards and specifications, and striving to overcome conflicts caused by different combat construction concepts formed by the unique combat styles and combat culture of different services. At the same time, it is necessary to coordinate all military construction resources and focus on the development of multi-domain combat weapon platforms to meet the overall needs of joint operations, rather than just the needs of each single domain itself.
Second, we must promote the achievement of cross-domain synergy. Cross-domain synergy emphasizes breaking the boundaries between services and arms and integrating combat forces across services, arms and institutions. Based on the network information system, the combat forces in each domain are distributed in a wide area, and the multiple domains are linked as a whole to complement each other’s advantages and increase efficiency, and quickly gather energy step by step, promoting the expansion of single-domain advantages into multi-domain integration advantages and system advantages, and forming a concentrated energy strike against important enemy targets. In “joint operations”, combat forces in various fields must not only have the ability to independently perform a variety of combat missions, but also need to use their own cross-domain perception, target recognition and strike capabilities to support or even directly participate in other combat domain operations.
3. “Flexible mobile combat application is required!”. The winning mechanism of joint operations lies in the rapid and continuous integration of multi-domain combat forces to form multiple advantages and immediate advantages in specific time windows, forcing the enemy into passivity, disadvantage and dilemma. For the use of single-domain and multi-domain forces, such as the use of fingers and fists, whether it is “pointing points with hands” or “clenching fingers into fists”, or even the mutual transformation and use in combat, we must adhere to seeking truth from facts and comprehensively consider the efficiency of combat effects. Scientifically make decisions based on factors such as efficiency and contribution to the victory of war, and effectively use troops according to circumstances, location, and situation. If the single-domain combat force can solve the problem well, it is no longer necessary to use multi-domain combat forces, thereby improving operational effectiveness.
The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.
Military intelligence leads to accelerated development of cyberspace operations
■Respect the soldiers Zhou Dewang and Huang Anwei
Three major technologies support the intelligence of cyberspace weapons
Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:
First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.
Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.
Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.
The intelligent trend of network-controlled weapons has become increasingly prominent
Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.
In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.
Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.
Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.
Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.
Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.
Intelligent command information system changes traditional combat command methods
Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.
In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.
In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.
To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.
In the future battlefield, fighting courage requires more fighting “wisdom”
■Yang Jian and Zhao Lu
At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.
Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.
It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.
In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.
System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole.
In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze . System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“ 1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence 2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations 3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure 4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control 5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare 6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma 7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support 8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics 9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.
1. Overall deterrence Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.
1.1 Emphasis on multi-domain joint deterrence Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.
1.2 The implementation of overall deterrence should have three major elements Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.
Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.
1.3 Strong overall strength is the core of achieving effective deterrence The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war. In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.
2. Electromagnetic Disturbance Warfare Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.
2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.
2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.
2.3 Crack effective tactics for unmanned cluster operations “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.
3. Cyber-sabotage Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities. The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.
4. Cognitively Controlled Disturbance Warfare Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage. Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.
4.1 Control the cognitive rights of situational awareness and compete for information advantages In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.
4.2 Control and command decision-making power and compete for decision-making advantages Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.
4.3 Control “brain” power and seize the advantage of brain control Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.
5. Agile Mobile Warfare Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.
Table 1 Connotation of the concept of agile warfare
5.1 Efficient and fast decision-making To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.
5.2 High efficiency forms a favorable combat situation It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.
5.3 Efficient and instant gathering of combat power To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.
5.4 Agile mobile warfare is an innovative development of traditional mobile warfare In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.
6. Unmanned cluster autonomous warfare Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.
6.1 It is conducive to forming a system advantage to suppress the enemy Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.
6.2 Conducive to enhancing combat effectiveness In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.
6.3 Conducive to getting into enemy combat difficulties Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.
7. Pointkill Battle “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.
7.1 Achieve efficient combat cost ratio Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.
7.2 Targeting key nodes is an important option The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.
7.3 Large-scale system support is the basic condition The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.
7.4 It is inseparable from precise intelligence support In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.
8. Supply-breaking Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.
8.1 The supply guarantee chain has a huge impact on the overall combat situation Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.
8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.
8.3 The key is to choose the right time and make full use of tactics It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.
9. System “paralysis battle” System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.
9.1 The combat goal is to disorderly operate the enemy’s combat system In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.
9.2 A key node in the heavy strike combat system Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.
9.3 Implement soft strikes against the enemy’s combat system When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat.
The Chinese Communist Party announced the “Strait Thunder-2025A” exercise on the 2nd. The Ministry of National Defense detected 13 Chinese warships, 10 Coast Guard ships, and 8 ships from the Shandong aircraft carrier formation.
(Central News Agency reporter Wu Shuwei, Taipei, 2nd) The two-day Chinese Communist Party military exercise has concluded. Military scholars analyzed that the Chinese Communist Party’s military exercise is still led by politics, using a 70% political and 30% military approach to put pressure on Taiwan, raising the strategic level of “joint blockade” and enhancing the mission role of the Chinese Coast Guard.
The Eastern Theater Command of the People’s Liberation Army of China announced yesterday that it would organize the army, navy, air force, and rocket force to conduct joint exercises around Taiwan. Today, it said that the army will conduct long-range live-fire exercises in relevant waters of the East China Sea in accordance with the “Strait Thunder-2025A” exercise plan.
