China Military Space Power: War to Seize Commanding Heights // 中國網絡戰爭太空力量:抢占战争制高点

中國網絡戰爭太空力量:抢占战争制高点

With the continuous development of space technology, space, military applications increasingly widespread, more and more countries joined the ranks of the space race –

Source:
Ministry of National Defense of the People’s Republic of China
 Author: Zhang Zhi Time: 2016-01-29

 

    “Who controls the universe, whoever controls the earth; who controls the space, whoever controls the initiative in war.” Former US President John F. Kennedy is determined to promote the development of American space technology, space will also be incorporated into the great power game and competition category. With the development of space technology and space forces, military space is used widely in shaping the international strategic pattern, pushing the world’s new revolution in military affairs, and played a key role.

    Two-hegemony, the main purpose of the service strategy

July 1961, the United States has just successfully developed the use of “Samos” satellites, captured Soviet SS-7 and SS-8 deployed intercontinental ballistic missile tests, the Soviet Union opened a “missile gap” truth became the third the key Berlin crisis resolved smoothly, marking the space support forces boarded the stage of history.

Since then, the United States, the two superpowers, the Soviet Union from the strategic objective of global hegemony starting to build a more complete support for space power systems.

Since an important strategic position, it has been solely responsible for the construction of satellites by the US intelligence community, in order to facilitate confidential. US Department of Defense is leading the “Defense Satellite Communications System,” “Fleet Satellite Communication”, “Military Star” three communications satellite system construction, on this basis, build a “Air Force satellite communications” system for the US national command structure and strategic nuclear forces provided between the safe, reliable, high viability of the global two-way communications capability. Meanwhile, the US Department of Defense has also developed strategies for the deployment of ballistic missile early warning “Defense Support Program” satellite navigation for nuclear submarines “TRANSIT” satellite for global meteorological observation “DMSP” and other systems, the formation of a relatively complete system.

In order to compete with the United States, the Soviet Union launched a comprehensive space forces, from the development of “Zenith”, “amber” reconnaissance satellite “Lightning” communications satellite, “sail” navigation satellite, the “eye” early warning satellites and “Meteor” weather as the representative of satellite space power system.

Throughout the Cold War, the role of the US-Soviet space power is mainly reflected at the strategic level, both the use of near-real-time reconnaissance and early warning satellites to detect each other’s strategic dynamic use of communication satellites and navigation satellites for command and control of strategic nuclear forces, formation of an effective nuclear deterrence combat system, a profound impact on the world strategic pattern of the Cold war.

With space development focus to shift from military spacecraft launch vehicles, various military satellite systems gradually have the ability to use large-scale, the Soviet Union began to build a dedicated space forces command structure. In 1985, the US military set up a joint Space Command. Administration of the Soviet spacecraft in 1982, the formerly strategic rocket forces, responsible for the development of space power transfer scribe to support the Department of Defense, and later upgraded to bureau director of the spacecraft, so space support force directly under the arms of the Soviet Union became the Department of Defense.

    Pack and play, to expand the role of tactical action

The 1991 Gulf War, the US military space forces operations provided critical reconnaissance, early warning, communications, navigation, meteorological services, marking the beginning of space support from the strategic level into the tactical level.

Subsequently, the US military began to develop better able to support tactical space combat support forces launched a large-scale construction of various types of military satellites and upgrading. “Global Positioning System” fully completed “keyhole -12” “Future Imagery Architecture”, “space-based infrared system” and “Global Broadband Satellite Communication”, “Advanced Extremely High Frequency”, “Mobile User Objective System” and other new generation of satellites have been put into use. 2003 Iraq war, the total number up to 167 US satellite. By the end of 2015, US satellites in orbit nearly 400, of which more than 120 pieces of military satellites, forming a powerful space support operations capabilities.

In strengthening the power of construction, the US military in 2002, the Joint Space Command Strategic Command incorporated, unified management of the armed forces Space Command, in order to better organize and direct the power of space support strategic, operational and tactical military operations at all levels. The military services also formed their own space support forces and support the preparation of models to successfully achieve tactical level space support.

Russia’s lack of independence early strength, inherited the former Soviet space support force can maintain normal, resulting in a sharp decline in the number of satellites in orbit, and only 97 in orbit until 2002. In view of this situation, the Russian military space forces carried out the reform, the establishment of an independent space force in 2001, began to recover and rebuild its military satellite system. After the start of the “new look” reform, the Russian space force in 2011 to form the basis of the air and space defense troops, again in 2015 and the Air Force air and space defense troops merge to form air and space forces, responsible for the Russian spacecraft control, missile warning management system attacks and space monitoring system operation.

After the reform and adjustment, all kinds of Russian satellite system gradually restored. By the end of 2015, Russian satellites in orbit nearly 130, of which nearly 80 military satellites. But Russian military believes that blow from the air and space will be the main threat facing Russia, decide the future of air and space warfare has become the key to victory in the field, and therefore the full development of the Russian aerospace defense forces, space support forces in a subordinate position or service. In the previous reform, satellite surveillance, satellite communications, satellite navigation and other space support system construction management still the Russian Defense Ministry and General Staff Operations Department under the relevant commitment, the services are generally lacking space support personnel, operational and tactical levels than use low. During the Russia-Georgia war of 2008, the Russian military satellite reconnaissance had revealed not timely, satellite communication services and poor.

While the US and Russia to develop space forces, more and more countries joined the ranks of the space race. India announced in 2007 to establish the “Aerospace Defense Command”, to manage India’s national space assets, and space warfare weapon concept study, the Indian Air Force has been established aerospace brigade. Japan in 2009 adopted the “Basic Law Aviation”, the Japanese Air Self Defense Force to take advantage of space resources, and expand research-related policy formulation and planning to lay the legal basis for future space operations. Some other countries have also expressed varying degrees of military commitment to the development and use of space and plans.

    Defense against US efforts to seize the initiative

As more and more countries enter the field of space, space security environment has undergone significant changes. Especially in the US view, the space has a non-former “safe harbor.” US Joint Chiefs of Staff in 2013 edition of “space war” doctrine stated that the commander must take into account a malicious adversary action may be taken, and can continue to maintain military capability in the case of space capabilities downgrade. For this purpose, a step the US took the lead in the field of space, launched a series of offensive and defensive measures.

– Improve space surveillance capability. February 2015, the US Air Force and Lockheed – Martin launched the new “Space Fence” radar system construction work. The system can be monitored for the first time all over the United States via satellite from the master satellite elapsed time, attitude and orbit, etc., can also detect low orbit target as small as 10 cm in diameter, thereby greatly enhancing the US space situational awareness ability.The US Air Force ground-based photovoltaic system and deep space exploration systems, missile warning and space surveillance radar network system together constitute from low earth orbit to deep space orbit space surveillance systems perspective.

– Improve the existing space forces invulnerability. 2013 US military issued a “survivability and distributed space systems architecture” white paper proposes the use of structural separation, functional decomposition, load carrying, decentralized multi-track, multi-domain decomposition operations and other measures to improve the survivability of space systems support.

– Emphasis on the integrated use of space technology and traditional techniques. 2014 US release of “Towards a new strategy to offset the” proposed in the report, the US needs to soaring losses caused by the loss of the base system, the measures include accelerating the development of alternative GPS system, equipped with long endurance and / or aerial refueling capability. ” mixed level “intelligence surveillance and reconnaissance UAVs.

– The establishment of the development model construction space forces and civilian integration. US military plans to use leased wartime civil and commercial space systems and services, carrying a military payload on a commercial satellite, direct purchase of advanced commercial or commercial systems to the military, etc., to supplement the existing space support capabilities.

– By conducting military exercises in the development of space power construction using the theory. US Joint Staff, Air Force, Navy and Army space support operations in both the theme of military exercises. In 2001 the US Air Force Space Command began to dominate “Schriever” space war military exercises have been organized nine times.

– Strengthening Space Operations organization and command. September 2015, the US Defense Department and intelligence community established an inter-agency Joint Space Operations Center, responsible for the integration of satellite reconnaissance data, strengthening space reconnaissance capability, military satellite monitoring operation, to prevent potential adversaries to attack US space assets.

– Strengthening Space offensive forces. May 2015, the US X-37B flight test for the fourth time. Although the Americans called it “Orbital Test Vehicle,” but it remained silent on key information. Speculation, X-37B has the ability to take military action including control, capture and destroy enemy spacecraft, military reconnaissance on the enemy. In this sense, X-37B is likely to be the first human space fighter. In addition, the United States has stepped up the construction of space attack power laser, microwave, anti-satellite missiles, hoping to keep the lead in the space race in the future, continue to maintain its dominance.

    Overall, the world’s military powers have attached great importance to space support the construction and development of power, but the situation near several local wars, the only United States and Russia have a more comprehensive strategic, operational and tactical levels of space capabilities, other countries space is still the main force in the strategic use of the service. In the new space, the security situation, the US military has launched a new round of space forces change the face of the future US military space forces are likely to be a qualitative change occurs, information warfare appearance may therefore profoundly changed.

Original Manadrin Chinese:

随着太空技术不断发展,太空军事应用日益广泛,越来越多的国家加入了太空竞争行列

“谁控制了宇宙,谁就控制了地球;谁控制了空间,谁就控制了战争的主动权。”美国前总统肯尼迪的判断,推动了美国太空技术的发展,也将太空纳入了大国博弈和竞争的范畴。随着太空技术和太空力量的不断发展,太空军事应用日益广泛,在塑造国际战略格局、推动世界新军事变革等方面发挥了关键性作用。

    两强争霸,主要服务战略目的

1961年7月,美国利用刚刚研制成功的“萨莫斯”侦察卫星,拍摄到苏联SS-7和SS-8洲际弹道导弹试验部署情况,揭开了美苏“导弹差距”真相,成为第三次柏林危机顺利解决的关键,标志着太空支援力量登上了历史舞台。

此后,美、苏两个超级大国从全球争霸的战略目的出发,建起了较为完备的太空支援力量体系。

由于战略地位重要,侦察卫星的建设一直由美国情报界独立负责,以利保密。美国国防部则主导了“国防卫星通信系统”“舰队卫星通信”“军事星”三大通信卫星系统建设,在此基础上构建了“空军卫星通信”系统,为美国国家指挥机构和战略核部队之间提供安全、可靠、高存活性的双向全球通信能力。同时,美国国防部还研制部署了用于战略弹道导弹预警的“国防支援计划”卫星、用于核潜艇导航的“子午仪”卫星、用于全球气象探测的“国防气象卫星”等系统,形成了较为完备的体系。

为了与美国抗衡,苏联也开展了全面的太空力量建设,发展起以“天顶”“琥珀”侦察卫星、“闪电”通信卫星、“帆”导航卫星、“眼睛”预警卫星及“流星”气象卫星等为代表的太空力量体系。

整个冷战期间,美苏太空力量的作用主要体现在战略层面,双方利用侦察卫星和预警卫星近实时侦测对方的战略动态,利用通信卫星和导航卫星进行战略核部队指挥控制,形成了有效的核威慑作战体系,深刻影响了冷战时期的世界战略格局。

随着航天发展重点由运载火箭向军用航天器转变,各种军用卫星系统逐渐具备规模化运用能力,美苏开始组建专门的太空力量指挥机构。1985年,美军成立了联合太空司令部。苏联则于1982年把原属战略火箭军、负责发展太空支援力量的航天器总局转隶给国防部,而后又升格为航天器主任局,使太空支援力量成为了苏联国防部的直属兵种。

    群雄并起,作用向战役战术行动拓展

1991年的海湾战争中,太空力量为美军作战行动提供了关键的侦察、预警、通信、导航、气象等服务,标志着太空支援开始从战略层次进入到战役战术层次。

随后,美军开始大力发展能够更好地支持战役战术作战的太空支援力量,启动了各类军用卫星的大规模建设和升级换代。“全球定位系统”全面建成,“锁眼-12”“未来成像体系结构”“天基红外系统”“宽带全球卫星通信”“先进极高频”“移动用户目标系统”等新一代卫星相继投入使用。2003年的伊拉克战争中,美国使用卫星总数达167颗。截至2015年底,美国在轨卫星近400颗,其中军用卫星120余颗,形成了强大的太空支援作战能力。

在加强力量建设的同时,美军于2002年把联合太空司令部并入战略司令部,统管三军太空司令部,以更好地组织指挥太空支援力量战略、战役、战术各层次的军事行动。各军种也形成了各自的太空支援力量编制和支援模式,以顺利实现战役战术层次的太空支援。

俄罗斯独立初期国力不足,所继承的前苏联太空支援力量也无法正常维系,导致在轨卫星数量急剧下降,到2002年为止只有97颗在轨运行。针对这种局面,俄军进行了太空力量改革,于2001年成立了独立的航天兵,开始恢复和重建其军用卫星系统。“新面貌”改革开始后,俄于2011年以航天兵为基础组建了空天防御兵,2015年又把空军和空天防御兵合并组建了空天军,负责俄航天器发射控制、导弹预警袭击系统与太空监视系统的管理运行。

经过改革调整,俄各类卫星系统逐渐得到恢复。截至2015年底,俄在轨卫星近130颗,其中军用卫星近80颗。但俄军认为,来自空天的打击将是俄面临的主要威胁,空天已成为决定未来战争胜负的关键领域,因此俄全力发展空天防御力量,太空支援力量处于从属或服务地位。在历次改革中,卫星侦察、卫星通信、卫星导航等太空支援系统的建设管理仍由俄国防部及总参谋部下属的相关业务局承担,各军种也普遍缺乏太空支援人才,战役战术运用水平较低。在2008年俄格战争期间,俄军就曾暴露出卫星侦察不及时、卫星通信服务差等问题。

在美俄大力发展太空力量的同时,越来越多的国家加入了太空竞争的行列。印度2007年宣布要筹建“航空航天防御司令部”,以管理印度全国的空间资产,并对太空战武器进行概念研究,印度空军已经成立了航空航天大队。日本于2009年通过了《航空基本法》,使日本航空自卫队得以利用太空资源,并展开相关政策的研究、制定和规划,为未来太空行动奠定法理基础。其他一些国家也不同程度表达出军事开发和利用太空的决心和计划。

    攻防对抗,美国着力抢占先机

随着越来越多的国家进入太空领域,太空安全环境发生了显著变化。特别是在美军看来,太空已非昔日的“安全港”。美军参联会在2013年版《太空作战》条令中指出,指挥官必须考虑到敌对方可能采取的恶意行动,并能够在太空能力降级的情况下继续保持军事能力。为达到这一目的,美军率先一步,在太空攻防领域推出了一系列措施。

——提高太空监视能力。2015年2月,美空军和洛克希德-马丁公司启动了新型“太空篱笆”雷达系统建设工作。该系统可在第一时间监控到所有从美国上空经过的卫星,掌握卫星经过的时间、姿态和轨道等,还可探测直径小至10厘米的中低轨道目标,从而大大增强美国的太空态势感知能力。该系统与美空军陆基光电深空探测系统、导弹预警雷达网和太空监视系统共同构成从近地轨道到深空轨道的立体空间目标监视系统。

——提高现有太空力量的抗毁性。2013年美军发布了《抗毁性与分散式太空系统体系结构》白皮书,提出采用结构分离、功能分解、载荷搭载、多轨道分散、多作战域分解等措施,来提高太空支援系统生存能力。

——重视太空技术与传统技术的综合使用。2014年美发布的《迈向新抵消战略》报告中提出,美国需要对冲天基系统丧失所带来的损失,措施包括加快研发GPS替代系统、装备具有长持久力和/或空中加油能力的“高低混合”情报监视与侦察无人机等。

——建立军民融合的太空力量建设发展模式。美军计划采用战时租用民用与商用太空系统服务、在商业卫星上搭载军用载荷、直接购买先进的民用或商业系统转为军用等方式,补充现有太空支援能力的不足。

——通过开展军事演习发展太空力量建设运用理论。美军联合参谋部、空军、海军和陆军都有以太空支援作战为主题的军事演习。2001年美空军太空司令部开始主导“施里弗”太空战军事演习,迄今已举办9次。

——强化太空作战组织指挥。2015年9月,美国防部与情报界成立了机构间联合太空作战中心,负责整合卫星侦察数据、强化太空侦察能力,监控美军卫星运行情况,防范潜在对手攻击美国太空资产。

——加强太空进攻力量建设。2015年5月,美国X-37B进行了第四次飞行试验。虽然美国人将之称为“轨道试验飞行器”,但在关键信息上却三缄其口。外界猜测,X-37B有能力采取的军事行动包括控制、捕获和摧毁敌国航天器,对敌国进行军事侦察等。在这个意义上,X-37B很可能将是人类首架太空战斗机。此外,美国还加强了激光、微波、反卫星导弹等太空攻击力量的建设,希望在未来的太空竞赛中保持先机,继续维持其霸主地位。

总的看来,世界军事强国都高度重视太空支援力量的建设和发展,但就近几次局部战争情况来看,只有美、俄具备了较为完备的战略、战役和战术层次太空能力,其他国家的太空力量仍主要服务于战略运用。在新的太空安全形势下,美军又发起了新一轮太空力量变革,未来美军太空力量的面貌有可能会发生质的变化,信息化战争面貌也可能因此而发生深刻改变。

New Progress States space forces

    United States–

    Get rid of the GPS “dependency syndrome”

    Currently, almost all US military combat platforms and systems rely on GPS or GPS-based navigation system. However, GPS navigation presence signal is weak, poor penetration, vulnerable to interference, vulnerable to cyber attacks and other defects. To avoid huge risks due to excessive reliance GPS brought the US Defense Advanced Research Projects Agency (DARPA) in recent years have launched the “micro-positioning, navigation, timing and technology”, “adaptive navigation system,” “Quantum Perception and auxiliary readout technology “” ultrafast laser Science and Engineering “,” get in the fight against environmental space, time, and location information “and does not rely on GPS navigation, positioning, timing and technology research projects.

    Russia –

    Restart “satellite killer” program

    Russia has shelved the case in the official anti-satellite weapons program, the “satellite killer” plan, but the Russian side the key technology in the field has never been completely lost. According to media reports, the Russian military had for launch in 2013, code-named “2014-28E” (also known as the Universe 2499) of the mysterious object. The object was observed using a series of non-normal but the engine very precise orbit maneuver, it seems have the ability to be able to sneak up on other satellites.

    Japan –

    Establishment of space surveillance units

    August 28, 2014, Japan’s defense ministry revised the “development and utilization of the basic principle of the universe,” clearly pointed out that Japan will set up a special space surveillance forces of the universe and garbage run dynamic satellite tracking and analysis, in order to gradually strengthen the perception of space ability. The move aims to strengthen the Japan-US cooperation in space, to deal with weapons to attack from satellites will strengthen the capacity to collect pictures from space using satellites for ballistic missile launch early monitoring and analysis, to enhance early warning capabilities.

    India –

    Construction of Regional Satellite Navigation System

    March 28, 2015, India’s fourth-navigation satellites successfully launched India’s regional satellite navigation system gradually formed. India according to plan, the work of the network system will be divided into two steps: The first step is to launch geostationary satellites covering the whole territory of India’s regional satellite navigation system, the second step is from regional satellite navigation systems to the Indian version of the global satellite positioning system forward. The system will provide civilian and military both services.

 各国太空力量建设新进展

    美国——

    摆脱GPS“依赖症”

    目前,美军几乎所有的军用系统和作战平台都依靠GPS或基于GPS的组合导航系统。但是,GPS导航存在信号较弱、穿透能力差、易受干扰、易受网络攻击等缺陷。为避免由于过度依赖GPS而带来的巨大风险,美国防高级研究计划局(DARPA)近年来陆续开展了“微型定位、导航、授时技术”“自适应导航系统”“量子辅助感知与读出技术”“超快激光科学与工程”“在对抗环境下获得空间、时间和定位信息”等不依赖GPS的导航、定位、授时技术研究项目。

    俄罗斯——

    重启“卫星杀手”计划

    俄罗斯曾在官方场合搁置了反卫星武器计划,即“卫星杀手”计划,但俄方在该领域的关键技术从未完全丢失。据媒体报道,俄军方曾于2013年发射代号为“2014-28E”(或称宇宙2499)的神秘物体。该物体被观测到使用发动机进行一系列非正常但非常精准的机动变轨,似乎具备能悄悄接近其他卫星的能力。

    日本——

    设立太空监视部队

    2014年8月28日,日本防卫省修改了《宇宙开发利用基本方针》,明确指出,日本将成立专门的太空监视部队,对宇宙卫星和垃圾的运行动态进行跟踪和分析,以逐步加强太空感知能力。此举旨在加强日美在太空的合作,应对来自卫星的武器攻击,将加强从太空收集图片的能力,利用人造卫星对弹道导弹的发射进行早期的监控和分析,增强早期预警能力。

    印度——

    构建区域卫星导航系统

    2015年3月28日,印度第四颗导航卫星发射成功,印度区域卫星导航系统逐渐成形。按照印度的计划,该系统的组网工作将分为两大步骤:第一步是发射地球同步卫星组成覆盖印度全境的区域卫星导航系统,第二步是从区域卫星导航系统向印度版全球卫星定位系统迈进。该系统将提供民用和军用两种服务。

Libya war action in space
■ Wang Pingping

Libya is the second war in Afghanistan and the US-led war in Iraq is not a scale but the high degree of information technology local war, preparations for war, initiated and progression to reconnaissance, navigation, communications support for the core space power to effectively support the multinational force and strategic campaign decisions to protect the fine planning and real-time command and control task.
Before the war, the US-led NATO military operations on the basis of the need for a full assessment on the strength of existing space system was substantial adjustment, built up by the imaging and electronic reconnaissance, maritime surveillance and missile warning, command and communications, space support system navigation, meteorological observation system consisting of satellites and satellite systems for civil use functionally complement in individual areas. In addition, according to operational needs, with fast access to space capability supplementary firing several satellites.
Libyan war, the multinational force to implement the diversification of space support operations.
Access to information on the battlefield, the multinational force by the imaging reconnaissance spacecraft, aerospace electronic reconnaissance means supplemented by special reconnaissance and surveillance network means, Libya’s strategic target architecture, an important goal distribution, composition and deployment of air defense systems, command and control relationship , means of communication and frequency distribution of a comprehensive reconnaissance. War is in progress, the multinational force by aerospace electronic reconnaissance and avionics reconnaissance combining means, real-time capture and analysis of radiation target operating parameter Libyan army, master Libyan army air defense system deployment adjustment, dynamic intelligence command and communications work full time monitoring Libya’s mobile communications and satellite communications, intelligence screening important clues.
In terms of battlefield information distribution, multinational force operations in front of more than 1100 kilometers wide, over a wide area of ​​more than 600 kilometers in depth expansion; air force were deployed in the war zone from 700 to more than 2800 km range and nearly 20 airports on aircraft carriers, a variety of information through a wide range of command and control, high-speed, high-capacity, high security satellite communications system to distribute real-time data sharing within the multinational force, for a variety of combat forces and the overall offensive and defensive operations provide linkage strong support.
In terms of navigation and positioning, navigation and positioning information needed for precision air strike all provided by space power, accuracy of less than meter-level positioning information to ensure effective control of collateral damage when clearing precision strike urban targets.
Throughout the war in Libya, the space forces to the multinational force to provide 80% of the intelligence information to help them achieve battlefield transparent way, firmly grasp the battlefield initiative. There are pre-prepared in the intelligence area, the US military to grasp the dynamics of the battlefield and complete the property identified in less than 5 minutes. Space power efficient support from discovery, to combat identification, evaluation precision air strike chains. Combat action against Gaddafi fled from Sirte, that is, by the space surveillance system to grasp the dynamics and guide warplanes and drones successful wars against the blockade.

