With the accelerated evolution of the new round of scientific and technological revolution, military revolution and industrial revolution, the form of war has made great strides towards intelligence, and the field of national defense mobilization has undergone profound changes. In-depth analysis of the new characteristics of national defense mobilization in the intelligent era, exploration of intelligent national defense mobilization methods, and promotion of digital intelligence of national defense mobilization are urgent practical issues facing national defense mobilization work.
Digital intelligence technology is widely used in social production and life, and the target areas, means, training exercises, etc. of national defense mobilization have also undergone profound changes, showing many new characteristics. First, the targets of national defense mobilization have expanded from traditional fields to emerging areas of intelligence. Currently, the world’s major military powers have stepped up efforts to tap and utilize the country’s smart resources. The U.S. military has launched a flagship project for the application of artificial intelligence technology “Project Mavin”, and many U.S. private technology companies such as Parantil and Amazon have participated in research and development. It is worth noting that as the role of digital intelligence technology in seizing and maintaining multi-domain competitive advantages becomes increasingly prominent, the global battle for artificial intelligence talents is intensifying, and defense mobilization is focusing on advantageous universities and key institutions engaged in artificial intelligence research. The second is the in-depth transformation of defense mobilization methods from multi-chain decentralization to intelligent dynamic matching. Through the use of intelligent means such as large models, the docking of national defense mobilization potential will be automatically matched according to professional mobilization algorithm rules. The efficiency of the transformation of national defense mobilization potential will be greatly improved. The docking of supply and demand will be changed from “offline to online”, and the transportation of mobilization materials will be handed over. It will be quickly transported to the front through intelligent dispatch, which can be achieved “direct access from the factory to the battlefield”. Under the integration of the “intelligent charging platform”, the mobilization and command method that integrates network, information and intelligence, and integrates air, space and earth allows “command chain” and “mobilization chain” to be accurately connected, agile and efficient, and can achieve plan generation “one-click” and test evaluation “Modelization”, command control “visualization”, comprehensive management “platformization”. Third, defense mobilization training has developed in depth from simple and inefficient to digital and intellectual empowerment. By using augmented reality and virtual reality technologies to construct a practical simulation confrontation environment, it can not only enhance the sense of technology, interactivity, and fun of teaching and training, but also help enhance the practicality of training, allowing trainees to “immersive” Improve training effectiveness and speed up training progress. For example, foreign military forces use interactive virtual courses in the metaverse to help soldiers master equipment maintenance and repair skills, and use augmented reality equipment to assist in the repair of some equipment. At the same time, the training and evaluation system constructed using digital twin technology will minimize the factors of human interference, squeeze the training water, provide real and objective evaluation conclusions for the training level of trainees, and promote military training from empirical management to scientific management.
To promote the digital intelligence of national defense mobilization, we must aim to win future wars, adhere to innovation-driven and technological victory, and gather superior resources in all aspects. 1. “We must focus on gathering excellence in wisdom and building new areas and new quality forces!”. Find out the high-end digital intelligence potential of national defense mobilization, tap out high-end talents, high-tech and other new resources in new fields and new fields hidden in the public and enterprises, deepen cooperation with artificial intelligence specialized new enterprises and related scientific research institutes and universities, and update them in a timely manner Potential catalog opens up new space for high-end potential support. Focusing on the expansion of support and support objects into multi-dimensional battlefields, focusing on the joint combat system “to make up for weaknesses” and multi-dimensional space “to make up for blindness”, relying on digital and intellectual potential resources to build a strong new domain and new quality defense mobilization team to provide strong support for the joint combat system. Second, we must focus on digital intelligence empowerment and improve efficient institutional mechanisms. Improve the military demand reporting and docking mechanism, unify the military demand indicator system, build a “clearly” demand reporting catalog list for both military and civilian parties, and consolidate the data foundation for collaboration and linkage. Improve the potential information system to realize functions such as intelligent matching of demand and potential, real-time statistics of stock and consumption, and form a close collaboration model between supply and demand that is data-driven, accurately matched, and trusted to interact. Third, we must focus on intellectual and brain assistance and build a strong command and coordination platform. Open up data barriers between systems to achieve information sharing, data interaction, and intelligent office. Accelerate the construction of a national defense mobilization command platform that integrates and connects combat command systems, connects grassroots defense mobilization units, and horizontally connects different types of mobilization units, using “big data + big model + cloud platform” technology to establish a relationship between “command chain” and “implementation chain” A human-machine collaborative decision-making model that presents situations, handles needs, assists planning, and regulates actions Improving the quality and effectiveness of defence mobilization command. Fourth, we must focus on outsmarting the future and accelerating technological innovation and transformation. Improve the mechanism to support joint military-civilian scientific and technological innovation, expand participation channels for local scientific and technological enterprises, universities and institutes, and achieve two-way promotion and efficient integration of new quality productivity and new quality combat effectiveness. Improve the agile response and rapid transformation mechanism of advanced technology, accelerate the development of new combat capabilities, and enhance the victory contribution rate of digital intelligence in national defense mobilization.
Cognition is the basis for operational decisions and operations. Cognitive warfare is a confrontation activity carried out in the cognitive domain. The purpose is to attack the enemy’s knowledge system, social consciousness, people’s morale, etc., disrupt its judgment and decision-making, and cause it to lose its decision-making advantage and action advantage. To deepen the research on cognitive warfare and decipher the cognitive warfare code, the key is to embed the combat decision-making chain and explore how to influence and interfere with the cognitive activities of the enemy’s decision-making chain, causing the enemy to form false observations, wrong judgments and poor decisions, so as to fully control Cognitive initiative.
Seeing is false, changing the facts
Observation is the starting point of cognition. No matter what kind of war, when facing any opponent, the first step is observation. The observation here is a broad concept and is about all activities to obtain all relevant information about the hostile party. Just as people perceive external things through sensory organs, observation relies on the battlefield perception system to obtain relevant data and information from the battlefield environment according to the needs of the subject, providing “ source material ” for judgment and decision-making. Observation uses intelligence, reconnaissance, surveillance and other activities to obtain as much factual information and materials from all aspects of the enemy as possible and convert them into text, images, audio, video and sensor signals.
The history of war at home and abroad in ancient and modern times shows that the essence of command is the endless pursuit of certainty, including the status and intentions of enemy troops, various factors affecting the combat environment such as weather and terrain, as well as the status and actions of one’s own troops. Therefore, efficient command consists in clarifying each element and then coordinating it as a whole to achieve the best combat effect. Human judgment and decision-making are easily disturbed by information uncertainty. In the observation stage, the key to cognitive warfare is to make the enemy unable to clearly observe, incompletely observe, and distort the information of their own combat elements, and lack real information or accurate understanding, thereby weakening the enemy’s decision-making on combat at the source. The pursuit of certainty.
Measures for observing cognitive warfare, in addition to common information warfare methods, such as disguise, interference, deception, silence, etc., should also pay attention to the following aspects: First, create complex situations. War is inherently full of complexity. By creating complexity, it increases the fog and resistance on the battlefield, making it impossible for the enemy to observe the real specific situation. For example, by creating various events and operations in multi-dimensional combat areas such as land, sea, air, sky, and network, and making irregular changes, it can effectively increase the difficulty of enemy observation. The second is to interfere with observation and cognition. Observation is not aimless. It is carried out based on a certain cognition. Cognition determines what information needs to be observed, what kind of reconnaissance activities need to be carried out, etc. For example, during observation activities, by interfering with operations, the enemy’s attention in observation activities is affected, causing it to lose the ability to focus on essential issues and key issues, thereby making it unable to obtain key information. The third is to shape the factual narrative. Shaping factual narratives is to reformulate, combine, arrange, and reconstruct facts according to the needs of cognitive warfare. These facts are either created out of nothing, highlight certain details in the facts, or are difficult to verify and test, making their observation materials Mixed with fictional facts, the observed facts are far from objective facts. The fourth is to protect specific knowledge. Knowledge protection is an important aspect of cognitive warfare. The main contents include: commander’s decision-making style, combat theory reasoning process, premises and assumptions, key tactical ideas and combat principles, key decision-making procedures, mechanisms and methods, information analysis methods, especially some algorithms, passwords, etc.
Targeting the judgment, misleading the judgment
On the battlefield, simple observation and data collection do not make much sense. Only by analyzing these data “ by looking at the essence of the phenomenon, and then drawing various judgments, will we promote the formation of operational decisions. For example, during the Battle of Moscow in World War II, the Soviet Union had a lot of and messy information about the Japanese Kwantung Army. Finally, after careful analysis, it was concluded that “ the Soviet Union could be considered safe in the Far East, and the threat from Japan had been ruled out ” After the judgment, it was decided to transfer troops from the Far East to Moscow to participate in the Battle of Moscow. Judgment is the corresponding conclusion reached by analyzing and reasoning the observation results, which mainly includes: first, factual judgment, usually expressed in descriptive language, such as the current situation, enemy battlefield deployment, battlefield posture, etc.; second, value and relationship judgment, usually Expressed in evaluative language, such as threat assessment, correlation analysis, trend prediction, etc.
Judgment cognitive warfare is actually a game surrounding judgment. Normally, judgments arise on the basis of a judgment, without which there would be no conclusion of judgment. Whether a person has high blood pressure or diabetes is often based on some medical indicators, and these indicators are the criteria. The premises and assumptions of reasoning are actually based on judgments. “ Persian cat story ” circulated in World War I. Judging from the location of the command post from a Persian cat, it contains a series of judgments: there is no village around, and it cannot be a cat raised by ordinary civilians; the sound of artillery on the battlefield is rumbling, and it cannot be It is a wild cat that is cautious and avoids people; Persian cats are a valuable breed, and the position of cat owners is not low; cats appear at fixed times every day, and the command post should be near cats. Therefore, interfering with judgment is to target the judgment to design and produce information products so that the facts obtained do not match the judgment, or to minimize the leakage of information related to the judgment, so that the enemy cannot judge or make wrong judgments.
The main contents of the interference criterion are: First, the interference is based on experience. Based on enemy experience, create “ virtual facts ” to make errors in judgment. For example, in the Battle of Maling, Sun Bin halved the stove to lure Pang Juan, which is a typical example. Because according to experience, the number of stoves is directly proportional to the number of troops. Halving the number of stoves every day means that the number of people is decreasing. The possibility of reduction is that the soldiers have suffered greater casualties, which leads to the judgment of weakening combat power. The second is to interfere with the judgment based on the knowledge system. Such knowledge includes the enemy’s common sense, concepts, principles and some assumptions. For example, in the Fourth Middle East War that broke out in October 1973, Israel’s initial defeat was a misjudgment of the war situation. It believed that as long as its air force was still in an advantageous position, the other side would never dare to attack. However, Egypt began to adopt new military technology and used mobile surface-to-air missiles to support an air defense network, partially offsetting Israel’s air superiority. The third is to interfere with judgments based on universal culture. That is, design corresponding information and actions based on the enemy’s cultural characteristics so that they can be misjudged due to cultural differences. According to foreign information, during the Cold War, the United States studied the root causes of “ Soviet behavior, so it started from culture and behavior to induce the Soviet Union to make strategic misjudgments. The fourth is to interfere with methodological-based judgments. Generalizations, analogies, etc. are the basic methods of judgment. Cognitive interference based on methodology makes it difficult for the other party to understand facts and cannot be compared with known facts; complicating the causal relationship and confusing factual cause and effect, psychological cause and effect, conditional cause and effect, social cause and effect, etc., making it impossible to implement causal judgment; reducing possible signs and phenomena, making it impossible to see through the essence and make accurate judgments.
Focus on the process and influence decision-making
Operational decision-making is based on combat purposes and intentions. After observation and judgment, various factors are combined to derive the optimal solution to the problem. War or conflict behavior has game, competition and confrontation attributes, so decision-making is a game. Decisions address key issues such as whether to do it, how to do it, what purpose to achieve, or the state of termination. In information-based local wars, action-centeredness gradually replaces planning-centeredness, requiring an increase from data center warfare, information center warfare, and knowledge center warfare to decision-making center warfare. Combat decision-making has become one of the main areas of competition between the enemy and ourselves.
Decision-making cognitive warfare is to target enemy cognition and interfere with the decision-making process to affect the quality and efficiency of decision-making. Decision-making is affected by the knowledge structure of the decision-maker himself. If cognition is paranoid or the knowledge reserve is outdated, even if the judgment is correct, good decisions will still not be made. The decision-making process includes the application and change process of knowledge structure, which mainly involves procedural knowledge and conceptual principled knowledge. The former includes decision-making procedures and methods, decision-making mechanisms and evaluation methods, etc., while the latter includes understanding of battlefield posture, winning mechanism, combat concepts, combat rules, and weapons and equipment performance. Therefore, cognitive attacks on the decision-making process will greatly affect its decision-making speed and quality.
The main ways to influence cognitive warfare in decision-making are: First, squeezing the cognitive decision-making space. When watching tennis matches, commentary on non-forced errors and forced mistakes are often heard, with forced mistakes being those caused by putting pressure on the opponent. Interfering with the cognitive decision-making environment is to put pressure on the enemy’s cognitive decisions, thereby squeezing the cognitive space and weakening cognition to force the enemy to make mistakes in decision-making. For example, through virtual and real decision-making activities and actions, the opponent is trapped in decision-making difficulties, which increases the probability of low-level decision-making. The second is to attack rational cognition. Including: First, interfering with the understanding of threats and opportunities. Many examples of failures in military history are caused by misjudgment of threats and opportunities on the battlefield. Whether you despise the enemy or overestimate the enemy, you will form decision-making expectations that are different from objective reality, leading to adverse action results. Second, attack combat theory and doctrine. For example, by proposing the theory of mutual restraint, deliberately exaggerating the loopholes in the enemy’s doctrine, and amplifying the adverse effects of the enemy’s combat operations, the enemy can arouse doubts about its own theory and doctrine. Third, for procedural knowledge. Including decision-making mechanisms, procedures and methods, plan evaluation and combat evaluation methods, auxiliary decision-making systems, algorithms, thinking, etc. Attacking the weaknesses present will also cause decision-making errors. The third is to interfere with irrational factors. The use of irrational factors often creates decision-making traps, such as groupthink traps, conceit traps, etc., which have a significant impact on decision-making. The strategic deception successfully implemented by the Allied forces many times during World War II was to use the enemy’s ambiguous and misleading analysis to increase the probability that the wrong decision would win.
System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole.
In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze . System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“ 1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence 2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations 3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure 4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control 5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare 6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma 7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support 8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics 9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.
1. Overall deterrence Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.
1.1 Emphasis on multi-domain joint deterrence Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.
1.2 The implementation of overall deterrence should have three major elements Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.
Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.
1.3 Strong overall strength is the core of achieving effective deterrence The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war. In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.
2. Electromagnetic Disturbance Warfare Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.
2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.
2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.
2.3 Crack effective tactics for unmanned cluster operations “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.
3. Cyber-sabotage Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities. The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.
4. Cognitively Controlled Disturbance Warfare Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage. Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.
4.1 Control the cognitive rights of situational awareness and compete for information advantages In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.
4.2 Control and command decision-making power and compete for decision-making advantages Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.
4.3 Control “brain” power and seize the advantage of brain control Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.
5. Agile Mobile Warfare Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.
Table 1 Connotation of the concept of agile warfare
5.1 Efficient and fast decision-making To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.
5.2 High efficiency forms a favorable combat situation It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.
5.3 Efficient and instant gathering of combat power To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.
5.4 Agile mobile warfare is an innovative development of traditional mobile warfare In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.
6. Unmanned cluster autonomous warfare Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.
6.1 It is conducive to forming a system advantage to suppress the enemy Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.
6.2 Conducive to enhancing combat effectiveness In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.
6.3 Conducive to getting into enemy combat difficulties Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.
7. Pointkill Battle “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.
7.1 Achieve efficient combat cost ratio Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.
7.2 Targeting key nodes is an important option The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.
7.3 Large-scale system support is the basic condition The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.
7.4 It is inseparable from precise intelligence support In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.
8. Supply-breaking Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.
8.1 The supply guarantee chain has a huge impact on the overall combat situation Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.
8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.
8.3 The key is to choose the right time and make full use of tactics It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.
9. System “paralysis battle” System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.
9.1 The combat goal is to disorderly operate the enemy’s combat system In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.
9.2 A key node in the heavy strike combat system Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.
9.3 Implement soft strikes against the enemy’s combat system When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat.
Soldiers are a major event for the country. In the great journey of “building a powerful country and rejuvenating the nation, and against the background of the accelerated evolution of major changes unseen in the world in a century, building and consolidating national defense and a strong people’s army are directly related to the future and destiny of the country and the nation”. The Third Plenary Session of the 20th Central Committee of the Communist Party of China pointed out that “national defense and military modernization are important components of Chinese-style modernization”, which fully reflects the great importance that the Party Central Committee with Comrade Xi Jinping as the core attaches to national defense and military construction, and provides guidance for national defense and military modernization on the new journey. Modernization points out the direction.
The modernization of the national defense and military is the security guarantee and strategic support for Chinese-style modernization
”If you fall behind, you will be beaten. Only when the army is strong can the country be safe”. Without a strong army, there can be no strong state. After the Opium War in 1840, modern China was repeatedly defeated in its battles with Western powers. The vast country gradually became a semi-colonial and semi-feudal society, with the country humiliated, the people in trouble, and civilization in dust. History has inspired us that the Chinese nation’s emergence from suffering and the liberation of the Chinese people depend on a heroic people’s army; to comprehensively promote the great cause of building a powerful country and national rejuvenation with Chinese-style modernization, we must place national defense and military modernization as a barrier to national security, plan and deploy in strategic positions based on career development, and accelerate the construction and consolidation of national defense and a strong people’s army.
The modernization of the national defense and military is closely linked and internally unified with Chinese-style modernization. Without the modernization of national defense and the military, there would be no Chinese-style modernization. Comrade Mao Zedong once profoundly pointed out “the original requirements for building socialism were industrial modernization, agricultural modernization, scientific and cultural modernization, and now we must add national defense modernization”; Comrade Deng Xiaoping also emphasized “four modernizations, one of which is national defense modernization”, these all reflect the great importance our party attaches to national defense and military construction.
Since the 18th National Congress of the Communist Party of China, President Xi has always adhered to the integrated operation of strengthening the country and the military, put national defense and military modernization in the chess game of Chinese-style modernization, and opened up the road to strengthening the military with Chinese characteristics, forming a new strategy for national defense and military modernization by 2027, 2035, and the middle of this century, a new “three-step” strategy for national defense and military modernization that connects near, medium and long-term goals Created a new situation in the cause of strengthening the military. Guided by the party’s goal of strengthening the military in the new era, we will comprehensively implement the strategy of reforming and strengthening the military, promote the reform of the leadership and command system, the reform of scale structure and force organization, and the reform of military policies and systems. Our military’s organizational structure will achieve historic changes, and the force system will achieve revolutionary changes. Reshaping, the basic framework of the socialist military policy system with Chinese characteristics has been constructed and formed. Our military system has been completely new, its structure has been completely new, its pattern has been completely new, and its appearance has been completely new It has laid a solid foundation for the modernization of national defence and the army.
Military means, as a means of guaranteeing the realization of great dreams, can only stop a war if it can be fought. The current and future periods are critical periods for comprehensively promoting the great cause of building a powerful country and rejuvenating the nation through Chinese-style modernization, and will inevitably encounter various risks, challenges and even turbulent waves. We must comprehensively modernize our national defense and military, build the People’s Army into a world-class military, effectively guarantee Chinese-style modernization, and safeguard national sovereignty, security, and development interests.
Comprehensive and accurate grasp of the scientific connotation of national defense and military modernization
Since the 18th National Congress of the Communist Party of China, President Xi has issued a series of important expositions around “Chinese-style modernization”, summarizing the Chinese characteristics, essential requirements and major principles for the formation of Chinese-style modernization, building a theoretical system for Chinese-style modernization, and promoting the new era and new journey. Chinese-style modernization provides scientific guidance and also carries out strategic design and scientific deployment for national defense and military modernization.
The most fundamental thing about modernizing the national defense and military is to uphold the absolute leadership of the party over the military. The leadership of the Party is the fundamental guarantee of Chinese-style modernization, which determines the fundamental nature of Chinese-style modernization, and it must also determine the fundamental nature of national defense and military modernization. To promote the modernization of national defense and the military on the new journey, we must fully implement a series of fundamental principles and systems for the party to lead the people’s army, comprehensively and thoroughly implement the chairman’s responsibility system of the Military Commission, and effectively unify thoughts and actions into the decisions and arrangements of the Party Central Committee and President Xi; Adhere to the party’s management of cadres and talents, and highlight political standards and combat capabilities Ensure that the barrel of the gun is always in the hands of those who are loyal and reliable to the party; improve the comprehensive and strict governance of the party system, enhance the political and organizational functions of party organizations at all levels, and integrate the party’s leadership throughout the entire process of continuing to deepen national defense and military reforms in all aspects.
To modernize national defense and the military is to modernize military doctrine, military organization, military personnel, and weapons and equipment. This reflects the inherent requirements for the construction of military forces resulting from changes in the concept of victory in modern warfare, elements of victory and methods of victory, and clarifies the main signs of the basic realization of national defence and military modernization. To realize the modernization of military theory is to keep pace with the times, innovate war and strategic guidance, and form a military theoretical system that is contemporary, leading, and unique; to realize the modernization of organizational form is to deepen the reform of national defense and the military, and the military force structure layout is scientific and reasonable, strategic deterrence capabilities are consolidated and improved, new areas and new quality combat forces continue to grow, and elite operations, system support, and joint victory have become the basic application models; To realize the modernization of military personnel is to deeply implement the strategy of strengthening the military with talents in the new era, promote the comprehensive transformation and upgrading of military personnel’s capabilities, structural layout, and development management, and forge high-quality, professional new military talents with both ability and political integrity; to realize the modernization of weapons and equipment, It is necessary to focus on strengthening national defense scientific and technological innovation and accelerating the development of strategic, cutting-edge and disruptive technologies Accelerate the upgrading of weapons and equipment and the development of intelligent weapons and equipment.
For the modernization of national defence and the military, we must adhere to the integrated development of mechanization, informatization and intelligence. The military conflicts and local wars that have taken place in recent years have shown that new qualitative combat capabilities generated based on intelligent combat systems are increasingly becoming core military capabilities. Based on mechanization, dominated by informatization, and oriented by intelligence, the three superimpose, penetrate, and support each other, jointly giving rise to new forms of warfare and methods of warfare. Only by accelerating the integrated development of mechanization, informatization and intelligence and keeping up with the new military revolutionary trends in the world can we seize the opportunity and take the initiative in seizing the commanding heights of the military struggle.
The modernization of national defence and the army is a guarantee of security for insisting on the path of peaceful development. Since ancient times, soldiers have not been warlike. Chinese-style modernization is modernization on the path of peaceful development. Building a consolidated national defense and a strong military commensurate with international status and national security and development interests is a strategic task of China’s socialist modernization drive and an insistence on taking the path of peaceful development. Safety guarantee is an inevitable choice for summarizing historical experience. China has always pursued a defensive defence policy and adhered to the strategic idea of active defence, and no matter how far it develops, China will never seek hegemony or engage in expansion. To promote the modernization of national defense and the military on the “new journey”, we must faithfully implement the concept of a community with a shared future for mankind, resolutely oppose all forms of hegemony and bullying, and contribute China’s strength to building a beautiful world of lasting peace and universal security.
Advancing the modernization of national defence and the military at a new historical starting point
The Third Plenary Session of the 20th Central Committee of the Communist Party of China included “continuous deepening of national defense and military reforms into the overall plan for further comprehensive deepening of reforms, and made a series of major strategic arrangements for improving the leadership and management system and mechanism of the people’s army, deepening the reform of the joint operations system, and deepening cross-military and civilian reforms”. On the new journey, we must deeply understand and grasp the themes, major principles, major measures, and fundamental guarantees for further comprehensively deepening reforms, resolutely implement the new “three-step” strategy for national defense and military modernization, and accelerate the modernization of military theory, military organizational form, and military personnel. Modernize and modernize weapons and equipment, and lead the modernization of national defense and the military to move forward with better strategies, higher efficiency, and faster speed.
Strengthening the Party’s theoretical and scientific leadership in military guidance. Our party insists on combining the basic principles of Marxism with the practice of building the people’s army, absorbing the essence of China’s excellent traditional military culture, and constantly exploring new realms in the development of contemporary Chinese Marxist military theory and military practice. As an important part of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, Xi Jinping Thought on Strengthening the Military has achieved a new leap forward in the Sinicization and modernization of Marxist military theory. It is the fundamental guiding ideology of our party building and military governance in the new era. We must unremittingly arm our minds with Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, further firmly establish the guiding position of Xi Jinping Thought on Strengthening the Military in national defense and military construction, and build and consolidate national defense and a strong people’s army under the guidance of Xi Jinping Thought on Strengthening the Military. Take new and greater steps on the road to strengthening the military with Chinese characteristics.
Efforts should be made to make the main responsibility and business of war preparation more solid and effective. The People’s Army is an armed group that performs the party’s political tasks. It must be both politically strong and capable. In the final analysis, this ability can win wars. To accelerate the modernization of national defense and the military, we must firmly grasp the fundamental direction of winning wars, establish the only fundamental standard of combat effectiveness, focus all our energy on fighting wars, and work hard on fighting wars. Conscientiously implement the military strategic policy for the new era, operate war preparation and cessation, deterrence and actual combat, war operations and the use of military forces in peacetime as a whole, innovate strategies, tactics and tactics, effectively shape the situation, manage crises, contain wars, and win wars. Adhere to the principle of “training troops as they fight, and comprehensively improve the actual combat level of military training and the ability to perform missions and tasks”.
Promote high-quality development of national defense and military construction through “reform and innovation”. Reform is a key move that will determine the growth of our army and its future. On the new journey, we must put innovation at the core of the overall military construction and development, transform development concepts, innovate development models, enhance development momentum, and promote the transformation of national defense and military modernization from quantitative growth to qualitative improvement. Focus on integrating national defense and military construction into the national economic and social development system on a wider scale, at a higher level, and to a deeper extent, continuously improve the quality and efficiency of national defense and military modernization, promote the simultaneous improvement of national defense strength and economic strength, and consolidate and improve the integration National strategic system and capabilities, and constantly write a new chapter of strengthening the country and the military.
Adhere to the integrated development of mechanized informatization and intelligence
——Seriously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China
The report to the 20th CPC National Congress emphasized “upholding the integrated development of mechanization, informatization, and intelligence,” elevating the requirement for the integrated development of mechanization, informatization, and intelligence (hereinafter referred to as the “three modernizations”) to a new strategic level. To thoroughly study, publicize, and implement the spirit of the 20th CPC National Congress and strive to achieve the goals of the PLA’s centenary, we must focus on understanding and grasping the primary characteristics, profound mechanisms, basic principles, and strategic measures of the integrated development of the “three modernizations,” and effectively promote their implementation.
Recognize the main characteristics of the integrated development of the “three transformations”
Mechanization, informatization, and intelligence are progressive and interdependent. From a chronological perspective, the three transformations did not originate simultaneously. Without the prerequisites and foundations of the previous transformations, the subsequent transformations could not occur and develop. For example, without mechanization, there would be no informatization. Informatization requires the physical substance provided by mechanization. Without mechanized combat platforms and ammunition as carriers of information nodes, the “connectivity” of informatization would be lost. Informatization is the nucleus of intelligence. Without the sufficient computing power and data provided by advanced informatization, the next generation of artificial intelligence cannot achieve the chain breakthroughs it promises. Without a solid foundation of mechanization, a military cannot advance informatization, and without a solid foundation of mechanization and informatization, it cannot effectively advance intelligence.
Based on this understanding, it’s difficult to leapfrog mechanization and informatization to embrace intelligence. Generally speaking, the latter can only replace the former in specific areas, not completely replace or surpass it. If the foundation of the former’s core technologies, foundational areas, and key stages is not solid, bottlenecks and shortcomings will be difficult to address quickly. Not only will these bottlenecks be difficult to address with the latter, but their weak foundation will also hinder the latter’s development, hindering overall development. If we skip mechanization and informatization and shift our focus entirely to intelligence, haste may lead to failure.
Mechanization, informatization, and intelligence will overlap and coexist for a long time. The term “basic mechanization” generally refers to the fact that mechanization has reached a late stage of development, with its contribution to combat effectiveness having already experienced diminishing returns. Further investment in mechanization will significantly reduce the cost-effectiveness. This does not mean that there will be no more mechanization construction tasks; it simply means that the proportion of investment in informatization and intelligence will gradually decrease compared to informatization and intelligence. Informatization is not the end of mechanization; a certain degree of mechanization will continue during the informatization process. Similarly, intelligence is not the end of mechanization and informatization; a certain degree of informatization and mechanization will continue during the intelligence process. Each of the “three transformations” is only a construction focus for a specific historical period; no one “transformation” is exclusive to any given period.