Regarding the characteristics of the CCP’s military exercise that are worthy of Taiwan’s attention, Chen Wenjia, a senior consultant at the National Policy Research Institute, told a Central News Agency reporter that the PLA’s exercise mobilized the army, navy, air force and rocket force to conduct joint combat drills to test the PLA’s coordinated combat capabilities and enhance the overall effectiveness of operations against Taiwan. Secondly, it is an operational practice exercise, including precision strikes on key infrastructure, blockades of ports and other practical subjects, and simulates scenarios of actual military operations against Taiwan, showing that the PLA’s combat preparations against Taiwan are becoming increasingly mature.
Chen Wenjia said that the Chinese Coast Guard also participated in the military exercise and carried out law enforcement patrols and other operations. The purpose was to exert pressure on Taiwan through gray zone harassment and increase the effectiveness of the “three warfares” of public opinion warfare, psychological warfare, and legal warfare against Taiwan.
Su Ziyun, director of the Institute of Defense Strategy and Resources at the National Defense Security Research Institute, said that the CCP’s military exercise this time is still 70% political and 30% military. Compared with the past “Joint Sword” military exercises against Taiwan, this time the CCP has raised the status of the coast guard and the implementation of “joint blockade” to a strategic level, and announced today that the exercises will practice verification and identification, warning and expulsion, and interception and detention. It is to think about non-war military actions with strategic thinking, and when necessary, cut off Taiwan’s sea transportation lines through isolation to force Taiwan to surrender.
Regarding the warning that the CCP’s military exercises send to Taiwan, Chen Wenjia said that as the PLA continues to conduct high-intensity military exercises around Taiwan, it shows that the military threat to Taiwan is escalating, and Taiwan needs to strengthen its own defense capabilities to ensure the security of the Taiwan Strait; secondly, the pressure in the gray zone is increasing, especially the participation of the coast guard force, which means that China is exerting more pressure in the gray zone. Taiwan needs to increase its vigilance against this non-traditional security threat and should formulate corresponding strategies as soon as possible.
Su Ziyun stated that the Chinese Communist Party’s military exercises highlight the importance of “air defense being the most urgent of all.” Whether the CCP intends to attack Taiwan’s ports or energy facilities, it will need to resort to air strikes, such as missile attacks. This means Taiwan’s air defense capabilities need to be strengthened. In response to Chinese Communist Party gray zone harassment, the Navy currently relies on destroyers and frigates as its main combat vessels. The Navy should emulate the British Navy’s deployment of surveillance vessels, such as River-class patrol vessels, to counter gray zone harassment and preserve the availability and capacity of its main combat vessels. (Editor: Yang Lanxuan) 1140402
With the approval of Xi Jinping, Chairman of the Central Military Commission, the Central Military Commission issued the “Outline of Joint Cooperation between the People’s Liberation Army of China (Trial Implementation)”, which will come into effect on November 7, 2020.
The Outline focuses on building a legal system for joint operations and strengthening the clear orientation of preparing for war. It is of great significance to consolidate and deepen the results of the reform of the leadership and command system, scale structure and force composition, and to promote the liberation and development of our military’s joint operations capabilities.
The Outline is the top-level regulation of our military’s new-era combat doctrine system. It focuses on clarifying the basic issues of joint combat organization and implementation, unifying combat thinking, clarifying responsibilities and procedures, and guiding combat operations. It also clarifies major principles, requirements, and basic procedures for joint combat command, combat operations, combat support, national defense mobilization, and political work.
The Central Military Commission requires that all levels should earnestly study and implement the “Outline”, adhere to combat effectiveness as the only fundamental standard, use the “Outline” as the basic basis for organizing and implementing joint operations and joint training, and comprehensively improve the ability to win in the new era.
The battle flag hunt, the military parade ground was full of ups and downs, and the climaxes continued——
From north to south, the surging iron torrents train elite soldiers; in the deep blue ocean, soldiers step on the waves to forge sharp swords; above the vast sky, eagles fly thousands of miles towards the blue sky; deep in the dense forests, the east wind roars to the sky; the skynet controls power, and the invisible war defeats the visible… One after another joint combat exercises are gradually unfolding in multiple domains and all dimensions, presenting a picture of a strong army that trains together to plan for war, uses training to promote war, and wins war through strong training, sounding the strong note of a new era in the history of our army’s training and preparation.
Over the past year, the world has been undergoing unprecedented changes unseen in a century, intertwined with the global COVID-19 pandemic. Under the sky shrouded by the epidemic, the international situation has been in constant turmoil and confrontation. The drone warfare that has shined in the Nagorno-Karabakh conflict has shown the world the unique characteristics of modern warfare.
“When times change, things change. When things change, we must be prepared for change.” In the future, “what kind of war to fight and how to fight it” carries the heavy mission, and the entire military is surging with enthusiasm for researching and winning wars.
Faced with new changes in the national security situation, new threats from powerful enemies and adversaries, and new developments in the form of warfare, we urgently need to provide answers to strengthening the military, winning battles, and meeting the needs of the times.
“Overall, modern warfare has indeed undergone profound changes. These changes may seem dazzling, but there are regularities behind them. The fundamental thing is that the winning mechanism of war has changed.” Faced with the rapid development of the new world military revolution and changes in the war situation, under the guidance of the commander-in-chief and in accordance with the unified deployment of the CMC’s policy and system reforms, the CMC Joint Staff Department organized experts from the Academy of Military Sciences and capable personnel from relevant departments of the CMC, various theater commands, various military services and armed police forces to form a joint research group to pool wisdom and strength to tackle key problems and advance the formulation of new-era combat regulations.
