Tag Archives: #Artificial #Intelligence

STRENGTHENING THE FOUNDATION FOR CHINESE MILITARY INTELLIGENT TRANSFORMATION

加強中國軍事情報轉型的基礎

現代英語:

The nature of warfare is rapidly evolving towards intelligence. The intelligent transformation of the military is not merely a simple accumulation of technologies, but a systemic change supported by data, algorithms, and computing power. These three elements mutually empower and organically integrate, forming the technological foundation for generating new combat capabilities. To accelerate the intelligent development of the military, we must deeply grasp the technological logic of intelligent transformation, solidify the data foundation, activate the algorithm engine, and strengthen computing power support to provide a solid guarantee for winning future intelligent wars.

Operational data: the “digital cornerstone” of intelligent transformation

Data is the “lifeblood” of intelligence. Without the accumulation of high-quality, large-scale, and multi-dimensional operational data, the transformation of military intelligence will be like water without a source or a tree without roots. In intelligent warfare, all activities across the entire chain, including battlefield perception, command and decision-making, and combat operations, are essentially processes of data generation, flow, processing, and application. The completeness, accuracy, and timeliness of operational data directly determine the perception precision, decision-making speed, and strike accuracy of intelligent systems, and are an indispensable cornerstone for the intelligent transformation of the military field.

The core value of operational data lies in breaking through the “fog of war” and enabling a shift from experience-driven to data-driven approaches. In traditional warfare, commanders primarily rely on battlefield reconnaissance, intelligence analysis, and combat experience to make decisions. Limited by the breadth and depth of information acquisition, these decisions often carry a degree of subjectivity and limitation. However, in the era of intelligent warfare, a single reconnaissance drone can transmit 5GB of image data per second, and satellite networks constantly track tens of thousands of ground targets, resulting in a geometrical increase in the rate of battlefield data generation. This operational data, originating from multiple domains including land, sea, air, space, cyber, electronic, and psychological domains, can, after standardized processing and in-depth analysis, construct a transparent battlefield situation across all domains, providing commanders with precise decision-making support.

Building a comprehensive operational data resource system requires focusing on key aspects of the entire lifecycle governance. In the data acquisition phase, it’s essential to base data acquisition on the needs of all-domain operations, broaden data source channels, and achieve full coverage of data in both traditional and new domains. Traditional domains should focus on land, sea, and air battlefields, accurately collecting data on troop deployments, equipment performance, and terrain. New domains should extend to outer space, deep sea, polar regions, and cyberspace, prioritizing the collection of data on space target trajectories, deep-sea environmental parameters, and cyberspace situational awareness. In the data fusion and processing phase, a unified data standard system must be established to address prominent issues such as multiple values ​​for a single data point and inconsistent formats, achieving interconnectivity between data from different sources and of different types. In the data sharing phase, a sound cross-domain sharing mechanism must be established, along with tiered and categorized sharing rules, breaking down service-specific barriers, departmental boundaries, and network isolation to build a ubiquitous, all-encompassing, and interconnected data sharing environment, maximizing the utilization of data resources.

To fully leverage the multiplier effect of combat data, the key lies in cultivating data-driven thinking and building a strong professional team. Data-driven thinking is the prerequisite for activating data value. It is essential to guide officers and soldiers to develop the habit of “thinking with data, speaking with data, managing with data, and making decisions with data,” abandoning traditional thinking patterns based on experience and intuition. In operational planning, quantitative analysis should be based on data; in training evaluation, precise measurement should be based on data standards; and in equipment development, iterative optimization should be supported by data. Simultaneously, efforts should be focused on building a professional data talent team, clarifying the responsibilities of each position, and connecting the entire process from data generation to data application. Through various means such as academic training, on-the-job experience, and specialized training, the professional skills of officers and soldiers in data collection, processing, analysis, and application should be improved, creating a composite talent team that understands both military operations and data technology, providing talent support for releasing the value of data.

Specialized Algorithms: The “Digital Engine” of Intelligent Transformation

If data is the “fuel” of intelligence, then algorithms are the “engine” that transforms fuel into power. Specialized algorithms, as the core driving force of military intelligence, are the key link in realizing the transformation of data into knowledge, knowledge into decision-making, and decision-making into combat effectiveness. In intelligent warfare, the quality of algorithms directly determines the reaction speed, decision-making accuracy, and combat effectiveness of the combat system, becoming the engine of intelligent transformation in the military field.

The core advantage of algorithms lies in reconstructing the operational chain and achieving rapid iteration of the OODA loop. In traditional warfare, the chain of observation, judgment, decision-making, and action is lengthy and often struggles to adapt to rapidly changing battlefield situations due to limitations in human processing capabilities. Intelligent algorithms, however, can leverage machine learning, deep learning, and other technologies to process massive amounts of operational data in seconds, perform real-time analysis, and uncover patterns, significantly shortening the decision-making cycle. In simulation tests, foreign military AI command systems generated multiple complete operational plans in a very short time, demonstrating response speed and decision-making efficiency far exceeding that of human command teams, fully showcasing the enormous advantages of algorithms in accelerating the decision-making process. In combat operations, algorithms can span the entire chain, from reconnaissance and perception, command and decision-making, fire strikes, and effect assessment, constructing an autonomous, closed-loop “kill chain.” From target identification to threat ranking, from plan generation to fire allocation, from strike implementation to damage assessment, algorithms can autonomously complete a series of complex tasks, achieving a “detect and destroy” operational effect.

Enhancing the practical application effectiveness of algorithms requires strengthening technological innovation and scenario empowerment. In terms of technological innovation, it is essential to keep pace with the development trends of artificial intelligence and accelerate the military application transformation of cutting-edge algorithms. Focusing on emerging technologies such as generative AI, neuromorphic computing, and brain-computer interfaces, we should explore pathways for the deep integration of algorithms with military needs. Regarding scenario empowerment, we must build diverse typical scenarios for algorithms based on actual combat requirements, develop specialized algorithms for target recognition, situational assessment, and virtual training, overcome bottlenecks in information processing in complex electromagnetic environments, promote the modularization and lightweight transformation of algorithms, and rapidly integrate them with command and control systems and unmanned equipment systems. This will allow algorithms to continuously iterate and optimize in specific tasks within typical scenarios, transforming algorithmic advantages into practical combat capabilities.

Strengthening algorithm security is crucial for ensuring the steady and sustainable development of intelligent transformation. While algorithms enhance combat effectiveness, they also face security risks such as tampering, deception, and misuse, potentially leading to serious consequences like “algorithmic runaway.” It is essential to establish an algorithm security review mechanism to conduct full-process security assessments of algorithm models in military intelligent systems, focusing on their reliability, transparency, and controllability to prevent algorithmic bias and logical vulnerabilities. Strengthening the research and development of algorithmic countermeasures technologies is also vital. This involves improving the anti-interference and anti-attack capabilities of our own algorithms while mastering techniques to interfere with and deceive enemy algorithms, thus gaining the initiative in algorithmic confrontation. Simultaneously, it is crucial to emphasize algorithmic ethics, clearly defining the boundaries and rules of algorithm application to ensure that algorithm development and use comply with international laws and ethical standards, avoiding any violations of war ethics.

Supercomputing Power: The “Digital Energy” for Intelligent Transformation

Computing power is the fundamental capability supporting data processing and algorithm execution, much like the “energy support” for intelligent systems. In the transformation towards military intelligence, the explosive growth of data and the increasing complexity of algorithms have placed unprecedented demands on computing power. The scale, speed, and reliability of supercomputing power directly determine the operational efficiency and combat effectiveness of military intelligent systems, becoming the driving force behind the intelligent transformation of the military field.

The core role of computing power lies in overcoming performance bottlenecks and supporting the efficient operation of complex intelligent tasks. The demand for computing power in intelligent warfare exhibits an “exponential growth” characteristic: an advanced AI command system needs to run thousands of algorithm models simultaneously when processing battlefield data across the entire domain; a swarm of drones performing collaborative combat missions requires real-time interaction and decision-making calculations involving massive amounts of data; a large-scale virtual combat training exercise needs to simulate the interactive behaviors of tens or even hundreds of thousands of combat units. The completion of these complex tasks is inseparable from powerful computing power. Without sufficient computing power, even the highest quality data cannot be processed quickly, and even the most advanced algorithms cannot operate effectively. Currently, computing power has become a crucial indicator for measuring the level of military intelligence; whoever possesses stronger computing power holds the initiative in intelligent warfare.

Building a computing power system adapted to the needs of intelligent transformation requires creating a collaborative computing power layout across the cloud, edge, and terminal. In the cloud, distributed cloud computing centers need to be constructed to build a computing power foundation that covers the entire domain and is elastically scalable. Relying on infrastructure such as big data centers and supercomputing centers, various computing resources should be integrated to form a large-scale, intensive computing power supply capability. At the edge, computing power should be deployed more readily, enhancing the autonomous computing capabilities of the battlefield. For special scenarios such as forward positions, naval vessels, and air platforms, miniaturized, low-power, and highly reliable edge computing nodes should be developed to transfer some computing tasks from the cloud to the edge. This reduces reliance on communication links and data transmission latency, and ensures that combat units can autonomously complete basic tasks such as target identification, path planning, and coordination even in extreme environments such as communication interruptions or signal blackouts, thus improving the system’s survivability. At the terminal, the built-in computing power of equipment should be strengthened to improve the intelligence level of individual combat platforms. By embedding high-performance AI chips into platforms such as drones, unmanned vehicles, and missile weapons, equipment is endowed with the ability to autonomously perceive, make decisions, and act, making it an intelligent unit with independent combat capabilities and laying the foundation for cluster collaboration and system-on-system confrontation.

Enhancing the combat readiness of computing power support requires strengthening technological innovation and security protection. In terms of technological innovation, it is crucial to keep pace with the development trends of computing power technology and accelerate the military application of new computing technologies. Focusing on cutting-edge areas such as quantum computing, photonic computing, and neuromorphic computing, we must break through the performance bottlenecks of traditional computing architectures and develop disruptive new computing power equipment. Simultaneously, we must strengthen the construction of computing power networks, building high-bandwidth, low-latency, and interference-resistant computing power transmission networks. By integrating technologies such as 5G, 6G, and satellite communication, we can ensure computing power collaboration and data interaction between the cloud, edge, and terminals, achieving seamless connection and efficient scheduling of computing power resources. In terms of security protection, we must establish a computing power security system to prevent the risks of attacks, hijacking, and misuse of computing power resources. By adopting technologies such as encrypted computing and trusted computing, we can ensure the security and privacy of data during the computing process; strengthen the physical and network protection of computing power facilities, and build a multi-layered, all-round protective barrier to ensure that the computing power system can operate stably in wartime and is not subject to enemy interference or damage.

現代國語:

戰爭形態正加速向智慧化演進,軍事領域的智慧轉型絕非單純的技術疊加,而是以數據、演算法、算力為核心支撐的體系性變革,三者相互賦能、有機融合,構成了新型戰鬥力生成的技術基礎。加速軍事領域智慧化發展進程,應深刻掌握智慧轉型的技術邏輯,夯實數據基石、啟動演算法引擎、做強力支撐,為打贏未來智慧化戰爭提供堅實保障。

作戰數據:智慧轉型的“數位基石”

數據是智慧化的“血液”,沒有高品質、大規模、多維度的作戰數據積累,軍事智慧轉型就會成為無源之水、無本之木。在智慧化戰爭中,戰場感知、指揮決策、作戰行動等全連結活動,本質上都是資料的產生、流轉、處理與應用過程。作戰數據的完備性、準確性和時效性,直接決定了智慧系統的感知精度、決策速度和打擊準度,是軍事領域智慧轉型不可或缺的基石。

作戰資料的核心價值在於打破“戰爭迷霧”,實現從經驗驅動到數據驅動的轉變。在傳統戰爭中,指揮官主要依賴戰場偵察、情報研判和實戰經驗來做出決策,受限於資訊獲取的廣度和深度,決策往往帶有一定的主觀性和限制。而在智慧化戰爭時代,一架偵察無人機每秒可傳回5GB影像數據,衛星網路時刻追蹤成千上萬個地面目標,戰場數據生成速率呈幾何級數增長。這些來自陸、海、空、天、網、電、心理等多域的作戰數據,經過規範化處理和深度挖掘後,能夠建構起全局透明的戰場態勢,為指揮官提供精準決策支撐。

建構全域覆蓋的作戰資料資源體系,需要抓好全生命週期治理的關鍵環節。在資料擷取環節,要立足全域作戰需求,拓寬資料來源管道,實現傳統空間與新域空間的資料全覆蓋。傳統空間要聚焦陸戰場、海戰場、空戰場等傳統領域,精準採集兵力部署、裝備性能、地形地形等資料;新域空間要向太空、深海、極地、網路空間等領域延伸,重點收集太空目標軌跡、深海環境參數、網路空間態勢等資料。在資料融合處理環節,要建立統一的資料標準體系,解決「一數多值」「格式不一」等突出問題,實現不同來源、不同類型資料的互聯互通。在資料共享環節,要健全跨域共享機制,建立分級分類共享規則,打破軍種壁壘、部門界限和網路隔離,建構「無所不在、無所不含、無所不聯」的數據共享環境,實現數據資源的最大化利用。

發揮作戰數據的戰鬥力倍增效應,關鍵在於培育數據思維與建強專業隊伍。數據思維是啟動數據價值的前提,要引導官兵養成「用數據思考、用數據說話、用數據管理、用數據決策」的行為習慣,摒棄憑經驗、靠直覺的傳統思維模式。在作戰籌劃中,要以數據為依據進行量化分析;在訓練評估中,要以數據為標準進行精準衡量;在裝備研發中,要以數據為支撐進行迭代優化。同時,要著力建構專業化的資料人才隊伍,明確各環節職務職責,貫通從資料產生到資料運用的全流程連結。透過院校培養、職缺歷練、專案訓練等多種方式,提升官兵資料收集、處理、分析、運用的專業技能,打造一支既懂軍事業務又通資料技術的複合型人才隊伍,為資料價值釋放提供人才支撐。

專業演算法:智慧轉型的“數位引擎”

如果說數據是智慧化的“燃料”,那麼演算法就是將燃料轉化為動力的“引擎”。專業演算法作為軍事智慧的核心驅動力,是實現數據向知識、知識向決策、決策轉化為戰鬥力的關鍵環節。在智慧化戰爭中,演算法的優劣直接決定了作戰體系的反應速度、決策精準度和對抗效能,成為軍事領域智慧轉型的引擎。

演算法的核心優勢在於重構作戰鏈路,實現OODA循環的極速迭代。傳統作戰中,觀察、判斷、決策、行動的連結較長,受限於人工處理能力,往往難以適應瞬息萬變的戰場態勢。而智慧演算法能夠依賴機器學習、深度學習等技術,對海量作戰資料進行秒級處理、即時分析與規律挖掘,大幅縮短決策週期。外軍AI軍事指揮系統在模擬測試中,僅用很短時間就生成多套完整作戰方案,響應速度和決策效率遠超人類指揮團隊,充分展現了演算法在加速決策流程中的巨大優勢。在作戰行動中,演算法能夠貫穿偵察感知、指揮決策、火力打擊、效果評估等全鏈路,建構自主閉環的「殺傷鏈」。從目標識別到威脅排序,從方案生成到火力分配,從打擊實施到毀傷評估,演算法能夠自主完成一系列複雜任務,實現「發現即摧毀」的作戰效果。

提升演算法的實戰應用效能,需要強化技術創新與場景賦能。在技​​術創新方面,要緊跟人工智慧發展趨勢,加速前沿演算法的軍事應用轉換。聚焦生成式AI、神經形態運算、腦機介面等新技術方向,探索演算法與軍事需求的深度融合路徑。在場景賦能方面,要立足實戰需求建構多元演算法典型場景,研發目標辨識、態勢研判、虛擬訓練等專用演算法,突破複雜電磁環境資訊處理瓶頸,推動演算法模組化、輕量化改造,與指揮控制系統、無人裝備系統快速整合,讓演算法在典型場景具體任務中不斷迭代優化,讓優勢轉化為最佳化演算法。

築牢演算法安全防線,是確保智慧轉型行穩致遠的重要保障。演算法在帶來作戰效能提升的同時,也面臨被竄改、被欺騙、被濫用等安全風險,甚至可能出現「演算法失控」的嚴重後果。要建立演算法安全審查機制,對軍事智慧系統中的演算法模型進行全流程安全評估,重點在於審查演算法的可靠性、透明度和可控性,防止演算法偏見、邏輯漏洞等問題。加強演算法對抗技術研發,既要提升己方演算法的抗干擾、抗攻擊能力,也要掌握幹擾、欺騙敵方演算法的技術手段,在演算法對抗中佔據主動。同時,要注重演算法倫理建設,明確演算法應用的邊界和規則,確保演算法的研發和使用符合國際法律和倫理標準,避免違反戰爭倫理的情況。

超智算力:智慧轉型的“數位能量”

算力是支撐資料處理和演算法運作的基礎能力,如同智慧化體系的「能量支撐」。在軍事智慧轉型中,數據的爆炸性成長和演算法的複雜化發展,對算力提出了前所未有的高要求。超智算力的規模、速度和可靠性,直接決定了軍事智慧系統的運作效率和實戰效能,成為軍事領域智慧轉型的動力系統。

算力的核心作用在於突破性能瓶頸,支撐複雜智慧任務的高效運作。智慧化戰爭對算力的需求呈現出「指數級增長」特徵:一套先進的AI指揮系統,在處理全局戰場數據時,需要同時運行數千個演算法模型;一支無人機蜂群在執行協同作戰任務時,需要實時進行海量數據交互和決策計算;一次大規模的虛擬對抗訓練,需要模擬數萬甚至數十萬作戰單元的互動行為。這些複雜任務的完成,離不開強大的算力支撐。沒有足夠的算力,再優質的數據也無法快速處理,再先進的演算法也無法有效運作。目前,算力已成為衡量軍事智慧化程度的重要指標,誰掌握了更強的算力,誰就掌握了智慧對抗的主動權。

建構適應智慧轉型需求的算力體系,需要打造「雲端端」協同的算力佈局。在雲端,要建置分散式雲算力中心,建構覆蓋全域、彈性伸縮的算力基座。依託大資料中心、超級運算中心等基礎設施,整合各類運算資源,形成規模化、集約化的算力供給能力。在邊端,要推進算力下沉部署,提升戰場末端的自主運算能力。針對前線陣地、海上艦艇、空中平台等特殊場景,研發小型化、低功耗、高可靠的邊緣運算節點,將部分運算任務從雲端轉移至邊緣端。這樣既可以降低對通訊鏈路的依賴,減少資料傳輸延遲,又能在通訊中斷或訊號黑障等極端環境下,保障作戰單元自主完成目標辨識、路徑規劃、協同配合等基本任務,提升體系生存能力。在終端,要強化裝備內置算力,提升單一作戰平台的智慧等級。透過在無人機、無人車、飛彈武器等平台中嵌入高性能AI晶片,賦予裝備自主感知、自主決策、自主行動的能力,使其成為具備獨立作戰能力的智慧單元,為集群協同和體系對抗奠定基礎。

提升算力保障的實戰化水平,需要強化技術創新與安全防護。在技​​術創新方面,要緊跟算力技術發展趨勢,加速新型計算技術的軍事應用。聚焦量子運算、光子運算、神經形態運算等前沿方向,突破傳統運算架構的效能瓶頸,研發具有顛覆性的新型算力裝備。同時,要加強算力網路建設,建構高頻寬、低時延、抗干擾的算力傳輸網路。透過融合5G、6G、衛星通訊等技術,確保雲端、邊端、終端之間的算力協同與資料交互,實現算力資源的無縫銜接與高效調度。在安全防護方面,要建立算力安全保障體系,防範算力資源被攻擊、被劫持、被濫用的風險。透過採用加密運算、可信任運算等技術,確保資料在運算過程中的安全性和隱私性;加強算力設施的實體防護和網路防護,建構多層次、全方位的防護屏障,確保算力系統在戰時能夠穩定運行,不受敵方幹擾破壞。 (李建平、紀鳳珠、趙輓)

2025年12月30日09 | 資料來源:解放軍報

中國原創軍事資源:https://military.people.com.cn/n1/2025/1230/c1011-40688835461.html

A Look at Chinese Intelligent Warfare | “Order Dispatch”: A New Style of Precision Strike

中國情報戰概覽 | 「命令派遣」:一種新型的精確打擊方式

現代英語:

“Order Dispatch”: Precise Targeting of New Patterns

  introduction

  As Lenin said, “Without understanding the times, one cannot understand war.” In recent years, the widespread application of information and intelligent technologies in the military field has promoted the deep integration of technology and tactics. Relying on intelligent network information systems, it has given rise to “order-based” precision strikes. Commanders and command organs can generate strike requirements in a formatted manner according to combat missions. The decision-making system intelligently matches strike platforms, autonomously plans action paths, and scientifically selects strike methods based on personalized requirements such as strike time, operational space, and damage indicators, thereby rapidly and accurately releasing strike effectiveness.

  The operational characteristics of “order dispatch” type precision strike

  As the informatization and intelligence of weapons and ammunition continue to improve, the cost of modern warfare is also constantly increasing. How to achieve the highest cost-effectiveness ratio with limited strike resources and maximize combat effectiveness has become a central issue for commanders and command organs in operational planning. “Order-based” precision strikes can provide a “feasible solution” for this.

  Real-time, precise, and targeted strikes. Modern warfare places greater emphasis on structurally disrupting enemy operational systems, achieving operational objectives through the rapid and precise release of combat effectiveness. This requires commanders and command organs to seize fleeting “windows of opportunity” to strike high-value, nodal, and critical targets within an enemy’s operational system before the enemy can react. The traditional “detection-guided-strike-assessment” operational loop is time-consuming and ineffective. Therefore, “order-based” precision strikes rely on advanced intelligent network information systems, without pre-determining strike platforms. Target lists are released in real-time, and auxiliary decision-making systems rapidly assess the strike performance of various weapon platforms and the expected damage to targets. Tasks are autonomously allocated to strike platforms, rapidly linking and controlling multi-domain firepower, autonomously closing the kill chain, and conducting rapid strikes against key targets.