Based on this understanding, we cannot pursue a “starting from scratch” approach, overthrowing mechanization and informatization in favor of intelligentization. The “three transformations” cannot be viewed in isolation. They are meant to be inclusive, integrated, and mutually exclusive, not selective. The subsequent transformation does not negate or terminate the previous one, nor does it mean discarding the achievements of the previous one and starting over with a new one. We must ensure a smooth transition and gradual upgrade of the combat system from mechanization to informatization and then to intelligentization. Taking intelligentization as an example, intelligentization does not mean completely overthrowing the existing informatized combat system and establishing a completely new, independent intelligent combat system.
Intelligent informationization uses the virtual to control the real, empowering and increasing efficiency in mechanization. The “real” here primarily refers to “hardware,” represented by physical entities such as combat platforms and ammunition, while the “virtual” primarily refers to “software,” centered around combat data and algorithms. While mechanization primarily relies on hardware development, informationization and intelligentization primarily rely on software development, optimizing and upgrading hardware and increasing its efficiency through software. In terms of development priorities, payloads surpass platforms, software surpasses payloads, and algorithms surpass software. Software costs in informationization and intelligentization far exceed hardware costs.
Based on this understanding, we must not pursue development that prioritizes hardware over software or creates a disconnect between the virtual and the real. In the era of intelligence, if the supporting software and core algorithms that serve as the “brains” of weapons and equipment lag behind, even the highest hardware performance indicators will be merely “inflated,” and it will be difficult to realize its combat potential in actual combat. Military combat practice demonstrates that in the era of intelligence, we should prioritize the development of general-purpose chips and core algorithms for military intelligence technology from the outset to avoid being caught in a passive position.
Clarify the profound mechanism of the integrated development of the “three transformations”
The integrated development of the “three transformations” is not a simple mixing, combination, or compounding of the “three transformations,” but rather a process of mutual inclusion, mutual penetration, and mutual promotion. From “you are you, I am me” to “you are in me, I am in you,” and then to “you are me, I am you,” achieving a seamless blend and unity, generating cumulative, aggregate, and multiplier effects, and achieving a qualitative leap in overall combat effectiveness. The integrated development of the “three transformations” primarily follows the following mechanisms:
Advantage-overlaying mechanism. Whether mechanization, informatization, or intelligentization, the supporting technology clusters for each “transformation” will give rise to a series of new weaponry and equipment, generate new combat forces, and ultimately form new combat capabilities with different operational mechanisms. The combined advantages of these new combat capabilities with existing combat capabilities can produce a systemic emergence effect, greatly enhancing the overall combat capability of the military; it can enrich one’s own combat means, methods, and approaches, and put the enemy in a dilemma of multiple difficulties.
Upgrade and expansion mechanism. Informatization, through the digital transformation and networking of various mechanized combat platforms, aggregates and upgrades mechanized combat systems into informationized combat systems, resulting in a qualitative leap in combat effectiveness. Intelligence can also be integrated with mechanization and informatization through upgrades and expansions. On the one hand, intelligent technologies are used to upgrade the control systems of mechanized combat platforms, continuously enhancing the autonomous combat capabilities of individual weapons and equipment. On the other hand, intelligent technologies are used to optimize and upgrade informationized combat systems, significantly enhancing their capabilities in information acquisition, transmission, processing, sharing, and security, and comprehensively improving the combat capabilities of the system.
A mechanism for addressing shortcomings and replacing them. The history of military development shows that as a particular “industry” develops, it often encounters bottlenecks that are difficult to resolve with its own technological system alone. This necessitates the urgent need for innovative solutions using the technical means and development strategies of other “industries.” Currently, machinery is becoming increasingly sophisticated and complex, making its design and control increasingly difficult. Informatization has led to an “information explosion,” making it increasingly difficult to quickly translate this information into decision-making information. These problems are difficult to effectively address within the technological systems of mechanization and informatization alone. However, the application of intelligent technology can effectively overcome bottlenecks in mechanical control and information processing capabilities. Furthermore, technological breakthroughs in the first “industry” can offset the shortcomings of the second. For example, hypersonic missiles can outpace the response capabilities of networked and informationized defense systems, enabling rapid penetration, which to some extent offsets an adversary’s information advantage.
Grasp the basic principles of the integrated development of the “three transformations”
In promoting the integrated development of the “three transformations”, we should focus on the following basic principles:
The principle of mutual promotion and symbiosis. Each “transformation” differs fundamentally in its combat effectiveness generation mechanisms and development goals. The simultaneous and parallel development of the three transformations presents both favorable conditions for mutual enhancement, mutual promotion, and mutual support, but also unfavorable factors such as competition over development areas, resource allocation, and investment volume. We must ensure that the three transformations form a healthy symbiotic relationship within the overall development process, avoiding conflicts, frictions, and constraints that could lead to a situation where 1+1+1 is less than 3, and strive to achieve systemic emergence and synergistic effects.
The principle of overall coordination. The importance of the “three transformations” is not ranked in order of importance. We should not emphasize one at the expense of the others. Instead, the three transformations should be considered as a system, coordinated and advanced as a whole. While informatization and intelligentization appear more advanced and complex, we should not assume that mechanization is low-end, simple, and easy to implement, or that the importance of mechanization can be ignored with the advent of informatization and intelligentization. On the one hand, if mechanization is not fully implemented, it will hinder progress and become a bottleneck restricting overall development. Similarly, without the sufficient computing power and data provided by full informatization, the next generation of artificial intelligence cannot achieve a series of breakthroughs. On the other hand, mechanization also has high-end cutting-edge fields such as hypersonic aircraft and deep-sea submersibles that can have a disruptive effect.
The principle of prioritizing key areas. Total investment in national defense and military development is limited. Given a relatively fixed overall budget, investing more in one area will inevitably result in less investment in others. We should accurately assess the contribution of each area to combat effectiveness over the coming period, identify the area that will most significantly increase combat effectiveness as the priority for development, rationally allocate resources in a prioritized manner, and scientifically determine the direction and amount of investment. Failure to prioritize the development of the “three areas” and applying a “sprinkle pepper” approach to each area can easily result in a low input-output ratio and may even cause military development to stray from its correct trajectory.
Strengthening strategic measures for the integrated development of “three transformations”
In practice, we should strive to change the inertial thinking of relying on latecomer advantages and unconsciously falling into the habit of following development, strive to get out of the passive catch-up development model, and turn to the pursuit of concurrent advantages and first-mover advantages. We should develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to drive mechanization and informatization to a higher level. We should use the integrated development of the “three transformations” as a powerful engine to promote the transformation and development of the military and achieve a comprehensive leap in the overall construction level.
We must effectively strengthen top-level design and overall coordination for the integrated development of the “three transformations.” We must fully recognize the long-term, complex, and arduous nature of the integrated development of the “three transformations,” adhere to the unity of technological and conceptual integration, and avoid simply applying the existing mechanization and informatization construction model to the integrated development of the “three transformations.” We must also avoid generalization and labeling of the “three transformations.” We must strengthen top-level design and overall coordination with strong organizational leadership, streamline multiple relationships, pool the strengths of all parties, and create a positive synergy.
Proactively plan key areas for the integrated development of the three transformations. First, address areas where one transformation affects and constrains the development of others. Quickly identify technical bottlenecks within each transformation, compile a list of these bottlenecks, and increase investment in focused research to address these shortcomings as quickly as possible. Second, address areas where one transformation could potentially offset the achievements of others. During the integrated development of the three transformations, even after one has become dominant, we should still prioritize developing new operational mechanisms within the others, potentially disrupting the strategic balance and generating disruptive impacts, potentially even offsetting the achievements of the others. Third, address areas where the three transformations intersect and intersect. The “edge zones, intersections, and junctions” of the three transformations are also crucial for rapidly generating new qualitative combat capabilities. Currently, we should particularly proactively plan for areas such as “ubiquitous network plus” and “artificial intelligence plus.”
(Author’s unit: Academy of Military Science, Institute of War Studies)
Effectively lay a solid foundation for informatization
■Li Zhanliang
The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informatization and intelligence. From the perspective of the relationship between mechanization, informatization and intelligence, mechanization is the foundation of informatization, and intelligence is the sublimation of informatization. Without mechanization there is no informatization, and without adequate informatization, no major breakthrough in intelligence is possible. At present, to vigorously promote military intelligence, we must first effectively lay a solid foundation for informatization construction and strive to improve the level of informatization of our troops.
Solidifying the material base. “It’s hard for a clever woman to make a meal without rice”. In order to shorten the gap with powerful enemies “system gap”, information construction should closely follow the mission and tasks, keep up with cutting-edge technology, do a good job in top-level design, and promote peace and war in an integrated manner. First, upgrade and improve all types of information systems. It is necessary to “focus on the construction of the accusation center and use information infrastructure as a platform to coordinate the construction of sub-systems and the linkage construction of various systems, promote the construction of all elements and systems in areas such as command and control, and realize the integration of information networks in each sub-domain.” Real-time command and control. Secondly, we should build a good operational database. In accordance with the principles of “integration of peacetime and wartime, overall planning, and classified implementation”, we will build a comprehensive combat database to achieve information sharing, data support, and auxiliary decision-making, and support “command chain” with “information flow”. Again, a preset backup mobile command post. We should actively draw on the useful practices of foreign military forces and vigorously strengthen civil defence projects, so as to form a mobile command capability with a multi-point layout, complementary movements and static forces, and rapid configuration.
Build a “strong team”. To win local information wars with intelligent characteristics, building a strong information force is an important guarantee. On the whole, efforts should be made to train four types of talents: first, information command talents. Frontline mid – and senior-level commanders should study information and data like troops, the construction of information systems like battle breakthroughs, and the use of electromagnetic spectrum like ammunition performance. Second, information warfare talent. Cultivate a group of intelligent staff officers, operational planners, cognitive operations and other talents who are competent in information-based operations. Third, information security talents. With the “information assurance department and information assurance operation and maintenance professional technical team personnel” as the main targets, we will continue to increase professional training and improve network management, system use, inspection and maintenance capabilities. Fourthly, information research and development talents. Adopt methods such as “invite in, go out, etc., let go of burdens, and hand in tasks, cultivate a group of expert technical talents with strong system research and development capabilities, establish an information-based high-end talent mobile station, and form “not for me, but for me”” Use a virtuous cycle.
Change command philosophy. Modern warfare is about system, and joint combat command is a key part of it. In order to respond to real threats and challenges, it is necessary to establish a new concept of command that is compatible with future wars. First, the establishment of a solid integrated command concept. Overcoming the narrow concept of command of a single service and arms, comprehensively coordinating multi-dimensional battlefield operations such as land, sea, air, space, electricity, and networks, and integrating various combat elements to effectively improve the combat effectiveness of overall victory and joint victory. Second, establish a solid digital command concept. Transform from “extensive to precise command”, concretize and refine mission distinction, force use, time and space division, goal determination, etc., standardize the command procedures, command methods, command content and other processes of joint combat forces, and standardize reconnaissance intelligence, weapons The platform, command and control and other networked and real-time operations shorten the command process and improve the command timeliness. Third, we need to establish a solid and intelligent command concept. Actively explore the systematic application of artificial intelligence technology, accelerate the development and application of new technologies such as intelligent decision-making, digital twins, big data, and cloud computing, improve the level of complex information processing on the battlefield, and enable commanders to control combat units and various types of weapons with the support of intelligent cloud brains. Task-based command of the platform.
Advancing innovative practices. In order to adapt to changes in science and technology, changes in war, and changes in opponents, we should speed up the construction of “three systems” to win the information war. First, the system of innovative tactics. In-depth study of the real strategies of preventing enemy information attacks, resisting enemy information interference, and counterattacking enemy information in the case of all-round information strikes and firepower destruction by powerful enemy opponents, and strive to achieve precise enemy control. Secondly, the system of innovative training. Focusing on “strong enemy opponents and combat tasks, set up an information combat environment, conduct in-depth research and training on command coordination, tactical application, system construction, comprehensive support and other topics, and promote actual combat deployment and application”. Innovation management systems again. Adhere to the integration of peacetime and wartime management and the combination of virtual and real management, establish a demand-driven mechanism, a plan-led mechanism, and an inspection and evaluation mechanism led by war, create an independent and controllable industrial chain, supply chain, and guarantee chain, and ensure “peace management ”“wartime Use” seamless connection to help continuously improve information combat capabilities.
With the accelerated application of cutting-edge technology in the military field, intelligent unmanned systems have become an important part of modern warfare. The world’s major military powers attach great importance to the application of intelligent unmanned system technology in the military field. In the future, intelligent unmanned systems will have a profound impact on combat methods and subvert the rules of war. As a culmination of cutting-edge science and technology (such as artificial intelligence, intelligent robots, intelligent perception, intelligent computing, etc.), intelligent unmanned systems represent the highest level of development of a country’s scientific and technological strength. Therefore, research in the field of intelligent unmanned systems can greatly promote the development of existing military and livelihood fields. At present, unmanned system equipment has emerged in military conflicts. For example, in the conflict between Turkey and Syria, Turkey used the Anka-S long-flight drone and the Barakta TB-2 reconnaissance and strike drone equipped by the Air Force to attack the Syrian government forces; the Russian Ministry of Defense also announced that militants in Syria used drones carrying explosives to launch a cluster attack on its military bases; in 2020, the United States used an MQ-9 “Reaper” drone to attack a senior Iranian military commander and killed him on the spot. Unmanned combat is coming, and intelligent unmanned systems, as a key weapon on the future battlefield, will determine the victory of the entire war.
Image from the Internet
The development of intelligent unmanned systems will not only promote the upgrading and progress of existing military technology, but also drive the intelligent development of civilian technology, including intelligent transportation systems, smart home systems, intelligent manufacturing systems and intelligent medical systems. In order to develop intelligent unmanned systems more scientifically and rapidly, major scientific and technological powers have introduced a series of plans and routes for the development of intelligent unmanned systems, striving to seize the initiative and commanding heights in the development of intelligent unmanned systems. Related ones include the United States’ integrated roadmap for autonomous unmanned systems, Russia’s national weapons and equipment plan, the United Kingdom’s defense innovation technology framework, China’s new generation of artificial intelligence development plan, and Japan’s medium- and long-term technology plan. In recent years, from air to space, from land to sea, various types of intelligent unmanned systems have emerged in large numbers. The world’s major powers have gradually deployed intelligent unmanned systems into the military, and in some regional conflicts and anti-terrorism battlefields, the key role of intelligent unmanned systems is increasing. Therefore, this article will focus on the military needs of the future battlefield, based on the challenges of the actual complex environment faced by the future battlefield, analyze the key technologies required for the development and application of intelligent unmanned systems, and analyze the key technologies of individual enhancement and cluster enhancement from a military perspective, and explain the development trend of intelligent unmanned systems.
