Tag Archives: #China #Cyber #Warfare #Information #Dominance

中國人民解放軍聚焦智慧化戰爭

China’s People’s Liberation Army Focusing on Operationalizing Intelligent Warfare

隨著人工智慧在軍事領域的廣泛應用,智慧化戰爭逐漸成為備受矚目的焦點話題。 歷史多次證明,戰爭形態的演進將引發致勝機理的深刻改變。 在資訊化戰爭向縱深發展、智慧化戰爭初露端倪的當今時代,世界主要國家軍隊紛紛下大力推動軍事智慧化,其中的諸多動向值得關注。

加強頂層設計

勾勒智能化戰爭“路線圖”

在新一輪科技革命與產業革命推動下,智慧化軍事變革正向縱深發展。 美國、俄羅斯、日本等國紛紛把人工智慧視為「改變戰爭遊戲規則」的顛覆性技術,並事先佈局,加強頂層設計和規劃引領,探索人工智慧的軍事應用方向。

美軍在《為人工智慧的未來做好準備》《國家人工智慧研究與發展戰略計畫》《人工智慧與國家安全》《2017至2042財年無人係統綜合路線圖》《美國人工智慧計畫》: 在首個年度報告》等文件中,詳述了人工智慧的發展現狀和發展規劃,並將人工智慧發展提升至國家戰略層面。 2021年,美軍在發布的《美國防部人工智慧態勢:評估與改進建議》中指出,美軍發展人工智慧應考慮三個指導性問題:與美軍相關的人工智慧現處於何種狀態;美軍目前 在人工智慧方面的態勢如何;哪些內部行動以及潛在的立法或監管行動可能會增強美軍的人工智慧優勢。

俄羅斯投入大量資源,以維持與美國在人工智慧軍事領域應用競爭的平衡。 2021年,俄總統普丁在年度首場國防部會議上表示,人工智慧將大幅推動軍事領域變革,俄國聯邦武裝力量要加速機器人、智慧單兵系統和武器智慧化模組等人工智慧應用技術的研發 工作,早日形成核心技術能力和戰場競爭優勢。 《2025年前未來軍用機器人技術裝備研發專題綱要》《未來俄軍用機器人應用構想》《人工智慧在軍事領域的發展現狀以及應用前景》等文件,從國家層面為俄軍推動人工智慧軍事應用確立了 一系列機制。

日本政府也推出了《人工智慧戰略》,旨在引領人工智慧技術研發和產業發展。 在英國制定的《機器人與人工智慧》戰略規劃中,強調了人工智慧在戰場建設中的應用。 2021年1月,澳洲國防部發布《打好人工智慧戰爭:未來智慧化戰爭之作戰構想》,這份文件探討如何將人工智慧應用到陸、海、空作戰領域。

創新作戰概念

推動智慧化戰爭“思想先行”

作戰概念創新對軍事科技發展、戰爭形態演變具有思想牽引作用。 過去人們對戰爭的認識與掌握,主要源自於對實務經驗的歸納總結,作戰概念即經驗概念。 未來智慧化戰爭時代,作戰概念不僅是經驗概念,更是對作戰的構想、設計與前瞻。

美陸軍提出「多域戰」概念,要求陸、海、空、天、電磁、網路等各域作戰能力深度整合與密切協同。 為此,美陸軍先後發布《多域戰:21世紀合成兵種的發展(2025至2040)》《美國陸軍多域戰(2028)》《運用機器人與自主技術支援多域戰》等白皮書。 2021年3月,美陸軍部發布文件《陸軍多域轉型:準備在競爭和衝突中取勝》,顯示「多域戰」已成為引領美陸軍轉型發展的一面「旗幟」。 美國防高級研究計畫局提出「馬賽克戰」概念,旨在打造一種由不同作戰功能單元構成的、以先進電腦技術與網路技術為基礎的、高度分散、具有高度適應性的「殺傷網」。 美國防部大力支持「聯合全域作戰」概念。 2020年3月,美空軍率先將「聯合全域作戰」寫入條令,探討空軍如何在「聯合全域作戰」中發揮作用。

俄軍提出「指控瓦解」概念。 「瓦解」是當前俄羅斯最重要的作戰概念之一,俄軍電子戰部隊把使敵人的訊息、指控、電子戰和機器人系統失效作為目標,認為這一目標將「決定所有軍事行動的命運」。 擾亂敵方部隊和武器系統的指揮和控制,降低敵方偵察和使用武器的效率,是進行電子戰的首要任務。 目前,俄軍正在考慮組建12種類型的電子戰部隊。 俄軍也提出「非核遏制體系」概念,核心是使用非核武進攻性戰略武器遏制對手。 其所定義的非核武攻擊性戰略武器既包括所有裝備非核彈頭的彈道飛彈,也包括戰略轟炸機和遠程空基、海基巡航飛彈。 此外,俄軍也提出「混合戰爭」概念,希望利用人工智慧系統謀求戰場資訊優勢。

英國防部提出「多域融合」概念,將發展具備智慧化能力的新型指控系統,以實現全面、持久、準確、快速的戰場感知與力量協同。

注重技術研發

塑造智慧化戰爭作戰模式

人工智慧發揮效用的關鍵是與其他多種技術的組合,這種組合也被描述為「人工智慧堆疊」。 各種技術透過互動的方式產生組合效應,進而提升每項技術所產生的能力與效果。 在人工智慧技術支援的智慧化戰爭中,「人機一體、雲腦控制」的協同作戰模式,「混搭編組、群體智慧」的集群作戰模式,「智慧主導、攻智為上」的認知作戰 模式等,將不斷更新人們對戰爭的認知。

聚焦創新專案研發。 美軍正在大力推廣人工智慧晶片在現有武器裝備系統中的應用,為武器加上“智慧大腦”,使之具備類人思考和自主互動能力。 2021年10月,美海軍推出被視為“當前最高優先事項”的“超越計劃”,旨在通過構建海上作戰軍事物聯網,整合有人無人聯合編隊,加速交付人工智能和機器學習工具,支撐 全新的智慧化海軍架構,提升大規模火力殺傷、實現海軍智慧化分散式作戰。 此外,美國防高級研究計畫局也進行了「自適應電子戰行為學習」「自適應雷達對抗」「極端射頻頻譜條件下的通訊」等認知電子戰項目,研發出認知雷達電子戰系統原型 機。 俄國防部智慧技術裝備科研試驗中心與俄聯邦科學院控制問題研究所合作,開發測試了包括無人機群指揮控制在內的自主智慧演算法,也與國家航空系統科研所共同開發基於神經網路原理的物體 自動辨識軟體系統。

組成創新研發機構。 新技術的不斷湧現是軍事智慧化蓬勃發展的不竭動力,高水準的軍事智慧化建設離不開專職機構的技術研發。 一些國家和軍隊組成研發中心,注重從技術層面創新發展。 美國國防部建立了聯合人工智慧中心,計劃將該中心打造成國家級重點實驗室,用於領導數百個與人工智慧相關的項目,確保對人工智慧相關數據資訊的高效利用,以保持美國 在該領域的技術優勢。 俄羅斯組成了人工智慧和大數據聯盟、國家人工智慧中心和隸屬國防部的機器人技術科研試驗中心,主要進行人工智慧和資訊科技領域的理論和應用研究。 法國成立了創新國防實驗室,英國設立了人工智慧實驗室,印度組成了人工智慧特別工作小組,進行相關技術探索。

加強裝備研發列裝。 近年來,多國重視研發智慧武器裝備,無人飛行器、無人戰車、無人艦艇、無人潛航器等不斷湧現。 目前,美空軍已開始在F-35戰機上實踐「人機協同,人在迴路」的作戰理念。 美XQ-58A「女武神」隱身無人機先前主要與F-35和F-22戰機進行人機協同作戰,2021年4月該隱身無人機成功投放ALTIUS-600小型無人機系統,進一步 提升了其有人無人協同作戰能力。 俄羅斯正聚焦偵察監視、指揮決策、火力打擊、作戰支援等多個領域,展開智慧裝備研發和列裝工作,計畫到2025年將無人作戰系統在武器裝備中的比例提高到30%以上。 以“天王星”系列和“平台-M”“阿爾戈”等型號為代表的俄地面無人作戰武器發展迅速。 其中,Nerekhta無人戰車可搭載遙控機槍和火箭發射器,除擁有一般裝甲車的戰鬥力外,還兼具運輸和偵察功能。 此外,日本自衛隊計劃在2035年正式部署具有較強作戰能力的無人空中編隊。

現代英語:

With the widespread application of artificial intelligence in the military field, intelligent warfare has gradually become a hot topic. History has proven many times that the evolution of war patterns will trigger profound changes in the winning mechanism. In today’s era when information warfare is developing in depth and intelligent warfare is beginning to emerge, the militaries of major countries in the world have vigorously promoted military intelligence, and many of these trends deserve attention.

 Strengthen top-level design

 Outline a “roadmap” for intelligent warfare

 Driven by a new round of scientific and technological revolution and industrial revolution, intelligent military transformation is developing in depth. The United States, Russia, Japan and other countries have regarded artificial intelligence as a disruptive technology that “changes the rules of the war game” and have made arrangements in advance, strengthened top-level design and planning guidance, and explored the direction of military application of artificial intelligence.

 In “Preparing for the Future of Artificial Intelligence”, “National Artificial Intelligence Research and Development Strategic Plan”, “Artificial Intelligence and National Security”, “Comprehensive Roadmap for Unmanned Systems from Fiscal Years 2017 to 2042” and “U.S. Artificial Intelligence Plan”: “First Annual Report” and other documents detail the development status and development plans of artificial intelligence, and elevate the development of artificial intelligence to the national strategic level. In 2021, the U.S. military pointed out in its “U.S. Department of Defense Artificial Intelligence Situation: Assessment and Improvement Suggestions” that the U.S. military should consider three guiding questions when developing artificial intelligence: What is the current status of artificial intelligence related to the U.S. military; What is the posture regarding artificial intelligence; what internal actions and potential legislative or regulatory actions may enhance the U.S. military’s artificial intelligence advantage. 

Russia has invested a lot of resources in order to maintain a balance with the United States in the competition with the United States in the military application of artificial intelligence. In 2021, Russian President Vladimir Putin stated at the first Ministry of Defense meeting of the year that artificial intelligence will greatly promote changes in the military field, and the Russian Federation’s armed forces must accelerate the research and development of artificial intelligence application technologies such as robots, intelligent individual soldier systems, and weapon intelligent modules. work to form core technical capabilities and battlefield competitive advantages as soon as possible. Documents such as the “Special Outline for the Research and Development of Future Military Robot Technology and Equipment by 2025”, “Future Russian Military Robot Application Concept”, “The Development Status and Application Prospects of Artificial Intelligence in the Military Field” have established the national level for the Russian military to promote the military application of artificial intelligence. A series of mechanisms.

 The Japanese government has also introduced the Artificial Intelligence Strategy, aiming to lead the research and development of artificial intelligence technology and industrial development. In the “Robotics and Artificial Intelligence” strategic plan formulated by the United Kingdom, the application of artificial intelligence in battlefield construction is emphasized. In January 2021, the Australian Department of Defense released “Fighting Artificial Intelligence Warfare: Operational Concepts for Future Intelligent Warfare.” This document explores how to apply artificial intelligence to land, sea, and air combat fields.

 innovative operational concepts

 Promote intelligent warfare with “ideas first”

 The innovation of operational concepts has an ideological pulling effect on the development of military science and technology and the evolution of war forms. In the past, people’s understanding and understanding of war mainly came from the summary of practical experience. The concept of combat is the concept of experience. In the future era of intelligent warfare, the concept of combat is not only an empirical concept, but also the conception, design and foresight of combat.

 The U.S. Army has proposed the concept of “multi-domain warfare”, which requires deep integration and close coordination of combat capabilities in land, sea, air, space, electromagnetic, network and other domains. To this end, the U.S. Army has successively released white papers such as “Multi-Domain Warfare: The Development of Combined Arms in the 21st Century (2025-2040)”, “U.S. Army Multi-Domain Warfare (2028)” and “Using Robots and Autonomous Technology to Support Multi-Domain Warfare”. In March 2021, the U.S. Department of the Army released the document “Army Multi-Domain Transformation: Preparing to Win in Competition and Conflict”, indicating that “multi-domain warfare” has become a “flag” leading the transformation and development of the U.S. Army. The U.S. Defense Advanced Research Projects Agency proposed the concept of “mosaic warfare”, aiming to create a highly decentralized and highly adaptable “kill network” composed of different combat functional units and based on advanced computer technology and network technology. The U.S. Department of Defense strongly supports the concept of “joint all-domain operations.” In March 2020, the U.S. Air Force took the lead in writing “Joint All-Domain Operations” into its doctrine to explore how the Air Force can play a role in “Joint All-Domain Operations.”

 The Russian army proposed the concept of “charge disintegration”. “Disintegration” is currently one of the most important operational concepts in Russia. The Russian electronic warfare force sets the goal of disabling the enemy’s information, command, electronic warfare and robotic systems, believing that this goal will “determine the fate of all military operations.” Disrupting the command and control of enemy forces and weapon systems and reducing the efficiency of enemy reconnaissance and weapons use are the primary tasks of electronic warfare. Currently, the Russian army is considering forming 12 types of electronic warfare units. The Russian military also proposed the concept of a “non-nuclear containment system”, the core of which is to use non-nuclear offensive strategic weapons to contain opponents. The non-nuclear offensive strategic weapons defined by it include all ballistic missiles equipped with non-nuclear warheads, as well as strategic bombers and long-range air-based and sea-based cruise missiles. In addition, the Russian military has also proposed the concept of “hybrid warfare”, hoping to use artificial intelligence systems to seek battlefield information advantages.

 The British Ministry of Defense has proposed the concept of “multi-domain integration” and will develop a new command and control system with intelligent capabilities to achieve comprehensive, durable, accurate and rapid battlefield perception and force coordination.

 Focus on technology research and development

 Shape intelligent warfare operations model

 The key to AI’s effectiveness is its combination with a variety of other technologies, also described as the “AI stack.” Various technologies interact to create a combined effect, thereby enhancing the capabilities and effects of each technology. In intelligent warfare supported by artificial intelligence technology, the collaborative combat mode of “man-machine integration, cloud brain control”, the cluster combat mode of “mixed grouping, swarm intelligence”, and the cognitive warfare of “intelligence-led, intelligence-based attack first” models, etc., will continue to update people’s understanding of war.

 Focus on the research and development of innovative projects. The US military is vigorously promoting the application of artificial intelligence chips in existing weapons and equipment systems, adding “intelligent brains” to weapons to enable them to have human-like thinking and autonomous interaction capabilities. In October 2021, the US Navy launched the “Beyond Plan”, which is regarded as the “current highest priority”. It aims to build a maritime combat military Internet of Things, integrate manned and unmanned joint formations, accelerate the delivery of artificial intelligence and machine learning tools, and support The new intelligent naval architecture improves large-scale firepower destruction and realizes intelligent distributed naval operations. In addition, the U.S. Defense Advanced Research Projects Agency has also carried out cognitive electronic warfare projects such as “Adaptive Electronic Warfare Behavior Learning”, “Adaptive Radar Countermeasures” and “Communication under Extreme Radio Frequency Spectrum Conditions”, and developed a cognitive radar electronic warfare system prototype. machine. The Russian Ministry of Defense’s Intelligent Technology and Equipment Scientific Research and Testing Center cooperated with the Institute of Control Problems of the Russian Federal Academy of Sciences to develop and test autonomous intelligent algorithms including the command and control of UAV groups. It also jointly developed objects based on neural network principles with the National Aviation Systems Research Institute. Automatic recognition software system.

 Establish innovative R&D institutions. The continuous emergence of new technologies is an inexhaustible driving force for the vigorous development of military intelligence. High-level military intelligence construction is inseparable from the technical research and development of specialized institutions. Some countries and militaries have established R&D centers to focus on innovation and development at the technical level. The U.S. Department of Defense has established a Joint Artificial Intelligence Center and plans to build the center into a national key laboratory to lead hundreds of artificial intelligence-related projects and ensure the efficient use of artificial intelligence-related data and information to maintain the U.S. technical advantages in this field. Russia has established the Artificial Intelligence and Big Data Alliance, the National Artificial Intelligence Center, and the Robotics Research and Test Center under the Ministry of Defense to mainly carry out theoretical and applied research in the fields of artificial intelligence and information technology. France has established an innovative defense laboratory, the United Kingdom has established an artificial intelligence laboratory, and India has established an artificial intelligence task force to explore related technologies.

 Strengthen equipment research and development and installation. In recent years, many countries have attached great importance to the research and development of intelligent weapons and equipment, and unmanned aerial vehicles, unmanned combat vehicles, unmanned ships, unmanned submarines, etc. have continued to emerge. Currently, the U.S. Air Force has begun to practice the combat concept of “man-machine collaboration, man-in-the-loop” on the F-35 fighter jets. The US XQ-58A “Valkyrie” stealth drone previously mainly conducted man-machine collaborative operations with F-35 and F-22 fighters. In April 2021, the stealth drone was successfully launched into the ALTIUS-600 small drone system, further Improved its manned and unmanned collaborative combat capabilities. Russia is focusing on reconnaissance and surveillance, command and decision-making, fire strikes, combat support and other fields to develop and field intelligent equipment. It plans to increase the proportion of unmanned combat systems in weapons and equipment to more than 30% by 2025. Russian ground unmanned combat weapons, represented by the “Uranus” series and “Platform-M” and “Argo” models, have developed rapidly. Among them, the Nerekhta unmanned combat vehicle can be equipped with remote-controlled machine guns and rocket launchers. In addition to having the combat effectiveness of ordinary armored vehicles, it also has transportation and reconnaissance functions. In addition, the Japan Self-Defense Force plans to formally deploy unmanned aerial formations with strong combat capabilities in 2035.

http://www.mod.gov.cn/888/沒有湯給你

解放軍:以認知為中心的戰爭:應對複雜戰爭的作戰概念

People’s Liberation Army: Cognition-centered warfare: operational concepts for dealing with complex wars

2023-11-09 10:39:55來源:《軍事文摘》

「三個之變」揭示戰爭複雜性成長動因
戰爭是充滿蓋然性的領域,變是貫穿其始終的基本特徵。 習主席強調,要緊盯科技之變、戰爭之變、對手之變。 科技之變是基礎,戰爭之變是主體,對手之變是關鍵,科技之變引發戰爭之變,戰爭之變促使對手之變。 「三個之變」促使戰爭形態演變、戰爭領域拓展、戰爭目標轉變、戰爭影響擴大,揭示了戰爭複雜性成長動因。
科技之變顛覆戰爭制勝基礎。 科學技術是核心戰鬥力,是軍事發展中最活躍、最具革命性的因素。 縱觀世界軍事發展史,每一次重大科學技術創新,都開啟了一場新的軍事變革,而每一場軍事變革都把軍事發展推向一個新的時代,科技創新成為提高軍隊戰鬥力的巨大引擎 。 目前,新一輪科技革命和軍事革命加速發展,現代戰爭資訊化程度不斷提高,智慧化特徵日益顯現,對軍事革命驅動作用愈發凸顯,一些前沿技術飛速發展,可能從根本上改變戰爭面貌和 規則,大國軍事博弈更體現為技術上的顛覆和反顛覆、突襲和反突襲、抵銷和反抵銷。 美海軍「復仇女神」項目,包括偵察、誘餌、幹擾等系統,誘餌類系統涵蓋空中、水面和水下,可在分散式人工智慧引擎的調度、指控下,互相補充,協同欺騙,真實營造出 一個“幽靈航母編隊”,徹底顛覆了傳統的電子欺騙手段,將資訊欺騙提升到前所未有的高度。 可以說,科技從來沒有像今天這樣深刻影響國家安全和軍事戰略全局,深刻介入、支持、主導戰爭形態演變和作戰樣式創新,甚至顛覆戰爭制勝機制。

美海軍「復仇女神」計畫基於網路化協同電子戰
概念,將不同系統集成,利用無人分散式
電子戰平台的集群實現大規模協同電子戰

戰爭之變突顯戰爭複雜性特徵。 現代戰爭正在發生深刻變化,呈現前所未有的多樣性和複雜性。 這種超級複雜性源自於多種原因:一是各種先進技術或武器不斷湧現,帶來許多不確定性;二是戰場覆蓋陸、海、空、天、網、電和認知等多個 領域;三是多種作戰對象、作戰樣式、作戰領域、作戰方式交叉關聯與組合,構成複雜的「混合戰爭」;四是人工智慧演算法將大量作戰要素建構到一個複雜的邏輯中,並以人類 思維所不及的機器速度促使各種要素組合、解構、再組合。 2022年烏克蘭危機中,表面上看來是俄羅斯和烏克蘭兩國之間的對抗,實質上是美西方國家和俄羅斯之間進行的「混合戰爭」;俄烏兩軍廣泛使用軍事、民用無人機,拓展 「無人+」運用模式,展現出未來無人智能作戰雛形;烏軍在美北約空天態勢情報的支持下,頻繁使用低成本的無人裝備對俄軍重要武器平台實施突襲,凸顯新質 作戰力量對傳統作戰體系大型武器裝備的不對稱破襲優勢。 科技之變最終將引發戰爭之變,單一要素對戰爭的影響越來越弱,多個要素構成的聯合作戰體系將對戰爭產生複雜影響,戰爭的非線性、不確定性、混亂性、開放性 、適應性、對抗性等複雜性特徵將呈指數級增長趨勢,這將導致人們對戰爭進展和勝負的認知判斷更加困難。
對手之變加速戰爭複雜性成長。 戰爭之變促使對手之變。 目前,我們正經歷百年未有之大變局,主要軍事強國積極進行戰略調整,推進新一輪軍事變革,呈現出以下特點:一是體制編制的聯合化、小型化、自主化趨勢更加明顯;二 是武器裝備呈現數位化、精確化、隱形化、無人化、智能化的發展趨勢;三是作戰形態向“四非”(非接觸、非線形、非對稱和非正規)和“三無” (無形、無聲、無人)作戰方向發展;四是軍隊指揮形態朝向扁平化、自動化、網路化、無縫化方向發展。 美國將我視為最主要的戰略對手,竭力對我打壓遏制,大力加強作戰概念創新,先後提出「混合戰爭」「多域戰」「馬賽克戰」等新型作戰概念,聲稱要打一場讓對手 「技術看不懂、打擊難預測、速度跟不上」的高端戰爭。 美軍「馬賽克戰」的核心是無人、低成本、快速、致命、靈活、可重組,基於分散式態勢感知,借助智慧化輔助決策工具,借鑒搭積木、構拼圖的概念,自適應制定任務規劃 ,動態重組作戰兵力,將作戰平台的功能分解到更多數量、單一功能的節點,大量功能節點建構作戰體系。 以“殺傷網”取代“殺傷鏈”,若干個節點失效或缺失,作戰體係可自適應重組。
戰爭複雜性成長推動戰爭制勝機理轉變
隨著國防科技的快速發展、武器裝備的更新換代和戰爭形態的快速嬗變,現代戰爭呈現指數式、爆炸性的複雜變化。 這些變化看起來眼花撩亂,但背後是有規律可循的,根本的是戰爭的勝利機理變了。 只有搞透現代戰爭制勝機理,才能準確識變、科學應變、善於求變,牢牢掌握未來戰爭主動權。
戰爭形態由冷兵器戰爭轉變為智慧化戰爭。 戰爭形態是關於戰爭的整體性認知。 迄今為止,人類戰爭形態大致經歷了冷兵器戰爭、熱兵器戰爭、機械化戰爭、資訊戰爭四個歷史階段,正朝向智慧化戰爭邁進。 認知戰的歷史幾乎和人類戰爭史一樣久遠。 在冷兵器戰爭、熱兵器戰爭、機械化戰爭時代,認知戰更多是以輿論戰、心理戰形式出現。 隨著人類進入資訊化時代,網路空間科技的發展大大拓展了認知戰的空間,豐富了認知戰的戰技術手段,使認知戰的滲透性、時效性、震懾性大大增強,認 知戰的地位和作用得到空前提高。 未來,戰爭形態將進入智慧化戰爭,大量智慧化的武器系統和平台將裝備軍隊、投入作戰。 認知戰不僅可對敵方人員的認知實施幹擾、欺騙,也能透過「對抗性輸入」「資料中毒」等演算法欺騙手段對智慧裝備的認知實施攻擊,其應用場景和範圍將進一步擴大 ,地位和作用也將進一步提高。

無人機逐漸成為戰爭的主角,
作戰複雜性進一步增加
戰爭目的由武力征服更多向精神征服轉變。 現代戰爭的致勝機制與以往相比發生了很大變化,戰爭的暴力性得到遏制,作戰目的由原來的攻城略地、殲滅敵有生力量,轉變到使對方服從己方意志,作戰手段從武力征服更多地向 著重心理和精神征服轉變,這使得認知戰在現代戰爭中的地位、角色日益凸顯。 近年來,「混合戰爭」成為大國競爭的主要手段,越來越多的國家開始專注於利用新型領域、新型手段來達到傳統作戰難以達到的政治、軍事、經濟目的。 「混合戰爭」是國家、非國家行為體以及個人等戰爭主體的混合,是常規戰爭、非常規戰爭等戰爭樣式的混合,是作戰、維穩、重建等軍事行動的混合,是政治、軍事、經濟 、民生等多領域的混合,是擊敗敵軍、爭取民心等多種作戰目標的混合,這與認知戰高度契合。 「混合戰爭」的作戰領域由軍事領域拓展到了政治、經濟、文化、民生等領域;作戰方式由火力戰、兵力戰向外交戰、經濟戰、網路戰、心理戰、輿論戰等多方向拓展, 這與認知戰高度一致,其核心要義都是“亂中取利”,主要目的都是爭奪人心,作戰指導都是以巧取勝。
戰爭制勝域由物理域資訊域轉變為認知域。 現代戰爭同時發生在物理、資訊和認知三個領域,物理域和資訊域是從物質域中脫離出來的,認知域是從精神域中脫離出來的。 物理域是傳統的戰爭領域,由作戰平台和軍事設施等構成,為資訊化戰爭提供物質基礎。 資訊域是新崛起的戰爭領域,即資訊產生、傳輸和共享空間,是資訊化戰爭較量的重點。 認知域是人類認知活動涉及的範圍和領域,既是人類感覺、知覺、記憶和思考活動的空間,也是知識生成、交換、關聯、儲存和運用的空間,也是作戰活動中感知、判斷、決策 和指揮與控制的空間。 認知域存在於作戰人員的意識領域之中,影響其判斷與決策,是正在崛起的戰爭領域。 隨著網路資訊和人工智慧等技術的發展,認知域的範圍大大拓展,正在從人的意識領域向現代認知工具和人工智慧領域拓展。 軍事技術的發展拓展了認知域的範圍,為認知戰提供了更先進、更快捷、更有效的物質技術手段,使認知戰的滲透性、時效性、震懾性大大增強,從根本上 改變了認知戰,使得認知域成為超越物理域、資訊域的新的致勝領域,成為大國博弈、軍事對抗的終極之域。
戰爭制勝機理由資訊制勝向認知制勝轉變。 戰爭對抗歸根究柢是認知的博弈與對抗,掌握了製認知權很大程度上就掌握了戰爭主動權,喪失了製認知權就會在戰爭中處於被動挨打的境地。 獲得更高、更強的製認知權是製勝強敵的關鍵。 想辦法掌握制認知權進而奪取戰場綜合製權,從而以最小代價獲得最大勝利,是現代戰爭特別是認知戰的重要機理和內在規律。 近年來,美軍先後提出以「決策中心戰」「馬賽克戰」等為代表的未來戰爭新理念,意圖將複雜性作為一種為對手製造多重困境的武器,要求在保障自身戰術「選擇優勢」的 同時,透過給敵方製造高複雜度決策影響,幹擾其決策能力,在認知域實現對敵顛覆性優勢。 在資訊化戰爭的初級和中級階段,作戰的關鍵是奪取制網權和製資訊權,貫穿著「網路優勢→資訊優勢→決策優勢→作戰優勢」的遞進模式。 在資訊化戰爭進入高級階段後,奪取制資訊權變得越來越困難,作戰的關鍵是使敵方陷入“決策困境”,使其即使擁有資訊優勢,也不能正確決策,從而失去作戰優勢,擁有認 知優勢才能擁有作戰優勢。 未來戰爭,認知優勢是最重要的戰略優勢,認知對抗是最主要的對抗形式,可謂「無認知不戰爭」。
因應複雜戰爭催生認知中心戰作戰概念
為因應現代戰爭複雜性特徵指數級增長趨勢,我們必須運用複雜性科學的理論與方法,轉變以住平台中心戰火力至上、殺傷為王的觀念,確立以認知為中心的作戰思想。 認知中心戰,指以認知域為致勝領域,以奪取認知優勢為作戰目標,圍繞幹擾認知手段、壓制認知管道、影響認知產生,對敵人員和智慧裝備的認知進行 幹擾、壓制、欺騙和誘導,透過奪取和維持認知優勢來獲取作戰優勢的一種新型作戰概念。 其主要製勝機理有以下幾點。

《孫子兵法》中提到」故兵無常勢,
水無常形;能因敵變化而取勝者,謂之神「
以網路威懾摧毀敵方作戰意志。 針對敵政治、經濟、軍事、外交、文化中的矛盾弱點,透過網路空間散播威懾性訊息,或透過網路發布閱兵、大規模軍事演習、新式武器裝備研發等訊息,使對手認知與心理產生極 大的恐懼和震撼,遏止敵不利於我的行動舉措執行。 綜合運用網電攻擊手段,對敵重要網電目標和關鍵核心節點實施點穴式打擊和警示攻擊,破壞敵體係作戰能力,影響敵武器裝備效能的正常發揮,對敵實施心理威懾。 美軍「灰色地帶作戰」理論,就是依靠自身技術優勢,主要採取網電反制等行動,應對對手“灰色地帶挑釁”,威懾對手要么放棄“對抗”,要么衝突升級,使之陷入兩難境地。
以資訊欺騙誘導敵方錯誤判斷。 針對敵方的偵察設備、情報機構和指揮系統,透過網路攻擊、電子欺騙等手段隱藏己方軍事企圖、軍事行動和軍事目標,向敵方傳送有關己方的錯誤和虛假的作戰企圖、部隊配置、作戰 能力、作戰方案以及戰場態勢等方面的訊息,或借敵方指揮資訊系統發送虛假命令和訊息,達到誘敵錯誤判斷,擾敵作戰指揮的目的。 針對人工智慧演算法實施「對抗性輸入」「資料中毒」等新型攻擊,使其透過深度學習訓練得到我預設結論,或使其陷入局部最優解中而忽略全局最優。 利用電腦影像、視訊合成、虛擬實境和人工智慧等技術,將聲音、視訊、影像、文字訊息等進行合成,或利用「深度造假」技術,產生以假亂真、真假難辨的虛假訊息,並透過網路 大量傳播,以迷惑欺騙對手,影響其決策和行動。
以資訊壓制阻塞敵方認知手段。 針對敵重要網路目標,以及核心路由器、交換器、網關、重點伺服器等,使用「軟體」「硬」攻擊手段,摧毀其網路節點。 針對敵指揮控制網、通訊傳輸網、武器鉸鍊網和預警探測網等無線鏈路的組網特點,綜合運用電子乾擾、GPS欺騙攻擊、指控鏈路接管、數據劫持控制等技術和手段,壓制其 數據通信,阻斷其通信鏈路,幹擾其作戰指揮。 對敵指揮控制、軍事通訊、預警偵測、空天資訊等軍事網路實施網電致癱攻擊,毀癱影響其作戰的核心網絡,削弱其作戰能力。
以輿論宣傳營造有利輿論環境。 配合國家政治、軍事、外交鬥爭,大力宣傳己方在戰爭中的正義性,激發全體民眾全力支持戰爭的熱情。 借助即時通訊工具、網路論壇、播客、推特、微信等新媒體平台,有計劃地散佈打擊敵方弱點的信息,取得廣泛關注和普遍共鳴後,再適時報料、製造新的熱點,反复造勢 增強影響,形成共振效應擴大效果。 透過巧妙設定議程來進行宣傳“定調”,透過強勢媒體進行輿論造勢,掀起“沉默的螺旋”,控制和引導輿論,改變人們的看法和行為。
以心理攻擊瓦解敵方軍民士氣。 透過網路廣泛傳播經過加工和處理過的訊息,宣傳己方的正義性,展現己方的力量、意志和決心,對敵方在政治上、道德上進行醜化,對內凝聚軍民的思想和意志,對外力爭 法理道義的製高點,從精神上「軟化」「弱化」敵人。 運用多種網路傳播方式和技術手段,向敵方軍民有針對性地發送各種欺騙性、幹擾性、誘導性、威懾性訊息,攻敵心理防線,促進其產生對抗無效心理,進而喪失作戰能力 。

Modern English:

Complexity science is one of the frontier fields of contemporary scientific development. It is a new tool for understanding, understanding, and exploring the phenomena, laws, and mechanisms of war. As the form of war evolves from information war to intelligent war, the complexity of war shows an exponential growth trend, and it becomes increasingly difficult to seize control of information. The key to combat is to put the enemy into a “decision-making dilemma” so that it can even Even with information superiority, it cannot make correct decisions, thus losing its combat advantage. The focus of operations will change from “information-centered” to “cognition-centered”, and the winning mechanism will change from “information winning” to “cognitive winning”.