  Multi-domain coordinated strike. The advantage of modern precision strike over traditional firepower lies in its information-based and intelligent combat system. It requires no human intervention and autonomously completes tasks such as reconnaissance, control, strike, and assessment based on a closed strike chain. This not only saves strike costs and reduces resource waste but also enables adaptive coordination based on unified operational standards. Therefore, “order-based” precision strikes require firepower forces distributed across various operational domains to establish a unified standard grid. Once a demand is issued from one point, multiple points can respond and coordinate globally, flexibly concentrating forces and firepower, using multiple means to rapidly and multi-domain convergence, and determining the strike direction, sequence, and method for each strike platform while on the move. Through system integration, time is effectively saved, enabling multi-domain precision strikes against key enemy nodes and critical parts of core targets, fully leveraging the combined power of the integrated combat effectiveness of various operational units.

  The key to victory lies in swift and decisive action. Modern warfare is a “hybrid war” conducted simultaneously across multiple domains, where the interplay and confrontation of new domains and new types of forces, such as information, aerospace, and artificial intelligence, are becoming increasingly pronounced. This necessitates that both sides be able to detect and act faster than the enemy, crippling their operational systems and reducing their operational efficiency. On the one hand, it is crucial to pinpoint key nodes in the enemy’s system and launch timely and precise strikes; on the other hand, it is essential to conceal one’s own intentions and strike forces, striking swiftly and unexpectedly. “Order-based” precision strikes perfectly meet these two requirements. Supported by network information systems, they intelligently integrate firepower from various domains, achieving multi-source information perception, data interconnection, and multi-domain coordinated strikes. This enables seamless and high-speed operation of “target perception—decision and command—firepower strike—damage assessment,” resulting in a high degree of information and firepower integration and the rapid achievement of operational objectives.

  The system of “order dispatch” type precision strike

  ”Order dispatch” precision strikes compress action time and improve strike effectiveness by building an efficient closed strike chain, enabling various fire strike platforms to better integrate into the joint fire strike system and provide rapid and accurate battlefield fire support. Its key lies in the “network” and its focus is on the “four” systems.

  Multi-domain platform access network. Supported by information and intelligent technologies, an integrated information network system with satellite communication as the backbone is established. Firepower strike platforms distributed across multiple domain battlefields are integrated into the combat network to create a battlefield “cloud.” Different combat modules are distinguished, and “sub-network clouds” such as “reconnaissance, control, strike, and assessment” are established. Relying on an integrated communication network, the “sub-network clouds” are linked to the “cloud.” This can enhance the firepower strike platform’s capabilities in all domains, all times, on the move, autonomous networking, and spectrum planning, and realize network interconnection between firepower platforms, domain combat systems, and joint combat systems, as well as the interconnection and interoperability of internal strike forces.

  Joint reconnaissance and sensing system. This system leverages various reconnaissance and surveillance forces within the joint operations system to achieve all-weather, multi-directional, and high-precision battlefield awareness of the operational area. This requires constructing a ubiquitous, multi-dimensional reconnaissance and sensing force system encompassing physical and logical spaces, tangible and intangible spaces. It involves widely deploying intelligent sensing devices to form an intelligence data “cloud.” Through this intelligence data “cloud,” the system analyzes the enemy situation, identifies key points in the enemy’s operational system and time-sensitive targets, updates reconnaissance information in real time, and displays target dynamics.

  Intelligent Command and Decision-Making System. Relying on a new command and control system with certain intelligent control capabilities, this system constructs various planning and analysis models, expands functions such as intelligent intelligence processing, intelligent mission planning, automatic command generation, and precise action control, and expands and improves databases such as target feature database, decision-making knowledge base, and action plan database. It strengthens the system support capabilities for mission planning, action decision-making, and control during combat organization and implementation, enhances planning and decision-making and combat action control capabilities, clarifies “how to fight, where to fight, and who will fight,” and achieves precise “order dispatch.”

  Distributed fire strike system. Relying on intelligent network information systems, on the one hand, it integrates multi-dimensional fire strike platforms across land, sea, air, and space, enhancing functions such as intelligent target identification and remote-controlled strike, enabling various combat modes such as remote-controlled operations, manned-unmanned collaborative operations, and flexible mobile operations; on the other hand, it can construct a low-cost fire strike platform mainly composed of low-altitude and ultra-low-altitude unmanned strike platforms such as racing drones and loitering munitions. By adding different functional combat payloads, it can closely coordinate with high-end fire strike platforms to carry out tasks such as battlefield guidance, precision strikes, and fire assessment, efficiently completing “orders”.

  Autonomous Damage Assessment System. This system, built upon reconnaissance and surveillance capabilities within the joint operations system, autonomously assesses the effectiveness of attacks on targets after the firepower platform has completed its strike. It conducts real-time, dynamic, objective, and systematic analysis and evaluation of the target’s external condition and degree of functional loss, and promptly transmits relevant information back to decision-making and command centers at all levels via video images. The assessment centers then determine “how well it went” and whether the expected damage requirements were met. If not, operational actions can be adjusted in a timely manner for supplementary strikes, providing strong support for maximizing operational effectiveness.

  The planning and implementation of “order dispatch” style precision strikes

  The “order dispatch” style of precision strike is similar to the operation of ride-hailing services. Through a series of processes such as formatted “order” generation, intelligent target matching, and autonomous route planning, it autonomously completes the “OODA” combat cycle, making its actions more efficient, its strikes more precise, and its collaboration closer.

  Real-time reporting of firepower requirements allows combat units to submit orders on demand. Reconnaissance elements distributed across different operational areas and multi-dimensional battlefield spaces are acquired through radar, optical, infrared, and technical reconnaissance methods, forming battlefield target intelligence information across a wide area and multiple sources. This information is transmitted to the battlefield information network via intelligence links, and is constantly relayed to combat units. Combat units then perform correlation processing, multi-source comparison and verification, and comprehensively compile battlefield target information to generate precise mission orders. Combat units analyze target value and connect to the decision-making platform as needed, constructing a closed-loop strike chain based on these orders, and submitting mission orders in real time, achieving dynamic optimization and precise adaptation.

  The decision-making center intelligently “dispatches” fire support missions, differentiating them from actual fire strike missions. Through the battlefield information network and relying on an intelligent mission planning system, the center can automatically analyze the mission “order” information data submitted by combat units. Based on the nature, coordinates, movement status, and threat level of battlefield targets, it automatically generates mission requirements such as the type and quantity of ammunition needed for fire strike operations, the strike method, and damage indicators, forming a fire support mission “order.” By intelligently matching the optimal fire support platform and connecting link nodes as needed, the center conducts intelligent command-based “order dispatch,” delivering the orders instantly to the standby fire support platforms.

  Optimal target matching is performed continuously, and firepower platforms swiftly “accept orders.” Multiple firepower platforms distributed across the battlefield respond rapidly to these orders via the battlefield information network. The platforms autonomously establish links with combat units, mutually verifying their identities before directly establishing a guided strike chain. They coordinate firepower strikes, adjusting strike methods and firing parameters in a timely manner based on target damage and battlefield target dynamics before conducting further strikes until the assigned mission is completed. Firepower platforms consistently adhere to the principle of “strike-relocate-strike-relocate,” completing strike missions and rapidly relocating to new positions, maintaining a state of constant readiness and receiving orders online in real time. After the mission concludes, the guided strike chain between the firepower platform and the combat unit is automatically terminated.

  Multi-source damage information acquisition and real-time assessment by the evaluation center. Utilizing a comprehensive range of long-range, intelligent, and information-based reconnaissance methods, including satellite, radar, and drone reconnaissance, multi-domain, three-dimensional reconnaissance is conducted to acquire real-time target fire damage information, providing accurate assessments for precision fire strikes. A comprehensive assessment of damage effects is performed, quantitatively and qualitatively evaluating the strike results, distinguishing between physical, functional, and systemic damage states, and promptly feeding back to the decision-making center. Based on the damage assessment results, timely adjustment suggestions are made to modify fire strike plans, optimize operational actions, and achieve precise control of fire strikes. This facilitates commanders’ accurate control of the operational process and efficient command and control of fire strike effectiveness.

現代國語:

「訂單派單」:精確打擊新樣式

引言

列寧說過,「不理解時代,就不能理解戰爭」。近年來,資訊化智慧化技術在軍事領域的廣泛運用,促進了技術與戰術深度融合,依托智能化網路資訊體系,催生出「訂單派單」式精確打擊。指揮及指揮機關可依據作戰任務格式化產生打擊清單需求,決策系統依據打擊時間、作戰空間、毀傷指標等個人化需求智慧匹配打擊平台、自主規劃行動路徑、科學選擇打擊方式,進而快速精準釋放打擊效能。

「訂單派單」式精準打擊的作戰特點

隨著武器彈藥資訊化智慧化程度不斷提升,現代作戰成本也不斷提高。如何運用有限打擊資源打出最高效費比,實現作戰效能最大化,已成為指揮員及指揮機關作戰籌劃的中心問題,「訂單派單」式精準打擊可為此提供「可行解」。

即時聚優精確釋能。現代作戰更強調對敵作戰體系進行結構性打擊破壞,透過快速且精準地釋放作戰效能來實現作戰目的。這就要求指揮官及指揮機關能夠抓住稍縱即逝時機的“窗口”,在敵未做出反應之時對其作戰體系內高價值、節點性、關鍵性目標實施打擊。傳統的「發現—引導—打擊—評估」的作戰環路耗時長,作戰效果不佳。因此,「訂單派單」式精確打擊,需要依托先進的智慧化網路資訊體系,不預先確定打擊平台,即時發布打擊目標清單,由輔助決策系統對各種武器平台的打擊性能與目標打擊毀傷預期等進行快速評估,自主分配打擊平台任務,快速連結調控多領域火力打擊力量,自主閉合殺傷鏈,對關鍵目標實施快速打擊。

多域聚能協同打擊。現代作戰精準打擊較以往火力打擊的優勢在於資訊化智能化的作戰體系,不需人工介入,依托閉合打擊鏈自主完成「偵、控、打、評」等任務,不僅能夠節省打擊成本,減少資源浪費,還能夠實現基於統一作戰標準的自適應協同。因此,「訂單派單」式精確打擊,需要分佈在各作戰領域的火力打擊力量能夠建立統一標準網格,只要一點發出需求,就能夠多點響應、全局聯動,靈活集中兵力、火力,多手段、快速多域聚能,動中確定各打擊平台打擊方向、打擊次序以及打擊方式。透過體系整合有效節約時間,對敵關鍵節點目標以及核心目標的關鍵部位實施多域精確打擊,充分發揮各作戰單元作戰效能疊加融合的整體威力。

擊要破體速戰速決。現代作戰是在多領域同步實施的“混合戰爭”,資訊、空天、智慧等新域新質力量交織影響、對抗更加明顯。這就需要作戰雙方能夠快敵一秒發現、快敵一步行動,毀癱敵作戰體系、降低敵體系運作效率。一方面,要透過找準敵體系節點,即時聚優精準打擊;另一方面,要隱藏己方企圖及打擊力量,乘敵不備快速打擊。 「訂單派單」式精確打擊能夠很好地契合這兩點需求,在網路資訊系統的支撐下,智慧融合各領域火力打擊力量,實現資訊多源感知、數據交鍊、多域協同打擊,實現「目標感知—決策指揮—火力打擊—毀傷評估」無縫高速運轉,資訊火力高度融合,快速達成作戰目的。

「訂單派單」式精確打擊的體系構成

“訂單派單”式精確打擊通過構建高效閉合打擊鏈,壓縮行動時間,提高打擊效果,使各火力打擊平台能夠更好地融入聯合火力打擊體系,並提供快速精準的戰場火力支援,其關鍵在“網”,重點在“四個”系統。

多領域平台接入網。在資訊化智慧化技術支撐下,建立以衛星通訊為骨幹的一體化資訊網系,將分佈在多維域戰場的火力打擊平台融入作戰網路建立戰場“雲”,區分不同作戰模組,建立“偵、控、打、評”等“子網雲”,並依託一體化的通訊網鏈將“子網雲”鏈入“雲端”,能夠提升火力打擊平台全局全時、動中接入、自主組網、頻譜規劃的能力,實現火力平台、分域作戰體系與聯合作戰體系的網絡互聯,以及內部打擊力量的互聯互通。

聯合偵察感知系統。依托聯合作戰體系內的各種偵察監視力量對作戰地域進行全天候、多方位、高精度戰場感知。這就要建構物理空間和邏輯空間、有形空間和無形空間泛在存在的全維域偵察感知力量系統,廣域佈設智能感知設備,形成情報數據“雲”,通過情報數據“雲”分析敵情態勢,找出敵作戰體系關鍵點以及時敏性目標,實時更新偵察信息,展現目標動態。

智能指揮決策系統。依托具備一定智能控制能力的新型指控系統,建構各類規劃分析模型,擴展情報智能處理、任務智能規劃、指令自動生成、行動精確控制等功能,擴充完善目標特徵庫、決策知識庫、行動預案庫等資料庫,強化戰鬥組織與實施過程中的任務規劃、行動決策和控制的系統支撐能力,提昇決定決策和戰鬥能力,明確怎麼打」。

分佈火力打擊系統。依托智慧網路資訊系統,一方面,融入陸、海、空、天等多維域火力打擊平台,強化目標智慧識別、遠程遙控打擊等功能,實現作戰單元遠程遙控作戰、有人無人協同作戰、靈活機動作戰等多種作戰方式;另一方面,可建構以穿越機、巡飛彈等低空超低空無人打擊平台為主的低成本火力打擊平台,透過加掛不同功能作戰載重,與高端火力打擊平台密切協同來實施戰場引導、精確打擊、火力評估等任務,高效完成「訂單」。

自主毀傷評估系統。依托聯合作戰體系內的偵察監視力量建構毀傷評估系統,在火力平台打擊完畢後,自主對目標實施打擊效果查核。主要就目標的外觀狀態、功能喪失程度等進行實時、動態、客觀、系統的分析和評估,並及時通過視頻圖像的方式將相關信息回傳至各級決策指揮中心,由評估中心判斷“打得怎麼樣”,是否達到預期毀傷要求。如不符合,可適時調控作戰行動,進行補充打擊,為最大限度釋放作戰效能提供強力支撐。

「訂單派單」式精確打擊的規劃實施

「訂單派單」式精準打擊就如同叫車的運作方式一樣,透過格式化「訂單」產生、智慧化物件配對、自主化路徑規劃等一系列流程,自主完成「OODA」作戰循環,其行動更為高效、打擊更為精準、協同更為密切。

即時提報火力需求,作戰單元按需「提單」。分佈在不同作戰地域、多維戰場空間的偵察要素,透過雷達、光學、紅外線和技術偵察等方式,廣域多源偵獲形成戰場目標情報資訊。這些資訊依托情報鏈路接入戰場資訊網,隨時隨地被傳至作戰單元,由作戰單元進行關聯處理、多方對比印證,綜合整編戰場目標訊息,產生精確的任務「訂單」。作戰單元分析目標價值按需連通決策平台,建構“訂單”式閉合打擊鏈,實時提報任務“訂單”,實現動中集優、精準適配。

區分火力打擊任務,決策中心智能「派單」。決策中心透過戰場資訊網,依托智能任務規劃系統,能夠自動解析作戰單元提報的任務「訂單」資訊數據,根據戰場目標性質、座標方位、移動狀態、威脅程度等,自動產生火力打擊行動所需彈種彈量、打擊方式和毀傷指標等任務要求,形成火力支援任務「訂單」,透過智慧服務火力平台,按需使用火力平台節點,按需通路,支援任務「訂單」。

全時匹配最優目標,火力平台迅即「接單」。多點分佈在戰場區域內的火力平台,透過戰場資訊網迅即響應“接單”,火力平台與作戰單元之間自主建鏈,相互核驗“身份”後直接建立引導打擊鏈,協同配合火力打擊行動,並根據打擊後目標毀傷情況以及戰場目標動態,及時調整打擊方式、射擊參數等,而後再次實施火力打擊,直至完成“派單”任務。火力平台始終遵循「打擊—轉移—打擊—轉移」的原則,完成打擊任務,迅即轉移陣地,全時保持待戰狀態,即時在線接收「訂單」。任務結束後,火力平台與作戰單元之間的引導打擊鏈會自動取消。

多源獲取毀傷訊息,評估中心即時「評單」。綜合運用衛星偵察、雷達偵察、無人機偵察等遠距離資訊化智慧化偵察手段,實施多域立體偵察,即時取得目標的火力毀傷訊息,為進行精確火力打擊提供準確評估。綜合判定毀傷效果,對打擊效果進行定量和定性評估,區分目標物理、功能和系統三種毀傷狀態,及時回饋至決策中心。根據打擊目標的毀傷評估結果,適時提出調控建議,調整火力打擊計劃,優化作戰行動,實現對火力打擊的精確控制,便於指揮員精準把控作戰進程,達成對火力打擊效能的高效指揮控制。 (高凱 陳良)

中國原創軍事資源:https://www.news.cn/milpro/20250123/8f71783cff6a4284a43871e996bc31888a7/c.html

Chinese Military Analysis of Developing Intelligent Command and Information Systems

中國軍方對發展智慧指揮資訊系統的分析

現代英語:

The era of intelligent warfare has begun. Intelligent command and information systems will become the “central nervous system” of future intelligent combat command and control, serving as a supporting means for intelligent combat command and control. Accelerating the construction of intelligent command and information systems is an inherent requirement for the development of military intelligence. Only by clarifying the essence of intelligent command and information system development, grasping the key points of intelligent command and information system research and development, and exploring the essentials of intelligent command and information system development can we better promote the construction and development of intelligent command and information systems and gain a competitive advantage in future intelligent warfare.

Clarify the key points of the development of intelligent command and information systems

Intelligent command and information systems are an inevitable choice in the development of warfare towards informationized and intelligent warfare, a natural outcome of the technological revolution, and a contemporary demand for the intelligent development of the military. Clarifying the key points of intelligent command and information system development helps to grasp the direction of its construction and establish long-term goals.

Promoting the intelligent evolution of warfare. In future intelligent warfare, the battlefield situation will change rapidly and the battlefield environment will be complex and harsh. In order to gain the initiative on the battlefield, “intellectual superiority” will become the new commanding height. Intelligent command and information systems are undoubtedly an important support for future combat command and operations. Their intelligent development can help promote the intelligent evolution of warfare and is an important foundation for gaining the initiative and seeking victory in intelligent warfare.

Supporting Intelligent Innovation in Combat Concepts. Future intelligent warfare requires corresponding combat command concepts, and intelligent command information systems are a crucial foundation for the practical application of these concepts, serving as the fertile ground for their innovation and development. New intelligent combat command concepts such as human-machine hybrid command formations, data-driven command activities, open development command models, and intelligent convergence command processes all rely on the support of intelligent command information systems. These systems will act as an extension of the human brain, breaking through the physiological limits of the human body and achieving the organic integration of the art of combat command and intelligent technology.

Promoting the intelligent transformation of combat methods. The widespread application of artificial intelligence technology in the military field has brought about significant changes in the mechanisms of combat victory. Intelligence has surpassed firepower and information power to become the primary factor determining the outcome of war. The development and construction of intelligent command and control information systems will promote the transformation of combat methods towards intelligence, shifting combat methods from the “combat network + precision-guided weapons” of the information age to the “intelligent Internet of Things + manned/unmanned combat platforms” of the intelligent age. Correspondingly, the basic combat style is evolving from “network-centric warfare” to “cognition-centric warfare”.

Focus on the key points of intelligent command and information system research and development

Command and information systems are a product of the information warfare era. With the rapid development of military intelligence and the research and practical application of intelligent warfare mechanisms, the intelligent upgrading and construction of command and information systems is urgently needed. Emphasis should be placed on key functional development aspects to create a completely new intelligent command and information system.

“Super-brain-based” decision-making. In future intelligent warfare, the battlefield information data is massive and complex, and commanders are easily overwhelmed by the “sea of ​​information,” leading to confusion and affecting command and decision-making. With the emergence of intelligent decision-making technology and “cloud brains” and “digital advisors,” a new decision-making model based on the collaboration of “human brain + artificial intelligence” is quietly taking shape. Intelligent command information systems will break through the limits of human intelligence, acting as an extension of the human brain to assist commanders in their work, transforming war decision-making from purely human brain-based decision-making to super-brain-based command and decision-making combining “human brain + artificial intelligence.”

“All-dimensional” situational awareness. Future intelligent warfare will be characterized by multi-dimensional space, diverse forces, varied tactics, and accelerated pace. A comprehensive and flexible grasp of the battlefield situation will be fundamental to commanders’ decision-making. The integrated, intelligent, and dynamic presentation of the all-dimensional battlefield situation across multiple domains is an inevitable requirement for the development of command information systems. Command information systems are expanding their perception, understanding, integration, and prediction of battlefield situations, such as target identification, threat level assessment, operational action prediction, and future battle trajectory forecasting, from land, sea, air, space, electromagnetic, and cyberspace to the cognitive and social domains, achieving “all-dimensional” situational awareness.

“Intelligent connectivity” is crucial for future intelligent warfare. This will involve numerous intelligent command and control platforms and intelligent weapon platforms, connected by intelligent information and communication systems. Like the nerves and blood vessels of the human body, intelligent information and communication systems act as a link and lubricant in intelligent warfare. Therefore, it is essential to establish a comprehensive, uninterrupted intelligent information network to support the connectivity and control of intelligent equipment, enabling intelligent optimization of the network structure, intelligent reorganization to withstand network damage, and intelligent anti-interference capabilities. This will ensure intelligent collaborative operations between platforms and maximize overall combat effectiveness.

“Unmanned” Autonomous Collaboration. The extensive use of drones in recent local conflicts worldwide, playing a crucial role in determining the course of war, has attracted widespread attention. Unmanned weaponry is the material foundation of intelligent warfare, leading to disruptive combat styles such as intrusive lone-wolf operations, manned/unmanned collaborative system sabotage operations, independent operations by unmanned system formations, and drone swarm operations. While unmanned warfare is human-led, with machines granted a degree of autonomy from the backend, enabling unmanned operations on the front lines, the unmanned battlefield is constantly evolving. Disruptions to human-machine collaboration will become commonplace. Therefore, the command and control systems of unmanned intelligent equipment platforms must be more intelligent, capable of autonomous collaborative operations based on operational objectives.