Current research status at home and abroad
The concept of intelligent unmanned system has only been proposed recently. At present, its research is still in its early stages, and there is no unified definition in the world. It is temporarily defined as: an organic whole composed of an unmanned platform and several auxiliary parts, with the ability to perceive, interact and learn, and capable of autonomous reasoning and decision-making based on knowledge to achieve the goal. Intelligent unmanned systems can be divided into three major parts: land unmanned systems, air unmanned systems and marine unmanned systems according to the spatial scope of their functions. Among them, land unmanned systems mainly include reconnaissance unmanned vehicles, transport unmanned vehicles, combat unmanned vehicles, obstacle removal unmanned vehicles, bomb disposal unmanned vehicles, unmanned vehicle formations and command systems, etc.; air unmanned systems mainly include reconnaissance drones, combat drones, logistics transport drones and drone formations, etc.; marine unmanned systems mainly include reconnaissance unmanned boats, combat unmanned boats, logistics transport unmanned boats, patrol search and rescue unmanned boats, reconnaissance unmanned submarines, combat unmanned submarines and shore-based support systems, etc. This section will explain the current research status of intelligent unmanned systems at home and abroad from the above three parts. ⒈ Current status of foreign intelligent unmanned system research ⑴ Land unmanned system Land unmanned systems are mainly used in intelligence collection, reconnaissance and patrol, mine clearance and obstacle removal, firepower strike, battlefield rescue, logistics transportation, communication relay and electronic interference. As the advantages of land unmanned systems in combat become more and more prominent, research on them has attracted more and more attention from various countries. The United States launched the “Joint Tactical Unmanned Vehicle” project in November 1993, which is the predecessor of the “Gladiator” unmanned combat platform project. In 2006, the United States completed the design of the entire system of the “Gladiator” unmanned combat platform and officially equipped the Marine Corps in 2007. The “Gladiator” tactical unmanned combat platform is the world’s first multi-purpose combat unmanned platform. It is equipped with sensor systems such as day/night cameras, GPS positioning systems, and acoustic and laser search systems. It is also equipped with machine guns, submachine guns, tear gas, sniper systems, biological and chemical weapons detection systems, etc. It can perform reconnaissance, nuclear and biological weapons detection, obstacle breakthrough, anti-sniper, firepower strike and direct shooting in different weather and terrain. The Gladiator unmanned combat platform is equipped with a highly mobile and survivable chassis. For this platform, a portable handheld control system has also been developed, and a series of development work has been completed around the technical issues of the control system’s anti-interference, network interoperability, miniaturization and ease of operation. However, due to the weak armor protection capability of the Gladiator unmanned combat platform and the poor concealment of its mission, its long-range reconnaissance and control system faces more interference. In addition, the US Army has also put some other land unmanned systems into service, such as the Scorpion robot and the Claw robot. In 2017, the US Army formulated the Robotics and Autonomous Systems (RAS) Strategy, which provides a top-level plan for the construction of unmanned combat capabilities. Figure 1 shows the US land unmanned system.
Figure 1 US land unmanned system Israel, Russia, the United Kingdom and Germany have also successively carried out the development of land unmanned systems and developed a series of advanced products. The product list is shown in Table 1. For example, the “Guardian” series of autonomous unmanned vehicles developed by Israel can combine the sensors and fusion algorithms on board to autonomously detect and identify dangerous obstacles, and perform patrol, surveillance and small-scale fire strike tasks; the MARSA-800 unmanned vehicle developed by Russia can perform tasks such as transportation and logistics support, tracking and surveillance, and can realize autonomous path planning and avoid obstacles during the execution of tasks. The unmanned vehicle has been deployed on the Syrian battlefield. The United Kingdom and Germany also started research on land unmanned systems earlier. The United Kingdom launched a trolley bomb disposal robot in the 1960s, and later launched the Harris T7 tactile feedback robot for performing dangerous tasks such as bomb disposal and bomb disposal; the “Mission Master” ground armed reconnaissance unmanned vehicle developed by Germany’s Rheinmetall is mainly used to perform tactical surveillance, dangerous object detection, medical evacuation, communication relay and fire support tasks.
Table 1 Land unmanned systems of various countries
⑵ Aerial unmanned systems Aerial unmanned systems are mainly based on single drone platforms and drone clusters. Due to their advantages such as wide field of view, freedom of flight, and good equipment carrying capacity, drones are widely used in the military field and have played a great role in military conflicts in recent years. The main functions of aerial unmanned systems include: intelligence gathering, reconnaissance and surveillance, decoy target aircraft, target tracking, tactical strikes and air rescue. In 2000, the U.S. Air Force Research Laboratory proposed the concept of autonomous combat for unmanned aerial vehicles, quantified the degree of autonomy of unmanned aerial vehicles, and formulated a development plan. The quantitative content and development stage of the degree of autonomy of unmanned aerial vehicles are shown in Figure 2.
Figure 2 Autonomous control level and the trend of autonomous
unmanned aerial vehicles In 2003, the United States merged the unmanned combat aircraft system projects of the Air Force and the Navy, launched the “Joint Unmanned Combat System” (J-UCAS) project, and began research on the unmanned combat aircraft X-47B. In 2006, the U.S. Navy proposed the “Navy Unmanned Combat Air System” (N-UCAS) project, which aims to introduce unmanned combat aircraft to the aircraft carrier-based aircraft wing and continue to conduct research on the X-47B. Between 2012 and 2014, the aircraft carrier catapult, landing, touch-and-go and other tests were completed many times, and the autonomous aerial refueling test was completed in 2015. The X-47B attack drone is an autonomously maneuverable, stealthy, and land-based and ship-based unmanned combat aircraft. It has the characteristics of high range and high flight time, and is equipped with advanced sensors such as illumination radar, optoelectronic guidance system, and aperture radar. Its main functions include intelligence reconnaissance, target tracking, electronic warfare interference, and firepower strikes. Other unmanned aerial systems developed by the United States, such as the Global Hawk, Predator, Hunter, and Raven, have also been in service in the military, as shown in Figure 3. The “Harpy” drone developed by Israel is equipped with anti-radar sensors, optoelectronic guidance systems and missiles, and can autonomously attack enemy radar systems, as shown in Figure 3.
Figure 3 Aerial Unmanned Systems of Various Countries
A single aerial unmanned system is easily interfered with and attacked when performing a mission, resulting in mission failure, while an aerial unmanned system cluster can make up for this defect and give full play to the advantages of aerial unmanned systems. The Defense Advanced Research Projects Agency (DARPA) of the United States has successively launched the “Gremlins” low-cost drone project, the low-cost drone cluster project, the “Perdix” micro-drone airborne high-speed launch demonstration project, and the offensive swarm enabling tactics (OFFSET) project for aerial unmanned system clusters. By developing and testing the architecture, communication system and distributed control algorithm for unmanned system clusters, an autonomous control system for drone clusters has been developed, and cutting-edge scientific and technological technologies such as artificial intelligence, situational awareness, virtual reality and augmented reality have been used to enhance the comprehensive combat capability of aerial unmanned system clusters on the battlefield.
⑶ Marine unmanned systems Marine unmanned systems include two types: surface unmanned systems and underwater unmanned systems. Among them, surface unmanned systems mainly refer to surface unmanned boats (hereinafter referred to as “unmanned boats”), which are mainly used to perform tasks such as maritime search and rescue, reconnaissance and surveillance, firepower strikes, patrol security, electronic interference, logistics support and decoy target ships; underwater unmanned systems mainly refer to unmanned submersibles. Compared with manned submarines, they have the advantages of no casualties, high concealment and high autonomy, and are mainly used to perform intelligence collection, target monitoring, combat deterrence and firepower strikes. In 2018, the US Navy released the “Navy Department Unmanned System Strategic Roadmap”, and in 2019, it released the “Navy Artificial Intelligence Framework”, which provides route planning and guidance for the development of naval operations and marine unmanned systems. In terms of surface unmanned systems, the United States proposed the “American Advanced Concept Technology Demonstration Project” (ACTD), one of whose important tasks is to carry out research on the “Spartan Scout” unmanned boat. The project was completed in 2007 and tested in the Iraqi theater. The “Spartan Scout” unmanned boat is equipped with an unmanned driving system and a line-of-sight/beyond-line-of-sight communication system, as well as advanced sensors such as electro-optical/infrared search turrets, high-definition cameras, navigation radars, surface search radars, and global positioning system receivers, as well as weapons such as naval guns, anti-ship missiles, and anti-submarine sensors. It is mainly used to perform intelligence collection, target monitoring, information reconnaissance, anti-mine and maritime security tasks, and has a certain degree of autonomy. The “Sea Hunter” unmanned boat developed by the United States is equipped with sonar and optoelectronic sensors, as well as short-range and long-range radar detection systems and expandable modular sonar systems. It is mainly used to perform tasks such as identifying and monitoring suspicious targets and guiding fire strikes. The US marine unmanned system is shown in Figure 4. The “Protector” unmanned boat developed by Israel is mainly used to perform intelligence reconnaissance, suspicious target identification, tactical interception, electronic interference and precision strikes (Figure 4). The unmanned surface reconnaissance boat developed by Russia can perform rapid patrol tasks under the command of the mother ship and inspect and monitor designated areas to search for intelligence.
Figure 4 Marine unmanned systems of various countries
In terms of underwater unmanned systems, the nuclear-powered unmanned submarine “Poseidon” developed by Russia can carry conventional and nuclear warheads to perform reconnaissance and strategic nuclear strike missions, as shown in Figure 4. The “Knifefish” unmanned submarine developed by the United States can scan suspicious objects and search for intelligence by emitting low-frequency electromagnetic waves; the “Tuna”-9 unmanned submarine developed by the United States can carry a variety of standard payloads and can be used to perform offshore exploration, anti-mine, surveillance and reconnaissance (ISR) and other tasks.
⒉ Current status of domestic intelligent unmanned system research In recent years, China’s military intelligent unmanned systems have developed rapidly. This article will explain the three aspects of land unmanned systems, air unmanned systems and marine unmanned systems. In terms of land unmanned systems, the National University of Defense Technology and Sany Heavy Industry Co., Ltd. jointly developed the “Desert Wolf” land unmanned light platform, which is powered by tracks and equipped with weapon systems such as grenade launchers and machine guns. It can be used to perform logistics transportation, wounded transportation, reconnaissance monitoring, firepower strikes and other tasks. The “Longma” series of unmanned vehicles developed by Sunward Intelligent Group have strong transportation and obstacle crossing capabilities. The “Shenxing-III” military ground intelligent robot system developed by Nanjing University of Science and Technology has strong autonomous navigation and intelligence reconnaissance capabilities. The unmanned nuclear reconnaissance vehicle jointly developed by the National University of Defense Technology and Harbin Institute of Technology has high mobility and armor protection capabilities. The weapon system it carries can perform fire strikes and has certain autonomous capabilities. In terms of aerial unmanned systems, the “Wing Loong” series of unmanned aerial vehicles developed by Chengdu Aircraft Industry Group has fully autonomous horizontal take-off and landing capabilities, cruise flight capabilities, air-to-ground coordination capabilities, and ground relay control capabilities. It is equipped with multiple types of optoelectronic/electronic reconnaissance equipment and small air-to-ground precision strike weapons, and can perform intelligence reconnaissance, target tracking, fire strikes and other tasks. The “Rainbow” series of unmanned aerial vehicles developed by China have medium-altitude and long-range navigation capabilities, can carry electronic jamming systems and a variety of weapon systems, and can perform fire strikes, intelligence reconnaissance, communication jamming, radio wave jamming and other tasks; the attack 11 type unmanned aerial vehicle developed has extremely strong stealth capabilities and can carry precision-guided missiles for ground attack missions. China’s aerial unmanned systems are shown in Figure 5.
Figure 5 China’s aerial unmanned systems
In terms of surface unmanned systems of marine unmanned systems, the “Tianxing No. 1” unmanned boat, developed by Harbin Engineering University, uses oil-electric hybrid power, with a maximum speed of more than 92.6km/h and a maximum range of 1,000km. It is currently the fastest unmanned boat in the world. The boat integrates technologies such as autonomous perception, intelligent control, and autonomous decision-making, and can achieve rapid situation information recognition and danger avoidance of the surrounding complex environment. It can be used to perform tasks such as meteorological information monitoring, landform mapping, alert patrol, intelligence reconnaissance, and firepower attack. The “Jinghai” series of unmanned boats developed by Shanghai University have semi-autonomous and fully autonomous operation capabilities, and can perform tasks such as target reconnaissance, ocean mapping, and water quality testing. The “Haiteng 01” intelligent high-speed unmanned boat developed by Shanghai Maritime University is equipped with sensors such as millimeter-wave radar, laser radar, and forward-looking sonar. It can perform suspicious target monitoring, underwater measurement, maritime search and rescue, and other tasks, and has fully autonomous and semi-autonomous navigation capabilities. The JARI intelligent unmanned combat boat developed by Jiangsu Automation Research Institute is equipped with detection equipment such as photoelectric detectors and four-sided phased arrays. At the same time, it is also equipped with weapon systems such as missiles and torpedoes, which can perform tasks such as intelligence collection, enemy reconnaissance, and precision firepower strikes. The “Lookout II” unmanned missile boat jointly developed by Zhuhai Yunzhou Intelligent Technology Co., Ltd. and other units is equipped with a fully autonomous unmanned driving system and missiles and other weapons, which can perform tasks such as enemy reconnaissance, intelligence collection, and precision firepower strikes. China’s marine unmanned system is shown in Figure 6.
Figure 6 China’s marine unmanned system
In terms of underwater unmanned systems of marine unmanned systems, the “Devil Fish” unmanned submersible developed by Northwestern Polytechnical University is a bionic manta ray unmanned submersible that has completed a deep-sea test of 1025m. The “Wukong” full-sea depth unmanned submersible developed by Harbin Engineering University has successfully completed a deep dive and autonomous operation test of 10,896m. Deep-sea submersibles such as “Qianlong No. 1” and “Seahorse” developed by China have successfully completed deep-sea exploration missions.