“Three changes” reveal the driving forces behind the increasing complexity of war

War is a field full of possibilities, and change is the basic characteristic that runs through it. President Xi stressed that we must pay close attention to changes in technology, war, and opponents. Changes in science and technology are the foundation, changes in war are the subject, and changes in opponents are the key. Changes in science and technology lead to changes in war, and changes in war prompt changes in opponents. The “three changes” have promoted the evolution of war forms, the expansion of war fields, the transformation of war goals, and the expansion of war influence, revealing the driving forces behind the growth of war complexity.

Changes in technology have overturned the basis for winning wars. Science and technology are the core combat effectiveness and the most active and revolutionary factor in military development. Throughout the history of the world’s military development, every major scientific and technological innovation has started a new military revolution, and every military revolution has pushed military development into a new era. Scientific and technological innovation has become a huge engine to improve the military’s combat effectiveness. . At present, a new round of scientific and technological revolution and military revolution are accelerating. The degree of informatization of modern warfare is constantly increasing, and the characteristics of intelligence are becoming increasingly apparent. The role of driving the military revolution is becoming more and more prominent. The rapid development of some cutting-edge technologies may fundamentally change the face of war and war. According to the rules, the military game between great powers is more embodied in technological subversion and counter-subversion, raids and counter-raids, offsets and counter-offsets. The U.S. Navy’s “Nemesis” project includes reconnaissance, decoy, jamming and other systems. The decoy system covers air, surface and underwater. Under the scheduling and control of the distributed artificial intelligence engine, it can complement each other, coordinate deception, and truly create a A “ghost aircraft carrier formation” completely subverted traditional electronic deception methods and raised information deception to an unprecedented level. It can be said that science and technology has never had such a profound impact on the overall situation of national security and military strategy as it does today. It has profoundly intervened in, supported, and dominated the evolution of war forms and the innovation of combat styles, and has even subverted the mechanism of winning wars.

The U.S. Navy’s “Nemesis” project is based on networked collaborative electronic warfare

Concept, integrating different systems and utilizing unmanned distributed

Clusters of electronic warfare platforms enable large-scale collaborative electronic warfare

The changes in war highlight the complexity of war. Modern warfare is undergoing profound changes, showing unprecedented diversity and complexity. This super complexity stems from many reasons: first, various advanced technologies or weapons are constantly emerging, bringing many uncertainties; second, the battlefield covers land, sea, air, space, network, electricity and cognitive and other multiple third, multiple combat objects, combat styles, combat areas, and combat methods are cross-correlated and combined to form a complex “hybrid war”; fourth, artificial intelligence algorithms build a large number of combat elements into a complex logic, and use human Machine speed beyond the reach of thinking prompts the combination, deconstruction, and recombination of various elements. In the Ukraine crisis in 2022, on the surface it is a confrontation between Russia and Ukraine, but in essence it is a “hybrid war” between the United States and Western countries and Russia; the Russian and Ukrainian armies extensively use military and civilian drones to expand The “unmanned +” application model shows the prototype of future unmanned intelligent operations; with the support of U.S. NATO air and space situational intelligence, the Ukrainian army frequently uses low-cost unmanned equipment to carry out raids on important Russian weapons platforms, highlighting its new qualities Combat forces have asymmetric attack advantages against large weapons and equipment in traditional combat systems. Changes in technology will eventually lead to changes in war. The impact of a single element on war will become weaker and weaker. The joint combat system composed of multiple elements will have a complex impact on war. War is non-linear, uncertain, chaotic and open. Complex characteristics such as adaptability and confrontation will increase exponentially, which will make it more difficult for people to judge the progress and outcome of the war.

Changes in opponents accelerate the growth of war complexity. Changes in war prompt changes in opponents. Currently, we are experiencing major changes unseen in a century. Major military powers are actively making strategic adjustments and promoting a new round of military reforms, which exhibit the following characteristics: first, the trend of joint, miniaturized, and autonomous institutional establishments has become more obvious; second, The first is that weapons and equipment are showing a development trend of digitization, precision, stealth, unmanned, and intelligence; the third is that the combat form is moving towards the “four nons” (non-contact, non-linear, asymmetric and irregular) and the “three nos” (Invisible, silent, unmanned) combat; fourth, the military command form is developing in the direction of flattening, automation, networking, and seamlessness. The United States regards China as its main strategic opponent and strives to suppress and contain China. It has vigorously strengthened the innovation of operational concepts and has successively proposed new operational concepts such as “hybrid warfare”, “multi-domain warfare” and “mosaic warfare”, claiming that it will fight to defeat its opponents. A high-end war in which “technology cannot be understood, strikes are difficult to predict, and speed cannot keep up.” The core of the US military’s “mosaic warfare” is unmanned, low-cost, fast, lethal, flexible and reconfigurable. It is based on distributed situational awareness, with the help of intelligent auxiliary decision-making tools and the concept of building blocks and jigsaw puzzles to adaptively formulate mission planning. , dynamically reorganize combat forces, decompose the functions of the combat platform into a larger number of single-function nodes, and build a combat system with a large number of functional nodes. Replace the “kill chain” with a “kill network”. Several nodes will fail or be missing, and the combat system can be adaptively reorganized.

The increasing complexity of war drives the transformation of the winning mechanism of war

With the rapid development of national defense science and technology, the upgrading of weapons and equipment, and the rapid evolution of war forms, modern warfare has shown exponential and explosive complex changes. These changes may seem dazzling, but there are rules to follow behind them. The fundamental thing is that the winning mechanism of war has changed. Only by thoroughly understanding the winning mechanism of modern war can we accurately recognize changes, respond scientifically, be good at seeking change, and firmly grasp the initiative in future wars.

The form of war has changed from cold weapon warfare to intelligent warfare . The shape of war is a holistic understanding of war. So far, human war has generally gone through four historical stages: cold weapon war, hot weapon war, mechanized war, and information war, and is moving towards intelligent warfare. The history of cognitive warfare is almost as old as the history of human warfare. In the era of cold weapon war, hot weapon war, and mechanized war, cognitive warfare appears more in the form of public opinion warfare and psychological warfare. As mankind enters the information age, the development of cyberspace technology has greatly expanded the space for cognitive warfare, enriched the technical means of cognitive warfare, and greatly enhanced the permeability, timeliness, and deterrence of cognitive warfare. The status and role of Zhizhan have been unprecedentedly improved. In the future, the form of war will enter intelligent warfare, and a large number of intelligent weapon systems and platforms will be equipped with the military and put into combat. Cognitive warfare can not only interfere with and deceive the cognition of enemy personnel, but also attack the cognition of smart equipment through algorithm deception methods such as “adversarial input” and “data poisoning”. Its application scenarios and scope will be further expanded. , the status and role will be further improved.

Drones have gradually become the protagonist of war,

Combat complexity further increases

The purpose of war has changed from conquering by force to conquering by spirit. The winning mechanism of modern war has undergone great changes compared with the past. The violence of war has been curbed. The purpose of combat has changed from the original siege of cities and territories and annihilation of the enemy’s effective forces to making the opponent obey one’s own will. The means of combat have changed from conquering by force to conquering more areas. The emphasis on psychological and spiritual conquest and transformation has made cognitive warfare increasingly prominent in its status and role in modern warfare. In recent years, “hybrid warfare” has become a major means of great power competition. More and more countries have begun to focus on using new fields and new means to achieve political, military, and economic goals that are difficult to achieve with traditional warfare. “Hybrid war” is a mixture of war subjects such as states, non-state actors and individuals, a mixture of conventional warfare, unconventional warfare and other war styles, a mixture of military operations such as combat, stability maintenance and reconstruction, and a mixture of political, military and economic The mixture of multiple fields such as military and people’s livelihood is a mixture of multiple combat goals such as defeating the enemy and winning the hearts and minds of the people. This is highly consistent with cognitive warfare. The operational field of “hybrid warfare” has expanded from the military field to politics, economy, culture, people’s livelihood and other fields; the combat methods have expanded from firepower warfare and troop warfare to diplomatic warfare, economic warfare, cyber warfare, psychological warfare, public opinion warfare and other directions. This is highly consistent with cognitive warfare. Its core essence is to “make profit out of chaos”, its main purpose is to win people’s hearts, and its combat guidance is to win by cleverness.

The winning domain of war changes from the physical domain and information domain to the cognitive domain. Modern war occurs in three fields: physics, information and cognition at the same time. The physical domain and information domain are separated from the material domain, and the cognitive domain is separated from the spiritual domain. The physical domain is a traditional war domain, consisting of combat platforms and military facilities, which provides the material basis for information warfare. The information domain is a newly emerging war field, that is, the space for information generation, transmission and sharing, and is the focus of information warfare competition. Cognitive domain is the scope and field involved in human cognitive activities. It is not only the space for human feeling, perception, memory and thinking activities, but also the space for knowledge generation, exchange, association, storage and application. It is also the space for perception, judgment and decision-making in combat activities. and spaces of command and control. The cognitive domain exists in the field of consciousness of combatants and affects their judgment and decision-making. It is a rising field of warfare. With the development of technologies such as network information and artificial intelligence, the scope of the cognitive domain has greatly expanded, and is expanding from the field of human consciousness to the field of modern cognitive tools and artificial intelligence. The development of military technology has expanded the scope of the cognitive domain, providing more advanced, faster, and more effective material and technical means for cognitive warfare, greatly enhancing the permeability, timeliness, and deterrence of cognitive warfare, and fundamentally It has changed cognitive warfare, making the cognitive domain a new winning field that transcends the physical domain and information domain, and has become the ultimate domain for great power games and military confrontations.

The mechanism for winning wars changes from information victory to cognitive victory. In the final analysis, war confrontation is a game and confrontation of cognition. Mastering the right to control cognition will largely control the initiative in war. Losing the right to control cognition will put you in a passive position of being beaten in the war. Obtaining higher and stronger control rights is the key to defeating powerful enemies. Finding ways to control cognitive power and then seize comprehensive battlefield control, so as to achieve maximum victory at the minimum cost, is an important mechanism and inherent law of modern warfare, especially cognitive warfare. In recent years, the U.S. military has successively proposed new concepts of future warfare represented by “decision-centered warfare” and “mosaic warfare”, intending to use complexity as a weapon to create multiple dilemmas for opponents, requiring it to ensure its own tactical “selective advantage”. At the same time, by creating highly complex decision-making influences on the enemy and interfering with its decision-making capabilities, it can achieve a subversive advantage over the enemy in the cognitive domain. In the primary and intermediate stages of information warfare, the key to combat is to seize network control and information control, which runs through the progressive model of “network advantage → information advantage → decision-making advantage → combat advantage”. After information warfare enters an advanced stage, it becomes more and more difficult to seize control of information. The key to combat is to make the enemy fall into a “decision-making dilemma” so that even if it has information superiority, it cannot make correct decisions, thereby losing its combat advantage and having recognition. Only by knowing the advantages can you have the combat advantage. In future wars, cognitive advantage will be the most important strategic advantage, and cognitive confrontation will be the most important form of confrontation. It can be said that “without cognition, there is no war.”

Coping with complex wars has given rise to the concept of cognitive-centered warfare

In order to cope with the exponential growth trend of the complexity characteristics of modern warfare, we must use the theories and methods of complexity science to change the concept of platform-centered warfare where firepower is supreme and killing is king, and establish a cognitive-centered combat thinking. Cognition-centered warfare refers to taking the cognitive domain as the winning area, taking the cognitive advantage as the operational goal, and focusing on interfering with cognitive means, suppressing cognitive channels, affecting cognitive production, and conducting cognitive operations on enemy personnel and intelligent equipment. Interference, suppression, deception and inducement are a new operational concept that obtains combat advantages by seizing and maintaining cognitive advantages. Its main winning mechanisms are as follows.

Sun Tzu mentioned in “The Art of War” that “there is no constant force in an army;

Water has no permanent shape; those who can win due to the changes of the enemy are called gods.

Use cyber deterrence to destroy the enemy’s will to fight. Targeting the enemy’s political, economic, military, diplomatic, and cultural contradictions and weaknesses, disseminate deterrent information through cyberspace, or publish military parades, large-scale military exercises, new weapons and equipment research and development and other information through the Internet, so as to cause extreme cognitive and psychological changes in the opponent. Great fear and shock, deterring the enemy is not conducive to the implementation of my actions. Comprehensive use of network and electricity attack methods to carry out point strikes and warning attacks against the enemy’s important network and electricity targets and key core nodes, destroying the enemy’s system combat capabilities, affecting the normal performance of the enemy’s weapons and equipment, and providing psychological deterrence to the enemy. The US military’s “gray zone operations” theory relies on its own technological advantages and mainly takes actions such as cyber and electronic countermeasures to respond to the opponent’s “gray zone provocation” and deter the opponent from giving up “confrontation” or escalating the conflict, putting it in a dilemma.

Use information deception to induce the enemy to make misjudgments. Aiming at the enemy’s reconnaissance equipment, intelligence agencies and command systems, use cyber attacks, electronic deception and other means to conceal one’s military intentions, military operations and military objectives, and transmit to the enemy erroneous and false combat plans, troop configurations and operations. capabilities, combat plans, battlefield situation, etc., or use the enemy’s command information system to send false orders and information to induce the enemy to make wrong judgments and disrupt the enemy’s combat command. Implement new attacks such as “adversarial input” and “data poisoning” against artificial intelligence algorithms, allowing them to obtain preset conclusions through deep learning training, or causing them to fall into local optimal solutions and ignore the global optimal. Use technologies such as computer imaging, video synthesis, virtual reality, and artificial intelligence to synthesize sounds, videos, images, text information, etc., or use “deep fake” technology to generate false information that is difficult to distinguish between true and false, and transmit it through the Internet Spread in large quantities to confuse and deceive opponents and influence their decisions and actions.

Use information suppression to block the enemy’s cognitive means. Target the enemy’s important network targets, as well as core routers, switches, gateways, key servers, etc., and use “soft” and “hard” attack methods to destroy their network nodes. Based on the networking characteristics of wireless links such as the enemy’s command and control network, communication transmission network, weapon hinge network, and early warning detection network, comprehensively use technologies and means such as electronic jamming, GPS spoofing attacks, command link takeover, and data hijacking control to suppress them. Data communication, blocking its communication links and interfering with its combat command. Implement cyber-paralysis attacks on enemy command and control, military communications, early warning detection, aerospace information and other military networks, destroying core networks that affect their operations and weakening their combat capabilities.

Use public opinion propaganda to create a favorable public opinion environment . Cooperate with the country’s political, military, and diplomatic struggles, vigorously promote one’s own justice in the war, and stimulate the enthusiasm of all people to fully support the war. With the help of new media platforms such as instant messaging tools, online forums, podcasts, Twitter, and WeChat, we can systematically disseminate information that targets the enemy’s weaknesses. After gaining widespread attention and consensus, we can then promptly report information, create new hot spots, and repeatedly build momentum. Enhance the influence and form a resonance effect to expand the effect. Propaganda “sets the tone” by cleverly setting agendas, building public opinion through powerful media, setting off a “spiral of silence”, controlling and guiding public opinion, and changing people’s opinions and behaviors.

Use psychological attacks to undermine the morale of enemy soldiers and civilians. Through the Internet, processed and processed information is widely disseminated to promote one’s justice, demonstrate one’s strength, will and determination, vilify the enemy politically and morally, gather the thoughts and will of the military and civilians internally, and strive to win externally. The commanding heights of law and morality can “soften” and “weaken” the enemy spiritually. Use a variety of network communication methods and technical means to send various deceptive, disruptive, inductive, and deterrent messages to the enemy’s military and civilians in a targeted manner to attack the enemy’s psychological defense line, promote an ineffective confrontation mentality, and then lose combat capabilities. . Through the Internet, we can create, guide, plan, build, and expand momentum to create a “momentum” that is beneficial to ourselves but not beneficial to the enemy, causing a psychological impact on the other party’s people, thereby affecting or changing their psychological state, and implementing effective psychological attacks.

Use legal struggle to obtain legal and moral support. Use legal weapons to curb the enemy’s possible or future illegal acts, declare the legality of our actions, affirm our power of military counterattack, declare our determination to pursue war responsibilities, and deter the enemy. By exposing the illegality of the enemy’s provocative behavior, criticizing the legal basis for the enemy’s combat operations, and condemning the enemy’s illegal behavior, it causes the enemy’s strategic defeat and our own strategic gain. Use legal means to restrict the enemy’s possible actions, limit the possible interference of third parties, and block other parties from interfering with our own actions. Formulate the laws and regulations necessary for our operations to provide legal protection for our operations, or take legal remedial measures to reduce the possible negative impacts of our operations and ensure that combat operations are carried out in accordance with the law.

原中國軍事網站:http://www.81it.com/2023/1109/888沒有湯適合你.html

中國軍隊在認知領域建構網路戰作戰節奏

Chinese Military Establishes Battle Rhythm of Cyber Warfare in the Cognitive Domain

目前,認知域已作為獨立一域登上戰爭舞台,日益成為大國博弈的常鬥之域、必爭之地、勝戰砝碼。 分析認知域作戰特徵及發展趨勢,至少反映為以下八個面向。

認知域是軍事優勢轉化為政治勝勢的關鍵域

軍事對抗,表面上看來是雙方硬實力的對抗,深層看不管戰爭是什麼性質、何種目的,終歸是人的意志的較量。 勝利的關鍵是將己方意志強加在受眾身上的能力。 只要剝奪、擊潰了敵人的戰爭意志,就意味著贏得了戰爭。 認知域作戰,以人的意志、精神、心理等為對抗目標,增強己方意志的同時削弱敵方的意志,進而達成攻心奪志的政治目的。 從這個意義上講,認知域是軍事優勢轉化為政治勝勢的關鍵領域。 隨著戰爭形態加速向智慧化演進,認知品質優勢帶來決策行動優勢,不僅可在道德、法理上佔據制高點,塑造正義合法的有利態勢,還可透過混合戰爭、綜合博弈手段,實現小戰 甚至不戰而勝的目的。 尤其是大國競爭背景下戰爭成本高昂,各方都希望透過加大認知域爭奪力度,以「人道」且「經濟」的形式,迫使對手知難而退。

透過改變對手認知,可改變其決策和行動

實施認知攻擊的目的,就是用一隻“看不見的手”操控對手意志,讓對手感到“我不能”“我不敢”,從而達到“我不想”的效果。 外軍實踐表明,對人的意志、信念、思維、心理實施認知攻擊,可以是長期的文化植入,可以是「資訊海洋+摀嘴封聲」式的資訊壓制,可以是先入為主、搶先發聲 的主動塑造,也可以利用歷史積怨來挑動矛盾爆發。 目前,資訊科技、人工智慧技術、媒體科技強化了對認知域的直接作用,利用智慧生成軟體,可製造大量認知“彈藥”,精準作用於作戰目標的認知層,直接將“意志強加 於對手”,快速改變戰略態勢。 展望資訊化智慧化戰場,態勢感知力量與平台廣泛分佈於陸海空天網等作戰域,規劃、決策、控制等認知行為主導各作戰域行動,尤其是未來智能化戰爭中人機混合的認知 優勢將主導戰場,可以透過認知幹擾、認知混淆、認知阻斷等手段,製造戰爭認知“迷霧”,誘使對手誤判態勢,做出錯誤決策和行動。

認知域作戰是全時攻防、全員覆蓋、全程使用、全域塑造、全政府行動

認知域作戰呈現出全方位、多層次、超時空、跨領域等特點,模糊了戰時和平時、前方和後方的界限,跨越了戰場和國界,超越了單純的軍事領域,廣泛滲透於政治 、經濟、外交等各社會領域,表現為「五全」特質。 全時攻防,沒有平時戰時之分,沒有前方後方之別,表現為全時在線、全時在戰。 全員覆蓋,任何人甚至包括智慧機器人,都可能成為認知域作戰的目標對象。 全程使用,貫穿聯合作戰的戰前戰中戰後,聯合軍事行動未展開,認知塑勢行動已開始,並且伴隨軍事行動而行,不隨軍事行動停而停。 全域塑造,認知塑造貫穿戰略、戰役、戰術各層,作用範圍涵蓋陸海空天網各域,跨域賦能,對全域行動都有影響。 全政府行動,認知塑造自然具有戰略性,需要跨部門、跨領域、跨軍地、跨層級一致協調行動,以求達到最佳傳播效果。

關鍵在於奪控行動或活動的性質定義權、過程主導權、結局評判權

認知賽局鬥爭,涉及多個對抗方,看似紛繁複雜,關鍵在於圍繞認知域的「三權」展開爭奪。 其一,爭奪事件性質定義權。 即這個事件該怎麼看,是正義的還是非正義的,是合法的還是非法的。 通常採取先發制人搶先定義、建群結盟強行定義、資訊壓制單方定義、設定議題套用定義等,引導塑造民眾形成定性認知。 其二,爭奪事件過程主導權。 即這事該怎麼幹、不該怎麼做,誰做的是對的、誰做的是錯的,通常採取設局布阱等方式,試圖按照己方所期望出現的狀態,主導目標事件發展方向、 快慢、暫停、繼續與終結。 其三,爭奪事件結局評判權。 即對這事該怎麼評,誰是獲利方、誰是受損方,誰是眼前的失利者、誰是長遠的受損者,等等。 各方都試圖透過掌控事件結局的評判權,放大於己有利之處、放大於敵不利之處,目的是利用事件延伸效應,持續傷敵利己。

道義和法理是各方爭奪的焦點

軍事行動歷來講究「師出有名」。 雖然戰爭形態加速演變,但是戰爭從屬於政治的本質屬性不會改變;戰爭性質和人心向背,仍是影響戰爭勝負的關鍵因素。 認知域戰場上,佔據了政治、道義、法理的製高點,就能夠贏得民心、道義支持,營造得道多助的輿論氛圍,進而掌握制敵先機。 每次戰爭或衝突,無論是強者或弱者,無論是進攻方防守方或第三方,各方都會全力搶佔認知主導權、輿論主動權,千方百計用道義包裝自己、注重宣示正義立場,設法為 戰爭定性、為行動正名,以消除阻力、增加助力,塑造以「有道」伐「無道」的有利態勢。 戰爭雙方實力對比不同,瞄準佔據道德法理制高點進行的認知對抗方式也會不同。 近幾場戰爭表明,當一方軟硬實力均很強大時,即軍事實力強、盟友夥伴眾多、國際話語權佔有率大,常常高調宣戰;當軍事行動有可能引發連鎖反應時,則常常模糊處理 「戰」的提法。

資訊是認知攻防的基本“彈藥”

網路資訊時代,人類溝通方式持續發生複雜深刻變化。 現場互動互動逐漸讓位給網路線上連線,一些大型社群平台成為認知博弈鬥爭的主陣地、影響民眾認知的主管道,以資訊為彈藥進行國際網路封鎖權、話語控制權爭奪成為當今認 知對抗的主要行動之一。 在這些平台上,各種短視頻成為公眾了解戰況的“第一現場”,訊息比砲彈跑得快。 圍繞平台的使用與封鎖、主導與規製成為認知域作戰爭奪的焦點,各方努力透過操控社交平台來傳播、放大己方宣傳,聲討、壓制對方宣傳,形成「我說的多、你說的少 」「我說的對、你說的錯」「只能我說、不讓你說」的局面。 民眾作為大型社群平台的使用者,在「聽」與「說」甚至「做」的過程中,受別人影響,也影響別人,不知不覺地成為幕後推手的代理人和攻擊道具。

軍事行動對認知塑造有關鍵支撐作用

人類戰爭史表明,兵戰永遠是政治較量的基礎支撐,心戰則是兵戰的效能倍增器。 戰場上拿不回來的東西,不能指望在談判桌上拿回來,更不能指望在輿論場上拿回來。 現代戰爭中,認知傳播行動總是與聯合軍事行動如影隨形,心戰與兵戰互相影響、互為支撐,兵戰心戰化和心戰兵戰化趨勢更為明顯。 從戰爭實踐看,沒有軍事實力是萬萬不能的,但僅有軍事行動又不是萬能的。 戰場上的多次勝利,並不是奪取戰爭勝利的充分條件。 越戰中,美雖「贏得了每次戰鬥,卻輸掉了整場戰爭」。 21世紀初,美國連續打的伊拉克戰爭、阿富汗戰爭,贏得了戰場勝利,也沒有贏得政治勝勢。 同樣的道理,軍事上的勝勢不等於贏得輿論上的強勢,贏得戰場勝利也不意味著贏得戰略的勝利。 現代戰爭中,兩類人員的角色越來越大,一類人員透過編寫成千上萬行程式碼謀勝,一類人員透過編寫成千上萬條資訊謀勝。 這兩類人員數品質都佔優的一方,取勝的機率往往就大。

認知對抗技術越來越直接運用於戰爭

過去戰爭中,對認知域的影響和作用,主要是透過物理域的大量毀傷行動,逐級逐層傳遞到認知域。 隨著資訊通訊、人工智慧、生物交叉、腦科學等技術的發展和突破,新的認知戰工具和技術直接瞄準軍事人員。 認知對抗不僅使用傳統的資訊戰武器,也使用以大腦為作戰目標的神經武器庫。 屆時,機器將可以讀懂人腦,人腦也將能夠直接控制機器,智慧指控系統可以直接提供戰場態勢和決策輔助,逼真的認知彈藥和精準的受眾投放將極大增強社會影響效果。 認知對抗技術越來越直接運用於戰爭,原來資訊化所隱含的間接認知,正逐步轉變為直接對人的認知進行影響與控制。 可以說,先進科技的支撐,使認知域作戰透過建構現代網路架構、開發資料視覺化平台,快速了解資訊環境並有效影響目標人群,可以更直接且有效率地達成政治目的。

(作者單位:軍事科學學院戰爭研究院)

Modern English:

Analysis of the characteristics and development trends of cognitive domain operations

Cognitive domain operations take people’s will, beliefs, thinking, psychology, etc. as direct combat objects, and then affect their decisions and actions by changing the opponent’s cognition. Entering the era of information-based and intelligent warfare, cognitive domain warfare has become an important form of great power game, with all parties striving to achieve political goals in a relatively controllable manner. Gaining insight into the characteristics and development trends of cognitive domain operations is of urgent and important practical significance for winning future wars.

At present, the cognitive domain has entered the war stage as an independent domain, and has increasingly become a common domain, a battleground, and a weight for victory in the game between great powers. Analyze the characteristics and development trends of cognitive domain operations, which are reflected in at least the following eight aspects.

The cognitive domain is the key domain for transforming military advantage into political victory.

On the surface, military confrontation is a confrontation between the hard power of both sides. On a deeper level, no matter what the nature of the war is and for what purpose, it is ultimately a contest of human wills. The key to victory is the ability to impose your will on your audience. As long as the enemy’s will to fight is deprived and defeated, the war is won. Cognitive domain warfare uses human will, spirit, psychology, etc. as the target of confrontation, strengthening one’s own will while weakening the enemy’s will, thereby achieving the political goal of conquering the heart and mind. In this sense, the cognitive domain is the key domain for transforming military advantage into political victory. As war accelerates its evolution toward intelligence, cognitive quality advantages bring decision-making and action advantages, which can not only occupy the moral and legal high ground and create a favorable situation of justice and legality, but also realize small wars through hybrid warfare and comprehensive game means. Even the purpose of winning without fighting. Especially in the context of great power competition, the cost of war is high. All parties hope to intensify the competition for cognitive domains and force their opponents to retreat in a “humane” and “economic” manner.

By changing the opponent’s perception, it can change its decisions and actions

The purpose of implementing cognitive attacks is to use an “invisible hand” to control the opponent’s will, making the opponent feel “I can’t” and “I dare not”, and then achieve the effect of “I don’t want to”. Foreign military practice has shown that cognitive attacks on people’s will, beliefs, thinking, and psychology can be long-term cultural implantation, information suppression in the form of “information ocean + covering one’s mouth to silence”, or preemptive speech. Active shaping of political power can also use historical grievances to provoke the outbreak of conflicts. At present, information technology, artificial intelligence technology, and media technology have strengthened their direct effects on the cognitive domain. Using intelligent generation software, a large amount of cognitive “munitions” can be produced to accurately act on the cognitive layer of combat targets, directly imposing “will” “to rivals” and quickly change the strategic situation. Looking forward to the informationized and intelligent battlefield, situational awareness forces and platforms are widely distributed in combat domains such as land, sea, air, and space networks. Cognitive behaviors such as planning, decision-making, and control dominate operations in various combat domains, especially the cognition of human-machine hybrids in future intelligent warfare. Advantages will dominate the battlefield. Cognitive interference, cognitive confusion, cognitive blocking and other means can be used to create a “fog” of war cognition, inducing opponents to misjudge the situation and make wrong decisions and actions.

Cognitive domain operations are full-time offense and defense, full personnel coverage, full use, full domain shaping, and full government action

Cognitive domain operations are all-round, multi-level, hyper-temporal, and cross-domain. They blur the boundaries between wartime and peacetime, front and rear, cross battlefields and national boundaries, go beyond the pure military field, and widely penetrate into politics. , economy, diplomacy and other social fields, showing the characteristics of “five completes”. Full-time offense and defense, there is no distinction between peacetime and wartime, and there is no difference between the front and the rear. It is expressed as being online all the time and in war all the time. Covering all personnel, anyone, including intelligent robots, may become the target of cognitive domain operations. It is used throughout the whole process of joint operations before and during the war. Before the joint military operation is launched, the cognitive shaping operation has begun and will accompany the military operation and will not stop with the military operation. Global shaping, cognitive shaping runs through all levels of strategy, operations, and tactics, and its scope covers all domains of land, sea, air, and space networks. Cross-domain empowerment has an impact on all-domain operations. As a whole-of-government action, cognitive shaping is naturally strategic and requires consistent and coordinated actions across departments, fields, military and localities, and levels to achieve the best communication effect.

The key is to seize control over the right to define the nature of an action or activity, the right to dominate the process, and the right to judge the outcome.

The cognitive game struggle involves multiple opposing parties and seems complicated. The key is to compete for the “three powers” in the cognitive domain. First, fight for the right to define the nature of the event. That is, how to view this incident, whether it is just or unjust, legal or illegal. Usually, pre-emptive definitions, group alliances and forced definitions, information suppression and unilateral definitions, setting issues and applying definitions are usually adopted to guide and shape the public to form qualitative perceptions. Second, compete for dominance over the event process. That is, how to do something, how not to do it, who did it right and who did it wrong, usually by setting up a trap and other methods, trying to dominate the development direction of the target event according to the state that one’s own side expects. Fast and slow, pause, continue and end. Third, compete for the right to judge the outcome of the incident. That is, how to evaluate this matter, who is the gainer and who is the loser, who is the immediate loser, who is the long-term loser, etc. All parties strive to control the outcome of the incident by amplifying their own advantages and amplifying the disadvantages of the enemy. The purpose is to use the extended effect of the incident to continue to harm the enemy and benefit themselves.

Morality and legal principles are the focus of contention between all parties

Military operations have always paid attention to the principle of “discipline and reputation”. Although the shape of war is evolving at an accelerated pace, the essential nature of war as subordinate to politics will not change; the nature of war and the support of people’s hearts are still the key factors that affect the outcome of a war. On the battlefield in the cognitive domain, by occupying the commanding heights of politics, morality, and law, we can win the hearts and minds of the people and moral support, create a public opinion atmosphere in which moral support is abundant, and then seize the opportunity to defeat the enemy. In every war or conflict, whether it is the strong or the weak, whether the attacker, the defender, or a third party, all parties will try their best to seize cognitive dominance and the initiative of public opinion. They will do everything possible to package themselves with morality, focus on declaring a just position, and try to find ways to defend themselves. Qualify the war, justify the action, eliminate resistance, increase support, and create a favorable situation in which “righteousness” defeats “unrighteousness”. The strength balance between the two sides in the war is different, and the cognitive confrontation methods aimed at occupying the moral and legal high ground will also be different. Recent wars have shown that when a party has strong soft and hard power, that is, it has strong military strength, many allies and partners, and a large share of international voice, it often declares war in a high-profile manner; when military actions may trigger chain reactions, it is often handled in a vague manner. The word “war”.