On November 7, 2020, the “Outline of the Joint Cooperation Warfare of the People’s Liberation Army of China (Trial Implementation)” was implemented throughout the army, marking a new coordinate system for our army’s joint cooperation war in the new era.
Since the issuance of the Outline, commanders have taken the lead in learning it, agencies have taken the lead in studying it, and troops have practiced learning it. The officers and soldiers of the whole army have been enthusiastic about learning and publicizing the Outline. A great discussion on joint operations in the new era, a great liberation of thoughts, and a great practice of preparation for war have been vigorously carried out in the whole army.
Pointing to victory, leading the new practice of preparing for war in the new era
“Following the main road, who would you follow to seek a shortcut?” In the world of soldiers, there is no such thing as “easy”. The only way to win a battle is to be prepared.
What kind of war we will fight in the future will require innovative tactics; if we cannot innovate tactics, it will be difficult to win future wars.
In essence, combat regulations are about solving the problem of how to fight and how to win, and are the refinement, deepening and concretization of military strategic policies. The Outline of Joint Cooperation of the People’s Liberation Army of China (Trial) (hereinafter referred to as the Outline) deeply studies the characteristics and laws of future wars, accurately grasps the era characteristics of the integrated development of mechanization, informatization and intelligentization of our army, and through the forward-looking and concrete design of future operations, implements the spiritual essence and content requirements of the new era’s military strategic policy into the troops’ preparation for war.
The Outline is not only a guideline for preparing for war, but also a guideline for winning joint operations.
At the beginning of the new year of 2021, a certain area of the Eastern Theater Command is organizing a multi-service, multi-directional, systematic combat training. Under the guidance of the newly issued “Outline”, this exercise involves the full-domain linkage of land, sea, air, space, network and electric power, close coordination of political and public opinion, and information-led throughout the entire process from combat preparation to situation shaping to mission implementation. All units work closely together, demonstrating the firm determination and strong ability to maintain national unity with a thunderous momentum, and also witnessing the transformation of our military joint cooperation from “formal linkage” to “spiritual linkage”.
In the west, at midnight in mid-spring 2021, a series of urgent alarm bells rang. According to the level transfer order of a certain base of the Western Theater Air Force, the officers and soldiers of a certain air defense battalion of the Army quickly rushed to their positions, and the level transfer time was further shortened. According to the unified deployment, more than 10 Army air defense forces in the theater air force responsibility area entered the Air Force command chain in an organized manner, breaking the information barrier of the services, sharing early warning information, and jointly taking on combat readiness duty, and initially forming a joint air defense combat system. “You lend me the ‘eye in the sky’, and I will help you with the ‘iron fist'”, the integrated joint air defense combat across the services has taken a new step and entered a new stage.
In the north, at the beginning of the summer of 2021, war eagles soared and iron currents rolled, and an exercise with the theme of air-ground joint operations was in full swing. According to the plan, a certain command post of the Air Force of the Northern Theater Command and a certain group army of the Army jointly organized a brigade-level command post exercise to study and explore the composition of joint command institutions and test the integrated joint combat command capabilities of the command post personnel. Intelligence analysis and processing, joint firepower strikes, and integrated rear-end support were coordinated and planned and carried out in an integrated manner, and the command institutions were organized in an integrated manner with all elements. Through repeated joint combat and training, the policy of leading training through combat and carrying out combat through training has been further implemented, and the joint combat and command capabilities of commanders of all services and arms have been significantly improved.
In the direction of the South China Sea, war eagles roared and attacked fiercely, dragons took off and stepped on the sea and waves, radars flew and missiles raised their heads… Under the unified command of the theater joint command, all mission forces worked as a whole and coordinated closely to quickly build a battlefield layout that was multi-domain joint, both offensive and defensive, and deployed in echelons. They adopted a combination of centralized command and decentralized command, and flexibly carried out sea and air escort and deterrence and expulsion in a reasonable, forceful and restrained manner, effectively maintaining peace and tranquility in the South China Sea.
In the past year since the implementation of the Outline, the orientation of preparing for war has become clearer and firmer, the sole fundamental standard of combat effectiveness has been more firmly established, training and preparation for war as the main responsibility of the troops has become more prominent, researching and planning war as the primary responsibility of officers and soldiers has become clearer, the ideas and measures for joint operations and victory have become increasingly effective, and the entire army has continued to set off a new upsurge in training and preparation for war.
Keep pace with the times and clarify the new mechanism of joint cooperation in the new era
“All beneficial ways go with the times.”
Military theorist Douhet once said: “Victory smiles only on those who can foresee the changes in the character of war, not on those who wait for the changes to happen and then adapt to them.”
Looking around the world, the game and struggle among major powers are intensifying, the threat of war exists, the war situation continues to evolve, new military reforms are booming, stealth, unmanned and intelligent weapons and equipment have become the mainstream trend, the battlefield space has expanded to all domains and dimensions, the integrated linkage of combat forces has become the norm, combat command, action and support have become more sophisticated, and winning future wars requires the support of more advanced combat theories.
The gap in combat concepts is the fundamental gap, and the backwardness of combat theory is the biggest backwardness. When modern wars are surging in the world, what is most needed is newer and braver minds.