利比亚战争中的太空行动

■王平平

    利比亚战争是继阿富汗和伊拉克战争之后美国主导的一场规模不大但信息化程度很高的局部战争,战争的准备、发起和进展过程,以侦察情报、导航定位、通信保障为核心的太空力量,有效支持了多国部队的战略与战役决策,保障了精细任务筹划和实时指挥控制。

战前,以美国为首的北约在对军事行动需要进行充分评估的基础上,对既有的太空力量体系进行了充实调整,构建起了由成像及电子侦察、海洋监视及导弹预警、指挥通信、导航定位、气象观测等卫星系统构成的太空支援体系,并利用民用卫星系统在个别领域进行功能性补充。此外,根据作战的需要,利用快速进入太空能力补充发射数颗卫星。

利比亚战争中,多国部队实施了多样化的太空支援行动。

在战场信息获取方面,多国部队通过航天成像侦察、航天电子侦察手段,辅之以特种侦察和网络侦察手段,对利比亚境内的战略目标体系结构、重要目标分布、防空体系构成及部署、指挥控制关系、通信手段及频率分布情况进行全面的侦察。战争进行过程中,多国部队通过航天电子侦察与航空电子侦察相结合的手段,实时截获和分析利比亚军队的辐射目标工作参数,掌握利比亚军队防空系统部署调整、指挥通信工作的动态情报,全时段监控利比亚的移动通信及卫星通信,筛选重要情报线索。

在战场信息分发方面,多国部队的作战行动在正面宽1100余千米、纵深600余千米的广阔区域内展开;空中力量分别部署在距战区700~2800余千米范围内近20个机场及航空母舰上,指挥控制的各种信息通过大范围、高速度、大容量、高保密性的卫星通信系统实时分发,在多国部队内部实现数据共享,为各种作战力量及攻防作战行动的整体联动提供有力支持。

在导航定位方面,空中精确打击所需要的导航定位信息全部由太空力量提供,精度小于米级的定位信息确保了对城区目标进行空地精确打击时有效控制附带损伤。

整个利比亚战争中,太空力量为多国部队提供了80%的情报信息,帮助其实现战场单向透明,牢牢掌握战场主动。在有预先情报准备的区域内,美军掌握战场动态情况并完成属性识别的时间小于5分钟。太空力量高效支持了从发现、识别到打击、评估的空中精确打击链。对从苏尔特出逃的卡扎菲进行的打击行动,就是由太空侦察系统掌握动态情况,并引导战机和无人机进行阻滞打击的成功战例。

Source:
Ministry of National Defense of the People’s Republic of China
 Author: Zhang Zhi Time: 2016-01-29

China NPC Emphasis on Solving National Security System Issues//中國家安全體系「全國人大會議公布了《十三五規劃綱要(草案)》

中國家安全體系「全國人大會議公布了《十三五規劃綱要(草案)》

March 5, 2016 during the Chinese NPC and CPPCC, National People’s Congress announced the “Thirteen Five-Year Plan (draft)”, under the title “establishment of a national security system,” complete the chapter, first expounded on China’s implementation of “the country’s overall security View of concrete ideas “in. Prior to that, although related concepts to promote its fast, but in addition to the super-agency “National Security Council” has been officially running, as well as a small amount of the agency personnel arrangements, almost no more news.

The first place to prevent hostile forces subversive

From an international perspective, “Comprehensive security concept” for a class is not the first thought. After all, since the end of the Cold War, the security environment upheaval, insecurity diversification, already is a common phenomenon faced by countries. But domestic letters of “overall national security” still kill any world trend, because this piece can be described as all-encompassing grand – covering “political, land, military, economic, cultural, social, science and technology, information, ecology, resources …… and nuclear safety. ”

Although the “official stereotyped” perfect frame Description: “people-safe for the purpose, as the fundamental political security, economic security, based on the Social Security for the protection of military culture in order to promote international security as the basis”, but this piece is clearly ambitious where to start challenge.

When “KNB” first appeared in late 2013 eighteen Third Plenary Session of the resolution, only to see hastily put some “innovative social governance” at the end. Until five months later, the agency announced that it has officially running, trying to explain its official mouthpiece of great significance, it is still mainly externally or internally, vary.

During the two sessions, elaborate “Thirteen five Outline” published by the NPC session, so this kind of ambiguity resolved.

Although the outline, “national sovereignty security regime” concept beautifully, has made the world’s political circles unheard of, but more surprising is that in the fight against the three forces’ violent terror, ethnic separatism, religious extremism “previous activity, will also impressively “hostile forces infiltrate subversive activity” in the first place.

Obviously, to prevent subversion of urgency regime was as if beyond the anti-terrorism, anti-spyware and other traditional threats to national security.

Traditionally, law enforcement departments, the Ministry of Public Security and the famous “national security” system, and its huge cost “stability maintenance” system billions compared to only as a spy / Ministry of National Security Abwehr, more in line with narrowly “national security” concept. The system has also been set up at all levels of “national security leadership team,” leading narrow “national security” and its work force.

Jiang Zemin period, Beijing began to envy the role of the US National Security Council (NSC) at the highest decision-making. As president advisory body, NSC members including President, Vice President, Secretary of State, Minister of Finance, Minister of Defence and National Security Affairs Assistant to the President, the Chairman of the Joint Chiefs of highest operational commander and director of national intelligence, were appointed to act as the statutory military advisers and intelligence advisers, other government departments and competent officials, invited participants only when needed.

“The Central Leading Group for National Security,” in the year 2000, although the head of the pro-Jiang, but deputy head in charge of foreign affairs for the Central Committee, the Central Foreign Affairs Office director concurrently by the Office, in particular from the group and “Foreign Affairs Leading Group “under one roof, the main coordinating its national security and external affairs. Although not as good as NSC high level, because China and the US but the basic political structure fundamentally different, are also considered to meet the conditions of moderate learning.

Jiang later period, the Chinese domestic policy increasingly independent, and the West in the system of values ​​and rules of becoming the opposition, senior party growing emphasis on co-ordination “International and Domestic Situation.” After learning more individuals came to power centralization, theoretical innovation and the urgent need to safeguard stability of the regime. Thus, despite the increased legitimacy, the study of “KNB” is still brewing since Jiang Zemin claimed, but the design of the system may differ.

Thus, the Chinese Communist Party and the previous system separately, in order to avoid the party on behalf of the administration and other rare progress, is now being accused of “fragmentation, excessive power scattered.” By adding a permanent body, will the party, government, military, law, economics, culture and even social life, and where the “national security” detached power clean sweep, then became “the country to explore a new way of governance.”

Now, in “Baidu Encyclopedia” in terms of self-built, actually it was assumed added, “National Security Council People’s Republic of China” entry, content only involved “state security committee.”

Beijing whether through a constitutional amendment to set up a shadow-style “national KNB” hard to say. However, by the time the CPC Central Committee, the National Security Committee to get the full decision-making power for national security affairs, responsible only to the Politburo and its Standing Committee. As heads of the supreme legislative body of the People’s Congress, only its Vice-President, the National Security Committee of the degree of centralization, even beyond the Central Military Commission.In contrast, the United States NSC decisions, but also to exercise its statutory powers to rely on the President and subject to legislative, judicial checks and balances.

Further overhead Politburo and State Council

The current maximum suspense, or “KNB” materialized, decision-making and institutional settings large to what extent.

An analogy example, although in the network area, the original Central Propaganda Department, Ministry of Public Security, Ministry of State Security, the Ministry of Industry, the Central Foreign Affairs Office / State Council Information Office, Press and Publication Administration and other agencies bull management, but also from 18 Third Plenary session of the decision, the CPC network security and information technology leadership team established in 2014 (referred to as the “net channel group”) / national Internet information office of People’s Republic of China ( “the State Council informatization office”), and set up a separate large business functions, took a lot of network management and monitoring powers.

At the top of its home page, the two names are alternately displayed, complete with party and government bodies.

Rationale for establishing this institution, because the State Department is also the system’s “National Informatization Leading Group” and their offices, “the State Council Information Office” (also referred to as the “State Council Informatization Office”) is difficult to coordinate the CPC Central Committee, the Central Military Commission, the NPC, etc. authority. However, the greater the motivation or senior party controls the Internet public exigencies, and the use of information warfare means to challenge the United States needs. To promote the domestic information technology process, the agency more than the promotion of hand shackles.

Regression KNB, although it has been interpreted as “national security and crisis handling the national level a permanent establishment,” but until March 2016, in the list of institutions directly under the CPC Central Committee and the Communist Party of China Xinhua News Network, the former are still ” central leading group for national security, “and not see” KNB. ”

Although “KNB” was praised as “reduce rules, enhance decision-making efficiency,” but in what things must be raised to this level resolved, which can be left in the original POLITICAL, military and diplomatic level processing is difficult to untangle.

It is with the Central Political and Law Commission as “directly under the central authorities,” the division of labor? It as “directly under the central coordinating body of procedure” in policing governance, anti-anti-cult operations, stability, maritime rights and interests, possession of Xinjiang, financial security, Taiwan, Hong Kong and Macao, net letter, confidentiality, the working group password (Note: the full name of each team name how to end the relationship) is? In the end how it Ministry of National Security and other government departments, as well as relations with the National Commission on cross-border and coastal defense ministries overseas Chinese citizens and institutions security work inter-ministerial joint conference and many other bureaucracies? I’m afraid that deep-rooted concerns about its effect, less effective, was not excessive.

From The National People’s Congress issued the “Outline”, the more difficult to find: as the basic starting point for the study of governance, the starting point and one of the ultimate value, political, land, economy, society, resources and networks, and other key areas are security policy and called for long-term goals, important areas, major reforms, major projects, programs and policies, require safety risk assessment.

This means that, even if only partially materialized, due to the requirement that all focus areas, all national security coordination mechanism established to maintain, “KNB” already with “deep change Team” (Note: Comprehensively Deepening the Reform Leading Group) as tantamount to a indeed affect the whole body, brought together a large number of power “small government.”

In addition to further overhead Politburo and State Council, set in one of the highest authority, through several sets of much needless repetition mechanism, calling the shots. However executor, it is still the same set of ministries and local, its efficiency, and can really ensure the complex demands of national security in a reasonable portion, not optimistic.

March 5, 2016, Beijing, China, in front of the Great Hall of People’s Liberation Army soldiers walked.Photo: Damir Sagolj / REUTERS

Endanger the interests of the former National Security Systems division, to stimulate the “spy” Country

It can be expected that with the proposed “Thirteen five Outline” “overall national security”, and in the rise of influence “KNB”, the original continent “national security”, “national security” systems are at risk.

“National security” has recently been rumored to be canceled. It is believed that its intelligence gathering in the field of domestic politics to defend the building (social monitoring) hidden forces, investigation of cases against dissent, control ethnic / religious positions against cults and other functions, will disperse to more legalization of criminal investigation and law and order department. Entered into force in 1993, “National Security Law” in 2014 was much more narrowly “anti-spyware law” instead.

And “Thirteen five Outline”, requires the integration of monitoring and early warning systems in different areas, intelligence gathering and analysis capabilities. From the work of national intelligence to see the movements of specific legislation, “national security” system will inevitably lose power “national security” monopoly.

This stimulus, 2014, 2015, Ministry of State Security systems, proactive disclosure reports uncovered espionage significantly increased, but in the end these cases leaked it?

March 2015, published by the National Security Henan province since the first espionage case, a taxi driver observed the airborne unit of foreign institutional Airport, the surrounding circumstances and models; July Sichuan national security nearly a decade for the first time publicly disclosed the spy case, a military unit 4 leakers, provided some military types, quantity, special materials, setting the test time and fault conditions, some provide aerospace internal publications; November, Jilin Baishan Jun captured the partitions a foreign spy shooting and hand-painted Chinese border troops distribution.

These cases certainly have leaked military secrets, but the scope and extent been greatly exaggerated. In recent years, Beijing strengthened its online publication and transmission of state secrets supervision, the biggest problem is still the “secret infinity.” Although Beijing has in recent years to speed up the clear “given secret” work “secret” and “non-secret” boundaries, but because the concept of paranoia, coupled with bureaucratic agencies should rely on “secret” to eat, they do not want to bear responsibility for the secret too wide, Fuzzy boundaries situation no better.

In fact, some experts mainland when rendering espionage threat, has admitted “we take the initiative to trafficking intelligence” indicating that “China also collect / buy foreign intelligence”; an expert in the Ministry of State Security emphasis on “cyber espionage nearly the year more and more active, “to actually” see them from the Internet’s remarks can be found in a number of valuable intelligence “as an example, but the latter is completely unlawful.

Henan above case, there is the Baidu from China “high One” satellite photographs taken by the airport, accurate to 20 meters, “Baidu Panorama” provides a neighboring street to the nearest airport each shop, military fans in China understanding Air transporter models thousands; Sichuan cases, internal publications fuzzy nature, contained a lot of technical discussion with the same military production. And unavoidably, everything is secret practice is nothing more than a cover closed, inefficient, and defects behind Beijing’s military, these are not exposed and supervision, the harm is far more than this information about the outside world.

At the same time, the Confidentiality Commission / Secrets systems have long been cured departmental interests, such as to secrecy, mandatory use map products “Nonlinear confidential treatment technology”, is formed on the map with the location of the actual existence of 100 to 600 meters random deviations. Such an approach, in addition to the official mapping agencies to create huge gains, related to the national industries and national tremendous trouble, there are no secret role – because the location does not become a military objective entity, foreign intelligence agencies and the military does not rely on Chinese map, which judged and attacks unaffected.

Of course, this by no means departmental interests to “spy” Country situation all causes.Overall, Beijing also needed on the mainland society, frequently rendering national security is facing a critical situation, hidden front struggle intense, so trees enemy awareness, inspire patriotic enthusiasm and even xenophobic, secretly strengthen social control.

Moreover, since the Beijing powers and budget oversight from society, the party and the national government itself parents, as long as the name of security, from the whole to the details, any information can be disclosed only to those who choose favorable, remaining airtight, so that with “espionage “Ruling tool if fabulous.

At the same time, Beijing legislative activity in recent years, national security and social stability and other interests in the name of full citizens with increased surveillance, public security mandatory intervention of civil liberties and privileges of the investigation.

November 2015, the National Security Office Jilin even announced espionage and accepted nationwide hotline to report clues, for reasons that remain unknown. The department asked citizens to report suspicious persons “spy, traitor, instigation personnel, intelligence agents, the external agents”, etc., but this is only a political rather than a legal concept concepts also include standard suspicious signs purely surface, many of which are only legal status or the performance of speech, may be entirely unrelated espionage, where “sensitive issues” and “reactionary remarks” but not operational on legal concepts.

Obviously, not called for such a system to report the current espionage, but a wide range of East German-style citizen informers and mutual monitoring, did not say infringe on civil liberties, even in the “dictatorship” discourse system, misunderstanding, framed and frame risks are high.

Criminal Law Amendment (IX), adopted in August 2015, the night the new information network security management refused to fulfill the obligations crime, the crime of illegal use of the information network, information network to help crime and criminal activities, to disrupt the order of state organs crime, the crime of illegal financing of the organization gathering fabricated deliberately spreading false information crime, the crime should be no public disclosure of information on cases of crime reporting and disclosure of information should not be disclosed in the cases, the other 20 counts, terrifying.

The case of Gao Yu, and bookstores case Causeway Bay, but are just beginning.

All this shows that in China, “national security” concept epitaxial greatly expanded, not only to adapt to contemporary national security multifactor interwoven trend, and it is a power struggle and the rule of magic weapon too superficial. In essence, it is the Beijing regime concentrated outpouring of anxiety. The “Thirteen Five Outline” in “protect country” a new action also marks the communist countries in times of crisis, to strengthen the “police state” color of nature, is rapidly recovering.

Note: Team organization full name:

The Central Committee for Comprehensive Management of Social Security, the Central Cult Prevention and Handling of the Leading Group, the Central Leading Group for the maintenance of stability, the central leading group for marine rights and interests, the Central Tibetan Coordination Leading Group, the Central Coordination Group Xinjiang, the Central Steering Committee on Financial Security, the CPC central / State Department double identity Taiwan Affairs leading group, Hong Kong and Macao work coordination group, a centralized network security and information technology leading group, the central Committee and the central password confidentiality work leading group.

Original Mandarin Chinese:

3月5日,中國2016年兩會期間,全國人大會議公佈了《十三五規劃綱要(草案)》,以題為「建立國家安全體系」的完整一章,首次闡述了中國貫徹「總體國家安全觀」的具體設想。此前,儘管相關概念的宣傳風生水起,但除了超級機構「國家安全委員會」已正式運轉,以及該機構少量人事安排外,幾乎沒有更多消息。
將防止敵對勢力顛覆破壞放在首位
從國際範圍看,「綜合安全觀」一類思想並非首創。畢竟從冷戰結束起,安全環境劇變、不安全因素多樣化,就已是各國面臨的普遍現象。可是國內大書特書的「總體國家安全觀」,仍秒殺任何世界潮流,因為這幅宏圖可謂包羅萬象——覆蓋了「政治、國土、軍事、經濟、文化、社會、科技、信息、生態、資源和核安全……」。
儘管「官方八股」框架描述完美:「以人民安全為宗旨,政治安全為根本,經濟安全為基礎,軍事文化社會安全為保障,以促進國際安全為依託」,但是這幅宏圖從何下手顯然有挑戰。
「國安委」2013年底首次出現在十八屆三中全會決議中時,就僅見匆匆置於「創新社會治理」一段末尾。直到5個月後,該機構宣布已正式運轉,努力闡釋其偉大意義的官方喉舌,仍對它以對外還是對內為主,說法不一。
兩會期間,人大會議公佈的《十三五綱要》的闡述,讓這類歧義迎刃而解。
儘管綱要中,「國家政權主權安全」概念的粉墨登場,已經令世界政治學界聞所未聞,但更令人吃驚的是,在對付三股勢力「暴力恐怖、民族分裂、宗教極端」的活動之前,還赫然將「敵對勢力滲透顛覆破壞活動」放在首位。
顯然,防止政權被顛覆的迫切性儼然超越了反恐、反間諜等傳統國家安全威脅。
傳統上,在強力部門中,與大名鼎鼎的公安部「國內安全保衞」系統、及其耗資千億的龐大「維穩」體系相比,只有作為間諜/反間諜機關的國家安全部,更符合狹義的「國家安全」概念。該系統也曾在各級設立過「國家安全領導小組」,領導狹義「國安」工作及其隊伍。
到江澤民時期,北京開始羨慕美國國家安全委員會(NSC)在最高決策中的作用。作為總統諮詢機構,NSC成員包括總統、副總統、國務卿、財政部長、國防部長和總統國安事務助理,最高作戰指揮官參聯會主席和國家情報總監,分別充當該委法定軍事顧問和情報顧問,其他政府部門主管和高官,則只在需要時應邀參會。
「中央國家安全領導小組」於2000年產生,雖然江澤民親任組長,但副組長為分管外交事務的政治局委員,辦公室主任由中央外事辦公室主任兼任,特別是從該小組與「中央外事工作領導小組」合署辦公來看,它主要協調對外的國家安全事務。雖然其層級不如NSC高,但因為中美基本政治架構的根本不同,也算符合國情的適度學習。
江以後時期,中國國內政策日益特立獨行,與西方在價值觀和規則體系上漸趨對立,中共高層日益強調統籌「國際國內兩個大局」。習上台後更有個人集權、理論創新和政權維穩的迫切需要。因而,儘管為增加合法性,習的「國安委」仍自稱醖釀自江澤民,但在製度設計上可就大相徑庭了。
於是,中共原有體制中黨政分開、避免以黨代政等難得的進步,現在被指責為​​「條塊分割,權力過散」。通過增加一個常設機構,就將黨、政、軍、法、經、文乃至社會生活中,凡與「國家安全」沾邊的權力一網打盡,則成了「對國家治理方式的一種新探索」。
如今,在「百度百科」的自建詞條上,居然有人想當然地添加了「中華人民共和國國家安全委員會」詞條,內容卻只涉「中共國安委」。
北京是否經過修憲,來設立一個影子式的「國家國安委」還很難說。然而,經中共一次中央全會,國安委就獲得全部國家安全事務決策權,只向政治局及其常委會負責。作為最高立法機構的人大首腦,也只是其副主席,國安委的集權程度,甚至超越中央軍委。相比之下,美國NSC的決策,還只能靠總統行使其法定權力,並受立法、司法權制衡。
進一步架空政治局和國務院
當前最大的懸念,還是「國安委」的實體化、決策權和機構設置將大到何種程度。
一個可以比附的例子是,雖然在網絡領域,原有中宣部、公安部、國家安全部、工信部、中央外宣辦/國務院新聞辦、新聞出版總署等機構多頭管理,但同樣由十八屆三中全會決定、於2014年成立的中共中央網絡安全和信息化領導小組(簡稱「網信組」)/中華人民共和國國家互聯網信息辦公室(簡稱「國信辦」),又單獨設立了龐大的業務職能部門,接管了大量網絡管理和監控權力。
在其首頁頂部,兩個名稱交替顯示,黨政完全同體。
設立這一機構的理由,同樣是因為國務院系統的「國家信息化領導小組」及其辦事機構「國務院信息化工作辦公室」(也曾簡稱「國信辦」)難以協調黨中央、軍委、人大等權力機構。然而,其更大的動機,還是中共高層管制互聯網輿論的急迫需要,以及利用信息戰手段,挑戰美國的需要。對促進國內信息化進程,該機構反倒桎梏多於促進。
迴歸國安委,其雖然被解讀為「國家層面的國家安全和危機處理常設機構」,但直至2016年3月,在中國共產黨新聞網和新華網的中共中央直屬機構列表中,都仍有原「中央國家安全領導小組」而不見「國安委」。
儘管「國安委」被讚譽為「減少條條框框,提升決策效率」,然而在哪些事必須上升到這一層面議決,哪些可以留在原有政法、軍事和外交層面處理,則不易理清。
它與作為「中央直屬部門」的中央政法委如何分工?它與作為「中央直屬議事協調機構」的治安治理、防反邪教、維穩、海洋權益、藏疆、金融安全、對台、港澳、網信、保密、密碼等工作小組(注:各小組名稱全稱在文末)的關係如何?它與國家安全部等政府部門,以及與跨部委的國家邊海防委員會、境外中國公民和機構安全保護工作部際聯席會議等大批官僚機構的關係到底如何?恐怕擔憂其效果盤根錯節、事倍功半,並不為過。
而從本次人大會議公佈的《綱要》中,更不難發現:作為習治國理政的基本出發點、切入點和終極價值之一,政治、國土、經濟、社會、資源網絡等重點領域,均要求制訂安全政策和中長期目標,重要領域、重大改革、重大工程、項目和政策,都要求進行安全風險評估。
這意味著,哪怕只是部分​​實體化,由於要求所有重點領域,均建立維護國安工作協調機制,「國安委」已然同「深改小組」(注:全面深化改革領導小組)一樣,無異於一個牽一髮而動全身,匯聚大量權力的「小政府」。
在進一步架空政治局和國務院之外,集於一人的最高權力,通過疊床架屋的多套機制,來發號施令。然而執行者,則仍是同一套部委和地方,其效率,以及能否真正保證龐雜的國安訴求中的合理部分,不容樂觀。