Information is the basic “ammunition” for cognitive attack and defense

In the network information age, the way humans communicate continues to undergo complex and profound changes. On-site interactive interactions have gradually given way to online connections. Some large-scale social platforms have become the main battleground for cognitive games and the main channels for influencing public cognition. Using information as ammunition to fight for the right to block international networks and control discourse has become a common practice today. One of the main actions of confrontation. On these platforms, various short videos have become the “first scene” for the public to understand the war situation, and information travels faster than cannonballs. The use and blocking, dominance and regulation of platforms have become the focus of battles in the cognitive domain. All parties strive to spread and amplify their own propaganda, denounce and suppress the other party’s propaganda by manipulating social platforms, forming a “I say more, you say less” “What I said is right and what you said is wrong” is a situation where “I can only say it and you are not allowed to say it”. As users of large-scale social platforms, the public is influenced by and affects others in the process of “listening”, “speaking” and even “doing”, and unknowingly becomes the agents and attack props of those behind the scenes.

Military operations play a key supporting role in shaping cognition

The history of human war shows that military warfare is always the basic support of political contests, while psychological warfare is the effectiveness multiplier of military warfare. What cannot be retrieved on the battlefield cannot be expected to be retrieved at the negotiation table, let alone in the field of public opinion. In modern warfare, cognitive communication operations always go hand in hand with joint military operations. Mental warfare and military warfare influence and support each other. The trend of military warfare becoming mental warfare and mental warfare becoming military warfare is more obvious. From the perspective of war practice, it is absolutely impossible without military strength, but military actions alone are not omnipotent. Multiple victories on the battlefield are not a sufficient condition for victory in war. In the Vietnam War, although the United States “won every battle, it lost the entire war.” At the beginning of the 21st century, the United States fought successive wars in Iraq and Afghanistan, winning battlefield victories but not political victory. By the same token, military victory does not mean winning public opinion, and winning the battlefield does not mean winning strategic victory. In modern warfare, two types of people play an increasingly important role: those who win by writing thousands of lines of code, and those who win by writing thousands of messages. The side with superior quantity and quality of these two types of personnel will often have a higher probability of winning.

Cognitive countermeasures technology is increasingly used directly in warfare

In past wars, the influence and effect on the cognitive domain were mainly transmitted to the cognitive domain level by level through a large number of damaging actions in the physical domain. With the development and breakthroughs of information communications, artificial intelligence, biocrossing, brain science and other technologies, new cognitive warfare tools and technologies are directly targeting military personnel. Cognitive countermeasures use not only traditional information warfare weapons, but also an arsenal of neural weapons that target the brain. By then, machines will be able to read human brains, and human brains will also be able to directly control machines. Intelligent command and control systems can directly provide battlefield situation and decision-making assistance. Realistic cognitive ammunition and precise audience placement will greatly enhance the social impact. Cognitive countermeasures technology is increasingly being used directly in warfare. The indirect cognition implicit in informatization is gradually transforming into a direct influence and control of people’s cognition. It can be said that with the support of advanced technology, cognitive domain operations can achieve political goals more directly and efficiently by building a modern network architecture and developing a data visualization platform to quickly understand the information environment and effectively influence target groups.

(Author’s unit: Institute of War Studies, Academy of Military Sciences)

原來的 中国军网 国防部网: http://www.81.cn/jfjbmap/content/2022-08/888沒有湯給你.htm

中國軍隊對耗散戰的戰術運用:智慧戰爭中的有效方法論

Chinese Military’s Tactical Use of Dissipative Warfare: Effective Methodology within Intelligent Warfare

隨著智慧化技術快速發展及在軍事上的廣泛應用,智慧化戰爭正成為資訊化戰爭後的新戰爭形態,而耗散戰則成為智慧化戰爭的典型方式。 所謂耗散戰,是指智慧化戰爭體系透過對內富聚融合,對外突變湧現,達成集物質消耗、能量釋散和資訊擴散於一體的綜合戰力的作戰方式。 加強耗散戰研究,有利於我們深入揭示智慧化戰爭制勝機理,贏得未來戰爭賽局主動權。

耗散戰是時代發展的必然結果

耗散戰表現在智慧化時代中物理域、資訊域和認知域的綜合對抗,體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式的高度統一,反映了智慧化戰爭體系 所具有的開放性、複雜性和湧現性。

適應智慧化時代的安全情勢要求。 進入智慧化時代,寬網路、大數據、大模型、雲端運算、深度學習等技術快速發展,各政治集團、國家、民族之間的聯繫更加廣泛。 在政治多元、經濟交融、社會開放、科技革命等多重因素作用下,非傳統安全興起並與傳統威脅交織,智慧化戰爭主體與範疇不斷拓展,戰爭時間與空間不斷外延,戰爭與和平如影相 隨並交織一體,戰爭體系將進一步超越局部地域限制,從相對封閉走向更開放,形成更高層次和更大範圍的對抗。 耗散戰強調智慧化戰爭體系在物理域、資訊域和認知域的綜合發力,把政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等形式高度統一併納入敵我對抗範疇,適應了 世界安全情勢發展的時代要求。

符合戰爭形態演變的客觀法則。 戰爭體系的耗散現象自戰爭產生以來便始終存在,只不過在智能化戰爭形態出現之前,由於技術的製約,一直處於較為低級的、簡單的狀態,戰爭對抗僅能表現為物質消耗、能量釋 散和訊息擴散中的某一種形式。 農業時代,戰爭形態主要表現為以物質要素為主導的、以人體為中心的冷兵器戰爭。 工業化時代,戰爭形態主要表現為以能量要素為主導的、以平台為中心的熱核兵器和機械化戰爭。 在資訊化時代,戰爭形態主要表現為以資訊要素為主導的、以網信體系為中心的資訊化戰爭。 進入智慧化時代,智慧化科技將敵我對抗中的認知優勢、決策優勢和行動優勢高度統一起來,實質是將物質、能量和資訊三者高度統一,透過以智賦能、以智聚能、 以智釋能,形成了以智慧要素為主導的、以智慧演算法為中心的智慧化戰爭形態,主要表現形式即為反映智慧化戰爭複雜體系對抗的耗散戰。

具有堅實的哲學理論基礎支撐。 社會形態是戰爭形態的母體,探索和認識智能化戰爭,必須基於歷史唯物主義和辯證唯物主義的基本原理,綜合考察戰爭形態的演進和智能化戰爭所處的社會形態,構建新的戰爭概念和 語境體系。 從哲學角度看,物質、能量和資訊是構成世界的三大要素,物質體現本源的存在,能量體現運動的存在,訊息則體現聯繫的存在,三者遞進交替主導著社會形態和戰爭形態的 演進和運行。 依照辯證唯物論的否定之否定原理,在資訊時代之後的智慧時代,主導社會的要素將繼物質、能量、資訊後再次輪到物質,只不過這個物質是高度資訊化後螺旋式上升後形成的 新型物質,其主要特徵就是具有了智慧化技術屬性。 因此,從本質上講,耗散戰是智慧要素將以前低階戰爭形態中物質、能量和資訊的特性優勢高度統一起來,將戰爭中普遍存在的物質消耗、能量釋散和資訊擴散等形式高度 統一起來,反映了智慧化戰爭的典型特徵。

深刻把握耗散戰的內在要義

耗散戰基於現實世界、涵蓋虛擬世界,適應了智慧化技術快速發展、非傳統安全威脅興起、戰爭主體和範疇不斷拓展的趨勢,呈現出許多新特性。

對抗綜合博弈。 隨著智慧化戰爭形態加速向更高深度和廣度發展,政治、經濟、文化、外交等領域相互聯繫和影響更具廣泛性,戰爭重心開始從軍事系統向社會系統偏移,戰爭利益攸關方 的對抗將體現為政治較量、經濟比拼、軍事攻防、文化衝突和外交制衡等多種形式的綜合博弈,追求的戰爭優勢不再只限於軍事對抗領域。 戰爭制勝方必須適應戰爭體系的開放性、複雜性和湧現性要求,從單一物質、能量和資訊的粗放式消耗和運用轉變到以智慧優勢主導戰爭體系的耗散,力爭在多領域的綜合博弈 中贏得主動和優勢。

主體跨域多元。 智慧化戰爭的主體日益泛化,傳統戰爭需要動員的戰爭潛在力量將處於常態化對抗狀態。 政治力量、各類機構和人員與傳統意義上在戰場廝殺的部隊和軍人一起構成戰爭的主體。 多元化戰爭主體將跨越現實域和虛擬域,出現在陸、海、空、天、電、心理等多個空間域,涵蓋物理域、資訊域、認知域等,涵蓋政治、經濟、文化、 外交等多類社會域。 如社會平民可以用智慧型手機收集軍事戰場上的信息並傳遞給戰爭利益攸關方,造成對戰爭關鍵訊息的擴散,進而影響戰爭決策或一場戰役和戰鬥的勝敗。

力量一體富聚。 虛實力量一體。 圍繞著戰爭目的,一切可能運用的現實力量和虛擬力量將在智能化技術支撐下實現一體化,在平行戰場上按職履責、按規行動;有無力量一體。 無人作戰力量將在經歷人工操作、人工授權、人為監督階段後,實現高度的自主性,並可與各類有人力量按需部署、按需組合,在共同的戰爭規則約束下有效協同、並行 共生;多方力量一體。 基於各領域的廣泛聯繫和戰爭體系的共同目的,黨政軍警民等各方力量將軍事行動與政治、經濟、外交、輿論、法理鬥爭密切配合、統一行動,形成綜合戰力。 總之,在國家或政治集團的一體籌劃下,智慧化戰爭的多元參戰力量雖然物理分散,但能夠圍繞共同的戰爭目的,實現邏輯集中、即時富聚,優勢互補、一體聚優。

效能累積湧現。 高階戰爭形態在具有新質技術特徵的同時,仍涵括低階戰爭形態的特徵優勢。 耗散戰強調在多域持續進行綜合對抗,這既包括物質層面的彈藥、物資、器材甚至作戰人員的消耗,也包括能量層面的不斷匯集和釋放,更包括透過資訊層面的數據、知識、演算法 等的擴散與融合,對人的思考認知、價值追求、道德觀念、情感意志、行為模式等產生不可限制的影響。 在核武的常態嚇阻下,智慧化戰爭呈現出血腥味下降,但政治孤立、經濟封鎖、文化衝突、外交扼殺等將更加嚴峻激烈的局面。 當軍事、政治、經濟、文化、外交等各系統角色持續發揮,效能累積達到某一程度,戰爭體係就會增加負熵,進而實現戰力突變和體系效能湧現,從而獲得戰爭優勢。

在選準作戰重心中打好耗散戰

智慧化戰爭體系透過對內富聚融合,對外突變湧現,跨域增效、以智耗散,達成體係作戰效能最大化,這是耗散戰蘊含的製勝機理。 要在智慧化戰爭中贏得勝勢,必須明確耗散戰的作戰重心,針對對手體系短板弱點,找準戰爭準備的發力點。

著眼體系開放性,封閉孤立對手戰爭體系。 截斷對手戰爭體系與外在戰場環境的物質、能量和資訊交流,使之缺乏物質、能量和資訊來源管道,逐漸走向孤立、封閉和虛弱狀態。 如在戰略層面,採取政治孤立的方式,使對手戰爭體系處於孤立狀態,造成體系熵增。 在戰役層面,可利用切斷資料來源、毀滅資料備份、資料作假、竄改資訊等方法,綜合採用軟硬手段,迫其戰爭體係向封閉狀態轉化,進而降低對方體系效能。

著眼體系複雜性,分域破擊對手戰爭體系。 智慧化戰爭體係要素間連結越多、連結程度越緊密,體系結構可靠性就越低。 運用複雜系統中各分層相對獨立的原理,可製訂戰略全局、戰役局部和戰術行動策略,實現對敵戰爭體系的分層分域破擊。 如在戰略層面,採用經濟封鎖的方式,大大削弱對手的戰爭實力和發展潛力。 在戰役層面,利用作戰系統通訊網路的脆弱性,以網電複合攻擊為基本路徑與手段,採用「毀端、擊元、孤群、斷網、破雲」等方式,破擊對方作戰系統結構 ,促使對方戰爭體系「坍塌」。

著眼體系湧現性,拆解疏散對手戰爭體系。 智慧化戰爭體系只有出現突變和湧現效應,才能快速形成發揮體系效能,獲得耗散戰優勢。 如果只是單一組分或要素發揮作用,不可能形成優勢湧現。 可以預見,當前興起的ChatGPT等技術以及未來更高級的智慧化技術,將提供理解和發現戰爭複雜體系運作行為、狀態和規律的全新思維方式,以及探知客觀規律、改造自然和社會的新手段, 戰爭對抗優勢方將透過虛實結合、平行一體的對抗方式,降低對手戰爭體系的耦合度,達成拆解疏散敵戰爭體系的目的。

Modern English:

Introduction

With the rapid development of intelligent technology and its widespread application in military affairs, intelligent warfare is becoming a new form of warfare after information warfare, and dissipative warfare has become a typical method of intelligent warfare. The so-called dissipative warfare refers to a combat method in which the intelligent warfare system achieves comprehensive combat power integrating material consumption, energy release and information diffusion through internal integration and integration and external mutation. Strengthening research on dissipative warfare will help us deeply reveal the winning mechanism of intelligent warfare and win the initiative in future war games.

Dissipative war is the inevitable result of the development of the times

Dissipative warfare is manifested in the comprehensive confrontation of the physical domain, information domain and cognitive domain in the intelligent era. It is reflected in the high degree of unity in the form of political contest, economic competition, military offense and defense, cultural conflict and diplomatic checks and balances, reflecting the intelligent war system. openness, complexity and emergence.

Adapt to the security situation requirements of the intelligent era. Entering the era of intelligence, technologies such as wide networks, big data, big models, cloud computing, and deep learning are developing rapidly, and the connections between political groups, countries, and ethnic groups have become more extensive. Under the influence of multiple factors such as political pluralism, economic integration, social openness, and technological revolution, non-traditional security has emerged and is intertwined with traditional threats. The subjects and categories of intelligent warfare have continued to expand. The time and space of war have continued to expand. War and peace are like shadows. As they become more integrated, the war system will further transcend local geographical restrictions, move from a relatively closed world to a more open one, and form a higher-level and wider-scale confrontation. Dissipative warfare emphasizes the comprehensive development of intelligent warfare systems in the physical, information and cognitive domains. It highly unifies political contests, economic competitions, military offense and defense, cultural conflicts and diplomatic checks and balances into the scope of confrontation between ourselves and the enemy, adapting to the The requirements of the times as the world security situation develops.

It is in line with the objective laws of the evolution of war forms. The dissipation phenomenon of the war system has always existed since the birth of war. However, before the emergence of intelligent warfare, due to technological constraints, it has always been in a relatively low-level and simple state. War confrontation can only be manifested in material consumption and energy release. A form of dispersion and information diffusion. In the agricultural era, the main form of war was cold weapon warfare dominated by material elements and centered on the human body. In the era of industrialization, the main forms of warfare are thermonuclear weapons and mechanized warfare dominated by energy elements and centered on platforms. In the information age, the form of war is mainly information-based war dominated by information elements and centered on the network information system. Entering the era of intelligence, intelligent technology highly unifies the cognitive advantages, decision-making advantages and action advantages in the confrontation between ourselves and the enemy. In essence, it highly unifies matter, energy and information. Through intelligent empowerment, intelligent energy gathering, Interpreting energy through intelligence has formed an intelligent war form dominated by intelligent elements and centered on intelligent algorithms. The main form of expression is dissipative warfare that reflects the confrontation of the complex systems of intelligent warfare.

It is supported by a solid philosophical theoretical foundation. Social form is the matrix of war forms. To explore and understand intelligent warfare, we must be based on the basic principles of historical materialism and dialectical materialism, comprehensively examine the evolution of war forms and the social form in which intelligent warfare occurs, and construct a new war concept and context system. From a philosophical perspective, matter, energy and information are the three major elements that make up the world. Material embodies the existence of the source, energy embodies the existence of movement, and information embodies the existence of connections. The three progressively and alternately dominate the formation of social forms and war forms. Evolve and run. According to the principle of negation of dialectical materialism, in the intelligent age after the information age, the dominant element of society will be material again after matter, energy, and information. However, this material is formed after a spiral of high informatization. The main characteristic of new materials is that they have intelligent technical properties. Therefore, in essence, dissipative warfare is the intelligent element that highly unifies the characteristic advantages of matter, energy and information in previous low-level warfare forms, and highly integrates the common forms of material consumption, energy release and information diffusion in war. Unified, it reflects the typical characteristics of intelligent warfare.

Deeply grasp the inner essence of dissipative warfare

Dissipative warfare is based on the real world and covers the virtual world. It adapts to the rapid development of intelligent technology, the rise of non-traditional security threats, and the continuous expansion of war subjects and categories, and presents many new characteristics.

Against comprehensive games. As the form of intelligent warfare accelerates to develop to a higher depth and breadth, the political, economic, cultural, diplomatic and other fields are more interconnected and have more extensive influence. The focus of war begins to shift from the military system to the social system, and the war stakeholders The confrontation will be reflected in various forms of comprehensive games such as political competition, economic competition, military offense and defense, cultural conflicts, and diplomatic checks and balances. The pursuit of war advantages is no longer limited to the field of military confrontation. The winner of the war must adapt to the openness, complexity and emergence requirements of the war system, transform from the extensive consumption and use of single materials, energy and information to the dissipation of the war system dominated by intelligent advantages, and strive to compete in comprehensive games in multiple fields Gain the initiative and advantage.

Subjects are diverse across domains. The subjects of intelligent warfare are becoming increasingly generalized, and the potential war forces that need to be mobilized for traditional warfare will be in a state of normalized confrontation. Political forces, various institutions and personnel, together with the troops and soldiers fighting on the battlefield in the traditional sense, constitute the main body of the war. Diversified war subjects will span the real domain and the virtual domain, appearing in land, sea, air, space, electricity, psychology and other spatial domains, covering the physical domain, information domain, cognitive domain, etc., covering politics, economy, culture, Diplomacy and other social fields. For example, civilians can use smartphones to collect information on military battlefields and pass it on to war stakeholders, causing the spread of key war information, which in turn affects war decisions or the victory or defeat of a campaign or battle.

Strength is gathered into one body. Virtual and real power are integrated. Focusing on the purpose of war, all possible real and virtual forces that may be used will be integrated with the support of intelligent technology, and they will perform their duties and act according to regulations on parallel battlefields; they will be integrated with and without forces. Unmanned combat forces will achieve a high degree of autonomy after going through the stages of manual operation, manual authorization, and human supervision. They can be deployed and combined with various manned forces on demand, and can effectively coordinate and operate in parallel under the constraints of common war rules. Symbiosis; multiple forces integrated into one. Based on the extensive connections in various fields and the common purpose of the war system, the party, government, military, police and civilians and other forces closely coordinate and act in a unified manner with political, economic, diplomatic, public opinion, and legal struggles to form a comprehensive combat capability. In short, under the unified planning of the country or political group, although the diverse participating forces in intelligent warfare are physically dispersed, they can achieve logical concentration, instant enrichment, complementary advantages, and integration of excellence around the common war purpose.

Effectiveness emerges cumulatively. While high-level warfare forms have new technological features, they still include the characteristic advantages of lower-level warfare forms. Dissipative warfare emphasizes continuous comprehensive confrontation in multiple domains. This includes not only the consumption of ammunition, materials, equipment and even combat personnel at the material level, but also the continuous collection and release of energy at the energy level. It also includes the use of data, knowledge, and algorithms at the information level. The diffusion and integration of information, etc. will have an unlimited impact on people’s thinking and cognition, value pursuit, moral concepts, emotions, will, behavior patterns, etc. Under the constant deterrence of nuclear weapons, intelligent warfare will become less bloody, but political isolation, economic blockade, cultural conflict, diplomatic stranglehold, etc. will become more serious and intense. When the military, political, economic, cultural, diplomatic and other systems continue to play their roles and the cumulative effectiveness reaches a certain level, the war system will increase negative entropy, thereby achieving a sudden change in combat power and the emergence of system effectiveness, thereby gaining a war advantage.

Choose the right focus to fight the dissipation war well

The intelligent warfare system maximizes the combat effectiveness of the system through internal aggregation and integration, external mutation emergence, cross-domain efficiency enhancement, and intelligent dissipation. This is the winning mechanism contained in dissipative warfare. To win in intelligent warfare, it is necessary to clarify the focus of dissipative warfare, target the shortcomings and weaknesses of the opponent’s system, and identify the focus of war preparations.

Focus on the openness of the system and close and isolate the opponent’s war system. Cut off the material, energy and information exchange between the opponent’s war system and the external battlefield environment, causing it to lack material, energy and information source channels, and gradually move towards a state of isolation, closure and weakness. For example, at the strategic level, political isolation is adopted to isolate the opponent’s war system, causing an increase in system entropy. At the operational level, methods such as cutting off data sources, destroying data backups, falsifying data, and tampering with information can be used to force the opponent’s war system to transform into a closed state, thereby reducing the effectiveness of the opponent’s system.

Focus on the complexity of the system and attack the opponent’s war system by domain. The more connections and the closer the connections between the elements of an intelligent warfare system, the lower the reliability of the system structure. Using the principle that each layer in a complex system is relatively independent, we can formulate overall strategic, local campaign and tactical action strategies to achieve layered and domain-based attacks on the enemy’s war system. For example, at the strategic level, the use of economic blockade can greatly weaken the opponent’s war strength and development potential. At the operational level, the vulnerability of the communication network of the combat system is exploited, and network and electricity composite attacks are used as the basic path and means, and methods such as “destroying terminals, attacking elements, lone groups, disconnecting networks, and breaking clouds” are used to destroy the opponent’s combat system structure. , prompting the opponent’s war system to “collapse”.

Focus on the emergent nature of the system and dismantle and disperse the opponent’s combat system. Only when mutation and emergence effects occur in an intelligent warfare system can it quickly form and exert its effectiveness and gain advantages in dissipative warfare. If only a single component or element plays a role, it is impossible to form an advantage. It is foreseeable that the currently emerging technologies such as ChatGPT and more advanced intelligent technologies in the future will provide a new way of thinking for understanding and discovering the operating behaviors, states and laws of complex systems of war, as well as new means of exploring objective laws and transforming nature and society. The dominant side in war confrontation will reduce the coupling degree of the opponent’s war system through a combination of virtual and real, parallel and integrated confrontation methods, and achieve the purpose of dismantling and dispersing the enemy’s war system.

中國國防部原網站:http://www.mod.gov.cn/gfbw/jmsd/888沒有湯給你html

打贏資訊化智慧化戰爭解放軍必須找到科技融合點推進戰術創新

To Win The Information-based Intelligent War China’s People’s Liberation Army Must Find Science and Technology Integration Point To Evolve Innovation of Tactics

戰法,即作戰方法,指作戰中運用的策略和技術。 戰法創新,既要深謀“策”,也要鑽研“技”。 有“策”無“技”,心有餘而力不足;有“技”無“策”,雖用力而不得法。 既要有策略指導,又具備技術支撐,方能百戰百勝。 打贏資訊化智能化戰爭,開展以謀為先、以智取勝的戰法創新,必須「策」「技」並施,有效解決理論創新與技術應用脫節、作戰行動與技術路徑脫軌等問題。

思維認知「融」。 現代科技快速發展,正推動未來作戰向高端戰爭演進。 既要搶佔理論制高點,又要塑造技術新優勢,理技深度融合創新戰法,是製勝戰場的要訣。 軍人作為戰法創新的主體,必須深刻認知現代戰爭制勝機理,根植理技融合理念,拓展理技融合思維。 目前,兩個突出問題和傾向值得注意:一是科技素養不夠,容易導致對新的戰爭形態認識不深不透,僅憑以往經驗套路研究戰法,對作戰體系中哪些技術起作用、什麼技術 真管用、對敵形成技術優勢從何入手、與強敵存在哪些技術差、如何避免被敵技術壓制等知之不深,重戰法輕技術、重“智謀”輕“智能”,創新的戰法 看似管用,其實缺乏技術支撐,風險度大。 二是把握不准作戰需求,未來戰場景象描繪不夠清晰,雖然技術原理、制勝機理明白了,但對科技在作戰行動中的運用知之不夠,忽略了人的主觀能動性對作戰效能發揮起到的決定性 作用,重技術輕戰法,就技術研技術,或只鑽研技術性能而不考慮戰法運用,或只知技術功效卻不嘗試戰法創新。 凡此,應把指戰員學科技、懂科技、用科技與科技人員學軍事、懂打仗、研戰法統籌起來協調推進,建立戰技專家融合創新機制,對接研究制勝機理,協同嵌入理技融合理念 ,交互幫帶提升戰法創新素質,形成以作戰行動牽引科技運用、以科技運用支撐作戰行動的思想認識,厚實理技融合開展戰法創新的根基。

作戰設計「融」。 世界上從來沒有完全相同的兩場戰爭,戰法創新可以繼承借鑒,不能複製翻版。 目前,軍事理論創新步伐加快、先進科技發展日新月異,戰爭形態深刻變革,呈現出混合多元、變幻莫測的顯著特徵,顛覆性技術、創新性概念、重塑性理論層出不窮。 理技融合設計未來作戰,才能找準提升戰法創新的起點。 要以敢領世界先的勇氣突破思維定勢,用超前眼光、獨特視角創新作戰理論,開發並落地作戰概念,構想作戰場景,創新戰法打法,先把未來戰場的「底圖」勾勒 好,以此對接現代科技應用、牽引先進技術研發。 同時,設計未來作戰不能超越科技極限過於遙遠地“空想”,應立足於一定時期內的科技可行性,在具有現實或可預期科技運用支撐、擁有技術實現路徑的前提下創新戰法,將技術 阻斷、技術突襲、技術壓制、技術調控嵌入作戰行動。

技高一籌「融」。 在現代戰爭中,人是決定性因素的地位沒有變,而科技對戰爭勝負的影響更加凸顯,爭奪科技勝勢在很大程度上決定戰爭勝負,必須始終把科技運用嵌入作戰鏈條、貫穿作戰全程 ,以技術效應支撐戰法運用,以技術優勢驅動作戰效能發揮。 當前,戰法創新中的理技融合,主要矛盾並非技術中少理論,而是理論中缺乏技術,最迫切的是著力推進前沿科技向作戰理論融合滲透。 要加強以武器裝備平台為依託的實質融合,著眼於最大限度地啟動作戰效能,廣泛進行基於行動效能釋放的裝備作戰運用研究、裝備作戰試驗鑑定,透過模擬推演、數據分析來偵測作戰行動的有效性 ,以「數算」驗證「勝算」。 要加強基於作戰任務選擇「最優解」技術手段的深度性融合,從研究作戰對手、確定行動方法,到擬製作戰預案、組織對抗演訓,都要充分考慮敵我技術力量對比,貫徹非對稱 作戰思想,把以優制劣、避強擊弱作為基本原則,謀求技術壓制並防敵壓制,謀求技術阻斷並防敵阻斷,謀求技術顛覆並防敵顛覆,最大限度發揮技術優勢,竭 全力限制敵方技術發揮,以此塑造有利態勢、支撐戰法運用。

集智聚力「融」。 資訊化智能化時代,不論是理論研究,或科技創新,都呈現出開放連結、交叉滲透的顯著特徵。 理技融合進行戰法創新,開放共享是重要的成長點。 推進人機一體式戰法創新,人出智謀、機器來算,以算的結果反推修訂戰法成果,在人機交互中實現理技融合;推進指技人才團隊式戰法創新,組建“ 科學家+指揮官」「戰鬥員+技術員」混合群體,實行聯調聯試、聯演聯訓、聯算聯謀,以戰法的科學性、技術的先進性謀求聯戰聯勝;推進開源眾 籌式戰法創新,軍內軍外結合,線上線下互動,以更開闊的視野、更靈活的形式,集中廣大官兵和各類專業化人才的聰明智慧,開展戰法創新領域的「創客 ”活動,發展匯聚新戰法“資源池”“成果庫”,以實現理技融合的最大效益。

實踐迭代“融”。 理論成果在實務運用中得到檢驗和昇華,科技手段在作戰行動中顯現功能與效益。 戰法創新非一日之功,理技融合也應迭代進步、滾動發展。 要注重整合應用資訊科技與智慧技術,虛擬構設未來作戰景象,在感觸與體驗智慧化作戰環境中創新戰法;要深入開展戰法創新成果虛擬模擬論證,透過虛擬實驗、模擬檢驗,充分驗證 戰法設計的可行性、作戰行動的有效性;要結合演訓活動進行技術性能檢測,透過武器裝備與資訊系統的聚能與釋能實際狀況分析,充分檢驗技術應用的功效與缺陷所在。 從而,在複盤研討、反覆論證、資料檢驗中動態發現與解決問題,理論不適用的修改理論,技術行不通的升級技術,讓戰法引進新領域技術,讓技術顛覆傳統式戰法,實現 技戰一體有機結合,持續推動戰法創新螺旋上升滾動發展。

Modern English:

Find the integration point of theory and technology for innovative tactics

Tactic, that is, combat methods, refers to the strategies and techniques used in combat. To innovate tactics, we must not only think deeply about “strategies”, but also study “techniques”. If there is “strategy” but no “skill”, the mind will be more than sufficient but the strength is insufficient; if there is “skill” but no “strategy”, no matter how hard you try, you will not be able to achieve the goal. It requires both strategic guidance and technical support to be victorious in every battle. To win information-based and intelligent wars and carry out strategic innovation that puts strategy first and wins by outsmarting, we must implement both “policy” and “technique” to effectively solve problems such as the disconnect between theoretical innovation and technological application, and the derailment of combat operations and technological paths.

“Integration” of thinking and cognition. The rapid development of modern science and technology is promoting the evolution of future combat to high-end warfare. It is necessary to seize the theoretical commanding heights and create new technological advantages. In-depth integration of science and technology and innovative tactics are the keys to victory on the battlefield. As the main body of innovation in tactics, military personnel must have a deep understanding of the winning mechanism of modern warfare, root the concept of integrating science and technology, and expand the thinking of integrating science and technology. At present, two outstanding problems and tendencies are worth noting: First, insufficient scientific and technological literacy, which can easily lead to an in-depth understanding of new forms of warfare. Only relying on past experience and routines to study tactics, and which technologies are effective and which technologies in the combat system. I don’t know much about how effective it is, where to start to form a technological advantage over the enemy, what are the technical differences with powerful enemies, how to avoid being suppressed by the enemy’s technology, etc. We emphasize tactics over technology, emphasis on “wisdom” over “intelligence”, and innovative tactics. It seems to work, but in fact it lacks technical support and is highly risky. The second is that the combat needs are not accurately grasped, and the future battlefield scene is not clearly described. Although the technical principles and winning mechanisms are understood, the application of science and technology in combat operations is not known enough, and the decisive role of human subjective initiative in combat effectiveness is ignored. Function, focusing on technology over tactics, researching technology based on technology, or only studying technical performance without considering the application of tactics, or only knowing the efficacy of technology without trying to innovate tactics. In this regard, officers and soldiers should learn, understand, and use science and technology and science and technology personnel should learn military affairs, understand warfare, and study warfare methods in a coordinated and coordinated manner, establish an integration and innovation mechanism for combat technology experts, conduct joint research on winning mechanisms, and collaboratively embed the concept of science and technology integration , interactively help and improve the quality of tactical innovation, form an ideological understanding that combat operations drive the application of science and technology, and use science and technology application to support combat operations, and lay a solid foundation for integrating theory and technology to carry out tactical innovation.

Combat design “integration”. There are never two identical wars in the world. Innovation in tactics can be inherited and learned from, but cannot be copied. At present, the pace of military theoretical innovation is accelerating, advanced science and technology are developing at a rapid pace, and the form of warfare is undergoing profound changes, showing the distinctive characteristics of being mixed, diverse, and unpredictable. Subversive technologies, innovative concepts, and reshaping theories are emerging one after another. Only by integrating science and technology to design future operations can we find and improve the starting point for tactical innovation. We must have the courage to lead the world and break through the stereotypes, use forward-looking and unique perspectives to innovate combat theories, develop and implement combat concepts, conceive combat scenarios, innovate tactics, and first outline the “base map” of the future battlefield. Well, in this way, we can connect the application of modern science and technology and promote the research and development of advanced technology. At the same time, the design of future operations cannot be too far-fetched and “utopian” beyond the limits of science and technology. It should be based on the feasibility of science and technology within a certain period of time, and on the premise of having the support of realistic or foreseeable technology application and having a path for technological implementation, innovate tactics and integrate technology. Interdiction, technological surprise, technological suppression, and technological control are embedded in combat operations.