The new-era combat regulations, led by the Outline, adhere to Xi Jinping’s military strategic thinking and the new-era military strategic policy as the soul and outline, deeply grasp the new changes in national security, new adjustments in combat opponents, new designs in strategic layout, new connotations of active defense, and new developments in combat guidance, and materialize the principles and methods of commanders’ understanding and guidance of war into norms and standards for the specific implementation of the troops, so as to promote our military-joint cooperation war to a higher level.
——It comprehensively expounds the contemporary connotation of war guidance under information conditions.
The Outline aims to win future high-end wars, accurately grasps the characteristics of lowered thresholds for future armed conflicts, blurred boundaries of war, and increasingly prominent mutual influence and efficiency between the war field and other fields, strengthens the political and social attributes of combat operations, innovatively develops military struggle paradigms, emphasizes relying on the country’s integrated strategic system and capabilities, emphasizes the integration of war and non-war domains, emphasizes the comprehensive implementation of military and political, diplomatic, economic, cultural and other means, and gives full play to the overall advantages of the party, government, military, police and people. It reflects the modern war concept and the war guidance for winning the people’s war and total war in the new era.
——All elements standardize the style and methods of our joint military operations.
The Outline is based on the tasks and development of our army, and systematically expounds on the possible joint operations in the future, covering the core missions of various strategic directions, covering land, sea, air, space, network and electromagnetic multi-dimensional space. At the same time, it also creatively summarizes the basic types of joint operations, highlights the basic actions that run through the joint operations and have common characteristics, and forms a closed-loop chain of joint operations with all elements and in all fields.
——The joint combat command system and organizational operation mode were designed throughout the entire process.
The implementation of joint operations organizations is extremely complex and difficult. Whether they can be “coordinated” in terms of strength, “joined” in operations, and “excellent” in effectiveness depends crucially on whether they can achieve “unification” in command. The “Outline” focuses on building a strong and efficient joint operations command structure, closely integrates the Central Military Commission and the theater joint command operation model mechanism, fully considers that it not only complies with the general direction and general requirements of the reform, but also leaves room for flexible formation in practice. It focuses on solving major issues such as the construction of a joint operations command system, the differentiation of command authority and responsibility interfaces, and the integration of services into the joint system, so as to ensure that thousands of troops and horses can jointly act under unified orders.
Taking joint training as the guideline, promoting a new leap forward in joint training in the new era
At the Central Military Commission’s military training conference, President Xi Jinping stressed the need to strengthen joint training, adhere to joint training as the key, develop a joint training system with Chinese characteristics, and accelerate the improvement of integrated joint combat capabilities. Soldiers should be trained in the way they fight, and troops should be trained in what is needed for fighting. Today’s world-class armies all regard improving joint training as the top priority for war preparation.
The Outline is the opening chapter of the new era combat doctrine and the guiding principle for the transformation of joint training in the new era. The Outline provides direction, inspires vitality, and gives birth to a new pattern of joint training in the new era.
——Incorporate combat into training to present an “integrated posture” of training.
In the Taiwan Strait, the naval and air fleets carried out joint combat readiness patrols to test and enhance the joint combat capabilities of multiple services, maintain a high state of alert at all times, and resolutely defend national sovereignty and territorial integrity. Exercise preparation is combat preparation, and the exercise state is the combat state. Joint military exercises are no longer simple training activities, but have become a preparation process to promote combat readiness and enhance capabilities. Joint training, the “source” and “main stream” full of power, is guiding and driving the in-depth advancement and vigorous development of military struggle preparations, and fully unleashing the role and effectiveness of training to carry out combat and training to promote preparations.
——Systematic training has become the “new normal” of joint training.
“East”, “South”, “West”, “North”, and “Central” are joint live-fire exercises organized by various theater commands, “Crossing”, “Mobility”, “Red Sword”, “Sky Sword”, and “Joint Logistics Mission” are series of systematic exercises organized by various services, covering all seasons, all weather, and all regions. The CMC, theater commands, and services are responsible for division of labor, overall design, and systematic organization. They are decomposed from top to bottom and integrated from bottom to top, driving the operation and inspection of the joint combat system. Joint exercises and systematic training present a new look, and new changes have taken place in the training and preparation mode. Our military’s joint training has entered a new stage of all-round transformation and overall improvement.
——Joint training between China and foreign countries highlights the “integration” of joint exercises.
At the foot of the Helan Mountains and in the heart of the Bronze Gorge Desert, the “Western Joint-2021” China-Russia joint exercise was booming. In this joint exercise, the Chinese and Russian militaries were mixed and planned together. The two sides shared their positions, coordinated closely, and acted together. They practiced more than 20 subjects such as joint air defense, joint obstacle removal, and joint three-dimensional seizure. With the support of the deeply integrated combat system between China and Russia, new breakthroughs in joint exercises and training were achieved. “Maritime Joint”, “Common Destiny”, “Peace Mission”… With the joint training between China and foreign countries as a “window”, the new changes in the joint training of the Chinese military are being brilliantly presented to the world.
——Intensive training in new domains, demonstrating an “open attitude” in research and warfare.