“Proactive” information defense. Intelligent warfare will inevitably face diverse and multi-dimensional information attacks from powerful adversaries. The level of information security protection capabilities directly affects the outcome of the battle for “intellectual dominance” on the battlefield and is a key aspect of the construction of intelligent command information systems. Therefore, proactive measures should be taken to actively formulate and improve network protection strategies, enrich intrusion detection capabilities and authentication and identification methods, strengthen the application of advanced information security technologies, enhance the anti-interference and anti-interference capabilities of various wireless transmission methods, and build strong intelligent traceability and countermeasure capabilities to effectively curb information attacks.

Exploring the key points of intelligent command and information system development

The development of intelligent command and information systems is not merely a matter of technological innovation; it also requires further liberating our thinking and updating our concepts. To advance the development of intelligent command and information systems, we must change the traditional approach of simply adding hardware, building large networks, and collecting and storing various types of data. We must break through existing hierarchical structures, create open and service-oriented systems, and target the needs of intelligent combat command and action, exploring and researching the key aspects of intelligent command and information system development.

Innovation Concept. Guided by innovative thinking, and drawing on the development strategies of intelligent command and information systems for building a strong military, we will explore a development path with our own characteristics, tailored to actual needs. We must break away from traditional “chimney” approaches, adhere to top-level design and overall planning of the command and information system, unify interfaces, protocols, and standards, and form an open and sustainable system architecture. We must adhere to a system development approach that combines research, development, and application, formulating short-term, medium-term, and long-term development strategies to standardize the direction of system construction and development. We must adhere to iterative upgrades and optimization strategies to continuously improve the intelligence level of various subsystems, including command and control, intelligence reconnaissance, communication, information warfare, and comprehensive support, ensuring the continuous and healthy development of the intelligent command and information system.

Focusing on Key Capabilities. Concentrating on building key capabilities of intelligent command and information systems is crucial for intelligent warfare to leverage intelligence to achieve victory, and is key to gaining the “right to win” in intelligent warfare. Algorithms, computing power, and data are not only the intrinsic driving force and support for the development of artificial intelligence, but also the core capability requirements and advantages of intelligent command and information systems. The development of intelligent command and information systems must adhere to algorithmic innovation research to improve the system’s cognitive, speed, and decision-making advantages; accelerate the research and development of next-generation computers, such as quantum computers, to provide stronger computing power support for intelligent command and information systems; and deeply mine the deeper and broader information value from massive combat data resources to seek the initiative in victory.

Collective Efforts to Overcome Challenges. The construction and development of intelligent command and information systems is one of the major projects in military intelligence. It is a complex and collaborative project involving multiple fields, disciplines, departments, and units. The construction and development of intelligent command and information systems must adhere to the spirit of collective wisdom, collaborative problem-solving, and pioneering innovation. It should target strategic and forward-looking fields such as sensors, quantum information, network communication, integrated circuits, key software, big data, artificial intelligence, and blockchain. It should be driven by high-tech advancements and the demands of intelligent warfare, conducting in-depth research and exchanges across multiple fields, levels, and forms to continuously break through, innovate, and upgrade, making the functions of intelligent command and information systems more complete and intelligent.

Collaborative Development. To deeply promote the construction and development of intelligent command and information systems, it is essential to fully absorb advanced local technological achievements and integrate into the global trend of artificial intelligence innovation. Currently, artificial intelligence technology is booming worldwide, accumulating strong development momentum and technological advantages. Artificial intelligence technology has strong versatility in application, and its technological achievements have broad prospects for transformation and application, making it an important pathway to the construction and development of intelligent command and information systems. It is necessary to research and formulate general technical standards, break down barriers, overcome obstacles, and facilitate military-civilian cooperation to achieve the sharing and linkage of technological achievements. Through collaboration, it is also crucial to cultivate and shape new types of military personnel, enabling them to continuously adapt to the needs of various positions under intelligent conditions and fully leverage the effectiveness of intelligent command and information systems.

現代國語:

智慧化戰爭時代序幕已經拉開,具有智慧化特徵的指揮資訊系統將成為未來智慧化作戰指揮的“中樞神經”,是智慧化作戰指揮控制的支撐手段。加速智慧化指揮資訊系統建設是軍事智慧化發展的內在要求,只有明晰智能化指揮資訊系統發展要義,抓住智慧化指揮資訊系統研發要點,探索智能化指揮資訊系統發展要津,才能更好地推動智能化指揮資訊系統建設發展進程,贏得未來智能化作戰制勝先機。

明晰智能化指揮資訊系統發展要義

智慧化指揮資訊系統是戰爭形態朝向資訊化智能化戰爭發展的必然選擇,是科技革命發展的必然結果,也是軍事智能化發展的時代訴求。明晰智能化指揮資訊系統發展要義,有助於把脈智能化指揮資訊系統建設方向,確立系統發展長遠目標。

助推戰爭形態智能化演進。未來智能化作戰,戰場形勢瞬息萬變、戰場環境復雜嚴酷,要想在戰場上取得主動,「制智權」成為新的製高點,而智能化指揮資訊系統無疑是未來作戰指揮和行動的重要支撐手段,其智能化發展可助推戰爭形態向智能化演變,是智能化作戰贏得先機、謀求勝利的重要依托。

支撐作戰理念智能化創新。未來智慧化作戰,需要與之相適應的作戰指揮理念,而智慧化指揮資訊系統是作戰指揮理念實踐運用的重要依托,是智慧化作戰指揮理念創新、發展的土壤。如人機混合指揮編組、數據驅動指揮活動、開放發展指揮模式、智能聚力指揮過程等智能化作戰指揮新理念,都離不開智能化指揮信息系統的支撐,智能化指揮信息系統將作為人腦的外延,突破人體生理極限,實現作戰指揮藝術和智能技術的有機融合。

促進作戰方式智能化轉變。人工智慧技術在軍事領域的廣泛應用,使得作戰制勝機理發生重大變化,智慧超越火力、資訊力,成為決定戰爭勝負的首要因素。智慧化指揮資訊系統建設發展將促進作戰方式向智慧化轉變,使得作戰方法從資訊時代的「作戰網絡+精確制導武器」向智慧時代的「智慧物聯網+有人/無人作戰平台」轉變、基本作戰樣式相應地從「網絡中心戰」向「認知中心戰」演進。

抓住智慧化指揮資訊系統研發點

指揮資訊系統是資訊化戰爭時代的產物,隨著軍事智慧化的快速發展、智慧化作戰制勝機理的研究和實踐運用,指揮資訊系統智慧化升級建設迫在眉睫。應突顯功能研發點,打造全新智慧化指揮資訊系統。

“超腦化”輔助決策。未來智能化作戰,戰場資訊數據量龐大且複雜多變,指揮員在指揮過程中易陷入「資訊海洋」而導致資訊迷茫,影響指揮決策。隨著智慧輔助決策技術和「雲端大腦」「數字參謀」的出現,以「人腦+人工智慧」協作為基本方式的新決策模式正悄悄形成。智慧化指揮資訊系統將突破人類智力極限,作為人腦的外延,輔助指揮員工作,使戰爭決策由單純的人腦決策發展為「人腦+人工智慧」的超腦化指揮決策。

「全維化」態勢感知。未來智能化作戰,空間多維、力量多元、樣式多樣、節奏加快趨勢突出,全面靈動地掌握戰場態勢成為指揮員決策的基礎,多域一體、智能動態地呈現全維戰場態勢成為指揮資訊系統建設發展必然要求。指揮資訊系統對諸如目標識別、威脅等級估計、作戰行動預判和未來戰況走向預估等戰場態勢的感知、理解、融合和預測,正在從陸、海、空、天、電磁、網絡等空間擴展至認知域、社會域,實現「全維化」態勢感知。

「智聯化」網絡通聯。未來智慧化作戰將使用大量智慧指揮控制平台和智慧化武器平台,而連接指揮控制平台和武器平台的必然是智慧化的資訊通訊系統。如同人體的神經和血管,智慧化的資訊通訊系統在智慧化作戰中扮演連結和潤滑作用。因此,要建立全維度覆蓋、不間斷的智慧化資訊網絡,支撐智慧化裝備的連結和控制,形成網絡結構智能優化、網絡抗毀智能重組以及智能抗干擾能力,以確保平台間智能化的協同作戰,發揮最佳的整體作戰效能。

「無人化」自主協同。近期世界局部沖突中,無人機大量運用並起到決定戰爭走向的重要作用,引起了各方的廣泛關注。無人化武器裝備是智慧化作戰的物質基礎,並依此形成了顛覆式作戰樣式,如侵入式獨狼作戰、有人/無人協同體系破擊作戰、無人系統編隊獨立作戰、無人機蜂群集群作戰等。無人作戰雖是由人主導,並在後台賦予機器一定程度的自主行動權限,從而實現機器在一線無人作戰行動。然而無人作戰戰場瞬息萬變,人機協同被破壞將成為常態,無人智慧化裝備平台指控系統必須更加智慧,要能根據作戰目的進行自主協同作戰。

“主動化”訊息防禦。智慧化作戰必將面臨強敵全維多樣的資訊攻擊,資安防護能力的高低,直接影響戰場「制智權」鬥爭的勝負,是智慧化指揮資訊系統建設的關鍵環節。因此,應主動作為,積極制定及完善網絡防護策略,豐富入侵檢測能力及認證識別手段,加強資訊安全高新技術運用,強化各類無線傳輸方式的抗干擾、抗介入能力,建強智能化溯源反制能力,有效遏止資訊攻擊。

探索智慧化指揮資訊系統發展要津

智慧化指揮資訊系統發展不單單是技術的革新,更需要進一步解放思想、更新理念。推動智慧化指揮資訊系統發展,要改變傳統添硬體、建大「網」、收集存儲各類數據的思路,突破固有層級設定,打造開放式、服務型系統,瞄準智能化作戰指揮與行動需要,探索研究智能化指揮資訊系統發展要津。

創新理念。堅持以創新的思維理念為指引,借用軍事強國智慧化指揮資訊系統發展思路,結合實際需求,探索具有自身特色的發展道路。要打破傳統「樹煙囪」做法,堅持指揮資訊系統頂層設計和整體規劃,統一介面、協議和標準,形成開放式、可持續發展的系統架構佈局;堅持研建用相結合的系統研發策略,制定近期、中期、長期不同階段發展策略,規範系統建設發展方向;堅持迭代升級、優化持續策略,不斷提升指揮、長期不同階段發展策略,規範系統建設發展方向;堅持迭代升級、優化持續性策略,不斷提升指揮控制、長期不同階段發展策略、各分列系統建設發展方向;堅持版本

聚力關鍵。聚力智能化指揮資訊系統關鍵能力建設,是智慧化作戰以智聚優、以智制勝的重要依托,是智慧化作戰取得「制勝權」的關鍵。演算法、算力、數據既是人工智慧發展的內在動力和支撐,也是智慧化指揮資訊系統的核心能力要求和優勢。智慧化指揮資訊系統發展要堅持演算法創新研究,提高系統認知優勢、速度優勢和決策優勢;加快量子計算機等為代表的下一代計算機研發,為智能化指揮信息系統提供更強的算力支持;深度挖掘海量作戰數據資源中更深層次、更廣維度信息價值,謀求制勝先機。

集智攻關。智慧化指揮資訊系統建設發展是軍事智慧化的主要工程之一,是一個多領域、多學科交叉,多部門、多單位參與的大融合大聯動的攻堅工程。智慧化指揮資訊系統建設發展要堅持群策群力、集智攻關、開拓創新的精神,瞄準傳感器、量子信息、網絡通信、集成電路、關鍵軟件、大數據、人工智能、區塊鍊等戰略性前瞻領域,堅持高新技術推動、智能化作戰需求拉動,開展多領域、多層次、多形式深度研究交流,更加創新、進一步迭代創新

協作發展。深入推動智慧化指揮資訊系統建設發展,必須充分吸收地方先進技術成果,融入世界人工智慧創新發展的時代洪流。當前,世界人工智慧技術蓬勃發展,積蓄了強大發展動能和技術優勢,人工智慧技術應用通用性強,技術成果轉化應用前景廣闊,是智慧化指揮資訊系統建設發展的重要實現途徑。要研究制定通用技術標準,拆壁壘、破堅冰、暢通軍地合作,實現技術成果共享連結。要透過協作培養塑造新型軍事人才,使其不斷適應智慧化條件下各類崗位需求,充分發揮智慧化指揮資訊系統效能。

來源:解放軍報 作者:李建平 紀鳳珠 李琳 責任編輯:王鳳 2022-08-0x

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/8884917735.html

Chinese Military Exclusive Requirements for Strategies & Tactics of People’s War in The New Era

新時代中國軍隊對人民戰爭戰略戰術的獨特要求

現代英語:

Looking back on its glorious combat history, the People’s Army has consistently adhered to the absolute leadership of the Party, proposing and implementing a comprehensive set of strategies and tactics for people’s war. These strategies and tactics are a crucial weapon for the People’s Army to defeat the strong with the weak and to conquer the enemy. Over the past 98 years, with the changing times and evolving forms of warfare, the specific content and manifestations of the strategies and tactics for people’s war have continuously evolved. To confront the challenges of information-based and intelligent warfare, we must firmly grasp the essential requirements and value orientations of the strategies and tactics for people’s war amidst the rapidly evolving global trends and practices, unifying the inherently unchanging laws of conduct with the external realities of change, and continuously innovating and developing the strategies and tactics for people’s war in the new era.

President Xi Jinping emphasized that no matter how the situation develops, the magic weapon of people’s war must never be lost. However, we must grasp the new characteristics and new requirements of people’s war in the new era, innovate its content, methods and approaches, and unleash its overall power. Currently, facing profound challenges brought about by changes in science and technology, warfare, and our adversaries, we must not only inherit and carry forward the fine traditions of people’s war, but also be sensitive to changes, actively respond to them, and proactively seek change. We must accurately grasp the inherent requirements of the strategies and tactics of people’s war in the new era, consciously update our thinking and concepts, and innovate strategic guidance, so that this magic weapon of defeating the enemy can be demonstrated on future battlefields.

Adhere to relying on the people and deeply rooted

In the long practice of revolutionary war, the people are the most profound force for victory. The people are the primary force behind the strategies and tactics of people’s war, a magic weapon for victory. People’s war has its roots deeply rooted in the people, and its confidence comes from the people. Regardless of how the times change or how the war evolves, relying closely on the people and fully mobilizing them will always be the fundamental condition and the only way to carry out people’s war. Developing the strategies and tactics of people’s war in the new era requires adhering to the mass perspective of history and the fundamental requirement that soldiers and civilians are the foundation of victory. We must integrate the traditional strategic advantages of people’s war with the mass line, broaden the sources of vitality for the strategies and tactics of people’s war, draw strategic wisdom and tactical methods from the people, and develop an intellectual advantage for people’s war in the new era. We must solidly carry out national defense education throughout the nation, continuously foster a strong sense of patriotism, inspire patriotism, strengthen awareness of potential dangers, and enhance national defense awareness. We must guide the masses to actively care about and support national defense, thereby infusing powerful spiritual strength into people’s war in the new era. We must focus on promoting high-quality population development, comprehensively improve the cultural, scientific, and innovative qualities of the entire population, accelerate the development of a modern human resource base of high quality, sufficient in volume, optimized in structure, and rationally distributed, and promote the shift of the dominant force in people’s war from quantitative to qualitative. Further improve the national defense mobilization system and mechanism, promote the establishment of a rapid response system that is connected with the national emergency response mechanism and integrated with the joint combat system, fully tap and gather the unlimited war potential contained in the people, and give full play to the resource aggregation and value-added effect.

Focus on overall planning and full-area offense and defense

In the long-term practice of revolutionary warfare, the strategies and tactics of people’s war require the comprehensive mobilization of diverse forces and resources in the political, economic, cultural, diplomatic, and military sectors, and the integrated use of various forms of struggle and methods of operation. This holistic approach compensates for local deficiencies and disadvantages, ultimately defeating powerful adversaries. Modern warfare is not only a fierce confrontation in the military sphere, but also a comprehensive struggle in the political, economic, and diplomatic spheres, exhibiting the distinct characteristics of hybrid warfare. To develop the strategies and tactics of people’s war in the new era, we must establish a broad systemic mindset, relying on the national strategic system and supported by the joint operations system, explore the implementation methods of people’s war strategies and tactics, and win the total war of people’s war in the new era. We should fully leverage the advantages of the new national system, relying on the integrated national strategic system and capabilities, efficiently aggregate superior resources across the board, fully activate the country’s national defense potential, and weave various forces and resources into a network. We should integrate and plan the subsystems of people’s war, including leadership, organization, personnel, command, technology, equipment, and support, to maximize the effectiveness of holistic linkage and systemic operation, and achieve the maximum benefits of all-round effort and multiplied energy. We must strengthen comprehensive coordination across the physical, information, and social domains, focusing on seeking breakthroughs in new domains and new qualities, and making achievements in new dimensions such as unmanned warfare, human-machine collaborative warfare, network and electronic warfare, space and deep-sea warfare, and intelligent and autonomous warfare. Military and non-military means must be coordinated, integrating various forms of struggle, including political, economic, diplomatic, public opinion, and military. Comprehensive measures must be implemented to effectively wage diplomatic offensive and defensive battles, financial and trade battles, psychological defense battles, and public opinion and legal battles. We must leverage the combined effectiveness of political offensives and armed strikes to effectively fight the political and military battles.

Strengthen active defense and take the initiative

Through the long practice of revolutionary warfare, the People’s Army has developed a comprehensive strategic philosophy of active defense, emphasizing, for example, the unity of strategic defense and offensive action in campaigns and battles, the principles of defense, self-defense, and preemptive strike, and the principle of “if no one offends me, I will not offend; if someone offends me, I will certainly offend.” Active defense is fundamentally defensive, its essence lies in activeness, and its inherent characteristic is proactiveness. Currently, profound changes have taken place in the international, national, and Party, military, and political landscapes. The strategies and tactics of people’s war in the new era generally adhere to the fundamental principle of defense and are not aimed at hegemony, aggression, or oppression of other countries. Consequently, they will win the support and endorsement of the vast majority of the Chinese people, as well as the understanding and assistance of peace-loving and justice-loving countries and peoples around the world. Developing the strategies and tactics of people’s war in the new era must adapt to the times and circumstances. We must adhere to a defensive national defense policy, implement the military strategic guidelines of the new era, excel at observing and analyzing issues from a political perspective, and be adept at considering and applying strategies from regional and global perspectives to consolidate the political foundation for victory in people’s war. We must persist in neither provoking trouble nor fearing it, strengthen the regular and diversified use of military force, firmly and flexibly carry out military struggle, and while adhering to the strategic preemptive strike, we must not give up campaign and combat offensives under favorable conditions and when necessary. We must advance steadily, make progress within stability, and be proactive within stability, effectively shape the security situation, contain crises and conflicts, and firmly grasp the initiative in the struggle.

Highlight new quality dominance and technological empowerment

In the long practice of revolutionary warfare, while emphasizing that victory in war is primarily determined by people, not objects, the People’s Army has also placed great emphasis on the research and development of advanced military technology, particularly weaponry. Comrade Mao Zedong once emphasized that without modern equipment, it would be impossible to defeat the armies of imperialism. The technological content of modern warfare has undergone a qualitative leap, with advanced technologies and new weaponry such as artificial intelligence, big data, quantum computing, unmanned aerial vehicles, and brain control being widely applied in the military. While the people remain the decisive force in determining victory in war, the manifestation of this power has undergone significant changes. Science and technology are core combat power, and People’s War will place greater emphasis on the application of scientific and technological means and rely even more heavily on the wisdom and creativity of the people. Developing the strategies and tactics of People’s War in the new era should prioritize winning information-based and intelligent warfare. We should deeply study the essential characteristics, winning mechanisms, and strategies and tactics of high-end warfare, accelerate the shift from “winning by numbers” to “winning by talent,” and from “winning by manpower” to “winning by intelligence,” effectively enhance our ability to win through scientific and technological empowerment and digital intelligence, and truly unleash the crucial role of science and technology and talent in People’s War in the new era. We will accelerate the development of high-tech industries, vigorously strengthen the construction of new forces in new domains such as ocean, space, cyberspace, artificial intelligence, and quantum technology, increase military-civilian collaboration in high-tech fields, accelerate the transformation and application of new productive forces into new combat capabilities, and promote the expansion of war potential reserves into emerging fields and the focus on new forces. We will integrate and coordinate military and civilian scientific and technological advantages, shifting the focus from traditional support and guarantee elements such as human and material resources to new support and guarantee elements such as information, technology, and intelligence. We will build information, resource, and technology pools with profound foundations and rich reserves, actively cultivate capable, strong, and professional professional support units, and continuously expand the breadth and depth of people’s participation in the war and scientific and technological support.

Emphasis on flexibility, maneuverability, innovation and checks and balances

In the long-term practice of revolutionary warfare, the strategies and tactics of People’s War are highly flexible and maneuverable. Their most essential requirement is to prioritize self-reliance, attacking the enemy without being attacked by them. Based on the actual situation of both sides, we fight the battles based on our weapons, against the enemy, and at the right time and place. We identify the enemy’s weaknesses and vulnerabilities, leverage our strengths and advantages, and defeat the enemy with our own strengths, always seizing the initiative on the battlefield. Flexible and maneuverable strategies and tactics are the magic weapon for defeating an enemy with superior equipment with inferior equipment. “You fight yours, I fight mine” is a summary and generalization of the long-term experience of China’s revolutionary war and the soul and essence of the strategies and tactics of People’s War. Developing the strategies and tactics of People’s War in the new era must grasp the methodological requirements of asymmetric checks and balances, leverage innovative operational concepts, adhere to the mechanisms of victory in modern warfare, and continuously develop practical and effective tactics to defeat the enemy. We must proceed from the actual circumstances of both sides, gaining a deep understanding of operational missions, adversaries, and the evolving operational environment. We must thoroughly grasp the concepts, elements, and methods of victory, objectively analyze and study the strengths and weaknesses, advantages and disadvantages of both sides, know the enemy and ourselves, adapt to the situation, and flexibly utilize various combat forces and methods, striving to achieve maximum results at the lowest cost. We must adhere to the principle of “attacking the enemy without being attacked by them,” capitalize on strengths and avoid weaknesses, avoid the real and attack the weak, attack where the enemy is least prepared, and attack where they must be defended. We must proactively create opportunities, flexibly maneuver the enemy, and fight wherever we are most advantageous and wherever we are most skilled. We must adhere to the principle of “using what we can to defeat what we cannot,” advancing the research and application of military theory, operational guidance, tactics, and training methods in a timely manner, innovating core operational concepts, and developing new types of combat methods. We must fight against the enemy’s tactics, targeting their weaknesses, and leveraging our military’s strengths, thus creating new winning advantages in people’s war through asymmetric checks and balances.