“Integration” with superior skills. In modern wars, the status of people as the decisive factor has not changed, but the impact of technology on the outcome of wars has become more prominent. The fight for technological victory determines the outcome of wars to a large extent. The use of science and technology must always be embedded in the combat chain and throughout the entire combat process. , use technical effects to support the application of tactics, and use technical advantages to drive combat effectiveness. At present, the main contradiction in the integration of theory and technology in the innovation of tactics is not the lack of theory in technology, but the lack of technology in theory. The most urgent thing is to promote the integration of cutting-edge technology into combat theory. It is necessary to strengthen the substantive integration based on weapons and equipment platforms, focus on activating combat effectiveness to the maximum extent, carry out extensive research on the combat application of equipment based on operational effectiveness release, equipment combat testing and identification, and test the effectiveness of combat operations through simulation deductions and data analysis. , verify the “probability of winning” with “number calculations”. It is necessary to strengthen the in-depth integration of technical means to select “optimal solutions” based on combat tasks. From studying combat opponents and determining action methods to formulating combat plans and organizing confrontation exercises, we must fully consider the technical strength comparison between the enemy and ourselves, and implement asymmetric The operational philosophy takes the superiority of the inferior and the avoidance of the strong to attack the weak as the basic principle, seeks technological suppression and prevents the enemy from suppressing it, seeks technological blockage and prevents the enemy from blocking it, seeks technological subversion and prevents the enemy from subverting it, maximizes the use of technological advantages, and does everything possible. Make every effort to limit the enemy’s technological performance in order to create a favorable situation and support the use of tactics.

Gather wisdom and strength to “integrate”. In the era of informationization and intelligence, both theoretical research and scientific and technological innovation show the remarkable characteristics of open linkage and cross-penetration. The integration of science and technology carries out strategic innovation, and open sharing is an important growth point. Promote the innovation of man-machine integrated tactics, where people use their ingenuity and machines do calculations, and use the calculation results to revise the results of tactics, and realize the integration of science and technology in human-computer interaction; promote the innovation of team-based tactics for finger-technical talents, and form a ” A mixed group of “scientists + commanders” and “combatants + technicians” implements joint debugging and testing, joint exercises and training, and joint calculations and calculations, and seeks joint victory with the scientific nature of tactics and advanced technology; promotes open source and mass Tactics innovation, integration within and outside the military, online and offline interaction, with a broader vision and more flexible form, pool the wisdom of officers and soldiers and various professional talents to carry out “makers” in the field of tactics innovation “Activities, develop and gather new tactics “resource pools” and “results libraries” to achieve maximum benefits from the integration of science and technology.

Practice iterative “integration”. Theoretical achievements have been tested and sublimated in practical applications, and scientific and technological means have demonstrated their functions and benefits in combat operations. Innovation in tactics is not something that can be accomplished in a day, and the integration of science and technology should also be iteratively progressed and developed on a rolling basis. It is necessary to focus on the integrated application of information technology and intelligent technology, to virtually construct future combat scenarios, and to innovate tactics while feeling and experiencing the intelligent combat environment; it is necessary to carry out in-depth virtual simulation demonstrations of the innovative results of tactics, and fully verify them through virtual experiments and simulation tests. The feasibility of tactical design and the effectiveness of combat operations; technical performance testing must be carried out in conjunction with drills and training activities, and the efficacy and flaws of technical applications must be fully tested by analyzing the actual energy collection and release of weapons, equipment and information systems. Therefore, problems can be discovered and solved dynamically during review discussions, repeated demonstrations, and data testing, and we can modify theories where the theory is not applicable and upgrade technologies where technology is not feasible, so that tactics can introduce new field technologies, and technology can subvert traditional tactics and achieve success. The organic combination of technology and combat continues to promote the spiral and rolling development of tactical innovation.

中國國防部原文來源: http://www.mod.gov.cn/gfbw/jmsd/888沒有湯適合你.html

中國軍方看外軍網絡戰發展新動向

Chinese Military Perspective on the New Development Trends in Foreign Military Network Warfare

After decades of development, cyberspace has become an important field of production and life in human society, and has become the fifth-dimensional battlefield after “land, sea, air, and sky.” In recent years, the United States and other developed countries have rushed to introduce cyberspace strategies, build (expand) cyber warfare forces, and implement cyber offensive and defensive operations. The moves in the construction, development, and application of cyber warfare deserve the attention of the world.

Pay attention to cyberspace security, and accelerate the establishment of supporting strategies and regulations

Since cyberspace security is a security issue in an emerging field, most countries lack supporting strategies and systems of laws and regulations. In recent years, major countries in the world have positioned it as a major security field, and the pace of promulgating network security strategies and regulations has been significantly accelerated. For example, since the first national network security strategy was proposed in 2000, the United States has continuously formulated, expanded, and updated various policies, strategies, regulations, and regulations in the field of network security. The network strategy alone includes the “National Network Strategy”, “International Cyberspace Strategy”, ” The Cyber ​​Strategy of the Ministry of National Defense and the cyber strategy of the military services, etc., are used to standardize and guide the development and application of cyber warfare. In October 2014, the U.S. military also issued the world’s first joint doctrine “Cyberspace Operations”, which elaborated and standardized the concepts, actions, and tasks of cyberspace operations. In response to cyber attacks by the United States and NATO, Russia announced the “Russian Federation Cyber ​​Security Strategic Concept” in 2014, and promulgated a new version of the “Information Security Doctrine” in 2016, proposing to ensure network information security. In order to strengthen the overall guidance of network security affairs, India issued the “National Cyber ​​Security Policy” in 2013 and plans to issue a “National Cyber ​​Security Strategy”; the Indian military has formulated policies such as the “Army Cyber ​​Security Policy” and “Navy Information Security Policy” regulations.

Strengthen the professional construction of cyber warfare forces, and pay attention to the use of non-governmental network forces

In recent years, the establishment, integration, and expansion of specialized cyber warfare forces have become a trend among foreign militaries. The United States was the first country to propose the concept of cyber warfare, and it was also the first country to form a professional cyber warfare force. The U.S. military established the Cyber ​​Command in 2010, and upgraded it to a first-level joint operations command in 2018. The number of cyber task forces under its jurisdiction has reached 133, with about 6,200 personnel. Russia established a professional information warfare unit in 2013, and cyber warfare is an important function of it. The Japanese Self-Defense Force established the Cyber ​​Defense Team in 2014, initially with more than 100 members, and has now increased to nearly 300, and plans to expand to a thousand in the future. The United Kingdom also announced in 2020 that it will soon create a national cyber force. On this basis, foreign militaries have generally carried out systematic design and layout of cyber warfare forces. In the field of cyber warfare, forces such as network attack, network defense, and network operation and maintenance are inseparable; externally, network warfare forces are integrated and integrated with information warfare forces such as signal reconnaissance and electronic warfare. For example, the commander of the U.S. Cyber ​​Command also serves as the director of the National Security Agency, and the network attack and defense are integrated with signal intelligence and reconnaissance. The Japanese Self-Defense Force has set up a special first-level command to oversee space, network, and electronic warfare affairs.

It is worth noting that foreign military forces constitute the “regular army” of cyber warfare forces, and private cybersecurity companies, technology companies, hacker organizations, etc. have also become important cyber offensive and defensive forces and have attracted much attention. The notorious “Eye of Sauron” and “Equation Group” and other hacker organizations are inextricably linked to the US military. In recent years, Iran, Russia, and Venezuela have encountered cyber attacks, all of which have the shadow of “Equation Group”. The Indian Army is also considering absorbing its rich IT talents to form a cyber warfare reserve force to further strengthen its cyber warfare capabilities.

Actively develop and build a network arsenal, and intelligent weapon systems are beginning to emerge

Cyber ​​weapons are special weapons used for network attack and defense. They can be viruses, loopholes, denial of service attacks, phishing attacks and other offensive and defensive technologies, or network attack and defense system platforms. Anatoly Smirnov, chairman of the International Information Security Association of the Russian Federation, disclosed in 2019 that many Western countries were developing cyber weapons; the United States, the United Kingdom, Germany, and Japan also made no secret of possessing cyber weapons. According to the disclosures of Snowden and WikiLeaks, U.S. intelligence agencies and the U.S. military have built a systematic offensive cyber arsenal, some of which can be called “weapons of mass destruction” in cyberspace. In 2020, Patrick Saunders, commander of the British Strategic Command, took the initiative to declare that the UK has developed a “destructive” cyber weapon, which can effectively kill the enemy’s power grid and other facilities and equipment.

In terms of network system platforms, the U.S. military has built the most complete network warfare system platform in the world, including accusation management systems such as joint network command and control and unified platform, basic systems for network warfare planning and execution such as the IKE project, and network warfare and network warfare systems such as “Shute”. A weapon system with integrated firepower. In terms of network monitoring and defense, India has developed and built system platforms such as a central monitoring system, network traffic analysis system, and network security monitoring and evaluation system.

Cyber ​​weapons have a natural “kinship” with smart technology. At present, weapon systems in the fields of network situation monitoring, network attack and defense, and password deciphering have already taken shape in intelligentized countries in cyberspace dominant countries. With the development of artificial intelligence technology, the trend of intelligent network weapons will become more and more obvious.

Focus on enhancing the actual combat capabilities of network attack and defense, and innovate network training methods

In view of the reality and destructiveness of cyber threats, foreign militaries attach great importance to testing the security of information network systems and improving the cyber offensive and defensive capabilities of military and government agencies through cyber exercises and training activities in the context of actual combat.

In terms of participating forces, it covers the military, government agencies, reserves and civilian cyber forces. In the method mode, opponents are generally set to ensure the confrontation of the exercise. Some also innovatively use the method of offering rewards to attract hackers to “legally” attack specific target networks and help find network system defense loopholes. In terms of the training environment, actively build a network shooting range to simulate the information network environment of one’s own side and the opponent’s. The United States, Britain, Japan, Canada and NATO have all established professional cyber ranges. As the world’s largest multinational cyber exercise, NATO’s “Lock Shield” exercise simulated a country’s information network environment in 2019. The content of the drill includes responsiveness testing, defense vulnerability inspection, and election interference analysis. India regularly holds “Cyber ​​Fortress” exercises. It is said that in the “Cyber ​​Fortress-8” exercise organized in 2015, the Indian Army’s cyber brigade used remote penetration and other means to successfully obtain the administrator authority of a certain network system of the Indian Army, and found that 13 major categories of security vulnerabilities were identified. In addition, the U.S. military has begun to practice the integration of cyber warfare and operations in other fields. In the U.S. military’s “Schriever” exercise, the integration of space operations and cyber warfare is one of the important contents.

At present, some countries have regarded some serious cyber attacks as acts of war. As the international rules of conduct in cyberspace restrict and deter cyber attacks more and more, cyber exercises may replace real network operations and become foreign military training and upgrading. The primary path to network offensive and defensive capabilities.

Emphasis on pre-emptive offensive operations, actual combat tends to integrate deterrence and multi-domain integration

The hugeness, complexity, and fragility of the network system make network defense difficult and costly. For this reason, the United States and other countries have gradually changed their network security policy and operational thinking from the initial comprehensive defense to preemptive offensive operations, emphasizing Conduct pre-emptive offensive operations in hostile networks to eliminate potential or actual threats.

Driven by offensive thinking, cyber warfare is common in international conflicts, and the targets of attacks are no longer limited to military targets. The United States is the first country to apply cyber warfare to actual combat. In 2009, the U.S. military used the “Stuxnet” virus to carry out cyber attacks on Iran’s nuclear facilities, causing more than 1,500 centrifuges to be scrapped and the Iranian nuclear process to be paused. In 2020, after the assassination of Soleimani, the U.S. military launched cyber attacks on the command and control of the Iranian Revolutionary Guard Corps, missiles, and air defense systems to deter and prevent Iran from carrying out military retaliation. Of course, the idea of ​​offensive cyber warfare does not require absolute cyber superiority. Some non-cyber powers have also proposed the idea of ​​using asymmetric cyber capabilities to carry out preemptive attacks on the enemy’s weaknesses, and then achieve the goal of using the small to gain the big and the weak in the network game. Mandatory.

It is worth noting that in recent international conflicts, the trend of multi-domain integration in the fields of cyber warfare and firepower warfare, electromagnetic spectrum warfare, and cognitive domain warfare has become very obvious. For example, when armed conflicts broke out between Azerbaijan and Armenia in the Naka region in 2020, the two sides launched cyber offenses and defenses in cyberspace on the one hand, and on the other hand launched fierce confrontations in the cognitive domain around international and domestic public opinion, military morale, legal principles and morals.

At present, the low-intensity and ambiguous nature of cyber warfare attracts some international actors to frequently carry out cyberspace operations regardless of the consequences, and the risk of conflict escalation out of control is constantly accumulating. To this end, all countries in the world should start consultations and negotiations on international rules of conduct in cyberspace and cyber arms control as soon as possible, jointly restrict military activities in cyberspace, create a new pattern of cybersecurity, and build a community of shared future in cyberspace.

Original Mandarin Chinese:

經過幾十年的發展,網絡空間已經成為人類社會生產生活的重要領域,成為繼“陸、海、空、天”之後的第五維戰場。 近年來,美國等發達國家紛紛出台網絡空間戰略,建設(壯大)網絡戰力量,實施網絡攻防作戰。 網絡戰建設、發展和應用的動向值得世人關注。

關注網絡空間安全,加快建立配套戰略法規

由於網絡空間安全是一個新興領域的安全問題,大多數國家缺乏配套的戰略和法律法規體系。 近年來,世界主要國家將其定位為重大安全領域,出台網絡安全戰略和法規的步伐明顯加快。 例如,自2000年第一個國家網絡安全戰略提出以來,美國不斷制定、擴充和更新網絡安全領域的各種政策、戰略、規章制度。 僅網絡戰略就有《國家網絡戰略》、《國際網絡空間戰略》、《國防部網絡戰略》和《軍種網絡戰略》等,用於規範和指導發展 2014年10月,美軍還發布了世界上第一個聯合條令“網絡空間作戰”,對網絡空間作戰的概念、行動和任務進行了闡述和規範。 北約、俄羅斯2014年公佈《俄羅斯聯邦網絡安全戰略構想》,2016年頒布新版《信息安全條令》,提出保障網絡信息安全。為加強網絡安全統籌指導 事務方面,印度2013年出台《國家網絡安全政策》,併計劃出台《國家網絡安全戰略》;印度軍方制定了《陸軍網絡安全政策》、《海軍信息安全政策》等政策 安全策略”的規定。

加強網絡戰力量專業化建設,重視利用民間網絡力量

近年來,網絡戰專業化力量的建立、整合和壯大成為外軍發展趨勢。 美國是最早提出網絡戰概念的國家,也是最早組建專業網絡戰部隊的國家。 美軍於2010年成立網絡司令部,2018年升格為一級聯合作戰司令部,下轄的網絡特遣部隊已達133個,人員約6200人。 俄羅斯於2013年成立專業信息戰部隊,網絡戰是其重要職能。 日本自衛隊在2014年成立了網絡防衛隊,最初有100多名成員,現在已經增加到近300人,未來還計劃擴大到千人。 英國也在2020年宣布將很快創建一支國家網絡部隊。 在此基礎上,外軍普遍進行了網絡戰力量的系統化設計和佈局。 在網絡戰領域,網絡攻擊、網絡防禦、網絡運維等力量密不可分; 對外,網絡戰力量與信號偵察、電子戰等信息戰力量融合融合。 比如美國網絡司令部司令兼任國家安全局局長,網絡攻防與信號情報偵察相結合。 日本自衛隊設立了專門的一級司令部,負責監管太空、網絡和電子戰事務。

值得注意的是,外國軍隊構成了網絡戰力量的“正規軍”,民間網絡安全公司、科技公司、黑客組織等也成為重要的網絡攻防力量,備受關注。 臭名昭著的“索倫之眼”和“方程組”等黑客組織都與美軍有著千絲萬縷的聯繫。 近年來,伊朗、俄羅斯、委內瑞拉等國都遭遇過網絡攻擊,都有“方程組”的影子。 印度陸軍也在考慮吸納其豐富的IT人才,組建網絡戰後備力量,進一步加強網絡戰能力。

積極發展建設網絡化武庫,智能武器系統初現端倪

網絡武器是用於網絡的特殊武器

攻防。 它們可以是病毒、漏洞、拒絕服務攻擊、釣魚攻擊等攻防技術,也可以是網絡攻防系統平台。 俄羅斯聯邦國際信息安全協會主席阿納托利·斯米爾諾夫在2019年透露,許多西方國家正在研發網絡武器; 美國、英國、德國和日本也毫不掩飾擁有網絡武器。 根據斯諾登和維基解密的披露,美國情報機構和美國軍方已經建立了一個系統的進攻性網絡武器庫,其中一些武器堪稱網絡空間的“大規模殺傷性武器”。 2020年,英國戰略司令部司令帕特里克桑德斯主動宣稱,英國已經研製出“破壞性”網絡武器,可以有效殺傷敵方電網等設施設備。

在網絡系統平台方面,美軍建成了世界上最完備的網絡戰系統平台,包括聯合網絡指揮控制、統一平台等指控管理系統,IKE等網絡戰規劃與執行基礎系統。 項目,以及“樹特”等網絡戰和網絡戰系統。 具有綜合火力的武器系統。 在網絡監控防禦方面,印度開發建設了中央監控系統、網絡流量分析系統、網絡安全監控評估系統等系統平台。

網絡武器與智能技術有著天然的“親緣關係”。 目前,網絡態勢監測、網絡攻防、密碼破譯等領域的武器系統在網絡空間主導國家的智能化國家已經形成。 隨著人工智能技術的發展,網絡化武器的智能化趨勢將越來越明顯。

著力提升網絡攻防實戰能力,創新網絡訓練方式

鑑於網絡威脅的真實性和破壞性,外軍十分重視通過實戰背景下的網絡演習和訓練活動,檢驗信息網絡系統的安全性,提高軍政機構的網絡攻防能力。

在參與力量方面,它涵蓋了軍隊、政府機構、預備役和民間網絡力量。 在方法模式中,一般都會設置對手,以保證練習的對抗性。 有的還創新性地採用懸賞的方式,吸引黑客“合法”攻擊特定目標網絡,幫助尋找網絡系統防禦漏洞。 在訓練環境方面,積極建設網絡靶場,模擬己方和對方的信息網絡環境。 美國、英國、日本、加拿大和北約都建立了專業的網絡靶場。 作為全球規模最大的多國網絡演習,北約“鎖盾”演習模擬了2019年一個國家的信息網絡環境,演練內容包括響應能力測試、防禦漏洞檢查、選舉干擾分析等。 印度定期舉行“網絡堡壘”演習。 據稱,在2015年組織的“網絡堡壘-8”演習中,印陸軍網絡旅利用遠程滲透等手段,成功獲取了印軍某網絡系統的管理員權限,並發現13 確定了主要類別的安全漏洞。 此外,美軍也開始實踐網絡戰與其他領域作戰的融合。 在美軍的“施里弗”演習中,太空作戰與網絡戰的融合是重要內容之一。

目前,一些國家已將一些嚴重的網絡攻擊行為視為戰爭行為。 隨著網絡空間國際行為準則對網絡攻擊的約束和威懾越來越強,網絡演習有可能取代真正的網絡作戰,成為外國軍事訓練和升級。 網絡攻防能力的主要途徑。

強調先發製人的進攻作戰,實戰趨向綜合威懾和多域融合

網絡系統的龐大性、複雜性和脆弱性使得網絡防禦難度大、成本高。 為此,美國等國逐漸將網絡安全政策和作戰思路從最初的全面防禦轉變為先發製人的進攻作戰,強調在敵對網絡中進行先發製人的進攻作戰,以消除潛在或實際的威脅。

在進攻性思維的驅使下,網絡戰在國際衝突中屢見不鮮,

攻擊目標不再局限於軍事目標。 美國是第一個將網絡戰應用到實戰中的國家。 2009年,美軍利用“震網”病毒對伊朗核設施進行網絡攻擊,導致1500多台離心機報廢,伊朗核進程暫停。 2020年,蘇萊曼尼遇刺後,美軍對伊朗革命衛隊的指揮控制、導彈、防空系統等發起網絡攻擊,以威懾和阻止伊朗進行軍事報復。 當然,進攻性網絡戰的思路並不需要絕對的網絡優勢。 一些非網絡大國也提出了利用非對稱網絡能力對敵方弱點進行先發製人攻擊的想法,進而在網絡博弈中達到以小博大、以弱勝強的目的。 強制的。

值得注意的是,在近期的國際衝突中,網絡戰與火力戰、電磁頻譜戰、認知域戰等領域的多域融合趨勢十分明顯。 例如,2020年阿塞拜疆與亞美尼亞在納卡地區爆發武裝衝突,雙方一方面在網絡空間展開網絡攻防,另一方面圍繞國際國內展開認知領域的激烈交鋒。 民意、軍隊士氣、法理和道德。

當前,網絡戰的低烈度和模糊性,吸引了一些國際行為體不顧後果地頻繁開展網絡空間作戰,衝突失控升級的風險不斷累積。 為此,世界各國應盡快啟動網絡空間國際行為規則和網絡軍控磋商談判,共同製約網絡空間軍事活動,打造網絡安全新格局,構建網絡空間共享共同體。 網絡空間的未來。

Chinese Military Source: http://www.81.cn/jfjbmap/content/2021-04/08/content_XXXXX.htm

Chinese General: If hostile forces invade my network sovereignty China can use military means to fight & hack back // 中國將軍:如果敵對勢力入侵我的網絡主權,中國可以用軍事手段進行反擊和反擊

Chinese General: If hostile forces invade my network sovereignty China can use military means to fight & hack back //

中國將軍:如果敵對勢力入侵我的網絡主權,中國可以用軍事手段進行反擊和反擊

(安卫平,北部战区副参谋长)

Original: “National Defense Reference”, No. 3, 2017

The cyberspace was born in the military field. For example, the first computer, the APA network and the GPS navigation system all originated from the military. Today, cyberspace security has been closely related to national security, and the military has once again become the protagonist of maintaining national cyberspace security. Whether facing normalized network penetration or large-scale cyberattacks, it is urgent for the military to move from guarding the “network camp gate” to guarding the “network country gate”, breaking through the traditional military missions and missions, and breaking through the traditional war preparation mode. With a new network of national defense thinking, the founding of the network era of the country’s strong shield.

From the “network camp door” to the “network country door”, the new era brings a new trend of military mission

Cyberspace is not only related to the maintenance of national strategic interests, but also directly affects political, economic, cultural security and social development. It has also become the blood and link of modern battlefield joint operations. The Chinese military cannot be limited to maintaining the internal network security of the military camp. It must also actively adapt to the trend of the times and take the responsibility of the country that guards the “network country.” Network strong army is an important part of the construction of a network powerhouse. From the “network camp door” to the “network country door” is the inevitable trend of the development of the domestic and international situation in the information age.

Guarding the “network country door” is forced by the cyberspace security situation. As the first big Internet country, China’s security situation is not optimistic, and strategic opponents have never stopped preparing for our network operations. The United States, Britain, France and other countries are actively preparing for cyberspace, giving military functions through cyberspace security legislation, developing cyber warfare forces, developing cyber warfare weapons and equipment, and advancing war to the “fifth space” of mankind, especially in China. In the historical process of the rise, under the leadership of the Cold War mentality and the containment subversion strategy, Western countries have used network technology and communication methods to implement uninterrupted harassment, subversion and cyberattacks, seriously affecting China’s national security and social development, and China has gradually become The hardest hit by cybersecurity threats, the test sites for virus attacks, and the destinations of conscious penetration, national security faces enormous risks.

In the coming period, as a new emerging country, China’s conflicts of interest with other parties will intensify. Firmly promoting the network defense strategy and strengthening the operational preparation of cyberspace are the inevitable ways to actively strive for the dominance and discourse power of cyberspace, and also the rise of China. The only way to go. As the main force of national security and stability, the military must adapt to the characteristics of cyberspace characteristics, become the backbone and main force to resist network intrusion and network subversion, and safeguard national security and social stability.

Winning cyber warfare is the trend of new military revolution in the information age. As one of the most advanced productivity in the information age, network technology has made cyberspace warfare a leading factor in guiding the evolution of modern warfare and affecting the overall situation of war. In recent years, from the “seismic net” attack in Iran, the cyber warfare in the Russian-Georgian conflict, the large-scale obstruction of the Ukrainian power grid, and the cyberattack of the US military against IS, the huge role played by cyberspace in actual combat has gradually emerged, indicating that cyber warfare Has become an important style of future joint operations.

The US military attaches great importance to the construction of cyberspace armaments, the establishment of the cyberspace command, the launch of cyberspace joint operations, the extensive expansion of cyber warfare forces, the maintenance of its cyberspace hegemony, and the formation of cyberspace control capabilities as a “third offset strategy”. “Absolute advantage is the most important competitive content.

Many countries in the world have followed suit, and the trend of militarization of cyberspace is obvious. The rigorous cyberspace military struggle situation requires the Chinese military to focus on the changes in the network battlefield space, adapt to the requirements of the information war era, and achieve the strong military goal of smashing and winning in cyberspace.

Effective network warfare is an intrinsic need to accelerate the construction of a network powerhouse. In the process of China’s development from a network power to a network power, it is inseparable from the strong cyberspace military power as a guarantee. The international competition in cyberspace is a comprehensive game of the country’s comprehensive strength. Among them, the quality of network military capacity building is directly related to national security and stability, and it is the core element of the entire national security field.

At present, the interests of countries in the world in the cyberspace are mutually infiltrated, and there is a situation in which you have me, I have you, cooperate with each other, and develop together. However, this kind of common development is not equal. The US and Western powers have taken advantage of the cyberspace dominance and have already achieved certain network warfare advantages, which has made my network development and interests subject to people. How can the military fulfill its mission of defending the earth in the construction of a network-strength country? The premise is to form a network environment that can contain the crisis and control the opponent’s network attack and defense capabilities and ensure peaceful development.

Therefore, the military needs to establish a deterrent strategic goal of effective warfare, form a strategic check and balance ability that can “destroy each other” with the enemy, thereby enhancing strategic competitiveness, ending cyberspace aggression, and ensuring the smooth advancement of the network power strategy.

From “keeping the soil to the responsibility” to “protecting the net and defending the country”, the new situation requires the military to undertake new tasks.

The military is the main force and pillar of national security, and cyberspace is no exception. The National Security Law, which was enacted on July 1, 2015, stipulates: “Citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and institutions, and other social organizations have the responsibility to safeguard national security. And obligations.” The Cyber ​​Security Law, promulgated in November 2016, emphasizes the need to maintain cyberspace sovereignty and national security.

On the basis of the laws of these two countries, on December 27, 2016, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was officially launched, providing overall guidance for creating a new pattern of network powers at a new starting point. Basically follow, clearly put forward nine strategic tasks, further embodying the mission of the military in the process of building a network power.

With the national mission of protecting the network, the military must be a strong pillar to defend the cyberspace sovereignty. The first of the nine strategic tasks listed in the “Strategy” is “firmly defending the cyberspace sovereignty” and clearly proposes to “take all measures including economic, administrative, scientific, technological, legal, diplomatic, military, etc., and unswervingly maintain our network.” Space sovereignty.” It can be seen that the military must assume the military mission of using physical space and defend the national mission of the sovereign security and interests of virtual cyberspace.

Cyberspace sovereignty is the core interest of the state and an important component of national sovereignty. It indicates the independence, equal, self-defense and management power of the state in cyberspace. Once the hostile forces violated my cyberspace sovereignty, it would be equivalent to infringing on the national sovereignty of the physical space such as land, sea and air. China will have the right to take all measures including military means to give a firm response.

Internationally, the United States has long proposed a cyberspace deterrence strategy, declaring that attacks on US network information facilities are equivalent to war acts, and the United States will take military strikes to retaliate. Military means are the means of safeguarding national sovereignty and play a vital role in safeguarding national cyberspace security. Therefore, the military, air, sea and air military forces have been given the historical mission of protecting the cyberspace sovereignty. They must rely on the powerful physical space to defend the national interests of cyberspace and effectively deter the hostile forces from cyber-damaging attempts.

In accordance with the era of the Internet, the military must be the ballast stone to defend national security. The second item of the “Strategy” mission emphasizes the need to resolutely safeguard national security, prevent, deter and punish any use of the Internet for treason, secession, sedition, subversion or incitement to subvert the people’s democratic dictatorship.

In the era of information network, the military of all countries in the world has become an important participant in cyberspace. The level of cyberspace capability has become the main indicator for assessing the modernization of a country’s military. It is one of the main duties of the informationized military to carry out cyberspace missions and maintain national security.

Judging from the historical process of China’s development, it is necessary to be highly vigilant against the danger of the country being invaded, subverted, and divided in cyberspace in order to adapt to the national security strategy needs of building a well-off society in an all-round way. Highly alert to the reform caused by cyberspace. The danger of developing the overall situation is destroyed, and we are highly wary of the danger of interference and destruction in the development of socialism with Chinese characteristics.

Preventing problems before they occur requires the state to have the means to cope with and deal with these risks, and to have the powerful force to prevent, stop and legally punish cyberspace violations. Defending the country has always been an unshirkable historical responsibility of the military. The inherent mission and mission have determined that the Chinese military must assume the role of taking various measures in the cyberspace to safeguard the country’s political, economic, cultural security and social stability.

The strategic mission of both offensive and defensive, the military must be a strong backing to enhance the ability of cyberspace protection. The third and eighth items of the Nine Major Tasks in the Strategy clearly state that all necessary measures must be taken to protect key information infrastructure and its important data from attack and destruction, and that technology and management should be adhered to, protected and shocked; We will build a network space protection force that is commensurate with China’s international status and adapts to the network power. We will vigorously develop network security defense methods, timely discover and resist network intrusion, and build a strong backing for national security. Among all the political, diplomatic, military, and scientific and technological capabilities of the country to maintain security, military power has always been the foundation and support for all capabilities, the fundamental guarantee for all capabilities, and the ultimate support for national security.

Therefore, the military must undertake the strategic task of strengthening the national cyberspace protection capability. In the real society, the military is the reassurance of safeguarding national security, and it should also become the security dependence and guarantee of the people in cyberspace. As an important part of the national cyberspace protection capability, the military must achieve both offensive and defensive capabilities and a unified warfare. It has the ability to resolutely safeguard the interests and security of the country and the people in cyberspace, and effectively eliminate the various crises caused by cybersecurity threats. The turbulence of thoughts enables the people to truly feel that production and life are effectively protected and become the confidence of the people of the whole country in their confidence in the national network protection capabilities.

With the global responsibility of UNPROFOR, the military must be an important support for maintaining global cybersecurity. The last item of the “Strategy” mission clearly proposes to strengthen international cooperation in cyberspace, support the United Nations in playing a leading role, promote the development of universally accepted international rules on cyberspace, international anti-terrorism conventions on cyberspace, and improve the judicial assistance mechanism against cybercrime. International cooperation in the areas of policy and law, technological innovation, standards and regulations, emergency response, and protection of key information infrastructure.

Cyber ​​terrorism and cybercrime are new forms of global threat catalyzed by information network fermentation. They pose a huge threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of the government and the people. Western countries have given the military the responsibility to protect cybersecurity and the power to fight cyber terrorism. Maintaining the security and stability of global cyberspace is in the fundamental interests of China and the rest of the world. The military should become an important defender of global cyberspace security and an important force in combating global cyber terrorism and cybercrime.

The globalization and unbounded nature of the Internet determine the international demand for combating cyber terrorism and transnational cybercrime. The military should promote military cooperation in network governance between countries under the framework of the UN Security Council, and use the strategies and technologies of the network era to establish joint defense and joint defense. Mechanism to effectively safeguard the security of the national and world cyberspace.

From “field training” to “network preparation”, new areas require new preparations for the military

Under the new historical situation, cyberspace puts forward new requirements for the military training and preparation mode. It should adapt to the new characteristics of cyberspace and the new mission of the military to carry out innovative reforms on the traditional model, and take the goal of strengthening the country and strengthening the military as the overall plan, and strengthen macro-coordination. Focusing on the legal needs of military operations in cyberspace, it closely follows the natural attributes of the “military and civilian integration” of cyberspace, builds a network security attack and defense system that combines peacetime and warfare, and builds a network defense force of “military and land use”.