In joint exercises, underwater unmanned “fish schools”, land unmanned “wolf packs”, and air unmanned “bee swarms” began to emerge. New domains and new types of forces such as land aviation, special operations, electric power, unmanned, network, and aerospace were deeply integrated into the joint combat system and the joint exercise process, and realistic combat scenarios were carefully constructed to accurately experiment with modern war organization and management. As the most active practice area for preparing for war, joint training, with an innovative and open attitude, boldly tried and made great strides towards the new combat areas pointed out in the Outline.
Integrating war and construction to shape a new pattern of system construction in the new era
President Xi stressed that we must adhere to the principle of building the country in accordance with war, strengthen the coordination of war and construction, speed up the promotion of major strategic, leading and fundamental projects, and accelerate the creation of a high-level strategic deterrence and joint combat system.
If the “trouble” in the construction of the joint combat system is not resolved quickly, once the “interest” of the debt accumulates, it will become a “pain” on the battlefield tomorrow. From the perspective of war, the “Outline” calibrates the “sight” of construction and firmly points to the correct direction of military construction.
——Calibrate the construction “sight” to point to the needs of joint operations.
Under the guidance of the Outline, the concept of jointness has been gradually established, and the barriers of “coordination” of military operations and “integration” of combat domain capabilities have been gradually broken down. The land, sea, air, and fire arms have been combined in the same domain, and cross-domain integration of combat domains such as space, network, and electromagnetic space has gradually become a reality. With the support of the network information system and combat data information as the link, a full-time and smooth command link has been built. The system is internally connected to each combat sub-center, and is connected to each combat group (team) command post. When necessary, it can directly reach the end of the individual platform to achieve joint command to the end. All operational forces worked together around the overall intention, realizing the transformation of the joint combat concept from focusing on the “service attributes” of combat forces to focusing on the “operational domain”, which has become the main feature of future joint combat. Studying, planning, and training for war with the “Outline” has become a trend throughout the military.
——Calibrate construction’s “sights” to point to system shortcomings and weaknesses.
Based on the Outline, our army insists on combining inheritance and innovation, theory and practice, innovatively designs strategies for winning future wars, focuses on highlighting problem orientation, takes root in training and preparation for war, promotes the construction of joint combat command system and new combat force construction, and effectively solves the outstanding shortcomings and weaknesses in military combat preparation. In mid-May 2021, the Party Committee of the Northern Theater Command held a special war meeting, and in accordance with the Outline, thoroughly identified contradictions and problems in joint combat research, command and control mode transformation, joint handling level, and efficient command capabilities. According to the Outline, it optimized system support, improved command and control methods, and improved command means, which promoted the transformation of the operation mode of the theater joint command center and the improvement of command effectiveness. Looking across the entire military, similar practices are becoming more and more common. Referring to the Outline to find gaps, ideas, and methods in the near and long term has become the new mainstream for planning and promoting construction at all levels and in all fields.
——Calibrate the construction “sight” to point to the urgent need to balance powerful enemies.
To implement the principle of building the military in accordance with war and coordinating the military construction, we must not only focus on solving current practical problems, but also pay attention to solving long-term development problems. The Outline is anchored on the future of defeating the strong and contains a far-sighted plan to build a world-class military. Guided by the Outline and focusing on changes in the war situation and changes in scientific and technological development, the construction of asymmetric means to check and balance powerful enemies has ushered in a qualitative leap. Batches of new drones, new helicopters and other advanced weapons and equipment have been tested and deployed, and a series of high-tech equipment has been deployed and developed, which has given us more confidence and stronger capabilities to win the war. The Outline condenses the “war code” of historical wisdom and also integrates the way to build first-class and win the future in the new era.
“But look at the path you have come from, and you will see verdant and green mountains.” One year after the implementation of the Outline, the new-era combat regulations are releasing capabilities and increasing efficiency in building a joint combat system with Chinese military characteristics.
In the new era and new journey, our path of joint military operations will surely become broader, our ability to defend the country’s strategic development interests will surely become stronger, our confidence in winning future informationized wars will surely become firmer, and the great goal of building a world-class military will surely be fully realized.
“We have a string that is tightly tied to us, a mission that we shoulder, and a storm that we are watching closely… We are always ready!”
In recent years, with the development of intelligent unmanned technology, the navies of developed countries in the world have proposed the concept of “distributed lethality” with surface ships as the main body, aiming to achieve distributed maritime operations and gain battlefield advantages. Distributed maritime operations aim to integrate combat platforms in multiple domains, build an all-round three-dimensional situational awareness network, and form a seamlessly linked combat system of manned platforms and distributed unmanned platforms through communication networks throughout various domains and an integrated command and control system, thereby improving the overall combat and strike effectiveness.
The concept of distributed maritime operations
Distributed maritime operations are the integration and expansion of combat concepts such as “distributed lethality” and “manned-unmanned collaborative operations”. The main idea is that large-scale, multi-purpose, high-value combat platforms are no longer required to independently complete diversified combat missions, but rather the main combat capabilities such as reconnaissance, command, strike, and interference are dispersedly deployed on various heterogeneous unmanned platforms in various combat domains. A highly resilient combat system is formed by the fusion of a small number of manned platforms and a large number of distributed unmanned platforms, which can complete various complex combat missions through efficient, precise, and real-time collaboration. This combat system includes a small number of high-value manned platforms and a large number of low-cost unmanned platforms. The manned platforms serve as battlefield decision makers, responsible for relatively complex tasks such as combat plan planning and combat mission allocation and implementation; the unmanned platforms are used to perform relatively dangerous or simple tasks such as situational awareness and fire strikes. Manned/unmanned platforms work closely together to complete combat missions.