Emphasis on accumulating small things into big things and focusing on unity of purpose

Throughout the long practice of revolutionary warfare, our army has been at an overall disadvantage for considerable periods. Therefore, the strategies and tactics of people’s war emphasize leveraging strength against weakness locally, persisting in accumulating small victories into larger ones, and concentrating forces to wage annihilation campaigns. This has become a key strategy for the people’s army to defeat powerful foes. Compared to previous eras, modern warfare often unfolds across multiple dimensions and domains, providing greater scope for implementing this strategy of “accumulating small victories into larger ones.” Developing the strategies and tactics of people’s war in the new era requires strengthening the concept of “dispersed in appearance, yet focused in spirit; dispersed in form, yet united in strength.” This involves dynamically consolidating and uniting the numerous combat forces distributed across the multidimensional battlefield. Through the fusion of capabilities and immediate optimization, we can launch rapid localized focused-energy attacks, wide-area guerrilla harassment, and deliver annihilating and destructive strikes against key enemy locations. This not only creates a hammering effect, but also continuously wears down the enemy, gradually depriving them of the initiative on the battlefield. This highly integrated distributed warfare emphasizes the wide-area dispersion of troop deployment and the discrete distribution of capabilities. Based on the needs of achieving operational intent, objectives, and missions, it prioritizes the best operational elements, units, and forces. Through the integration of operational capabilities and the accumulation of operational impacts, it aggregates optimal operational effects, unleashes maximum operational potential, maximizes operational effectiveness, and achieves optimal operational results. This distributed warfare has evolved from “geographical dispersion” to “dynamic coupling across all domains and dimensions”: no longer limited to the physical dispersion of personnel and equipment, it extends to multi-dimensional battlefields such as cyber, electromagnetic, and cognitive. Relying on data links, artificial intelligence, and distributed command systems to achieve cross-domain collaboration, it significantly enhances battlefield survivability and multiplies strike effectiveness.

現代國語:

編者按

回望輝煌戰鬥歷程,人民軍隊始終堅持在黨的絕對領導下,提出並實施了一整套人民戰爭戰略戰術,這是人民軍隊以弱勝強、克敵制勝的重要法寶。 98年來,隨著時代變遷和戰爭形態演變,人民戰爭戰略戰術的具體內容和表現形式不斷發展變化。直面資訊化智慧化戰爭挑戰,我們要在快速變化發展的世界大勢和實踐樣態中,牢牢把握人民戰爭戰略戰術的本質要求和價值取向,把內在不變的規律性特徵與外在變化的現實性特徵統一起來,不斷創新發展新時代人民戰爭戰略戰術。

習主席強調指出,無論形勢如何發展,人民戰爭這個法寶永遠不能丟,但要把握新的時代條件下人民戰爭的新特點新要求,創新內容和方式方法,充分發揮人民戰爭的整體威力。當前,面對科技之變、戰爭之變、對手之變帶來的深刻挑戰,我們既要繼承發揚人民戰爭優良傳統,也要敏銳識變、積極應變、主動求變,準確把握新時代人民戰爭戰略戰術內在要求,自覺更新思維理念,創新戰略指導,讓克敵制勝的法寶顯威未來戰場。

堅持依靠人民、深根基

在長期革命戰爭實踐中,人民群眾是戰爭勝利最深厚的偉力。人民戰爭戰略戰術,人民是構成這一制勝法寶的主體,人民戰爭的根基深植於人民、底氣來自於人民,無論時代如何發展、戰爭如何演進,緊緊依靠人民、充分動員群眾,永遠是開展人民戰爭的基礎條件和不二法門。新時代條件下發展人民戰爭戰略戰術,必須堅持群眾史觀和兵民是勝利之本的根本要求,把人民戰爭的傳統謀略優勢和群眾路線結合起來,拓展人民戰爭戰略戰術的源頭活水,從人民群眾中汲取戰略智慧和策略方法,形成新時代人民戰爭的智力優勢。札實開展全民防衛教育,不斷厚植家國情懷,激發愛國動力,強化憂患意識,增強國防觀念,引導廣大群眾主動關心國防事業、支持國防建設,為新時代人民戰爭注入強大精神力量。聚力推進人口高品質發展,全面提升全民文化素質、科技素質和創新能力,加速塑造素質優良、總量充裕、結構優化、分佈合理的現代化人力資源,推動人民戰爭主體由數量優勢向質量優勢轉變。進一步完善國防動員體制機制,推動建立與國家應急響應機制相銜接、與聯合作戰體系相融合的快速響應制度,把內含於人民群眾中的無限戰爭潛力充分挖掘出來、聚攏起來,充分發揮資源集聚增值效應。

注重整體運籌、全域攻防

在長期革命戰爭實踐中,人民戰爭戰略戰術要求整體動員政治、經濟、文化、外交、軍事等多方面的力量資源,綜合運用多種鬥爭形式和作戰方式,以整體合力彌補局部的不足和劣勢,從而戰勝強大對手。現代戰爭既是軍事領域的激烈對抗,也是政治、經濟、外交等領域的全面角力,整體呈現混合戰爭的鮮明特徵。新時代條件下發展人民戰爭戰略戰術,必須確立大體系思維模式,以國家戰略體係為依托,以聯合作戰體係為支撐,探索人民戰爭戰略戰術的實現形式,打贏新時代人民戰爭總體戰。應充分發揮新型舉國體制優勢,依託一體化國家戰略體系與能力,高效能聚合全域優勢資源,全方位激活國家國防潛力,將各種力量資源擰線成繩、結繩成網,把人民戰爭的領導要素、組織要素、人員要素、指揮要素、技術要素、裝備要素、保障要素等分系統結合起來,統合、統合方式要加強物理域、資訊域、社會域等領域全面統籌,重點在新域新質上尋求突破,在無人作戰、人機協同作戰、網電作戰、太空深海作戰、智慧自主作戰等新維度有所作為。軍事與非軍事手段相互配合,把政治、經濟、外交、輿論和軍事鬥爭等多種形式結合起來,綜合施策著力打好外交攻防戰、金融貿易戰、心理防護戰、輿論法理戰等,發揮政治攻勢和武裝打擊的綜合效能,統籌打好政治軍事仗。

強化積極防禦、主動進取

在長期革命戰爭實踐中,人民軍隊形成了一整套積極防禦戰略思想,如堅持戰略上防禦與戰役戰斗上進攻的統一,堅持防禦、自衛、後發製人的原則,堅持“人不犯我,我不犯人;人若犯我,我必犯人”,等等。積極防禦,根本在防禦、要義在積極,主動進取是其內在特質。當前,世情國情黨情軍情發生深刻變化,新時代人民戰爭的戰略戰術在總體上堅持防禦性的根本原則,不以霸道霸權和侵略欺壓他國為目的,因此也會贏得國內最廣大人民群眾擁護和支持以及世界上愛好和平與正義的國家和人民的理解和幫助。新時代條件下發展人民戰爭戰略戰術,須應時而變、應勢而動。堅持奉行防禦性國防政策,貫徹落實新時代軍事戰略方針,善於從政治高度出發觀察和分析問題,善於從地區和全球視角來思考和運用策略,夯實人民戰爭制勝的政治基礎。堅持不惹事也不怕事,加強軍事力量常態化多樣化運用,堅定靈活開展軍事鬥爭,在堅持戰略上後發製人的同時,不放棄有利條件下和必要時的戰役戰鬥進攻,穩紮穩打、穩中有進、穩中有為,有效塑造安全態勢,遏止危機沖突,牢牢把握爭鬥主動權。

突顯新質主導、科技賦能

在長期革命戰爭實踐中,人民軍隊在強調決定戰爭勝負的主要因素是人而不是物的同時,同樣高度重視對先進軍事技術特別是武器裝備的研發。毛澤東同志就曾強調,沒有現代的裝備,要戰勝帝國主義的軍隊是不可能的。現代戰爭的科技含量發生了質的飛躍,人工智慧、大數據、量子計算、無人自主、腦控等高新技術與新型武器裝備廣泛應用於軍事領域。雖然人民群眾依然是戰爭勝負的決定性力量,但是這種力量的表現形式發生了重要變化。科技是核心戰鬥力,人民戰爭將更重視科技手段的運用,更依賴人民群眾的智慧和創造力。新時代條件下發展人民戰爭戰略戰術,應把打贏資訊化智能化戰爭作為戰爭準備的著眼點,深研高端戰爭的本質特徵、制勝機理、戰略戰法,加速推動從「人多製勝」向「人才制勝」、從「人力製勝」向「智力製勝」轉變,切實提高新科技賦能、數智者發揮勝利能力、數智性的科技人才、新人民主義中的關鍵人民發揮作用。加速推進高新產業發展,大力加強海洋、太空、網路空間、人工智慧、量子科技等新域新質力量建設,加大高新技術領域軍地協作力度,加速新質生產力向新質戰鬥力轉化運用,推動戰爭潛力儲備向新興領域拓展、向新質力量聚焦。聚合協同軍地科技優勢,由聚焦人力物力等傳統支撐保障要素向聚焦資訊、技術、智慧等新質支撐保障要素轉變,建設底蘊深厚、儲備豐富的資訊池、資源池、技術池,積極打造精幹強能、專業性強的專業支前分隊,不斷拓展人民參戰與科技支前的廣度與深度。

講究靈活機動、創新制衡

在長期革命戰爭實踐中,人民戰爭戰略戰術是高度靈活機動的戰略戰術,最本質的要求是堅持以我為主,致人而不致於人,根據敵我雙方的實際情況,有什麼武器打什麼仗,對什麼敵人打什麼仗,在什麼時間地點打什麼時間地點的仗,找準敵之弱點和軟肋,發揚我之長主動和優勢,能永遠不能掌握戰場。靈活機動的戰略戰術是以劣勢裝備戰勝優勢裝備之敵的致勝法寶。 “你打你的、我打我的”,是中國革命戰爭長期經驗的總結和概括,是人民戰爭戰略戰術的靈魂和精髓。新時代條件下發展人民戰爭戰略戰術,必須掌握非對稱制衡的方法論要求,以作戰概念創新為抓手,遵循現代戰爭制勝機理,不斷推出實用管用的克敵制勝招法。堅持一切從敵我雙方的實際情況出發,深刻洞悉作戰任務、作戰對手、作戰環境變化,深刻把握制勝觀念、制勝要素、制勝方式發展,客觀分析研究敵我雙方的強弱、優劣,知彼知己、因勢而變,靈活運用各種作戰力量和作戰方法,努力以最小代價取得最大戰果。堅持“致人而不致於人”,揚長避短、避實就虛,出其不趨、攻其必救,主動創造戰機,靈活調動敵人,怎麼有利就怎麼打,怎麼擅長就怎麼打。堅持“以能擊不能”,與時俱進推進軍事理論、作戰指導、戰法訓法研究運用,創新核心作戰概念,發展新質作戰手段,不按敵人套路打、盯著敵人軟肋打、發揮我軍優長打,在非對稱制衡中創造人民戰爭新的製勝優勢。

重視積小為大、神聚力合

在長期革命戰爭實踐中,我軍在相當長的時間內都是處於全局上的劣勢地位,所以人民戰爭戰略戰術重視局部上以強對弱,堅持積小勝為大勝,集中力量打殲滅戰,這成為人民軍隊戰勝強敵的關鍵一招。相較於以往,現代戰爭作戰往往在多維多域中展開,為實施「積小勝為大勝」提供了更加廣闊空間。新時代條件下發展人民戰爭戰略戰術,要強化「貌散而神聚,形散而力合」的理念,將分佈在多維戰場的諸多作戰力量動態集中聯合起來,通過效能融合、即時聚優,實施局部快速聚能攻擊、廣域遊擊襲擾,對敵分佈的要點實施殲這種神聚力合的分散式作戰更強調兵力部署廣域分散、能力狀態離散分佈,根據實現作戰企圖、達成作戰目的、遂行作戰任務需要,優選最佳作戰要素、單元、力量,通過作戰能力融合、行動作用累積,聚合最優作戰效應,激發最大作戰潛能,實現作戰效益最大化,達成最佳作戰效果。這種分散式作戰已經從「地理空間的分散」上升為「全局全維的動態耦合」:不再局限於人員裝備在物理空間的分散,而是拓展到網絡、電磁、認知等多維戰場;依託數據鏈、人工智能和分佈式指揮系統實現跨域協同,既極大提升了戰場生存力,又倍增了打擊效能。

中國原創軍事資源:http://www.81.cn/szb_223187/szbxq/index.html?paperName=jfjb&paperDate=2025-08-01&paperNumber=07&articleid=960384888

Military Intelligence Drives Accelerated Development of Chinese Army Cyberspace Operations

軍事情報推動中國軍隊網路空間作戰加速發展

現代英語:

The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.

Military intelligence leads to accelerated development of cyberspace operations

■Respect the soldiers Zhou Dewang and Huang Anwei

Three major technologies support the intelligence of cyberspace weapons

Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:

First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.

Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.

Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.

The intelligent trend of network-controlled weapons has become increasingly prominent

Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.

In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.

Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.

Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.

Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.

Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.

Intelligent command information system changes traditional combat command methods

Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.

In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.

In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.

To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.

In the future battlefield, fighting courage requires more fighting “wisdom”

■Yang Jian and Zhao Lu

At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.

Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.

It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.

In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.

現代國語:

資料來源:中國軍網綜合作者:敬兵 周德旺 皇安偉 等責任編輯:胡雪珂

黨的十九大報告指出,要「加速軍事智慧化發展,提升基於網路資訊體系的聯合作戰能力、全域作戰能力」。今天的《解放軍報》刊發文章指出,軍事智能化是機械化、資訊化之後軍事領域發展的新趨勢和新方向,我們要在現有機械化和資訊化基礎上發展智能化,同時用智能化牽引機械化和信息化向更高水平、更高層次發展。網路空間作為新型作戰領域,是科技含量高、最具創新活力的新領域,在軍事智慧化的牽引下,正迎來快速發展的機會期。

軍事智慧化牽引網路空間作戰加速發展

■敬兵 週德旺 皇安偉

三大技術支撐網路空間武器智慧化

智能是一種智慧和能力,是一切有生命週期的系統對規律的感應、認知與運用,智能化就是把這種智慧和能力固化下來,成為一種狀態。網路空間武器是網路空間遂行作戰任務的武器,其形態以軟體和程式碼為主,本質上是一段資料。網路空間武器的智慧化主要體現在以下三個方面:

一是智慧化漏洞挖掘。漏洞是網路武器設計的基礎,今年5月在全球傳播的勒索病毒軟體,就是利用了微軟作業系統漏洞,為網路安全界帶來了巨大震動。漏洞價格昂貴,零日漏洞價值幾萬到幾十萬美元不等。過去漏洞的發現,主要依靠有經驗的駭客,利用軟體工具對程式碼進行檢查和分析。今年中國網路安全大會期間舉辦的國際網路安全技術對抗聯賽總決賽中,參賽人員示範由智慧機器人現場進行漏洞挖掘,然後透過漏洞編寫網路程式碼,形成網路武器,攻破目標系統,奪取旗幟。這項變化,意味著漏洞挖掘進入了智慧化時代。

二是智能化訊號分析和密碼破譯。訊號是網路資料傳輸的載體,密碼是網路資料安全的最後屏障,訊號分析和密碼破解是網路空間作戰的核心技術,突破訊號和密碼是進入網路空間的基本路徑,也是網路武器攻擊的首要目標。智慧化訊號分析將訊號的協定分析、調變辨識、個體辨識等問題,透過大數據、雲端運算、深度學習等技術來解決。密碼破解是計算科學“皇冠上的明珠”,智能化密碼破譯通過對密碼數據樣本的積累,不斷學習、尋找規律,能找到破譯的鑰匙,從而打開網絡數據“保險櫃”的最後一扇門,解決網絡入侵和接入的關鍵環節。

三是智慧化武器平台設計。美軍在2009年提出「網路飛行器」項目,為網路空間作戰提供像戰車、艦艇、飛機這樣的平台,可以實現在網路空間裡自動偵察、載入網路武器、自主協同、自主攻擊,受到威脅時自我銷毀、清除痕跡,具備了一定的智慧化特徵。未來「網路飛行器」載入的武器,不是軟體人員編好的程式碼,而是根據偵察結果直接對發現的漏洞,現場即時進行智慧化網路武器設計,實現「訂購式」開發,從而大大提高網路空間作戰的針對性。

網控武器的智慧化趨勢愈加凸顯

受網路空間控制的武器簡稱網路武器,是透過網路連接,接受網路空間指令,執行跨域任務,在實體空間達成作戰效果的武器。未來的各種作戰武器平台,大多是聯網的武器平台,這樣軍事資訊網本質上就是物聯網,上聯衛星、雷達、無人機等網路實體,從感知到發現、追蹤、定位、打擊都可透過網路空間控制,網控武器的智慧化已在陸海空天電等戰場蓬勃發展。

2015年,敘利亞利用俄羅斯機器人軍團擊潰武裝分子,行動採用了包括6個履帶式機器人、4個輪式機器人、1個自動化火砲群、數架無人機和1套指揮系統。指揮官透過指揮系統調度無人機偵察發現武裝分子,機器人向武裝分子發動衝鋒,同時伴隨火砲和無人機攻擊力量支援,對武裝分子進行了致命打擊。這只是一場小規模的戰鬥,卻開啟了機器人「組團」作戰的先河。

海空戰場網控智慧武器正在大量研發驗證。 2014年,美國海軍使用13艘無人水面艇,示範驗證無人艇集群攔截敵方艦艇,主要透過交換感測器數據,取得了不錯的效果。 2016年再次試驗時,新增了協同任務分配、戰術配合等功能,「蜂群意識」成為其智慧化的顯著特徵。

用於空中作戰的小微型無人機蜂群也正在快速發展。近年來,美國國防部多次試驗「山銻」微型無人機,可一次投放數十架乃至上百架,透過提升其執行偵察任務時的協同能力,在無人機編隊、指揮、控制、智慧化管理等方面都取得了進展。

空天網控武器越來越「聰明」。空天領域主要包含偵察和打擊兩類網控武器,各種功能的衛星主要執行偵察任務,是典型的偵察感測器。隨著各種小微衛星群的出現,使衛星表現出新的特徵:體積小、發射快、數量多、更聰明。小微衛星群在執行偵察和通訊任務時,有了更大的彈性和可靠性,目前世界衛星強國都在積極制定覆蓋範圍更廣的小微衛星群計畫。

各種高超音速打擊武器在空天巡航,彷彿懸在人們頭頂的利劍。美國空軍研究室稱「高速打擊武器」將在2018年前後啟動飛行試驗,其它各國也正積極研發類似武器。這類武器最大的特色是速度快、航程遠、智能化程度高。

智慧化指揮資訊系統改變傳統作戰指揮方式

網路空間武器和受網路空間控制的武器,是智慧化戰爭的“拳頭”,而指揮這些武器運用的指揮資訊系統是智慧化戰爭的“大腦”,網路空間作戰指揮資訊系統要同步跟上智慧化的進程。目前,幾乎全球的指揮資訊系統都面臨著「智慧滯後」的難題,未來戰爭需要快速決策、自主決策,這對智慧輔助系統提出了更高要求。

2007年,美國國防部高級研究計劃局啟動關於指揮控制系統的研發計劃——“深綠色計劃”,以期能實現計算機輔助指揮官快速決策贏得制勝先機。這是一個戰役戰術級的指揮資訊系統,其研發目的是將該系統嵌入美國陸軍旅級C4ISR戰時指揮資訊系統中去,實現指揮官的智慧化指揮。直到今天,美軍也沒有放鬆對智慧化指揮資訊系統的發展。

在網路空間作戰中,網路目標表現為一個接取網路的IP位址,數量眾多導致人工難以有效率操作,作戰更需要智慧化指揮資訊系統的輔助支撐。目前,智慧化指揮資訊系統需要實現智慧情報分析、智慧感知、智慧導航定位、智慧輔助決策、智慧協同、智慧評估、智慧化無人作戰等功能,尤其是實現對無人網控系統的集群作戰操控,這都對智慧化指揮資訊系統提出了迫切需求,需要加快相應關鍵技術的研發和運用。

綜上所述,智慧化的網路武器和網路控制武器,透過智慧化的資訊系統調度,將形成巨大的作戰能力,基本能遂行現行作戰樣式中的所有行動。未來戰爭,從指揮力量編組、到目標選擇、行動方式、戰法運用等,都將在智能化的背景下展開,戰爭「遊戲化」的特徵將更顯著,作戰指揮方式也將發生重大變化。

未來戰場 鬥勇更需鬥“智”

■楊建 趙璐

目前,人工智慧發展進入嶄新階段,並開始向各個領域加速滲透。受此一進程的影響,各國圍繞智慧化的軍事競爭已揭開序幕。我軍歷來是一支英勇頑強、敢打必勝的人民軍隊,未來戰場上應繼續發揚光榮傳統,同時要更加廣泛地掌握和利用最新的科技成果,研製出更多智能化的武器裝備,在未來戰場上掌握制勝先機。

智慧化是人類社會發展的趨勢,智慧化戰爭正加速到來。正是由於超越原有體系結構計算模型的成功創新、奈米製造技術的逐步普及,以及對人腦機制研究的突破性進展,軍事智慧化發展才擁有了堅實的基礎。因此,智慧化武器裝備的表現日益突出,並在情報分析、戰鬥反應等方面開始超越並取代人類。此外,在人力需求、綜合保障、運作成本等方面,智慧化武器裝備也具有明顯的優勢,日益成為戰爭的主導力量。

事實證明,智慧化武器裝備的發展應用,拓展了軍事行動的能力範圍,大幅提升了部隊的作戰效能。在阿富汗和伊拉克戰場上,無人機已承擔了大部分偵察、情報、監視等作戰保障任務,並承擔了約三分之一的空中打擊任務。近兩年,俄羅斯在敘利亞戰場上也曾多次使用較高智慧化程度的無人偵察機、戰鬥機器人等裝備。智慧化武器裝備正愈來愈地展現出超越傳統武器的重要價值。

未來戰爭中,作戰體系智能化的較量將是高手過招、巔峰對決的勝利關鍵。隨著以科技為支撐的軍事手段發展的不平衡性越來越大,誰先具備實施智能化作戰的能力,誰就更能掌握戰場的主動權,擁有技術代差優勢的強者會盡可能將戰爭成本降到最低,而弱者必然遭受巨大損失,付出慘重代價。我們不僅要加緊核心技術創新、武器裝備研製,還要研究探索適應軍事智能化發展的組織結構、指揮方式和運用模式,更要培養一支能夠擔起推進軍事智能化發展、鍛造智能化作戰能力的人才隊伍,充分發揮我軍作戰體系的整體效能,在與對手的較量中,以更加“智慧”的方式贏得戰爭。

中國原創軍事資源:http://www.81.cn/jwzl/2017-11/24/content_7841895888.htm

Chinese Military Higher Education During an Era of Intelligent Warfare

智慧戰爭時代的中國軍事高等教育

現代英語:

“Military academies were born and built for war”. At the opening ceremony of the 2019 military academy principals training camp, President Xi proposed a new era of military education policy, pointing out the direction for the military academies to cultivate high-quality, professional new military talents. At present, the form of war is accelerating towards informatization and intelligence. What kind of soldiers are needed to win future intelligent wars, and how military higher education can cultivate talents to adapt to intelligent wars are major issues before us.