Legislation empowerment provides a legal basis for the military to carry out its functional mission. The countries of the world, especially the western developed countries, attach great importance to the issue of network defense in cyber security legislation. The United States has successively issued a series of policies and regulations such as “National Security No. 16 Presidential Decree”, “Network Space Action Strategy”, and has continuously deepened and standardized on how to protect national network security in the field of network defense.

At present, it is necessary to clarify the duties and responsibilities of the cyberspace military from the legal level. It should be based on the National Security Law and the Cyber ​​Security Law, and introduce the network defense law and related cyberspace military operational regulations, for the construction of the network defense field and the military. The action provides regulatory support and a program of action to make the military’s responsibilities and mission in cyberspace more specific and specific.

First, through network defense legislation to further define network sovereignty and network frontiers, clear the scope of the military’s responsibilities.

The second is to establish the operational authority of the military to defend the national cyberspace security through the construction of cyber warfare laws and regulations, and to distinguish military means against network intrusion and network destruction. Third, through the cyberspace international cooperation policy, the military will coordinate with other countries and civilian forces to combat international cyber terrorism and cybercrime.

The integration of military and civilian provides an innovative driving force for the construction of a network powerhouse. The integration of military and civilian is the main practice for the world powers to enhance the competitiveness of cyberspace. For the construction of China’s network powerhouses, building a military-civilian network security attack and defense system and developing a military-land dual-use defense information infrastructure is to inspire the innovation of military cyberspace combat capability. Source.

The first is to coordinate the military, civilian, and functional departments of the state, the military, and various levels of government, set up special command and coordination agencies, mobilize all national network forces, and build a network security attack and defense system that combines “military and civilian integration” and “peace and war.”

The second is to issue guidance on the in-depth development of cybersecurity military-civilian integration as soon as possible, and gradually carry out basic legal research and demonstration of military-civilian integration to guide the development of medium- and long-term military-civil integration.

Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and civilians will jointly build an information infrastructure covering the entire army of the whole country, and realize the unified construction and sharing of military and civilian.

The fourth is to establish an emergency response mechanism for military-civilian joints, increase the ability to train military authorities to control events, strengthen experts and emergency professional strength, and enhance the ability to quickly recover damaged networks or information systems.

Military-civilian joint training provides a practical environment for the generation of cyberspace military capabilities. The military-civilian sharing characteristics of cyberspace make military-civilian joint training an important means of military training in cyberspace around the world. The United States and NATO countries and other cyberspace joint military and civilian exercises have formed a series of, “network storm” and “network guards” and other exercises have attracted the participation of the government, enterprises, research institutions and even civilian hackers. Our military cyberspace military strength training also needs to attract a wide range of civil forces to participate.

First, do a good job in military and political cooperation, establish a military-civilian joint offensive and defensive drill mechanism, learn from the red-blue confrontation training methods in cyber warfare drills in developed countries such as the United States, actively build a “national network shooting range”, plan a series of joint exercises of the government and non-government organizations, and enhance the integration of military and civilian. The level of attack and defense of the network of the government and the people.

The second is to do a good job in military-enterprise cooperation, relying on net-based enterprises to set up a training field on the Internet, to promote the ability of the military and civilians to attack and defend, and jointly improve the ability to prevent unknown risks.

The third is to organize private network security companies and hacker talents, carry out network security competitions and other activities, and verify each other to jointly improve the level of network security protection technology and tactics.

The network reserve service provides a source of strength for building a powerful network army. As a backup supplement to the national defense force, reserve service has both military and civilian characteristics and is a powerful measure to realize the organic unification of cyberspace economic development and national defense construction.

First, it is led by the national security department, and overall planning is carried out according to national interests. A series of laws and regulations conducive to the construction of the network national defense reserve are introduced. From the top level, the main division of labor, promotion strategy, interest coordination, etc. of the military and civilian construction in the network defense reserve construction are solved. problem.

The second is to innovate the reserve organization and comprehensive coordination mechanism, and plan to integrate the reserve construction into all levels and fields of national network information development.

The third is to focus on the reform of the military and local management modes. Based on the management mechanisms of the provincial and municipal governments, the military, and local enterprises and institutions, establish a network of national defense reserve personnel to jointly cultivate and use the mechanism, improve the national emergency mobilization mechanism, and establish a national network defense special talent. The database will include the construction of network militia and reserve forces into the scope of mobilization of the people’s armed forces. In normal times, they will be incorporated into the militia emergency detachment for training. In an emergency, select the capable personnel to participate in the non-war military operations missions, and the wartime will be recruited according to the requirements. To transform the national defense potential into national defense strength. 

Original Mandarin Chinese:

原載:《國防參考》2017年第3期

網絡空間誕生於軍事領域,如首台計算機、阿帕網和GPS導航系統等都源於軍方,時至今日,網絡空間安全已與國家安全息息相關,軍隊又再次成為維護國家網絡空間安全的主角,無論是面對常態化的網絡滲透,還是大規模的網絡攻擊,都迫切需要軍隊從守衛“網絡營門”走向守衛“網絡國門”,突破傳統的軍隊使命任務,突破傳統的應戰備戰模式,以全新的網絡國防思維,鑄造網絡時代國之堅盾。

從“網絡營門”到“網絡國門”,新時代帶來軍隊使命新趨勢

網絡空間不僅事關國家戰略利益維護,直接影響政治、經濟、文化安全和社會發展,也成為現代戰場聯合作戰的血脈和紐帶。中國軍隊不能局限於維護軍營內部網絡安全,更要主動適應時代趨勢,勇於承擔把守“網絡國門”的國家擔當。網絡強軍是網絡強國建設的重要一環,從“網絡營門”走向“網絡國門”是信息時代國內外形勢發展的必然趨勢。

守衛“網絡國門”是網絡空間安全形勢所迫。中國作為第一網絡大國,安全狀況不容樂觀,戰略對手從未停止對我網絡作戰準備。美、英、法等國積極備戰網絡空間,通過網絡空間安全立法賦予軍隊職能,發展網絡戰部隊,研發網絡戰武器裝備,將戰爭推進到了人類的“第五空間”,特別是在中國日益強大崛起的歷史進程中,西方國家在冷戰思維和遏制顛覆戰略的主導下,利用網絡技術手段和傳播方式實施不間斷的騷擾、顛覆和網絡攻擊行動,嚴重影響我國家安全與社會發展,中國逐漸成為網絡安全威脅的重災區、病毒攻擊的試驗場、意識滲透的目的地,國家安全面臨著巨大風險。

未來一段時期內,中國作為新興大國,與各方利益衝突還將加劇,堅定推進網絡國防戰略,加強網絡空間的作戰準備,是積極爭取網絡空間的主導權和話語權的必然途徑,也是中國崛起的必由之路。軍隊作為國家安全穩定的主要力量,必須適應網絡空間特點要求,成為抗擊網絡入侵、網絡顛覆的中堅和主力,維護國家安全和社會穩定。

打贏網絡戰爭是信息時代新軍事變革所趨。網絡技術作為信息時代最先進生產力之一,使得網絡空間作戰成為引導現代戰爭形態演變的主導因素,影響著戰爭全局。近年來,從伊朗“震網”攻擊、俄格衝突網絡戰、烏克蘭電網遭大規模阻癱以及美軍對IS的網絡攻擊,網絡空間在實戰中所展現出的巨大作用逐漸顯現,預示著網絡作戰已成為未來聯合作戰重要樣式。

美軍高度重視網絡空間軍備建設,成立網絡空間司令部,推出網絡空間聯合作戰條令,大幅度擴編網絡戰部隊,極力維護其在網絡空間霸權,把對網絡空間控制能力作為形成“第三次抵消戰略”絕對優勢最重要的競爭內容。

世界多國紛紛跟進,網絡空間軍事化趨勢明顯。嚴峻的網絡空間軍事鬥爭形勢要求中國軍隊著眼網絡戰場空間變化,適應信息化戰爭時代要求,實現在網絡空間能打仗、打勝仗的強軍目標。

有效網絡懾戰是加速網絡強國建設內在所需。在中國由網絡大國向網絡強國發展過程中,離不開強大的網絡空間軍事力量作為保障。網絡空間國際競爭表現為國家綜合實力的全面博弈,其中,網絡軍事能力建設的好壞,直接關係到國家安全與穩定,牽一發而動全身,是整個國家安全領域的核心要素。

當前,世界各國在網絡空間的利益互相滲透,出現“你中有我、我中有你,互相合作,共同發展”的局面。但是這種共同發展是不對等的,美國及西方強國利用網絡空間主導權,已經取得了一定的網絡懾戰優勢,使我網絡發展及利益受制於人。軍隊如何在網絡強國建設中完成守土有責的使命重托,前提就是要形成能夠遏制危機、懾控對手的網絡攻防能力,確保和平發展的網絡環境。

因此,軍隊需要確立有效懾戰的威懾戰略目標,形成能與敵“相互摧毀”的戰略制衡能力,從而增強戰略競爭力,懾止網絡空間侵略,保障網絡強國戰略順利推進。

從“守土有責”到“護網衛國”,新形勢要求軍隊承擔新任務

軍隊是保衛國家安全的主力和柱石,網絡空間也不例外。 2015年7月1日施行的《國家安全法》規定:“中華人民共和國公民、一切國家機關和武裝力量、各政黨和各人民團體、企業事業組織和其他社會組織,都有維護國家安全的責任和義務。”2016年11月頒布的《網絡安全法》強調了要維護網絡空間主權和國家安全。

在這兩個國家法律的基礎上,2016年12月27日,《國家網絡空間安全戰略》(下文簡稱《戰略》)正式出台,為在新的起點上開創網絡強國新格局提供了總體指導和基本遵循,明確提出了九大戰略任務,進一步體現了軍隊在建設網絡強國進程中的使命任務。

全力護網的國家使命,軍隊要做捍衛網絡空間主權的堅強柱石。 《戰略》中列出的九大戰略任務首項就是“堅定捍衛網絡空間主權”,明確提出要“採取包括經濟、行政、科技、法律、外交、軍事等一切措施,堅定不移地維護我國網絡空間主權”。可見,軍隊須承擔起運用實體空間的軍事手段,保衛虛擬網絡空間主權安全和利益的國家使命。

網絡空間主權是國家的核心利益,是國家主權的重要組成,表明國家在網絡空間所擁有的獨立權、平等權、自衛權和管理權。一旦敵對勢力侵犯了我網絡空間主權,就等同於侵犯了我陸海空等實體空間的國家主權,中國將有權利採取包括軍事手段在內的一切措施給予堅決回擊。

在國際上,美國早就提出網絡空間威懾戰略,宣告對美國網絡信息設施的攻擊等同於戰爭行為,美國會採取軍事打擊措施進行報復。軍事手段是維護國家主權的保底手段,在維護國家網絡空間安全中發揮著至關重要的作用。因此,陸海空天軍事力量理所應當地被賦予了保護網絡空間主權的歷史使命,必須憑藉強大的實體空間武力保衛網絡空間的國家利益,有力震懾敵對勢力的網絡破壞企圖。

依網衛國的時代擔當,軍隊要做保衛國家安全的壓艙石。 《戰略》任務的第二項著力強調要堅決維護國家安全,防範、制止和依法懲治任何利用網絡進行叛國、分裂國家、煽動叛亂、顛覆或者煽動顛覆人民民主專政政權的行為。

信息網絡時代,世界各國軍隊都已經成為網絡空間重要參與者,網絡空間能力水平成為評估一個國家軍隊現代化程度的主要指標,遂行網絡空間使命任務、維護國家安全成為信息化軍隊的主要職責之一。

從中國發展所處的歷史進程來看,要適應全面建成小康社會決勝階段的國家安全戰略需求,必須高度警惕國家在網絡空間被侵略、被顛覆、被分裂的危險,高度警惕由網絡空間引發改革發展大局被破壞的危險,高度警惕中國特色社會主義發展進程被干擾、破壞的危險。

防患於未然,要求國家必須具有應對和處置這些危險的手段措施,具有防範、制止和依法懲治網絡空間違法破壞行為的強大力量。保衛國家歷來是軍隊不可推卸的歷史責任,固有的使命任務決定了中國軍隊必須承擔起在網絡空間採取各種措施,維護國家政治、經濟、文化安全和社會穩定的時代擔當。

攻防兼備的戰略任務,軍隊要做提升網絡空間防護能力的堅強後盾。 《戰略》中九大任務的第三項和第八項明確提出,要採取一切必要措施保護關鍵信息基礎設施及其重要數據不受攻擊破壞,要堅持技術和管理並重、保護和震懾並舉;要建設與我國國際地位相稱、與網絡強國相適應的網絡空間防護力量,大力發展網絡安全防御手段,及時發現和抵禦網絡入侵,鑄造維護國家網絡安全的堅強後盾。在國家所有維護安全的政治、外交、軍事、科技能力中,軍事力量歷來是所有能力的基礎和支撐,是所有能力的根本保障,是國家安全的最終依托。

因此,軍隊必須承擔起提升國家網絡空間防護能力堅強後盾的戰略任務。現實社會中,軍隊是維護國家安全的定心丸,在網絡空間也同樣應成為人民群眾的安全依賴和保障。軍隊作為國家網絡空間防護能力生成的重要一環,必須做到攻防兼備、懾戰一體,有能力堅決維護國家和人民在網絡空間的利益和安全,能夠有效消除網絡安全威脅造成的各種危機和思想動盪,使人民能夠切實感受到生產生活得到有效保護,成為全國人民對國家網絡防護能力充滿信心的底氣所在。

聯防聯治的全球責任,軍隊要做維護全球網絡安全的重要支撐。 《戰略》任務最後一項明確提出要強化網絡空間國際合作,支持聯合國發揮主導作用,推動制定各方普遍接受的網絡空間國際規則、網絡空間國際反恐公約,健全打擊網絡犯罪司法協助機制,深化在政策法律、技術創新、標準規範、應急響應、關鍵信息基礎設施保護等領域的國際合作。

網絡恐怖主義和網絡犯罪是經過信息網絡發酵催化出的全球威脅新形態,對世界上所有國家的政治、經濟、軍事、文化安全都構成巨大威脅,僅僅依靠政府和民間的力量是不夠的,美國等西方國家紛紛賦予軍隊保護網絡安全的職責和打擊網絡恐怖主義的權限。維護全球網絡空間安全與穩定符合中國以及世界各國的根本利益,軍隊應成為全球網絡空間安全的重要維護者,成為打擊全球網絡恐怖主義和網絡犯罪的重要力量。

網絡的全球化、無界性決定了打擊網絡恐怖主義和跨國網絡犯罪的國際需求,軍隊應在聯合國安理會的框架下,推進國家間網絡治理軍事合作,利用網絡時代的戰略和技術,建立聯防聯治機制,切實維護國家和世界網絡空間安全。

從“沙場練兵”到“網絡備戰”,新領域需要軍隊備戰新舉措

在新的歷史形勢下,網絡空間對軍隊練兵備戰模式提出了全新的要求,應適應網絡空間新特點和軍隊新使命對傳統模式進行創新改革,以強國強軍目標為統攬,加強宏觀統籌,著眼網絡空間軍事行動的法理需求,緊扣網絡空間“軍民一體”的天然屬性,建設“平戰結合”的網絡安全攻防體系,打造“軍地兩用”的網絡國防力量。

立法賦權,為軍隊遂行職能使命提供法理依據。世界各國尤其是西方發達國家在網絡安全立法上高度重視網絡國防問題。美國先後出台了《國家安全第16號總統令》《網絡空間行動戰略》等一系列政策法規,對如何在網絡國防領域保護國家網絡安全進行了不斷的深化規範。

當前,從法律層面釐清網絡空間軍隊的職責任務非常必要,應以《國家安全法》《網絡安全法》為依據,出台網絡國防法和有關網絡空間軍事作戰條令法規,為網絡國防領域建設和軍事行動提供法規支撐和行動綱領,使軍隊在網絡空間的職責和使命更加明確具體。

一是通過網絡國防立法進一步界定網絡主權和網絡邊疆,清晰軍隊的職責範圍。

二是通過網絡作戰法規建設,明確軍隊遂行保衛國家網絡空間安全的行動權限,區分應對網絡入侵、網絡破壞等行為的軍事手段。三是通過網絡空間國際合作政策,明確軍隊協同他國、民間力量等打擊國際網絡恐怖主義、網絡犯罪的職能任務。

軍民融合,為網絡強國建設提供創新動力。軍民融合是世界強國提升網絡空間競爭力的主要做法,對於中國網絡強國建設來說,構建軍民融合網絡安全攻防體系,開發軍地兩用的國防信息基礎設施,是激發軍隊網絡空間作戰能力創新的源泉。

一是統籌國家、軍隊和各級政府等軍民融合職能部門,設置專門的指揮協調機構,調動一切國家網絡力量,建設“軍民一體”“平戰結合”的網絡安全攻防體系。

二是盡快出台網絡安全軍民融合深度發展指導性意見,逐步展開軍民融合基本法律研究論證,指導中長期軍民融合發展。

三是依托國家現有公共移動通信網、光纖通信網及衛星系統,軍民共建覆蓋全國全軍的信息基礎設施,實現軍民統建、分管共享。

四是建立軍民聯合的應急響應機制,加大培訓軍地主管部門控制事態的能力,加強專家和應急專業力量,提升快速恢復受損網絡或信息系統的能力。

軍民聯訓,為網絡空間軍事能力生成提供實戰化環境。網絡空間的軍民共用特性使得軍民聯訓成為世界各國網絡空間軍事演訓的重要方式。美國及北約等國家的網絡空間軍民聯合演習已經形成系列化,“網絡風暴”“網絡衛士”等演練活動吸引了政府、企業、研究機構甚至民間黑客的廣泛參與。我軍網絡空間軍事力量訓練也需要廣泛吸引民間力量參與。

一是搞好軍政合作,建立軍民聯合攻防演練機制,借鑒美國等發達國家網絡戰演練中的紅藍對抗訓練方法,積極建設“國家網絡靶場”,策劃政府、民間機構系列聯合演習,提升軍民一體、官民一體的網絡攻防水平。

二是搞好軍企協作,在互聯網上依靠網信企業設置演練場區,促進軍民之間攻防能力磨合,共同提高防範未知風險能力。

三是組織民間網絡安全公司和黑客人才,開展網絡安全競賽等活動,互相印證,共同提高網絡安全防護技戰術水平。

網絡預備役,為建設強大網軍提供力量源泉。預備役作為國防力量的後備補充,兼有軍事和民用雙重特點,是實現網絡空間經濟發展與國防建設有機統一的有力舉措。

一是以國家安全部門為主導,依據國家利益進行統籌規劃,出台有利於網絡國防預備役建設的系列法規政策,從頂層上解決網絡國防預備役建設中軍民共建的主體分工、推進策略、利益協調等問題。

二是創新預備役組織領導體制和綜合協調機制,有計劃地把預備役建設融入國家網絡信息化發展的各個層面和各個領域。

三是著眼軍隊和地方兩頭管理模式改革,以各省市政府、軍隊和地方企事業單位的管理機制為依托,建立網絡國防預備役人才聯合培養使用機制,完善國家應急動員機制,建立國家網絡防禦專用人才數據庫,將網絡民兵和預備役部隊建設納入人民武裝動員的範圍,平時按規定編入民兵應急分隊進行訓練,急時挑選精干人員隨隊參加遂行非戰爭軍事行動任務,戰時按需要成建制徵召使用,使國防潛力轉變為國防實力。

Referring url: http://military.people.com.cn/n1/2017/0417/c1011-29215670.html

Communist Chinese Cyber Fundamentals : Strategic Thinking of Network Power //共產主義中國網絡基礎:網絡權力的戰略思考

Communist Chinese Fundamentals : Strategic Thinking of Network Power //

共產主義基本原理:網絡權力的戰略思考

Author: 中國共產黨

Date: 2017

Since the 18th National Congress of the Communist Party of China, the Party Central Committee with Comrade Xi Jinping has attached great importance to and vigorously promoted cybersecurity and informationization, profoundly grasped the characteristics of the development of the information age of human society, and objectively analyzed the current national conditions of China’s Internet development and the development of global Internet. The situation has successively issued a series of important speeches, and put forward a series of new ideas, new ideas and new theories on the governance of the Internet, and scientifically answered the major question of “why build a network power, build a network power and how to build a network power”. Formed Xi Jinping’s strategic thinking of network power. Seriously studying these new ideas is of great significance to promoting the building of a network-building nation and realizing the “two hundred years” struggle goal and the Chinese dream of the great rejuvenation of the Chinese nation.

First, why build a network power

On February 27, 2014, General Secretary Xi Jinping initially proposed the vision of building a network power in the first meeting of the Central Network Security and Informatization Leading Group, and systematically explained the background, situation, tasks and connotations of the network power. Requirements, thus making this idea a relatively complete, systematic theoretical system.

Xi Jinping put forward a rigorous logical relationship between the strategic thinking of the network power, starting from the foundation of the big power network, in view of the overall situation of the network business and the new situation changes, especially objectively analyzing the existing gap and strengthening the strategy of building a network power. aims. In his speech, Xi Jinping pointed out that in today’s world, the information technology revolution is changing with each passing day, which has had a profound impact on the development of international politics, economy, culture, society and military. Informatization and economic globalization have promoted each other, and the Internet has been integrated into all aspects of social life, profoundly changing people’s production and lifestyle. China is in the midst of this tide and is getting more and more affected. China’s Internet and informatization work has achieved remarkable development achievements. The network has entered thousands of households, and the number of Internet users is the highest in the world. China has become a big network country. This is our basic premise. He pointed out that the Internet is a big platform for social information. The hundreds of millions of Internet users have access to information and exchange information. This will have an important impact on their ways of seeking knowledge, ways of thinking, and values. In particular, they will be against the country, society, and Work and perceptions of life have an important impact. Xi Jinping emphasized that cybersecurity and informatization are all about the whole world of a country. We must recognize the situation and tasks we are facing, fully understand the importance and urgency of doing a good job, and seek for the situation. Take the trend and follow the trend. This is all about the whole. Xi Jinping pointed out that with the development of the Internet, especially the mobile Internet, the social governance model is shifting from one-way management to two-way interaction, from offline to online and offline integration, from simple government supervision to more emphasis on social coordinated governance. This is a change in the situation. In today’s world, information technology is developing very fast. If you don’t advance, you will retreat. Compared with the world’s advanced level, compared with the strategic goal of building a network power, we still have a lot of gaps in many aspects, especially in terms of Internet innovation capability, infrastructure construction, information resource sharing, and industrial strength. The biggest gap is in core technology.

Second, what kind of network power to build

Xi Jinping pointed out that without cyber security, there would be no national security, and without informationization, there would be no modernization. To build a network power, we must have our own technology and have strong technology; we must have rich and comprehensive information services, a prosperous and developing network culture; we must have a good information infrastructure to form a strong information economy; we must have a high-quality network. Security and information technology talent team; we must actively carry out bilateral and multilateral Internet international exchanges and cooperation. He also stressed that cyberspace is the spiritual home of hundreds of millions of people. The cyberspace is clear and ecological, and is in line with the interests of the people. The cyberspace is smouldering and deteriorating, and it is not in the interests of the people.

In a nutshell, there are at least six major signs of network power: First, the network information infrastructure must be at the world’s leading level. The second is to have a clear cyberspace strategy and a network voice in the international community. Third, the key technologies must be self-controllable, especially the operating system and CPU technology. Fourth, network security must have sufficient safeguards and capabilities. Fifth, network applications should be at the world’s leading level in terms of scale and quality. Sixth, in the cyberspace strategy, we must have the ability and strength to occupy the commanding heights.

The Outline of the National Informatization Strategy proposes that the construction of a network powerhouse is divided into three steps: the first step is to 2020, the total amount of information consumption will reach 6 trillion yuan, and the scale of e-commerce transactions will reach 38 trillion yuan. At the international advanced level, the international competitiveness of the information industry has been greatly enhanced, and information technology has become the leading force driving the modernization drive. The second step is to 20 billion yuan in information consumption by 2025, and the scale of e-commerce transactions has reached 67 trillion yuan. The leading mobile communication network fundamentally changes the core key technologies to be controlled by people, realizes the strategic goals of advanced technology, developed industry, advanced application, and insecure network security. A large number of large-scale multinational network enterprises with strong international competitiveness emerge; By the middle of this century, informationization has comprehensively supported the building of a socialist modernized country with rich, strong, democratic, civilized and harmonious relations. The status of a network powerhouse has been increasingly consolidated, and it has made greater achievements in leading the development of global informationization.

Xi Jinping planned the timetable for building a network powerhouse. The strategic deployment of building a network powerhouse should be promoted in parallel with the goal of “two hundred years”, the basic popularization of network infrastructure, the enhancement of independent innovation capability, the comprehensive development of information economy, and network security. Ensuring strong goals continue to advance.

Third, how to build a network power

(1) Fundamental requirements: People-centered

Governing the country is always the same, and the people are oriented. Xi Jinping emphasized that in order to develop the network business, it is necessary to implement the people-centered development thinking. It is necessary to adapt to people’s expectations and needs, accelerate the popularization of information services, reduce application costs, and provide useful, affordable and well-used information services for the people, so that hundreds of millions of people can gain more sense of sharing Internet development results. . Compared with cities, rural Internet infrastructure construction is our shortcoming. It is necessary to increase investment, speed up the pace of rural Internet construction, and expand the effective coverage of fiber-optic networks and broadband networks in rural areas. We can do a good job in the in-depth integration of informatization and industrialization, develop smart manufacturing, and drive more people to innovate and start a business; we can aim at the main direction of agricultural modernization, improve the level of agricultural production intelligence and network management, and help farmers increase their income; Give full play to the advantages of the Internet, implement “Internet + education”, “Internet + medical”, “Internet + culture”, etc., to promote the equalization of basic public services; can play the role of the Internet in helping to overcome poverty and promote accurate poverty alleviation and precision poverty alleviation, Let more difficult people use the Internet, let agricultural products go out of the country through the Internet, and enable children in the ravine to receive quality education; accelerate the promotion of e-government, encourage government departments at all levels to break down information barriers, improve service efficiency, and let the people run less errands. More information, running, solving problems that are difficult to handle, slow, and complicated. There are many things to do in these areas. Some Internet companies have already tried and achieved good economic and social benefits.

On November 29, 2016, the National Network Poverty Alleviation Work Promotion Meeting was held in Ningdu, Jiangxi. “We must implement the network poverty alleviation action, promote accurate poverty alleviation, and accurately eliminate poverty, so that poverty alleviation work can be accessible anytime and anywhere, so that people in poverty-stricken areas have more sense of gaining in the Internet construction and sharing.” General Secretary Xi is an important indicator in the old Red Revolution. Once again, the network’s poverty alleviation has become a new lever to win the overall well-off.

(II) Concept requirements: Practicing the five development concepts

The Fifth Plenary Session of the 18th CPC Central Committee put forward a new development concept of innovation, coordination, green, openness and sharing. This is based on profoundly summarizing domestic and foreign development experience and lessons, and in-depth analysis of domestic and international development trends. Our party has a new understanding of China’s economic and social development laws. Promoting China’s economic and social development in accordance with the new development concept is the general requirement and general trend of China’s development in the current and future period. The ancients said: “At any time, to raise things, to make meritorious deeds due to capital, and to profit from the power of all things.” The development of China’s online letter business should adapt to this general trend. Generally speaking, the network letter business represents new productivity and new development direction, and should be able to take the lead in practicing the new development concept.

Innovation is the core strength of the development of the network business. Innovation is the genes of Internet development. The concept innovation and technological innovation of the Internet are the needs of its own development. If there is no progress in the Internet tide, there will be no living space without innovation. We must always place innovation at the forefront, promote institutional and institutional innovation, concept innovation, technological innovation, and application innovation, and support the encouragement of Internet entrepreneurs, leading talents, and engineers to create and create innovative technologies for the development of the Internet. Xi Jinping pointed out at the 2nd World Internet Conference: “China is implementing the ‘Internet +’ action plan, promoting the construction of ‘Digital China’, developing the sharing economy, supporting various Internet-based innovations, and improving the quality and efficiency of development.”

Coordination is the inherent requirement of the development of the network business. Whether it is domestic or foreign, there are problems of unbalanced and uncoordinated development of network security and informationization. To solve these problems, we must establish a concept of coordinated development, eliminate the digital divide, narrow the gap between urban and rural areas, regional differences, and ensure information security. Balanced development, all-round development, and safe development. At the first meeting of the Central Network Security and Informatization Leading Group, Xi Jinping pointed out: “From the international and domestic general trend, the overall layout, co-ordinate all parties, innovation and development, and strive to build China into a network power.”

Green development is an important guarantee for the healthy development of the network business. The information industry is a green industry. Informationization and networking are supporting the application and upgrading of industries, agriculture, and national defense, and promoting green development, low-carbon development, and circular development. It is necessary to carry forward the main theme, spread positive energy, and make the cyberspace clear. At the symposium on April 19, 2016, Xi Jinping pointed out: “The cyberspace is clear and ecological, and it is in line with the interests of the people. The cyberspace is smouldering and ecologically degraded, which is not in the interest of the people.” He also stressed: “We want this Responsible for the society and responsible for the people, strengthen the cyberspace governance in accordance with the law, strengthen the construction of online content, strengthen the positive publicity on the Internet, foster a positive and healthy, up-to-good network culture, and nourish the social core values ​​and the outstanding achievements of human civilization. People’s hearts, nourish the society, and achieve positive energy and high melody, creating a clean and cyberspace for the majority of Internet users, especially young people.”

Openness is the essential feature of the development of the network business. The Internet has opened the door to openness in all countries of the world. Xi Jinping pointed out: “The Internet has turned the world into a global village where the sound of chickens and dogs is heard. People who are thousands of miles away are no longer ‘old and dead.’ It can be said that the world is more colorful because of the Internet, and life is more because of the Internet. Rich.” The development of China’s Internet industry is inseparable from the world, and the Internet industry in the world cannot be separated from China. Xi Jinping pointed out at the Second World Internet Conference: “The Internet in China is booming, providing a broad market space for enterprises and entrepreneurs in various countries. The door to China’s opening will never be closed, and the policy of using foreign capital will not change. Foreign-invested enterprises The protection of legitimate rights and interests will not change, and the direction for countries and enterprises to provide better services in China will not change. He also stressed: “All countries should promote open cooperation in the Internet field, enrich the open connotation, increase the level of openness, and build more Communicate and cooperate with the platform to create more points of interest, cooperation growth, and win-win new highlights, and promote mutual complementarity and common development in the cyberspace, so that more countries and people can take advantage of the information age of express trains and share Internet development results.” We must actively participate in international Internet exchanges and cooperation, learn from the advanced experience and technological achievements of countries around the world, grasp and lead the development trend of the Internet, and promote open cooperation and mutual benefit for cyberspace.

Sharing is the fundamental purpose of the development of the network business. Serving the people and benefiting the people’s livelihood is the fundamental starting point and the foothold of China’s Internet development. Xi Jinping stressed: “In order to develop the network, the company must implement the people-centered development thinking. It is necessary to adapt to the people’s expectations and needs, accelerate the popularization of information services, reduce the application cost, and provide the people with the necessary, affordable and useful. Good information services will enable hundreds of millions of people to gain more sense of sharing Internet development results. “We must push the network into thousands of households and guide the people to understand the world, master information, exchange ideas, innovate and improve, and improve through the Internet. Life, let the Internet development achievements not only benefit the 1.3 billion Chinese people, but also benefit the people of all countries in the world.

(3) Governance requirements: safety and development go hand in hand

In 2014, Xi Jinping emphasized at the first meeting of the Central Network Security and Informatization Leading Group that “maintenance of network space security and network data integrity, security, reliability, and maintenance of network space security capabilities.” He also called for the overall relationship between network security and informatization. “Network security and informatization are two wings and two wheels of integration. They must be unified planning, unified deployment, unified promotion, and unified implementation. Do a good job in network security and informationization. Work, we must handle the relationship between security and development, to achieve coherence, go hand in hand, to ensure development by safety, to promote safety through development, to strive to build a long-term security, growth and governance.” Two years later, at the symposium, he pointed out again “Network security and informatization are mutually reinforcing. Security is the premise of development, development is the guarantee of security, and security and development must advance simultaneously. From a global perspective, cybersecurity threats and risks are increasingly prominent, and increasingly toward politics, economy, Conductive penetration in the fields of culture, society, ecology, national defense, etc., especially the key information infrastructure of the country Face greater potential risks, prevention and control of network security capability is weak, it is difficult to effectively deal with national, organized high-strength network attacks. This is a problem for the world, we are certainly no exception. “

In addition, he pointed out that “in the face of complex and severe network security situation, we must remain clear-headed, and all parties must jointly manage and effectively maintain network security.” First, establish a correct view of network security. The idea determines the action. There are several main features of today’s network security. First, cybersecurity is holistic rather than fragmented. Second, network security is dynamic rather than static. Third, cybersecurity is open rather than closed. Fourth, cybersecurity is relative rather than absolute. Fifth, cybersecurity is common rather than isolated. Second, accelerate the construction of a key information infrastructure security system. Third, all-weather perception of the network security situation. Fourth, enhance network security defense capabilities and deterrence capabilities.

