Chinese Military Focus on Future Innovation-driven Development & Competition Seize Strategic High Ground

By An Weiping

Source: 2015年12月29   来源:解放军报


The use of “Internet +” to create a new quality of thinking and fighting

Chairman of the Central Military Commission Xi Reform Work Conference, to focus on the future military competition to seize the strategic high ground, give full play to the role of innovation-driven development, cultivate new growth point of fighting. At present, China is the depth of promoting the “Internet +” action plan, which is the development trend of the Internet era of profound insight and wisdom to cope. Its essence is to promote the Internet, cloud computing, big data, networking integration and innovation as the representative of information technology and traditional industries, create new productivity. And viewed from the military point of view, the “Internet +” concept of thinking is also important for military innovation, foster new growth point fighting. But the military use of “Internet +”, not simply on the Internet “+” on, but in the military field dedicated “cyberspace” a “+”, and the use of “Internet +” thinking and a new generation of information technology, the establishment of improve the database, by fast and efficient flow of accurate data to improve reconnaissance, command and control, battlefield mobility, firepower, integrated security and information protection, and combat capability, to achieve accurate and timely release of aggregation and the overall combat effectiveness, thus creating adaptation of information technology The new mass combat operations.

“Internet” + target characteristic data, real-time sensing reconnaissance intelligence. Real-time reconnaissance capability is perceived to reach the battlefield transparent, seize the basis and key information superiority.Internet biggest feature is the remote control into the remote “touch” to achieve a seamless link between the sensor and processor, unimpeded access to battlefield information, real-time sensing reconnaissance intelligence. But the actual combat operations, the target is characterized by continuous change, if the lack of accurate target feature “full-dimensional” data, it is difficult to analyze, contrast, identify mass, low-density value of battlefield data, dig out the real and effective information, to achieve timely and accurate perception reconnaissance intelligence. Therefore, we should fully learn the “Internet +” big data analysis model, relying on accurate battlefield information and intelligence center to build, multi-dimensional and dynamic characteristics of the target database to database for support, fast and accurate analysis judged the enemy goal. “Accurate”, refers to a database of all the characteristics of the target data must be true, valuable information and data, can accurately reflect the different characteristics of the target property. “Multi-dimensional” refers to the use of land, sea, air, space, power and other means to obtain the same objective, the different nature of intelligence data and get the target from different angles appearance characteristics, as well as electromagnetic, infrared, and other information; “Dynamic “it refers to adapt to changes in weaponry and other targets, timely reconnaissance target feature information, the first perfect time to update the database, ensure that you always maintain a high accuracy of the data. Relying on the target database should also be characterized by the establishment of operational data analysis model, through the “cloud” on the large amount of data collection operations analysis of intelligence information to accurately determine and predict the enhanced situational awareness and decision support capabilities.

“Internet” + information system integration, to achieve accurate and efficient command and control. Accurate and efficient command and control capability is based on the core information system operational capability.Cyberspace so that all branches of the military combat information systems to achieve remote, synchronous, interactive connection, the commander combat global real-time grasp and mastery of the battlefield situation, belongs to all levels of command elements, each combat unit dynamic and effective action to implement the regulation. Integration must take an integrated approach, different branches of the military, information from different professions, different levels of system integration and other construction. First, functional integration, an integrated command platform, based on the relevant member information systems transformation, embedded sharing member, according to a unified configuration and management strategies, ensemble having interoperability integrated command and control system to ensure that all military branches, interrelated levels of command, synchronous interaction, information exchange command job sharing. Second, the system hinges primarily by branches of engineering and technical specifications according to a unified organization and implementation, through changing, modified (making) the existing command and control system, improve the various branches of the military command and control systems, enhancements and weapons platforms “hinge” capability . Third, data fusion, through a unified data format or data format conversion, data integration between branches Information System.