The essence of distributed maritime operations is to seamlessly link and organically integrate high-value manned platforms and low-cost unmanned platforms at sea, and to achieve common operational goals through high information sharing, precise task aggregation, and efficient operational coordination. It has the remarkable characteristics of on-demand sharing of operational information, deep integration of operational tasks, precise planning of operational resources, and optimized organization of operational processes. Through manned/unmanned distributed coordination, a new type of efficient maritime combat system can be formed that complements each other’s strengths, integrates functions, and has complementary capabilities. Distributed maritime operations highlight the combinability, consumability, and “decentralization” of force utilization, and focus on the deep embedding and comprehensive application of artificial intelligence technology, which can enhance the resilience of the combat system and promote the development of joint global operations in the maritime direction towards intelligence.
Typical characteristics of distributed maritime operations
At present, intelligent unmanned equipment is developing rapidly, and is increasingly possessing advantages such as human-equipment integration, cross-domain coordination, cluster confrontation, and autonomous combat. Distributed maritime combat is accelerating to present typical characteristics such as wide-area distribution coordination, cross-domain multi-dimensional integration, and manned and unmanned integration.
Wide-area distributed coordination. Wide-area distributed coordination means that various combat elements or combat resources can be adaptively optimized and combined and dispatched according to the battlefield situation, so as to realize the precise energy concentration and release of the combat system. The first is the distributed deployment of the combat system. In distributed maritime operations, the combat space is deeply embedded in various combat domains, and the combat forces can be distributed and deployed in a decentralized wide area. The second is the intelligent reconstruction of the combat system. The combat system is lighter, more capable, and more agile, and its battlefield environment adaptability and system dynamic optimization and reconstruction capabilities are significantly enhanced, and it can quickly and flexibly adjust the required combat forces and battlefield resources. The third is the concentrated release of combat energy. The combat system can achieve rapid mobility, real-time response and coordinated operations of various combat platforms and combat forces in the global combat space through semi-autonomous or autonomous coordinated control of equipment, ensuring the precise concentration and release of combat forces.
Cross-domain multi-dimensional integration. Distributed maritime operations transform the centralized combat group mode into a distributed, agile combat mode. Various combat units are distributed in multiple combat domains, which can realize the monitoring and positioning of cross-domain targets, and then implement effective strikes. The first is the cross-domain integration of combat forces. The combat forces deployed in multiple domains will be dynamically networked through intelligent systems to form a cross-domain combat system. The second is the seamless connection between strategy, campaign, and tactics. New domain and new quality combat forces will directly participate in intelligent naval warfare as the main combat role, achieving comprehensive coverage from strategy to campaign, seamless connection from campaign to tactics, giving birth to a new quality combat capability of rapid assault, multi-dimensional integration, and full-domain offense and defense, and realizing cross-domain coordinated strikes on combat targets.
Manned and unmanned are one. Distributed maritime operations can rely on a large number of intelligent unmanned equipment to form a “manned-unmanned” joint strike system with high autonomy and coordination. By accelerating the development of unmanned equipment such as ship-borne drones, surface unmanned boats, and underwater unmanned vehicles, long-, medium-, and short-range echelon configurations can be achieved, and cross-domain integration of unmanned equipment such as air, surface, underwater, and land can be achieved. The unmanned and manned equipment systems are seamlessly integrated, and the mission domain is expanded from information assurance to firepower strikes. This will promote changes in maritime combat styles, accelerate the formation of new combat styles such as manned system collaborative operations, unmanned system single operations, unmanned system cluster operations, and frontier preset operations, and achieve a subversion of traditional manned combat styles.
The winning mechanism of distributed maritime operations
The reason why major scientific and technological progress can promote the evolution of the war situation is largely because it has profoundly changed the mechanism of winning wars. At present, cutting-edge technology has significantly improved the level of equipment intelligence, profoundly changed the combat power generation mode, and accelerated the evolution of the mechanism of winning naval battles.
“Distributed interconnection, human-machine collaboration” wins. The distributed, intelligent, and networked command information system built on cloud computing, data chain, Internet of Things and other technologies has brought profound changes to modern naval warfare. Supported by the cloud edge, the command information system realizes real-time interaction between various combat platforms through high-speed and secure network connections, significantly improving the information interconnection, interoperability and interoperability between different combat platforms; it can efficiently analyze and process massive battlefield information, accurately judge the battlefield situation, and transform combat command to an intelligent decision-making method centered on “data, algorithms and models”; commanders at each node share information in real time in the cloud network, synchronously judge the situation, and coordinate command, so that command and control activities are concise and optimized, and combat decisions are more efficient and accurate. In addition, under “distributed interconnection”, intelligent unmanned combat has developed from a single platform to a multi-platform cluster, and from remote-controlled combat to semi-autonomous and autonomous combat. Multiple “single-person-single-machine” command chains running in parallel have gradually formed a single simple command chain of “commander-unmanned combat cluster”. Through the efficient and autonomous coordination of manned platforms and unmanned platforms and their clusters, the combat potential of intelligent unmanned equipment can be fully activated, and the advantages of various advanced equipment can be maximized.