(4) Cadre requirements: Take the network mass line and build a concentric circle

The mass line is the fundamental line of our party. Xi Jinping pointed out: “The netizens come from the common people, the people are on the net, and the public opinion is on the net. Where are the people, where are our leading cadres going, or how to contact the masses? Party and government organs and leading cadres at all levels must learn Take the mass route through the Internet, often go online to see, dive, chat, and voice, understand what the masses think, collect good ideas and suggestions, and actively respond to netizens’ concerns and doubts. Be good at using the Internet to understand public opinion and work. It is the basic skill of leading cadres to do their work well under the new situation.”

How to take the network mass route? Xi Jinping gave the method. “The majority of netizens are ordinary people, come from all directions, and their experiences are different. The opinions and ideas must be varied. They cannot be asked to be so accurate and correct about all issues. To be more inclusive. And patience, timely absorption of constructive opinions, timely assistance for difficulties, timely referrals to those who do not understand the situation, timely clarification of vague understanding, timely resolution of complaints of resentment, timely guidance and correction of wrong opinions, Let the Internet become a new platform for us to communicate and communicate with the masses, and become a new way to understand the masses, be close to the masses, solve problems for the masses, and become a new channel for carrying forward people’s democracy and accepting people’s supervision.”

At the same time, Xi Jinping pointed out the efforts of cadres at all levels. “To correctly handle the relationship between security and development, openness and autonomy, management and service, and constantly improve the ability to grasp the laws of the Internet, the ability to guide the public opinion, and the development of informationization. Capabilities, the ability to guarantee network security, and the continuous advancement of network power construction.”

(5) Management requirements: unified leadership, management according to law

The Political Bureau of the CPC Central Committee conducted the 36th collective study on the implementation of the strategy of strengthening the country by the Internet. Accelerate the improvement of network management.

Xi Jinping put forward requirements from the institutional mechanism. He emphasized that the central cybersecurity and informationization leading group should play a centralized and unified leadership role, coordinate and coordinate major issues of cybersecurity and informatization in various fields, and formulate and implement national cybersecurity and informationization development strategies. , macro-planning and major policies, continuously enhance security and security capabilities.

Instructed from the management ideas, in China, more than 700 million people on the Internet, certainly need to manage, and this management is very complicated and very heavy. Enterprises must assume the responsibility of enterprises, and the party and the government must assume the responsibility of the party and the government. No side can give up their responsibilities. It is necessary to deeply understand the role of the Internet in state management and social governance, and to promote e-government and build a new smart city, and to build a nationally integrated national big data center with data concentration and sharing as a way to promote technology integration. Business integration, data integration, and cross-level, cross-regional, cross-system, cross-department, and cross-business collaborative management and services. It is necessary to strengthen the Internet thinking, take advantage of the flat, interactive and rapid advantages of the Internet, promote the scientific decision-making of the government, the precision of social governance, the efficiency of public services, and better use the means of information to better understand the social situation, smooth communication channels, and assist decision-making governance. .

From the legislative norms to point out the direction, we must promptly formulate legislative plans, improve Internet information content management, key information infrastructure protection and other laws and regulations, manage cyberspace in accordance with the law, and safeguard the legitimate rights and interests of citizens. It is necessary to strictly guard against cybercrime, especially new cybercrime, and safeguard the interests of the people and the harmony and stability of society. It is necessary to speed up the process of network legislation, improve the regulatory measures according to law, and resolve network risks. It is necessary to strengthen the management of big data in accordance with the law. Some data concerning national interests and national security are in the hands of Internet companies, and enterprises must ensure the security of these data. Enterprises should pay attention to data security. If the company has problems with data protection and security, it will also have an adverse impact on its own reputation.

It also puts forward hopes for the whole society. Network security is for the people, network security depends on the people, and maintaining network security is the common responsibility of the whole society. It requires the government, enterprises, social organizations and the majority of netizens to participate in the construction of a network security defense line. These characteristics must be well grasped by all relevant parties.

(6) Guarantee requirements: technological breakthroughs, construction of infrastructure and sharing systems

Xi Jinping emphasized that in order to grasp the initiative of China’s Internet development and safeguard Internet security and national security, we must break through the core technology and strive to achieve “curve overtaking” in certain areas and in certain aspects. To achieve breakthroughs in core technologies, we must have determination, perseverance, and focus. He hopes that the vast number of entrepreneurs, experts, scholars and scientific and technological personnel in the field of China’s online information should establish this ambition, strive for this tone, and strive to achieve new major breakthroughs in core technology as soon as possible. The so-called “days, not afraid of thousands of miles; often do, not afraid of thousands of things.”

Xi Jinping stressed that it is necessary to firmly hold the core technology of independent innovation, and to break through the cutting-edge technologies of network development and key core technologies with international competitiveness, accelerate the promotion of domestically controlled independent alternative plans, and build a safe and controllable information technology system. . First, correctly handle open and autonomous relationships. Second, concentrate on the scientific research investment to do big things. Third, actively promote the transformation of core technological achievements. Fourth, promote strong alliances and coordinated research. Fifth, we can explore the formation of an alliance of industry, academia and research, and open the list. To lay a solid foundation for the research and development of core technologies, it is necessary not only to blow up the charge, but also to blow up the collection number, that is, to accumulate the strongest forces together to form the commando and special forces.

Xi Jinping stressed that it is necessary to speed up the construction of a key information infrastructure security system. The key information infrastructure in the fields of finance, energy, electricity, communications, transportation, etc. is the nerve center of economic and social operation, the top priority of network security, and the target of possible key attacks. The “physical isolation” line of defense can be invaded across the network, the power allocation instructions can be maliciously tampered with, and the financial transaction information can be stolen. These are major risk hazards. If there is no problem, it will cause traffic disruption, financial disorder, power hupfer and other issues, which is very destructive and lethal. We must conduct in-depth research and take effective measures to effectively protect the country’s critical information infrastructure.

At the same time, he pointed out that it is necessary to promote the modernization of the national governance system and governance capacity through informationization, coordinate the development of e-government, build an integrated online service platform, promote the construction of new smart cities by hierarchical classification, open up information barriers, and build a national information resource sharing system. It is easy to use information technology to sense social situation, smooth communication channels, and assist scientific decision-making.

(7) Propaganda requirements: the most important thing, to build consensus

Xi Jinping pointed out that we must adhere to the attitude of being responsible to the society and responsible to the people, strengthen the cyberspace governance in accordance with the law, strengthen the construction of online content, strengthen the positive publicity on the Internet, foster a positive and healthy, up-to-good network culture, and use the socialist core values. outstanding achievements of human civilization and nourishing the heart, nourishing community, so that positive energy is abundant, the main theme of the high for the majority of Internet users, especially young people to create a Delicate gas is cyberspace.

Do online media work is a long-term task to improve the online promotion of innovation, the use of propagation network, promote the theme, stimulate positive energy, great efforts to cultivate and practice the socialist core values, when good grasp of the Internet to guide public opinion, and validity To make the cyberspace clear.

Forming a good online public opinion atmosphere is not to say that there can only be one voice, one tone, but that it cannot be used to confess right and wrong, reverse black and white, make a living, commit crimes, and cannot transcend the legal boundaries of the Constitution. An important means to put power into the cage of the system is to play the role of public opinion supervision, including Internet supervision. This article, party and government organs and leading cadres at all levels must pay special attention to, first of all, do a good job. We must not only welcome, but also carefully study and learn from the online criticism of goodwill and the supervision of the Internet, whether it is for the work of the party and the government or for the leading cadres, whether it is ruthless or loyal.

Xi Jinping pointed out that the new application of new technologies and new technologies in the Internet has made the social mobilization function of the Internet increasingly enhanced. To spread positive energy, enhance communication and guiding force. It is necessary to strictly guard against cybercrime, especially new cybercrime, and safeguard the interests of the people and the harmony and stability of society. It is necessary to give full play to the advantages of network communication, experience, and sharing, listen to the will of the people, benefit the people’s livelihood, solve the people’s worries, and unite the social consensus. Online and offline networks should be united and coordinated, forming a good situation for jointly preventing social risks and building a concentric circle together. It is necessary to maintain the security of cyberspace and the integrity, security and reliability of network data, and improve the security of maintaining cyberspace.

Xi Jinping pointed out that the new application of new technologies and new technologies in the Internet has made the social mobilization function of the Internet increasingly enhanced. To spread positive energy, enhance communication and guiding force. It is necessary to give full play to the advantages of network communication, experience, and sharing, listen to the will of the people, benefit the people’s livelihood, solve the people’s worries, and unite the social consensus. Online and offline networks should be united and coordinated, forming a good situation for jointly preventing social risks and building a concentric circle together.

(8) Talent requirements: unrestricted talents

“The people are happy, the losers are falling.” Xi Jinping stressed that to build a network power, we must bring together talent resources and build a strong team with strong politics, good business and good work style. “A thousand troops are easy to get, and one will be hard to find.” It is necessary to train scientists, network technology leaders, engineers, and high-level innovation teams that have created world-class skills.

In terms of ideas, he pointed out that the competition in cyberspace is, in the final analysis, talent competition. Building a network power, there is no outstanding talent team, no talent creation, vitality, and it is difficult to succeed. After reading the talents, you can get twice the result with half the effort. Our brains have to turn around, not only paying attention to capital, but also paying attention to talents. The intensity of introducing talents should be further increased, and the steps of reforming the talent system should be further developed. The field of network information can be tested first, and research should be carried out to formulate ways to attract talents, train talents, and retain talents.

In terms of scope, he pointed out that the development of China’s online letter industry must fully mobilize the enthusiasm, initiative and creativity of entrepreneurs, experts, scholars and scientific and technological personnel. Entrepreneurs, experts, scholars, and scientific and technological personnel must have the responsibility of the state and social responsibility, and contribute their wisdom and strength to the development of the national network. Party committees and governments at all levels must respect knowledge and respect talents from the bottom of their hearts, create good conditions for talents to develop their intelligence, create a relaxed environment, and provide a broad platform.

In terms of methods, he pointed out that the Internet is mainly the cause of young people, and it is necessary to reduce talents. It is necessary to emancipate the mind, to recognize the talents, and to love the talents. To train netizen talents, we must make great efforts and make big money. We invite excellent teachers, compile excellent teaching materials, recruit outstanding students, and build a first-class cyberspace security college. Many talents in the Internet field are geeks and geniuses. They often do not take the usual routines and have many whimsy. There must be special policies for treating special talents, not requiring full blame, not arguing for seniority, and not using a ruler.

In terms of policy, he pointed out that it is necessary to adopt special policies, establish a personnel system and a salary system that adapt to the characteristics of online letters, and condense outstanding talents into technical departments, research departments, and management departments. It is necessary to establish a talent evaluation mechanism that adapts to the characteristics of online letters. The actual ability is the standard of measurement. It is not only academic, not only a thesis, not only a qualification, but also highlights professionalism, innovation and practicality. It is necessary to establish a flexible talent incentive mechanism to enable those who contribute to have a sense of accomplishment and a sense of acquisition. It is necessary to explore scientific research results, intellectual property rights, and interest distribution mechanisms in the field of online information, and formulate specific policies on talent stock participation, technology shareholding, and taxation. In the flow of talents, we must break the institutional boundaries and enable talents to achieve an orderly and smooth flow between the government, enterprises, and think tanks. The advantages of the “revolving door” system in foreign countries can also be used for reference.

At the station, he pointed out that there must be a global perspective on talent selection and the introduction of high-end talents. As China’s comprehensive national strength continues to increase, many countries’ talents also hope to come to China for development. We must take advantage of the trend, reform talents to introduce various supporting systems, and build a globally competitive talent system. No matter which country or region, as long as it is a good talent, it can be used for me. This work has been done by some enterprises and research institutes. I went to some enterprises and research institutes, and also talked with these talents imported from abroad. In this regard, we must increase our efforts to continuously improve our ability to allocate talent resources globally.

(9) Industry requirements: focus on self-discipline and healthy development

The development of a company is directly proportional to its social responsibility. Xi Jinping pointed out that China’s Internet enterprises have played an important role in stabilizing growth, promoting employment, and benefiting people’s livelihood, from small to large, from weak to strong. Let the company continue to develop healthily is not only the goal of entrepreneurs but also the needs of national development. The fate of a company is closely related to the development of the country. It is difficult to become stronger and bigger than the support of the state, the disengagement of the masses, and the service to the country and the people.

How to be stronger and bigger? Xi Jinping pointed out the direction: internally, it is necessary to introduce policies to support the development of enterprises, so that they become the main body of technological innovation and become the main body of information industry development. Externally, we must encourage and support China’s network enterprises to go out, deepen Internet international exchanges and cooperation, and actively participate in the construction of the “Belt and Road” to achieve “where the national interests are and where informationization will be covered”. Foreign Internet companies, as long as they comply with our laws and regulations, we are welcome.

How to avoid the phenomenon of “disconnecting one after another, killing one tube” that has often appeared in the past, and embarking on a new road of joint management and benign interaction? Xi Jinping gave the idea: First, insist on encouraging support and standard development in parallel. Enterprises should be encouraged and supported to become the main body of R&D, the main body of innovation, and the main body of industry. Encourage and support the cutting-edge technology of enterprise layout, promote independent innovation of core technologies, create and seize more opportunities, participate in international competition, and expand overseas development space. It is necessary to regulate market order and encourage healthy competition. The Fourth Plenary Session of the 18th CPC Central Committee proposed to improve the system of property rights protection with fairness as the core principle, strengthen the protection of property rights of various ownership economic organizations and natural persons, and clean up laws and regulations that violate fairness. These requirements should be put in place as soon as possible. Second, adhere to policy guidance and management according to law. The government should create a favorable environment for enterprise development, accelerate the reform of the examination and approval system, financing system, and patent system, reduce duplication of testing and certification, implement a high-quality and high-price government procurement system, reduce the burden on enterprises, and remove institutional and institutional obstacles. At the same time, it is necessary to speed up the process of network legislation, improve the regulatory measures according to law, and resolve network risks. It is necessary to strengthen the management of big data in accordance with the law. Third, adhere to both economic and social benefits. Only a wealth of love is a truly meaningful asset. Only a company that actively assumes social responsibility is the most competitive and vital enterprise. It is hoped that the vast number of Internet companies will adhere to the unity of economic and social benefits, and at the same time of their own development, drink water and source, return the society and benefit the people. We must encourage and support our networked enterprises to go out, deepen the international exchanges and cooperation in the Internet, and actively participate in the construction of the “Belt and Road” to achieve “where the national interests are and where informationization will be covered”. Foreign Internet companies, as long as they comply with our laws and regulations, we are welcome.

(10) International requirements: building a community of destiny

With the multi-polarization of the world, economic globalization, cultural diversity, and in-depth development of social information, the Internet will play a greater role in promoting the progress of human civilization. At the same time, problems such as unbalanced development in the Internet field, unsound rules, and unreasonable order have become increasingly prominent. The information gap between different countries and regions is constantly widening. Existing cyberspace governance rules are difficult to reflect the wishes and interests of most countries; violations of personal privacy, intellectual property rights, cybercrime, etc. occur worldwide, network monitoring, cyber attacks, networks Terrorism and other activities have become global public nuisances.

Faced with these problems and challenges, the international community should strengthen dialogue and cooperation on the basis of mutual respect and mutual trust, promote the reform of the global governance system of the Internet, and jointly build a cyberspace of peace, security, openness and cooperation, and establish multilateral, democratic and transparent. The global Internet governance system. It is proposed that “China is willing to work with the international community to adhere to the common prosperity of mankind, adhere to the concept of cyber sovereignty, promote global Internet governance in a more just and rational direction, and promote cyberspace to achieve equal respect, innovative development, open sharing, and security. The goal of the order.”

“The way of benefit is to go with time.” Cyberspace is the common space for human activities. The future of cyberspace should be mastered by all countries in the world. To promote the reform of the global Internet governance system, we should adhere to the four principles. Respect network sovereignty. Maintain peace and security. Promote open cooperation. Build a good order. Countries should strengthen communication, expand consensus, deepen cooperation, and jointly build a community of cyberspace destiny. In this regard, I would like to make five points. First, accelerate the construction of global network infrastructure and promote interconnection. Second, create an online cultural exchange and sharing platform to promote exchanges and mutual learning. Third, promote the innovation and development of the network economy and promote common prosperity. Fourth, safeguard network security and promote orderly development. Fifth, build an Internet governance system to promote fairness and justice. It has won the approval of most countries in the world.

Xi Jinping pointed out that the Internet is the common home of mankind and works together to build a community of cyberspace destiny. It is the common responsibility of the international community to make this home more beautiful, cleaner and safer. Let us join hands to jointly promote the interconnection and sharing of cyberspace, share common governance, and help create a better future for human development!

Original Mandarin Chinese:

黨的十八大以來,以習近平同志為核心的黨中央高度重視、大力推進網絡安全和信息化工作,深刻把握人類社會發展信息時代階段特徵,客觀分析當前我國互聯網發展基本國情及全球互聯網發展新形勢,先後發表了一系列重要講話,提出了一系列治網新理念新思想新論斷,科學回答了“為什麼要建設網絡強國、建設什麼樣的網絡強國以及怎樣建設網絡強國”這一重大問題,形成了習近平網絡強國戰略思想。認真學習這些新思想,對於推進網絡強國建設,實現“兩個一百年”奮鬥目標和中華民族偉大復興的中國夢具有重要意義。

一、為什麼建設網絡強國

2014年2月27日,習近平總書記在中央網絡安全和信息化領導小組第一次會議上初步提出了建設網絡強國的願景目標,並系統闡釋了網絡強國戰略思想的時代背景、形勢任務、內涵要求,從而使這一思想成為相對完整、系統的理論體系。

習近平提出網絡強國戰略思想的有著嚴謹的邏輯關係,從網絡大國的基礎出發,鑑於網信事業事關全局和麵臨的新形勢轉變,尤其是客觀剖析了存在的差距,堅定了建設網絡強國的戰略目標。習近平在講話中指出,當今世界,信息技術革命日新月異,對國際政治、經濟、文化、社會、軍事等領域發展產生了深刻影響。信息化和經濟全球化相互促進,互聯網已經融入社會生活方方面面,深刻改變了人們的生產和生活方式。我國正處在這個大潮之中,受到的影響越來越深。我國互聯網和信息化工作取得了顯著發展成就,網絡走入千家萬戶,網民數量世界第一,我國已成為網絡大國。這是我們的基礎前提。他指出,互聯網是一個社會信息大平台,億萬網民在上面獲得信息、交流信息,這會對他們的求知途徑、思維方式、價值觀念產生重要影響,特別是會對他們對國家、對社會、對工作、對人生的看法產生重要影響。習近平強調,網絡安全和信息化對一個國家很多領域都是牽一發而動全身的,要認清我們面臨的形勢和任務,充分認識做好工作的重要性和緊迫性,因勢而謀,應勢而動,順勢而為。這是事關全局。習近平指出,隨著互聯網特別是移動互聯網發展,社會治理模式正在從單向管理轉向雙向互動,從線下轉向線上線下融合,從單純的政府監管向更加註重社會協同治理轉變。這是形勢轉變。當今世界,信息化發展很快,不進則退,慢進亦退。同世界先進水平相比,同建設網絡強國戰略目標相比,我們在很多方面還有不小差距,特別是在互聯網創新能力、基礎設施建設、信息資源共享、產業實力等方面還存在不小差距,其中最大的差距在核心技術上。

二、建設什麼樣的網絡強國

習近平指出,沒有網絡安全就沒有國家安全,沒有信息化就沒有現代化。建設網絡強國,要有自己的技術,有過硬的技術;要有豐富全面的信息服務,繁榮發展的網絡文化;要有良好的信息基礎設施,形成實力雄厚的信息經濟;要有高素質的網絡安全和信息化人才隊伍;要積極開展雙邊、多邊的互聯網國際交流合作。他還強調,網絡空間是億萬民眾共同的精神家園。網絡空間天朗氣清、生態良好,符合人民利益。網絡空間烏煙瘴氣、生態惡化,不符合人民利益。

概括地講,網絡強國至少有六大標誌:一是網絡信息化基礎設施要處於世界領先水平。二是要有明確的網絡空間戰略和國際社會中的網絡話語權。三是關鍵技術上要自主可控,特別是操作系統和CPU技術。四是網絡安全要有足夠的保障手段和能力。五是網絡應用在規模、質量等方面要處在世界領先水平。六是在網絡空間戰略中,要有佔領制高點的能力和實力。

《國家信息化戰略綱要》提出,建設網絡強國具體分三步走:第一步到2020年,信息消費總額達到6萬億元,電子商務交易規模達到38萬億元,核心關鍵技術部分領域達到國際先進水平,信息產業國際競爭力大幅提升,信息化成為驅動現代化建設的先導力量;第二步到2025年,信息消費總額達到12萬億元,電子商務交易規模達到67萬億元,建成國際領先的移動通信網絡,根本改變核心關鍵技術受制於人的局面,實現技術先進、產業發達、應用領先、網絡安全堅不可摧的戰略目標,湧現一批具有強大國際競爭力的大型跨國網信企業;第三步到本世紀中葉,信息化全面支撐富強民主文明和諧的社會主義現代化國家建設,網絡強國地位日益鞏固,在引領全球信息化發展方面有更大作為。

習近平規劃了建設網絡強國的時間表,建設網絡強國的戰略部署要與“兩個一百年”奮鬥目標同步推進,向著網絡基礎設施基本普及、自主創新能力顯著增強、信息經濟全面發展、網絡安全保障有力的目標不斷前進。

三、怎樣建設網絡強國

(一)根本要求:以人民為中心

治國有常,而利民為本。習近平強調,網信事業要發展,必須貫徹以人民為中心的發展思想。要適應人民期待和需求,加快信息化服務普及,降低應用成本,為老百姓提供用得上、用得起、用得好的信息服務,讓億萬人民在共享互聯網發展成果上有更多獲得感。相比城市,農村互聯網基礎設施建設是我們的短板。要加大投入力度,加快農村互聯網建設步伐,擴大光纖網、寬帶網在農村的有效覆蓋。可以做好信息化和工業化深度融合這篇大文章,發展智能製造,帶動更多人創新創業;可以瞄準農業現代化主攻方向,提高農業生產智能化、經營網絡化水平,幫助廣大農民增加收入;可以發揮互聯網優勢,實施“互聯網+教育”、“互聯網+醫療”、“互聯網+文化”等,促進基本公共服務均等化;可以發揮互聯網在助推脫貧攻堅中的作用,推進精準扶貧、精準脫貧,讓更多困難群眾用上互聯網,讓農產品通過互聯網走出鄉村,讓山溝裡的孩子也能接受優質教育;可以加快推進電子政務,鼓勵各級政府部門打破信息壁壘、提升服務效率,讓百姓少跑腿、信息多跑路,解決辦事難、辦事慢、辦事繁的問題,等等。這些方面有很多事情可做,一些互聯網企業已經做了嘗試,取得了較好的經濟效益和社會效益。

2016年11月29日,全國網絡扶貧工作現場推進會在江西寧都召開。 “要實施網絡扶貧行動,推進精準扶貧、精準脫貧,讓扶貧工作隨時隨地、四通八達,讓貧困地區群眾在互聯網共建共享中有更多獲得感”,習總書記這一重要指示在紅色革命老區再次宣示,網絡扶貧成為決勝全面小康的新槓桿。

(二)理念要求:踐行五大發展理念先行一步

黨的十八屆五中全會提出了創新、協調、綠色、開放、共享的新發展理念,這是在深刻總結國內外發展經驗教訓、深入分析國內外發展大勢的基礎上提出的,集中反映了我們黨對我國經濟社會發展規律的新認識。按照新發展理念推動我國經濟社會發展,是當前和今後一個時期我國發展的總要求和大趨勢。古人說:“隨時以舉事,因資而立功,用萬物之能而獲利其上。”我國網信事業發展要適應這個大趨勢。總體上說,網信事業代表著新的生產力、新的發展方向,應該也能夠在踐行新發展理念上先行一步。

創新是網信事業發展的核心力量。創新是互聯網發展的基因。互聯網的理念創新、技術創新是自身發展的需要,在互聯網大潮中不進則退,沒有創新就沒有生存空間。要始終把創新擺在首要位置,推動體制機制創新、理念創新、技術創新、應用創新,支持鼓勵互聯網企業家、領軍人才和工程技術人員創新創造,為互聯網發展提供不竭動力。習近平在第二屆世界互聯網大會上指出:“中國正在實施‘互聯網+’行動計劃,推進‘數字中國’建設,發展分享經濟,支持基於互聯網的各類創新,提高發展質量和效益。”

協調是網信事業發展的內在要求。無論是國內還是國外,都存在網絡安全和信息化發展不平衡、不協調的問題,解決這些問題,就要樹立協調發展的理念,消除數字鴻溝,縮小城鄉差異、地區差異,保障信息安全,實現均衡發展、全面發展、安全發展。習近平在中央網絡安全和信息化領導小組第一次會議上指出:“要從國際國內大勢出發,總體佈局,統籌各方,創新發展,努力把我國建設成為網絡強國。”

綠色發展是網信事業健康發展的重要保障。信息化產業就是綠色產業,信息化、網絡化正支撐著工業、農業、國防等各個領域的應用和升級,推動著綠色發展、低碳發展、循環發展。要弘揚主旋律,傳播正能量,使網絡空間清朗起來。在2016年4月19日的座談會上習近平指出:“網絡空間天朗氣清、生態良好,符合人民利益。網絡空間烏煙瘴氣、生態惡化,不符合人民利益。” 他還強調:“我們要本著對社會負責、對人民負責的態度,依法加強網絡空間治理,加強網絡內容建設,做強網上正面宣傳,培育積極健康、向上向善的網絡文化,用社會主義核心價值觀和人類優秀文明成果滋養人心、滋養社會,做到正能量充沛、主旋律高昂,為廣大網民特別是青少年營造一個風清氣正的網絡空間。”

開放是網信事業發展的本質特徵。互聯網打開了世界各國開放的大門。習近平指出:“互聯網讓世界變成了’雞犬之聲相聞’的地球村,相隔萬里的人們不再’老死不相往來’。可以說,世界因互聯網而更多彩,生活因互聯網而更豐富。”中國互聯網事業的發展離不開世界,世界的互聯網事業也離不開中國。習近平在第二屆世界互聯網大會上指出:“中國互聯網蓬勃發展,為各國企業和創業者提供了廣闊市場空間。中國開放的大門永遠不會關上,利用外資的政策不會變,對外商投資企業合法權益的保障不會變,為各國企業在華投資興業提供更好服務的方向不會變。”他還強調:“各國應該推進互聯網領域開放合作,豐富開放內涵,提高開放水平,搭建更多溝通合作平台,創造更多利益契合點、合作增長點、共贏新亮點,推動彼此在網絡空間優勢互補、共同發展,讓更多國家和人民搭乘信息時代的快車、共享互聯網發展成果。”我們要積極參與國際互聯網交流與合作,學習借鑒世界各國先進經驗和技術成果,把握和引領國際互聯網發展趨勢,推動網絡空間開放合作、互利共贏。

共享是網信事業發展的根本宗旨。服務百姓、惠及民生是我國互聯網發展的根本出發點和落腳點。習近平強調:“網信事業要發展,必須貫徹以人民為中心的發展思想。要適應人民期待和需求,加快信息化服務普及,降低應用成本,為老百姓提供用得上、用得起、用得好的信息服務,讓億萬人民在共享互聯網發展成果上有更多獲得感。”我們要推動網絡走進千家萬戶,引導人民群眾通過互聯網了解世界、掌握信息、交流思想、創新創業、改善生活,讓互聯網發展成果不僅惠及13億中國人民,同時也造福於世界各國人民。

(三)治理要求:安全與發展齊頭並進

2014年,習近平在中央網絡安全和信息化領導小組第一次會議上就特別強調,“要維護網絡空間安全以及網絡數據的完整性、安全性、可靠性,提高維護網絡空間安全能力。”同時,他還要求統籌好網絡安全和信息化的關係,“網絡安全和信息化是一體之兩翼、驅動之雙輪,必須統一謀劃、統一部署、統一推進、統一實施。做好網絡安全和信息化工作,要處理好安全和發展的關係,做到協調一致、齊頭並進,以安全保發展、以發展促安全,努力建久安之勢、成長治之業。” 兩年之後的座談會上,他再次指出,“網絡安全和信息化是相輔相成的。安全是發展的前提,發展是安全的保障,安全和發展要同步推進。從世界範圍看,網絡安全威脅和風險日益突出,並日益向政治、經濟、文化、社會、生態、國防等領域傳導滲透。特別是國家關鍵信息基礎設面臨較大風險隱患,網絡安全防控能力薄弱,難以有效應對國家級、有組織的高強度網絡攻擊。這對世界各國都是一個難題,我們當然也不例外。”

此外,他指出“面對複雜嚴峻的網絡安全形勢,我們要保持清醒頭腦,各方面齊抓共管,切實維護網絡安全。”第一,樹立正確的網絡安全觀。理念決定行動。當今的網絡安全,有幾個主要特點。一是網絡安全是整體的而不是割裂的。二是網絡安全是動態的而不是靜態的。三是網絡安全是開放的而不是封閉的。四是網絡安全是相對的而不是絕對的。五是網絡安全是共同的而不是孤立的。第二,加快構建關鍵信息基礎設施安全保障體系。第三,全天候全方位感知網絡安全態勢。第四,增強網絡安全防禦能力和威懾能力。

(四)幹部要求:走好網絡群眾路線,共築同心圓

群眾路線是我們黨的根本路線。習近平指出,“網民來自老百姓,老百姓上了網,民意也就上了網。群眾在哪兒,我們的領導幹部就要到哪兒去,不然怎麼聯繫群眾呢?各級黨政機關和領導幹部要學會通過網絡走群眾路線,經常上網看看,潛潛水、聊聊天、發發聲,了解群眾所思所願,收集好想法好建議,積極回應網民關切、解疑釋惑。善於運用網絡了解民意、開展工作,是新形勢下領導幹部做好工作的基本功。”

如何走好網絡群眾路線?習近平給出了方法,“網民大多數是普通群眾,來自四面八方,各自經歷不同,觀點和想法肯定是五花八門的,不能要求他們對所有問題都看得那麼準、說得那麼對。要多一些包容和耐心,對建設性意見要及時吸納,對困難要及時幫助,對不了解情況的要及時宣介,對模糊認識要及時廓清,對怨氣怨言要及時化解,對錯誤看法要及時引導和糾正,讓互聯網成為我們同群眾交流溝通的新平台,成為了解群眾、貼近群眾、為群眾排憂解難的新途徑,成為發揚人民民主、接受人民監督的新渠道。”

同時習近平指出各級幹部的努力方向,“要正確處理安全和發展、開放和自主、管理和服務的關係,不斷提高對互聯網規律的把握能力、對網絡輿論的引導能力、對信息化發展的駕馭能力、對網絡安全的保障能力,把網絡強國建設不斷推向前進。”

(五)管理要求:統一領導,依法管理

中共中央政治局就實施網絡強國戰略進行第三十六次集體學習。加快提高網絡管理水平。

習近平從體制機制上提出了要求,他強調,中央網絡安全和信息化領導小組要發揮集中統一領導作用,統籌協調各個領域的網絡安全和信息化重大問題,制定實施國家網絡安全和信息化發展戰略、宏觀規劃和重大政策,不斷增強安全保障能力。

從管理思路上作出了指示,在我國,7億多人上互聯網,肯定需要管理,而且這個管理是很複雜、很繁重的。企業要承擔企業的責任,黨和政府要承擔黨和政府的責任,哪一邊都不能放棄自己的責任。要深刻認識互聯網在國家管理和社會治理中的作用,以推行電子政務、建設新型智慧城市等為抓手,以數據集中和共享為途徑,建設全國一體化的國家大數據中心,推進技術融合、業務融合、數據融合,實現跨層級、跨地域、跨系統、跨部門、跨業務的協同管理和服務。要強化互聯網思維,利用互聯網扁平化、交互式、快捷性優勢,推進政府決策科學化、社會治理精準化、公共服務高效化,用信息化手段更好感知社會態勢、暢通溝通渠道、輔助決策施政。