⒊ Summary of the current state of technology At present, intelligent unmanned systems have been gradually applied to various fields of military applications, and with the development of cutting-edge science and technology, the application of intelligent unmanned systems in the military field will increase day by day. However, in the use of intelligent unmanned systems, autonomy and intelligence have not yet been fully realized. At present, the application status of intelligent unmanned system technology in the military field can be mainly divided into the following three parts:
① From the perspective of combat missions: combat missions have developed from simple reconnaissance and surveillance to mainstream confrontation operations; battlefield confrontation has changed from human confrontation to human-machine confrontation, and then to machine-machine confrontation; the application environment has changed from structured environment and laboratory environment to real battlefield environment, and will gradually develop into an augmented reality environment combining real environment and virtual reality in the future. ② From the perspective of command and control: the control method has developed from simple remote control and program control of a single machine to intelligent fusion and interactive control of human-machine, but autonomous control has not yet been fully realized; the system architecture has developed from specialization and singularity to generalization, standardization, and interoperability. ③ From the perspective of perception and decision-making: the decision-making method has changed from relying solely on people to relying mainly on people and supplemented by human-machine intelligent interactive decision-making; the perception method has changed from relying solely on sensors to obtain feature information and people to judge target attributes to target recognition and feature information acquisition based on artificial intelligence.
Key technologies of intelligent unmanned systems
As a culmination of multidisciplinary fields, intelligent unmanned systems involve many technologies, perform diverse tasks, and have complex and changeable application scenarios. For example, the air environment is rainy and foggy, with low visibility, strong winds, and light interference; the land environment has complex terrain, obstacles, interference, and dangerous pollution areas; the sea environment has wind and wave interference, ship swaying, inconspicuous targets, and irregular coastlines. Different environments and uses pose huge challenges to the research and performance of intelligent unmanned system technology. In order to adapt to the restricted and changing environment, the key technologies of intelligent unmanned systems can be summarized as autonomous perception and understanding technology in complex environments, multi-scenario autonomous skill learning and intelligent control technology, multi-task cluster collaboration technology, human-computer interaction and human-computer fusion technology, decision-making planning technology and navigation and positioning technology. This section will mainly use marine unmanned systems as examples to elaborate on the key technologies of intelligent unmanned systems.
⒈ Autonomous perception and understanding technology in complex environments Autonomous perception and scene understanding of the environment in complex environments is a prerequisite for intelligent unmanned systems to operate autonomously and form combat capabilities, which will directly affect whether the mission can be successfully completed. In view of the complexity and variability of the actual environment, especially the difficulties of wind and wave interference and ship shaking in the sea environment, intelligent unmanned systems need to complete the goals of autonomous target selection perception, obtain multimodal information, and abstract and complete understanding of information. Therefore, the autonomous perception and understanding technology of the environment of intelligent unmanned systems in complex environments needs to break through the autonomous perception technology of multimodal sensor fusion, as well as the complex scene target recognition and understanding technology.
⑴ Multimodal sensor fusion autonomous perception technology At present, the information acquisition sensors carried by intelligent unmanned systems mainly include navigation radar, millimeter wave radar, laser radar, optoelectronic payload, etc. A single sensor cannot directly obtain high-precision, dense three-dimensional scene information. It is necessary to study the autonomous environmental perception technology of multi-sensor fusion to provide support for scene understanding. Multi-sensor fusion is to carry out multi-level and multi-space information complementation and optimization combination processing of various sensors, and finally produce a consistent interpretation of the observed environment. In this process, it is necessary to make full use of multi-source data for reasonable control and use, and the ultimate goal of information fusion is to derive more useful information based on the separated observation information obtained by each sensor through multi-level and multi-faceted combination of information. By taking advantage of the mutual cooperation of multiple sensors, the data of all information sources are comprehensively processed to improve the intelligence of the entire sensor system. The natural environment of the ocean is more complex than that of land and air. Faced with special challenges such as violent swaying of ships, wind and wave interference, uneven lighting, and inconspicuous targets, the marine intelligent unmanned system needs to perform multi-sensor information fusion processing on the designated target based on the unique attributes of each sensor, and then combine the electronic chart information of the internal navigation unit of the unmanned system and the shore-based support system to build a multi-dimensional three-dimensional situation map of the sea surface environment, perform tracking, detection, identification and cognition tasks for the designated target, and finally realize the autonomous perception and complete understanding of the sea surface environment by the marine intelligent unmanned system.
⑵ Complex scene target recognition and understanding technology The key to the operation autonomy of intelligent unmanned systems lies in the ability to effectively understand the scene and target information, and accurate understanding of scene information mainly includes the construction of target semantic information and the description of scene text information. Compared with land and air environments, the natural marine environment faces unique difficulties such as wind and wave interference and violent swaying of the hull, which brings challenges to the intelligent unmanned system to fully understand the environmental information and accurately identify the designated target. Using sensors such as laser radar and high-definition cameras carried by intelligent unmanned systems, the original point cloud information and image feature information of the marine environment scene can be obtained. Using three-dimensional target detection methods based on point clouds, point clouds and image fusion, and three-dimensional scene semantic segmentation methods, etc., the intelligent unmanned system can fully recognize the scene information and accurately identify the designated target. There are mainly two types of point cloud-based methods: grid-based or voxel-based methods, and point-based methods. The grid-based or voxel-based method uses voxels or bird’s-eye views to convert the irregular point cloud of the acquired sea surface into a regular representation method, and then extracts the point cloud features. The point-based method directly extracts target features from the acquired original point cloud of the sea surface. The three-dimensional target detection method based on point cloud and image fusion combines the precise coordinates of the target in the sea scene obtained by the laser radar with the environmental texture and color information provided by the sea surface image, which is more conducive to the intelligent unmanned system to accurately identify and accurately and completely understand the target of the ocean scene.
⒉ Behavior decision-making and trajectory planning technology In actual and complex war scenes, for the complex mission environment and multiple tasks faced by intelligent unmanned systems, it is necessary to break through the behavior decision-making technology in multi-source heterogeneous environments, trajectory planning technology in dynamic/static environments, and trajectory tracking technology in complex scenes.
⑴ Behavior decision-making technology in multi-source heterogeneous environments Behavior decision-making is the key to the realization of autonomous control of intelligent unmanned systems. In the complex environment of different speeds, different relative distances, and different data types of unmanned boats, it is necessary to accurately extract effective information to make safe and reliable control instructions for the next decision of the unmanned boat. First, extract representative environmental feature information and establish a sufficient number of accurately calibrated learning data sets; then, construct a decision maker based on a deep neural network and use the established database for learning; finally, use machine learning algorithms to optimize the constructed decision maker to further improve the decision accuracy. ⑵Trajectory planning technology in dynamic/static environment Trajectory change is the most basic behavior of unmanned boats and unmanned submarines. In a complex battlefield environment, planning a feasible and reliable trajectory according to different environmental conditions is the key to the intelligent driving of unmanned boats and unmanned submarines. This technology mainly includes trajectory planning technology based on polynomials, trajectory planning technology based on multi-objective constraints, and trajectory planning technology based on positive and negative trapezoidal lateral acceleration.
⑶Trajectory tracking technology in complex scenes Tracking the planned ideal trajectory is an important task for unmanned boats and unmanned submarines. The key lies in solving the problem of high-precision and high-stability control when unmanned boats or unmanned submarines track target trajectories. The main solution is: according to the kinematic and dynamic models of unmanned boats and unmanned submarines, the corresponding actuator control quantity is output to achieve real-time and accurate tracking of the specified target, and under the premise of ensuring tracking accuracy, the autonomous intelligent steering of unmanned boats and unmanned submarines and the coordinated control of multiple actuators of each drive module are realized.
⒊Autonomous navigation and positioning technology The navigation and positioning system is a key component of the intelligent unmanned system, which can provide accurate and reliable information about the speed and position of unmanned boats or unmanned submarines. The navigation system is generally composed of gyroscopes, accelerometers, satellite receivers, etc., some of which are supplemented by visual modules, or are equipped with prior spatial position maps and physical information sensors based on actual complex environmental conditions. In order to achieve accurate execution of tasks, intelligent unmanned systems must break through navigation and positioning technology based on inertial/satellite deep information fusion, navigation and positioning technology based on inertial/astronomical information fusion, navigation technology based on visual tracking, and geophysical assisted navigation technology.
⑴ Navigation and positioning technology based on inertial/satellite deep information fusion This technology introduces the inertial information of the unmanned boat into the satellite carrier/code loop, and then uses fully autonomous, short-term, and high-precision inertial information to assist the update of satellite receiver signals, thereby realizing the complementary advantages and optimal fusion of the inertial navigation and satellite navigation of the unmanned boat.
⑵ Navigation and positioning technology based on inertial/astronomical information fusion The astronomical-based navigation system has the advantages of high autonomy and low susceptibility to interference. By using the information output by astronomical navigation and the information provided by the initial position, the position of the unmanned boat can be calculated. The fusion of inertial navigation information and astronomical navigation information can improve the robustness of astronomical navigation positioning. Inertial/astronomical combined positioning technology based on astronomical navigation assistance has become a key part of the field of autonomous navigation of unmanned systems.
⑶ Navigation technology based on visual tracking Due to the complexity of the actual battlefield environment, unmanned boats will be in a complex working environment and are easily interfered by the outside world, resulting in GPS denial, which makes the navigation system unable to be in a combined state. A single inertial navigation system has low accuracy and is prone to accumulating errors. Long-term pure inertial navigation will make the unmanned boat lose the ability to perform tasks. However, the vision-based method does not have time error accumulation. It only needs to extract the key features of the image obtained by the high-definition camera to obtain the position information of the unmanned boat and the unmanned submersible through visual algorithms and prior knowledge. The vision-based navigation algorithm is not easily interfered with, has strong robustness, and can make up for the error accumulation caused by pure inertial navigation in a GPS denial environment, and is widely used.
⑷ Geophysical assisted navigation technology Due to the unique environment of the ocean, unmanned submersibles need to sail underwater for a long time, resulting in the inability to obtain real-time and accurate satellite signals and astronomical information. In addition, due to problems such as weak underwater light, vision-based navigation methods are also limited. Therefore, by obtaining a priori spatial position map inside the ocean and using the field scene information obtained by the physical sensors carried by the unmanned submersible and matching them, high-precision autonomous navigation of the unmanned submersible can be achieved. The temporal and spatial distribution characteristics of the inherent geophysical properties of the surveyed ocean can be used to produce a geophysical navigation spatial position map. By matching the physical feature information obtained by the physical property sensor carried by the unmanned submersible with the pre-carried spatial position map, the high-precision positioning of the unmanned submersible can be obtained, and the high-precision autonomous navigation of the unmanned submersible can be realized.
⒋ Multi-scenario autonomous skill learning and intelligent control technology Multi-scenario intelligent control technology is a key technology for intelligent unmanned systems to solve complex, changeable and unstable control objects. It is an effective tool for intelligent unmanned systems to adapt to complex task requirements. In a complex marine environment, if intelligent unmanned systems want to complete real-time and accurate regional monitoring, target tracking, information acquisition and precision strikes, they must break through the autonomous skill learning technology of tasks, autonomous operation interactive control technology, and unmanned system motion control technology of human-like intelligent control.
⑴ Autonomous skill learning technology of tasks Autonomous skill learning refers to the process of learning based on prior knowledge or rules to complete tasks in the process of interaction between unmanned systems and the outside world. The autonomous learning of unmanned system operation skills is essentially a partial process of simulating human learning cognition. Intelligent unmanned systems use deep reinforcement learning-based technology to combine the perception ability of deep learning with the decision-making ability of reinforcement learning, and can achieve direct control from high-latitude raw data information input to decision output in complex sea environments. The autonomous skill learning of intelligent unmanned systems mainly includes three aspects: first, describing the complex environment of the ocean surface and the interior of the ocean, and obtaining the initial state data information of the surrounding environment; second, based on the description of the intelligent unmanned system and the complex environment of the ocean surface and the interior, mathematical modeling of deep reinforcement learning is carried out to obtain key information such as the state value function and control strategy function of the autonomous skill learning process; third, using the data information obtained by the interaction between the intelligent unmanned system and the complex environment of the ocean surface and the interior, the state value function and the control strategy function are updated to enable the marine intelligent unmanned system to learn a better control strategy.
⑵ Autonomous operation interactive control technology In the process of autonomous learning and control of tasks, the intelligent unmanned system needs to contact with the ocean surface and the complex internal environment to form a good coupling system to ensure the real-time and accurate acquisition of information on the ocean surface and the complex internal environment, and correctly and quickly carry out navigation planning, autonomous navigation control and autonomous collision avoidance of unmanned boats and unmanned submersibles. The tasks of the interactive control technology of autonomous operation of intelligent unmanned systems mainly include: the design of interactive rules and control strategies of intelligent unmanned systems; modeling methods of complex environments on the surface and inside of the ocean; online modeling and correction of the dynamics of unmanned boats, unmanned submarines and operating objects; dynamic generation and shared control methods of virtual force constraints in complex environments on the surface and inside of the ocean.
⑶ Motion control technology of unmanned systems with humanoid intelligent control The motion control technology of unmanned systems with humanoid intelligent control combines artificial intelligence with traditional control methods to solve the problem of stable and precise control of unmanned boats and unmanned submarines in actual complex marine battlefield environments. It mainly includes two aspects: the design of intelligent control algorithms for unmanned systems and the design of intelligent control strategies for unmanned systems. The design of intelligent control algorithms for unmanned systems mainly includes: hierarchical information processing and decision-making mechanisms; online feature identification and feature memory; open/closed-loop control, positive/negative feedback control, and multi-modal control combining qualitative decision-making with quantitative control; the application of heuristic intuitive reasoning logic. The design of intelligent control strategies for unmanned systems is to design reasonable solutions for unmanned boats or unmanned submarines to meet actual mission requirements.
⒌ Unmanned cluster collaborative control technology In actual combat scenarios, due to the complexity of the battlefield environment and the diversity of tasks, a single unmanned boat or unmanned submarine usually cannot meet the needs of actual tasks. The number of equipment carried by a single unmanned boat or unmanned submarine is limited, and the perception perspective and regional range are not comprehensive enough, resulting in insufficient precision and thoroughness in performing complete intelligence detection, target tracking, battlefield environment perception and comprehensive firepower strike tasks. Therefore, it has become an inevitable trend for a cluster of intelligent unmanned systems composed of multiple unmanned boats and unmanned submarines to collaboratively perform tasks. To complete the control of the intelligent unmanned system cluster, it is necessary to break through the local rule control technology of the intelligent unmanned system cluster, the soft control technology of the intelligent unmanned system cluster, the pilot control technology of the intelligent unmanned system cluster, and the artificial potential field control technology of the intelligent unmanned system.
⑴ Local rule control technology of intelligent unmanned system cluster The control technology based on local rules is the basic method for intelligent unmanned systems to control unmanned boats and unmanned submarines. It mainly lies in the designation of individual local control rules within the cluster of unmanned boats and unmanned submarines. Local rule control technology has achieved intelligent control of marine unmanned system clusters to a certain extent, but a large number of experiments are needed to obtain the parameters between the behavior of marine unmanned system clusters and the cluster model, and the values of the parameters are also very sensitive. Therefore, to achieve complete intelligent control of intelligent unmanned systems, other technologies are needed.