“Algorithm-driven, fast and accurate cognition” wins. In intelligent warfare, advanced algorithms replace commanders’ thinking through precise and high-speed calculations, promoting the accelerated integration of rational combat knowledge and emotional commander experience. With advanced algorithms, we can quickly and accurately understand the situation on the naval battlefield, and then accurately and quickly plan scientific and feasible combat plans for changes in the situation on the naval battlefield, disrupting the opponent’s established deployment and combat intentions. Algorithms can effectively process massive amounts of high-value intelligence information and increase the speed of the “OODA” cycle. Mastering the advantages of algorithms can achieve fast and accurate cognition of the enemy’s situation, our situation, and the battlefield environment, thereby accurately predicting the enemy’s combat actions and innovating and optimizing our own action plans in a targeted manner.
“Cloud brain support, network failure and disconnection” will win. In distributed maritime operations, the command and control system will operate in a collaborative way of “human brain + cloud brain”, and the intelligent advantage will become an “advanced” advantage based on information advantage, and “network failure and disconnection” will become one of the main patterns of maritime operations. On the one hand, unmanned intelligent combat actions supported by cloud brain will penetrate the entire process of operations. In distributed maritime operations, the collaborative mode of “human brain + cloud brain” runs through all aspects of operations such as intelligent assisted command decision-making, automatic intelligence reconnaissance, automatic combat planning, autonomous precision strikes, and intelligent logistics support. On the other hand, targeting the intelligent ubiquitous network structure covering the entire domain and multiple dimensions, using intelligent equipment or means to attack key nodes and hubs such as its reconnaissance and surveillance network, information transmission network, command and control network, and comprehensive support network can paralyze its combat network system.
“Cross-domain integration, integrated energy release” wins. Distributed maritime operations will leap from integrated joint operations under information conditions to autonomous cross-domain collaborative operations under intelligent conditions. Different types of new-quality combat capabilities will be integrated and coordinated across domains, and flexibly and accurately integrated to release combat effectiveness. On the one hand, relying on the cross-domain, distributed, and networked collaborative combat system supported by the cloud edge, through the cross-domain mobility of the main combat platform, the cross-domain complementation of equipment functions, the cross-domain sharing of information and intelligence, the cross-domain coordination of combat command, the cross-domain response of mission actions, and the cross-domain interconnection of channel links, a variety of new-quality combat capabilities can be efficiently linked. On the other hand, cross-domain integration highlights the close coordination between the main domain master control and cross-domain support. For example, the navy will be the main control force in maritime offensive and defensive operations, and other forces will implement cross-domain coordinated support through the integration of air and space, sea and space, and network and space.
“Strike at acupoints and lure at agglomeration” to win. Distributed maritime operations will transform from traditional concentrated annihilation warfare to precise strike at acupoints, and high-value targets will face the threat of long-range autonomous precision strikes from intelligent combat equipment; from traditional large-scale manned attrition warfare to global unmanned cluster lure warfare, and important strategic targets will face the threat of saturation attacks and deceptive strikes from low-cost unmanned clusters. In the process of distributed maritime operations, unmanned equipment such as drones and unmanned submarines can be deployed to form a widely distributed, self-organized and coordinated reconnaissance network. Through autonomous reconnaissance, identification and strike actions, long-range and precise attacks can be carried out on the opponent’s high-value targets. Under the condition of minimizing collateral damage as much as possible, the opponent’s hand-wave network can be paralyzed from top to bottom to destroy its command system. Under the intelligent ubiquitous network system, based on the self-organized “swarm” combat of large-scale machine intelligent agents, full coverage reconnaissance of the opponent’s core area can be achieved, deceiving and luring the enemy, and consuming the opponent’s combat resources to the maximum extent.
“Multi-domain fusion operations” and “cross-domain collaborative operations” are the latest operational ideas proposed by the US military in recent years, guiding the gradual upgrade and evolution of the US military’s combat concepts to joint concepts, and building a new war style based on this, covering all combat fields such as “land, sea, air, space, and network”, and integrating various capabilities such as space, network, deterrence, transportation, electromagnetic spectrum, and missile defense. Through this new combat idea, we can compete with competitors such as Russia in various fields, develop asymmetric advantages, and ensure the leading position of our country’s military strength. What advantages do multi-domain fusion operations and cross-domain offense and defense have in actual combat, and what are their development prospects?
The evolution of the concept of global warfare
After the mid-1970s, the U.S. Army successively proposed combat concepts such as “central combat”, “expanded battlefield” and “integrated battlefield”, forming the “air-ground integrated combat” combat theory. Air-ground integrated combat requires the coordination and unity of ground forces and the air force, and conducts deep operations on the basis of the air force’s battlefield air interdiction and offensive air support. For the first time, the combat concept of multi-service coordinated operations appeared, and this combat theory was also tested in actual combat in the Gulf War. This is the starting point for the birth of the concept of multi-domain warfare and even global warfare.
On October 3, 2016, at the annual meeting of the Association of the United States Army, General David G. Perkins, then commander of the U.S. Army Training and Doctrine Command, delivered a public speech in which he used the word “domain” for the first time to accurately summarize the new form of international warfare, and put forward the view that “all domains of the United States are challenged” and “advantages in a single domain cannot win the war”, and then introduced the concept of “multi-domain combat”. The operational concept of “multi-domain combat” requires close cooperation between the combat forces of various services, abandoning the inertia of the service thinking of pursuing control in a single domain, and providing a “multi-domain solution” for the national command authorities.