從立法規範上指明了方向,要抓緊制定立法規劃,完善互聯網信息內容管理、關鍵信息基礎設施保護等法律法規,依法治理網絡空間,維護公民合法權益。要嚴密防範網絡犯罪特別是新型網絡犯罪,維護人民群眾利益和社會和諧穩定。要加快網絡立法進程,完善依法監管措施,化解網絡風險。要依法加強對大數據的管理。一些涉及國家利益、國家安全的數據,很多掌握在互聯網企業手裡,企業要保證這些數據安全。企業要重視數據安全。如果企業在數據保護和安全上出了問題,對自己的信譽也會產生不利影響。

並對全社會提出了希望,網絡安全為人民,網絡安全靠人民,維護網絡安全是全社會共同責任,需要政府、企業、社會組織、廣大網民共同參與,共築網絡安全防線。這幾個特點,各有關方面要好好把握。

(六)保障要求:技術突破,建設基礎設施和共享體系

習近平強調,我們要掌握我國互聯網發展主動權,保障互聯網安全、國家安全,就必須突破核心技術這個難題,爭取在某些領域、某些方面實現“彎道超車”。核心技術要取得突破,就要有決心、恆心、重心。他希望,我國網信領域廣大企業家、專家學者、科技人員要樹立這個雄心壯志,要爭這口氣,努力盡快在核心技術上取得新的重大突破。正所謂“日日行,不怕千萬里;常常做,不怕千萬事”。

習近平強調,要緊緊牽住核心技術自主創新這個“牛鼻子”,抓緊突破網絡發展的前沿技術和具有國際競爭力的關鍵核心技術,加快推進國產自主可控替代計劃,構建安全可控的信息技術體系。第一,正確處理開放和自主的關係。第二,在科研投入上集中力量辦大事。第三,積極推動核心技術成果轉化。第四,推動強強聯合、協同攻關。第五,可以探索組建產學研用聯盟、揭榜掛帥。要打好核心技術研發攻堅戰,不僅要把衝鋒號吹起來,而且要把集合號吹起來,也就是要把最強的力量積聚起來共同幹,組成攻關的突擊隊、特種兵。

習近平強調,要加快構建關鍵信息基礎設施安全保障體系。金融、能源、電力、通信、交通等領域的關鍵信息基礎設施是經濟社會運行的神經中樞,是網絡安全的重中之重,也是可能遭到重點攻擊的目標。 “物理隔離”防線可被跨網入侵,電力調配指令可被惡意篡改,金融交易信息可被竊取,這些都是重大風險隱患。不出問題則已,一出就可能導致交通中斷、金融紊亂、電力癱瘓等問題,具有很大的破壞性和殺傷力。我們必須深入研究,採取有效措施,切實做好國家關鍵信息基礎設施安全防護。

同時,他指出,要以信息化推進國家治理體系和治理能力現代化,統籌發展電子政務,構建一體化在線服務平台,分級分類推進新型智慧城市建設,打通信息壁壘,構建全國信息資源共享體系,更好用信息化手段感知社會態勢、暢通溝通渠道、輔助科學決策。

(七)宣傳要求:重中之重,凝聚共識

習近平指出,我們要本著對社會負責、對人民負責的態度,依法加強網絡空間治理,加強網絡內容建設,做強網上正面宣傳,培育積極健康、向上向善的網絡文化,用社會主義核心價值觀和人類優秀文明成果滋養人心、滋養社會,做到正能量充沛、主旋律高昂,為廣大網民特別是青少年營造一個風清氣正的網絡空間。

做好網上輿論工作是一項長期任務,要創新改進網上宣傳,運用網絡傳播規律,弘揚主旋律,激發正能量,大力培育和踐行社會主義核心價值觀,把握好網上輿論引導的時、度、效,使網絡空間清朗起來。

形成良好網上輿論氛圍,不是說只能有一個聲音、一個調子,而是說不能搬弄是非、顛倒黑白、造謠生事、違法犯罪,不能超越了憲法法律界限。要把權力關進制度的籠子裡,一個重要手段就是發揮輿論監督包括互聯網監督作用。這一條,各級黨政機關和領導幹部特別要注意,首先要做好。對網上那些出於善意的批評,對互聯網監督,不論是對黨和政府工作提的還是對領導幹部個人提的,不論是和風細雨的還是忠言逆耳的,我們不僅要歡迎,而且要認真研究和吸取。

習近平指出,互聯網新技術新應用不斷發展,使互聯網的社會動員功能日益增強。要傳播正能量,提升傳播力和引導力。要嚴密防範網絡犯罪特別是新型網絡犯罪,維護人民群眾利益和社會和諧穩定。要發揮網絡傳播互動、體驗、分享的優勢,聽民意、惠民生、解民憂,凝聚社會共識。網上網下要同心聚力、齊抓共管,形成共同防範社會風險、共同構築同心圓的良好局面。要維護網絡空間安全以及網絡數據的完整性、安全性、可靠性,提高維護網絡空間安全能力。

習近平指出,互聯網新技術新應用不斷發展,使互聯網的社會動員功能日益增強。要傳播正能量,提升傳播力和引導力。要發揮網絡傳播互動、體驗、分享的優勢,聽民意、惠民生、解民憂,凝聚社會共識。網上網下要同心聚力、齊抓共管,形成共同防範社會風險、共同構築同心圓的良好局面。

(八)人才要求:不拘一格降人才

“得人者興,失人者崩。”習近平強調,建設網絡強國,要把人才資源匯聚起來,建設一支政治強、業務精、作風好的強大隊伍。 “千軍易得,一將難求”,要培養造就世界水平的科學家、網絡科技領軍人才、卓越工程師、高水平創新團隊。

思路上,他指出,網絡空間的競爭,歸根結底是人才競爭。建設網絡強國,沒有一支優秀的人才隊伍,沒有人才創造力迸發、活力湧流,是難以成功的。念好了人才經,才能事半功倍。我們的腦子要轉過彎來,既要重視資本,更要重視人才,引進人才力度要進一步加大,人才體制機制改革步子要進一步邁開。網信領域可以先行先試,抓緊調研,制定吸引人才、培養人才、留住人才的辦法。

範圍上,他指出,我國網信事業發展,必須充分調動企業家、專家學者、科技人員積極性、主動性、創造性。企業家、專家學者、科技人員要有國家擔當、社會責任,為促進國家網信事業發展多貢獻自己的智慧和力量。各級黨委和政府要從心底里尊重知識、尊重人才,為人才發揮聰明才智創造良好條件,營造寬鬆環境,提供廣闊平台。

方法上,他指出,互聯網主要是年輕人的事業,要不拘一格降人才。要解放思想,慧眼識才,愛才惜才。培養網信人才,要下大功夫、下大本錢,請優秀的老師,編優秀的教材,招優秀的學生,建一流的網絡空間安全學院。互聯網領域的人才,不少是怪才、奇才,他們往往不走一般套路,有很多奇思妙想。對待特殊人才要有特殊政策,不要求全責備,不要論資排輩,不要都用一把尺子衡量。

政策上,他指出,要採取特殊政策,建立適應網信特點的人事制度、薪酬制度,把優秀人才凝聚到技術部門、研究部門、管理部門中來。要建立適應網信特點的人才評價機制,以實際能力為衡量標準,不唯學歷,不唯論文,不唯資歷,突出專業性、創新性、實用性。要建立靈活的人才激勵機制,讓作出貢獻的人才有成就感、獲得感。要探索網信領域科研成果、知識產權歸屬、利益分配機制,在人才入股、技術入股以及稅收方面製定專門政策。在人才流動上要打破體制界限,讓人才能夠在政府、企業、智庫間實現有序順暢流動。國外那種“旋轉門”制度的優點,我們也可以藉鑑。

站位上,他指出,在人才選拔上要有全球視野,下大氣力引進高端人才。隨著我國綜合國力不斷增強,有很多國家的人才也希望來我國發展。我們要順勢而為,改革人才引進各項配套制度,構建具有全球競爭力的人才制度體系。不管是哪個國家、哪個地區的,只要是優秀人才,都可以為我所用。這項工作,有些企業、科研院所已經做了,我到一些企業、科研院所去,也同這些從國外引進的人才進行過交談。這方面要加大力度,不斷提高我們在全球配置人才資源能力。

(九)行業要求:注重自律和健康發展

企業的發展與其承擔的社會責任是成正比的。習近平指出,我國互聯網企業由小到大、由弱變強,在穩增長、促就業、惠民生等方面發揮了重要作用。讓企業持續健康發展,既是企業家奮鬥的目標,也是國家發展的需要。企業命運與國家發展息息相關。脫離了國家支持、脫離了群眾支持,脫離了為國家服務、為人民服務,企業難以做強做大。

如何做強做大?習近平指明了方向:對內,要出台支持企業發展的政策,讓他們成為技術創新主體,成為信息產業發展主體。對外,要鼓勵和支持我國網信企業走出去,深化互聯網國際交流合作,積極參與“一帶一路”建設,做到“國家利益在哪裡,信息化就覆蓋到哪裡”。外國互聯網企業,只要遵守我國法律法規,我們都歡迎。

如何避免過去經常出現的“一放就亂、一管就死”現象,走出一條齊抓共管、良性互動的新路?習近平給出了思路:第一,堅持鼓勵支持和規範發展並行。應該鼓勵和支持企業成為研發主體、創新主體、產業主體,鼓勵和支持企業佈局前沿技術,推動核心技術自主創新,創造和把握更多機會,參與國際競爭,拓展海外發展空間。要規範市場秩序,鼓勵進行良性競爭。黨的十八屆四中全會提出健全以公平為核心原則的產權保護製度,加強對各種所有製經濟組織和自然人財產權的保護,清理有違公平的法律法規條款。這些要求要盡快落實到位。第二,堅持政策引導和依法管理並舉。政府要為企業發展營造良好環境,加快推進審批制度、融資制度、專利制度等改革,減少重複檢測認證,施行優質優價政府採購制度,減輕企業負擔,破除體制機制障礙。同時,要加快網絡立法進程,完善依法監管措施,化解網絡風險。要依法加強對大數據的管理。第三,堅持經濟效益和社會效益並重。只有富有愛心的財富才是真正有意義的財富,只有積極承擔社會責任的企業才是最有競爭力和生命力的企業。希望廣大互聯網企業堅持經濟效益和社會效益統一,在自身發展的同時,飲水思源,回報社會,造福人民。我們要鼓勵和支持我國網信企業走出去,深化互聯網國際交流合作,積極參與“一帶一路”建設,做到“國家利益在哪裡,信息化就覆蓋到哪裡”。外國互聯網企業,只要遵守我國法律法規,我們都歡迎。

(十)國際要求:共建命運共同體

隨著世界多極化、經濟全球化、文化多樣化、社會信息化深入發展,互聯網對人類文明進步將發揮更大促進作用。同時,互聯網領域發展不平衡、規則不健全、秩序不合理等問題日益凸顯。不同國家和地區信息鴻溝不斷拉大,現有網絡空間治理規則難以反映大多數國家意願和利益;世界範圍內侵害個人隱私、侵犯知識產權、網絡犯罪等時有發生,網絡監聽、網絡攻擊、網絡恐怖主義活動等成為全球公害。

面對這些問題和挑戰,國際社會應該在相互尊重、相互信任的基礎上,加強對話合作,推動互聯網全球治理體系變革,共同構建和平、安全、開放、合作的網絡空間,建立多邊、民主、透明的全球互聯網治理體系。提出“中國願同國際社會一道,堅持以人類共同福祉為根本,堅持網絡主權理念,推動全球互聯網治理朝著更加公正合理的方向邁進,推動網絡空間實現平等尊重、創新發展、開放共享、安全有序的目標。”

“凡益之道,與時偕行。”網絡空間是人類共同的活動空間,網絡空間前途命運應由世界各國共同掌握。推進全球互聯網治理體系變革,應該堅持四項原則。尊重網絡主權。維護和平安全。促進開放合作。構建良好秩序。各國應該加強溝通、擴大共識、深化合作,共同構建網絡空間命運共同體。對此,我願提出5點主張。第一,加快全球網絡基礎設施建設,促進互聯互通。第二,打造網上文化交流共享平台,促進交流互鑑。第三,推動網絡經濟創新發展,促進共同繁榮。第四,保障網絡安全,促進有序發展。第五,構建互聯網治理體系,促進公平正義。贏得了世界絕大多數國家贊同。

習近平指出,互聯網是人類的共同家園,攜手構建網絡空間命運共同體。讓這個家園更美麗、更乾淨、更安全,是國際社會的共同責任。讓我們攜起手來,共同推動網絡空間互聯互通、共享共治,為開創人類發展更加美好的未來助力!

Original Referring URL:  http://theory.people.com.cn/n1/

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar // 中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar //

中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Author: Source: Netease military

DTG: 2016-01-04 08:XX:XX

Strategic support forces are not logistical support or more powerful than the Rockets. Three tears on, how effective has China’s SSF become in the realm of cyber warfare?

Abstract: On December 31, 2015, the PLA Army Leadership, Rocket Army, and Strategic Support Forces were established. Xi Jinping, General Secretary of the CPC Central Committee, President of the State Council, and Chairman of the Central Military Commission, awarded the newly established three major units. The major steps marking the reform of the PLA’s army are beginning to be gradually implemented. Among the three new units, the strategic support force is definitely a brand new name, which naturally raises many questions. What kind of force is this?

The strategic support force should be called Skynet Army: it will change the war.

Strategic support is not logistical support

The newly established three units, the Army’s leading body is also the Army’s headquarters. The former PLA has always been the army’s boss. The mainland’s thinking is deeply rooted. Therefore, only the navy and air force headquarters, and no army command, the top leaders of the army are all from The army, the head of the navy and air force ranks among the members of the Central Military Commission, and it is more symbolic. The establishment of the Army Headquarters now means that the status of the Army will gradually be lowered and will be consistent with other services. This will lay the foundation for the model of the highest military leadership in the rotation of the heads of the Western military in the future, and further strengthen the synergy for the various services. The conditions.

The Rockets are no strangers to military fans. They are the former Second Artillery Corps, which is essentially a strategic missile force. The strategic missile unit of the former Soviet Union was called the Strategic Rocket Army. When the PLA established the strategic missile force, the international situation was surging. For the sake of low-key restraint, Zhou Enlai proposed the name of the Second Artillery. Now renamed the Rocket Army, the name is more prestige, more directly strengthen the significance of strategic deterrence.

Relative to the above two units, for those concerned about national defense construction, the strategic support force will be much more strange. When many people hear this name, the first reaction is the logistics support force, which is a big mistake! The strategic support force is actually a genuine combat force. It is nominally supportive. In many cases, it is the first open-minded pioneer to fight, even to enter the battlefield earlier than the land, sea, air force and rocket forces. According to the spokesman of the Ministry of National Defense, the strategic support force is a new type of combat force for safeguarding national security and an important growth point for our military’s new combat capability. It is mainly a strategic, basic, and supportive type. The support force is formed after the functional integration.

The strategic support force should be called Skynet Army: it will change the war.

Specifically, the strategic support force will include five parts: intelligence reconnaissance, satellite management, electronic countermeasures, cyber offense and defense, and psychological warfare. It is a combination of the most advanced corps, the net army, and other battlefields on the battlefield. More specifically, it is a combat force dedicated to the soft kill mission.

This is also the adjustment of the military reform at the military level. The PLA is divided into the traditional land, sea and air force, the strategic deterrent and the attacking rocket army and the most modern “sky-net” army. The three levels of division of labor are clear, and they can strengthen each other. The synergy between the two, to maximize the advantages of the overall war, is undoubtedly the highlight of this military reform.

Five major parts highlight high-tech content

Let’s take a closer look at the five major components of the Strategic Support Army. First, intelligence reconnaissance. This is not a spy war in the traditional sense. It is not like the old movie “The Crossing River Scout”, which disguise itself as a deep enemy. More is technical reconnaissance. With the increasing popularity of modern equipment, the leakage of various technical information is difficult to avoid, such as radio signals, electromagnetic signals, infrared signals, etc., through the collection and analysis of these signals, a large amount of valuable information can be obtained, strategic support forces The reconnaissance is mainly the technical reconnaissance in this respect, which can be carried out through modern equipment such as reconnaissance satellites, reconnaissance planes, drones, and sensors.

The strategic support force should be called Skynet Army: it will change the war.

Satellite management is the so-called “Heavenly Army”. This is a new type of force that has emerged with the rapid development of space technology, especially satellite information reconnaissance, tracking and surveillance, guided navigation and aerospace weapons. The United States established the National Space Command in 1985, marking the birth of the world’s first heavenly army. Russia subsequently separated the military space force and the space missile defense force from the strategic rocket army and established a space force with a total strength of about 90,000 people. Then with the military reform of the People’s Liberation Army, the “Heavenly Army” under the strategic support force was formally formed and became a force dedicated to space operations in the future. The significance is significant.

The history of electronic confrontation is much longer than that of the Tianjun. As early as in the First World War, both sides have had the information of the other party and the communication of the other party. To the Second World War, the means of electronic confrontation. Both the scale and the scale have been greatly developed. In July 1943, the British army used metal foil strips to interfere with the German radar in the bombing of Hamburg, Germany, which was considered the beginning of modern electronic confrontation. During the Middle East War in the 1960s, electronic confrontation played a decisive role. Under today’s technical conditions, there is no need to spend more on electronic countermeasures.

Network attack and defense is also called cyber warfare. It is the rise of the network, exploiting the loopholes and security flaws of the network to attack and destroy the data in the hardware, software and systems of the network system. In 2001, there was a large-scale civil hacking incident between China and the United States, which stimulated the United States to a certain extent. By 2009, the world’s first cyber command was established. Through the opportunity of military reform, China has set up a specialized cyber warfare force and began systematically investing and developing in the fields of information construction and network attack and defense. This is a milestone for the future war, which is bound to spread to the network. meaningful.

003

In the end, it is psychological warfare, that is, by applying the principle principle of psychology, taking human psychology as the battlefield, and systematically adopting various means, including the means of communication, such as the Internet, television, and broadcasting, which cannot be separated from modern life. Cognitive, emotional, and will exert influence, mentally disintegrating enemy military and civilian fighting spirits or eliminating the influence of enemy propaganda, thus combating the enemy’s mind, in exchange for the greatest victory and benefits at the least cost. Psychological warfare sounds very mysterious. In fact, as mentioned in “Sun Tzu’s Art of War·The Tactics”: “It is the victorious battle, the good ones who are not good, the soldiers who do not fight and the good, and the good ones.” The “war without a war” is the ultimate goal of today’s psychological war. In the Battle of Normandy in the Second World War, the Allies used a large number of psychological warfare methods, which seriously affected the judgment of the German commander-in-chief and made great contributions to the victory of the battle. Since then, from the Korean War, the Vietnam War, to today’s Iraq War and the Afghan War, the US military has had professional psychological warfare troops to participate in the war. Therefore, this is the most easily overlooked military means, but it is a high level of military struggle, and even more efficient and effective than advanced aircraft cannons.

Therefore, it can be said that the strategic support force is the highest in the five major services after the reform of the PLA’s army. It can even be said to be completely different from the traditional war style of the past, and it is more characterized by ultra-modern flow.

004

Soft killing

According to the strategy disclosed on the network, the armbands are supported on the network. The above is the eight-and-five-pointed star. Below is the triangular arrow and the electronic cloud orbit. Surrounded by the surrounding wheat ears, it can be seen from this pattern that the strategic support force is not a traditional one. In the sense of steel contest, you can’t see the scene of the smoke, and there is no such thing as a nuclear weapon to destroy the horror of the sea, but the soft kill of the soldiers. In a sense, soft killing is no less inferior than hard killing, and even playing a role is more important than hard killing.

In contrast, until today, the US military has only independent scattered Tianjun, Net Army and psychological warfare units, but the PLA Strategic Support Forces have integrated these units directly in the preparation, and they are able to cooperate and play the greatest combat effectiveness. . It can be said that this major reform of the military, especially the establishment of the strategic support force, is definitely a major improvement in the system.

Imagine that without the strategic support force’s satellites accurately positioned and navigated, without the electronic escaping forces and cyber warfare forces escorting, the Rocket’s strategic missiles will be difficult to function; if there is no strategic support for the technical reconnaissance intelligence support, Satellite communication links, then the land, sea and air forces on the vast battlefield are blind and deaf, and the combat effectiveness is greatly reduced. Therefore, the strategic support forces will play a major role in the invisible four-dimensional and five-dimensional battlefield space.

Original Mandarin Chinese:

战略支援部队可不是后勤支援,或比火箭军更厉害

摘要:2015年12月31日,解放军陆军领导机构、火箭军、战略支援部队成立,中共中央总书记、国家主席、中央军委主席习近平给新成立的这三大单位授旗。标志着此轮解放军军队改革重大步骤正开始逐步落实,在这三个新单位中,战略支援部队绝对是个全新的名称,自然会引起不少的疑问,这到底是支怎样的部队呢?

战略支援部队就应该叫天网军:将改变战争

战略支援可不是后勤支援

这次新成立的三个单位,陆军领导机构也就是陆军总部,原来解放军历来就是陆军老大,大陆军的思想根深蒂固,所以只有海军、空军司令部,而不设陆军司令部,军队最高领导全都出自陆军,海空军首长位列中央军委委员,也更多是象征意义。现在设立陆军总部,也就意味着陆军的地位逐渐下调,将和其他军种相一致,这为今后仿效西方各军种首长轮流担任军队最高领导的模式打下了基础,同时也对各军种进一步加强协同创造了条件。

火箭军对于军迷来说也是并不陌生,就是以前的第二炮兵,实质就是战略导弹部队。前苏联的战略导弹部队就叫战略火箭军,解放军成立战略导弹部队时,国际形势风起云涌,出于低调克制的考虑,由周恩来提议采用了第二炮兵的名称。现在改称火箭军,在名称上就威风多了,更直接地强化了战略威慑的意义。

相对上述两个单位,对于关心国防建设的人来说,战略支援部队就要陌生多了。很多人一听到这个名称,第一反应就是后勤支援部队,那就大错特错了!战略支援部队其实一样是货真价实的作战部队,名义上是支援,很多时候反而是第一个冲锋陷阵的开路先锋,甚至要比陆海空军和火箭军更早地投入战场。按照国防部发言人的话来说,战略支援部队是维护国家安全的新型作战力量,是我军新质作战能力的重要增长点,主要是将战略性、基础性、支撑性都很强的各类保障力量进行功能整合后组建而成。

战略支援部队就应该叫天网军:将改变战争

具体来说,战略支援部队将包括情报侦察、卫星管理、电子对抗、网络攻防、心理战等五大部分,是综合了这个时代最先进的天军、网军等看不见硝烟的战场上的作战部队,更确切地说是专门担负软杀伤使命的作战力量。

这也是此次军队改革在军种层面的调整,将解放军分为传统的陆海空军、战略威慑和打击的火箭军和最现代化的“天-网”军,三个层次分工明确,又能强化相互之间的协同配合,最大限度地发挥出整体战的优势,无疑是本次军队改革的重头戏。

五大部分凸现高科技含量

再来细看战略支援军的五大组成部分,先是情报侦察,这可不是传统意义上打入敌人内部的谍战无间道,也不是像老电影《渡江侦察记》那样乔装改扮深入敌后,而更多的是技术侦察。随着现代化装备越来越普遍,各种技术信息的泄漏很难避免,比如无线电信号、电磁信号、红外信号等等,通过对这些信号的搜集和分析就可以获取大量宝贵的情报,战略支援部队的侦察主要就是这方面的技术侦察,可以通过侦察卫星、侦察机、无人机、感应器等现代化装备来进行。

战略支援部队就应该叫天网军:将改变战争

卫星管理就是所谓的“天军”,这是随着航天技术的飞速发展,特别是卫星信息侦察、跟踪监视、制导导航及航天兵器的广泛应用,应运而生的新型部队。美国在1985年成立了全美航天司令部,标志着世界上第一支天军的诞生。俄罗斯随后也将军事航天部队和太空导弹防御部队从战略火箭军中分离出来,成立了一支总兵力约9万人的航天部队。那么随着解放军这次军事改革,隶属于战略支援部队的“天军”也正式组建,成为今后专门承担航天作战的部队,意义可谓重大。

电子对抗的历史就要比天军更为悠久,早在第一次世界大战中交战双方就都曾有过侦收对方的信息和干扰对方通信联络,到第二次世界大战,电子对抗的手段和规模都有了很大发展,1943年7月英军在对德国汉堡的轰炸中大规模使用金属箔条干扰德军雷达,被认为是现代电子对抗的开始。到60年代中东战争期间,电子对抗更是发挥了决定性的作用。在今天的技术条件下,电子对抗就不用再多费口舌了。

网络攻防也叫网络战,是随着网络的兴起,利用网络存在的漏洞和安全缺陷对网络系统的硬件、软件及其系统中的数据进行攻击和破坏。2001年中美之间就曾发生过大规模的民间黑客攻击事件,这在一定程度上刺激了美国,到2009年成立了世界上第一个网络司令部。中国此次借着军队改革的契机,组建了专业化的网络战部队,开始系统地在信息化建设和网络攻防领域进行投入和发展,这对于未来战争势必波及到网络的大趋势,是具有里程碑意义的。

003

最后则是心理战,也就是通过运用心理学的原理原则,以人类的心理为战场,有计划地采用各种手段,包括现代生活须臾不能脱离的网络、电视、广播等传播手段,对人的认知、情感和意志施加影响,从精神上瓦解敌方军民斗志或消除敌方宣传所造成的影响的对抗活动,从而打击敌方的心志,以最小的代价换取最大胜利和利益。心理战听起来很是玄乎,其实《孙子兵法·谋攻篇》中所提到的:“是故百战百胜,非善之善者也;不战而屈人之兵,善之善者也。” 这里的“不战而屈人之兵”就是今天心理战所要达到的终极目标。在第二次世界大战中的诺曼底登陆战役,盟军就曾运用了大量的心理战手段,严重影响干扰了德军统帅部的判断,为战役的胜利做出了巨大贡献。此后,从朝鲜战争、越南战争,直到今天的伊拉克战争和阿富汗战争,美军都曾有专业的心理战部队参战。因此,这是最容易被忽视的军事手段,但却是军事斗争的高级层次,甚至要比先进的飞机大炮更有效率和作用。

因此,可以说战略支援部队是解放军军队改革之后五大军种中,高科技含量最高的,甚至可以说是完全不同于过去传统战争的样式,更多地带有超现代流的特色。

004

不容小觑的软杀伤

根据网络上披露的战略支援部队臂章图案,上面是八一五角星,下面是三角箭头和电子云轨道,周围是环绕的麦穗,从这个图案中就可以看出,战略支援部队并不是传统意义上钢铁的较量,看不到硝烟滚滚的场景,更没有核武器那样毁山灭海的恐怖威力,而是兵不血刃的软杀伤。从某种意义上来说,软杀伤丝毫并不比硬杀伤逊色,甚至所发挥的作用更要比硬杀伤重要。

相比之下,直到今天美军才只有独立分散的天军、网军和心理战部队,但解放军战略支援部队则将这些部队直接在编制上整合在一起,更能协同配合,发挥出最大的战斗力。可以说是这次军队的大改革,特别是战略支援部队的成立,在体制上绝对是一大进步。

试想一下,如果没有战略支援部队的卫星准确地定位和导航,没有电子干扰部队、网络战部队的保驾护航,那么火箭军的战略导弹就难以发挥作用;如果没有战略支援部队技术侦察的情报保障、卫星的通讯联系,那么分布在广阔战场上的陆海空军部队就是眼盲耳聋,战斗力也要大打折扣。因此,在看不到的四维、五维战场空间,战略支援部队必将发挥出重大的作用。

Original Referring URL:  http://war.163.com/16/0104/08/

China’s New Military Strategy : An Analysis from Asia Cyber Warfare is a Force Multiplier // 中國的新軍事戰略:亞洲網絡戰的分析是力量倍增器

China’s New Military Strategy : An Analysis from Asia Cyber Warfare is a Force Multiplier //

中國的新軍事戰略:亞洲網絡戰的分析是力量倍增器

Author ; HongAn

View photo

The theory of war can last for a long time because the book is based on the two pillars of “research and observation” and “philosophy and experience”. They complement each other and make war theory in philosophical dialectic, logic, and theoretical reality and effectiveness. More contemporary. The primitive violence, political nature, and the interaction between the government, the people, and the military in the observation of the nature of the Krupp War are mainly oriented to examine China’s national defense strategy and its political influence and planning in the modern war.

Since Tsai Ing-wen came to power, he requested the Ministry of National Defense to propose the adjustment of the military strategy in the emergence stage. The author believes that it must be formulated from the overall thinking of the national security strategy. The preparations for the establishment of the national army are based on the “10-year military conception” as the basis for the reconstruction of the military. The author has led the plan to report on the national defense strategy (imaginary) of the Republic of China from 1995 to 104. At present, in the face of the development of the CCP’s military aircraft carrier and the military aircraft flying over the central line of the strait, the balance of power between the two sides of the strait has been broken. How to adjust the new military strategic view, facing the threat of war in a new situation, the strategic concept should also be adjusted.

20161231 - China's "Liaoning" aircraft carrier broke through the first island chain in the Pacific Ocean and conducted cross-sea area training missions. The Chinese Navy released photos on the official Weibo.  The picture shows the Liaoning and five destroyers.  (taken from the Chinese Navy to publish Weibo)

View photo

20161231 – China’s “Liaoning” aircraft carrier broke through the first island chain in the Pacific Ocean and conducted cross-sea area training missions. The Chinese Navy released photos on the official Weibo. The picture shows the Liaoning and five destroyers. (taken from the Chinese Navy to publish Weibo)

The author believes that the current development of the CCP’s military aircraft carrier and the military aircraft flying over the central line of the strait have broken the balance of power between the two sides of the strait, how to adjust the new military strategic view, face the threat of war in a new situation, and the strategic concept should also be adjusted. . The picture shows the Chinese “Liaoning” aircraft carrier. (taken from the Chinese Navy to publish Weibo)

Deterrence strategy for the purpose of war prevention

Defending and defending is a war act, and effective deterrence is the prevention of war behavior. In the case of the Taiwan defensive warfare, “deterring” the enemy’s military operations “war”, “prevention” means preventing the use of force by the enemy. If the defeat is defeated, the war will erupt. The use of military force in the deterrent strategy is to prevent the enemy from using military force. Therefore, the deterrent theory is skillful nonuse of military forces, so deterrence must go beyond military skills. It is “stunned”. The purpose of deterrence is not to destroy the enemy when the enemy invades, but to make the enemy realize that if he really takes action, he will be eliminated.

As far as China’s new military strategic changes are concerned, Taiwan’s defense operations are of a defensive nature. As far as the defense strategy is concerned, there are only two options: defense and active defense; as far as tactical level considerations are concerned, it is just like defensive operations, only position defense and mobile defense, or both.

The People’s Liberation Army’s force development and strategic deterrence

The Chinese People’s Liberation Army’s development of force has emphasized the “joint overall war.” It is familiar with the internal forces of the Communists and the people on the two sides of the strait. They are constantly launching strategic deterrence against the CCP. To some extent, the CCP has made military, economic, diplomatic, and political organizations. Comprehensive integration. The CCP’s overall national defense transformation has surpassed the scope of military strategy. It not only combines the strategic thinking of “winning local wars under the conditions of information” and “active defense”, but also enhances the “combined operations of the arms and services” and promotes the “harmonious world”. The diplomatic strategy of the “new security concept” continues to use the “three wars” and “anti-secession laws” to integrate into a new “joint overall warfare” strategy.