2016年3月5日,中國北京,解放軍士兵在人民大會堂前走過。攝:Damir Sagolj/REUTERS
危及原國安系統部門利益,刺激以「諜」治國
可以預計,隨著《十三五綱要》的「總體國家安全觀」的提出,在「國安委」的崛起影響下,大陸原有「國保」、「國安」系統均岌岌可危。
「國保」近來盛傳將被取消。據信,其在國內政治保衞領域的蒐集情報、建設(社會監視)隱蔽力量、偵查異見反對案件、控制民族/宗教陣地、打擊邪教組織等職能,仍將分散到更加合法化的刑偵和治安等部門。從1993年生效的《國家安全法》,於2014年被狹義得多的《反間諜法》取代。
而《十三五綱要》,則要求整合不同領域的安全監測預警系統,及情報蒐集分析處理能力。從對國家情報工作專門立法的動向看,「國安」系統也必然失去對「國家安全」的權力壟斷。
受此刺激,2014、2015年的國家安全部系統,主動披露破獲間諜案的報道明顯增多,可是這些案例到底洩露了什麼?
2015年3月,河南國安公佈的該省首起間諜案中,一名的士司機為境外機構觀察空降兵某部的機場位置、週邊情況和​​機型;7月四川國安近十年首次公開披露的間諜案中,某軍工單位的4名洩密者,有的提供了軍品型號、產量、特殊材料、定型試驗時間和故障情況,有的提供了航空航天內部刊物;11月,吉林白山軍分區擒獲一名拍攝和手繪中國邊境兵力分佈的外籍間諜。
這些案例中洩露的當然有軍事機密,然而範圍和程度被嚴重誇大。近年北京加強了對網上發布和傳遞國家秘密的監管,最大問題仍是「密無邊際」。雖然北京近年一直要求加快明確「密」和「非密」界線的「定密」工作,但由於風聲鶴唳的觀念,加之官僚機關既要靠「密」吃飯,又不願擔責,秘密過寬、界限模糊的局面毫無改觀。
實際上,大陸有的專家在渲染間諜威脅時,也承認有「主動向我方販賣情報的」,這說明「中國也蒐集/收買外國情報」;國安部一專家在強調「網絡間諜活動近兩年越來越活躍」時,居然也以「他們從網上看到的言論中就可以發現若干有價值的情報」為例,然而後者完全是合法的行為。
上述河南案例中,百度上就有來自中國「高分一號」衞星拍攝的該機場照片,精確到20米,「百度全景」則提供了機場週邊精確到每家店鋪的街景,中國軍迷中認識空軍運輸機機型的數以萬計;四川案例中,內部刊物性質模糊,所載的大量技術探討同軍品生產一樣。而事無鉅細,一切皆密的做法,無非掩蓋了北京軍工的封閉、低效、落後和缺陷,這些問題得不到曝光和監督,其危害遠超這些情報被外界了解。
同時,保密委員會/保密局系統也早已固化了部門利益,比如以保密為由,強制要求地圖產品採用「非線性保密處理技術」,形成圖上位置與實際存在100~600米的隨機偏差。此種做法,除了給官方測繪機構創造鉅額收益,給本國相關產業和國民帶來巨大麻煩外,沒有任何保密作用——因為軍事目標實體位置並不會變,外國情報機構和軍方也不依靠中國地圖,其研判和攻擊絲毫不受影響。
當然,部門利益絕非這種以「諜」治國局面的全部原因。整體上,北京也需要在大陸社會,頻頻渲染國家安全面臨危局、隱蔽戰線鬥爭激烈,從而大樹敵情意識,激發愛國甚至仇外熱情,暗中強化社會控制。
而且,由於北京權力和預算不受社會監督,黨和政府以國民父母自居,只要以安全為名,從整體到細節,任何信息均可只擇有利者公開,其餘密不透風,使以「諜」治國工具如有神助。
同時,北京近年的立法活動,以國家安全和社會穩定等利益為名,全面增大了對公民配合監視、調查的強制性和公安干預公民自由的權限。
2015年11月,吉林省國家安全廳竟然公佈了接受全國範圍間諜行為和線索舉報的專線電話,原因至今不明。該部門要求公民舉報可疑人員「間諜、內姦、策反人員、情報員、外圍代理人」 等,但這只是政治概念而非法律概念,列舉的可疑標準也純屬表面跡象,很多是合法身份或僅表現為言論,完全可能與間諜毫無關係,其中的「敏感問題」和「反動言論」更不是法律上可操作的概念。
顯然,這種制度號召的絕非對現行間諜行為的舉報,而是東德風格的公民大範圍相互監視和告密,侵犯公民自由不說,即使在​​「專政」話語體系內,誤解、誣陷和栽贓風險也很高。
2015年8月通過的刑法修正案(九),一夜新增拒不履行信息網絡安全管理義務罪、非法利用信息網絡罪、幫助信息網絡犯罪活動罪、擾亂國家機關工作秩​​序罪、組織資助非法聚集罪、編造故意傳播虛假信息罪、洩露不應公開的案件信息罪和披露報道不應公開的案件信息罪,等20項罪名,令人恐怖。
而高瑜案、以及銅鑼灣書店案,均不過是才剛剛開始。
這一切表明,在中國,「國家安全」概念外延的大幅擴展,絕不只是為適應當代國家安全保障多要素交織的趨勢,而說它是權鬥利器和治國法寶也流於表面。實質上,它是北京政權焦慮的集中流露。而《十三五綱要》裏「保江山」的全新動作,也標誌著共產主義國家在危機時刻,強化「警察國家」色彩的天性,正快速復甦。
註:小組機構全稱為:
中央社會治安綜合治理委員會、中央防範和處理邪教問題領導小組、中央維護穩定工作領導小組、中央海洋權益工作領導小組、中央藏區工作協調領導小組、中央新疆工作協調小組、中央金融安全指導委員會,與有中共中央/國務院雙重身份的對台工作領導小組、港澳工作協調小組、中央網絡安全和信息化領導小組、中央保密委員會和中央密碼工作領導小組。

China Military Strategic High Ground of Information Warfare: Spatial Information Confrontation //中國軍事空間信息對抗:信息化戰爭的戰略制高點

中國軍事空间信息对抗:信息化战争的战略制高点

作者:穆志勇 李莉

來源:學習時報2015-06-15

信息化战争的战略制高点

Spatial information effectively combat weaponry put strategic position, pay attention to the fight against cross-border joint information space forces the leading role of the traditional power and strength and spatial information of conventional power, to achieve full-dimensional spatial information to flow freely.

All things Internet era, we must rethink the current and future military struggle in the forefront of what? We are talking about local information technology local war where?Information War made the strategic high ground right where?

All things Internet era, control of information has become the battlefield to win the right to the core of an integrated system, “no network without fighting,” “no victorious day” has become iron law, made ​​winning the war of spatial information right to become a strategic safeguarding national sovereignty, security and development interests ground. It extends to the battlefield where, where the initiative will expand the competition. The main countries in the world attach great importance to and respond to threats and challenges from outer space, the space around the right to development, ownership and control, in a fierce competition.

Spatial information against a new means of strategic deterrence quality checks and balances

Spatial information can play against fighting the enemy afraid, Gongdi key is a new means of strategic deterrence quality of checks and balances. On the one hand, with a strong spatial information attack capability, can effectively curb space power, space to defend the sovereignty, enhance the right to speak and the initiative in the international arena; on the other hand, has enough spatial information defense, deterrence and containment can launch the Iraq war opponents button, effectively resist the threat and destruction in outer space, to prevent loss of control of the space.

The United States will “Space confrontation” as a strategic deterrent capability and the “Global Strike” and “nuclear strike” both, and since 2001 has performed seven times, “Schriever” space combat computer simulation exercises; vigorously the development, testing and deployment of space information weapon, launching the world’s first reusable aircraft able to detect, control, capture, destroy the spacecraft his country “orbital test vehicle” X-37B space fighter, space fighter plans to deploy 2025 troops in outer space; “global commons domain intervention and joint mobility “concept vowed to quickly weaken the enemy space facilities capacity through non-kinetic measures to destroy its anti-space capabilities in key elements.Russia to develop “military space recovery plan,” President Putin has restarted “crown” anti-satellite project, focusing on the development of anti-satellite weapons, the “strategic air and space battles” as the basic style of air and space operations, three satellite launch last year and aerospace It is regarded by the United States’ aerospace killer “and ready after 2016 to establish a modern space combat system. Japan’s new “cosmic basic plan” clearly states “actively enter the field of space”, was “modern security”, expanded and enhanced features for satellites to monitor vessels at sea and ground facilities, and trying to build a set of positioning, communication and intelligence gathering and other functions in one of the new satellite systems, the scope of application of force to achieve the SDF land, sea, air, space-round leap.

Spatial information into a military confrontation priority areas for capacity-building

From the world’s military development, the right to take on the overall system of spatial information system other rights, the right to seize control of the spatial information is action battle for dominance of the main action. Local Wars practice, there is no right to make spatial information, the Air Force is difficult to combat, navy naval difficult, with even the best of other weapons and equipment may also be vulnerable to attack. Spatial Information confrontation multidimensional space operations provide important support, “new quality” of the combat system is the ability to generate combat multiplier, it will be the focus of capacity-building in the military field. From the fight for control of space means, the spatial information against strong controllability, flexibility, use of low threshold, a wide scope, with less damage, be cost-effective, it should be current and future space supremacy capacity-building period key development areas.

Currently, the United States actively promote Asia “rebalancing” strategy, trying to fight the development of spatial information capabilities, not only to develop electronic interference and covert soft kill hard against damage and other spatial information means, actively develop their own approach, rendezvous and docking and other space-based technology against the core , also focused on the development of satellite communications electronic jamming, near real-time detection, interference signal feature recognition, sources of interference positioning technology, efforts to develop a variety of space-based anti-satellite weapons, and has begun to deploy automated attacks, identity systems. November 14, 2012 the United States and Australia announced that the US will place a powerful Air Force C-band radar and space telescope in Australia, and it is clear that the United States will shift the strategic part of Asia.This will enable the US forward-deployed every day to keep better track of up to 200 confirmed over the Asia-Pacific and orbital spacecraft and potential anomalies. According to US media reports, the US Air Force and Lockheed Martin in February this year to start construction work in the future, “Space Fence” The new radar system, which also marks the United States started the S-band ground-based radar system, the radar system will replace the United States in the 1960s developed space surveillance systems. Russia’s “Military News” May 18 reported that Air Force Secretary James declared that the US Air Force budget of $ 5 billion has been requested to establish a defense system for the military space to prepare for a possible conflict. Japan’s space development strategy headquarters set up monitoring force and space, and proposed the next 10 years will be launched 45 satellites ambitious goals in the positive development of the second generation of IGS reconnaissance satellite system, while seeking cooperation with ASEAN countries, to build a Japan center, a network of 68 satellite Earth observation satellites, in an attempt to obtain information from other countries and share with the United States at the same time, strengthen the surrounding sea routes to Japan, the Diaoyu Islands and the adjacent waters of the maritime surveillance capability. According to Japan’s Kyodo News reported, the new “US-Japan defense cooperation guidelines” emphasize the importance of space situational awareness, Japan’s “quasi-zenith” satellite system with US satellite positioning system to achieve docking, the US and Japan will strengthen ocean surveillance satellite, by sharing global marine intelligence, to ensure maritime security channel. Russia already has “reconnaissance, attack, defense” against the ability of spatial information integration, particularly in the fight against satellite communications, missile and space defense confrontation, GPS confrontation, antagonism and kinetic energy anti-satellite laser, etc., with strong technical reserves. Indian space reconnaissance and surveillance satellite system has taken shape, the satellite communication network has covered South Asia and the surrounding area, it has achieved near-real-time satellite communication between the services.

Spatial information warfare against the construction and development should focus grasp

Do a good job preparing military struggle, we must make efforts to grasp the initiative in the military struggle space and cyberspace, problem-oriented and adhere to asymmetric development, according to the lean, joint, multi-energy, high efficiency requirements, to ensure the good spatial information focus of fighting against the construction.

Set the right strategic direction. On the basis of the importance of space supremacy, attaches great importance to the construction and development of spatial information against the problem, deal with spatial information science strength confrontational relationship with other strategic force for development, to ensure priority development of spatial information countervailing force. Implement the military strategy for the new period, co-ordination within and outside Xinjiang Xinjiang, preparing for war with the stop, deter and combat, constantly important areas and key links to achieve new breakthroughs; spatial information against the building into the overall layout of the army information construction, improve space iNFORMATION wARFARE development strategy planning; constantly improve the system of operational doctrines, promote space information against the construction work and orderly conduct.

Adhere to military and civilian integration. Strengthening military and civilian integration concept, the basic role of market in resource allocation, according to civil-military integration path of development, through laws, and rich integration of forms and expand the scope of integration, improve the level of integration in the scientific research and technology, weaponry, personnel training, etc. aspects, all-round, multi-domain integration, spatial information against the construction of rich resources and development potential. Pay attention to the military think tank function, strengthen the theoretical study of spatial information confrontation and practical issues, exploration of space information confrontation theoretical system, a clear focus on the construction, development of specific plans, enrich and develop operational guidance to ensure that the substantive work forward.

Construction expertise system. According to aim at the forefront, major breakthroughs require leapfrog development, accelerate the building space information confrontation power system, the formation of spatial information ability to fight as soon as possible. Spatial information effectively combat weaponry put strategic position, pay attention to the fight against cross-border joint information space forces the leading role of the traditional power and strength and spatial information of conventional power, to achieve full-dimensional spatial information to flow freely. Actively promote the use of force against spatial information, spatial information to support real-time navigation information reconnaissance operations exercises, testing and training, the formation of combat capability as soon as possible.

Focus on technological innovation. Strengthen technology research efforts, emphasis on spatial information against key technological innovation, stepping up confrontation frontier exploration of space information technology, focusing on the development of advanced satellite communications confrontation, confrontation reconnaissance and surveillance, target feature recognition, information processing technology, and make breakthroughs can promote space information confrontation key technology and equipment updates; attention, independent research and development may change combat style, disruptive technology group rules of engagement, to prevent enemies of my technical strategy formulation sudden, efforts to form the enemy I have, I have no enemy some non symmetrical technological superiority.

Original Mandarin Chinese:

把空間信息對抗武器裝備切實擺上戰略位置,注重發揮空間信息對抗力量對傳統力量的帶動作用和空間信息力量與傳統力量的跨域聯合,實現信息在全維空間自由流動。

萬物互聯的時代,我們必須重新思考,當前和未來軍事鬥爭的前沿在哪?我們所說的信息化局部戰爭的局部在哪?信息化戰爭制權的戰略制高點在哪?
萬物互聯的時代,制信息權成為奪取戰場綜合製權的核心,“無網不戰”“無天不勝”成為戰爭制勝的鐵律,制空間信息權成為維護國家主權、安全和發展利益的戰略制高點。戰場延伸到哪裡,哪裡就會展開主動權的爭奪。世界主要國家高度重視和應對來自外層空間的威脅與挑戰,圍繞太空發展權、主導權和控制權,展開了激烈角逐。
空間信息對抗成為戰略威懾制衡的新質手段
空間信息對抗作戰能打敵所怕、攻敵要害,是戰略威懾制衡的新質手段。一方面,具備強大的空間信息攻擊能力,就可有效遏制太空霸權、捍衛空間主權,提昇在國際舞台的話語權和主動權;另一方面,擁有足夠的空間信息防禦能力,就可威懾和遏制對手輕啟戰爭按鈕,有效抵禦外層空間的威脅和破壞,防止失去對太空的控制權。
美將“空間對抗行動”視為與“全球打擊”和“核打擊”並重的戰略威懾能力,2001年以來先後進行7次“施里弗”太空作戰計算機模擬演習;大力研製、試驗和部署空間信息作戰武器,發射全球首架可重複使用的能夠偵察、控制、捕獲、摧毀他國航天器的“軌道試驗飛行器”X-37B空天戰機,計劃2025年在外層空間部署太空戰鬥機部隊;“全球公域介入與機動聯合”概念宣稱要通過非動能措施迅速弱化敵太空設施能力,破壞其反太空能力中的關鍵要素。俄羅斯制定“太空軍事復興計劃”,總統普京已重啟“樹冠”反衛星項目,重點發展反衛武器,把“戰略性空天戰役”作為空天作戰的基本樣式,去年發射的3顆衛星和航天器被美視為“航天殺手”,並準備在2016年前後建成現代太空作戰系統。日本新《宇宙基本計劃》明確指出要“積極進入太空領域”,獲得“現代化的安全保障”,擴充和強化用於監視海上船舶和地面設施的偵察衛星的功能,試圖通過構建一個集測位、通信和情報蒐集等多功能於一體的新衛星系統,實現自衛隊力量運用範圍的陸、海、空、天全方位跨越。
空間信息對抗成為軍事能力建設重點領域
從世界軍事發展看,制空間信息權統攬其他制權,奪取制空間信息權行動是爭奪戰爭主導權的主體行動。從局部戰爭實踐看,沒有製空間信息權,空軍難以空戰,海軍難以海戰,擁有再好的其他武器裝備也可能被動挨打。空間信息對抗為多維空間作戰行動提供重要支撐,是作戰體系的“新質”,是作戰能力生成的倍增器,必將是軍事能力建設的重點領域。從爭奪制天權的手段看,空間信息對抗可控性強、靈活性好,運用門檻低、作用範圍廣、附帶損傷小、效費比高,應是當前和今後一個時期制天權能力建設發展的重點領域。
目前,美積極推進亞太“再平衡”戰略,竭力發展空間信息對抗能力,不僅大力發展電子乾擾軟殺傷和隱性硬毀傷等空間信息對抗手段,積極發展自主逼近、交會對接等天基對抗核心技術,還重點研製衛星通信電子乾擾、近實時探測、干擾信號特徵識別、干擾源定位技術,努力發展各種天基反衛星武器,且已開始部署自動攻擊、識別系統。 2012年11月14日美國和澳大利亞聯合宣布,美軍將在澳大利亞安置功能強大的空軍C波段雷達和太空望遠鏡,並明確表示這是美國將戰略轉向亞洲的一部分。這一前沿部署將使美每天能夠更好地跟踪確認多達200個亞太上空航天器及其軌道和潛在的異常現象。據美國媒體披露,美國空軍與洛克希德馬丁公司在今年2月啟動了未來“太空籬笆”新型雷達系統的建設工作,這也標誌著美國開始啟動了S波段地基雷達系統,該雷達系統將取代美國20世紀60年代研發的太空監視系統。俄羅斯《軍工新聞網》5月18日報導,美國空軍部長詹姆斯宣稱,美空軍已要求50億美元的預算以建立一個防禦系統,為可能發生的太空軍事衝突做準備。日本成立宇宙開發戰略總部和太空監測部隊,並提出今後10年將發射45顆衛星的宏偉目標,在積極發展第二代IGS偵察衛星系統的同時,正在謀求與東盟國家合作,構建一個以日本為中心、由68顆衛星組成的地球觀測衛星網絡,企圖從他國獲得情報並與美國共享的同時,加強對日本周邊海上要道、釣魚島及其附近海域的海洋監視能力。據日本共同社報導,新版《美日防衛合作指針》強調太空態勢感知的重要性,日本“準天頂”衛星系統與美國衛星定位系統將實現對接,美日將利用衛星加強海洋監視,通過共享全球海洋情報,確保海上通道安全等。俄已具備“偵、攻、防”一體的空間信息對抗能力,特別是在衛星通信對抗、導彈和空間防禦對抗、GPS對抗、激光對抗和動能反衛等方面,擁有雄厚的技術儲備。印度空間偵察監視衛星系統已初具規模,衛星通信網已覆蓋南亞及周邊地區,各軍種之間已實現近實時衛星通信。
空間信息對抗作戰建設發展應把握的著力點
抓好軍事鬥爭準備,必須努力掌握太空和網絡空間軍事鬥爭主動權,堅持問題導向和非對稱發展,按照精幹、聯合、多能、高效的要求,切實把好空間信息對抗作戰建設的著力點。
確立正確戰略指導。在重視制天權的基礎上,高度重視空間信息對抗建設發展問題,科學處理空間信息對抗力量與其他戰略力量發展的關係,保證優先重點發展空間信息對抗力量。貫​​徹新時期軍事戰略方針,統籌疆內與疆外、備戰與止戰、威懾與實戰,不斷實現重要領域和關鍵環節的新突破;把空間信息對抗建設納入軍隊信息化建設總體佈局,搞好空間信息對抗發展戰略籌劃;不斷完善作戰條令體系,促進空間信​​息對抗各項建設和工作有序開展。
堅持軍民融合發展。強化軍民融合發展觀念,發揮市場在資源配置中的基礎性作用,按照軍民融合式發展路子,通過法規建設,豐富融合形式、拓寬融合範圍、提高融合層次,在科研技術、武器裝備、人才培養等方面,進行全方位、多領域融合,為空間信息對抗建設提供豐富資源和發展後勁。注重發揮軍地智庫功能,加強空間信息對抗的理論和實踐問題研究,探索空間信息對抗理論體系,明確建設重點、制定具體計劃,豐富和發展行動指導,確保各項工作實質性推進。
構建專業力量體系。按照瞄準前沿、重點突破、跨越式發展的要求,加速構建空間信息對抗力量體系,盡快形成空間信息對抗能力。把空間信息對抗武器裝備切實擺上戰略位置,注重發揮空間信息對抗力量對傳統力量的帶動作用和空間信息力量與傳統力量的跨域聯合,實現信息在全維空間自由流動。積極推進空間信息對抗力量運用,進行空間信息偵察實時支援引導信息作戰行動的演習、試驗和訓練,盡快形成體係作戰能力。
關注技術創新。加強技術攻關力度,重視空間信息對抗關鍵技術創新,加緊探索空間信息對抗前沿技術,注重發展先進的衛星通信對抗、偵察和監視對抗、目標特徵識別、信息處理等技術,著力突破能夠推動空間信息對抗裝備更新的關鍵技術;高度關注、自主研發可能改變作戰樣式、作戰規則的顛覆性技術群,防止強敵對我形成技術上的戰略突然性,努力形成敵有我有、敵無我有的非對稱技術優勢。

China’s Future Wars: Seize Control of Information with Big Data // 中國未來戰爭:用大數據奪取制信息權

中國未來戰爭:用大數據奪取制信息權

Source: 《中国科学报

Information warfare is the flow of information to fight the war. From the conversion of the entire information flow point of view, who controls the most real flow of information, whoever controls the initiative in the war. Seize control of information has become the air superiority prerequisites command of the sea, it is the decisive factor in the future outcome of a war.

■ reporter Hu Min Qi

With the continuous development of information technology, human society has entered a letter of “big data era.” Every day, in every corner of the world sensors, mobile devices, social networks and online trading platform to generate hundreds of gigabytes of data.Obama administration even large data called a “future of the new oil,” Who will come to control the flow of data will dominate the future of the world. As we all know, in the military field has been mankind’s most advanced technology laboratory, big data will no doubt shape the future of the war brought a huge change.

Big Data “big” Where

US Global Institutes define big data as: a large scale in the acquisition, storage, management, analysis far beyond the capabilities of traditional database software tool data set (datasets).

Chinese Academy of Sciences researcher Wang Weiping told the computer “China Science News” reporter, big data, “big”, of course, first of all refers to the unprecedentedly large volume of data, far beyond the traditional level of computer processing data volume.

With the current popularity of high-speed computer network technology and the rapid development of the Internet, the information data by TB (1TB = 1024GB) level was raised to PB (1PB = 1024TB), EB (1EB = 1024PB), ZB (1ZB = 1024EB) level , and is still explosive growth. It is reported that, in 2010, officially entered the global era ZB 2012 global data reaches 5.2ZB, 2020, the world will have a total amount of data 35ZB. There is a vivid metaphor can help people understand the scale of the data. If 35ZB to burn all the data capacity of a 9GB disc superimposed height will reach 2.33 million km, equivalent to three round-trip between the Earth and the Moon.

Secondly, Wang Weiping said, “big” is also reflected in the type of data processing diversification, far beyond the traditional format and data analysis tools can handle.

Most of the conventional two-dimensional data structure presentation, but with the Internet, the rapid development of multimedia technology and the popularity of video, audio, images, e-mail, HTML, RFID, GPS and sensors to generate unstructured data, every year 60 % growth rate. We expected to account for over 80% of the amount of data in unstructured data.

In addition, he believes that big data also requires real-time data processing. Big data stream is often a high-speed real-time data streams, and often require rapid, continuous real-time processing, to seize the important events that occurred in the first time.

If you look from the military field, command and control systems, space-based support systems, information processing systems, various reconnaissance, surveillance, increasing the amount of information detection system, big data management in the command structure of the complex and also more important than ever . How massive battlefield data storage and in-depth analysis, how to determine the authenticity of the data, the reliability of data sources to ensure the security of data transmission is a key issue facing the warring parties.

Information warfare against large data requirements

Military theorists generally believe that, as early as the 90s of last century, the information war began to rise. It is a weapon of war by the use of information technology affect adversary information and information systems, to protect one’s own information and information systems, to obtain information superiority battlefield combat style. It is essentially by means of information operations, “information flow” control “energy flow” and “material flow”, depriving the enemy of information superiority, information superiority to maintain one’s own, thus seize control of information battlefield.

Military commentator 宋忠平 to “China Science News” reporter explained, the traditional network of information warfare include battle, conventional combat interference and anti-interference system under criminal investigation as well as detection and anti-detection and other content. “Information warfare is the flow of information to fight the war from the point of view convert the entire flow of information, who controls the most real flow of information, whoever controls the initiative in the war.” 宋忠平 he said, “to seize control of information air superiority has become a prerequisite for command of the sea, it is the decisive factor in the future outcome of a war. ”

But he also said that traditional information warfare in dealing with information and data encountered various challenges. The first is the limited traditional information channels, you can not get a lot of information. At the same time, not only a substantial increase in the amount of data, including various types of data in the form of situational awareness data, images, video intelligence, relying on existing information technology, can not be effectively analyze and process the data.

According to reports, the day of the outbreak of the war in Iraq, the US military forward command post in Qatar and Kuwait because the security agencies can not handle large amounts of data have to turn off the device, resulting in correspondence with some assault command post direction almost interrupted.

In addition, Song Zhongping pointed out, data sharing capabilities of traditional information system is relatively weak. “War is the traditional way of fighting off state, superior to subordinate assignments and perform offline, last victories to report a higher level. And only control one army general command of a division, because they tend to be as an independent combat units, which also led to the relevant departments are often their own business, the impact of coordinated operations efficiency. ”

In this context, information war on large data transfer, storage, analysis yielded specific requirements.

The first is the real-time requirements of data processing. Information warfare ultimately generated vast amounts of data collection and processing center to the command center at all levels, the steady stream of gathering data from a variety of sensors, intelligence agencies and the information transmitted to the center together, these data to be processed in real time. Song Zhongping believe that all the information even if it is a battlefield soldier needs to spread information command and control center through the large data to understand the situation frontline, under special circumstances even for a soldier’s equipment orders. Because he may be at the most favorable terrain, you can get maximum advantage.