The war form is accelerating towards intelligence

The form of war is a staged expression and state of war history that is mainly marked by the technical attributes of main battle weapons. So far, after experiencing cold weapon wars, hot weapon wars, and mechanized wars, war forms are accelerating their development towards information-based and intelligent wars. The increasingly widespread application of advanced technologies such as big data, the Internet of Things, artificial intelligence, biotechnology, and brain science in the military field is becoming an important driver of the new military revolution, giving birth to new unmanned, autonomous, and intelligent warfare forms, and changing the traditional The winning mechanism of war. In 2014, a foreign military think tank released a research report titled “War in the 20YY∶ Robot Era”, believing that a storm of military change marked by intelligent armies, autonomous equipment, and unmanned warfare is coming, and it will develop intelligent combat platforms, information systems and decision-making support systems, as well as new weapons such as directional energy, hypersonic speed, bionic, genetic, and nanometer By 2035, an intelligent combat system will be initially built, and by 2050, it will develop to an advanced stage, fully realizing intelligent or even unmanned combat platforms, information systems, and command and control. New weapons such as bionics, genes, and nanometers will enter the battlefield, and combat space will be further expanded. Expand to biological space, nanospatial space, and intelligent space.

In recent years, as people’s research on the human brain continues to deepen, brain-computer interface technology is becoming increasingly mature. In the future, the exchange of information between humans and the external world will no longer be limited to the senses. Direct information exchange between the brain and the outside world can also be achieved through chips. People and people, people and things are fully interconnected, and humans may transcend the Internet and the Internet of Things and enter the intelligent era supported by the Internet of Things. In the era of brain networking, soldiers’ brains are directly connected to combat platforms, information systems, and decision-making support systems. With the assistance of technologies such as quantum computing and cloud platforms, decisions will be made. The targets of attack will expand to human thoughts and actions, matter, energy, information and The mind is integrated. Some domestic experts believe that under the influence of artificial intelligence technology, the winning mechanism of future wars will shift from information-based warfare “information-led, system confrontation, precise strike, joint victory” to intelligent warfare “intelligent-led, autonomous confrontation, traceability Strike, cloud brain victory” transformation, following matter, energy, and information, cloud intelligence that integrates humans and machines becomes the key to determining the outcome of a war. The transformation of this “intelligent war form” is accelerating, and any hesitation may have unimaginable consequences.

However, it should be noted that man is always the most fundamental element, no matter how the war develops. The intelligent war form will promote changes in the functional role of military personnel, and will put forward higher requirements for military personnel’s ability quality. Cognitive ability may surpass knowledge and skills and become the core ability of military personnel.

Intelligent warfare requires military personnel to upgrade and reconstruct their comprehensive quality

According to the “talent growth cycle”, soldiers who are currently receiving higher education will become the main force in military combat training in more than 10 years, and will also become the first main force to meet the challenges of intelligent warfare. At present, our military’s higher education still has some shortcomings in the design of talent training goals. It does not pay enough attention to the ability to adapt to future changes in the intelligent battlefield. There is still a certain gap between talent training goals and the demand for intelligent warfare. On July 23, 2020, when President Xi inspected the Air Force Aviation University, he emphasized the need to adhere to cultivating people with moral integrity, educating people for war, strengthening military spirit education, strengthening the fighting spirit, and comprehensively laying a solid foundation for the ideological and political, military professional, scientific and cultural, and physical and psychological qualities of pilot students. Base. Implementing President Xi’s important instructions and benchmarking against the needs of future intelligent warfare, there is an urgent need to build a higher-level military talent training goal with thinking as the core, and accelerate the upgrading and reconstruction of the comprehensive quality of military personnel.

Intelligent warfare is a complex giant system that integrates multiple fields. Its intelligence-based characteristics and iterative and changeable development trends are changing the role of soldiers in war. Soldiers may gradually move from the front desk of the war to the backstage, from direct face-to-face combat to human-machine coordinated combat, and from front-line charging to back-end planning and design of the war. To be competent in functional roles such as human-machine collaboration, planning and designing wars, in addition to ideological, political and physical psychology requirements, in terms of military profession and science and culture, soldiers should focus on improving their knowledge and ability in the following five aspects: First, multi-disciplinary Integrate the knowledge structure, master the core principles of multiple intelligent war-related disciplines such as nature, military, cognitive psychology, and network intelligence, and be able to integrate knowledge across disciplines Guide military practice; the second is strong cognitive ability, with logical thinking, critical thinking, and systematic thinking abilities, and the ability to use scientific methods to analyze and infer combat problems; the third is human-machine collaboration ability, deeply grasp the characteristics and rules of intelligent warfare, and be proficient in operating Combat platforms, command and control systems, and decision-making support systems can control a variety of intelligent weapons and equipment to achieve efficient human-machine collaboration; fourth, innovative capabilities Have keen scientific and technological perception and strong creativity, and be able to grasp the forefront of science and technology, innovate combat styles, and master the laws of war development; fifth, self-growth ability, be able to accurately recognize oneself, reasonably plan military career, and freely use information means to acquire new knowledge, new technologies, new methods, constantly improve the knowledge structure, improve cognitive abilities, and better adapt to the complex and ever-changing development of military revolutions.

Find the focus of “paramilitary higher education reform”

At present, the superimposed advancement of informatization and intelligence has brought greater complexity to the talent training work of military academies. It is necessary to not only meet the needs of real-life information operations, but also lay the foundation for adapting to intelligent warfare. The following should be focused on Work.

Reconstructing the curriculum system. The curriculum system supports the formation of the talent knowledge structure. In order to “cultivate military talents that meet the needs of intelligent warfare and achieve the training goals of military major, science and culture, we should break the practice of designing curriculum systems with a single major as the background and establish a “general + direction” curriculum system”. General courses are based on existing natural science and public courses, adding courses such as mathematical logic, mathematical modeling, critical thinking, network basics, artificial intelligence, cognitive neuroscience, systems engineering, etc., and establishing a cross-field and cross-disciplinary horizontal course system, expand students’ knowledge, build the knowledge structure urgently needed for intelligent warfare, and lay a broad knowledge foundation for their lifelong growth. Direction courses are to establish a subject professional direction, set up a vertical course system of mathematical science, professional foundation, and professional positions, build a solid professional background, and cultivate students’ ability to use professional theories to solve complex combat training problems.“ The general knowledge +direction” curriculum system helps build a “T”-shaped knowledge structure to meet the needs of military talents to adapt to diverse and intelligent warfare.

Deepen classroom reform. Educational neuroscience believes that education is the reshaping of students’ brains, and classrooms are the main position for reshaping students’ neural networks. They play an irreplaceable role in the formation of high-level cognitive abilities required for intelligent warfare. Continuously deepening classroom reform is The current key task of military higher education. You have to see that a classroom with only knowledge understanding is far from a good classroom. All human behaviors, thoughts and emotions are controlled by the brain, and every knowledge, thought and emotion corresponds to the specific neural network of the brain. Therefore, classroom reform should focus on students’ learning and follow the cognitive laws of the human brain to attract and maintain attention as the starting point, establish a scientific thinking framework, and mobilize students to think proactively. Usually, the teaching method pointing to higher-order abilities has a general model —— problem-driven inspired teaching. Commonly used problem teaching methods, project teaching methods, and inquiry teaching methods all belong to this model. Therefore, the main way to promote classroom reform is to develop unknown, novel and questions and stories that students are interested in, design a thinking framework that points to logical reasoning, critical thinking, reflective ability, creative ability and learning ability, and inspire students to be guided by the framework. Actively think, supplemented by the output process of speaking and writing, and finally achieve the goal of internalizing knowledge understanding and forming high-level abilities.

Promoting comprehensive education. Modern educational theory not only regards the classroom as an important position in education, but also regards all time and space outside the classroom as an important resource for cultivating students. The time and space outside these classes not only support classroom teaching and promote the formation of intellectual abilities, but are also important places for cultivating non-intellectual abilities. Colleges and universities should make full use of these times and spaces, clarify specific training goals, and scientifically design education and training plans with a focus on going deep into the army, being close to actual combat, and highlighting practicality and creativity. Pay attention to giving full play to the management and education advantages of military academies, explore the establishment of student management models, and promote the cultivation of students’ leadership and management capabilities; continuously enrich the second classroom, build an innovation platform, create more independent practice opportunities, and enhance students’ innovative abilities; make full use of various large-scale activities, cultivate students’ competitive awareness and team collaboration capabilities; strengthen the construction of management cadre teams, improve scientific management and training capabilities, and be able to effectively guide students in time management and goal management Emotional management, psychological adjustment, habit development, etc., help students improve their self-management and independent learning abilities.

In short, education is a systematic project. The above are only three aspects that break through the shortcomings of talent training in the intelligent era. To truly solve the problem, military academies need to carry out systematic reforms in strategic planning, quality management, personnel quality, and teaching conditions. It can effectively support the achievement of talent training goals in all aspects, and this requires us to continue to explore and innovate, and continuously improve the level of running schools and educating people Efforts have been made to create a new situation in the construction and development of military academies.

(Author’s unit: Air Force Aviation University)

現代國語:

“軍隊院校因打仗而生、為打仗而建”。在2019年全軍院校長集訓開班式上,習主席提出新時代軍事教育方針,為全軍院校培養高素質、專業化新型軍事人才指明了方向。當前,戰爭形態正加速向信息化、智能化發展,打贏未來智能化戰爭需要什麼樣的軍人,軍事高等教育如何培養適應智能化戰爭的人才等,是擺在我們面前的重大課題。

戰爭形態加速向智能化發展

戰爭形態是以主戰兵器技術屬性為主要標志的、戰爭歷史階段性的表現形式和狀態。迄今為止,戰爭形態在經歷了冷兵器戰爭、熱兵器戰爭、機械化戰爭之後,正加速向信息化、智能化戰爭發展。大數據、物聯網、人工智能、生物技術、腦科學等先進科技在軍事領域日益廣泛的應用,正成為新軍事革命的重要推手,催生新的無人化、自主化、智能化戰爭形態,改變著傳統戰爭制勝機理。2014年,外軍智庫發布名為《20YY∶機器人時代的戰爭》的研究報告,認為以智能化軍隊、自主化裝備和無人化戰爭為標志的軍事變革風暴正在來臨,其將通過發展智能化作戰平台、信息系統與決策支持系統,以及定向能、高超聲速、仿生、基因、納米等新型武器,到2035年初步建成智能化作戰體系,到2050年將發展到高級階段,全面實現作戰平台、信息系統、指揮控制智能化甚至無人化,仿生、基因、納米等新型武器走上戰場,作戰空間進一步向生物空間、納米空間、智能空間拓展。

近年來,隨著人們對人腦研究的不斷深入,腦機接口技術正日趨成熟,未來人類與外部世界的信息交換將不再局限於感官,還可以通過芯片實現大腦與外界直接的信息交流,人與人、人與物充分互聯互通,人類或將超越互聯網、物聯網,進入腦聯網支持的智能時代。腦聯網時代,軍人的大腦與作戰平台、信息系統、決策支持系統直接相聯,在量子計算和雲平台等技術輔助下開展決策,打擊的對象將拓展到人的思想和行動,物質、能量、信息與心智融為一體。國內有專家認為,在人工智能技術的作用下,未來戰爭的制勝機理將由信息化戰爭的“信息主導、體系對抗、精確打擊、聯合制勝”,向智能化戰爭的“智能主導、自主對抗、溯源打擊、雲腦制勝”轉變,繼物質、能量、信息之後,人機融合的雲智能成為決定戰爭勝負的關鍵。這一智能化戰爭形態的轉變正在加速到來,任何遲疑都可能帶來難以想象的後果。

但應該看到,無論戰爭如何發展,人始終是最根本的要素。智能化戰爭形態將促使軍人的職能作用發生變化,對軍人的能力素質將提出更高的要求,認知能力或將超越知識、技能成為軍人的核心能力。

智能化戰爭要求軍人綜合素質升級重構

根據人才成長周期,目前正在接受高等教育的軍人,10多年後將成為部隊作戰訓練主體力量,也將成為迎接智能化戰爭挑戰的第一批主力軍。當前,我軍高等教育在人才培養目標設計上尚存在一些不足,對適應未來多變的智能化戰場能力關注不夠,人才培養目標與智能化戰爭需求還有一定差距。2020年7月23日,習主席視察空軍航空大學時,強調要堅持立德樹人、為戰育人,加強軍魂教育,強化戰斗精神,全面打牢飛行學員思想政治、軍事專業、科學文化、身體心理等素質基礎。貫徹習主席重要指示,對標未來智能化戰爭需求,迫切需要構建以思維力為核心的更加高階的軍事人才培養目標,加快軍人綜合素質升級重構。

智能化戰爭是整合多個領域的復雜巨系統,其智力為本的特點和迭代多變的發展趨勢,正在改變軍人在戰爭中的角色。軍人或將逐步由戰爭前台走向幕後,由直接面對面作戰轉變為人機協同作戰,由前線沖鋒陷陣轉變為後端籌劃設計戰爭。要勝任人機協同、籌劃設計戰爭等職能作用,除思想政治和身體心理必須達到要求外,在軍事專業和科學文化方面,軍人應重點提升以下五個方面的知識能力素質:一是多學科融合的知識結構,掌握自然、軍事、認知心理、網絡智能等多個智能化戰爭相關學科領域的核心原理,能夠跨學科整合知識,指導軍事實踐;二是強大的認知能力,具有邏輯思維、審辨思維、系統思維能力,能夠運用科學方法分析推理解決作戰問題;三是人機協作能力,深刻把握智能化戰爭特點規律,熟練運用作戰平台、指揮控制系統、決策支持系統,能夠操控多樣化智能武器裝備,實現人機高效協同;四是創新能力,具有敏銳的科技感知力和強大的創造力,能夠把握科技前沿,創新作戰樣式,掌握戰爭發展規律;五是自我成長能力,能夠准確認知自我,合理規劃軍事職業生涯,自如運用信息手段獲取新知識、新技術、新方法,不斷完善知識結構,提升認知能力,較好地適應復雜多變的軍事革命發展。

找准軍事高等教育改革著力點

當前,信息化與智能化的疊加推進,給軍隊院校人才培養工作帶來更大復雜性,既要滿足現實的信息化作戰需要,同時又要為適應智能化戰爭奠定基礎,應著重抓好以下幾項工作。

重構課程體系。課程體系支撐著人才知識結構的形成。為培養滿足智能化戰爭需要的軍事人才,達成軍事專業、科學文化兩個方面的培養目標,應打破以單一專業為背景設計課程體系的做法,建立“通識+方向”的課程體系。通識課程是在現有自然科學和公共類課程基礎上,增加數理邏輯、數學建模、批判性思維、網絡基礎、人工智能、認知神經科學、系統工程等課程,建立跨領域跨學科的橫向課程體系,拓展學員的知識面,搭建智能化戰爭急需的知識結構,為其終身成長奠定廣博的知識基礎。方向課程是確立一個學科專業方向,設置數理科學、專業基礎、專業崗位的縱向課程體系,構建厚實的專業背景,培養學員運用專業理論解決復雜作戰訓練問題的能力。“通識+方向”的課程體系,有助於構建“T”形知識結構,滿足軍事人才適應多樣多變智能化戰爭的需要。

深化課堂改革。教育神經科學認為,教育是對學生大腦的重塑,而課堂是重塑學生神經網絡的主陣地,特別對於智能化戰爭所需要的高階認知能力形成具有不可替代的作用,持續深化課堂改革是軍事高等教育當前的關鍵任務。要看到,只有知識理解的課堂遠遠不是一個好課堂。人的一切行為、思想和情感全部由大腦控制,每個知識、思維和情緒都與大腦的特定神經網絡相對應,因此,課堂改革要以學生的學習為中心,遵循人腦的認知規律,以吸引和保持注意力為起點,建立科學的思維框架,調動學員主動思考。通常,指向高階能力的教學方法具有一個通用模式——問題驅動的啟發式教學,常用的問題式教學法、項目式教學法、探究式教學法都屬於這一模式。所以,推進課堂改革的主要路徑是開發未知、新奇和學生感興趣的問題和故事,設計指向邏輯推理、審辨思維、反思能力、創造能力以及學習能力的思維框架,啟發學員在框架的指引下主動思考,再輔以講出來、寫出來的輸出過程,最後達成知識理解內化和高階能力形成的目標。

推動全面育人。現代教育理論不僅把課堂作為教育的重要陣地,還把課堂之外的所有時間和空間都視作培養學生的重要資源。這些課堂以外的時間和空間不僅支撐課堂教學、促進知識能力形成,還是培育非智力能力的重要場所。院校應充分利用這些時間和空間,明確具體的培養目標,以深入部隊、貼近實戰、突出實踐性和創造性為重點,科學設計教育訓練計劃。注重發揮軍隊院校管理育人優勢,探索建立學員管理模式,促進學員領導管理能力的培養;不斷豐富第二課堂,搭建創新平台,創造更多自主實踐機會,提升學員的創新能力;充分利用各種大型活動,培養學員競爭意識和團隊協作能力;加強管理干部隊伍建設,提高科學管訓能力,能夠有效輔導學員開展時間管理、目標管理、情緒管理、心理調節、習慣養成等,幫助學員提升自我管理和自主學習能力。

總而言之,教育是一個系統工程,以上僅是突破智能化時代人才培養短板的三個方面,真正解決問題還需要軍隊院校進行系統化改革,在戰略規劃、質量管理、人員素質、教學條件等諸方面都能夠有效支撐人才培養目標的達成,而這需要我們持續不斷地探索與創新,不斷提高辦學育人水平,努力開創軍事院校建設發展新局面。

(作者單位:空軍航空大學)

來源:解放軍報 作者:唐維忠 責任編輯:王鳳 2021-05-13 10:24:xx

中國原創軍事資源:http://www.mod.gov.cn/gfbw/gfjy_index/jsyxgfs/4885203888.html?big=fan

Chinese Military Research on Conceptual System-based Superior Warfare – How to Fight in Information Warfare System Operations? Analysis of Nine Typical Combat Styles

中國軍事體系優勢作戰概念研究-資訊化作戰體系如何作戰?九種典型作戰風格分析

現代英語:

System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole. 


       In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze .

       System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“
        1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence
        2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations
       3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure
       4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control
       5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
       6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma
       7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support
       8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics
       9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system

        For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body
       The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.


       1. Overall deterrence
       Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.


       1.1 Emphasis on multi-domain joint deterrence
       Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.

1.2 The implementation of overall deterrence should have three major elements
       Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.


       Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.


       1.3 Strong overall strength is the core of achieving effective deterrence
       The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war.
       In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.


       2. Electromagnetic Disturbance Warfare
       Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.


       2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.


       2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.


       2.3 Crack effective tactics for unmanned cluster operations
     “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.


       3. Cyber-sabotage
       Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities.
       The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.


      4. Cognitively Controlled Disturbance Warfare
      Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage.
      Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.


       4.1 Control the cognitive rights of situational awareness and compete for information advantages
       In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.


       4.2 Control and command decision-making power and compete for decision-making advantages
       Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.


       4.3 Control “brain” power and seize the advantage of brain control
       Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.


      5. Agile Mobile Warfare
      Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.

Table 1 Connotation of the concept of agile warfare


      5.1 Efficient and fast decision-making
      To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.


      5.2 High efficiency forms a favorable combat situation
      It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.


      5.3 Efficient and instant gathering of combat power
      To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.


      5.4 Agile mobile warfare is an innovative development of traditional mobile warfare
      In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.


       6. Unmanned cluster autonomous warfare
       Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.


       6.1 It is conducive to forming a system advantage to suppress the enemy
       Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.


       6.2 Conducive to enhancing combat effectiveness
       In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.


       6.3 Conducive to getting into enemy combat difficulties
       Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.


       7. Pointkill Battle
       “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.


      7.1 Achieve efficient combat cost ratio
      Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.


       7.2 Targeting key nodes is an important option
       The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.


       7.3 Large-scale system support is the basic condition
       The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.


       7.4 It is inseparable from precise intelligence support
       In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.


       8. Supply-breaking
       Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.


       8.1 The supply guarantee chain has a huge impact on the overall combat situation
       Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.


       8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain
       The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.


       8.3 The key is to choose the right time and make full use of tactics
       It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.


       9. System “paralysis battle”
       System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.


       9.1 The combat goal is to disorderly operate the enemy’s combat system
       In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.


       9.2 A key node in the heavy strike combat system
       Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.


       9.3 Implement soft strikes against the enemy’s combat system
       When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat. 