⑵ Soft control technology of intelligent unmanned system clusters The soft control technology of intelligent unmanned system clusters is mainly based on two requirements: First, in the intelligent unmanned system cluster, the control rules between individuals are very important. For example, the control and internal function of each unmanned boat and unmanned submarine are necessary conditions for the group behavior of the entire marine intelligent unmanned system cluster; second, the intelligent unmanned system cluster adopts a local communication strategy. With the increase of unmanned boats and unmanned submarines in the cluster system, it will not affect the state of the entire intelligent unmanned system cluster.
The soft control method is to add one or more new unmanned boats or unmanned submarines without destroying the individual rules of unmanned boats and unmanned submarines in the intelligent unmanned system cluster. These unmanned boats or unmanned submarines participate in the actions of the entire intelligent unmanned system cluster according to the same local rules, but they are controllable and can receive external instructions. After receiving the command, these unmanned boats or unmanned submarines will independently complete the corresponding tasks. The soft control method of the intelligent unmanned system cluster is to add a controllable unmanned boat and unmanned submarine on the basis of the local control rules of the unmanned system, so that it can affect the entire unmanned system cluster, and finally complete the control of the entire intelligent unmanned system group.
⑶ Intelligent unmanned system cluster navigation control technology The basic content of the intelligent unmanned system cluster navigation control technology is: under the premise that the individuals of the entire marine intelligent unmanned system cluster maintain local rules, a small number of unmanned boats and unmanned submarines in the cluster have more information and stronger information processing capabilities, and interact with other unmanned boats and unmanned submarines through local information to play a leading role, so as to achieve the purpose of controlling the entire intelligent unmanned system cluster.
⑷ Artificial potential field control technology of intelligent unmanned system In the control of intelligent unmanned system clusters, control technology based only on local rules is difficult to achieve accurate and real-time perception of the battlefield, as well as the collection and acquisition of intelligence information, tracking and identification of suspicious targets, and precise strikes on enemy areas. Artificial potential field control technology introduces the concept of potential field in physics into the control of intelligent unmanned system clusters, and uses potential functions to simulate the internal and external effects that affect a single unmanned boat or unmanned submarine. The single unmanned boat or unmanned submarine in the system cluster acts under the action of the potential function, and finally realizes the control of the entire intelligent unmanned system through the potential function.
⒍Natural human-computer interaction technology In the actual battlefield environment, intelligent unmanned systems face problems such as complex operation tasks, low level of operation intelligence, high training risks and costs, and low equipment use and maintenance efficiency. In this case, it is necessary to improve the controllability and intelligence of intelligent unmanned system equipment, and it is necessary to break through the human-computer interaction technology of intelligent unmanned systems, augmented reality and mixed reality technology of intelligent unmanned systems, and brain-computer interface technology of intelligent unmanned systems.
⑴Human-computer interaction technology of intelligent unmanned systems Human-computer interaction technology of intelligent unmanned systems refers to the command platform obtaining the image and voice information of officers and soldiers through image and voice sensors, and then using algorithms such as image segmentation, edge detection, and image recognition to extract key information such as gestures and eye gestures of officers and soldiers, and then using algorithms based on deep learning to obtain the voice information of officers and soldiers and pass it to the command platform, so as to issue the officers and soldiers’ instructions to lower-level combat units. The human-computer interaction technology of intelligent unmanned systems can improve the intelligence of task operations and the fault tolerance and robustness of the operation process, so that the officers and soldiers’ instructions can be issued to combat units more stably and effectively.
⑵Augmented reality and mixed reality technology of intelligent unmanned systems Augmented reality technology of intelligent unmanned systems is to superimpose computer-generated images on real complex combat environments, and mixed reality technology of intelligent unmanned systems is to present information of virtual scenes in actual combat scenes, and set up an interactive feedback information loop between the virtual world and officers and soldiers in a real combat environment, thereby increasing the officers and soldiers’ sense of reality in the combat environment experience. As an important development direction of immersive human-computer interaction technology, virtual reality and augmented reality for intelligent unmanned systems have a variety of different real combat application scenarios, which can effectively reduce the cost and risk of training and improve the use and maintenance efficiency of equipment during combat.
⑶ Brain-computer interface technology for intelligent unmanned systems The main function of the brain-computer interface is to capture a series of brain wave signals generated by the human brain when thinking. In actual combat environments, the brain-computer interface technology of intelligent unmanned systems extracts features and classifies the brain wave signals of commanders and fighters, thereby identifying the intentions of commanders and fighters and making corresponding decisions to cope with complex combat tasks and emergencies. The brain-computer interface technology of intelligent unmanned systems can enhance the cognitive and decision-making capabilities of commanders and fighters, greatly improve brain-computer interaction and brain control technology, and give commanders and fighters the ability to control multiple unmanned boats, unmanned submarines and other unmanned combat equipment while relying on thinking.
Future development trend of intelligent unmanned systems
Due to its advantages of unmanned, autonomous, and intelligent, intelligent unmanned systems will appear in every corner of the future battlefield. As they undertake more battlefield tasks, they will participate in different war scenarios, which will lead to a number of key problems for intelligent unmanned systems, restricting their development. The key problems faced by intelligent unmanned systems are mainly:
① Highly complex environment. The specific application environment of intelligent unmanned systems will face more and more factors. The numerous shelters in unstructured environments, the limited perception viewpoints and ranges, etc., put forward higher requirements on the environmental perception ability of intelligent unmanned systems. ② High game confrontation. The battlefield game of intelligent unmanned systems is an important means to gain battlefield advantages. The fierce mobile confrontation between the two sides of the war, as well as the many interferences caused by the enemy and the battlefield environment, have put forward new challenges to the mobile decision-making ability of intelligent unmanned systems. ③ High real-time response. In the future battlefield, the combat situation will change dramatically, the combat mode will be more flexible and changeable, and it is necessary to respond to battlefield emergencies in a timely manner, which puts forward new requirements for the real-time response ability of intelligent unmanned systems. ④ Incomplete information. In the future battlefield, due to the limitations of the battlefield environment and the existence of enemy interference, the information acquisition ability of the intelligent unmanned system will be restricted, resulting in incomplete situational awareness, loss and attenuation of battlefield situation information data, and the inability to fully obtain information on both sides of the enemy. ⑤ Uncertain boundaries. The unmanned combat mode of the intelligent unmanned system has subverted the traditional combat mode. The integration of land, sea, air and space in the future unmanned combat, as well as the social public opinion brought about by the high degree of integration with society, will have an impact on the unmanned combat of the intelligent unmanned system, thus causing uncertainty in the combat boundary.
Based on the various difficulties that will be faced above, the development of intelligent unmanned systems in the future will focus on two aspects: individual capability enhancement and cluster capability enhancement. Individual capability enhancement is mainly reflected in individual cognitive intelligence, individual autonomous operation and algorithm chipization; cluster capability enhancement is mainly reflected in improving interoperability through a universal architecture, as well as cross-domain collaborative operations, network security and human-machine hybrid intelligence.
⒈ Cognitive intelligence adapts to complex task environments In order to improve the adaptability of intelligent unmanned systems in highly complex environments, it is necessary to enhance the individual cognitive intelligence of intelligent unmanned systems. The enhancement of individual cognitive intelligence is mainly reflected in the transformation from individual perceptual intelligence to cognitive intelligence. The comprehensive acquisition of multi-source sensor information enables intelligent unmanned systems to have human semantic understanding, associative reasoning, judgment analysis, decision planning, emotional understanding and other capabilities. The development of individual cognitive intelligence of intelligent unmanned systems will be based on brain science and bionics, and will achieve intelligent understanding and accurate application of acquired information by combining knowledge graphs, artificial intelligence, knowledge reasoning, decision intelligence and other technologies, thereby improving the high real-time response capabilities of intelligent unmanned systems to emergencies.
⒉ Autonomous operation improves the task capability of single machines In order to solve the problem of highly complex tasks faced by intelligent unmanned systems in highly complex environments, it is necessary to improve the autonomous operation capabilities of single machines. This includes developing decision-making methods based on deep reinforcement learning, autonomous environmental perception and interaction methods based on multi-source information of vision and other sensors, autonomous motion planning methods for robots based on neurodynamics, and autonomous operation methods based on artificial intelligence, so as to improve the autonomous environmental modeling and positioning capabilities, autonomous decision-making capabilities, autonomous planning capabilities and autonomous control capabilities of individuals in intelligent unmanned systems, so that intelligent unmanned systems can adapt to complex environments and carry out autonomous operation tasks.
⒊ Algorithm chipization achieves high real-time response The complex environment faced by intelligent unmanned systems places high demands on algorithms and computing power. It is necessary to be able to accelerate computing in real time to achieve high real-time response to battlefield emergencies. To solve this problem, it is necessary to improve the chipization level of individual algorithms of intelligent unmanned systems, that is, to develop a new architecture of storage and computing integrated chips to improve the computing power of chips and the level of algorithm chipization. New chips based on artificial neural technology can be studied. By changing the binary computing method of digital chips and exchanging gradient signals or weight signals, the chips can work in a simulated neuron manner, simulating the parallel computing flow of the brain to effectively process large amounts of data, and obtaining the parallel computing capabilities of supercomputers, thereby greatly improving the computing power of chips and the level of algorithm chipization, and solving the problem of high real-time response of intelligent unmanned systems.
⒋ Universal architecture improves cluster interoperability In order to improve the adaptability of intelligent unmanned systems facing highly complex environments and the maintenance and support efficiency of intelligent unmanned systems, intelligent unmanned systems will continue to develop standardized command and control frameworks in the future, improve the intelligence of human-machine collaboration, and improve the modularity of the system. It is mainly reflected in:
① Developing a general artificial intelligence framework to support autonomous, precise, and real-time good coupling and collaboration between humans and machines; ② Improving the modularity and component interchangeability of intelligent unmanned systems to support rapid maintenance and configuration upgrades of intelligent unmanned systems and their members in future battlefields; ③ Improving the level of data transmission integration and the anti-interference capability of data transmission on future battlefields to reduce the rate of data interception.
⒌ Cross-domain collaboration breaks the boundaries of cluster applications
In order to improve the adaptability of intelligent unmanned systems in highly complex environments and solve the problem of uncertain boundaries during combat, it is necessary to improve the cross-domain collaborative combat capabilities of intelligent unmanned systems to make up for the lack of capabilities in a single combat domain. Through the cross-domain collaborative combat of intelligent unmanned systems, the advantages of various components can be complemented. That is, by utilizing the advantages of large search range and long communication distance of air unmanned systems, as well as long endurance and strong stability of land unmanned systems and marine unmanned systems, the advantages of different components are combined to increase the multi-dimensional spatial information perception capabilities of intelligent unmanned systems, and form a heterogeneous multi-autonomous collaborative system, thereby improving the ability of intelligent unmanned systems to complete complex tasks.
⒍ Secure network guarantees reliable application of clusters Intelligent unmanned systems face the problems of incomplete information and high game confrontation on future battlefields. Therefore, it is necessary to improve the network security protection capabilities of intelligent unmanned systems in high confrontation environments, improve flexibility in dealing with highly complex and highly variable tasks, and improve stability in the face of high-intensity network attacks. The improvement of network security protection capabilities in adversarial environments is mainly reflected in the following aspects:
① Plan reasonable data permissions to ensure data security and flexibility of task execution; ② Improve information protection capabilities, develop and upgrade information protection products for intelligent unmanned systems, and record response decisions for information explosion situations; ③ Increase the network’s deep defense capabilities, unify network security standards and levels, build network defense autonomy, and improve the network’s ability to resist attacks under network attacks.
⒎ Human-machine hybrid intelligence improves adversarial capabilities In order to solve the problem of high real-time response faced on future battlefields and improve the adaptability of intelligent unmanned systems in highly complex environments, it is necessary to combine the advantages of humans and machines to form a new hybrid intelligent mode of human-machine collaboration, that is, to develop human-machine hybrid intelligence for intelligent unmanned systems. Human-machine hybrid intelligence of intelligent unmanned systems is a new intelligent scientific system that combines physics and biology in which human, machine, and environmental systems interact. In response to the problems of high-complexity environments and high real-time responses faced by intelligent unmanned systems on future battlefields, the development of human-machine hybrid intelligence in the future is mainly reflected in the following aspects: ① Information intelligence input. At the input end of information acquisition, the information data objectively collected by the sensors of the unmanned system equipment is combined with the subjective perception information of the combat commanders to form a multi-dimensional information acquisition and information input method. ② Intelligent information fusion. After obtaining multi-dimensional data information, a new data understanding method is constructed by integrating the computer’s calculation data with the information cognition of the combat commanders. ③ Intelligent information output. After the data information is fused and processed, the computer’s calculation results are matched with the value decisions of the combat commanders to form an organically combined probabilistic and regularized optimization judgment.
IV. Conclusion Due to its autonomy, intelligence and unmanned characteristics, intelligent unmanned systems will play an increasingly important role in the future battlefield. The development of intelligent unmanned systems will also drive the development of intelligent computing, intelligent transportation, intelligent manufacturing, smart medical care, brain-like science and other disciplines. In the future, we should be guided by the mission requirements of actual complex battlefield environments, combine advanced technologies in cutting-edge disciplines such as artificial intelligence, and make overall top-level planning for intelligent unmanned systems; verify reliable airborne intelligent perception and intelligent computing equipment on different unmanned system combat platforms in land, air and marine unmanned systems, and develop reliable and stable key technologies such as unmanned system autonomous control, intelligent perception, intelligent decision-making and intelligent interaction, overcome the key difficulties of intelligent unmanned systems, and continuously improve the autonomous control, intelligent perception and intelligent decision-making capabilities of intelligent unmanned systems.
The satellite navigation system, also known as the global satellite navigation system, is an air-based radio navigation and positioning system that can provide users with all-weather three-dimensional coordinates, speed and time information at any location on the earth’s surface or in near-Earth space.
The satellite navigation system is an important space infrastructure for mankind. It is an indispensable tool for a country’s national security and economic and social development. It has a profound impact on the form of war, combat style, and people’s production and lifestyle.
At present, there are four major global satellite navigation systems in the world, namely, the United States’ GPS, Russia’s GLONASS, Europe’s Galileo and China’s Beidou. Global competition in satellite navigation technology is becoming increasingly fierce.
Standing at a new starting point of profound changes in the world’s military, and looking at the future battlefield with a high degree of integration of informatization and intelligence, intelligent navigation systems will come into being and play an important role.