Followed by data fusion. Song Zhongping proposed by datalink even pull a short road that used to take four to five orders of management skills, the future may only need to complete the three-level management, so as to contribute to the integration of operations, rather than individual branches of the military to fight alone anywhere, anytime to adjust operational command.

Moreover, in his view, the era of big data, in particular to increase the difficulty of defense information, for higher data security requirements. In general, the information war against information security requirements for data transmission is mainly reflected in addressing anti-eavesdropping, jamming and prevent the problem of false information to deceive. I am afraid the future needs a new defense mechanisms to ensure information security.

Thus, in the information war era of big data, the system of military confrontation countries will rely on a variety of military information systems, software and data to a greater extent, at the right time, the right place for the right decisions, directing control and provide the correct information. Leaving the information provided to achieve a reasonable distribution of fast, it is to have the data and unified management, so that the most immediate battlefield information to the department most urgently needed. With the increasing amount of data the battlefield, and efficient mass data storage and analysis, identify the enemy situation changes from the data, the most reasonable prediction of operational programs to better serve the massive data information war military service is a large data processing aims.

Military data mining challenge

However, Wang Weiping noted that a major challenge facing the era of big data is the low value of the density of information. Whether or intelligent systems analysts need to “needle in a haystack” to find useful information from massive data. “It also fully reflects the importance of data mining.” He stressed.

Data mining is a use in massive data analysis tools discovery process between model and data relationships that can help decision-makers to find a correlation between potential data, by discovering the hidden, overlooked factors, it is possible in data storage and management process, dig out important intelligence information, as a basis for decision-making and action.

According 宋忠平 revealed before the “September 11” incident, intelligence officers are judged to master a lot of data, but it ignores the valuable information.

Thus, after the “September 11” incident, the US Defense Advanced research projects in the following year’s annual technology conference, explains how to use the data in a unified and integrated database mining techniques.

The so-called new data sources is the “transaction space.” If the terrorists to plan and execute a terrorist activity, they will certainly leave some kind of “data footprint” in the information space. That is, they need to “deal.” Data records of such transactions, which can be communications, finance, education, health care, can also travel, transportation, immigration, housing and so on all other data records. It is the application data in the United States “transaction” space mining technology to detect and track terrorists.

It is understood that, in 2002, the big drug lords in Afghanistan preparing to provide funding for al-Qaeda and other terrorists, US military intelligence analysts is through data mining, data funds operational plan with the Al-Qaida Curry Curry’s case data in real time, independent association to guide the US military before the enemy further action.

So, how to enhance the ability of data mining technically. Wang Weiping told the “China Science News” reporter, at the entrance of the control of data quality is critical. That is, the data preparation is an important prerequisite for data mining, because it directly affects the accuracy and efficiency of data mining. “If all the data of varying quality into the channel, it is difficult and then the quality is not high, data processing, they will cause serious interference of useful information.”

In short, the data preparation phase, the need for data cleansing, and secondly, the need to analyze the selected data, reduction processing range. In data preprocessing stage, including the elimination of duplicate data, remove noise, missing data processing, data type conversion, etc. The purpose is to process the data into a form suitable for data mining, and on the basis of data selected on mining data for further reduction to reduce processing time and memory resources, making mining more efficient.

Future wars will change shape

The Obama administration on March 29, 2012 issued a “big data research and development initiatives” (Big Data Research and DevelopmentInitiative), will enhance the development of big data for national policy. The US Big Data project is an important part of the US national projects. It is understood that the United States Department of Defense and the Defense Advanced Research Projects Agency under the existing big data projects a total of 10, wherein the data to decision-making, internal network threats, video search and analysis, X- and other project data are representative.

The most important data to decision-making projects, mainly refers to a variety of new ways to take advantage of huge amounts of data, integrate perception, cognition and decision support systems to create a truly autonomous system, making it possible to customize the motorized operation and decision-making ; video search and analysis; network project aimed at internal threats through the use of new cyber threats judgment technology to improve the accuracy of Discovery network spying activities, frequency and speed, so early exposure and prevent sabotage opponents, and enhance network security level of one’s own Once the project is successful, analysts massive video library will be able to quickly and accurately retrieve specific video content, thereby enabling fully, efficiently mine the useful information hidden in the image; X- data project mainly through the development of large capacity scalable data analysis algorithms needed to handle distributed data repository irregular data. Through the development of efficient human-computer interaction devices and visual user interface technology, in order to better diversify tasks, perform operations more quickly.

With the implementation and realization of large data projects, future wars revolutionary change may occur.

Song Zhongping considered one of the most important large-value data is predicted that the data algorithm is applied to a mass of data to predict the likelihood happening up, therefore, the ability to command and decision-making future war can produce a great leap forward.

He told the “China Science News” reporters, for example, as early as in the first Gulf War, the US military before the war with improved civil war games, war process, outcomes and casualties were deduction, the deduction results and the actual results of the war are basically the same. And before the war in Iraq, the US military use of computer systems wargame exercises, deduction “against Iraq” war plan. Then the reality of the invasion of Iraq and the US military victory actions, and also the results of war games are almost exactly the same. At this point, combat simulations have changed from manual mode to computer mode.

“Relying on big data and cloud computing platform, pre-war simulation deduction, from the use of weapons, to play war command means, it can be clearly revealed, as a basis for decision-making during the war.” 宋忠平 said, “Once operational plan has question, can adjust to ensure a minimum combat casualties and win. ”

Secondly, the integration of data is expected to break the barriers between the military services. Big Data can solve troops across military services, cross-sectoral coordination problems, truly integrated operations.

In addition, Song Zhongping believe big data can change the future form of war. In particular, the pursuit of large US data have supported autonomy unmanned combat platform.For example, currently the world’s most advanced unmanned reconnaissance aircraft, “Global Hawk”, to continuously monitor the moving target, to accurately identify the various types of aircraft ground, missiles, and vehicles, and even can clearly distinguish gear car tires. Song Zhongping pointed out that UAVs the ability to do real-time image transmission is critical. Currently, the US is using a new generation of very high frequency communications satellite as a support big data platform.

Future, UAVs could even get rid of human control to achieve full autonomy of action. US unmanned experimental aircraft X-47B is the representative of that already in the case of fully human intervention, automatically take off and land on aircraft carriers and perform combat missions.

“Global Hawk” unmanned aerial vehicles

Further reading  From Data to Decisions

Speed ​​of information processing information systems, target acquisition time situation, the decision cycle and fast response time determines the success of military operations. In the background of big data, speed up the transfer of battlefield information, shortening “from sensor to shooter” cycle, and “discovery that is destroyed,” the operational objectives, the most important issue information system must address. Therefore, the “Data to Decisions project” has become a big data project in the US the most critical one.Currently, the US Army has increased its massive information fusion capability, combat is building intelligent decision support system has made some achievements.

US Army Distributed Common Ground System

The end of 2012, the US Army has begun to deploy combat-proven through intelligence systems in the world. December 14, “the Army Distributed Common Ground System” (D6A) approved the Defense Acquisition Executive Committee (DAE) is responsible for implementation by.

Previously, D6A just as a quick reaction capability, successfully used in Iraq and Afghanistan. Currently D6A been approved for all Army troops, and has been deployed to all brigade-level units. “Rapid reaction capability” refers to a rapid deployment to meet the most immediate and most urgent needs of the system, such as combat environment, but it does not get the approval of the full deployment.

D6A task for the entire federal army and its intelligence agencies and between the Allies, processing, development and dissemination of information, instead of nine different types of legacy systems, an important part of the Army’s modernization program. D6A can help users to share applications, text files, graphics, photographs, maps, etc. Compared with the old system, D6A in 2012 and 2017 savings of $ 300 million. In the whole life cycle (2012 – 2034), D6A savings of approximately $ 1.2 billion.

“Titan” certification Tactical Network Information Technology

“Titan” certification Tactical Network Information Technology (Tactical Information Technology for Assured Networks, TITAN) functions similar to Web search engine application software, commanders for tactical operations center to monitor the received instruction information and publish updated. “Titan” to filter information according to specific mission requirements, clearing commander computer screen (desktop), providing topographic maps, pictures, and text links concise instruction template to form a common operational picture. “Titan” also provides a command post of the future (CPOF) and Force XXI Battle Command Brigade and Below / Blue Force Tracking Support (FBCB2-BFT) systems can be integrated with data from other critical areas.

Intelligent network control software mobile command center

Intelligent network control software mobile command center (Command and Control Mobile Intelligent Net-Centric Software) is a handheld mission command systems, can receive and publish one’s own and enemy forces location information, integrated from the tactical unattended ground sensors various types of sensors and radar detection system information to the enemy in order to achieve progress in real-time monitoring and protection of the weak areas.

Combatants companion artificial intelligence software

Warfighter partner (Warfighter Associate) artificial intelligence software that can automatically search for information about the dialogue between the various types of sensitive target text chat tool to detect soldiers advance will be reported to the command post of the future common operational picture, for example, when a troop of soldiers found minefields, usually manually enter the relevant information on the various information systems, the software can automatically extract the grid coordinates minefields will automatically enter the next command post system, 15 to 20 minutes in advance, in the common operating picture generate relevant information, otherwise the message will be delayed or submerged. Driving artificial intelligence technology, operational and tactical knowledge database theory, the “combatants partner” to complete the cleanup command post next screen, highlight important information, provide warnings and recommendations, and other auxiliary functions users perform the correct decision and action programs.

Original mandarin Chinese:

中國未來戰爭:用大數據奪取制信息權

信息戰打的就是信息流的戰爭。從整個信息流的轉換來看,誰控制了最真實的信息流,誰就控制了這場戰爭的主導權。奪取制信息權已經成為奪取制空權、制海權的先決條件,是未來戰爭勝敗的決定性因素。

■本報記者 胡珉琦

隨著信息化不斷發展,人類社會已經進入了一個不折不扣的“大數據時代”。每天,遍布世界各個角落的傳感器、移動設備、社交網絡和在線交易平台生成上百萬兆字節的數據。美國奧巴馬政府甚至將大數據稱為“未來的新石油”,誰掌控了數據流誰就將主宰未來世界。眾所周知,軍事領域一直都是人類最先進科技的實驗室,大數據無疑將給未來戰爭形態帶來巨大的改變。

大數據“大”在哪兒

麥肯錫全球研究所對大數據的定義是:一種規模大到在獲取、存儲、管理、分析方面大大超出了傳統數據庫軟件工具能力範圍的數據集合(datasets)。

中科院計算機所研究員王偉平告訴《中國科學報》記者,大數據的“大”,理所當然,首先指的是數據體量空前巨大,遠遠超出傳統計算機處理數據量的級別。

當前伴隨著計算機網絡技術的迅速發展和互聯網的高速普及,信息數據量已由TB(1TB=1024GB)級升至PB(1PB=1024TB)、EB(1EB=1024PB)、ZB(1ZB=1024EB)級,並仍在呈爆炸式地增長。據悉,全球在2010 年正式進入ZB 時代,2012 年全球數據量達到5.2ZB,預計到2020年,全球將總共擁有35ZB 的數據量。有一個形象的比喻可以幫助人們理解這些數據的規模。如果把35ZB 的數據全部刻錄到容量為9GB 的光盤上,其疊加的高度將達到233 萬公里,相當於在地球與月球之間往返三次。

其次,王偉平表示,“大”也體現在處理的數據類型多樣化,遠遠超出傳統數據格式和分析工具能處理的範疇。

以往數據大都以二維結構呈現,但隨著互聯網、多媒體等技術的快速發展和普及,視頻、音頻、圖片、郵件、HTML、RFID、GPS 和傳感器等產生的非結構化數據,每年都以60 %的速度增長。預計,非結構化數據將佔數據總量的80%以上。

此外,他認為大數據還要求數據處理的實時性。大數據的數據流往往為高速實時數據流,而且往往需要快速、持續的實時處理,能在第一時間抓住重要事件發生的信息。

如果從軍事領域看,指揮控制系統、天基支持系統、信息處理系統,各種偵察、監視、探測系統的信息量越來越大,大數據在指揮機構中的管理也變得空前重要和復雜。如何對海量戰場數據進行存儲與深度分析,如何判別數據的真實性,數據來源的可靠性,確保數據傳輸的安全性,是未來戰爭雙方面臨的問題。

信息化戰爭對大數據的要求

軍事理論界普遍認為,早在上個世紀​​90年代,信息化戰爭開始崛起。它是一種通過使用信息化戰爭武器影響敵方信息與信息系統,保護己方信息與信息系統,從而取得戰場信息優勢的作戰樣式。它本質上是通過信息作戰手段,以“信息流”控制“能量流”和“物質流”,剝奪敵方的信息優勢、保持己方的信息優勢,從而奪取戰場製信息權。

軍事評論員宋忠平向《中國科學報》記者解釋,傳統的信息戰包括了網絡攻防戰,常規作戰中的干擾與反干擾,還有刑偵系統下的偵測與反偵測等內容。 “信息戰打的就是信息流的戰爭。從整個信息流的轉換來看,誰控制了最真實的信息流,誰就控制了這場戰爭的主導權。”宋忠平說,“奪取制信息權已經成為奪取制空權、制海權的先決條件,是未來戰爭勝敗的決定性因素。”

但他也表示,傳統信息戰在處理信息以及數據方面遭遇到了各種挑戰。首先是傳統信息通道有限,無法一次獲取大量信息。同時,不僅僅是數據量大幅增加,數據形式包括了戰場感知數據、影像、視頻情報等各種類型,僅僅依靠現有信息技術,不能及時高效地分析和處理這些數據。

據報導,伊拉克戰爭爆發當日,美軍駐卡塔爾和科威特前進指揮所由於無法處理保障機構提供的海量數據,不得不關閉設備,從而造成指揮所與部分突擊方向的通信聯繫幾乎中斷。

此外,宋忠平指出,傳統信息系統的數據分享能力比較弱。 “傳統戰爭是一種離線狀態下的作戰方式,上級給下級分配任務,並在離線狀態下執行,最後向上級匯報一個戰果。而且命令一般只能管一個軍一個師,因為他們往往是作為一個獨立的作戰單位。這也導致了相關部門往往各自為營,影響協同作戰的效率。”

在這樣的背景下,信息化戰爭對大數據傳輸、存儲、分析產生了特殊的要求。

首先是數據處理的實時性要求。信息化戰爭中產生的海量數據最終要匯集到各級指揮中心和處理中心,這些數據源源不斷地從各種傳感器、情報機構以及信息中心傳輸匯聚到一起,要對這些數據進行實時處理。宋忠平認為,戰場所有信息哪怕是一個單兵的信息都需要通過大數據傳到指揮控制中心,以了解前線情況,特殊狀況下甚至可以對某個單兵的裝備下達命令。因為,他可能正處在最有利的地形,可以獲取最大的優勢。

其次是數據融合。宋忠平提出,通過使數據鏈的連路拉短,以前需要四至五級的管理才能下達命令,未來可能只需要三級管理完成,這樣才能有助於一體化作戰,而不是各個軍兵種單獨作戰,隨時隨地調整作戰指揮。

此外,在他看來,大數據時代,信息防禦難度尤其加大,對於數據安全要求更高。一般而言,信息化戰爭對數據傳輸的信息安全要求主要體現在解決防竊聽、抗干擾和防止虛假信息欺騙的問題上。未來恐怕需要一套新的防禦機制,以確保信息安全。

由此可見,在大數據時代的信息化戰爭中,各國軍事體系的對抗將在更大程度上依靠各種軍事信息系統、軟件和數據,在正確的時間、正確的地點為正確的決策、指揮和控制提供正確的信息。而使信息實現快速合理分發的前提,是要有對數據的統一調度和管理,讓最即時的戰場信息傳遞到最迫切需要的部門。隨著戰場數據量的增大,高效存儲與分析海量數據,從數據中發掘敵我態勢的變化,預測出最合理的作戰方案,使海量數據更好地為信息化戰爭服務是軍事大數據處理的目標。

軍事數據挖掘面臨挑戰

不過,王偉平指出,大數據時代面臨的一大挑戰是信息的價值密度低。無論是分析人員還是智能係統都需要“大海撈針”,從海量數據中找到有用信息。 “這也充分體現了數據挖掘的重要性。”他強調。

數據挖掘是一個在海量數據中利用各種分析工具發現模型與數據間關係的過程,它可以幫助決策者尋找數據間潛在的某種關聯,通過發現被隱藏的、被忽略的因素,就能夠在數據存儲和管理過程中,挖掘出重要的情報信息,作為決策和行動的依據。

據宋忠平透露,在“9·11”事件發生前,情報研判人員是掌握了大量數據的,但卻忽視了其中有價值的情報。

因此,在“9·11”事件之後,美國國防部高級項目研究在次年的技術年會上,闡述瞭如何在統一集成的數據庫中應用數據挖掘技術。

所謂新的數據資源就是“交易空間”。如果恐怖分子要計劃、執行一次恐怖活動,他們必定會在信息空間留下某種“數據腳印”。也就是說,他們需要“交易”。這種交易的數據記錄,可以是通訊、財務、教育、醫療,也可以是旅行、交通、出入境、房屋等等其他一切數據記錄。美國正是在“交易”空間中應用數據挖掘技術,從而發現和追踪恐怖分子的。

據了解,2002年,阿富汗境內的大毒梟準備為基地組織等恐怖分子提供資金時,美軍的情報分析人員正是通過數據挖掘,把作戰方案庫裡的數據與有關基地組織情況庫裡的資金數據進行實時、自主關聯,從而指導美軍先敵一步採取行動。

那麼,如何從技術上提升數據挖掘的能力。王偉平告訴《中國科學報》記者,在入口處對數據質量進行把控是非常關鍵的。也就是說,數據準備是數據挖掘的重要前提,因為它直接影響到數據挖掘的效率和精準度。 “如果質量參差不齊的數據統統進入通道,便很難再對質量不高的數據進行處理,他們將對有用信息造成嚴重的干擾。”

簡言之,在數據準備階段,需要對數據進行清洗,其次,選出需要分析的數據,縮小處理範圍。而在數據預處理階段,包括了消除重複數據、消除噪聲、遺漏數據處理、數據類型轉換等,目的是把數據處理成適合於數據挖掘的形式,並在數據選擇的基礎上對挖掘數據作進一步的約簡減少內存資源和處理時間,使挖掘更有效。

未來戰爭形態將發生改變

奧巴馬政府於2012年3月29日發布了《大數據研發倡議》(Big Data Research and DevelopmentInitiative),將大數據研發提升為國家政策。而美軍大數據項目正是美國國家項目的重要組成部分。據了解,美國國防部及其下屬國防高級研究計劃局現有的大數據項目共有10個,其中,數據到決策、網絡內部威脅、影像檢索與分析、X-數據項目等是具有代表性的。

最重要的數據到決策項目,主要指的是通過各種新途徑充分利用海量數據,整合感知、認知和決策保障系統,以創造一種真正自主的系統,使之可以自主機動作業並作出決策;網絡內部威脅項目目的是通過採用新式網絡威脅判斷技術,提高探知網絡刺探活動的精度、頻度和速度,從而及早暴露和防範對手的破壞活動,並提升己方的網絡安全水平;影像檢索與分析項目一旦取得成功,分析人員將能從海量視頻庫中快速、精確地檢索特定的視頻內容,由此便能充分、高效地挖掘影像中隱藏的有用信息; X-數據項目主要是通過開發大容量數據分析所需的可擴展算法, 以便處理分佈式數據存儲庫中的不規則數據。通過開發高效的人機互動設備和可視用戶界面技術,以便在多樣化任務中更好、更快地執行操作。

有了大數據項目的實施和實現,未來戰爭可能發生革命性的變化。

宋忠平認為,大數據最重要的價值之一是預測,把數據算法運用到海量的數據上來預測事情發生的可能性,因此,未來戰爭的指揮決策能力可以產生很大的飛躍。

他向《中國科學報》記者舉例,早在第一次海灣戰爭中,美軍戰前利用改進的民間兵棋,對戰爭進程、結果及傷亡人數進行了推演,推演結果與戰爭的實際結果基本一致。而在伊拉克戰爭前,美軍利用計算機兵棋系統進行演習,推演“打擊伊拉克”作戰預案。隨後美軍現實中進攻伊拉克並取得勝利的行動,也和兵棋推演的結果幾乎完全一致。至此,作戰模擬已經從人工模式轉變為計算機模式。

“依託大數據和雲計算平台,戰前的模擬推演,從武器使用、戰爭打法到指揮手段,都可以清晰地顯現,作為戰時決策的依據。”宋忠平說,“一旦發現作戰計劃有問題,可以及時調整,以確保實戰傷亡最小並取得勝利。”

其次,數據的融合有望打破軍種之間的壁壘。大數據可以解決軍隊跨軍種、跨部門協作的問題,真正實現一體化作戰。

除此之外,宋忠平認為,大數據可以改變未來的戰爭形態。美軍尤其追求大數據支撐的擁有自主能力的無人作戰平台。例如,目前全世界最先進的無人偵查機“全球鷹”,能連續監視運動目標,準確識別地面的各種飛機、導彈和車輛的類型,甚至能清晰分辨出汽車輪胎的齒輪。宋忠平指出,無人機能否做到實時地對圖像進行傳輸非常關鍵。目前,美國正使用新一代極高頻的通訊衛星作為大數據平台的支撐。

未來,無人機甚至有可能擺脫人的控制實現完全的自主行動。美軍試驗型無人戰鬥機X-47B就是這一代表,它已經可以在完全無人干預的情況下,自動在航母上完成起降並執行作戰任務。

“全球鷹”無人機

 

延伸閱讀

從數據到決策

信息系統的信息處理速度、目標態勢獲取時間、決策週期以及快速響應時間決定著軍事行動的成敗。在大數據背景下,加快戰場信息流轉,縮短“從傳感器到射手”的周期,實現“發現即摧毀”的作戰目標,成為信息系統建設必須解決的首要問題。因此,“數據到決策項目”成為了美軍大數據項目中最為關鍵的一個。目前,美陸軍已經提高了對海量信息的融合處理能力,正在建設的智能化作戰決策支持系統也取得了一些成果。

美陸軍分佈式通用地面系統

2012年底,美國陸軍開始在全球全面部署經過作戰驗證的情報系統。 12月14日,“陸軍分佈式通用地面系統”(D6A)獲得批准,並由國防採辦執行委員會(DAE)負責實施。

此前,D6A只是作為一種快速反應能力,成功用於伊拉克和阿富汗。目前D6A已獲批用於陸軍所有部隊,並已部署到所有旅級單位。 “快速反應能力”是指一種可以快速部署,以滿足最直接、最迫切需要的系統,比如作戰環境,但它不一定獲得了全面部署的批准。

D6A用於整個陸軍以及它與聯邦情報機構和盟軍之間的任務、處理、開發和傳播情報,取代了9種不同類型的舊系統,成為陸軍現代化計劃的重要組成部分。 D6A可以幫助用戶共享應用程序、文本文件、圖表、照片、地圖等等。與舊系統相比,D6A在2012~2017年可節約3億美元。而在整個壽命週期中(2012~2034年),D6A可節約大約12億美元。

“泰坦”認證網絡戰術信息技術

“泰坦”認證網絡戰術信息技術(Tactical Information Technology for Assured Networks, TITAN)的功能類似於網絡搜索引擎應用軟件,指揮官用於在戰術作戰中心監控接收到的信息和發布更新後的指令。 “泰坦”可根據具體任務需求過濾信息,清理指揮官的計算機屏幕(桌面),提供與地形圖、圖片和文本鏈接的簡明指令模板,以形成通用作戰圖。 “泰坦”還提供了對未來指揮所(CPOF)和21世紀部隊旅及旅以下作戰指揮/藍軍跟踪(FBCB2-BFT)系統的支持,可融合來自其他領域的關鍵數據。

智能式網絡中心移動指揮控制軟件

智能式網絡中心移動指揮控制軟件(Command and Control Mobile Intelligent Net-Centric Software)是一種手持式任務指揮系統,可接收和發布己方和敵軍部隊的位置信息,綜合來自戰術無人值守地面傳感器等各類傳感器和雷達探測系統的信息,從而實現對敵軍進展的實時監控和對薄弱區域的防護。

作戰人員伴侶人工智能軟件

作戰人員伴侶(Warfighter Associate)人工智能軟件,可自動搜尋各類文本交談工具,探測士兵之間有關敏感目標的對話信息,提前將其反饋給未來指揮所的通用作戰圖,例如當某部隊的士兵發現地雷場後,通常會在各類信息系統上人工輸入相關信息,該軟件能夠自動提取地雷場的網格坐標,將其自動輸入未來指揮所繫統,提前15~20分鐘,在通用作戰圖上生成相關信息,否則該信息會延遲或被淹沒。在人工智能技術、作戰理論與戰術知識數據庫的驅動下,“作戰人員伴侶”能完成清理未來指揮所顯示屏、突出重要信息、提供警告和建議等輔助用戶決策和執行正確的行動方案的功能。

Source: 《中国科学报

China Options and the New US Network Warfare Strategy // 中国的选项和新的美国网络战战略

中国的选项和新的美国网络战战略

来源: 中国电子报

中国的选项和新的美国网络战战略

April 23, the US Department of Defense released a new web strategy to replace in 2011 issued a “cyberspace operations strategy.” The new network strategy clearly reflects the “war to end war”, “pre-emptive” thinking explicit proposal to strengthen the construction of the network deterrence, and under what circumstances you can use cyber weapons against network attacks, and lists the greatest threat to countries China, Russia, Iran, North Korea thinks it. The US strategy is bound to intensify the arms race in cyberspace, increasing the likelihood of cyber war broke out, bring more unrest to cyberspace, our response should be prepared in advance, to prepare for contingencies.