現代國語:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制資訊權,進而贏得作戰主動;三是網路破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通信網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速回應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間訊息「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理信息,還要採取網絡輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假信息,破壞、擾亂敵對戰場態勢的感知、認知,最大限度地製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施法實作「攻芯」,透過反義程式定義、原則性反制勝;
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志”的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進信息作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵對決策,或使其失能,實現隱形敵作戰。如以人的認知思維為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施“注入”“侵入”式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵

5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提高作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全局作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人群聚自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘敵實施幹擾、欺騙,或配合主戰兵器實施分佈式協同攻擊,實現整體分散式協同攻擊者。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦探測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以作出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點與關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞著實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使線路、通信和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱密性突然打擊;隱形奇襲戰,使用潛艦、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確補給
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整和重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連接、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界有關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,基於網絡的各種戰爭資源,可以快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2基本著眼導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通信聯絡及資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱整個作戰控制能力,使敵軍系統失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊資訊網路和物理設施,摧毀敵人實體武器。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷和硬摧毀行動,破壞敵之網路體系,使敵能作戰系統整體下降甚至失能作戰。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運作機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟性打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強電磁幹擾,使其信息失靈,陷入戰爭迷霧之中;網絡戰,使用網絡進攻力量對敵網絡信息體系實施攻擊,使敵指揮通信系統和計算機網絡受到嚴重破壞,使其指揮失靈,陷入信息孤島乃至戰爭孤島;心理戰和作戰論戰,使用心理戰、輿論手段,對敵對認知,打擊其戰爭論戰,使用心理戰、輿論手段,對敵對心理打擊行為論組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗。

中國原創軍事資源:http://www.81it.com/2022/0901/13716888.html

Chinese Military’s Brief Analysis of Multi-dimensional Central Warfare

中國軍隊多維中心戰淺析

現代英語:

2023-09-27 11:58:xx

Source: Guangming Military

Since the 1990s, the concepts of multi-dimensional central warfare, such as network-centric warfare, personnel-centric warfare, action-centric warfare, and decision-centric warfare, have been proposed one after another. The evolution of the concept of multi-dimensional central warfare reflects the overall goal of seeking advantages such as platform effectiveness, information empowerment, and decision-making intelligence by relying on military science and technology advantages, and also reflects the contradictory and unified relationship between people and equipment, strategy and skills, and the strange and the normal. Dialectically understanding these contradictory and unified relationships with centralized structured thinking makes it easier to grasp the essential connotation of its tactics and its methodological significance.

Strengthen the integration of the “human” dimension in the combination of people and equipment

The concepts of personnel-centric warfare and platform-centric warfare largely reflect the relationship between people and weapons and equipment. Some have specially formulated human dimension strategies, emphasizing continuous investment in the human dimension of combat effectiveness, which is the most reliable guarantee for dealing with an uncertain future. Since the beginning of the 21st century, with the rapid development of intelligent weapons and equipment, unmanned combat has emerged, and voices questioning the status and role of people have arisen one after another. It is imperative to strengthen the integration of the human dimension and enhance the synergy of the human dimension.

First, we need to enhance spiritual cohesion. Marxism believes that consciousness is the reflection of objective matter in the human mind. Tactics are the expression and summary of combat experience, and they themselves have spiritual or conscious forms. When studying tactics, we naturally need to put spiritual factors first. Some scholars believe that war is still fundamentally a contest of human will. In the information age, people’s spirits are richer and more complex, and enhancing the spiritual cohesion of the human dimension is more challenging and difficult. To enhance people’s spiritual cohesion, we need to coordinate the cultivation of collective spirit and individual spirit, maximize the satisfaction of individual spiritual needs in leading the collective spirit, realize individual spiritual pursuits in shaping the value of collective spirit, and empower people’s spirit with all available and useful information; we need to coordinate the cultivation of critical spirit and innovative spirit, adhere to the tactical epistemology of dialectical materialism, resolutely oppose idealism and mechanism in tactical cognition, and constantly inherit and innovate in criticism; we need to coordinate the cultivation of fighting spirit and scientific spirit, and promote the revolutionary spirit of facing death with courage and winning, and promote the spirit of winning by science and technology.

The second is to enhance the organizational structure. Organizations are the organs of the military, and people are the cells of the organization. The settings of military organizations in different countries have their own characteristics and commonalities. For example, the Ministry of National Defense is generally set up to distinguish between the structure of military branches, hierarchical structures and regional structures, and to distinguish between peacetime and wartime organizations. Although the purpose of construction and war is the same, the requirements for the unity of construction and the flexibility of war are different. To enhance the organizational structure and promote the consistency of war and construction, it is necessary to smooth the vertical command chain, reasonably define the command power and leadership power, command power and control power, so that the government and orders complement each other, and enhance the vertical structural strength of the organization; it is necessary to open up horizontal coordination channels, explore the establishment of normalized cross-domain (organizations, institutions, departments) coordination channels, change the simple task-based coordination model, and enhance the horizontal structural strength of the organization; it is necessary to improve the peace-war conversion mechanism, focus on the organization connection, adjustment and improvement in the change of leadership or command power of the troops, and maintain the stability and reliability of the organizational structure network.

The third is to enhance material support. The spiritual strength of people in combat can be transformed into material strength, but spiritual strength cannot be separated from the support of material strength. To enhance material support and thus realize the organic unity of material and spirit, it is necessary to ensure combat equipment, bedding, food, and medical care, build good learning venues, training facilities, and re-education channels, provide good technical services in combat regulations, physiological medicine, etc., help design diversified and personalized capacity improvement plans and career development plans, and provide strong material and technical support for the development of people’s physical fitness, skills, and intelligence, and thus comprehensively improve people’s adaptability and combat effectiveness in the uncertain battlefield environment of the future.
             

Deepen the practice of the “skill” dimension in the combination of combat and skills

The combination of combat skills is an important principle of tactical application. The technology includes not only the technology at the practical operation level (such as shooting technology), but also the technology at the theoretical application level (such as information technology). It can be said that tactics, technology, art and procedures together constitute its “combat methodology”. Scientific and technological development and scientific technology are important characteristics of scientific and technological development. To deepen the combination of combat skills, it is necessary to correctly grasp the relationship between technology and tactics, art and procedures, and continuously deepen the practice of the “skill” dimension.

First, promote the tacticalization of advanced technology. Technology determines tactics, which is the basic view of dialectical materialism’s tactical theory. The evolution of the concept of multi-dimensional central warfare is also an example of technology driving the development and change of tactics. Engels once pointed out: “The entire organization and combat methods of the army and the related victory or defeat… depend on the quality and quantity of the population and on technology.” However, technology-driven tactics have a “lag effect”, especially in the absence of actual combat traction. This requires actively promoting the military transformation of advanced civilian technologies and the tactical application of advanced military technologies. On the one hand, we must actively introduce advanced civilian technologies, especially accelerate the introduction and absorption of cutting-edge technologies such as deep neural networks and quantum communication computing; on the other hand, we must strengthen tactical training of advanced technology equipment, closely combine technical training with tactical training, and promote the formation of new tactics and new combat capabilities with new equipment as soon as possible.

Second, promote the technicalization of command art. “Art” is a highly subjective concept. Some Chinese and foreign scholars believe that “the art of command is rooted in the commander’s ability to implement leadership to maximize performance”, while others believe that “the art of command is the way and method for commanders to implement flexible, clever and creative command”. Chinese and foreign scholars generally regard command as an art. The main reason is that although command has objective basis and support such as combat regulations, superior orders and technical support, the more critical factor lies in the commander’s subjective initiative and creativity, which is difficult to quantify by technical means. With the development of disciplines and technologies such as cognitive psychology and cognitive neuroscience, the cognitive structure and mechanism of command will become more explicit, the mysterious veil of “command art” will gradually fade, and the technicalization of command art will become an inevitable trend. This requires continuous strengthening of technical thinking, continuous deepening of the construction of artificial intelligence-assisted command decision-making means, continuous deepening of the application of human brain decision-making mechanisms, practical use of technology to deconstruct art, and continuous promotion of the technicalization of command art.

The third is to promote the regulation of combat technology. Many scholars place technology on a position that is almost as important as tactics. This insistence on the integrated development of tactical regulation and the regulation of specialized military technology and special combat technology is an important way to promote the systematic and standardized construction of combat regulations and further achieve the integration and unification of tactics and technology at the legal level.
              

Seeking the advantage of the “odd” dimension in combining the odd and the regular

The odd and the even are a basic contradictory structure of tactics, with inherent identity. Without the odd, there is no even, and without the even, there is no odd; either the odd or the even, ever-changing. The choice of the odd and the even is the category of decision-centered warfare, and the application of the odd and the even is the category of action-centered warfare. In the 1990s, the theories of asymmetric warfare, non-contact warfare, and non-linear warfare were proposed. If “symmetric warfare, contact warfare, and linear warfare” are even, then “asymmetric warfare, non-contact warfare, and non-linear warfare” can be called odd. From the perspective of natural science, “symmetry, contact, and linear” are general, and “asymmetry, non-contact, and non-linear” are detailed. It is an inevitable requirement to grasp the dimension of “odd” in the combination of odd, odd, and even, and to seek the advantages of the “three nons”.

First, seek “asymmetric” advantages. “Symmetry” and “asymmetry” originally refer to the morphological characteristics of things or space. Symmetrical warfare is a battle between two troops of the same type, and asymmetric warfare is a battle between two different types of troops. The theory of asymmetric warfare requires the scientific and reasonable organization of troops, combat forces and weapon systems of different military services, deployment in a wide area, and the concentration of superior forces to deal a fatal blow to the enemy at the best combat opportunity, and then quickly redeploy the forces. Due to the limited combat power, the troops have positive asymmetric advantages and negative asymmetric disadvantages. Seeking asymmetric advantages and avoiding asymmetric disadvantages is the common expectation of the warring parties, which will lead to such a situation that the warring parties cycle back and forth between symmetry and asymmetry. Therefore, to seek “asymmetric” advantages, it is necessary to seek asymmetry in combat power, combat capability, combat command and other aspects, adhere to and carry forward “avoid the strong and attack the weak, avoid the real and attack the virtual”, “you fight yours, I fight mine”, and effectively play advantages and avoid disadvantages in asymmetry. For example, when weapons and equipment are symmetrical, strive to gain an asymmetric advantage in personnel capabilities; when forces are symmetrical, strive to gain an asymmetric advantage in command art.

The second is to seek “non-contact” advantages. “Contact” and “non-contact” are a description of the distance between different things. Contact in the military field is usually defined by the projection distance of weapons. The concept of “non-contact combat” originated from World War II and was created during the Cold War. The connotation of contact combat and non-contact combat changes with the change of the striking distance of weapons and equipment. The warring parties always seek to attack each other at a farther distance or in a wider space without being threatened. Since the 1990s, the theory of “non-contact combat” has been used in many local wars. Non-contact combat is a combat action style that implements long-range precision strikes outside the defense zone while being far away from the opponent. Non-contact combat embodies the idea of winning by technology, flexible mobility, and center of gravity strikes. With the rapid development of military science and technology, the armies of major countries in the world will have the ability to perceive and strike globally, and the connotation of “non-contact” will be further compressed to space, cognitive domain and other space fields. To this end, on the one hand, we must base ourselves on the reality of “contact combat”, learn from each other’s strengths and overcome our weaknesses in contact, and continuously accumulate advantages; on the other hand, we must expand the space for “non-contact combat”, seize the initiative and seize the opportunity in non-contact, and continuously expand our advantages.

The third is to seek “nonlinear” advantages. “Linear” and “nonlinear” usually refer to people’s thinking or behavior patterns. The movement of all things in the universe is complex and mostly nonlinear, while human cognition always tends to be simple, abstract, and linear, and has invented concepts such as logic lines, time lines, and linear mathematics. In military science, the transition from linear operations to nonlinear operations reflects the development and progress of military technology theory. Since the second half of the 20th century, nonlinear operations have been on the historical stage. Some scholars have pointed out that in linear operations, each unit mainly acts in a coordinated manner along a clear front line of its own side. The key is to maintain the relative position between its own units to enhance the safety of the units; in nonlinear operations, each unit simultaneously carries out combat operations from multiple selected bases along multiple combat lines. The key is to create specific effects at multiple decision points against the target. Linear operations mainly reflect the action-centered warfare idea, while nonlinear operations mainly reflect the target-centered warfare idea. To this end, on the one hand, we must deepen the use of linear warfare and make full use of its practical value in facilitating command, coordination and support; on the other hand, we must boldly try non-linear warfare and maximize its potential advantages of extensive mobility and full-dimensional jointness. (Yin Tao, Deng Yunsheng, Sun Dongya)

現代國語:

2023-09-27 11:58:xx

來源:光明軍事
自1990年代以來,網路中心戰、人員中心戰、行動中心戰、決策中心戰等多維度的中心戰概念先後被提出。多維度中心戰概念的演變,反映了依靠軍事科技優勢尋求平台效能、資訊賦能、決策智能等優勢的總體目標,更反映了人與裝、謀與技、奇與正等方面的對立統一關係。以中心式結構化思維辯證地認識這些對立統一關係,更便於掌握其戰術的本質內涵及其方法論意義。
強化人裝結合中「人」維度融合
人員中心戰與平台中心戰概念很大程度上反映的是人與武器裝備的關係。有的專門制定人維度策略,強調在戰鬥力的人維度進行持續投入,對於應對不確定的未來是最可靠的保障。進入21世紀以來,隨著智慧化武器裝備的快速發展,無人作戰異軍突起,對人的地位作用的質疑聲音此起彼伏,強化人維度的融合、增強人維度的合力勢在必行。
一是增強精神凝聚力。馬克思主義認為,意識是客觀物質在人腦中的反映。戰術是戰鬥經驗的表現與概括,本身俱有精神或意識上的形態,研究戰術自然要把精神因素放在第一位。有學者認為,戰爭從根本上來說仍然是人類意志的較量。在資訊化時代,人的精神更加豐富複雜,增強人維度精神上的凝聚力,挑戰和難度更高。增強人的精神凝聚力,需要統籌培養集體精神與個體精神,在引領集體精神中最大限度滿足個體精神需求,在培塑集體精神價值中實現個體精神追求,用一切可用、有用的信息賦能人的精神;需要統籌培養批判精神與創新精神,堅持辯證唯物論的戰術知識論,堅決反對戰術認識上的唯心論和機械論,不斷在批判中繼承、在繼承中創新;需要統籌培養戰鬥精神與科學精神,既要弘揚視死如歸、敢打必勝的革命精神,又要發揚科學制勝、技術制勝的精神。


二是增強組織結構力。組織是軍隊的器官,人是組織的細胞。不同國家軍事組織的設置有其特性,也有其共通性。例如普遍設有國防部,區分軍種結構、層級結構與區域結構,區分平時編制與戰時編成。儘管建與戰在目的上是一致的,但是建的統一性與戰的彈性在要求上不盡相同。增強組織結構力進而促進戰建一致,需要暢通縱向指揮鏈路,合理界定指揮權與領導權、指揮權與控制權,做到政令相長,增強組織的縱向結構力;需要打通橫向協同管道,探索建立常態化的跨領域(組織、機構、部門)協同途徑,改變單純的任務式協同模式,增強組織的橫向結構力;需要健全平戰轉換機制,重點關注部隊領導權或指揮權變更中組織銜接、調整和健全等工作,保持組織結構網絡的穩定性、可靠性。
三是增強物質保障力。戰鬥中人的精神力量可以轉化為物質力量,但精神力量也離不開物質力量的支撐。增強物質保障力進而實現物質與精神的有機統一,需要像為決策保障情報、為槍砲保障彈藥、為車輛保障油料一樣,保障好戰鬥裝具、被裝、伙食、醫療,建設好學習場地、訓練設施和再教育渠道,提供好戰條令、生理醫學等方面技術服務,幫助設計多樣化個人化的能力提升計劃、職業發展規劃,為發展人的體能、技能和智能,進而全面提高人在未來不確定性戰場環境中的適應性和戰鬥力,提供堅強的物質和技術支撐。

深化戰技結合中「技」維度實踐
戰技結合是戰術運用的重要原則。其中的技術不僅包括實務操作層面的技術(如射擊技術),也包括理論應用層面的技術(如資訊科技)。可以認為,戰術、技術、藝術和程序共同構成了其「戰鬥方法論」。科學技術化和技術科學化是科學技術發展的重要特徵。深化戰技結合,需要正確掌握技術與戰術、藝術、程序的關係,不斷深化「技」維度實踐。


一是推動先進技術戰術化。技術決定戰術,是辯證唯物論戰術論的基本觀點。多維度中心戰概念的演變,也是技術推動戰術發展變革的例子。恩格斯曾指出:“軍隊的全部組織和作戰方式以及與之有關的勝負……,取決於居民的質與量和取決於技術。”然而,技術推動戰術具有“滯後效應”,尤其在缺少實戰牽引的情況下。這就需要主動推進先進民用技術的軍事轉化和先進軍事技術的戰術應用。一方面,要積極引進民用先進技術,尤其要加速推進深度神經網路、量子通訊運算等尖端技術的引進吸收;另一方面,要加強先進技術裝備戰術訓練,把練技術與練戰術緊密結合起來,推動新裝備盡快形成新戰術和新戰力。
二是推動指揮藝術技術化。 「藝術」是一個具有較強主體性的概念。中外學者有的認為“指揮藝術根植於指揮官實施領導以最大限度提高績效的能力”,有的認為“指揮藝術是指揮官實施靈活巧妙和富有創造性指揮的方式與方法”。中外學者普遍將指揮視為藝術,主要原因在於:指揮儘管有作戰條令、上級命令和技術保障等客觀方面的依據和支撐,但更關鍵的因素在於指揮員的主觀能動性和創造性,而這是比較難以用技術手段加以量化的。隨著認知心理學、認知神經科學等學科和技術的發展,指揮的認知結構和作用機制將更加顯性化,「指揮藝術」的神秘面紗將逐漸退去,指揮藝術技術化將會成為必然趨勢。這需要不斷強化技術思維,持續深化人工智慧輔助指揮決策手段建設,持續深化人類大腦決策機理運用,切實用技術解構藝術,不斷推動指揮藝術技術化。


三是推動戰鬥技術條令化。不少學者把技術置於與戰術近乎同等重要的地位。這種堅持戰術條令化與兵種專業技術和專門戰鬥技術條令化的融合發展,是推動戰鬥條令體系化規範化建設,進而實現戰術與技術在法規層面融合統一的重要途徑。

謀求奇正結合中「奇」維度優勢
奇與正是戰術的一種基本矛盾結構,具有內在同一性。無奇便無正,無正也無奇;或奇或正,千變萬化。奇與正的選擇是決策中心戰的範疇,奇與正的運用是行動中心戰的範疇。 1990年代,非對稱作戰、非接觸作戰、非線式作戰理論被提出。若稱「對稱作戰、接觸作戰、線式作戰」為正,則可稱「非對稱作戰、非接觸作戰、非線式作戰」為奇。從自然科學角度來看,「對稱、接觸、線式」是概述的,「非對稱、非接觸、非線式」是詳實的。把握好奇正結合中「奇」的維度,謀取「三非」優勢是必然要求。
一是謀取「非對稱」優勢。 「對稱」與「非對稱」本來是對事物或空間的形態特徵的指稱。對稱作戰是兩種相同類型部隊之間的交戰,非對稱作戰是兩種不同類型部隊之間的交戰。非對稱作戰理論要求對不同軍兵種部隊、作戰力量和武器系統進行科學合理編組,在寬廣的地域展開部署,在最佳的作戰時機集中優勢力量給敵人以致命的打擊,然後迅速重新部署力量。由於作戰力量的有限性,部隊有正面的非對稱優勢,就有負面的非對稱劣勢。謀取非對稱優勢、規避非對稱劣勢是交戰雙方的共同期望,進而造成這樣一種局面──交戰雙方在對稱與非對稱之間往復循環。因此,謀取“非對稱”優勢,要謀取作戰力量、作戰能力、作戰指揮等多方面上的非對稱,堅持和發揚“避強擊弱、避實擊虛”“你打你的,我打我的”,在非對稱中有效發揮優勢、規避劣勢。例如,在武器裝備對稱時爭取佔據人員能力上的非對稱優勢,在力量對稱時爭取佔據指揮藝術上的非對稱優勢。
二是謀取「非接觸」優勢。 「接觸」與「非接觸」是對不同事物之間距離狀態的一種描述。軍事領域的接觸通常是以武器的投射距離來界定的。 「非接觸作戰」的概念起源於二戰,產生於冷戰時期。接觸作戰與非接觸作戰的內涵是隨著武器裝備打擊距離的改變而改變的。交戰雙方也總是謀求在免受威脅的更遠距離或更廣空間攻擊對方。自1990年代以來,「非接觸作戰」理論在多場局部戰爭中被運用。非接觸作戰是在遠離對方的情況下實施防區外遠程精確打擊的作戰行動樣式。非接觸作戰體現了技術制勝、靈活機動、重心打擊的思想。隨著軍事科技的快速發展,世界主要國家軍隊將具備全球感知和全球打擊的能力,「非接觸」的內涵將進一步壓縮至太空、認知域等太空領域。為此,一方面要立足「接觸作戰」實際,在接觸中取長補短、固強補弱,不斷積蓄勝勢;另一方面要拓展「非接觸作戰」空間,在非接觸中搶抓先手、搶佔先機,不斷拓展優勢。
三是謀取「非線式」優勢。 「線式」與「非線式」通常是指人的思維或行為模式。宇宙萬物運動是複雜的,大抵是非線式的,而人類的認知總是傾向於簡單的、抽象的、線式的,並發明了邏輯線、時間線以及線性數學等概念。軍事學中,從線式作戰到非線式作戰,反映了軍事技術理論的發展進步。 20世紀下半葉起,非線作戰就登上歷史舞台。有學者指出,線式作戰中各部隊主要沿著明確的己方前沿協調一致行動,關鍵是保持己方部隊之間的相對位置,以增強部隊的安全性;非線式作戰中各部隊從選定的多個基地沿多條作戰線同時實施作戰行動,關鍵是針對目標在多個決定點製造特定效果。線式作戰體現的主要是行動中心戰思想,非線式作戰體現的主要是目標中心戰思想。為此,一方面要深化運用線式作戰,充分利用其便於指揮、協同和保障的實用價值;另一方面要大膽嘗試非線式作戰,最大限度地發揮其廣泛機動、全維聯合的潛在優勢。 (殷濤、鄧雲生、孫東亞)

中國原創軍事資源:http://www.81it.com/2023/0927/14581888.html

A Comprehensive Look at Chinese Military Intelligent Warfare

全面檢視中國軍事智能化戰爭

現代英語:

Source: China Military Network-People’s Liberation Army Daily Author: Gao Kai and Chen Liang Editor-in-charge: Zhao Leixiang

2025-01-23 06:50:x

“Order dispatch”: a new style of precision strike

■Gao Kai, Chen Liang

Lenin once said, “If you don’t understand the times, you can’t understand war.” In recent years, the widespread use of information and intelligent technology in the military field has promoted the deep integration of technology and tactics, and has given birth to “order-based” precision strikes based on intelligent network information systems. Commanders and command agencies can generate strike list requirements based on combat missions. The decision-making system can intelligently match strike platforms, autonomously plan action paths, and scientifically select strike methods based on personalized needs such as strike time, combat space, and damage indicators, thereby quickly and accurately releasing strike effectiveness.