The People’s Liberation Army Navy’s South Navy, the missile destroyer “Hefei Ship” officers and men looking for targets (AP)

View photo

The People’s Liberation Army Navy’s South Navy, the missile destroyer “Hefei Ship” officers and men looking for targets (AP)

The CCP’s overall national defense transformation has surpassed the scope of military strategy. It not only combines the strategic thinking of “winning partial wars under information conditions” and “active defense”, but also enhances the ability of “combined operations of arms and services.” The picture shows the naval naval performance of the PLA Navy. (Information, Associated Press)

On November 25th and December 11th, 2016, the Communists twice rounded Taiwan for half a month. On December 11th, the mainland warplanes moved more than 10 fighters across the Miyako Strait and also bypassed the eastern Taiwanese waters! The People’s Liberation Army Air Force fighters flew out of the “first island chain” while crossing the bus strait and the Miyako Strait. After the CCP’s military aircraft detoured to Taiwan, the CCP’s Liaoning aircraft carrier formation also appeared in the outer seas of my east. According to the recent development of the situation, the CCP has been moving frequently, and the political meaning is greater than the military meaning. Especially after the call of Chuan Cai on December 2, 2016, Trump challenged Beijing’s “one China” policy. Of course, Beijing will not show weakness on core interests. Sending military aircraft to bypass Taiwan and dispatching aircraft carriers through the eastern waters of Taiwan is aimed at announcing that the Taiwan issue is a matter of internal affairs to the United States. It also declares that its armed forces can extinguish the Taiwan independence forces themselves, and never It will repeat the events of 1996.

In addition, the Chinese People’s Liberation Army’s iron boxing force can be said to be the rapid response force established by the People’s Liberation Army in response to the 21st century. The iron boxing force basically includes the People’s Liberation Army’s air force airborne 15th Army, the Military Commission, or the rapid reaction force directly under the military region. The special military battalion directly under the military region and the Chinese Marine Corps have four major fists. According to sources, the General Staff of the People’s Liberation Army, which was established in early 2016 and completed a large division of theaters, held a cross-strait military affairs report, confirming that Chinese national leader Xi Jinping has formally signed important instructions. This is internally called “No. 41″. The military order has authorized the PLA General Staff to add and complete the 16th Airborne Airborne Forces by the end of 2018. It has two fast airborne divisions, the 69th Division Airborne and the 71st Airborne Division. The newly established Airborne Sixteenth Army will assemble elite field divisions from the Nanjing Military Region and the Jinan Military Region, and will be equipped and trained to become part of the Air Force. It will be equipped with special military and missile units to become a professional force”.

In 2017, China's "two sessions" (National People's Congress, Political Consultative Conference) debuted in Beijing, the 5th meeting of the 12th National People's Congress, the People's Liberation Army Representative (AP)

View photo

In 2017, China’s “two sessions” (National People’s Congress, Political Consultative Conference) debuted in Beijing, the 5th meeting of the 12th National People’s Congress, the People’s Liberation Army Representative (AP)

The military commander inside the People’s Liberation Army called “Order No. 41” has authorized the PLA General Staff to add and complete the 16th Airborne Air Force before the end of 2018 and become a “professional force” against Taiwan. The picture shows the representatives of the People’s Congress and the People’s Liberation Army of the Political Consultative Conference. (Information, Associated Press)

If combined with the rapid reaction force that has been completed, that is, the Airborne 15th Army, it is based on the 3rd Airborne Infantry Divisions of the 43rd Division, 44th Division, and 45th Division, and is independent of the Air Force’s 13th Airlift and the 13th Airborne. The regiment has more than 90 large and small transport aircraft, as well as some independent helicopter regiments (Brigades) belonging to the Army Aviation. Together, they can maintain a 60% combat capability and are ready to go on-board to “can fly at any time, and can drop and drop at any time.” Hit the “iron bones” of the attack mission. The General Staff of the People’s Liberation Army has officially issued a formation order. This is also a major role played by the US military in the US-Iraq war, the powerful projection force of the US military and the visual field-distance force, which led to the reform of the traditional forces. It is also impossible for the CCP to surrender to the United States forever. At least, in the East Asian region, it is hoped that it will be equal to the United States and jointly handle the status of Asia-Pacific affairs.

How can a failing strategy and a hundred percent of combat power be played!

Definition of strategic concept: After the judgment of the strategic situation, the action plan adopted should generally consider five major factors: namely, purpose, strength, time, place and means. The so-called military strategy is built under the national (security) strategy and must follow and support the national defense policy. Military strategy is not only a rationale for thinking, but also a strategic concept. It also covers the overall consideration of force design and force building. In other words, military objectives and strategic ideas are the guidance of force planning (construction), and force building is a concrete practice, and the military design combines the above two parties into a complete strategic thinking.

The military strategic adjustment of China’s various stages is a transformation from the past offensive strategy, offensive and defensive integration, defense defense or offensive defensive strategy. The process is closely related to the US global strategy, the Asia-Pacific situation and cross-strait relations. Its purpose is to ensure Taiwan’s security and maintain national sovereignty and territorial integrity. At this stage, the author believes that “preventing war, maintaining the status quo, and safeguarding homeland security.” The Department also focused on the interception of the “defense and defense, deep suppression” to effectively curb the enemy.

Table I

View photo

Table I

Table I

Multi-task goal is means, heavy layer interception force is joint operation deployment

Purpose and means can not cooperate (multiple deterrence is passive defense, heavy deterrence is active defense)?

According to the “multiple deterrence” that the Secretary of Defense, Mr. Feng Shikuan, has recently proposed, the difference between the “repeated resistance” and the “definitely deterrent” is that the “multiple deterrence” tends to be passive defense, that is, the defense operation limited to Taiwan’s main island; It is an active defense. It is based on the island and pushes the defense network layer by layer. The two have passive and active differences. As far as the author has been engaged in strategic teaching experience for many years, there is no passive or active distinction between the so-called “multiple deterrence” and “repeated resistance”.

20170302 Legislative Yuan. Minister of National Defense Feng Shikuan attended the report of the Foreign Affairs and Defense Commission and answered questions (photo by Chen Mingren)

View photo

20170302 Legislative Yuan. Minister of National Defense Feng Shikuan attended the report of the Foreign Affairs and Defense Commission and answered questions (photo by Chen Mingren)

The difference between the “multiple deterrence” proposed by the Secretary of Defense Feng Shikuan and the “repeated resistance” of the final case is that “multiple deterrence” tends to passive defense. (Photo, photo by Chen Mingren)

The author believes that the reason why China has adjusted “defense and obstruction” to “effectively deterring, defending and defending” should be “effectively deterring, defending and defending”, that is, the spirit of offensive and defensive. The choice of multi-task targets is only a means, and the interception of multi-tasking is a joint strategy deployment. The strategic concept of failing to cooperate with the purpose and means is a strategy that fails. It is no longer a defensive, it is a layer. Eliminate, so there is no focus on the war of war, how much money we can play.

Has Taiwan been deterred and prepared? If the CCP attacks the national army will not be defensive again!

When the Defense Minister Feng Shikuan made a reply in the Legislative Yuan, he pointed out that the military strategy of the National Army will be adjusted to “repeated the obstacles” because the weapons developed now are more advanced than before. “Some missiles have developed well”, which can make Taiwan better. Defensive forces; if the CCP launches an attack against Taiwan, the national army will no longer be a defensive, and the “respective deterrence” will begin to turn into “active defense.” At the same time, the national army has multiple, multi-party, multi-capacity capabilities. Through the enemy’s half-crossing, beach battle, and position defense, the sea and air forces could not successfully reach the purpose of landing on the island of Taiwan (quoted from Wu Mingjie, March 13, 2017, Feng Media).

In reply to the question of the Democratic Progressive Party legislator Liu Shifang, he said that if the missile command headquarters moved to the Air Force, it would meet the requirements of the deterrent strategy. The four stages of the Flying Finger Division belonged to different units, and the combat strength continued to increase. Command unity and unity of affairs can be time-honored in the first place. The Air Force Operations Command has this power. And Feng Shikuan said that “some missiles have developed well” and “not a layer of defense, it is a layer of elimination, rejection”, which refers to the deployment and mass production of the male E E cruise missile, Wan Jian bomb, Xiong San missile and patriotic The missiles, such as missiles, intercepted and annihilated the missiles, warplanes, and warships that had come to the enemy, and then began to conduct defensive operations after the troops were projected onto Taiwan’s main island.

Table II

View photo

Table II

Table II

Constructing a multi-layer interception joint warfare missile defense capability is the focus

The National Army’s self-developed warplanes, Tianjian-1 and II missiles, and Tiangong’s first, second and third missiles have all been deployed or mass-produced, and preparatory energy and position deployment work has been prepared. Secondly, the R&D plan of high-resolution radar, electronic warfare equipment, multi-barrel rockets and other weapon systems will be carried out to effectively improve the overall combat strength of the national army. How to improve the defense warfare early warning capability, radar performance and coverage, and strengthen the development and deployment of radar signal processing, electronic defense technology, and mobile radar. We will continue to establish an early warning control mechanism and information link construction, integrate the three-armed referral system, and accurately control the relationship between the military and the various stations.

20160811 - Hualien Air Force Base was opened to local residents and the media on the 11th. The picture shows the IDF through the national warplane.  (photo by Yan Linyu)

View photo

20160811 – Hualien Air Force Base was opened to local residents and the media on the 11th. The picture shows the IDF through the national warplane. (photo by Yan Linyu)

The National Army’s self-developed warplanes have been deployed or entered into mass production, and preparatory energy and position deployment work has been prepared. (Photo, photo by Yan Linyu)

The author believes that the missile defense capability is the key to the joint strategic deployment of constructing heavy-layer interception, especially the ability to recover from war damage is the key to the battle; the CCP’s flight vehicles (missile, patrol missiles and unmanned vehicles, etc.) have a precise impact, and their After the first strike, the national army’s war damage and resilience were the key factors affecting my combat schedule and the CCP’s follow-up battle plan. The national army should consider the ability of independent control after the destruction of the management system and strengthen the ability of attracting, electric warfare and defensive counter-measures; only effective source anti-production warfare can reduce the enemy’s attack firepower.

The concept of “fighting how to fight” – “defense, deep defense”

What kind of war the National Army wants to fight, the National Defense Construction Army wants to build a plan based on “playing, loading, editing, and training,” and secondly, it is a comprehensive national strength to build a deterrent. The strategic concept of “defending and defending” is based on the policy guidance of “training for war, unity of war and training”, and planning the “national military annual major training flow path” for the concept of “how to fight”. The military exercises are divided into four categories: “combat, mobilization, nuclearization, and training.” In order to strengthen the ability of “outside islands and ship joints to attack targets at sea” and “three-armed joint air defense training”, the number of training should be increased to enhance The combined military training capability of the three armed forces.

As a national security indicator, comprehensive national strength has two meanings. Internally, national defense construction needs to be balanced with economic development. Externally, understanding what the enemy cares most is helpful for the formation of the “deep deterrence” program. The “deep deterrence method” can be interpreted as: “The emphasis is on an unbearable revenge for the enemy, rather than the ability to emphasize actual combat and win the war.” For example, in the “Exceeding the Limits”, the war mark is no longer limited to military It is a new trend of war type and military thinking.

According to Wu Mingjie, the wind media, from the perspective of the distance, the future defense circle of the National Army usually includes the island, the east line of the Taiwan Strait, and the ADIZ air defense identification zone. However, during the war, it will be extrapolated to the coastal air and sea bases on the mainland, and even more. Inland missile bases and combat command centers, and the eastern defense range will be extrapolated to areas outside ADIZ. In addition, after the establishment of the fourth service in the future, there is no distance limit for network information warfare. These are the future threats of the national army. The scope of defense. (Wu Mingjie, March 13, 2017, Wind Media). However, this study proposes that “depth suppression” is the distance between non-linear lines. The so-called deep combat, in short, includes the depth of the three-dimensional space warfare. As the PLA calls “land, sea, air, sky, electricity”, the “National Army Defense Operations Guide” edited by the author has divided the defense operations into five. Space, namely space, air, ground, water, underwater combat guidance. At present, what we lack most is the search for space and underwater power. It must rely on international cooperation and exchange of interests.

20170118-The second day of the National Army's Spring Festival to strengthen the war preparations tour, came to the naval left camp base.  The picture shows the Navy's classmate seal submarine on display.  (photo by Su Zhongying)

View photo

20170118-The second day of the National Army’s Spring Festival to strengthen the war preparations tour, came to the naval left camp base. The picture shows the Navy’s classmate seal submarine on display. (photo by Su Zhongying)

The future defense circle of the National Army usually includes the island and the east line of the Taiwan Strait and the ADIZ air defense identification zone. However, during the war, it will be extrapolated to the coastal air and sea bases on the mainland, and even more inland missile bases and operational command centers. The eastern defense range will also be extrapolated to areas outside the ADIZ. The picture shows the Navy’s classmate seal submarine. (Photo, photo by Su Zhongzhen)

Integration of forces in a network-centric overall operation

The idea of ​​joint military operations of the three armed forces of the Chinese army has gradually entered the hearts of the people and adapted to the development of high-tech warfare with the main form of joint operations of the three armed forces. In the construction of military power, it will avoid Taiwan’s C4ISR capability to enter the arms race with the CCP and establish a parasitic and symbiotic relationship, and participate extensively in multinational military R&D and cooperation. Pursuing a reasonable defense space in national defense security, the force is integrated into a network-centric overall operation. In short: “To turn your own army into a company, and to pull the enemy from the mountains and waters into my vision.” Therefore, in light of the above viewpoints, the author suggests that the current military strategy should be better. The better strategic concept is to “defend and defend, deepen the deterrence”, and adhere to the policy of “preventing war”, “maintaining the status quo”, and “defending homeland security”. The combination of strategic and strategic deployment, combined with multi-layer defense guidance, combined with the national defense mobilization force, strive for “strategic lasting” time, create opportunities, destroy enemy and ensure national security.

Conclusion: National security is the common responsibility of all people

In fact, the author observes the 12 national defense blueprints published before the Democratic Progressive Party elections, and the new government-driven national defense policies, such as research and development of military strategy, national shipbuilding, national machine building, improved military recruitment, weekend warriors, and military uniforms. Can not be too demanding, the new government’s national defense policy concept, in the blue book can find clues. In the face of the CCP’s asymmetric military development, and gradually locking into the “safety dilemma” dilemma, it is necessary to maintain a calm observation and thinking plan, the most favorable security strategy for survival and development, national defense policy, and military preparation. I can’t have the mind of being big and small, then I should play the depth of being small and wise.

The state-made T75-20 cannon was drilled on the "Ilan Ship" of the Sea Guard.  (photo by Yan Linyu)

View photo

The state-made T75-20 cannon was drilled on the “Ilan Ship” of the Sea Guard. (photo by Yan Linyu)

The defense policy promoted by the new government, such as the national shipbuilding and other national propaganda, the new government’s national defense policy concept can be found in the blue book. The picture shows the state-built T75-20 cannon exercise on the “Ilan Ship” of the Sea Guard. (Photo, photo by Yan Linyu)

Defence is too negative, and lack of nuclear weapons is effective in deterring and incapable. There is no cheap national defense in the world, and national security is the common responsibility of the whole people. There is no distinction between political parties and blue and green. The key issue in the preparation of the army is the cultivation of talents. As for the new government’s annuity reform plan, there are no reasons for the military to be included in the reform, and the difficulties in the recruitment system are even more difficult. How can Taiwan implement the reforms under the quality of grassroots personnel and the lack of cadres? Deterring the fighting power.

Original Mandarin Chinese:

檢視相片

戰爭論所以能歷久彌新,是因該著作是建立「研究與觀察」、「哲學與經驗」兩個支柱上相輔相成、互為保證,使戰爭論在哲學辯證、邏輯、及理論現實和有效性更具時代性。將克氏戰爭本質觀察中的原始暴力、政治性、以及政府、人民、軍隊間三位一體相互作用等面向為主,來檢視我國國防戰略其於現代戰爭中政治、戰略發展時代性影響與規劃。

自蔡英文上台後即要求國防部提出現階段的建軍戰略調整,筆者認為必須從國家安全戰略整體思維來擬定。國軍建軍備戰是以「十年建軍構想」作為兵力整建之基礎。筆者曾主導規劃提報民國95年至104年之國防建軍戰略(假想)構想。當前面對中共軍力航母之發展及軍機飛越海峽中線,已經打破兩岸之間戰力平衡,如何調整新軍事戰略觀,面對一場新情勢的戰爭威脅,戰略構想也應有所調整。

20161231-中國「遼寧號」航母突破太平洋第一島鏈,進行跨海區訓練任務,中國海軍在官方微博發布照片。圖為遼寧號與5艘驅逐艦。(取自中國海軍發布微博)

檢視相片

20161231-中國「遼寧號」航母突破太平洋第一島鏈,進行跨海區訓練任務,中國海軍在官方微博發布照片。圖為遼寧號與5艘驅逐艦。(取自中國海軍發布微博)

作者認為,當前面對中共軍力航母之發展及軍機飛越海峽中線,已經打破兩岸之間戰力平衡,如何調整新軍事戰略觀,面對一場新情勢的戰爭威脅,戰略構想也應有所調整。圖為中國「遼寧號」航母。(取自中國海軍發布微博)

嚇阻戰略以預防戰爭( war prevention )為目的

防衛固守是戰爭行為,有效嚇阻是戰爭行為的預防。就台澎防衛作戰言,「嚇阻」敵國軍事行動「戰爭」,「預防」即在防止敵國使用武力的行為,若嚇阻失敗,戰爭便爆發。嚇阻戰略中軍事武力的運用,就是阻止敵人使用軍事武力。因此嚇阻理論,就是技巧性的不使用軍事武力(skillful nonuse of military forces),因此嚇阻必須超越了軍事上的技巧。就被「嚇阻」,嚇阻的目的並非是在敵人入侵時消滅敵人,而是使敵人確實認知到假如他真的採取行動,則一定會被消滅掉。

就我國新軍事戰略變革而言,台澎防衛作戰屬守勢作戰性質。就國防戰略層面考量,只有防衛固守與積極防衛兩種選則;就戰術層級考量,正如同防禦作戰,只有陣地防禦與機動防禦,或兩者交相運用。

人民解放軍武力發展及戰略威懾

中共人民解放軍武力發展,強調「聯合總體戰」,據熟悉共軍內部部分人士對兩岸情勢憂心,對於中共不斷發動戰略威懾;某種程度上,中共已將軍事、經濟、外交與政治組織間做全面性整合。中共整體的國防轉型,已超脫軍事戰略範疇,不僅結合「打贏信息條件下的局部戰爭」與「主動防禦」的戰略思維,並提升「軍兵種一體化聯合作戰」能力,全面推動「和諧世界」、「新安全觀」的外交策略,持續運用「三戰」、「反分裂國家法」等作為,整合成為全新的「聯合總體戰」策略。

中國人民解放軍海軍南海軍演,飛彈驅逐艦「合肥艦」官兵尋找目標(美聯社)

檢視相片

中國人民解放軍海軍南海軍演,飛彈驅逐艦「合肥艦」官兵尋找目標(美聯社)

中共整體的國防轉型,已超脫軍事戰略範疇,不僅結合「打贏信息條件下的局部戰爭」與「主動防禦」的戰略思維,並提升「軍兵種一體化聯合作戰」能力。圖為解放軍海軍南海軍演。(資料照,美聯社)

2016年11月25日及12月11日,共軍半個月來二度繞行台灣,大陸戰機隊12月11日出動10多架戰機穿越宮古海峽,還繞行了台灣東部海域!解放軍空軍戰機,飛出「第一島鏈」,同時穿越巴士海峽與宮古海峽。繼中共軍機繞行台灣後,中共遼寧號航母編隊也出現在我東部外海,我國防安全已經出現警訊。根據近來的情勢發展,中共動作頻頻,政治意涵大於軍事意涵。特別是在2016年12月2日川蔡通話後,川普放話挑戰北京的「一個中國」政策。北京當然不會在核心利益議題上示弱,派軍機繞行台灣與派遣航母經過台灣東部海域,目的在向美國宣示台灣問題是其內政問題,同時也宣告其武力已經可以自行撲滅台獨勢力,絕不會讓1996年的事件重演。

此外,中國人民解放軍鐵拳部隊,可說是解放軍為因應21世紀所建立的快速應變武力,鐵拳部隊,基本上包括了中國人民解放軍的空軍空降第15軍、軍委會或軍區直屬的快速反應部隊、軍區直屬之特戰兵營、中共海軍陸戰隊等共四大拳頭。另據消息人士透露,於2016年初成立並完成大幅度戰區劃分的解放軍總參謀部,於召開兩岸軍事情勢會報,證實中國國家領導人習近平已正式簽署重要指示,這個被內部稱為「第41號令」的軍令,已授權解放軍總參謀部需在2018年底前,增編完成編組空降第16軍,下轄2個快速空降師,分別為空降第69師與空降第71師。新成立的空降十六軍,將會從南京軍區和濟南軍區中抽調精銳野戰師組建,並進行裝備和訓練,成為空軍的一部分,將配屬專用軍機和導彈部隊,成為對台作戰的「專業部隊」。

2017年中國「兩會」(全國人民代表大會、政治協商會議)在北京登場,全國人大第12屆第5次會議,解放軍代表(AP)

檢視相片

2017年中國「兩會」(全國人民代表大會、政治協商會議)在北京登場,全國人大第12屆第5次會議,解放軍代表(AP)

解放軍內部稱為「第41號令」的軍令,已授權解放軍總參謀部需在2018年底前,增編完成編組空降第16軍,成為對台作戰的「專業部隊」。圖為全國人民代表大會、政治協商會議解放軍代表。(資料照,美聯社)

若結合已經完成組建的快速反應部隊,即空降第15軍,是由第43師、第44師及第45師等3個空降步兵師為基幹,並與空軍第13空運師、第13空降獨立團共90餘架大小運輸機,以及部份陸軍航空兵所屬的獨立直升機團(大隊),共同組成一支能保持60%作戰力且隨時可上機進行「隨時能飛、隨時能降、降之能打」等攻擊任務的「鐵骨頭」。解放軍總參謀部且已正式下達組建令,這也是有監於美伊戰爭中,美軍強大的投射兵力及視距外戰力,對戰局的重大作用,而導致解放軍對傳統戰力進行的改革。中共亦不可能永遠甘於臣服美國之下,至少希望在東亞區域中,被承認具有與美國平起平坐、共同處理亞太事務的地位。

不及格的戰略與一百分的戰力如何能打!

戰略構想之定義:為經戰略狀況判斷後,所採取之行動方案,通常應考量五大要素:即目的、兵力、時間、地點、手段。所謂軍事戰略是建構在國家(安全)戰略之下,必須遵循和支持國家的國防政策。軍事戰略不僅只是思維理則,也包含戰略構想,更涵蓋了兵力設計與兵力整建的整體考量。換言之,軍事目標與戰略構想是兵力規劃(整建)的指導,兵力整建則是具體實踐,而其中的兵力設計又將上述兩方結合成為一個完整的戰略思維。

我國各階段的軍事戰略調,由過去攻勢戰略、攻守一體、防衛守勢或是攻勢守勢各時期戰略的轉變,其過程都與美國全球戰略、亞太情勢及兩岸關係有著密切關係。其目的在確保台灣安全,維持國家主權與領土完整。而現階段筆者以為以「預防戰爭、維持現狀、保衛國土安全」。並署重點於「防衛固守、縱深遏阻」之攔截兵力整建,以有效遏阻制敵於境外。

表一

檢視相片

表一

表一

多重任務目標是手段、重層攔截戰力是聯合作戰部署

目的與手段不能配合(多重嚇阻是被動防禦,重層嚇阻是主動防禦)?

據國防部長馮世寬日前曾提出的「多重嚇阻」,和最後定案的「重層嚇阻」差異,在於「多重嚇阻」傾向被動防禦,也就是侷限在台灣本島的防衛作戰;「重層嚇阻」則屬主動防禦,是以本島為中心,再一層層向外推建構防禦網,兩者有被動和主動的差異性。就筆者曾任多年戰略教學經驗來談,所謂「多重嚇阻」與「重層嚇阻」並無被動、主動之分;

20170302立法院.國防部長馮世寬出席外交及國防委員會報告及答詢(陳明仁攝)

檢視相片

20170302立法院.國防部長馮世寬出席外交及國防委員會報告及答詢(陳明仁攝)

國防部長馮世寬日前曾提出的「多重嚇阻」,和最後定案的「重層嚇阻」差異,在於「多重嚇阻」傾向被動防禦。(資料照,陳明仁攝)

筆者認為當初我國之所以將「防衛固守、有效嚇阻」調整為「有效嚇阻、防衛固守」,應「有效嚇阻、防衛固守」即包含攻勢與守勢的精神。而多重任務目標選擇只是手段、重層攔截戰力則是聯合作戰部署一環,將目的與手段不能配合配合的戰略構想,是不及格的戰略;試問「重層嚇阻」不再是守勢,是一層層消滅,如此沒有重點打消耗戰持久戰,我們有多少本錢可以打。

台灣有嚇阻戰力整備?假如中共攻擊國軍不會再是守勢!

國防部長馮世寬日前在立院答詢時曾指出,國軍軍事戰略會調整為「重層嚇阻」,是因為現在研發的武器較之前進步,「有些飛彈發展得不錯」,可以讓台灣有更好防衛力量;假如中共對台攻擊發起,國軍就不會再是守勢,「重層嚇阻」將會開始轉為「積極防禦」;同時國軍已具備多重、多方、多能力戰力,將可經由擊敵半渡、灘岸決戰、陣地防禦,讓海空兵力無法順利達成登陸台灣本島目的(引自吳明杰, 2017年03月13日,風傳媒)。

他在答覆民進黨立委劉世芳質詢時說,像是飛彈指揮部移到空軍轄下,就符合重層嚇阻戰略要求,飛指部4個階段隸屬不同單位,戰力不斷增強,現在是指揮統一、事權統一,可在第一時間爭取時效,空軍作戰指揮部有這權責。而馮世寬所指「有些飛彈發展得不錯」、「不是一層層的防衛,是一層層的消滅、拒止」,就是指已經部署及量產的雄二E巡弋飛彈、萬劍彈、雄三飛彈和愛國者飛彈等武器,把來犯敵軍的飛彈、戰機、軍艦,分別先從陸海空各空間向外一層層攔截和殲滅,而非等到兵力投射到台灣本島後才開始進行防衛作戰。

表二

檢視相片

表二

表二

構建重層攔截的聯戰戰力飛彈防禦能力是重點

國軍自力研製之經國號戰機、天劍一、二型飛彈、天弓一、二、三型飛彈,均已成軍部署或進入量產,並籌建後續能量及陣地部署工作。其次進行高解析度雷達、電子戰裝備、多管火箭等武器系統之研發計畫,有效提升國軍整體戰力。如何提升防衛作戰預警能力、雷達性能與涵蓋範圍,強化雷達信號處理、電子防禦技術、機動雷達之研發與部署。賡續建立早期預警管制機制與資訊鏈路構建,整合三軍指管通情系統,精確戰管與各觀通站台情資聯繫等。

20160811-花蓮空軍基地11日搶先開放給當地居民及媒體參訪,圖為現場展示IDF經國號戰機。(顏麟宇攝)

檢視相片

20160811-花蓮空軍基地11日搶先開放給當地居民及媒體參訪,圖為現場展示IDF經國號戰機。(顏麟宇攝)

國軍自力研製之經國號戰機,已成軍部署或進入量產,並籌建後續能量及陣地部署工作。(資料照,顏麟宇攝)

筆者認為飛彈防禦能力,是構建重層攔截的聯合戰略部署是重點,特別是戰損復元能力為續戰關鍵;中共飛行載具(導彈、巡弋飛彈與無人載具等)精準打擊力,以及其第一擊後國軍戰損與復原能力,為影響我作戰期程與中共後續作戰計畫遂行之關鍵因素。國軍應考量指、管體系損毀後獨立作戰能力及強化誘標、電戰、防禦性反制能力;唯有效源頭反制作戰,方能降低敵攻擊火力。

針對「如何打」的用兵理念-「防衛固守、縱深遏阻」

國軍想打怎樣的戰爭,國防建軍構想要依據「打、裝、編、訓」,策定兵力整建計畫,其次是綜合國力組建嚇阻戰力。「防衛固守」的戰略構想,依據「為戰而訓、戰訓合一」的政策指導,針對「如何打」的用兵理念,規劃「國軍年度重大演訓流路」。部隊演訓區分為「作戰、動員、核化、訓練」等四大類;為加強「外島艦岸砲聯合對海上目標攻擊」與「三軍聯合防空作戰訓練」能力,尤應增加訓練次數,以增進三軍聯合作戰演訓能力。

綜合國力做為國家安全指標,有兩層意義;對內而言,國防建設需要與經濟發展兼顧;對外而言,瞭解敵人最在意的是什麼,有助「縱深嚇阻」方案的形成。對「縱深嚇阻方式」可以詮釋為:「強調的是一個令敵人難以忍受的報復,而非強調實戰及贏得戰爭的能力」,如《超限戰》中也提出戰爭標的不再僅限於軍事,是戰爭型態與建軍思維的新趨向。

據風傳媒吳明杰報導,從距離來看,國軍未來的防衛圈,平時包括本島、台海中線以東、ADIZ防空識別區,但戰時則將外推到大陸當面沿岸海空基地,甚至更內陸的飛彈基地和作戰指揮中心,而東部防禦範圍也會外推到ADIZ以外區域,加上未來第四軍種成立後,網路資訊戰更沒有距離限制,這些都是國軍未來「重層嚇阻」的防禦範圍。(吳明杰, 2017年03月13日,風傳媒)。但本研究所提「縱深遏阻」非直線間之距離。所謂縱深作戰,簡言之包含立體空間作戰之縱深,正如解放軍所稱「陸、海、空、天、電」,就筆者所主編之《國軍防衛作戰教則》,已將防衛作戰區分為五度空間,即太空、空中、地面、水面、水下作戰指導。目前我們最缺乏的是太空與水下之戰力情蒐,必須有賴國際合作及情資交換。

20170118-國軍春節加強戰備巡弋第二日,來到海軍左營基地。圖為現場展示的海軍茄比級海豹潛艦。(蘇仲泓攝)

檢視相片

20170118-國軍春節加強戰備巡弋第二日,來到海軍左營基地。圖為現場展示的海軍茄比級海豹潛艦。(蘇仲泓攝)

國軍未來的防衛圈,平時包括本島、台海中線以東、ADIZ防空識別區,但戰時則將外推到大陸當面沿岸海空基地,甚至更內陸的飛彈基地和作戰指揮中心,而東部防禦範圍也會外推到ADIZ以外區域。圖為海軍茄比級海豹潛艦。(資料照,蘇仲泓攝)

兵力整合在以網路為中心的整體作戰

國軍三軍聯合作戰思想漸入人心,適應三軍聯合作戰為主要型態的高科技戰爭發展需要。軍力建構上,避免與中共進入軍備競賽,建立寄生與共生關係的台灣C4ISR能力,廣泛參與多國軍事研發與合作。在國防安全上追求合理的防衛空間,兵力整合在以網路為中心的整體作戰。簡言之:「把自己千軍萬馬變成一個連,把敵人從千山萬水拉到我我方視野之內」。因此,綜合上述觀點,筆者建議當前軍事戰略的走向,較佳的戰略構想為「防衛固守、縱深遏阻」,秉持「預防戰爭」、「維持現狀」、「保衛國土安全」的政策,構建「重層攔擊」聯合戰略部署戰力,依多層防衛指導,結合全民防衛動員力量,爭取「戰略持久」時間,創機造勢,殲滅犯敵,確保國家安全。

結論:國家安全是全民共同的責任

事實上,筆者觀察民進黨選前出版的12本國防藍皮書,新政府推動的國防政策,諸如研訂軍事戰略、國艦國造、國機國造、改良式募兵制、周末戰士、軍中連坐不能過當等主張,新政府的國防政策構想,在藍皮書中都可找出蛛絲馬跡。我國在面對中共不對稱軍備發展升溫,而且逐漸鎖入「安全兩難」困境之際,實有必要保持冷靜觀察思考規劃,對生存發展最有利的安全戰略、國防政策,以及軍事準備,其如不能有以大事小以仁的胸懷,則我應發揮以小事大以智的深度。

海巡署「宜蘭艦」上之國造T75-20機砲操演。(顏麟宇攝)

檢視相片

海巡署「宜蘭艦」上之國造T75-20機砲操演。(顏麟宇攝)

新政府推動的國防政策,諸如國艦國造等主張,新政府的國防政策構想,在藍皮書中都可找出蛛絲馬跡。圖為海巡署「宜蘭艦」上之國造T75-20機砲操演。(資料照,顏麟宇攝)

防衛固守過於消極,欠缺核武戰力有效嚇阻沒有能力。天下沒有亷價的國防,國家安全是全民共同的責任,沒有政黨之分、藍綠之別。建軍備戰關鍵問題還是人才的培育,就目前新政府的年金改革方案,也將軍人沒有理由納入改革對象,更導致募兵制的困難重重,試問如此基層人員素質及幹部缺乏下,台灣如何能執行重層嚇阻戰力。

Original URL: https://goo.gl/mZV3tX