The new network strategy “new” Where?

First, a clear network deterrence as a strategic objective. Prior to this, the US has been pursuing a strategy of active defense, the Department of Defense in 2011 issued a “cyberspace operations strategy” in spite of the new network to be deployed weapons, but still mainly focus on cyber defense. The new network strategy will focus on the network as a deterrent, will build the power of the Internet to deal with cyber war as a key objective, and clearly the network architecture includes 133 troops teams. As US Secretary of Defense Carter said, the new network strategy will show the determination of the American cyber attacks to retaliate, “We need to prove to the world that we will protect themselves.”

Second, a clear expansion of the coverage of the network of national defense. The United States has multiple departments, including the Department of Defense, Department of Homeland Security and the National Security Bureau in network security, while the United States a lot of critical information infrastructure by the private sector operators, in order to protect the network security of government departments closely between public and private institutions Cooperation.Although the 2011 “cyberspace operations strategy” in the proposed public-private partnership to strengthen, also referred to strengthen cooperation between the Department of Homeland Security, but the new strategy will be directly “to protect local interests are not destructive and core network attack “the department of Defense and other written tasks, network infrastructure, private sector operators are also included in the scope of protection of the department of Defense, but also proposes strengthening cybersecurity information sharing among government departments and between public and private institutions.

The third is clearly cyber war adversary. Although the United States has been an enemy list, but its previous strategy documents are rarely directly named 2011 “cyberspace operations strategy” in only a general reference to rival cyberspace. But the new network strategy was to dedicate China, Russia, Iran and North Korea and other countries put forward, which is the number of countries in recent years has repeatedly accused. In fact, the United States has been through a variety of ways to find a reasonable excuse for network monitoring, network armaments and other acts taken against cyber attacks accusing China, Russia and other countries are most common in the United States in April 2015 the company released a FireCam accused China and Russia were two reports of cyber attacks.

What impact will the world?

First, the network will be further intensified competition in armaments. According to the United Nations Institute for Disarmament Research in 2013 statistics, there are 47 countries, announced the formation of a network warfare units, 67 countries set up a network of non-military security agencies. With further exacerbated cyberspace security threats, data still growing, new network strategy to attack the United States and deterrence as the core will further aggravate the situation. As the world network of the most powerful country, the United States continued to increase network armaments efforts, other countries will inevitably increase its own power into the network.

Second, large-scale networks will continue to increase the risk of war. In recent years, cyber conflict between nations has been emerging, but the conflict is still the main non-governmental forces, the conflict broke out between the network such as Malaysia and the Philippines, North Korea and South Korea, although part of the conflict emerge out of the shadow of national power, but there is no State publicly acknowledged. US network to the new network strategy war on its head, and set trigger conditions for cyber attacks, in the current absence of international standards related to cyberspace, cyber war risk between countries will continue to increase.

Third, the network will become the fuse of conflict in the real world war. In recent years, the United States has been trying to set a standard network warfare, from the 2011 “cyberspace operations strategy” to 2013’s “Tallinn Manual”, to the new network strategy, the United States has been as a response to the reality of armed combat cyber attacks a means. However, due to technical limitations, network attacks traced still difficult to achieve, the US government and corporate network attacks blamed the lack of direct evidence, or even need to confirm whether the other attacks by cyber attacks, such as the media reported that the United States finds that a North Korean attack from Sony Sony Korea nearly 10 years of network attacks. In this case, it is the United States armed attacks as an excuse to invade his country may occur.

How should China respond?

First, the introduction of national cybersecurity strategy. Based on important principles and national positions to protect national security in cyberspace, the formation of a clear framework for strategic action in cyberspace, improve top-level design Cyberspace national strategic layout.Key areas and key elements for the development of integrated package of cyberspace action plan, including countries such as the protection of critical information infrastructure, the establishment of a sound network and information security system.

The second is to establish a network of space defense forces. Established under the Ministry of Defence into the establishment of the network unit, identify core functions and the main task of the network forces, formed a dedicated network security personnel training and selection of channels, rapid formation of cyberspace defense capability. Set up in the National Technology Plan network security technology projects, research network attack and defense technology and equipment, the establishment of Cyber ​​Range, conduct regular network attack and defense drills, form a network combat capability.

Third, actively participate in international cooperation in cyberspace. Participation in the intergovernmental process of network security cooperation, strengthen dialogue between Russia and the United States, European Union and other countries and regions, forming a major cyber security incident communication and coordination mechanisms. Actively promote bilateral and multilateral cooperation within the framework of the United Nations, the promotion of international conventions to resist the formation of cyber war, the establishment of a unified network of weapons found, network attacks and other recognized international standards.Actively participate in international exchanges and publicly announced our attitude to cyber war, emphasized that States have the responsibility and obligation to protect its cyberspace and critical infrastructure from threats, interference and sabotage attacks.

Original Mandarin Chinese:

4月23日,美国国防部发布了新的网络战略,以替换于2011年发布的《网络空间行动战略》。新的网络战略明显体现了“以战止战”、“先发制人”的思想,明确提出要强化网络威慑力量的建设,以及在何种情况下可以使用网络武器来对付网络攻击者,并列出了中国、俄罗斯、伊朗、朝鲜等其自认为威胁最大的国家。美国这一战略势必加剧网络空间军备竞赛,增加网络战争爆发的可能性,给网络空间安全带来更多不安定因素,我国应提前做好应对措施,以备不时之需。

新版网络战略“新”在何处?

一是明确将网络威慑作为战略目标。在此之前,美国一直推行积极防御战略,2011年国防部发布的《网络空间行动战略》中虽然提出要部署一些新的网络武器,但仍主要以网络防御为重点。而新的网络战略中则将网络威慑作为重点,将建设应对网络战争的网络力量作为重点目标,并明确了包含133个小组的网络部队架构。正如美国国防部长卡特所说,新的网络战略展示了美国将对网络攻击进行报复的决心,“我们有必要向世界证明,我们将保护自己。”

二是明确扩大网络国防的覆盖范围。美国在网络安全方面有多个部门负责,包括美国国防部、国土安全部和国家安全局等,同时美国大量关键信息基础设施由私营机构运营,以保障网络安全有政府部门、公私机构间的紧密合作。虽然2011年的《网络空间行动战略》中就提出要加强公私合作,也提到了要加强与国土安全部之间的合作,但新的战略则直接将“保障本土和核心利益不受破坏性网络攻击”等写入了国防部的任务,私营机构运营的网络基础设施也纳入了国防部保护的范畴,同时也提出加强政府各部门间以及公私机构间的网络安全信息共享等。

三是明确提出网络战争假想敌。虽然美国一直有一个假想敌名单,但其之前的战略文件中很少直接点名,2011年的《网络空间行动战略》中也只是笼统地提到网络空间的对手。但新的网络战略却专门将中国、俄罗斯、伊朗和朝鲜等国提了出来,这也是其近年来不断指责的一些国家。实际上,美国一直通过多种途径为其采取的网络监控、网络军备等行为寻找合理借口,针对中国、俄罗斯等国的网络攻击指责则最为普遍,在2015年4月份美国火眼公司就发布了指责中国和俄罗斯进行网络攻击的两份报告。

将给世界带来什么影响?

一是网络军备竞争将进一步加剧。据联合国裁军研究所2013年的统计,有47个国家宣布组建了网络战部队,67个国家组建了非军方网络安全机构。随着网络空间安全威胁的进一步加剧,相关数据还在不断增加,美国以进攻和威慑为核心的新网络战略将进一步加剧这一情况。作为世界上网络力量最强大的国家,美国仍不断加大网络军备力度,其他国家也不可避免地加大自身网络力量投入。

二是大规模网络战争风险将不断加大。近年来,国家间的网络冲突已经不断出现,但冲突仍以民间力量为主,如马来西亚和菲律宾、朝鲜和韩国等之间爆发的网络冲突,虽然部分冲突浮现出国家力量的影子,但尚没有国家公开承认。美国新的网络战略把网络战争提到了台面上,并为网络攻击设定了触发条件,在当前缺乏国际网络空间相关标准的情况下,国家间的网络战争风险将不断加大。

三是网络冲突将成为现实世界战争的导火索。近年来,美国一直试图设定网络战的标准,从2011年的《网络空间行动战略》到2013年的《塔林手册》,再到新的网络战略,美国一直将现实武装打击作为应对网络攻击的一种手段。但由于技术所限,网络攻击追溯仍较难实现,美国政府及企业的网络攻击指责都缺乏直接证据,甚至需要通过网络攻击来确认对方是否攻击,如媒体报道称美国认定朝鲜攻击索尼公司源于索尼对朝鲜网络近10年的攻击。在这种情况下,很可能出现美国以网络攻击为借口武装入侵他国的现象。

中国应如何应对?

一是推出网络安全国家战略。基于保障国家网络空间安全的重要原则和国家立场,形成清晰的网络空间战略行动的框架,完善网络空间国家战略布局的顶层设计。针对网络空间关键领域和关键要素统筹制定一揽子行动计划,包括国家关键信息基础设施的保护工作等,建立完善的网络和信息安全保障体系。

二是建立网络空间防御力量。在国防部下设立成建制的网络部队,明确网络部队的核心职能和主要任务,形成专门的网络安全人才培养和选拔通道,快速形成网络空间防御能力。在国家科技计划中设立网络安全技术专项,研究网络攻防技术设备,建立网络靶场,开展定期网络攻防演习,形成网络实战能力。

三是积极参与国际网络空间合作。参与政府间网络安全合作进程,加强与俄罗斯、美国、欧盟等国家和地区间的对话,形成重大网络安全事故沟通和协调机制。积极推动联合国框架下的双边与多边合作,推动形成抵制网络战争的国际公约,建立统一的网络武器认定、网络攻击认定等国际标准。积极参与国际交流,公开宣布我国对网络战争的态度,强调各国有责任和义务保护本国网络空间和关键基础设施免受威胁、干扰和攻击破坏。

China’s Effort at network security has become a major trend of international cooperation

来源:中国信息安全

ChinaKeyboard

The present era, the rapid development of information society, a safe, stable and prosperous cyberspace, a country and world peace and development increasingly significant. It is considered after land, sea, air, space “fifth space” in cyberspace and Internet governance has become an important global issue for the international community unprecedented attention.

Currently, the world is not peaceful. Traditional threats and non-traditional threats intertwined. To benefit from the global network of development and also suffered network attack, and this behavior with the further development of information technology and the Internet more frequently. Currently, the traditional network boundaries become increasingly blurred, non-traditional security threats increase, distributed denial of service, advanced persistent threats and other new network attacks intensified. Network global information infrastructure frequent high-risk vulnerabilities intrusion, critical information infrastructure and critical information systems security is facing serious threats. Network attacks are gradually infiltrate the various types of network terminals. In addition, phishing, hackers, cyber-terrorism, and other issues of rampant Internet rumors, disturb and destroy the countries of normal production and life, and even threaten the stability of state power.

In recent years, the world has a profound understanding of the importance of joint response to network security threats, network security, international cooperation has become a major trend. October 2013, ICANN, IETF, W3C and other major international Internet governance institutions signed the “Montevideo was Asia,” the statement, all stakeholders equal participation as the future direction of development of Internet governance. April 2014, the Brazilian Internet Conference issued a “multi-stakeholder network in the world declared,” and proposed future “Global Principles” Internet governance and the “road map.” In the same month, Japan and the US conducted a second comprehensive network security dialogue between the two countries will further strengthen cooperation in the field of cyber defense. In October, Japan and South Korea signed the “on the strengthening of cooperation in the field of network security memorandum of understanding” to establish network security affairs consultation mechanism to discuss the fight against cyber crime and cyber terrorism, cooperation in the establishment of the Internet emergency response. In May, the new EU disclosed 2015-2020 to strengthen the fight against crime, cyber-terrorism plan. In the same month, Russia and China signed the “inter-governmental cooperation agreement in the field of international information security”, the two sides focus on the use of computer technology in particular undermine national sovereignty, security and the threat of interference in internal affairs area. In June, the global Internet Governance Council of the Global Alliance held in Brazil, a clear governance model of cooperation. In July, German Internet Industry Roundtable, deepen cooperation in the network security aspects. In August, the United Nations Intergovernmental Group of Experts on Information Security held a meeting to report to the Secretary-General of the United Nations, for the first time a unified constraint own activities in cyberspace, including critical foundation can not use the Internet to attack his country’s nuclear power plants, banking, transportation, water supply systems, etc. facilities, and can not be implanted “backdoor” in IT products and so on. In September, the United States on outstanding issues in the field of law enforcement in combating cyber crime and other security-depth exchange of views and reached important consensus; the eighth “China-US Internet Forum” held in Seattle, talks between the two countries aimed at promoting exchanges Internet industry and cooperation, continue to promote the world of Internet and network information security. In October, the Shanghai Cooperation Organization Member States authorities was successfully held in Xiamen City, Fujian Province, the “Xiamen -2015” Network counter-terrorism exercises; the sixth Sino-British Internet Roundtable opened in London, the two countries signed the first network security protocol; Chinese military sixth Xiangshan Science Society Forum and the China international strategic Association jointly sponsored the Beijing national Convention Center, which is an important issue around the “code of conduct in cyberspace” build mode, path, content and other discussions. December 1, State Councilor Guo Shengkun US Attorney Lynch, Johnson, Secretary of Homeland Security, co-chaired the first Sino-US cyber crime and related matters joint high-level dialogue.

Mandarin Chinese:

當今時代,社會信息化迅速發展,一個安全、穩定、繁榮的網絡空間,對一國乃至世界和平與發展越來越具有重大意義。被視為繼陸、海、空、天之後的“第五空間”的網絡空間安全和互聯網治理已成為國際社會空前關注的一個重要全球性議題。

當前,世界並不太平。傳統威脅與非傳統威脅交織。全球在享受網絡發展之利的同時也深受網絡攻擊之苦,而且這種行為將隨著信息技術和互聯網的進一步發展更加頻繁。當前,傳統的網絡邊界越來越模糊,非傳統網絡安全威脅有增無減,分佈式拒絕服務、高級持續威脅等新型網絡攻擊愈演愈烈。網絡信息基礎設施屢受全球性高危漏洞侵擾,重要信息基礎設施和重要信息系統安全面臨嚴峻威脅。網絡攻擊正逐步向各類聯網終端滲透。除此之外,網絡詐騙、網絡黑客、網絡恐怖主義、網絡謠言等問題日益猖獗,干擾和破壞著各國正常的生產和生活,甚至威脅著國家政權的穩定。

近年來,世界各國已深刻認識到共同應對網絡安全威脅的重要性,網絡安全國際合作已成大趨勢。 2013年10月,ICANN、IETF、W3C等國際互聯網治理主要機構共同簽署了“蒙得維得亞”聲明,將所有的利益相關者平等參與視為未來互聯網治理的發展方向。 2014年4月,巴西互聯網大會發表《網絡世界多利益攸關方聲明》,提出未來互聯網治理的“全球原則”和“路線圖”。同月,日美進行了第二次網絡安全綜合對話,兩國將進一步強化在網絡防禦領域的合作。 10月,中日韓簽署《關於加強網絡安全領域合作的諒解備忘錄》,建立網絡安全事務磋商機制,探討共同打擊網絡犯罪和網絡恐怖主義,在互聯網應急響應方面建立合作。 5月,歐盟新披露了2015年至2020年強化打擊網絡恐怖犯罪的計劃。同月,俄羅斯與中國簽署了《國際信息安全保障領域政府間合作協議》,雙方特別關注利用計算機技術破壞國家主權、安全以及乾涉內政方面的威脅。 6月,全球互聯網治理聯盟在巴西召開全球理事會,明確了合作的治理模式。 7月,中德互聯網產業圓桌會議召開,深化在網絡安全等方面的合作。 8月,聯合國信息安全問題政府專家組召開會議,並向聯合國秘書長提交報告,各國首次統一約束自身在網絡空間中的活動,包括不能利用網絡攻擊他國核電站、銀行、交通、供水系統等重要基礎設施,以及不能在IT產品中植入“後門程序”等。 9月,中美就共同打擊網絡犯罪等執法安全領域​​的突出問題深入交換意見,達成重要共識;第八屆“中美互聯網論壇”在西雅圖召開,會談旨在促進中美兩國互聯網業界的交流與合作,持續推動世界互聯網和網絡信息安全。 10月,上海合作組織成員國主管機關在福建省廈門市成功舉行了“廈門-2015”網絡反恐演習;第六屆中英互聯網圓桌會議​​在倫敦開幕,簽署兩國首個網絡安全協議;中國軍事科學學會和中國國際戰略協會聯合主辦的第六屆香山論壇在北京國家會議中心舉行,其中一個重要議題是圍繞“網絡空間行為準則”的構建模式、路徑、內涵等展開討論。 12月1日,國務委員郭聲琨與美國司法部部長林奇、國土安全部部長約翰遜共同主持首次中美打擊網絡犯罪及相關事項高級別聯合對話。

Source: China Information Security

People’s Republic of China Enters Global Governance Era

來源:中國信息安全

Source: China Information Security

China

Faced with a global network of new space, new areas, new home, how to learn the basis of Western Internet technology as the driving force of the traditional advantages of Internet governance model, to insist upon the sovereignty of the network, network security, network continue to promote economic prosperity and the need to fully reflect the General secretary Xi “four principles, five advocate” contains Chinese wisdom. For this reason, we face the reality of network threats, adherence to the “network of global governance China is entering the era of” road confidence is to make the network power of dreams and the vision to build a common destiny in cyberspace interconnection important ideological foundation.

Wuzhen successful conclusion of the summit, the global Internet governance is being used by Western values-based, rule the West as the main rule, Western Internet technology as the driving force of traditional Internet governance model, to insist on the sovereignty of the network, network security and economic prosperity as the basic network-oriented China mode steering. This shift was marked by the construction of the Internet learning General Secretary of the five propositions. These five ideas ranging from the physical aspects of China Unicom, cultural communication, trade exchange and network security, summed up in three fundamental characteristics, namely security, prosperity and globalization.

First, the general secretary Xi five ideas, to enhance network security and Internet freedom both status. This is a development of the Internet during ultra-liberal favorable correction of flooding. In human society entered the globalization and modernization of the historical background of a higher stage, the Internet has gone beyond the scope of technology, business and even exchange on the state of human life made for a global state. The living conditions of globalization try to mankind so far carried out in other areas, as both benefit from the freedom, innovation and diversity, but also trapped in dangerous disorder brought pluralism and deconstruction of the conflicts caused confusion . If in the early stages of development of the Internet, people can also use the price of liberty to defend the Internet out of order, then in this case, today’s Internet life is closely related to the direct and real life, it has been found that the “price of freedom “not only heavy and expensive, and in many cases even have constituted for economic security, political security and social security of all-round challenge.

Such challenges are mainly in three aspects, first, transnational crime is using Internet technology to achieve a new global distribution and the ability to upgrade the crime, and international judicial cooperation system is still unable to effectively respond to this challenge. In addition to traditional money laundering, smuggling, drug trafficking and other transnational criminal activities is the “Internet +” vision beyond the restructuring, the Internet itself is a breeding ground for its unique form of high-tech crime, such as hacking, virus, virtual currency black market, etc. . Although countries the judiciary had a hard struggle, but due to unity, flexibility, vastly more complex than the effectiveness of cooperation among countries of the Internet world, this fragmented country anchored to the Internet security system there are still serious failure. Second, among the increasingly fierce national competition, confrontation and ideological cultural conflict, so that the Internet has become a virtual battleground possible. If in reality, due to multiple brutal war mankind has accumulated a number of how much the bottom line with consensus, then in such a new field of Internet, the human consensus is still quite limited. Some countries and groups act in the Internet has been a serious violation of international rules and the reality of national sovereignty, and even loss of human ethics basic respect. The Internet has become the espionage, subversion and extreme battlefield behavior, the imperialists, hegemony, extremists and terrorists are turning to the name of freedom, the basic values ​​of human society and order challenge. Third, the Internet has brought economic opportunities are increasingly reflect the complex multi-faceted, excessive trade liberalization on economic security are new challenges. On the one hand, the “Internet +” is indeed able to promote the rational allocation of resources, to break the monopoly and information asymmetry, to facilitate transactions occur frequently, but on the other hand, the Internet economy has a serious impact on many traditional offline trading patterns, exacerbated protection of intellectual property rights dilemma, enlarged attention economy bubble. In this case, the security of the Internet has become the common interests of China and around the world essential.

Secondly, the development of the online world is inseparable from the real world support. E-commerce, network attention economy is becoming the world’s most important material basis, and this basis in fact. The stability is closely related to the real economy. In the world economy, there are many uncertainties, sluggish Western economies today, only continued prosperity of China’s economy can continue to provide opportunities for the development of the global Internet economy, only China is leading the world in order to build the basis for a global network to maximize. During the “Twelve Five”, China’s Internet industry to flourish. China Internet Network Information Center show that China’s industrial development of the Internet show a continued increase in industrial scale, “Twelve Five” period, expanding the audience, and gradually optimize the characteristics of technical facilities. “Twelve Five” period, the economic growth rate of China’s Internet significantly improved, the Internet economy in the proportion of GDP continues to rise. In 2014, the rate of contribution to the GDP of the Internet industry of 7% over the same period the United States. China is the world’s largest network of retail trading market, trading volume and user scale ranked first in the world.

And promote the common development of the global Internet economy in the West embarrassment structure of vested interests, to fully release the potential of the Internet can not be compared, the greater the intensity and commitment to reform, the reality of China’s Internet economy less bound themselves not only to achieve the turn to overtake, but already has strength.It is particularly worth mentioning is that, with the advancement of initiatives along the way, along the way to integrate e-commerce in global e-commerce is becoming a hot spot. Unicom physical, smooth e-commerce business will provide a vast space on the upgrade along the way.

Finally, the general secretary Xi five not trying to advocate a traditional concept of sovereignty to limit the development of the modern Internet, but on the basis of security, freedom and prosperity on both raised the times of global Internet governance ideas. This is because, on the one hand, the reform and opening up has always been China’s basic national policy, including any area, including the Internet field, it is impossible to challenge the policy. China’s Internet development in China’s economy as a result of integration into the world rather than isolated from the world. On the other hand, Internet issues facing China and local issues facing the global community as to promote closer cooperation of all concerned to build a just and rational order of the Internet, almost the only solution. The problem is that, for the purposes of some developed countries have technological advantages and disorderly state has given them much brought some problems, but it also brings technical advantages of the abuse of privilege. In this case, the responsibility and conditional responsibility, perhaps only China, which is the biggest beneficiary because on the one hand, China is both Internet freedom and prosperity, but also the largest Internet chaos and crime victims.

More importantly, the rise of China and indeed eager to have a field to lead the world to practice their own ideals. In the online world, the Chinese have the opportunity to turn to overtake. Indeed, in an increasingly global political unrest, economic stagnation appetite, the reality of an increasingly negative energy dispersive historical juncture, the online world has never been so urgently needs Chinese wisdom, Chinese programs and Chinese forces.China likely to extraordinary efforts to lead the world digital economy, out of the mire of stagnation. China advocates the concept may lead the online world hegemony from the digital world into the jungle community of destiny.The Chinese also need to grasp this opportunity, as compared to large countries, vested interest structure is highly curable realities of the international community, in the digital global society, China has more space and more opportunities to show himself as a modern powers to govern, to get a feeling of authority in the world should have a big country, and this authority will eventually radiated by the network to reality.