Satellite navigation becomes a “standard” element of the intelligent battlefield
The future intelligent battlefield will present the characteristics of high-tech warfare, which will comprehensively use intelligent weapons and means under information conditions, realize efficient command and control, and implement precise and flexible strikes. Satellite navigation technology can provide high-precision, all-weather, large-scale and multi-purpose positioning, navigation and timing services for various objects on land, sea, air and space.
Provide a unified time and space benchmark for systematic operations. For the intelligent battlefield, there are many linked elements and the situation changes rapidly, which requires accurate positioning of combat units to achieve intelligence reconnaissance, command and control, battlefield maneuvers, offensive and defensive operations, and support and guarantee under a unified time and space benchmark, ensuring that all elements of the entire battlefield form a coordinated organic whole.
The basic function of satellite navigation is to provide accurate time and space references for various combat elements. Without an accurate and unified time and space reference, the precise command of joint operations may be out of balance, combat operations may be out of control, and intelligence fusion and target identification cannot be achieved. If the time error is one hundredth of a second, a target locked by more than a dozen radars will become more than a dozen targets, and accurate defense and counterattack will not be possible.
Under a unified standard time and geographic coordinate system, satellite navigation provides precision guidance for various weapon platforms, fine frequency calibration for electronic warfare weapons, and all-weather positioning and navigation for individual combatants, significantly improving the coordination and strike effectiveness of joint firepower strikes.
Provide synchronous situation cognition for combat command and control. Accurately grasping the battlefield situation is the premise and basis for commanders to flexibly and accurately implement command and control. The satellite navigation system provides strong support for battlefield situation awareness.
Since the 1990s, the U.S. military has developed a “Blue Force Tracking” system based on GPS and satellite communications to build a precise command and control system. The “Blue Force Tracking” system has effectively supported the U.S. military in forming a networked information advantage on the ground battlefield and effectively solved the problem of “where are we, our friends, and our enemies?”
Relying on the two major services of navigation positioning and position reporting of the global satellite network, the military has realized battlefield situation monitoring and sharing, which has become an important means for the military to “know itself”. At the same time, it has optimized the combat operation process, realized the issuance of combat orders at the minute level, and accelerated the development of the military’s command and control mode towards “integration” and “flattening”.
Providing a tool to enhance the precision strike of weapons and ammunition. In the intelligent battlefield, precision-guided weapons have become the “trump card” that determines victory or defeat. Using the satellite navigation system, the flight process of the missile can be corrected throughout to ensure the accuracy of the hit. It can be said that the satellite navigation system is a tool to enhance the precision strike of weapon platforms.
In recent local wars, the proportion of GPS precision-guided weapons of the US military has continued to rise: 7.6% in the Gulf War in 1991, 35% in the Kosovo War in 1999, 60% in the Afghanistan War in 2001, 68.3% in the Iraq War in 2003, and 100% in the Syrian War in 2018.
Intelligent battlefield requires satellite navigation to have new “responsibilities”
As the core and cornerstone of the precise and unified space-time system, the modern satellite navigation system must take on new responsibilities in response to the development needs of future intelligent battlefields.
In the era of intelligence, new combat elements represented by “AI, cloud, network, group, and terminal” will reconstruct the battlefield ecology and completely change the winning mechanism of war. Satellite navigation services need to adapt to the characteristics of the intelligent battlefield with wider dimensions, higher precision, and stronger system.
Navigation positioning and timing have a wider range and higher accuracy. The current satellite navigation system has achieved coverage of the earth’s surface. However, on the intelligent battlefield, it needs to extend to deep space and under the sea. The combat time domain and air domain are wider, requiring the construction of a comprehensive service system covering land, sea, air and space, with unified standards, high efficiency and intelligence, to form time and space information coverage at all times and everywhere, and to achieve more powerful, safer and more reliable time and space service capabilities.
For example, in the intelligent battlefield, unmanned combat has become the basic form. Autonomous driving of unmanned vehicles, precision approach of drones, and measurement of intelligent missile positions all urgently need to be improved by an order of magnitude on the basis of existing navigation accuracy to ensure higher navigation integrity, faster first positioning time, and stronger cross-domain capabilities of land, sea, air, and space.
The military navigation confrontation system is more complete and more powerful. The means of navigation confrontation in the information age is a simple confrontation form based on signal energy enhancement and interference attack. Navigation in the intelligent era is intertwined with detection, perception, communication, command, and decision-making. It requires a navigation capability level with higher power and faster effectiveness in any region of the world, the ability to intelligently adjust navigation signals, and the development of multiple navigation means such as quantum navigation, pulsar navigation, and deep-sea navigation. It is necessary to integrate navigation methods with different principles, methods, and carriers to achieve navigation confrontation capabilities at the system level and system level.
The bandwidth of navigation information interaction is larger and the access is wider. In the intelligent era, the role of cyberspace in the combat system is gradually increasing, and it is integrated with the navigation space-time system. The navigation information and cyberspace system that provide space-time position will connect the scattered combat forces and combat elements into a whole, forming a networked and systematic combat capability. This requires support for ubiquitous perception, left-right collaboration, and reliable and reconfigurable navigation capabilities, support for highly reliable, highly anti-interference, and readily accessible signaling channels, and timely acquisition of required navigation auxiliary information such as geography, maps, and images. On this basis, the real integration of communication and navigation is realized, achieving the effect of “one domain combat, multi-domain support”.
Adapting to the needs of military intelligence development and promoting the construction of intelligent navigation system
Judging from the development trend of the world’s military powers, facing the future intelligent battlefield, intelligent navigation systems are gradually building a space-time reference network and navigation information service network that integrates the earth and the sky, with space-based, systematized, on-demand and cloud-based as the main characteristics, forming a comprehensive navigation, positioning and timing system with unified reference, seamless coverage, security and reliability, high efficiency and convenience, and strong practicality.
The core of the transformation from a basic navigation system to an intelligent navigation system is to upgrade from “positioning navigation service” to “intelligent navigation service”, and the focus is on achieving the following four aspects of transformation:
The space-time benchmark is shifting from relying on ground systems to autonomous space-time benchmark maintenance. The space-time benchmark maintenance equipment of the ground system will gradually be transferred to the satellite, and the satellite will be equipped with higher-precision optical clocks and astronomical measurement equipment to form a more stable and reliable space-based space benchmark through high-precision anchoring and laser intersatellite measurement. The use of intelligent navigation systems can make ordinary navigation positioning accuracy reach sub-meter level, the timing accuracy will be increased by about 5 times, and the precision positioning service can achieve fast convergence of centimeter-level accuracy. Intelligent navigation can fully support the cross-domain integration of combat platforms, the doubling of the effectiveness of distributed lethal weapons, and the precise navigation of the entire process of air-space integrated drones from cruising to precision approach.
The satellite power confrontation mode is transformed into a navigation system confrontation. In terms of navigation confrontation services, the traditional satellite power confrontation mode will no longer meet the needs of the intelligent battlefield. Navigation system confrontation is the only way for the development of intelligent equipment in order to enhance the ability of troops to quickly adapt to the battlefield environment. Specifically, it includes precise release of navigation performance, heterogeneous backup of constellations, and global hotspot mobility. The main features are intelligent navigation signals and flexible theater reinforcements. Based on controllable point beam energy enhancement technology, energy delivery in hotspot areas, enhanced area expansion, deception or blocking interference, and digital transmission service guarantee are realized. In a high-interference and blocking environment, ensure service continuity and accuracy, and gradually release strength as the war progresses.
The simple integration of communication and navigation will be transformed into integrated on-demand services. It will provide deeper and broader navigation information services, deeply integrate into the military information network, and provide high, medium and low-speed classified and hierarchical navigation information services to users on land, sea, air and space. Reuse the favorable conditions of global multiple continuous coverage of navigation satellites to meet users’ communication and navigation needs in a global range and in any posture, and realize high reliability and strong interference-resistant search and rescue, position reporting, and signaling transmission. The navigation satellite space-based network interacts with the ground network information to build inter-satellite and satellite-to-ground high-speed backbone networks. Through miniaturized laser terminals and enhanced space routers, a stable and reliable space network is formed, equipped with a complete and standardized protocol system to support the autonomous and intelligent operation of hybrid constellation networks.
The computing resources of payload modules are separated and transformed into cloud computing resources of constellation. It will provide more intelligent space-based cloud computing services and reliable space-based intelligent support for intelligent weapon platforms. The main features are virtualization of onboard hardware resources and balancing of task loads. Through the configuration of public onboard computing modules, large-capacity storage units, and high-speed bus networks on navigation satellites, a ubiquitous space network shared resource pool is formed. The powerful data processing capability can support the autonomous establishment and maintenance of space-based space-time benchmarks, intelligent maintenance of navigation signal quality, and autonomous management of space networks. At the same time, it can provide computing, push, and storage services for complex information such as spatial position for various high-end users in the sky, air, land, and sea.
(The author is an academician of the Chinese Academy of Engineering)
Above: Schematic diagram of satellite navigation system supporting operations.
Friday, November 12, 2021 // China Military Network Ministry of National Defense Network
Source: China Military Network-People’s Liberation Army Daily Author: Yang Lianzhen Editor-in-charge: Yang Fanfan
2022-04-22 06:42
Combat management is the foundation for winning modern wars and the core of the modern combat system. It is the planning, organization, coordination and control of personnel, equipment, information, resources, time and space and other elements during the combat process.
Combat management system refers to the command information system used to support combat management activities, including intelligence collection, information transmission, target identification, threat assessment, weapon allocation, mission planning, etc. It has gradually developed with the evolution of war and technological progress.
Combat Management System: The Core of Modern Combat System
Schematic diagram of the combat management system
Past and present life
Implementing timely and accurate command and control of combat operations and making timely and decisive combat decisions are the goals and dreams that commanders have always pursued in different war periods. Before the emergence of scientific management, there was no concept of combat management in war, and naturally there was no combat management system. However, simple combat management activities and systems have always been associated with war and developed in an integrated manner.
The core of combat management is to ensure that commanders and troops can exchange information and instructions smoothly. In the ancient combat command system, gongs, drums, and flags were called the “three officials”. “When words cannot be heard, gongs and drums are used; when sight cannot be seen, flags are used.” Sight and hearing are the primitive means of command and control.
After the invention of the telegraph, telephone, and radio, long-distance and rapid transmission of combat orders and combat information became a reality, and the scope of combat management shifted from two-dimensional to three-dimensional. The war decision-making of “planning and winning thousands of miles away” is no longer a myth. Of course, traditional battlefield management methods are not completely ineffective. For example, in the Korean War, due to limited communication conditions, our army still used bugles to transmit combat orders to the company and below, and there were more than 20 types of bugle calls related to combat. “The sound of bugles from all sides rose up,” and the bugles on the Korean battlefield once frightened the US military. Ridgway wrote in his memoirs: “As soon as it sounded, the Chinese Communist Army would rush towards the coalition forces as if it were under a spell. At this time, the coalition forces were always beaten back like a tide.”
At the beginning of the 20th century, the concept of scientific management gradually gained popularity, and the military quickly applied it to combat. The term “combat management” first appeared in the US Air Force, where combat managers provided long-range target indication and voice guidance to fighters based on radar detection. The core combat organization is called the BM/C3 system, namely Battle Management and Command, Control, and Communication. In 1946, the first electronic computer “ENIAC” was successfully developed, and the military began to use computers to store and process various data related to combat. In 1958, the US military built the world’s first semi-automated combat management system-the “Seqi” air defense command and control system, which used computers to realize the automation of part of the information collection, processing, transmission and command decision-making process for the first time. In the same year, the Soviet Army built the “Sky No. 1” semi-automated air defense command and control system. Combat management systems began to appear on the war stage, and human-machine collaborative decision-making gradually became the main form of combat decision-making for commanders. During the “Rolling Thunder” campaign of the Vietnam War, the U.S. military commanded more than 5,000 aircraft to dispatch 1.29 million sorties and dropped 7.75 million tons of bombs, which would have been impossible to achieve by manual command alone.
The combat management system has gone through weapon-centered, platform-centered, network-centered, and system-centered construction stages, and has gradually been able to receive and process information from sensors and other sources in multiple domains, perceive and generate combat situation maps in real time, automatically implement command and control of troops and equipment, and intelligently assist commanders in making decisions, involving the army, navy, air force and other military services.
For example, the Israeli Army’s “Ruler” combat management system uses a single-soldier digital device to connect to a channel state information device to provide real-time situational awareness and command and control information for troops performing tactical operations and fire support. The U.S. Navy’s “Aegis” combat system uses a multi-task signal processor to integrate air defense and anti-missile capabilities, and realizes the integration of shipborne phased array radars, command decisions, and weapon control. The NATO Air Force’s ACCSLOC1 system, based on network distributed deployment, integrates 40 types of radars and more than 3,000 physical interfaces, and undertakes air operations such as mission planning, combat command, and combat supervision. From the launch of the first Gulf War to the Libyan War, the time from sensor information acquisition to firing by the U.S. military has been shortened from 24 hours to 2.5 minutes.
Features
The combat management system is a rapidly developing and constantly improving distributed operating system. It mainly collects and processes sensor data, facilitates the transmission and integration of various types of information, conducts situation identification and prediction, generates combat plans, completes action evaluation and selection, and issues combat orders to weapon platforms and shooters. Its essence is to achieve an efficient combat “observation-judgment-decision-action” cycle (OODA loop).
The combat management system widely uses situation assessment and prediction, combat space-time analysis, online real-time planning, combat resource management and control, and combat management engine technologies, and adopts a “cloud + network + terminal” technical architecture based on information technology.
For example, the U.S. military took the lead in using information technology to build a C4ISR system that integrates command, control, computers, communications, intelligence, surveillance and reconnaissance, laying the foundation for the combat management system. In the Afghanistan War, the C4ISR system achieved near-real-time transmission of combat information to combat platforms for the first time. With the continuous maturity of sensors, networks and artificial intelligence, technologies such as intelligent situation understanding and prediction, intelligent information push, intelligent task planning, intelligent collaborative control, intelligent rapid reconstruction and intelligent parallel command and control are having an increasingly significant impact on combat management systems.
Combat management systems usually support functions such as situational awareness, mission planning, engagement management, communications, modeling, simulation and analysis, and test training. For example, a missile defense combat management system mainly includes command and control, engagement management, and communications. The command and control function enables pre-battle combat planning and battlefield situation awareness; the engagement management function enables auxiliary combat decision-making, allocation of anti-missile weapons, and completion of strike missions; and the communication function enables the transmission and sharing of intelligence and data among the anti-missile units in the system.