The operational characteristics of “order-to-order” precision strikes

As the informationization and intelligence of weapons and ammunition continue to improve, the cost of modern warfare is also increasing. How to use limited strike resources to achieve the best cost-effectiveness and maximize combat effectiveness has become a central issue for commanders and command agencies in combat planning. “Order-based” precision strikes can provide a “feasible solution” for this.

Instant optimization and precise energy release. Modern warfare places more emphasis on structural strikes and destruction of the enemy’s combat system, and achieves combat objectives by quickly and accurately releasing combat effectiveness. This requires commanders and command agencies to seize the fleeting “window” of opportunity and strike high-value, nodal, and key targets in the enemy’s combat system before the enemy responds. The traditional “discovery-guidance-strike-assessment” combat loop is time-consuming and has poor combat effectiveness. Therefore, “order-dispatching” precision strikes need to rely on advanced intelligent network information systems, do not pre-determine the strike platform, and publish a list of strike targets in real time. The auxiliary decision-making system quickly evaluates the strike performance of various weapon platforms and the expected damage to the target, autonomously assigns strike platform tasks, quickly links and regulates multi-domain firepower strike forces, and autonomously closes the kill chain to quickly strike key targets.

Multi-domain energy gathering and coordinated strike. The advantage of modern combat precision strikes over previous firepower strikes lies in the information-based and intelligent combat system, which does not require human intervention and relies on a closed strike chain to autonomously complete tasks such as “detection, control, attack, and evaluation”. It can not only save the cost of strikes and reduce resource waste, but also achieve adaptive coordination based on unified combat standards. Therefore, the “order-to-order” precision strike requires the firepower strike forces distributed in various combat fields to establish a unified standard grid. As long as a demand is issued at one point, multiple points can respond and the overall linkage can be achieved. Forces and firepower can be flexibly concentrated, and multiple means and rapid multi-domain energy gathering can be used to determine the strike direction, strike order, and strike method of each strike platform on the move. Through system integration, time can be effectively saved, and multi-domain precision strikes can be carried out on key node targets and key parts of core targets of the enemy, giving full play to the overall power of the superposition and integration of the combat effectiveness of each combat unit.

The attack must break the enemy’s system and be quick and decisive. Modern warfare is a “hybrid war” implemented simultaneously in multiple fields. The interweaving influence and confrontation of new domains and new qualities such as information, aerospace, and intelligence are more obvious. This requires both sides of the war to be able to discover and act one step faster than the enemy, destroy and paralyze the enemy’s combat system, and reduce the efficiency of the enemy’s system. On the one hand, it is necessary to accurately identify the nodes of the enemy system and instantly optimize and accurately strike; on the other hand, it is necessary to conceal one’s own intentions and strike forces, and strike quickly when the enemy is unprepared. “Order dispatch” type precision strikes can well meet these two requirements. With the support of network information systems, intelligent integration of firepower strike forces in various fields can be achieved, and multi-source information perception, data cross-linking, and multi-domain coordinated strikes can be achieved. The seamless and high-speed operation of “target perception-decision-making command-firepower strike-damage assessment” is realized, and information and firepower are highly integrated to quickly achieve combat objectives.

The system composition of “order dispatch” type precision strike

The “order-based dispatch” precision strike builds an efficient closed strike chain, compresses action time, improves strike effectiveness, enables various firepower strike platforms to better integrate into the joint firepower strike system, and provides fast and accurate battlefield firepower support. The key lies in the “network” and the focus is on the “four” systems.

Multi-domain platform access network. With the support of information and intelligent technology, an integrated information network system with satellite communication as the backbone will be established, and the firepower strike platforms distributed in the multi-dimensional battlefield will be integrated into the combat network to establish a battlefield “cloud”. Different combat modules will be distinguished, and “subnet clouds” such as “detection, control, attack, and evaluation” will be established. Relying on the integrated communication network chain, the “subnet cloud” will be linked to the “cloud”, which can enhance the firepower strike platform’s full-domain, full-time, on-the-go access, autonomous networking, and spectrum planning capabilities, and realize the network interconnection of firepower platforms, domain-based combat systems, and joint combat systems, as well as the interconnection of internal strike forces.

Joint reconnaissance and perception system. Relying on various reconnaissance and surveillance forces within the joint combat system, conduct all-weather, multi-directional, and high-precision battlefield perception of the combat area. This requires the construction of a full-dimensional reconnaissance and perception force system that exists in physical and logical spaces, tangible and intangible spaces, and the deployment of intelligent perception equipment over a wide area to form an intelligence data “cloud”. Through the intelligence data “cloud”, the enemy situation is analyzed, the key points of the enemy combat system and time-sensitive targets are found, and the reconnaissance information is updated in real time to show the dynamics of the target.

Intelligent command and decision-making system. Relying on a new command and control system with certain intelligent control capabilities, various planning and analysis models are constructed to expand functions such as intelligent intelligence processing, intelligent task planning, automatic command generation, and precise action control. Databases such as the target feature library, decision-making knowledge base, and action plan library are expanded and improved to strengthen the system support capabilities for task planning, action decision-making, and control in the process of combat organization and implementation, improve planning and decision-making and combat action control capabilities, clarify “how to fight, where to fight, and who will fight”, and achieve accurate “order dispatching”.

Distributed firepower strike system. Relying on the intelligent network information system, on the one hand, it integrates land, sea, air, space and other multi-dimensional firepower strike platforms, strengthens the functions of intelligent target identification and remote control strike, and realizes various combat methods such as remote control combat of combat units, manned and unmanned coordinated combat, and flexible and mobile combat; on the other hand, it can build a low-cost firepower strike platform mainly composed of low-altitude and ultra-low-altitude unmanned strike platforms such as crossing aircraft and cruise missiles. By adding different functional combat payloads, it can work closely with high-end firepower strike platforms to implement battlefield guidance, precision strikes, firepower assessment and other tasks, and efficiently complete the “order”.

Autonomous damage assessment system. Relying on the reconnaissance and surveillance forces within the joint combat system to build a damage assessment system, after the firepower platform completes the strike, it will autonomously conduct strike effect verification on the target. It mainly conducts real-time, dynamic, objective, and systematic analysis and evaluation of the target’s appearance, degree of functional loss, etc., and promptly transmits relevant information to decision-making and command centers at all levels through video images. The evaluation center will judge “how well the strike was” and whether it meets the expected damage requirements. If it does not meet the requirements, the combat operations can be adjusted in a timely manner and supplementary strikes can be carried out to provide strong support for maximizing combat effectiveness.

Planning and implementation of “order-based” precision strikes

The “order dispatch” type of precision strike is just like the way online ride-hailing services operate. Through a series of processes such as formatted “order” generation, intelligent object matching, and autonomous path planning, it independently completes the “OODA” combat cycle. Its actions are more efficient, the strikes are more precise, and the coordination is closer.

Firepower requirements are reported in real time, and combat units “submit orders” on demand. Reconnaissance elements distributed in different combat areas and multi-dimensional battlefield spaces use radar, optical, infrared and technical reconnaissance methods to form battlefield target intelligence information through wide-area multi-source detection. This information is connected to the battlefield information network through intelligence links and is transmitted to combat units anytime and anywhere. The combat units will perform correlation processing, multi-party comparison and verification, and comprehensively compile battlefield target information to generate accurate task “orders”. The combat unit analyzes the target value and connects to the decision-making platform on demand, builds an “order”-style closed strike chain, and submits task “orders” in real time to achieve in-motion optimization and precise adaptation.

Differentiate fire strike tasks, and the decision center intelligently “dispatches orders”. Through the battlefield information network and relying on the intelligent task planning system, the decision center can automatically parse the task “order” information data submitted by the combat unit, and automatically generate the task requirements such as the type and quantity of ammunition, strike method and damage index required for the fire strike action according to the nature, coordinate position, movement status, threat level, etc. of the battlefield target, and form a fire support task “order”. Through intelligent matching of the best firepower platform, link nodes are connected as needed, and intelligent command-based “dispatching” is carried out, which is immediately delivered to the firepower platform waiting for combat.

The firepower platform can “accept orders” immediately by matching the best targets at all times. The firepower platforms distributed at multiple points in the battlefield area can respond to “accept orders” immediately through the battlefield information network. The firepower platform and the combat unit can establish a chain autonomously, and directly establish a guided strike chain after mutual “identity” verification, coordinate and cooperate with the firepower strike operation, and adjust the strike method and shooting parameters in time according to the damage to the target after the strike and the dynamics of the battlefield target, and then carry out firepower strikes again until the “dispatching” task is completed. The firepower platform always follows the principle of “strike-transfer-strike-transfer”, completes the strike task, quickly moves the position, stays in a combat state at all times, and receives “orders” online in real time. After the task is completed, the guided strike chain between the firepower platform and the combat unit will be automatically cancelled.

Acquire damage information from multiple sources, and the assessment center will “evaluate” in real time. Comprehensively use long-distance information-based intelligent reconnaissance methods such as satellite reconnaissance, radar reconnaissance, and drone reconnaissance to implement multi-domain three-dimensional reconnaissance, obtain the target’s fire damage information in real time, and provide accurate assessments for precision fire strikes. Comprehensively determine the damage effect, conduct quantitative and qualitative evaluations of the strike effect, distinguish the three damage states of the target’s physical, functional, and system, and provide timely feedback to the decision-making center. According to the damage assessment results of the strike target, timely put forward control suggestions, adjust the fire strike plan, optimize combat operations, and achieve precise control of fire strikes, so that commanders can accurately control the combat process and achieve efficient command and control of the effectiveness of fire strikes.

現代國語:

「訂單派單」:精確打擊新樣式

■高 凱 陳 良

引言

列寧說過,「不理解時代,就不能理解戰爭」。近年來,資訊化智慧化技術在軍事領域的廣泛運用,促進了技術與戰術深度融合,依托智能化網絡資訊體系,催生出「訂單派單」式精確打擊。指揮員及指揮機關可依據作戰任務格式化產生打擊清單需求,決策系統依據打擊時間、作戰空間、毀傷指標等個性化需求智慧匹配打擊平台、自主規劃行動路徑、科學選擇打擊方式,進而快速精準釋放打擊效能。

「訂單派單」式精確打擊的作戰特點

隨著武器彈藥資訊化智慧化程度不斷提升,現代作戰成本也不斷提高。如何運用有限打擊資源打出最高效費比,實現作戰效能最大化,已成為指揮員及指揮機關作戰籌劃的中心問題,「訂單派單」式精確打擊可為此提供「可行解」。

即時聚優精確釋能。現代作戰更強調對敵作戰體系進行結構性打擊破壞,透過快速且精準地釋放作戰效能實現作戰目的。這就要求指揮員及指揮機關能夠抓住稍縱即逝時機的“窗口”,在敵未做出反應之時對其作戰體系內高價值、節點性、關鍵性目標實施打擊。傳統的「發現—引導—打擊—評估」的作戰環路耗時長,作戰效果不佳。因此,「訂單派單」式精確打擊,需要依托先進的智能化網絡信息體系,不預先確定打擊平台,實時發布打擊目標清單,由輔助決策系統對各種武器平台的打擊性能與目標打擊毀傷預期等進行快速評估,自主分配打擊平台任務,快速鏈接調節多領域火力打擊力量,自主閉合殺傷鏈,對關鍵目標實施快速打擊。

多域聚能協同打擊。現代作戰精確打擊較以往火力打擊的優勢在於資訊化智能化的作戰體系,無需人工介入,依托閉合打擊鏈自主完成「偵、控、打、評」等任務,不僅能夠節省打擊成本,減少資源浪費,還能夠實現基於統一作戰標準的自適應協同。因此,「訂單派單」式精確打擊,需要分佈在各作戰領域的火力打擊力量能夠建立統一標準網格,只要一點發出需求,就能夠多點響應、全局聯動,靈活集中兵力、火力,多手段、快速多域聚能,動中確定各打擊平台打擊方向、打擊次序以及打擊方式。透過體系整合有效節約時間,對敵關鍵節點目標以及核心目標的關鍵部位實施多域精確打擊,充分發揮各作戰單元作戰效能疊加融合的整體威力。

擊要破體速戰速決。現代作戰是在多領域同步實施的“混合戰爭”,資訊、空天、智慧等新域新質力量交織影響、對抗更加明顯。這就需要作戰雙方能夠快敵一秒發現、快敵一步行動,毀癱敵作戰體系、降低敵體系運作效率。一方面,要透過找準敵體系節點,即時聚優精準打擊;另一方面,要隱蔽己方企圖及打擊力量,乘敵不備快速打擊。 「訂單派單」式精確打擊能夠很好地契合這兩點需求,在網絡資訊系統的支撐下,智慧融合各領域火力打擊力量,實現資訊多源感知、數據相互交鏈、多域協同打擊,實現「目標感知—決策指揮—火力打擊—毀傷評估」無縫高速運轉,資訊火力高度融合,快速達成作戰目的。

「訂單派單」式精確打擊的體系構成

「訂單派單」式精確打擊通過構建高效閉合打擊鏈,壓縮行動時間,提高打擊效果,使各火力打擊平台能夠更好地融入聯合火力打擊體系,並提供快速精準的戰場火力支援,其關鍵在“網”,重點在“四個”系統。

多領域平台接取網。在資訊化智慧化技術支撐下,建立以衛星通訊為骨幹的一體化資訊網系,將分佈在多維域戰場的火力打擊平台融入作戰網絡建立戰場“雲”,區分不同作戰模塊,建立“偵、控、打、評”等“子網雲”,並依託一體化的通訊網鏈將“子網雲”鏈入“雲”,能夠提升火力打擊平台全局全時、動中接入、自主組網、頻譜規劃的能力,實現火力平台、分域作戰體係與聯合作戰體系的網絡互聯,以及內部打擊力量的互聯互通。

聯合偵察感知系統。依托聯合作戰體系內的各種偵察監視力量對作戰地域進行全天候、多方位、高精度戰場感知。這就要建立物理空間和邏輯空間、有形空間和無形空間泛在存在的全維域偵察感知力量系統,廣域佈設智能感知設備,形成情報數據“雲”,通過情報數據“雲”分析敵情態勢,找出敵作戰體系關鍵點以及時敏性目標,實時更新偵察信息,展現目標動態。

智慧指揮決策系統。依托具備一定智能控制能力的新型指控系統,構建各類籌劃分析模型,擴展情報智能處理、任務智能規劃、指令自動生成、行動精確控制等功能,擴充完善目標特徵庫、決策知識庫、行動預案庫等數據庫,強化戰鬥組織與實施過程中的任務規劃、行動決策和控制的系統支撐能力,提升行動籌劃決策和明確行動能力,誰來打」

分佈火力打擊系統。依托智能網絡資訊系統,一方面,融入陸、海、空、天等多維域火力打擊平台,強化目標智能識別、遠程遙控打擊等功能,實現作戰單元遠程遙控作戰、有人無人協同作戰、靈活機動作戰等多種作戰方式;另一方面,可構建以穿越機、巡導彈等低空超低空無人打擊平台為主的低成本火力打擊平台,通過加掛不同功能作戰載荷,與高端火力打擊平台密切協同來實施戰場引導、精確打擊、火力評估等任務,高效完成“訂單”。

自主毀傷評估系統。依托聯合作戰體系內的偵察監視力量建構毀傷評估系統,在火力平台打擊完畢後,自主對目標實施打擊效果核查。主要就目標的外觀狀態、功能喪失程度等進行實時、動態、客觀、系統的分析和評估,並及時通過視頻圖像的方式將相關信息返回至各級決策指揮中心,由評估中心判斷“打得怎麼樣”,是否達到預期毀傷要求。如不符合,可適時調控作戰行動,進行補充打擊,為最大限度釋放作戰效能提供強力支撐。

「訂單派單」式精確打擊的規劃實施

「訂單派單」式精確打擊就如同網約車的運作方式一樣,透過格式化「訂單」生成、智能化對象匹配、自主化路徑規劃等一系列流程,自主完成「OODA」作戰循環,其行動更為高效、打擊更為精準、協同更為密切。

實時提報火力需求,作戰單元按需「提單」。分佈在不同作戰地域、多維戰場空間的偵察要素,通過雷達、光學、紅外和技術偵察等方式,廣域多源偵獲形成戰場目標情報資訊。這些資訊依托情報鏈路接入戰場資訊網,隨時隨地被傳至作戰單元,由作戰單元進行關聯處理、多方對比印證,綜合整編戰場目標訊息,產生精確的任務「訂單」。作戰單元分析目標價值按需連通決策平台,建立“訂單”式閉合打擊鏈,實時提報任務“訂單”,實現動中集優、精準適配。

區分火力打擊任務,決策中心智能「派單」。決策中心通過戰場資訊網,依托智能任務規劃系統,能夠自動解析作戰單元提報的任務“訂單”信息數據,根據戰場目標性質、坐標方位、移動狀態、威脅程度等,自動生成火力打擊行動所需彈種彈量、打擊方式和毀傷指標等任務要求,形成火力支援任務“訂單”,通過智能匹配最佳火力平台,連通式鏈路節點,按需送飛機服務“訂單”。

全時匹配最優目標,火力平台快速即時「接單」。多點分佈在戰場區域內的火力平台,通過戰場信息網迅即響應“接單”,火力平台與作戰單元之間自主建鏈,相互核驗“身份”後直接建立引導打擊鏈,協同配合火力打擊行動,並根據打擊後目標毀傷情況以及戰場目標動態,及時調整打擊方式、射擊參數等,而後再次實施火力打擊,直至完成“派單”任務。火力平台始終遵循「打擊—轉移—打擊—轉移」的原則,完成打擊任務,迅即轉移陣地,全時保持待戰狀態,實時在線接收「訂單」。任務結束後,火力平台與作戰單元之間的引導打擊鏈會自動取消。

多源獲取毀傷訊息,評估中心即時「評單」。綜合運用衛星偵察、雷達偵察、無人機偵察等遠距離資訊化智能化偵察手段,實施多域立體偵察,實時獲取目標的火力毀傷訊息,為開展精確火力打擊提供準確評估。綜合判定毀傷效果,對打擊效果進行定量和定性評估,區分目標物理、功能和系統三種毀傷狀態,及時回饋至決策中心。根據打擊目標的毀傷評估結果,適時提出調控建議,調整火力打擊計畫,優化作戰行動,實現對火力打擊的精確控制,便於指揮員精準把控作戰進程,達成對火力打擊效能的高效指揮控制。

資料來源:中國軍網-解放軍報 作者:高凱 陳亮 責任編輯:趙雷翔
2025-01-23 06:50:xx

中國原創軍事資源:http://www.81.cn/ll_208543/16365873888.html

What strategic risks will military artificial intelligence bring to the game between China and the United States?


軍事人工智慧將為中美博弈帶來哪些戰略風險?

現代英語:

2023-10-24 10:21:32Source: Military High-Tech Online
In July 2023, the Center for a New American Security (CNAS) released a report titled US-China Competition and Military AI: US-China Competition and Military AI, which explores how the United States can effectively manage a series of strategic risks caused by the militarization of artificial intelligence in Sino-US relations against the backdrop of intensified Sino-US competition and rapid development of artificial intelligence technology. It also conducts an in-depth analysis of the possible paths by which military artificial intelligence can intensify the strategic risks between China and the United States, the options for the United States to manage the strategic risks of military artificial intelligence, and the related measures and recommendations. The report has great reference value, so the original content is compiled as follows for readers to learn and communicate.

Five ways military AI exacerbates strategic risks between China and the United States


How will emerging military artificial intelligence exacerbate strategic risks between China and the United States? The report discusses five possible impact paths and attempts to analyze and predict this issue.

1. Reshaping the Sino-US Military Balance
The report points out that in the process of militarized application of artificial intelligence, the imbalance of military strength between the competing parties caused by the unilateral improvement of military strength is most likely to aggravate the strategic risks between China and the United States. In the short term, military artificial intelligence will still be mainly used to improve the equipment maintenance, military logistics, personnel training and decision support of the military, and play an auxiliary and beneficial role, but these “behind-the-scenes” tasks, like front-line troops and weapons, constitute the basis of military strength. In addition, some emerging military artificial intelligence systems will also improve the combat capabilities of the troops. For example, the “loyal wingman” system based on human-machine collaboration can help improve the pilot’s mission, although this improvement may be incremental rather than revolutionary, and compared with fully autonomous unmanned aerial vehicles, the “loyal wingman” has limited effect on the transformation of the air combat paradigm. But there is no doubt that the military strength of the party that takes the lead in the military application of artificial intelligence will develop rapidly, and the rise and fall of this may push the military balance between China and the United States into a new stage, causing panic and concern for the lagging party.

2. Profound impact on information acquisition and strategic decision-making
The report believes that military artificial intelligence may increase strategic risks in the decision-making and information fields in three main ways: first, compressing decision-making time. If artificial intelligence can help one party make decisions faster, the other party may make hasty decisions in order to keep up with the opponent’s actions. This time pressure may exacerbate tensions and even create a new crisis; second, inducing decision makers to make wrong decisions. The decision-making process of the artificial intelligence system is in a technical “black box”. If there is a lack of clear understanding of the operating mechanism and defects of the artificial intelligence system, major strategic decisions may ultimately be based on the analysis of maliciously fabricated, distorted information or other low-quality information; third, influencing the opponent’s cognition through large-scale information activities, using artificial intelligence to generate massive amounts of directional text, audio, images or videos, undermining political stability, confusing high-level decision-making, creating alliance rifts, and triggering or aggravating political crises.

3. Autonomous weapon systems
First, if autonomous weapon systems provide greater military capabilities, decision makers may be more inclined to use force because they believe they have a higher chance of winning. Second, military operations using autonomous weapon systems have lower expected risks in terms of casualties, which may make leaders on both sides more likely to take action. Third, autonomous weapon technology will greatly enhance the combat capabilities of existing weapon systems, such as enabling hypersonic weapons to have the autonomy to maneuver and change their trajectories, making it more difficult for the enemy to intercept; or using machine learning to improve the predictive capabilities of air defense systems, making it possible to deploy anti-hypersonic and other high-end missile defense systems, and empowering users with greater military strength. Finally, autonomous drone swarms can theoretically provide new options for conventional counterattacks against an opponent’s nuclear arsenal. This potential capability may disrupt the strategic balance and increase the risk of strategic misjudgments.