Original Mandarin Chinese:

面对全球一网的新空间、新领域、新家园,如何在汲取以西方互联网技术为动力的传统互联网治理模式优点的基础上,坚持网络主权、网络安全,持续推动网络经济繁荣,需要充分体现习总书记“四项原则、五大主张” 蕴含的中国智慧。为此,直面现实网络威胁,坚持“网络全球治理正在进入中国时代”的道路自信,是让网络强国梦想与构建网络空间命运共同体愿景互联互通的重要思想基础。

乌镇峰会顺利结束,全球互联网治理正在由以西方价值观为基础、以西方规则为主要规则、西方互联网技术为动力的传统互联网治理模式,向坚持网络主权、网络安全与网络经济繁荣为基本导向的中国模式转向。这个转向的标志就是习总书记提出的互联网建设五大主张。这五大主张涵盖了从物理联通、文化沟通、贸易互通以及网络安全等多个方面,归纳起来有三个根本的特征,即安全、繁荣与全球化。

首先,习总书记的五大主张,将网络安全提升到与网络自由并重的地位。这是对互联网发展过程中极端自由主义泛滥的有利纠治。在人类社会进入全球化、现代化更高阶段的历史背景下,互联网已经超越了技术、商务乃至交流上的范畴,而成为了一种人类全球化状态下的生活状态。这一生活状态与人类迄今为止在其他领域内进行的全球化尝试一样,既受益于自由、创新与多元,也受困于无序带来的危险、多元带来的冲突与解构带来的混乱。如果说在早期的互联网发展阶段,人们还可以用自由的代价来对互联网的失序进行辩护,那么在今天这种互联网生活直接与现实生活密切相关的情况下,人们已经发现这种“自由的代价”不仅沉重且昂贵,而且在很多时候甚至已经构成了对于经济安全、政治安全与社会安全的全方位挑战。

这种挑战主要表现在三个方面,其一,跨国犯罪正在利用互联网技术,实现全新的全球化布局与犯罪能力升级,而国际司法合作体系尚无法有效回应这一严峻挑战。除了传统的洗钱、偷渡、贩毒等跨国犯罪活动正在以“互联网+”的视野进行重组之外,互联网本身也滋生出其特有的高科技犯罪形态,比如黑客攻击、病毒传播、虚拟货币黑市等等。尽管各国司法机关进行了艰苦的斗争,但是由于互联网世界的一体性、灵活性、复杂性远远超过各国合作的有效性,这种以碎片状的国家为基点的互联网安全体制仍然存在着严重的失灵。其二,日益激烈的国家间竞争、意识形态对立以及文化冲突,让互联网有成为虚拟战场的可能。如果说在现实社会中,人类由于多次残酷的大战还多少积累了一些底线与共识,那么在互联网这样一个全新的领域中,人类的共识还相当有限。一些国家与群体在互联网中的行径已经严重侵犯了现实中的国际规则与国家主权,甚至丧失了对于人类道德伦理的基本尊重。互联网成为了间谍行为、颠覆行为与极端行为的战场,帝国主义者、霸权主义者、极端主义者与恐怖主义者正在借助自由的名义,对人类社会的基本秩序与价值进行挑战。其三,互联网带来的经济机遇正在越来越体现出复杂的多面性,过度的贸易自由正在对经济安全提出新的挑战。一方面,“互联网+”的确能够促进资源的合理配置,打破信息的垄断与不对称,便于交易的频繁发生,但是另一方面,互联网经济也严重冲击了许多传统的线下交易模式,加剧了知识产权保护的困境,放大了注意力经济中的泡沫。在这种情况下,互联网的安全已经成为中国与全球各国至关重要的共同利益。

其次,网络世界的发展离不开现实世界的支撑。电子商务、注意力经济正在成为网络世界最重要的物质基础,而这个基础的牢固与否其实与实体经济的发展密切相关。在世界经济存在诸多不确定因素、西方经济低迷不振的今天,只有持续繁荣的中国经济能够为全球互联网经济的发展提供持续的机遇,也只有中国的引领才能最大限度地构筑全球网络世界的基础。“十二五”期间,中国的互联网产业蓬勃发展。中国互联网络信息中心的报告显示,“十二五”期间我国的互联网产业发展呈现产业规模持续增加、受众群体不断扩大、技术设施逐步优化的特点。“十二五”期间,中国互联网对经济增长的贡献率显著提升,互联网经济在GDP中的占比持续攀升。2014年,互联网行业对GDP的贡献率达到7%,超过了美国的同期水平。中国更是拥有全球最大的网络零售交易市场,交易额和用户规模位居世界首位。

与西方困窘于既得利益集团结构,无法充分释放互联网潜力相比,改革决心与力度更大,现实束缚更少的中国互联网经济不仅自己实现了弯道超车,而且已经具备了带动全球互联网经济共同发展的实力。尤其值得一提的是,随着一带一路倡议的推进,电子商务在一带一路上的集成正在成为全球电子商务的热点。物理上的联通,贸易上的畅通将为电子商务在一带一路上的升级提供广阔的空间。

最后,习总书记的五项主张并不是试图以一种传统的主权观念去限制现代互联网的发展,而是在安全、自由、繁荣并重的基础上提出的与时俱进的互联网全球治理思路。这是因为,一方面,改革开放始终是中国的基本国策,包括互联网领域在内的任何领域,都不可能挑战这一政策。中国的互联网发展与中国的经济一样,是融入世界而非隔离于世界的结果。另一方面,中国所面临的互联网问题与当地全球社会面临的问题一样,推动有关各方的密切合作,构建一个公正、合理的互联网秩序,几乎是唯一的解决办法。问题在于,对于一些拥有技术优势的发达国家而言,无序的状态虽然给它们多少带来了一些困扰,但是也带来了滥用技术优势的特权。在这种情况下,能够负起责任的,有条件负起责任的,也许只有中国,这是因为一方面,中国既是互联网自由与繁荣的最大受益者,也是互联网混乱与犯罪最大的受害者。

更重要的是,崛起中的中国也的确渴望能有一块场域来实践自己对于引领世界的理想。在网络世界中,中国更有机会弯道超车。事实上,在全球政治日益动荡、经济停滞不振,现实中的负能量日益弥散的历史关口,网络世界从未如此迫切地需要中国智慧、中国方案和中国力量。中国不凡的努力有可能引领世界数字经济发展,走出发展停滞不前的泥潭中。中国倡导的理念可能引领网络世界从霸权的丛林世界变为数字化的命运共同体。而中国也同样需要把握这样一个机会,因为相比于大国林立、既得利益结构高度固化的现实国际社会,在数字化的全球社会中,中国拥有更大的空间与更多的机遇去展现自己作为一个现代化大国的治理才能,去获得一个具有天下情怀大国应有的权威,而这个权威也终将由网络辐射到现实之中。

來源:中國信息安全

Source: China Information Security

China’s National Network Security is in Their Own Hands

Source: China National Defense News

来源:中国国防报-国防特刊

Chinese “White Hat Hacker Corps” has become an important force in Chinese national cybersecurity”

習近平

◆ General Secretary Xi Jinping stressed that no network security is no national security, no information will be no modernization. Power network construction, China must have her own technology, excellent technology.

◆ Free security software “China model” to create a network security field, the “Chinese miracle.” The Chinese Dream…

◆ In the network security has risen to national security background, should consciously create a good development space for China’s own “white hat Legion” of hackers, while cautioning against a number of organizations or enterprises affected by outside forces controlled competition Chinese security market, and then to depth strategic goals of China’s core security.

After September 17, the US Senate Armed Services Committee issued a report called China network intrusion, causing great concern at home and abroad media.Chinese Foreign Ministry and the Defense Ministry spokesman, speaking one after another, the report noted that the United States is purely fabricated, deliberately fabricated entirely untenable. Defense Ministry spokesman Geng Yansheng solemnly pointed out that the Chinese government and armed forces have never engage in or support any network attacks and theft activities. China has always resolutely opposed and crack down on criminal activities related to network attacks. China faces a serious threat of cyber attacks is one of the world’s leading hacking victim. For network hacker attacks from abroad, we have sufficient evidence.

The United States is China’s largest Internet security threats

Geng Yansheng said that needs to be emphasized is that the “Prism” incident exposed more than a year, the United States should its foreign dignitaries, business, personal theft and network monitoring, monitoring the behavior of reflection to the Chinese side and the international community to make clear explanation . We urge the US to do more to contribute to peace and tranquility in cyberspace thing, rather than the opposite.

In fact, the attacks from the United States is China’s largest Internet security threats.

National Internet Emergency Center recently released “2013 China Internet Network Security Report” revealed that in 2013, China’s government websites frequently suffer outside hackers attacks, including national organized network attacks have increased significantly. China’s government websites, especially the local government website, is under attack “disastrous.”

According to monitoring, in 2013, our country has been tampered with the number of sites is 24,034, an increase of 46.7% compared with 2012, in which the number of government websites has been tampered with 2430, an increase of 34.9% compared with 2012; our territory to be implanted backdoors number of sites for the 76160, compared with 45.6% growth in 2012, has been tampered with and implanted in the back door of government websites, more than 90 per cent below the provincial and municipal local government Web site. Overseas hackers frequently attack government websites in China. In 2013, offshore “anonymous”, “Algerian hacker” and other hackers had attacked government websites in China. Among them, the “hacker anti-communist” organization more active, sustained launched against the territory of government agencies, universities, enterprises and institutions and well-known social organization site of the attack in 2013 on the organization of the territory of more than 120 government websites embodiment tampering. They use pre-implantation site vulnerability backdoor, then attacked the site after the implementation of control, at least the current invasion of the territory of more than 600 sites, an average of every three days publish tampering incident in their social networking sites.

In these networks from outside attacks, the national network of organized attacks increased significantly on China’s network security and information systems pose a serious threat and challenge. Since June 2013, Snowden exposure “Prism Plan” US National Security Agency and a number of network monitoring projects, the disclosure of US intelligence agencies in many countries and people in long-term implementation and monitor network penetration attacks, including multinational monitoring target politicians, diplomatic system, media networks, large enterprise networks and international organizations. Our focus on listening and belong to their targets, national security and Internet security is facing a serious threat to users’ privacy.

According to monitoring found only in 2013, there are 31,000 foreign hosts through a back door to China 61000 Website implement remote control, which ranks first in the United States hosts a total of 6215 hosts in control of our 15,349 sites. Phishing attacks against China in terms of attack from the United States the same primacy. Trojan zombie network connection, our country hosts more than 1090 are outside the control server control, which is located in the United States control server control our country hosts 448.5 million, accounting for 41.1% of the total, ranking the first place ……

Original mandarin Chinese:

核心提示

◆习近平总书记强调指出,没有网络安全就没有国家安全,没有信息化就没有现代化。建设网络强国,要有自己的技术,有过硬的技术。

◆免费安全软件的“中国模式”创造了网络安全领域的“中国奇迹”。

◆在网络安全已经上升到国家安全的大背景下,应当有意识地为中国自己的“白帽子军团”创造良好的发展空间,同时警惕一些受境外势力控制的组织或企业争夺中国安全市场,进而达到深入我国核心安全领域的战略目的。

9月17日,美国参议院军事委员会发表所谓中国网络入侵报告后,引起海内外媒体的高度关注。中国外交部和国防部新闻发言人相继发言,指出美方报告纯属无中生有,蓄意捏造,完全是站不住脚的。国防部新闻发言人耿雁生严正指出,中国政府和军队从未从事或支持任何网络攻击和窃密活动。中方一贯坚决反对并依法打击网络攻击等相关犯罪活动。中国面临着网络攻击的严重威胁,是世界上最主要的黑客攻击受害国之一。对于来自境外的网络黑客攻击行为,我们掌握有充分证据。

美国是中国网络安全最大的威胁

耿雁生表示,需要强调的是,“棱镜门”事件曝光一年多了,美方应就其对外国政要、企业、个人进行网络窃密和监听、监控的行为进行反思,向中方和国际社会作出清楚解释。我们敦促美方多做有利于网络空间和平与安宁的事,而不是相反。

实际上,来自美国的网络攻击是中国网络安全最大的威胁。

国家互联网应急中心最新发布的《2013年中国互联网网络安全报告》披露,2013年,我国政府网站频繁遭受境外黑客组织的攻击,其中国家级有组织网络攻击行为显著增多。我国的政府网站,尤其是地方政府网站,是遭受攻击的“重灾区”。

据监测,2013年,我国境内被篡改网站数量为24034个,较2012年增长46.7%,其中政府网站被篡改数量为2430个,较2012年增长34.9%;我国境内被植入后门的网站数量为76160个,较2012年增长45.6%,在被篡改和植入后门的政府网站中,超过90%是省市级以下的地方政府网站。境外黑客组织频繁攻击我国政府网站。2013年,境外“匿名者”“阿尔及利亚黑客”等多个黑客组织曾对我国政府网站发起攻击。其中,“反共黑客”组织较为活跃,持续发起针对我国境内党政机关、高校、企事业单位以及知名社会组织网站的攻击,2013年该组织对我国境内120余个政府网站实施篡改。他们利用网站漏洞预先植入后门,对网站实施控制后遂发起攻击,目前至少入侵600余个境内网站,平均每3天在其社交网站发布一起篡改事件。

在这些来自境外的网络攻击中,国家级有组织网络攻击行为显著增多,对我国的网络安全和信息系统带来严重威胁和挑战。2013年6月以来,斯诺登曝光“棱镜计划”等多项美国家安全局网络监控项目,披露美国情报机构对多个国家和民众长期实施监听和网络渗透攻击,监控对象包括多国政要、外交系统、媒体网络、大型企业网络和国际组织等。我国属于其重点监听和攻击目标,国家安全和互联网用户隐私安全面临严重威胁。

据监测发现,仅在2013年,境外有3.1万台主机通过植入后门对我国6.1万个网站实施远程控制,其中位于美国的主机居首位,共有6215台主机控制着我国15349个网站。在针对中国的网络钓鱼攻击方面,来自美国的攻击同样居于首位。在网络木马僵尸方面,我国境内1090万余台主机被境外控制服务器控制,其中位于美国的控制服务器控制了我国境内448.5万余台主机,占总数的41.1%,仍居首位…

Who will guard China’s network security?

China ushered in the Internet age is the tide of reform and opening up.Chinese Internet users surf the initial means of the Internet, whether hardware or software, mostly imported from overseas to domestic.

八一解放軍

This “borrowed boat” mode, while promoting the development of China’s high-speed network, but also to China’s network security left a great security risk. We use the Internet browser is someone else’s, you’ve seen what page, others see that; our search engine to find the problem is someone else’s, for what you are interested in something, it will be automatically recorded in a database outside in ……

We use the operating system as others in the system hidden “back door” through overseas. After the United States, according to media reports, the world’s largest user coverage Microsoft “Windows” operating system, found loopholes in the system, it will first notify the US intelligence agencies, will then inform the user, provide patches fix vulnerabilities. This means that, in someone else’s “window”, we almost “transparent”. Even more serious is that Microsoft in order to protect its own commercial interests, has designed a mandatory upgrade marketing strategy.For example, in order to promote Win8 operating system, on April 8 to forcibly stop the official service XP system, the millions of Chinese users directly discarded in molar sucking blood before hackers. Domestic media pointed out in a review of Microsoft XP stop taking event, which is an important event once the impact of China’s Internet security. This is not only related to the large number of individual users, but also is related to the key sectors involved in the national economy. Network security system, China must rely on its own security vendors innovation and action.

Network security experts pointed out that China’s current network security system is set up in technology research and development on the basis of the United States, not to mention technology, cloud security technology in the field of key technologies such as a CPU, communications and data transmission encryption and decryption system in the field art networking technology and so on. If you play a very appropriate analogy, just as the Chinese network security gate, he stood an American security.

Network security is a core protection capability of the modern state in cyberspace, the party and state leaders highly concerned about network security issues. February 27, the central network security and information technology leading group was established. CPC Central Committee General Secretary and State President and CMC Chairman Xi Jinping himself as a centralized network security and information technology group leader, he delivered an important speech at the first meeting of the leading group, pointed out that China has become a big country network, network security and information technology is a matter of national security and national development, major strategic issues related to the broad masses of working life, starting from the domestic and international trend, the overall layout of the parties to co-ordinate, innovation and development, and strive to build China into a powerful network.

General Secretary Xi Jinping stressed that no network security is no national security, no information will be no modernization. Power network construction, have their own technology, excellent technology.

General Secretary earnest expectation, explicit requirements for China’s domestic network security vendors, it is the direction of future efforts.

Original Mandarin Chinese:

谁来守护中国的网络安全?

中国是在改革开放大潮中迎来网络时代的。中国网民最初冲浪国际互联网的手段,无论是硬件还是软件,大多是从海外进口到国内的。

这种“借船出海”的模式,在促进中国网络高速发展的同时,也给中国的网络安全留下了极大的安全隐患。我们上网用的浏览器是别人的,你看过什么网页,别人一看就知道;我们查找问题的搜索引擎是别人的,你对什么东西感兴趣,会被自动记录在境外的数据库里……

我们用的操作系统也是别人的,系统中暗藏的“后门”直通海外。据美国媒体披露,全球覆盖用户最多的微软“视窗”操作系统,发现系统漏洞后,会首先通知美国的情报部门,而后才会告知用户,提供修补漏洞的补丁。这就意味着,在别人的“视窗”里,我们几乎是“透明”的。更为严重的是,微软为了保护自身的商业利益,设计了一套强制升级的营销战略。例如为了促销Win8操作系统,于4月8日强行停止XP系统的官方服务,把无数中国用户直接丢弃在磨牙吮血的黑客面前。国内媒体在评论微软XP停服事件时指出,这是一次影响中国网络安全的重要事件。这不仅关系到为数众多的个人用户,更是关系到涉及国计民生的关键行业。网络系统的安全保障,必须依靠中国自己的安全厂商的创新与行动。

网络安全专家指出,我国当前的网络安全体系,是在美国研发的技术基础上建立起来的,更不要说CPU等核心关键技术,通信数据传输方面的加密和解密系统领域技术,云安全技术领域和物联网技术领域技术等等。如果打一个不太恰当的比喻,就如同中国网络安全的大门前,站了一个美国保安。

网络安全是现代国家网络空间的核心防护能力,党和国家领导人高度关注网络安全问题。2月27日,中央网络安全和信息化领导小组成立。中共中央总书记、国家主席、中央军委主席习近平亲自担任中央网络安全和信息化领导小组组长,他在领导小组第一次会议上发表重要讲话,指出中国已成为网络大国,网络安全和信息化是事关国家安全和国家发展、事关广大人民群众工作生活的重大战略问题,要从国际国内大势出发,总体布局,统筹各方,创新发展,努力把我国建设成为网络强国。

习近平总书记强调指出,没有网络安全就没有国家安全,没有信息化就没有现代化。建设网络强国,要有自己的技术,有过硬的技术。

总书记的殷殷期望,是对中国本土网络安全厂商的明确要求,更是未来努力的方向。

“China model” to create a “China miracle”

Rivers and lakes of the network can be divided into decent and Xiepai.Commonly known as “black hat” hackers manufactured by Trojan, the use of computers, mobile phone operating system vulnerabilities to attack, steal private data, illegally obtained personal interests. The guardian of network security “white hat” on the contrary, they take the initiative to find a computer, mobile phone operating system vulnerabilities, provide technical repair programs, research and development of security software and hardware products, build a firewall against hackers, for individuals, society and the country’s network security add a layer of protective cover, active in the first line of network security guard.

China’s domestic network security vendors are on their market growth and competition from foreign giants up security. Rely on a strong sense of social responsibility and familiarity with national conditions, China’s network security vendors gradually grow from a little foreign magnates recapture market, has won vitality. Many users still remember those familiar names: Kingsoft, Rising, Jiangmin ……

China’s network security vendors not only by virtue of their own efforts to win the market, but also creatively launched the network security field, “China model” completely rewritten the pattern of China’s network security industry.Traditional network security software are used charging mode, charge more than $ 200 a year on average. Because of the higher price threshold, resulting in many who do not want to use security software. The absence of security software, also led to the Trojan virus on the network as a scourge, such as CIH, panda, etc., hundreds of millions of infected computers, sensational news events.

Introduced in 2005, 360 free security software, once the user uses the threshold down to zero. Along with other local network security vendors follow-up, only less than 10 years, Chinese security software PC penetration rate has risen to 99%. In 2013, Microsoft released a security report, the Chinese computer malware infection index of 0.6 per thousand, the global average is only 1/10 of the world’s countries with the lowest infection rates of malware. In 2014, Microsoft re-released a report, a detailed summary of the data in the world’s more than 100 countries and regions, more than 10 million computers after malware statistics pointed out that China is the world’s lowest 4.4, far below the world average of 18.

360 free security software model, Wall Street interpreted as “Chinese model”: the core layer on the basis of free goods and services, to build browser applications open platform and two basic platforms, and refine the site navigation, buy navigation, navigation games, search, open platform and mobile open platform and other services, these services through advertising and internet value-added services realized profits. Such an innovative “China model” will not only China’s network security software penetration is significantly improved, and the R & D investment by increasing safety, security personnel and gather technical team, making China’s network security technology continues to improve and is widely used by foreign counterparts and learn from the followers of the world’s security technology security technology leader, but also created the Eastern Hemisphere strongest Chinese “white hat Legion.”

In this sense, the free security software “China model” to create a network security field, “Chinese miracle.”

Original Mandarin Chinese:

“中国模式”创造“中国奇迹”

网络的江湖中也分正派和邪派。俗称“黑帽子”的网络黑客靠制造木马病毒、利用电脑、手机操作系统漏洞等进行攻击,窃取隐私、数据,非法获得个人利益。而守护网络安全的“白帽子”正好相反,他们主动发现电脑、手机操作系统的漏洞,提供技术修补方案,研发安全软件硬件产品,对黑客的攻击建立防火墙,为个人、社会乃至国家的网络安全加上一层防护罩,活跃在守护网络安全的第一线。

中国本土的网络安全厂商,是在自己的市场上与国外安全巨头的竞争中成长起来的。依靠强烈的社会责任感和对国情的熟悉,中国网络安全厂商逐步发展壮大,从外国巨头手中一点点夺回市场,赢得了生机。很多网民都还记得那些熟悉的名字:金山、瑞星、江民……

中国的网络安全厂商不但凭借自己的努力赢得了市场,还创造性地推出网络安全领域的“中国模式”,彻底改写了中国网络安全行业的格局。传统的网络安全软件都采用收费模式,平均一年收费超过200元。由于较高的价格门槛,导致很多用者不愿使用安全软件。安全软件的缺位,也导致了网络上的木马病毒像洪水猛兽,如CIH、熊猫烧香等,动辄感染上千万台电脑,成为轰动一时的新闻事件。

2005年推出的360免费安全软件,一下子把用户使用门槛降到了零。随着其他本土网络安全厂商的跟进,只用了不到10年的时间,中国个人电脑的安全软件普及率已经上升至99%。2013年,微软发布安全报告称,中国电脑的恶意软件感染率指标为千分之零点六,仅是全球平均水平的1/10,是全球恶意软件感染率最低的国家。2014年,微软再度发布报告,在汇总了全球100余个国家和地区10亿余台计算机的详尽数据后,指出中国恶意软件统计数据为世界最低的4.4,远低于世界平均水平的18。

360的免费安全软件模式,被华尔街解读为“中国模式”:在核心免费产品服务层基础上,构建浏览器平台与应用开放两大基础平台,然后细化为网址导航、团购导航、游戏导航、搜索、应用开放平台和移动开放平台等服务,将这些服务通过广告与互联网增值服务变现实现盈利。这样一个创新的“中国模式”不但将中国的网络安全软件普及率大幅提高,而且通过不断增加安全研发投入,集聚安全人才和技术团队,使得中国网络安全技术不断提升,被国外同行所广泛应用和借鉴,从安全技术的追随者成为世界安全技术的领先者,也造就了东半球最强的中国“白帽子军团”。

从这个意义上说,免费安全软件的“中国模式”创造了网络安全领域的“中国奇迹”。

Chinese “White Hat Hacker Corps” has become an important force in Chinese national cybersecurity

June 2013, “Prism” incident broke out. Former National Security Agency employee Edward Snowden would disclose secret documents US intelligence agencies monitor the project to the media, in one fell swoop depth reflection triggered a global information security issues. April 2014, suffered more than the major global Internet exploits of attacks: Open SSL “heart bleeding loophole”, IE browser’s “zero-day vulnerabilities”, Struts vulnerability, Flash vulnerability, Linux kernel vulnerability, Synaptics Touchpad Driver Vulnerability and other important vulnerabilities have been found to be. An attacker can exploit to achieve complete control of the target computer, steal confidential information.

The current world, hacking has become the most important network security threats, and network security threats has become a major threat to social security, national security. Cyber ​​attacks not only can disrupt the normal operation of enterprises and social institutions, but also can easily destroy a country’s operational command system and livelihood facilities, network security has become an important part of a national security defense system.