“Internet” + geographical information, fast place battlefield maneuvers.The essence of battlefield mobility, capacity utilization is decisive and overwhelming operational tempo seize the target location advantage. This requires full-dimensional perception by battlefield battlefield information system geographical information such day or night, we are well aware of how to maneuver the entire road, what factors affect mobility, in order to select the best motor route, timing and fast way to place . The rapid development of Internet intelligent navigation system, real-time provides a convenient quick and precise maneuvering. Therefore, to refer to the “Internet +” geographic information system, the establishment of geographic information as soon as military combat support systems, building geographic information database, and continuously enrich and perfect meteorological, hydrological and other data and road information and data information via satellite data links, etc. Real-time application queries and automatically senses the change, so that regional operational commanders real-time control, the rapid set-motorized determination, commanding troops quickly arrived combat area, to seize the fleeting fighters fighting to win the initiative.

“Internet” + Detective play commentary system, the rapid reaction accurate firepower. The condition of information warfare biggest feature is the “information-led firepower battle,” Internet interconnection links are distributed to the effective integration of various weapons platforms, network-based firepower systems possible. But rapid reaction precision firepower and damage the effectiveness of the play, is an investigation, control, play, commentary closed circuit, the need to establish a body blow interconnected system, like “Internet” + taxi, a “Didi taxi” system software, can be the first to discover and pinpoint the user application, and then through the analysis of user needs, while according to the position information of the vehicle to determine who carried out the service, and the fastest way to push information to the user service vehicles, service vehicles last feedback, to complete the service process. Similarly, the rapid response fire precision strike, the urgent need to establish a “play Detective Comment on” one of the firepower system, surveillance systems, decision systems, control systems, sensor fusion interconnected, so that the data flow and operational processes and seamlessly links mutual drive, always monitor the target information and firepower cell information, a substantial increase in the ability to extract data from the mass targeted; the same time through real-time information exchange, sensor control, task allocation plan and fire damage assessment, greatly reducing identify the target, targeted, target and damage assessment time, effectively improve the dynamic ability to strike targets, found that the anti-forming ability of the best mode.

“Internet” + Things security system, to achieve timely and accurate comprehensive security. Accurate and timely comprehensive support, is adaptive, intelligent means to reach at the desired time and place to provide timely and accurate combat all kinds of resources needed. The adaptive, intelligent, must establish an integrated management and control, integrated transportation security system of things together, things like relying on the development of Internet technology, the Internet and radio frequency identification, infrared sensors, global positioning systems, laser scanning technology, achieve mutual connection between anything, and through the exchange of information and communication, positioning, tracking, monitoring and precise management. Therefore, we should actively learn things the idea, and establishing information under combat conditions was associated support systems, integrated use of two-dimensional bar code, electronic tags, automatic identification technology, real-time monitoring and access to supply battle group team strength, guarantee supplies storage and consumption of dynamic information, accurately grasp logistical needs and resources, timely and accurate to the command structure at all levels, to provide comprehensive support group team information security needs. By precise control of the security resources to achieve transparent visualization controllable security process and improve efficiency battlefield support, logistical support adaptive capacity.

“Internet” + preset encrypted information, information protection security control. Effective delivery system based on the combat capability of information systems, data security depends combat controllable. As a result of the “Internet +” and bring the system vulnerability and threats and attacks from internal, external, so that security issues in information systems is very prominent. Therefore for the ever-changing battlefield, the effective implementation of dynamic data encryption. For example, by installing a micro-channel information encryption software that can encrypt messages on demand, voice, video and other information; another example, the terminal end smartphone encryption, anti-eavesdropping technology and SMS encryption and other network information security technology has gradually applied.Therefore, we should make full use of information technology, Internet security, cyberspace whole process of the implementation of dynamic encryption to ensure the confidentiality of information transmission, to ensure the integrity and non-repudiation of the information, communication channel resistance may be active or passive attacks. On the one hand “hard encryption”, and vigorously develop the user terminal installation of secrecy or confidentiality card machine; on the other hand is “soft encryption”, the development of intelligent terminal encryption software, use dynamic encryption algorithm, encrypted instant messages.

Original Mandarin Chinese:








Leave a Reply

Your email address will not be published. Required fields are marked *