In October 2018, the U.S. Army Training and Doctrine Command issued the 1.5 version of the concept of “U.S. Army Multi-Domain Operations 2028”. As the most mature version of the concept, it replaced the original word “battle” with “operation” and extended the concept of “multi-domain combat”. The concept of “multi-domain combat” is only applicable to the conflict stage, but in the case that the competition between nation states has become a new factor in the world situation, simply winning the actual conflict has very limited significance for the overall combat background, so the concept of “multi-domain” must be extended and deepened. The concept of “multi-domain combat” introduces relevant cross-government and cross-institutional elements into the “competition continuum” of “competition, armed conflict and return to competition”, and puts forward the three core concepts of “calibrating force posture, using multi-domain formations, and achieving multi-domain aggregation” in “multi-domain warfare”, clarifies the specific needs of “multi-domain formations”, and refines the corresponding combat capabilities that troops at different levels need to have in “multi-domain warfare”.
“Cross-domain coordination” refers to the mutual cooperation of various services to make up for the deficiencies of other forces in combat, thereby achieving complementary efficiency in various fields and successfully completing combat missions. Guided by the basic ideas of multi-domain integration and cross-domain coordination, the US military has formed the concept of “full-domain warfare”, that is, to develop the joint combat capabilities of various services throughout the entire process of combat and training, and realize the transformation of the army into a joint combat force.
The advantages of all-domain operations are obvious
Judging from the current international military development situation, countries will face an increasingly complex, deadly, extremely active, and urbanized battlefield. The combat environment is becoming increasingly fragile, and the combat mode of the traditional battlefield is no longer applicable to contemporary warfare. Against this background, the US military has proposed the concept of full-domain warfare in order to cope with the increasingly complex international environment. What are the advantages of multi-domain warfare and cross-domain attack and defense on the modern battlefield?
Multi-domain integration enables the advantages of different arms to overlap and their disadvantages to complement each other. The predecessor of multi-domain warfare, “Air-Land Integrated Warfare”, was a combat style of joint operations between the Air Force and the Army that the U.S. military attempted to establish in the early 1980s in response to the huge threat posed by Soviet tank clusters to NATO on the European plains. This combat mode requires a high degree of coordination between ground forces and air forces. Ground forces conduct offensive mobile defense operations on the front line, while the Air Force blocks the replenishment of front-line forces by striking the enemy’s rear, thereby providing tactical support to the front-line army. This is also the first time in the history of the U.S. military that the Air Force and the Army have conducted in-depth cooperation, which has increased the complexity and flexibility of the U.S. military’s operations, made the U.S. military’s tactical options richer and more dynamic, and posed a greater strategic deterrence to the enemy.
On the other hand, cross-domain attack and defense can expand asymmetric advantages and impose greater restrictions on the enemy’s power. Since the concept of cross-domain attack and defense emphasizes the coordination of offensive and defensive forces in different fields, during the battle, the army can exert greater pressure on the enemy through its own advantageous fields, making it difficult for the enemy’s power to be maximized, thereby expanding the asymmetric advantage, maximizing its own strength and weakening the enemy’s power. In recent years, all countries have attached great importance to the technical development and research in the field of network electromagnetics. To some extent, this is because the field of network electromagnetics is a new product that came with the information age. Emerging powers that try to catch up with old powers can establish their own advantages through the development of this field, while old powers do not want to be overtaken and have fields that can be used as weaknesses by the enemy. Therefore, all countries have unanimously regarded the research and development of the field of network electromagnetics as one of their current key areas of development, which also reflects the great power of cross-domain attack and defense in modern information-based intelligent warfare.
Global war has broad prospects for development
At present, the concept of “global warfare” only has a theoretical basis, and it still takes a lot of effort to convert theory into practice. The vice chairman of the US Joint Chiefs of Staff clearly stated in an interview: “The seamless integration of various fields and effective command and control are still a daunting challenge. We are not sure how to do it, and no one has a ready-made answer.”
In the process of achieving true joint operations, there are obstacles in various aspects, including culture, economy, and politics. These problems will affect the establishment of truly joint combat forces and joint combat modes. First, each service has formed its own unique combat style and combat culture in the long-term development process. The differences in the culture of different services may lead to different concepts of combat focus on the construction of joint combat forces, which in turn leads to unclear directions and goals for force construction. Secondly, the budget for military construction is limited, and each service will try its best to use it for the update and research and development of its own weapons and equipment, resulting in the budget giving priority to meeting the needs of each service rather than joint combat needs. Finally, it is difficult for the Ministry of National Defense to obtain the power of integrated government and allies. “Cross-domain coordination” is a game of national comprehensive power, which includes politics, economy, diplomacy, intelligence and other aspects. It requires the coordination and coordination of government agencies in various fields of the country, and relying solely on the Ministry of National Defense does not have enough power to achieve the integration of various forces.
These issues all affect the development of “all-domain warfare”, but in any case, as a new combat concept, “all-domain warfare” will surely become an important mode of future combat. The United States released the “Joint All-Domain Combat Software” in April this year, aiming to develop theater-level joint all-domain combat software to allocate combat resources and achieve coordinated killing in the fields of land, sea, air, space, and electromagnetic fields. This action also shows the United States’ determination to achieve “all-domain warfare.” (Zhang Haoyue, Shen Qiyou, Ma Jianguang)