The current network security situation simmering, a turbulent, especially the “prism door” incident has exposed a series of deep-seated problems, showing security threats overseas hostile forces in the formation of China’s network security is growing. After the “Prism” incident, security products and related overseas smartphone products through the back door to steal the core data set of events repeatedly been exposed, and other international security software giant Symantec is also exposed the existence of a backdoor, domestic users lose confidence, exclusion in addition to government procurement list.

At these foreign security software lose confidence forced to withdraw from the Chinese market, the Chinese “white hat Legion” With long-term accumulation of technology and product innovation, and take up more than 600 million Internet users security guard duties. China’s domestic network security vendors have become a priority in government procurement national security products. Information security person in charge of a large state-owned enterprises, said they not only many major projects builders, but also the construction of a number of the world’s top-class large-scale projects. For such a large state-owned enterprises, each security flaw is thrilling security risks. Select the security products must be cautious, not only in respect of corporate security, national interests even more solidarity and public safety. In this context, they would prefer to secure key, handed the hands of their own people.

The rapid development of the network economy, so China’s network security is facing new challenges. The grim reality requires Chinese “white hat Corps” must quick response, China’s network security as a good “gatekeeper.”

The current domestic network ecosystem is very complex, a lot of important Internet companies have the background of foreign capital, which also makes the competitive Internet market, often there will be some market factors outside.Recently, for example, 360 to prosecute the “Daily Economic News” reported a case of alleged false in Shanghai Xuhui District People’s Court formally sentenced.Commenting on the domestic public opinion at the time of the court, and not just limited to commercial disputes, but through the appearance of the event, focusing on national cybersecurity issues. Many network security field and legal experts pointed out that, in the network security has risen to national security background, should be conscious of China’s own “white hat Corps” to create a good development space, while cautioning against a number of foreign forces in control of the organizations or enterprises for China’s security market, thus achieving further core areas of our strategic security purposes.

China’s network security depends on our own. This is not just a question of national pride, not just a confidence issue, but a matter of extreme cases, if there are areas of our security problems backdoor planted by hostile forces.Therefore, we should focus on in recent years in areas such as security, foreign hostile forces controlled by Chinese companies through the acquisition of M & I and other ways to penetrate the security field behavior.

Original Mandarin Chinese:

中国“白帽子军团”成为国家网络安全的重要力量

2013年6月,“棱镜门”事件爆发。美国国家安全局前雇员爱德华·斯诺登将美国情报机构监听项目的秘密文档披露给了媒体,一举引发了全球对于信息安全问题的深度反思。2014年4月,全球互联网遭遇多起重大漏洞攻击事件袭击:Open SSL的“心脏出血漏洞”、IE浏览器的“零日漏洞”、Struts漏洞、Flash漏洞、Linux内核漏洞、Synaptics触摸板驱动漏洞等重要漏洞被相继发现。攻击者利用漏洞可实现对目标计算机的完全控制,窃取机密信息。

当前世界范围内,黑客攻击已经成为最主要的网络安全威胁,而网络安全威胁成为社会安全、国防安全的重要威胁。网络攻击不仅能够破坏企业和社会机构的正常运行,还能够轻易地摧毁一个国家的作战指挥系统和民生设施,网络安全已经成为一个国家安全防御体系的重要组成部分。

当前网络安全形势暗流涌动、波谲云诡,尤其是“棱镜门”事件暴露出的一系列深层次问题,显示境外敌对势力在网络安全领域对中国形成的安全威胁越来越大。“棱镜门”事件之后,境外相关安全产品和智能手机类产品通过设置后门窃取核心数据的事件屡屡被曝光,赛门铁克等国际安全软件巨头也被曝光存在后门,失去国内用户信任,被排斥在政府采购名单之外。

就在这些国外的安全软件失去信任被迫退出中国市场之际,中国的“白帽子军团”凭借长期技术积累和产品创新,担负起守护6亿多网民安全的职责。中国本土网络安全厂商也成为国家政府采购安全产品的优先考虑。一家大型国有企业的信息安全负责人表示,他们不但是国内许多重大工程的建设者,还承建了世界上多个顶尖级大型工程项目。对于这样的大型国有企业来说,每个安全漏洞都是惊心动魄的安全隐患。选择安全产品必须慎之又慎,这不但关乎企业的安全,更与公共安全甚至国家利益休戚相关。在这种背景下,他们更希望把安全的钥匙,交到自己人手上。

网络经济的飞速发展,使中国网络安全面临着全新的挑战。严峻的现实要求中国“白帽子军团”必须快速反应,为中国的网络安全当好“守门人”。

当前国内的网络生态十分复杂,很多重要的互联网企业都有境外资金的背景,这也使得网络市场的竞争中,往往会出现一些市场之外的因素。例如近日360起诉《每日经济新闻》涉嫌虚假报道一案在上海徐汇区人民法院正式宣判。国内舆论在评论这次法院判决的时候,并不仅仅局限于商业纠纷,而是透过事件的表象,关注国家网络安全的问题。多位网络安全领域的专家和法律专家指出,在网络安全已经上升到国家安全的大背景下,应当有意识地为中国自己的“白帽子军团”创造良好的发展空间,同时警惕一些受境外势力控制的组织或企业争夺中国安全市场,进而达到深入我国核心安全领域的战略目的。

中国的网络安全要靠我们自己。这不仅仅是一个民族气节问题,也不仅仅是一个信心问题,而是一个关乎极端情况下,我们的安全领域是否存在敌对势力安插的后门问题。因此,应重点关注近年来在安全等领域,敌对势力通过外资控制中国公司,通过收购并购等方式向我安全领域渗透的行为。

Original Source URL

China’s Military, Information Warfare & Interpretation of the PLA’s Strategic Support Units

中國軍事信息戰解读解放军战略支援部队

20160104131249755

December 31, 2015, People’s Liberation Army’s governing bodies, the PLA rocket forces, the PLA strategic support troops inaugural meeting was held in August Building.The Army is the armed forces of our party was first built, which needless to say, the military rocket is an upgraded version of the Second Artillery Corps, reflects the strategic support great power status, do not need to deny self, then this strategy support troops may be too mysterious.

Because at the inaugural meeting, the CPC Central Committee General Secretary and State President and CMC Chairman Xi Jinping to the Army, rocket forces, strategic support units and granted the flag caused precepts. This means that the strategic support units, and the People’s Liberation Army is the Army, Navy, Air Force, Army rocket same level independent military services. And with respect to the Army’s “name” and the Second Artillery Rocket Army “named” upgrade, strategic support since the Second Artillery Force of the PLA has become established, the birth of the only new military services. From the point of view of modern high-tech local wars, armed forces and strategic nuclear strike force contains basically the main mode of combat and battlefield environment, then this strategy support troops, and what capability, turned out to be able to come to the fore?

Strategic support troops inaugural meeting, President Xi strategic support units carried out the following qualitative: strategic support units is to maintain national security of new combat forces is an important growth point of our military combat capability of quality. Strategic support units to adhere to all officers and soldiers system integration, civil-military integration, and strive to achieve leapfrog development in key areas, starting point to promote high standards of combat forces to accelerate the development of new, integrated development, strive to build a strong modernization strategy support units.

3259521140

There are a few key words: new combat forces, combat new quality capability, system integration, civil-military integration, key areas.

Xinhua News Agency news show, strategic support unit’s first commander was Gaojin. Network data shows he originally from Jiangsu Province, of the Jingjiang people. 1985 Gao-Jin enters the PLA Second Artillery Command College. July 2006, promoted to the rank of major general, served as the PLA Second Artillery Force 52 base commander. In December 2011, he served as chief of staff of the PLA Second Artillery Force. August 2013, promoted to the rank of lieutenant.In July 2014, he was transferred to the Assistant Chief of Staff. In December 2014, he was promoted to president of Academy of Military Sciences, and replace older than 1 year old deputy chief of staff YiXiaoguang will become the youngest Chinese Military general officer, Military Academy is the youngest president in history.

On November 2, 2015,Gaojin became a strategic support troops commander in the first 60 days, “Liberation Army Daily” published a paper entitled “deepen defense and military reform is the only way the army strong army Hing,” the signed article . Article specifically mentioned: the world’s new military revolution is an important component of the key variables in the world today and the great development and changes and major adjustments, the large its speed, scope, degree of depth, the impact of the unprecedented. Following another face of this epoch-making revolution in military weapon cold, hot weapons, mechanized military revolution after the world’s major countries competing to adjust its military strategy, stepping up military transformation, in order to reshape the military information as the core morphology, reconstruction of military force system. In the form of war from mechanization to informationization of qualitative leap, under conditions of nuclear deterrence armed Skynet electrical integration of joint operations is increasingly becoming a reality, from the battlefield to the traditional space high, deep, very far from the physical space and virtual space to expand non symmetric, non-contact, non-line combat style more mature, battle to seize control of information has become a comprehensive control over the core mechanism of winning the war profoundly changed.

Armed Skynet electrical integration joint commander Gaojin said nuclear deterrence combat conditions, where “day”, it never refers to the Army’s rocket missile, but in outer space, “net” is in cyberspace, “power” is the electromagnetic space. Modern high-tech local wars, armed forces military remains the key to victory, but also the main battleground in the sea and air space, but a typical characteristic of information warfare is asymmetrical, non-contact, non-line operations, and achieve the key to this transformation is in outer space, cyberspace and electromagnetic space “three special battlefield.” Due to the large electromagnetic space and physical isolation from the impact, typically have only tactical significance. Whereas outer space and cyberspace, it is high, deep, very far from ubiquitous in the physical space and virtual space, which has a strategic significance. On both the battlefield flame, not flesh and blood flying, but dangerous worse than conventional battlefield, troops could have a corresponding force building and sound command response agencies, the result will be a conventional battlefield the outcome must have an important and even qualitative impact.

This is the meaning of China’s “strategic support” forces. Reasoning logically, Chinese strategic support units, it may be in outer space and cyberspace “new combat forces” for giving our military the “new mass combat capability” new growth point.

In order to achieve this capability “strategic support” of military power have set up competing celestial army (troops outer space) and Cyber ​​Army (network warfare units). US troops in outer space, from the “Decree” system, troops belonging to the armed forces, including missile and space defense forces, the Navy’s carrier-based anti-missile forces, the Air Force C4ISR and the use of space satellites Army troops, and in the “military orders on “system, these forces are unified owned by the US strategic command headquarters. In 2009, under the US Strategic Command has established a new subordinate command, namely Network Warfare Command, the unified command of the US Armed Corps network warfare units.

Russia in December 2011 set up air and space defense troops, but it was such a force has only arms and the operational level status, the military power of the central air and space defense forces only jurisdiction, but can not solve Russia’s air defense force under unified command of proposal question. August 1, 2015, the Russian air force and air defense forces, air defense forces merged to form the air and space forces. Which it is now Russia has no air force in the traditional sense. Air and space defense forces will remain the unified command of the Russian General Staff, and the direct leadership of the day will be empty Army General Headquarters. Aerospace duty Army is responsible for unified management of air, anti-aircraft and anti-missile forces, and Russian satellite orbit Cluster spacecraft launch and management. In addition, the missile attack warning systems and space surveillance systems within the scope of the jurisdiction of military air and space.

From the public point of view, so far Russia has not yet set up as a dedicated network warfare units like the US, but does not have a special unified command structure.

Advances in technology, to make human use of outer space and cyberspace, to achieve the purpose of the military, but that does not mean big opportunities for state-owned, have the ability and courage to break the old military system, to adapt to the new form of war requirements. How to build a national unified command and outer space and cyberspace defense system. Russia and the United States gave us a lot of lessons.

The United States and the Soviet Union during the Cold War hegemony, had spent heavily in the development of military platforms and a lot of space weapons systems, but the US military space systems, almost all rests in the hands of the Air Force, and the Soviet Union established the Strategic Rocket Forces troops. Visible, the US military is relying on the armed services to build space defense system, and the former Soviet Union is the establishment of a new military services.

At the end of the Cold War, the Russian strategic rocket forces in the original, based on an independent arms to draw a military space forces. March 2011, the Russian military space forces again, based on the formation of air and space defense troops.However, under the oppression of US nuclear weapons, global strike, anti-missile and other space powers, Russia and aerospace field is still fragmented, air and space attack threats it faces increasingly severe pain, while there is no uniform national air and space defense command structure . To safeguard the security of Russian aerospace field, create a better organizational and technical conditions for the implementation of the strategic future of air and space battles, the Russians in August 2015 set up air and space forces. But have to say is that the so-called empty space forces, the Russian equivalent of the US back to the old way, both relying on a unified air defense system to re-member space. This shows that, although Russia considers itself aerospace suffered a big threat, but the economic and technological strength, has been insufficient to support the establishment of a development, a separate military services promising, but only on the basis of the Air Force “linger.”

Russian frustration with respect to the United States the development of air and space power is somewhat intentional play balance. The main part of the US Air Force air and space power, but in the “ABM” the US military in the 21st century the most important military operation of air and space, is the main operator of the US Army. In addition to the Navy’s “Aegis” missile defense system, the US military’s ground-based midcourse ABM, THAAD and Patriot anti-missile terminal, they are in control of the US Army, and a bunch of computer manipulation Army Air Force Base. Of course, whether it is armed soldiers, they eventually unify obey the command of US Strategic Command. But the US military services rely on different building space defense system, military services still reflects the inherent ideological balance thinking. This is because the US military very large volume, especially during the Cold War, which makes the US military services have funding research challenges of new technologies. And after 1986, the new Department of Defense Reorganization Act by the US military approach is from the perspective of the Joint Operations Command, the unified “collection” command the services of new combat forces to integrate. US Network Warfare Command was established, also a product of this approach.

US military advantage of this approach is that the services Eight Immortals recount, the final choice can be optimized in the competition, but the disadvantage is that there is a huge waste, and the services in peacetime and do not belong to the system, it is difficult wartime unity of action. Although the US military reform highlights the joint operations of thought, but the individual military services after all are not the same culture, and outer space and cyberspace, the required military personnel are a small number of capable staff, if the artificial formation of different military services background, a bit “for the United the joint “deliberate sense.

With respect to the United States and Russia, China’s military advantage is the revolution in military time scale, technological change and changes in the army almost simultaneously, the synchronization off, which makes the Chinese military have the opportunity to design the height from the top, in the lessons learned from military based on the construction of military services and more rational planning. While China’s national strength and technological level of rapid growth, but also to the construction of China’s new military services will not fall into the “make bricks without straw,” the fantasy embarrassment.

In the field of anti-missile, the Chinese Defense Ministry has confirmed that the January 11, 2010, September 11, 2012, January 27, 2013, July 23, 2014 were carried out four ground-based midcourse missile interception technical tests. In the field of anti-satellite, the Chinese Foreign Ministry acknowledged in January 2007 anti-satellite missile test. Out media speculation in 2010 and 2013. China has conducted two tests of anti-satellite weapons, but did not get China confirmed. Platform in space, China from 2010 into more than 15 times the average annual emission intensive stage, reaching an average growth of around 20 the number of satellites, the establishment of a chain of day, the Beidou, high scores, and a series of remote sensing satellites family now the number of satellites in orbit over Russia, after the United States. In 2014 MH370 lost contact incident, China urgent mobilization of four models ocean, clouds, high, remote sensing, nearly 10 satellites to provide technical support for ground search and rescue operations.

In network technology, China has become the world’s Internet and mobile Internet users than any other country, not only the birth of a group of like Alibaba, Tencent world-class Internet companies, such as Huawei also appeared in network technology giant. China in the next generation of Internet technology, has become one rule-makers. But while China has become the network against the most affected countries by the world, which means that China must consider the network security of the country from a strategic height, including the establishment of a unified defense force and a network system.

There is no doubt that the new military revolution has proved that outer space is to promote our army “system integration” an important heights, and cyberspace is the embodiment of “civil-military integration,” a typical example of these two historic space is the Chinese army reform the key areas. China established strategic support units, will likely be the world’s first and do not rely on traditional military services to establish a unified military force in outer space and cyberspace defense system. This initiative is bound to leave an indelible mark in the world’s new military revolution.

Original Mandarin Chinese:

凤凰军事作者:郑文浩

2015年12月31日,中国人民解放军陆军领导机构、中国人民解放军火箭军、中国人民解放军战略支援部队成立大会在八一大楼隆重举行。陆军是我党最早建立的武装力量,这就不用说了,火箭军是二炮的升级版,体现了大国地位的战略支撑,自不需要讳言,那么这支战略支援部队可就太神秘了。

因为在成立大会上,中共中央总书记、国家主席、中央军委主席习近平向陆军、火箭军、战略支援部队授予军旗并致训词。这就意味着,战略支援部队,是和解放军陆军、海军、空军、火箭军平级的独立军种部队。而相对于陆军的“正名”和第二炮兵到火箭军的“命名”升级,战略支援部队成为解放军自二炮成立以来,诞生的唯一新军种部队。从现代化高技术局部战争来看,陆海空军以及战略核打击部队基本上囊括了主要的作战方式和战场环境,那么这支战略支援部队,又有哪些能耐,能够脱颖而出横空出世呢?

在战略支援部队成立大会上,习主席对战略支援部队进行了如下的定性:战略支援部队是维护国家安全的新型作战力量,是我军新质作战能力的重要增长点。战略支援部队全体官兵要坚持体系融合、军民融合,努力在关键领域实现跨越发展,高标准高起点推进新型作战力量加速发展、一体发展,努力建设一支强大的现代化战略支援部队。

这里面有几个关键词:新型作战力量、新质作战能力、体系融合、军民融合、关键领域。

新华社新闻显示,战略支援部队的首任司令员是高津。网络资料显示高津是江苏靖江人。1985年高津进入解放军第二炮兵指挥学院。2006年7月,晋升少将军衔,担任解放军第二炮兵第52基地司令员。2011年12月,担任中国人民解放军第二炮兵参谋长。2013年8月,晋升中将军衔。2014年7月,调任总参谋长助理。2014年12月,升任军事科学院院长,并取代比其年长1岁的副总参谋长乙晓光中将,成为最年轻的正大军区级将领,也是军事科学院历史上最年轻的院长。

在2015年11月2日,也就是高津在成为战略支援部队司令员的前60天,在《解放军报》上发表了题为“深化国防和军队改革是强军兴军的必由之路”的署名文章。文章中特别提到:世界新军事革命是当今世界大发展大变革大调整的重要构成和关键变量,其速度之快、范围之广、程度之深、影响之大前所未有。面对这场继冷兵器、热兵器、机械化军事革命之后的又一次划时代军事革命,世界主要国家竞相调整军事战略,加紧推进军事转型,以信息化为核心重塑军队组织形态、重构军事力量体系。战争形态处于由机械化向信息化跃升的质变期,核威慑条件下陆海空天网电一体化联合作战日益成为现实,战场从传统空间向极高、极深、极远物理空间和虚拟空间拓展,非对称、非接触、非线式作战样式更趋成熟,制信息权成为夺取战场综合控制权的核心,战争制胜机理深刻改变。

高津司令员所说的核威慑条件下陆海空天网电一体化联合作战,其中的“天”,就绝不是指的火箭军部队的导弹,而是外层空间,“网”则是网络空间,“电”则是电磁空间。现代化高技术局部战争,陆海空军部队仍然是决胜的关键,而争夺的战场也主要在陆海空空间进行,但信息化战争的一个典型特色,就是非对称、非接触、非线式作战,而实现这一转变的关键环节,就是在外层空间、网络空间和电磁空间的“这三个特殊战场”。电磁空间由于受距离和物理隔绝的影响很大,通常只具有战术意义。而外层空间和网络空间,则是极高、极深、极远物理空间和无处不在的虚拟空间,从而具有战略上意义。在这两个战场上的拼杀,没有血肉横飞,但凶险却比常规战场有过之而无不及,军队能否拥有对应的力量建设和健全的指挥反应机构,其结果将对常规战场的胜负产生重要甚至绝定性影响。

这就是“战略支援”的含义所在。从逻辑上推理,中国战略支援部队,很可能就是针对外层空间和网络空间的“新型作战力量”,赋予我军“新质作战能力”新增长点。

为了获得这种“战略支援”的能力,军事大国都曾争相成立天军(外层空间部队)和网军(网络战部队)。美国的外层空间部队,从“政令”体制上,分属陆海空三军部队,包括陆军的空间和导弹防御部队,海军的舰载反导部队、空军的C4ISR和空间卫星使用部队,而在“军令”系统上,这些部队则统一归美国战略司令部指挥。在2009年,美军又在战略司令部之下成立了一个新的下级司令部,即网络战司令部,统一指挥美军陆海空陆战队的网络战部队。

俄罗斯在2011年12月成立了空天防御兵,但当时这一部队仅具有兵种和战役级地位,只有管辖中央军区空天防御部队的权力,但无法解决俄罗斯空提案防御力量统一指挥的问题。2015年8月1日,俄空天防御部队和空军、防空军合并,组成了空天军。也就是现在俄罗斯已经没有了传统意义上的空军。空天防御部队仍将由俄罗斯总参谋部统一指挥,而直接领导将是空天军总司令部。空天军将负责统一管理执勤的空中、防空和反导力量,以及俄罗斯轨道卫星集群航天器的发射和管理。另外,导弹袭击预警系统和太空监控系统也属于空天军管辖范围。

从公开资料上看,目前为止俄罗斯还没有像美军那样成立专门的网络战部队,更没有设立专门的统一指挥机构。

技术的进步,让人类的得以利用外层空间和网络空间,来实现军事上的目的,但这并不意味着大国有机会、有能力、有胆识打破旧有的军队体制,来适应新形态战争的要求。如何构建并统一指挥全国性的外层空间和网络空间防御体系。美国和俄罗斯给我们提供了很多经验教训。

美国和苏联在冷战争霸过程中,曾经耗费巨资开发了大量空间军事平台和武器系统,但美军的空间系统几乎都掌握在空军手中,而苏联则成立了战略火箭军部队。可见,美军是依托军种构建空间防御体系,而前苏联是成立新的军种。

在冷战结束后,俄罗斯在原有战略火箭军的基础上,划出了一个军事航天部队的独立兵种。2011年3月,俄罗斯又以军事航天部队为基础,组建了空天防御兵。然而在美国核武器、全球快速打击、反导等太空力量的压迫下,俄罗斯空天领域仍然是割裂的,痛感其面临的空天袭击威胁日益严峻,而同时本国又没有统一的空天防御指挥机构。为切实维护俄空天领域安全,为实施未来的空天战略性战役创造更好的组织和技术条件,俄军于2015年8月组建了空天军。然而不得不说的是,所谓的空天军,等于俄罗斯回到了美军的老路上,既依托空军重新构件统一的空间防御体系。这说明,俄罗斯虽然认为自身空天所遭受威胁很大,但其经济和技术实力,已经不足以支撑建立一个有发展、有前途的独立军种,而只能在空军的基础上”苟延残喘“。

相对于俄罗斯的无奈,美国空天力量发展则有些故意玩平衡。美国空天力量的主要部分在空军,然而在“反导”这个美军在21世纪最重要的空天军事动作上,主要的操作者却是美国陆军。除了海军的“宙斯盾”导弹防御系统之外,美军的陆基中段反导、THAAD和爱国者终端反导,都是美国陆军在掌控,而且是一帮陆军军人在美国空军基地中操纵电脑。当然,无论是陆海空军人,他们最终都统一听从美军战略司令部的指挥。但美国依托不同军种构建空间防御体系,仍然体现了固有军种平衡思维的思想。这是因为美国军费体量极为庞大,尤其在冷战期间,这使得美军各军种都有资金研究新技术的挑战。而1986年新国防部改组法通过后,美军的做法就是从联合作战司令部的角度,统一“收缴”指挥各军种新作战力量进行整合。而美国网络战司令部的成立,也同样是这一方法的产物。

美军这种方法的优点在于,各军种八仙过海各显神通,最后可以在竞争中优化选择,但缺点在于存在巨大浪费,且各军种在平时互不统属,很难在战时统一行动。固然美军改革突出了联合作战的思想,但各个军种文化毕竟不相同,而且外层空间和网络空间,所需军事人员都数量少、人员精干,如果再人为形成不同军种背景,就有点“为了联合而联合”刻意之感。

相对于美俄,中国军队的优势,是在军事革命的时间尺度上,技术变革和军队变革几乎同步进行、同步起飞,这使得中国军队有机会从顶层设计的高度,在借鉴外军经验教训的基础上,更合理地规划军种建设。而中国国力和科技水平的快速增长,也让中国新军种的建设不至于陷入“巧妇难为无米之炊”的空想尴尬。

在反导领域,中国国防部已经证实,在2010年1月11日、2012年9月11日、2013年1月27日、2014年7月23日分别进行了四次陆基中段反导拦截技术试验。在反卫星领域,中国外交部在2007年1月承认进行了反卫星导弹试验。而外媒猜测在2010年和2013年中国还进行过两次反卫星武器试验,但未获得中方证实。在太空平台上,中国从2010年开始,进入年均15次以上的密集发射阶段,年均卫星增长数量达到20枚左右,建立了天链、北斗、高分、遥感等一系列卫星家族,目前在轨卫星数量已经超过俄罗斯,仅次于美国。在2014年的MH370失联事件中,中国紧急调动海洋、风云、高分、遥感等4个型号,近10颗卫星为地面搜救行动提供技术支持。

在网络技术上,中国已经成为全球互联网和移动互联网用户最多的国家,不但诞生了一批像阿里巴巴、腾讯的世界级网络企业,也出现了像华为这样的网络技术巨头。中国在新一代互联网技术上,已经成为规则的制定者之一。但同时中国也成为世界上受到网络侵害最严重的国家,这就意味着中国必须从战略高度考虑国家的网络安全,其中也包括建立统一的网络防卫力量和体系。

毫无疑问,新军事革命已经证明,外层空间是推进我军“体系融合”的重要高地,而网络空间则是体现“军民融合”的典型范例,这两个空间则是中国军队历史性改革的关键领域。中国战略支援部队的成立,将可能是世界上首次不依托传统军种而建立统一的外层空间和网络空间防御军事力量体系。这项创举必然会在世界新军事革命中写下浓墨重彩的一笔。

Original Source HERE

China’s PLA core mission is winning local wars in conditions of informationization

打贏信息化條件下局部戰爭是軍隊核心任務

來源:解放軍報

In order to win local wars under conditions of informatization, vigorously strengthen military struggle preparation, is a successful experience and important way to guide army building, our army is a major strategic task. Supremely important strategic task. People’s Army Central Military Commission established in accordance with the decisions and arrangements, preparations for military struggle toward a new journey stride forward.