4. Intelligence, Surveillance and Reconnaissance (ISR)
Military AI has already provided new tools for completing intelligence, surveillance, and reconnaissance missions, and may play an even greater role in the future. The combination of military AI and existing technologies can greatly improve the efficiency and cost-effectiveness of completing ISR missions. For example, AI can be combined with balloons or microsatellite constellations to conduct surveillance in “near-Earth space” or enable clustering of reconnaissance drones. AI systems can also process data from a variety of sensors on a large scale to track mobile missile systems on land and even submarines in the ocean. If these capabilities become a reality, they will provide military leaders with one-way transparency that can undermine strategic stability, thereby completely undermining the survivability of the opponent’s triad nuclear forces, and greatly increase the possibility and necessity of the weaker party to take a “preemptive” strike.


5. Command, Control, and Communications (C3)
AI can make cyber and electromagnetic warfare (EW) attacks more threatening and destructive. As big data inputs become increasingly important in AI training, both sides may intentionally degrade system performance by modifying or fine-tuning data sets to “poison” their opponents, which may lead to uncertainties or predictable failures in AI command, control, and communication systems that can be exploited by opponents. Another specific concern is that military AI may affect the C3 systems of nuclear weapons. Nuclear early warning systems will increasingly rely on AI technology to quickly analyze data from various sensors, but the system may misinterpret the data and generate false alarms, which may result in a brutal nuclear war that will hurt both sides.

II. Three options for the United States to manage strategic risks of military artificial intelligence

The report points out that the United States needs to take a series of measures to guard against the various potential dangers that military artificial intelligence brings to the bilateral security relations between China and the United States. These sources of risk may overlap in reality, and risk portfolio management aims to reduce a variety of different drivers of instability. The report discusses three options for managing and controlling the strategic risks of military artificial intelligence.

1. Restricting the development of China’s military AI technology
The report emphasizes that one way that artificial intelligence may exacerbate the risk of escalation is that it provides a large enough military advantage for one party to convince the country that it can wage war and achieve its goals at an acceptable cost. Therefore, the United States needs to try to prevent China’s artificial intelligence technology from developing and avoid the balance of military power from tilting in favor of China. At the same time, vigorously develop the United States’ artificial intelligence capabilities so that it always stays in a leading position and forms a technological advantage deterrence. At present, the United States focuses on preventing China’s military artificial intelligence development, mainly on advanced semiconductors, an important hardware that supports artificial intelligence systems, while restricting data, algorithms and talents in a targeted manner. For example, the U.S. government’s crackdown on TikTok (the overseas version of Douyin) is partly due to concerns that Americans’ data may be used to promote China’s artificial intelligence technology. The United States will also strictly regulate the source code of artificial intelligence algorithms used for geospatial analysis, and further restrict the output or disclosure of general algorithms such as facial recognition software and large language models. In terms of talent policy, the U.S. government will take further measures to prevent Chinese students from studying artificial intelligence technology in the United States.

2. Strengthen unilateral responsibility management and responsibly control military artificial intelligence
The report points out that minimizing civilian casualties should be a key design principle for military AI, and the best way to reduce the risks of military AI is to place the safety and reliability of the system on an equal footing with its lethality or efficiency, and to strictly implement testing and evaluation, verification and validation. To minimize uncertainty, China and the United States need to adopt safe design principles. The United States has formulated a series of unilateral declarative policies on the development and use of military AI. The U.S. Department of Defense’s “Artificial Intelligence Principles: Several Recommendations on the Ethics of the Department of Defense’s Artificial Intelligence Applications” requires the U.S. military to be “responsible, fair, traceable, reliable and controllable” when using AI. These core principles have been reiterated and supplemented in subsequent documents, such as the “Responsible Artificial Intelligence Practice Guide”, “Responsible Artificial Intelligence Strategy and Implementation Pathway”, and the “Autonomous Weapon System Directive” (DoD Directive 3000.09) issued in January 2023, which stipulate how to use AI and integrate it into the entire life cycle of defense projects.


3. Conduct bilateral and multilateral diplomacy to reduce strategic risks
Another way to prevent dangerous power imbalances, costly arms races, or miscalculations is to engage in bilateral and multilateral diplomacy. By negotiating arms control agreements or confidence-building measures, countries can try to set boundaries for the development or use of specific military technologies and then verify compliance. China and the United States should discuss limits on risky applications of AI, such as regulating its use in nuclear command and control or offensive cyber operations. The U.S. and Chinese governments can use bilateral and multilateral channels to exchange views on the impact of AI on national security. The U.S. and Chinese militaries can also engage in dialogues in which both sides raise questions about the military capabilities of AI and its uses, and communicate on rules of engagement, operational conflicts, and other topics to fully express their respective demands and expectations. In addition to official channels, the two countries can also use 1.5-track and 2-track dialogues to enhance understanding and consensus.

III. Nine recommendations for U.S. policymakers in the report
The emergence of military artificial intelligence may intensify competition between China and the United States and increase strategic risks. In order to effectively respond to this trend, the report believes that US policymakers should make efforts in nine aspects.

1. Restricting the development of artificial intelligence in relevant countries
The report recommends that U.S. policymakers continue to restrict the export of semiconductor production equipment and technology, advanced chips and other terminal products to China, hindering relevant countries from advancing military artificial intelligence. In addition, it is recommended that the United States find or develop creative tools to regulate artificial intelligence and its data, algorithms, and manpower. It is also recommended that the United States clearly develop military and dual-use artificial intelligence technologies, and continuously improve its policies to ensure effectiveness, while being vigilant against policies that restrict technological development.

2. Maintaining America’s Lead in Military AI
The report points out that the United States must act quickly to keep up with the development of China’s military artificial intelligence. This requires reforms in many areas, such as making “resilience” a key attribute of military systems. To succeed in this regard, not only the Department of Defense must make efforts, but also update immigration and education policies to attract, train and retain the best scientists and engineers from around the world.

3. Develop, promulgate, and implement responsible military AI norms or regulations
The United States should position itself as the leading global driver of military AI technology development, operational norms, and best practices. Key U.S. priorities in the near term should include further fleshing out the operational details of norms for conducting cyber attacks (including AI) on nuclear C3 infrastructure and fulfilling the commitments of the 2022 Nuclear Posture Review (NPR). In short, U.S. actions must match its rhetoric on the responsible use of military AI.


4. Proactively engage with allies, partners, and multilateral institutions
Regional and global partnerships play a vital role in achieving U.S. strategic goals. The United States should actively integrate consultations on relevant issues into its alliances and partnerships, expand the scope of discussion in the G7, NATO, AUKUS, and bilateral relations with Japan and South Korea, and actively promote and advocate the U.S. position in multilateral forums.

5. Consult with China on reducing risks and building trust related to military AI
The report suggests that the United States could try to expand negotiation channels with China on military artificial intelligence, such as developing a vocabulary of military artificial intelligence terms between China and the United States to ensure that both sides have common definitions of key concepts and reduce misunderstandings caused by language and cultural barriers. The two sides can also formulate risk levels based on artificial intelligence capabilities, such as defining artificial intelligence related to logistics support as a low risk level and autonomous nuclear weapon artificial intelligence as a high risk level. Further discuss the application areas of artificial intelligence and stipulate the use of artificial intelligence in lethal weapons. Even if the negotiations between the two sides do not achieve the expected results, exploring these issues will help enhance mutual understanding.

6. Continue to seek to establish a strategic risk and crisis management mechanism between China and the United States
Establishing effective diplomatic channels between China and the United States, especially maintaining contacts at the summit level, is crucial to reducing strategic risks and managing potential crises. The report recommends that the United States continue to explore the establishment of a strategic risk and crisis management mechanism between China and the United States. Even if it works intermittently, it is better than having no mechanism at all.

7. Make military AI a fundamental pillar of diplomacy with China related to nuclear weapons and strategic stability
Military artificial intelligence plays an increasingly important role in the balance between nuclear capabilities and other strategic capabilities. The report recommends that the United States initiate discussions on “strategic stability” at the level of the five permanent members of the United Nations Security Council and include military artificial intelligence in the negotiations.

8. Reducing strategic risks in other areas
The report believes that the United States should take measures as soon as possible to reduce strategic risks in other related areas and take unilateral actions with caution, such as postponing intercontinental ballistic missile tests when tensions escalate, especially when immediate testing is not required to ensure a safe, reliable and effective nuclear deterrence.

9. Strengthening Intelligence Collection, Analysis and Assessment
The direction of the development of military artificial intelligence depends not only on itself, but also on its interaction with nuclear weapons, military infrastructure, communication capabilities and other factors. Therefore, it is urgent to deepen the understanding of the overall strategic stability related to military artificial intelligence. The report recommends that the United States instruct relevant organizations to improve or, when necessary, establish multidisciplinary offices and expert backbones to pay close attention to China’s civilian and military artificial intelligence activities, monitor and analyze intelligence related to the issue, and provide recommendations.

IV. Conclusion
The military application of artificial intelligence may increase strategic risks, and countries need to work together to explore and regulate the development of artificial intelligence technology. In the face of the opportunities and challenges that artificial intelligence technology brings to human society, countries should use dialogue to dispel suspicion, replace confrontation with cooperation, and work together to promote good laws and good governance in the field of artificial intelligence, so that artificial intelligence technology can truly benefit mankind.

Text | Wen Lihao, Chen Lin (National University of Defense Technology)

現代國語:

2023年7月,新美國安全中心(CNAS)推出報告《中美關係與軍事人工智慧:美國如何在與中國的競爭中管控風險》(U.S.-China Competition and Military AI: U.S.-China Competition and Military AI),探討在中美博弈加劇和人工智慧技術迅速發展背景下,美國如何在中美關係中有效管控由人工智慧軍事化引發的一系列戰略風險,就軍事人工智慧加劇中美戰略風險的可能路徑、美國管控軍事人工智慧戰略風險的可選方案和相關措施建議展開了深入分析。報告具有較大參考價值,故將原文內容編譯如下,供讀者學習交流。

圖1:原報告封面
一、軍事人工智慧加劇中美間戰略風險的五條路徑
新興軍事人工智慧究竟會以何種方式加劇中美間的戰略風險?報告討論了五種可能的影響路徑,試圖對此問題進行分析和預測。
(一)重塑中美軍事平衡
報告指出,在人工智慧軍事化應用過程中,由於軍事實力單方面提高而造成的競爭雙方軍事實力失衡最有可能加劇中美戰略風險軍事人工智慧短期內仍將主要用於改善軍隊的裝備維護、軍事後勤、人員培訓和決策支援等過程,發揮輔助性增益性作用,但這些「幕後」任務與前線部隊和武器一樣,構成了軍事實力的基礎。此外,一些新興軍事人工智慧系統也將提高部隊的作戰能力,例如基於人機協同的「忠誠僚機」系統能夠幫助提高飛行員的任務度,儘管這種改進可能是漸進式而非革命性的,且相比完全自主的無人駕駛飛行器,「忠誠僚機」對空戰範式的變革作用有限。但毫無疑問的是,率先進行人工智慧軍事應用的一方,其軍事實力將快速發展,此消彼長間可能推動中美軍事平衡進入新階段,引發落後方的恐慌和擔憂。
(二)深刻影響資訊取得與策略決策
報告認為,軍事人工智慧或將主要以三種方式增加決策和資訊領域產生的戰略風險:一是壓縮決策時間,如果人工智慧可以幫助一方更快決策,那麼另一方可能會為了跟上對手的行動而倉促決策,這種時間壓力可能會加劇緊張局勢甚至製造一場新的危機;二是誘導決策者做出錯誤決策,人工智慧系統的決策過程處於技術「黑箱」中,如果對人工智慧系統的運作機制和缺陷缺乏清晰認知,重大戰略決策最終可能會建立在對被惡意捏造、扭曲的信息或其他劣質信息的分析的基礎上;三是通過大規模信息活動影響對手認知,借助人工智能生成海量含有指向性的文本、音頻、圖像或視頻,破壞政治穩定、混淆高層決策、製造同盟痕痕,引發或加劇同盟痕痕,引發政治危機。

圖2:基於人工智慧的「深度偽造」技術已經能夠快速產生海量的偽造訊息
(三)自主武器系統
首先,如果自主武器系統提供了更強的軍事能力,決策者將可能更傾向於使用武力,因為他們相信獲勝的機會會更高。其次,使用自主武器系統的軍事行動在人員傷亡方面的預期風險較低,這可能會讓雙方領導人更有可能採取行動。再一次,自主武器技術將極大增強現有武器系統的作戰能力,例如使高超音波速武器具備機動變軌的自主性,令敵更難攔截;或藉助機器學習提高防空系統的預測能力,使反高超音波速和其他高端飛彈防禦系統的部署成為可能,為使用方賦能更強的軍事實力。最後,具備自主性的無人機群理論上可以為針對對手核武庫的常規反擊提供新的選擇,這種潛在能力將可能打破戰略平衡,加劇戰略誤判的風險。
(四)情報、監視與偵察(ISR)
軍事人工智慧已經為完成情報、監視和偵察任務提供了新的工具,並且在未來可能會發揮更大作用。軍事人工智慧與現有技術的結合,可以大幅提高完成ISR任務的效率和性價比。例如將人工智慧與氣球或微衛星星座結合,以在「近地空間」進行監視,或為偵察無人機賦能群集性。人工智慧系統還可以大規模處理來自各種感測器的數據,以追蹤陸地上的移動飛彈系統甚至大洋中的潛艇。如果這些能力成為現實,它們將為軍事實力領導者提供能夠破壞戰略穩定性的單向透明度,進而徹底損害對手三位一體核力量的生存能力,也能極大增加弱勢方採取「先發製人」打擊的可能性和必要性。

圖3:自主武器系統應該掌握「開火權」嗎?
(五)指揮、控制與通信(C3)
人工智慧可以使網路和電磁戰(EW)攻擊更具威脅性和破壞性。隨著大數據輸入在人工智慧訓練中變得越來越重要,雙方都可能會透過修改或微調資料集來故意降低系統性能進而達到「毒害」對手的目的,這可能導致人工智慧指揮、控制和通訊系統的不確定性或可預測故障,被對手利用。另一個具體擔憂是,軍事人工智慧可能會影響核武的C3系統。核子預警系統將越來越依賴人工智慧技術來快速分析來自各種感測器的數據,但該系統可能會錯誤解讀數據,產生誤報,其結果可能引發兩敗俱傷的殘酷核戰。
二、美國管控軍事人工智慧戰略風險的三種方案
報告指出,美國需要採取一系列措施來防範軍事人工智慧對中美雙邊安全關係帶來的各種潛在危險,這些風險來源在現實中可能重疊,風險組合管理旨在減少多種不同的不穩定驅動因素,報告在此討論了管控軍事人工智慧戰略風險的三種方案。
(一) 限制中國軍事人工智慧技術發展
報告強調,人工智慧可能加劇風險升級的一種途徑是它為一方提供足夠大的軍事優勢,使該國相信它可以以可接受的成本發動戰爭並實現其目標。因此,美國需要設法阻止中國人工智慧技術發展,避免軍事力量平衡向有利於中國的方向傾斜。同時,大力發展美國的人工智慧能力,使其始終處於領先地位,形成技術優勢威懾。目前,美國阻止中國軍事人工智慧發展的重點主要集中在支援人工智慧系統的重要硬體——先進半導體上,同時有針對性地從數據、演算法和人才方面加以限制。例如美國政府對TikTok(海外版抖音)的打壓,部分原因是擔心美國人的數據可能被用來推動中國人工智慧技術進步。美國也將對用於地理空間分析的人工智慧演算法原始碼進行嚴格監管,並進一步限制臉部辨識軟體、大型語言模型等通用演算法的輸出或揭露。在人才政策方面,美國政府會採取進一步措施,阻止中國學生在美國學習人工智慧技術。

圖4:美國藉口「國家安全」打壓TikTok
(二) 加強單邊責任管理,負責任管控軍事人工智慧
報告指出,最小化平民傷亡應作為軍事人工智慧的關鍵設計原則,降低軍事人工智慧風險的最佳方法是將系統的安全性和可靠性與其殺傷力或效率放在同等重要的位置,並嚴格執行測試和評估、驗證和確認。為了最大限度地減少不確定性,中國和美國需要採用安全的設計原則。美國就軍事人工智慧的開發和使用制定了一系列單方面的宣言性政策。美國國防部《人工智慧原則:國防部人工智慧應用倫理的若干建議》要求美軍在使用人工智慧時做到「負責、公平、可追溯、可靠和可控」。這些核心原則在後續發布的文件中得到了重申和補充,如《負責任的人工智慧實踐指南》、《負責任的人工智慧戰略和實施途徑》以及2023年1月發布的《自主武器系統指令》(DoD Directive 3000.09 ),這些文件規定瞭如何使用人工智慧並將其融入國防專案的整個生命週期。
(三)進行雙邊與多邊外交,降低戰略風險
防止危險的力量失衡、代價高昂的軍備競賽或誤判的另一種方式是進行雙邊和多邊外交。透過談判達成軍備控制協議或建立信任措施,各國可以嘗試為特定軍事技術的開發或使用設定界限,然後核查遵守情況。中國和美國應該討論對人工智慧風險應用的限制,例如規範其在核指揮與控製或進攻性網路行動中的使用。美國和中國政府可以利用雙邊和多邊管道,就人工智慧對國家安全的影響交換意見。中美兩軍也可以展開對話,雙方就人工智慧的軍事能力及其用途提出問題,並就交戰規則、行動衝突和其他主題進行溝通,充分錶達各自訴求和期望。除官方管道外,兩國還可利用1.5軌與2軌對話,增進理解與共識。
三、報告為美國決策層提供的九項措施建議
軍事人工智慧的出現可能會加劇中美競爭,增加戰略風險。為了有效因應這一趨勢,報告認為美國的政策制定者應該從9個面向進行努力。
(一)限制相關國家人工智慧的發展
報告建議美國政策制定者繼續限制半導體生產設備和技術、先進晶片等終端產品的對華出口,阻礙相關國家推動軍事人工智慧。此外,也建議美國尋找或開發監管人工智慧和其數據、演算法、人力的創意工具。明確發展人工智慧軍用和軍民兩用技術,並不斷改善其政策,確保有效性,同時警惕政策為技術發展帶來限制。
(二) 維持美國軍事人工智慧的領先地位
報告指出,美國必須迅速採取行動,跟上中國軍事人工智慧的發展速度。這需要在許多領域進行改革,例如,將「韌性」作為軍事系統的關鍵屬性。要想在這方面取得成功,不僅國防部要做出努力,還需要更新移民和教育政策,吸引、訓練和留住世界各地最優秀的科學家和工程師。
(三) 制定、頒布、實施負責任的軍事人工智慧規範或法規
美國應將自己定位為軍事人工智慧技術開發、操作規範制定和最佳實踐的全球主要推動者。美國近期的主要優先事項應包括進一步充實在核C3基礎設施上實施網路攻擊(包括人工智慧)規範的操作細節,並履行2022年《核態勢評估報告》(Nuclear Posture Review,NPR)的承諾。簡而言之,美國的行動必須與其在負責任地使用軍事人工智慧的言論相符。

圖5:美國自2018年起對華為展開全方位打壓
(四) 主動與盟友、夥伴以及多邊機構接觸
區域和全球夥伴關係在促成美國戰略目標完成方面發揮著至關重要的作用。美國應積極將相關議題的磋商納入其同盟和夥伴關係,擴大G7、北約、AUKUS及與日本和韓國雙邊關係的討論範圍,積極推進、倡導美國在多邊論壇中的立場。
(五)與中國就降低軍事人工智慧相關風險和建立信任進行磋商
報告建議,美國可以嘗試拓展與中國建立軍事人工智慧的談判管道,如開發中美軍事人工智慧術語詞彙表,保證雙方對關鍵概念有共同的定義,減少語言和文化障礙造成的誤解。雙方還可以基於人工智慧能力製定風險等級,例如將後勤保障相關的人工智慧確定為低風險等級,將自主核武人工智慧確定為高風險等級。進一步討論人工智慧應用領域,同時規定人工智慧在致命武器中的使用規範。即使雙方的談判不會達成預期結果,探討這些問題也有助於增進對彼此的理解。
(六) 持續尋求建立中美策略風險與危機管理機制
建立有效的中美外交管道,尤其是保持首腦層級的聯繫,對降低策略風險、管理潛在的危機至關重要。報告建議美國要持續探索建立中美戰略風險和危機管理機制,即使是間歇性發揮作用,也勝過沒有機制。
(七) 使軍事人工智慧成為與核武和戰略穩定相關的對華外交基本支柱
軍事人工智慧在核子能力與其他戰略能力的平衡方面發揮著越來越重要的作用。報告建議,由美國在聯合國五個常任理事國層級發起推動「戰略穩定」的討論,並將軍事人工智慧納入談判。
(八)降低其他領域的策略風險
報告認為,美國應盡快採取措施,減低其他相關領域的戰略風險,謹慎採取單邊行動。例如在局勢緊張加劇時推遲洲際彈道飛彈試射,特別是在不需要立即進行試驗來確保安全、可靠和有效的核威懾的情況下。
(九)強化情報蒐集、分析與評估
軍事人工智慧的發展走向不僅取決於它本身,還取決於它與核武、軍事基礎設施、通訊能力等因素之間的相互作用,因此迫切需要加深對軍事人工智慧相關的整體戰略穩定性的理解。報告建議美國責成相關組織完善或在需要時建立多學科辦公室和專家骨幹,密切關注中國的民用及軍事人工智慧活動,監測、分析與該問題相關的情報,並給予建議。
四、結 語
人工智慧軍事應用可能加劇戰略風險,需要各國攜手對人工智慧技術發展加以探索和規制。面對人工智慧技術為人類社會帶來的機會與挑戰,各國應以對話打消猜忌,以合作取代對立,並攜手推動人工智慧領域依良法、促善治,使人工智慧技術真正造福人類。

文 | 文力浩、陳琳(國防科技大學)

中國原創軍事資源:http://www.81it.com/2023/1024/14640888.html