Walking preparations for military struggle rational development road

New China came nearly 60-year history. For decades, the country was much larger rivals, dangerous, but always to stand up, continue to grow and live. There are a lot of successful experience, a very important one is to rely on comprehensive solid preparations for military struggle. It can be said, precisely because of the people’s army “ready”, was created a homeland security steel wall, the guardian of the people’s happiness and peace, prosperity and security of the economic and social development. Recalling decades stormy journey preparations for military struggle, glory Aureole achievements, we should also clearly see that not enough scientific areas. For example, many units ready for Military Struggle, the guiding ideology too much emphasis on specific threats, over-reliance on “the situation stimulus” caused suddenly strong suddenly weak level of combat readiness and combat effectiveness of the construction fluctuated, military preparations did not struggle to maintain autonomy and healthy sustainable development.

Different things when it moves, it is something different equipment variants. Currently, preparations for military struggle and stands at a new historical starting point. National security situation is undergoing complex and profound changes, on the one hand, traditional security threats and non-traditional security threats we face are increasing, the world’s major powers in my peripheral geostrategic competition intensified, neighboring countries, political turbulence, regional security environment, there are many hidden dangers domestic ethnic separatist forces and their activities is rampant, affecting national security instability, increasing uncertainty, preparations for military struggle facing unprecedented challenges; on the other hand, the international unilateralism setback, the financial crisis delayed the expansion of global hegemony, Taiwan situation has eased, I eased pressure on the main strategic directions, preparations for military struggle facing unprecedented opportunities.This opportunity is not only strategic, but also historic. How to seize the opportunity to make good use of the opportunity and momentum forward, the current preparations for military struggle to answer practical proposition. After 30 years of reform and development, army building a qualitative leap, the synthesis of troops, higher level of information, science and technology-intensive, quality and efficiency features more obvious preparations for military struggle with Keziliyong rich results and advancing the jump basic conditions. Into the new century, Hu focused on the special requirements of the party of national defense and army building, giving the army the “three offers, a play,” the historical mission, stressing that “in order to enhance our military must win local wars under information age conditions core, and constantly improve the ability to respond to multiple security threats and accomplish diverse military tasks. ” This series of major strategic thinking, adjust the point of preparations for military struggle to expand the mandate of the contents of preparations for military struggle.Scientific concept of development of this important guidelines established for military combat preparations put a higher demand good seek fast, according to a comprehensive, coordinated and sustainable development and people-oriented standards, there are many ideas need liberation, a lot of work need to innovate, many aspects need to be improved.

Advance preparations for military struggle in the new situation, because of the situation must change, because of the situation set policy, based on a new starting point, to seek new development. Should be based on the threat of grasping ready to strengthen all-round “threat awareness” and “enemy concept,” war is not far away and do not fully understand the only one of the grim reality, unswervingly push forward preparations for military struggle. Should be prepared based on the task grasp the fundamental task of the military is to fight and ready to fight, the battle can not fight a hundred years, but not a moment to relax ready, you must follow the standard effective functioning of the mission, to promote a comprehensive and systematic preparations for military struggle. Should be based on the ability to catch ready, out of the enemy carried away by emergency preparedness passive mode, active design of future wars, there are plans to increase planned to respond to multiple security threats and accomplish diverse military tasks ability, steadily push forward the scientific military preparations struggle.

In major breakthroughs improve the quality of preparations for military struggle

Unfocused no strategy, no emphasis on difficult to break. Make full use of important strategic opportunities, to seize the key content to seek a breakthrough, not only to follow the objective requirements of preparations for military struggle inherent laws, it is an urgent need to comprehensively improve the combat capability of the armed forces.

Practice basic military training as a peacetime army, and combat effectiveness is the basic way of development, is the most direct and most effective preparations for military struggle.We must further enhance awareness of the importance of military training, military training to effectively attach strategic position, really big catch in the army military training, training vigorously promote the formation of a new upsurge in transition. Joint training should seize the key to the combat effectiveness, strengthen joint awareness, improve the quality of the joint, improve joint training and regulations, improve the mechanism of joint training, promoting joint military training from form to substance. Should be training in complex electromagnetic environments as an important entry point and the starting point, and actively explore the organization and command training, research and technological measures for an effective way to combat training and weapons training, operational use, accelerating military training under conditions of mechanization to military training in conditions of informationization change. Training mission should be subject to the carrier, active configuration set up similar to actual battlefield environment, explore the combat training, field based training and base training, simulated training and network training as the main way to really, hard, in fact, test standards to test than pulling mechanism for the implementation of the path of combat training, enhance training effectiveness. Should actively carry out non-war military operations training to improve forces to carry out non-war military operations expertise, empowerment troops accomplish diverse military tasks.

People are fighting the various elements of the most active and most active element, talent preparations for military struggle preparation is the most important and the most difficult to prepare. Outcome of a war depends on the battlefield, but the link was to decide the outcome in the usual competition, in which the focus is talent. Currently, the key is to highlight the joint operations command personnel and high-level professional and technical personnel two “strategic starting point”, traction and promote the overall development of qualified personnel capacity building. Protruding joint operations command personnel training, establish and improve strategic and operational focus on training to improve pattern-level commanders around the joint operations to improve personnel training system, the reform of teaching contents and methods of joint operations, commanding officers to increase job rotation and cross-training, step up joint operational command emergency personnel training, strengthen and improve measures. Outstanding high-level professional and technical personnel training. Follow focus, both in general, to seize the lead, lead the overall principle, focus on training across disciplines planning to organize major research projects of leading scientists, to promote discipline capable of directing talents academic technology innovation and development, equipment and technology to solve complex security technical expert personnel problems, and provide a strong intellectual support information technology.

Soldiers rapidly guiding the iron law of war, under conditions of informationization more emphasis on “speed advantage.” Rapid response capacity has become an important indicator to measure the army’s combat readiness and combat capabilities. Should sound an agile and efficient emergency command mechanism. In recent years, the basis of summing up our military to accomplish diverse military tasks practical experience, grasp curing and conversion-related outcomes, the establishment of emergency response mechanisms and improve the regulatory system, improve the mechanism set up to develop response plans, organize relevant study and training, to ensure that if something happens quick response, efficient command, correct action. Should establish advanced and reliable command information system. In accordance with good interoperability, responsive, security and information sharing requirements established in the end longitudinal, transverse to the edge of the information networks and integrated one, simple hierarchy of command system, relying on information technology to improve emergency response command and rapid response capability. Grasp the strategic delivery of capacity-building characteristics and laws, focusing on the development of strategic transport aircraft (ship), military helicopters and new aircraft, and consider traffic battlefield, explore the establishment of smooth and efficient command and management mechanism, the overall advancement of the strategic transportation capacity building.

Security is a combat. Modern warfare combat operations at any one time, against all the system, comprehensive security have become increasingly demanding. Promoting military struggle preparation, must comprehensively improve the combat support, logistics and equipment support and other comprehensive support capabilities. Our military has historically focused on promoting the coordination of combat forces and combat support forces, reconnaissance, early warning, command and communications, mapping navigation, meteorology and hydrology, engineering, chemical defense and other support to improve the ability to achieve overall synchronization. However, with the continuous expansion and development of the situation changes in battlefield space combat support capability system began to appear new “short board” must be filled as soon as possible to form the overall advantages of joint operations full-dimensional battlefield. Logistics focus is to improve the level of modernization. In accordance with the requirements of the development, the steady implementation of the logistics reform, to promote the integration of the security system to protect the way to the community development, support means to move information, logistics management to scientific change, and promote sound and rapid development of the logistics building. Focusing on strengthening security equipment supporting construction. Improve the capability of independent innovation, accelerate the construction and development of new weapons and equipment, and constantly optimize the structure of armament systems.Focusing on supporting systems and equipment, and security systems supporting supporting construction, improve the equipment series, universal, standardized level, and gradually promote the formation of the organized system equipped to combat and support capabilities, accelerate the establishment of military and civilian production, integrating the armed forces weapons and equipment research and production system and maintenance support system, and further improve the integration of military and civilian equipment development path.

Adhere to scientific development and innovation of military struggle preparation path

Advance preparations for military struggle in the new starting point, we must adhere to the scientific concept of development as guidance, the practical application of the requirements of the times thinking, to explore the development path of innovation and preparations for military struggle.

Continue to emancipate the mind, reform of the army in the tide of the overall advancement of military preparations struggle. The more in-depth preparations for military struggle, the more touches concept of development, institutional mechanisms, policies and systems and other aspects of deep-seated contradictions and problems, and promote the greater the difficulty. The fundamental way to solve these problems, is to continue to emancipate the mind, deepen reform of national defense and army building. Strategic objectives of military reform is building computerized armed forces and winning the information war, which point preparations for military struggle is the same. Preparations for military struggle is the leading military reform and traction, military reform is an important part of preparations for military struggle and optimized conditions, both unity of purpose, mutually reinforcing. Thus, under the new situation to promote the preparations for military struggle, must be combined with promoting defense and military reform, to improve the combat effectiveness as a starting point and goal of reform, with the standards and unify thought reform measure reform measures, testing the effectiveness of reform, promote reform in preparations for military struggle.

Strengthen scientific co-ordination, in the process of modernization of the armed forces to coordinate the promotion preparations for military struggle. Military modernization is a big system, military struggle preparation is the key indeed affect the whole body. Well prepared for military struggle, will be able to provide clear and specific requirements for the overall development of our military modernization construction, provide real starting point, forming a huge traction force. Must stand on military modernization development overall perspective, the effective co-ordination with the main good times, far and near, and built with an equal relationship, the process of preparations for military struggle becomes strengthen military modernization process, the process of military modernization into service the process of preparations for military struggle, so that the two complement each other to promote the coordinated development.

Leading Position of Information, in the mode of generating combat transition to push ahead with preparations for military struggle. Currently, information technology is profoundly changing the mode of generating combat, is also changing all aspects of army building. Promoting military struggle preparation, must quickly adapt to this new situation, take the initiative out of the mindset of mechanization to strengthen the concept of information-led, focusing on scientific and technological progress to improve combat effectiveness, explore innovative adaptation of information requirements of the military concept of war, military technology, military organization and military management, focus on improving the training of military personnel, weapons and equipment development, the level of information the best combination of people and weapons, accelerate the transformation of military training, and gradually establish an effective mechanism to combat the new generation and improve and promote preparations for military struggle to achieve a qualitative leap.

Prominent real traction in accomplishing diversified military tasks to accelerate preparations for military struggle. Practice tells us that no matter how the evolution of the international situation, how to expand the Functions of the Army, how onerous diverse military tasks, containment and win wars, preservation of peace is always the most important functions of the army and winning conditions under local war always is the core mission of our military. Only with the core military capabilities and accomplish diverse military tasks have a solid foundation. We must always take to improve the core military capabilities in the first place, aimed at promoting the fundamental function fully prepared, ready to do more hands without “one-track mind,” not ready to classify “one size fits all”, without further preparation, “superficial”, trying to force the ability to adapt to various conditions, to cope with various situations and accomplish diverse military tasks.

Original Mandarin Chinese:

以打贏信息化條件下局部戰爭為重點,大力加強軍事鬥爭準備,是軍隊建設的一條成功經驗和重要指導方式,是我軍一項重大的戰略任務。戰略任務重千鈞。人民軍隊按照中央軍委既定的決策部署,向著軍事鬥爭準備新徵程闊步邁進。

走軍事鬥爭準備理性化發展之路

新中國走過近60年歷程。幾十年來,國家一度強敵環伺、危機四伏,卻始終屹立不屈,不斷生息壯大。成功的經驗有很多,很重要的一條就是靠全面扎實的軍事鬥爭準備。可以説,正是有了人民軍隊“時刻準備著”,才鑄就了祖國安全的鋼鐵長城,守護了人民群眾的幸福安寧,保障了經濟社會的繁榮發展。回顧幾十年軍事鬥爭準備的風雨徵程,在成績的榮耀光環背後,我們也要清醒看到不夠科學的地方。比如不少單位抓軍事鬥爭準備,在指導思想上過于強調具體威脅,過度依賴“情況刺激”,造成戰備水平忽強忽弱,戰鬥力建設忽高忽低,軍事鬥爭準備沒有保持自主、健康地持續發展。

時異則事移,事異則備變。當前,軍事鬥爭準備又站在了一個嶄新的歷史起點上。國家安全形勢發生復雜深刻變化,一方面,我們面臨的傳統安全威脅和非傳統安全威脅都在增加,世界主要大國在我周邊地緣戰略競爭不斷加劇,周邊國家政局持續動蕩,地區安全環境存在諸多隱患,國內民族分裂勢力及其活動猖獗,影響國家安全的不穩定、不確定因素增多,軍事鬥爭準備面臨前所未有的挑戰;另一方面,國際上單邊主義受挫,金融危機拖延了全球霸權擴張,臺海形勢明顯緩和,我主要戰略方向壓力有所減輕,軍事鬥爭準備面臨前所未有的機遇。這個機遇既是戰略性的,也是歷史性的。怎樣抓住機遇、用好機遇、乘勢推進,是當前軍事鬥爭準備需要回答的現實命題。經過30年改革發展,我軍建設出現質的跨越,部隊合成化、信息化程度更高,科技密集型、質量效能型特徵更加明顯,軍事鬥爭準備有了可資利用的豐富成果和推進躍升的基礎條件。進入新世紀新階段,胡主席著眼黨對國防和軍隊建設的特殊要求,賦予軍隊“三個提供、一個發揮”的歷史使命,強調“我軍必須以增強打贏信息化條件下局部戰爭能力為核心,不斷提高應對多種安全威脅、完成多樣化軍事任務的能力”。這一係列重大戰略思想,調整了軍事鬥爭準備的基點,拓展了軍事鬥爭準備的任務內容。科學發展觀這一重要指導方針的確立,對軍事鬥爭準備提出了好中求快的更高要求,按照全面、協調、可持續發展和以人為本的標準來衡量,還有很多思想需要解放,很多工作需要創新,很多方面需要提高。

新形勢下推進軍事鬥爭準備,必須因勢求變、因情定策,立足新的起點,謀求新的發展。應基于威脅抓準備,強化全方位的“威脅意識”和“敵情觀念”,充分認清戰爭並不遙遠且不只一種的嚴峻現實,堅定不移地推進軍事鬥爭準備。應基于任務抓準備,軍隊的根本任務是打仗和準備打仗,仗可以百年不打,但準備一刻也不能放松,必須按照有效履行職能使命的標準,全面係統地推進軍事鬥爭準備。應基于能力抓準備,跳出被敵情牽著走的被動應急準備模式,主動設計未來戰爭,有規劃有計劃地提高應對多種安全威脅、完成多樣化軍事任務能力,穩步科學地推進軍事鬥爭準備。

以重點突破提高軍事鬥爭準備質量

沒有重點就沒有戰略,沒有重點就難以突破。充分利用重要戰略機遇期,抓住重點內容謀求突破,既是遵循軍事鬥爭準備內在規律的客觀要求,更是全面提高部隊實戰能力的迫切需要。

軍事訓練作為和平時期軍隊最基本的實踐活動,是戰鬥力生成和發展的基本途徑,是最直接、最有效的軍事鬥爭準備。必須進一步提高對軍事訓練重要性的認識,切實把軍事訓練擺到戰略位置,真正在部隊形成大抓軍事訓練、大力推進訓練轉變的新高潮。應抓住聯合訓練這個戰鬥力生成的關鍵環節,強化聯合意識,提高聯合素質,健全聯訓法規,完善聯訓機制,推動軍事訓練從形式到實質的聯合。應以復雜電磁環境下訓練為重要切入點和抓手,積極探索組織指揮訓練、戰技術對策研練和武器裝備操作使用訓練的有效辦法,加速推進機械化條件下軍事訓練向信息化條件下軍事訓練轉變。應以使命課題訓練為載體,積極構設近似實戰的戰場環境,探索以對抗訓練、野戰化訓練和基地化訓練、模擬化訓練、網絡化訓練等為主要方式,以真、難、實為檢驗標準,以考、比、拉為落實機制的實戰化訓練路子,增強訓練實效。應積極開展非戰爭軍事行動訓練,提高部隊遂行非戰爭軍事行動專業技能,增強部隊完成多樣化軍事任務的能力。

人是戰鬥力諸要素中最積極、最活躍的要素,人才準備是軍事鬥爭準備中最重要、最艱巨的準備。戰爭勝負決于戰場,但決定勝負的環節卻在平時的競爭之中,其中的重點就是人才。當前,關鍵是要突出聯合作戰指揮人才和高層次專業技術人才兩個“戰略抓手”,牽引和推動人才隊伍能力建設的整體發展。突出聯合作戰指揮人才培養,重點建立健全戰略戰役層次指揮員培養提高模式,圍繞完善聯合作戰人才培訓體係、改革聯合作戰教學內容和方法、加大指揮軍官崗位輪換和交叉培訓力度、加緊聯合作戰指揮人才應急培訓等,加強和完善有關措施。突出高層次專業技術人才培養。按照突出重點、兼顧一般、抓住龍頭、帶動整體的原則,重點培養能夠跨學科領域謀劃組織重大項目攻關的科技領軍人才、能夠指導推進學術技術創新發展的學科拔尖人才、能夠解決裝備技術保障復雜難題的技術專家人才,為信息化建設提供強有力的智力支撐。

兵貴神速是戰爭指導的鐵律,信息化條件下更強調“速度優勢”。快速反應能力已成為衡量一支軍隊戰備水平和實戰能力的重要標志。應健全靈敏高效的應急指揮機制。在總結梳理近年我軍完成多樣化軍事任務實踐經驗的基礎上,抓好相關成果的固化和轉化,建立應急機制,健全法規制度,完善機構設置,制定應對預案,組織相關研練,確保一旦有事能快速反應、高效指揮、正確行動。應建立先進可靠的指揮信息係統。按照互操作性好、反應靈敏、安全保密和信息共享的要求,建立縱向到底、橫向到邊的信息網絡和綜合一體、層級簡捷的指揮係統,依靠信息技術提高應急指揮與快速反應能力。把握戰略投送能力建設的特點規律,重點發展戰略運輸機(艦)、軍用直升機和新型航行器,統籌考慮交通戰場建設,探索建立順暢高效的指揮管理機制,整體推進戰略輸送能力建設。

保障也是戰鬥力。現代戰爭中的任何一次作戰行動,都是體係的對抗,對綜合保障的要求越來越高。推進軍事鬥爭準備,必須全面提高作戰保障、後勤保障和裝備保障等綜合保障能力。我軍歷來注重協調推進作戰力量與作戰保障力量建設,偵察預警、指揮通信、測繪導航、氣象水文、工程防化等保障能力總體實現了同步提高。但隨著形勢的發展變化和戰場空間的不斷拓展,作戰保障能力體係開始出現新的“短板”,必須盡快補齊,以形成全維戰場的聯合作戰整體優勢。後勤保障重點是提高現代化水平。按照時代發展要求,穩步實施後勤改革,將保障體制向一體化推進、保障方式向社會化拓展、保障手段向信息化邁進、後勤管理向科學化轉變,推動後勤建設又好又快發展。裝備保障重點是加強配套建設。提高自主創新能力,加快新型武器裝備建設發展,不斷優化我軍武器裝備結構體係。注重裝備的體係配套、係統配套和保障配套建設,提高裝備係列化、通用化、標準化水平,逐步推進裝備成係統成建制形成作戰能力和保障能力,加快建立軍民結合、寓軍于民的武器裝備科研生産體係和維修保障體係,進一步完善軍民融合發展裝備的路子。

堅持科學發展創新軍事鬥爭準備路徑

在新的起點上推進軍事鬥爭準備,必須堅持以科學發展觀為指導,切實運用符合時代要求的思維方式,探索創新軍事鬥爭準備的發展路徑。

繼續解放思想,在軍隊改革大潮中整體推進軍事鬥爭準備。軍事鬥爭準備越深入,觸及發展理念、體制機制、政策制度等方面的深層次矛盾和問題就越多,推進的難度也越大。解決這些問題的根本出路,在于繼續解放思想、深化國防和軍隊建設改革。軍隊改革的戰略目標是建設信息化軍隊、打贏信息化戰爭,這與軍事鬥爭準備的基點是一致的。軍事鬥爭準備是軍隊改革的龍頭和牽引,軍隊改革則是軍事鬥爭準備的重要內容和優化條件,二者目標一致、互為促進。因此,新形勢下推進軍事鬥爭準備,必須與推進國防和軍隊改革結合起來,把提高戰鬥力作為改革的出發點和落腳點,用戰鬥力標準統一改革思想,衡量改革措施,檢驗改革成效,在改革中推進軍事鬥爭準備。

加強科學統籌,在軍隊現代化建設進程中協調推進軍事鬥爭準備。軍隊現代化建設是個大係統,軍事鬥爭準備則是牽一發而動全身的關鍵。軍事鬥爭準備做好了,就能為我軍現代化建設整體發展提供明確具體的需求,提供實實在在的抓手,形成巨大的牽引力量。必須站在軍隊現代化建設發展全局的高度,切實統籌好主與次、遠與近、建與用等關係,把軍事鬥爭準備的過程變成加強軍隊現代化建設的過程,把軍隊現代化建設的過程變成服務軍事鬥爭準備的過程,使二者互為促進,協調發展。

堅持信息主導,在戰鬥力生成模式轉變中創新推進軍事鬥爭準備。當前,信息技術正在深刻改變著戰鬥力生成模式,也在改變著軍隊建設的方方面面。推進軍事鬥爭準備,必須敏銳地適應這個新形勢,主動跳出機械化思維定勢,強化信息主導觀念,注重依靠科技進步提高戰鬥力,探索創新適應信息化戰爭要求的軍事理念、軍事技術、軍事組織和軍事管理,著力提高軍事人才培養、武器裝備發展、人與武器最佳結合的信息化水平,加快推進軍事訓練轉變,逐步確立新型戰鬥力生成與提高的有效機制,推動軍事鬥爭準備實現質的躍升。

突出實戰牽引,在完成多樣化軍事任務中加速推進軍事鬥爭準備。實踐告訴我們,無論國際局勢如何演變、軍隊的職能使命如何拓展、多樣化軍事任務多麼繁重,遏制戰爭、打贏戰爭、維護和平始終是我軍職能的重中之重,打贏信息化條件下局部戰爭永遠是我軍的核心任務。只有具備了核心軍事能力,完成多樣化軍事任務才有堅實基礎。必須始終把提高核心軍事能力放在首要位置,瞄準根本職能推進全面準備,做到多手準備而不“單打一”,分類準備而不“一刀切”,深入準備而不“表面化”,努力使部隊具備適應各種條件、應對各種情況、完成多樣化軍事任務的能力。

Source: PLA Daily

Originally Published 2009年01月08日

中國網絡衝突討論,信息與研究 // Chinese Cyber Conflict Discussions, Information & Research