The combat management system is an open and complex system. The structure determines the function. Different system structures determine the functional expansion of different systems: the ship’s self-defense combat management system enables the ship to have a strong self-defense capability through automated weapon control regulations, collaborative engagement management systems and tactical data links; the electromagnetic combat management system improves the planning, sharing and mobility of the electromagnetic spectrum by integrating and displaying battlefield electromagnetic spectrum data; the individual combat system enhances the soldier’s mobility, support, lethality and survivability by integrating individual protection, individual combat weapons and individual communication equipment.
Combat management systems generally have the characteristics of integration, automation, optimization, and real-time. The combat mode of modern warfare is complex and the battlefield scale is expanding. The requirements for force control, resource integration, and task scheduling have increased, and system integration must be achieved. The French Army’s “Scorpion” system fully integrates tanks, armored vehicles, infantry fighting vehicles, unmanned ground vehicles, drones, and attack helicopters into the same combat group, and links all platforms and combat units in the task group.
With the increase of combat elements in modern warfare and the expansion of battlefield perception space, the command automation system that relies heavily on people can no longer fully adapt, and the system must be automated. All operating functions of Pakistan’s combat management artillery control system are fully automated, “providing an automated solution for preparing, coordinating, transmitting, executing and modifying fire support plans and firing plans.”
The pace of modern warfare is accelerating and battlefield data is massive. It is necessary to quickly grasp the situation and make decisions efficiently, and it is necessary to achieve system optimization decision-making. Military powers are combining artificial intelligence, cloud computing, the Internet of Things and big data technologies to facilitate faster decision-making in multi-domain operations.
Future Development
Traditional combat management systems place more emphasis on pre-established engagement sequences and combat rules. However, future wars will emphasize the confrontation between systems, and it is impossible to exhaust all situations in advance. The battlefield information that needs to be mastered is also becoming more complex and massive. For this reason, the armies of various countries have begun to abandon the traditional method of developing combat management systems for each combat domain separately, and are network-centric and supported by artificial intelligence, trying to help commanders make combat decisions more quickly and realize real-time connection between sensors in each combat domain and any shooter.
The combat management system will promote the implementation of combat concepts. The “Advanced Combat Management System” developed by the US Air Force plans to connect all military services and their weapon platforms in real time in a military Internet of Things. Its core is to seamlessly link various intelligence reconnaissance platforms, command and control platforms, strike platforms and combat management platforms with various cross-domain capabilities, convert intelligence and target indication data into timely and usable information, shorten the “discovery-positioning-tracking-targeting-strike-assessment” cycle, and execute combat operations at a speed that opponents cannot keep up. The Russian military proposed the “military unified information space” theory and organized the development of the “automatic control system” for integrated joint operations of land, sea and air networks. By establishing a network-centric command model, it attempts to integrate the command, communication, reconnaissance, firepower, and support of the entire army, realize cross-domain operations in the true sense, and improve battlefield situation awareness and combat command efficiency.
The combat management system will rely on artificial intelligence technology. The application of artificial intelligence will not only multiply the capabilities of weapon systems, but will also fundamentally change the implementation of the OODA loop. In future combat management systems, artificial intelligence technology will become the core support and driving engine, and the key factor is the quality of the algorithm. The system will have built-in upgradeable artificial intelligence, and people will be in a supervisory or collaborative state to minimize manual input, spontaneously identify and classify threat targets in the combat environment, autonomously evaluate and weigh, and automatically allocate weapons, thereby providing adaptive combat advantages and decision-making options.
For example, the “Intelligent Autonomous Systems Strategy” released by the US Navy in July 2021 aims to accelerate the development and deployment of intelligent platforms through a highly distributed command and control architecture, integrate unmanned systems, artificial intelligence, and autonomous driving technologies, and realize future combat decisions facilitated by intelligent autonomous systems. The Russian military has more than 150 artificial intelligence projects under development, one of the focuses of which is to introduce artificial intelligence into command and control systems, adapt intelligent software to different weapon platforms, achieve the unification of physical and cognitive domains, and double combat effectiveness through intelligent empowerment.
The combat management system will achieve a breakthrough in cross-domain capabilities. The military’s combat management capabilities are shifting towards full-domain coordination, including land, sea, air, space, electricity, network, cognitive domain, and social domain. To adapt to the full-domain environment, the combat management system needs to have the following functions: a resilient and redundant communication system, flexible and secure data operation; artificial intelligence and machine learning directly extract and process data from sensors, and conduct decentralized integration and sharing; segmented access based on confidentiality levels to meet perception, understanding, and action needs. On this basis, it is also necessary to provide troops with reconnaissance and surveillance, tactical communications, data processing, network command and control, and other capabilities.
The future combat management system will focus on security processing, connectivity, data management, application, sensor integration and effect integration, optimize data sharing, collaborative operations and command and control in the entire combat domain, and support decision-making advantages from the tactical level to the strategic level. Its purpose is only one: to give commanders the ability to surpass their opponents.
(The author is the deputy director and professor of the Training Management Department of the Armed Police Command Academy)
The opening of each combat domain will inevitably lead to a new round of changes in combat methods. Driven by the new round of scientific and technological revolution and industrial revolution characterized by intelligence, ubiquity and integration, emerging combat domains such as space, cyberspace, electromagnetic spectrum, and cognitive space have an increasing impact on future operations. The concept of “multi-domain combat” has emerged through cross-domain collaboration with traditional land, sea, and air combat domains to achieve complementary advantages and system efficiency, and is becoming a new combat theory that adapts to the evolution of war forms.
The concept of “multi-domain combat” was first proposed by the US military. Subsequently, the United Kingdom, France, and other NATO member states have developed the concept of “multi-domain combat” in different forms. Israel was the first to apply the concept of “multi-domain operations” in actual combat. The Russian army innovatively proposed its own “multi-domain operations” theory from the perspective of its opponents. At present, the concept of “multi-domain operations” has become an important concept that triggers a new round of changes and transformations in foreign military operations.
The concept of “multi-domain operations” is a new operational concept first proposed by the US Army and jointly promoted by other services based on the changes in operational methods in the information age.
The US military believes that the winning mechanism of the concept of “multi-domain operations” is to form multiple advantages in a specific time window through the rapid and continuous integration of all war domains (land, sea, air, space, and cyberspace) and force the enemy into a dilemma. The U.S. Army proposed to be guided by the idea of ”global integrated operations” and the concept of “cross-domain collaboration”, and strive to form an asymmetric advantage in future wars through “multi-domain operations”. The multi-domain task force (brigade level) will be the core combat force of the U.S. Army to implement multi-domain operations, integrating artillery, land-based tactical missiles, land aviation, cyberspace, electromagnetic spectrum, space and air defense forces, and forming multi-domain combat capabilities through cross-domain mixed formations. The U.S. Air Force actively responded to the concept of “multi-domain operations”, focused on building a joint combat command and control system, proposed the concept of multi-domain command and control, and focused on developing advanced combat management systems, sinking multi-domain operations to the tactical level to improve the agility and cross-domain collaboration capabilities of future operations. The U.S. Navy has absorbed the core idea of the “multi-domain combat” concept, proposed to build an “integrated global maritime military force”, focused on developing the “distributed lethality” combat concept, and proposed to strengthen the design and exercise of global combat.
The U.S. Department of Defense and the Joint Chiefs of Staff have gathered the ideas and mechanisms of the new combat concept of “multi-domain combat” of the military services, and proposed the top-level concept of “global combat”, aiming to form a new round of asymmetric advantages, lead the transformation of combat methods and military transformation. The global combat concept is centered on joint global command and control, aiming to integrate traditional combat domains with space, cyberspace, electromagnetic spectrum, air defense and anti-missile and cognitive domain capabilities, and compete with global competitors in a full-spectrum environment. It is reported that the concept is still in its infancy and is undergoing theoretical deepening, experimental verification, exercise evaluation and doctrine transformation, and is constantly enriching its conceptual core through multiple work lines. Among them, the US Joint Chiefs of Staff leads the transformation of concepts into policies, doctrines and requirements; the Air Force promotes the concept to maturity by developing advanced combat management systems, the Army by implementing the “Convergence Project”, and the Navy by launching the “Transcendence Project”. The US theater supports the development of multi-domain combat concepts and multi-domain combat modes through war games, project demonstrations and joint exercises.
Based on the perspective of reference and integration, NATO countries such as the United Kingdom actively participated in the development and testing of the US military’s “multi-domain operations” concept, and revised the operational concept in combination with actual conditions.
The British Ministry of Defense proposed the concept of “multi-domain integration”, which is consistent with the concept mechanism of the US military’s “multi-domain operations”, focusing on integrating operations in different domains and at different levels, preparing for the development of a joint force and maintaining competitive advantages in 2030 and beyond. The British Ministry of Defense pointed out that “integrating capabilities in different domains and at different levels through information systems, creating and utilizing synergies to gain relative advantages is the winning mechanism of the multi-domain integration concept.” The concept emphasizes gaining information advantages, shaping strategic postures, building a multi-domain combat environment, and creating and utilizing synergies. The concept raises four specific issues: how to provide an advantage over rivals by 2030 and beyond through “multi-domain integration”; how to achieve cross-domain integration of the Ministry of Defense in cooperation with allies, governments and civilian departments; how to solve the policy issues involved in the concept of “multi-domain integration”; how to promote research on defense concepts, capabilities and war development. With this as a starting point, the British Army has launched a multi-faceted, step-by-step, and systematic military transformation.
Other NATO countries are also jointly developing and innovatively applying the concept of “multi-domain operations” to varying degrees, and promoting the transformation and implementation of the concept of “multi-domain operations” in the form of joint exercises and allied cooperation. In 2019, the US Army led the “Joint Operational Assessment (2019)” exercise, which aimed to assess the combat capabilities of the Indo-Pacific Command’s multi-domain task force. Forces from France, Canada, Australia, New Zealand and other countries formed a multinational task force to participate in the exercise, which assessed the multi-domain combat concepts, formations and capabilities in the combat environment from 2025 to 2028. In October 2019, the NATO Joint Air Power Competition Center held a meeting on “Shaping NATO’s Future Multi-Domain Combat Posture”. In order to shape NATO’s future multi-domain combat posture, it explored and studied military thinking, multi-domain combat forces, multi-domain combat operations and training joint forces. In June 2020, the NATO Command and Control Center of Excellence released a white paper on the Multi-Domain Operations Command and Control Demonstration Platform, which aims to respond to threats and challenges in multiple operational domains with a decentralized, data-driven integrated environment by bridging the command and control gap between technology and operators, tactics and campaign levels, and academia and the military.
Based on the perspective of its opponents, the Russian army seeks a way to crack it on the one hand, and on the other hand, based on the winning mechanism of “cross-domain operations”, it combines its own characteristics to innovate combat theories
After the US military proposed the concept of “multi-domain operations”, the Russian army actively sought a way to crack it based on its own security interests. In December 2020, the Russian magazine “Air and Space Power Theory and Practice” published an article titled “Argument for the Use of Aviation Power to Break the Enemy’s Large-Scale Joint Air Strikes in Multi-Domain Operations”, which stated that large-scale joint air strikes are the initial stage for NATO countries to implement multi-domain operations. Large-scale coordinated operations will be carried out against Russia’s most important key facilities, creating conditions for subsequent decisive actions by NATO joint armed forces. The Russian army must comprehensively use the reconnaissance and strike system composed of the aviation forces of the theater forces to cause unbearable losses to the enemy, break its large-scale joint air strikes, and force NATO’s initial stage goals of multi-domain operations to fail to be achieved, causing NATO’s political and military leadership to abandon the attempt to continue to implement multi-domain operations.
On the other hand, the Russian army proposed the “military unified information space” theory for the new combat method of “cross-domain combat”. Its core idea is: to use modern information technology to establish a networked command and control system to achieve the deep integration of the army’s command, communication, reconnaissance, firepower, support and other elements, thereby improving the battlefield situation perception capability and combat command efficiency. The Russian military continues to promote theoretical development around the realization of cross-domain combat capabilities: first, relying on the unified information space of the army to establish a network-centric command model; second, introducing artificial intelligence into the command and control system to achieve the unification of the physical domain and the cognitive domain; third, developing network, space and underwater combat forces to gain advantages in emerging combat fields; fourth, establishing a unified military standard system to enhance the interoperability of forces and weapons. The Russian military has not completely absorbed the Western concept of “multi-domain combat”, nor has it completely denied the beneficial elements of the Western “multi-domain combat”, but has combined its own absorption of some advanced combat ideas of “multi-domain combat” to enrich its own unique combat theory.
Based on the perspective of combat needs, Israel took the lead in applying the concept of “multi-domain combat” on the Gaza battlefield, and used the multi-domain combat force “Ghost” as the main combat force.
The Israeli army believes that multi-domain joint combat is an inevitable trend in the development of future wars. For Israel, which mainly relies on ground combat, by integrating land, air, cyberspace, electromagnetic spectrum and sea elite forces, it can quickly identify, track and destroy enemy targets, and further improve the lethality of the Israeli army. This concept is in line with the concept of “multi-domain combat” proposed by the US Army. Under the guidance of this concept, the Israeli army formed the “Ghost” force and took the lead in actual combat testing on the Gaza battlefield. In the Israeli-Palestinian conflict in May 2021, Israel used the “Ghost” combat battalion for the first time to implement multi-domain operations in the code-named “Wall Guardian” operation against Hamas, which was called the world’s first “artificial intelligence war”. The Israeli army mainly relied on machine learning and data collection in this war, and artificial intelligence became a key component of combat and a force multiplier for the first time. In the operation to clear the Hamas tunnel network, the Israeli army used big data fusion technology to pre-identify and target, and then dispatched 160 fighter jets to carry out precise strikes, which greatly destroyed the Hamas tunnel network and achieved air control over the ground; in the attack on Hamas rocket launchers, the Israeli fighter pilots, ground intelligence forces and naval forces used command and control systems to quickly find targets and carry out real-time precise strikes, quickly shaping a favorable battle situation.
According to the Israeli army, the “Ghost” force is very different from traditional forces in terms of combat organization, weapon configuration and combat methods. The unit is temporarily organized under the 98th Paratrooper Division of Israel, including the brigade reconnaissance battalion, the ground forces of the Paratrooper Brigade, the armored brigade, the engineering corps, the special forces, the F-16 squadron and the Apache helicopter, as well as the “Heron” drone and other multi-domain combat forces. Through the use of multi-domain sensors and precision strike weapons, cross-domain maneuvers and strikes are achieved, “changing the battlefield situation in a very short time”. The battalion was established in July 2019. Although it is a ground force, it integrates multi-domain combat forces such as air strikes, network reconnaissance, precision firepower, electronic confrontation, intelligence interconnection and maritime assault. It is a battalion-level combat unit with division-level combat capabilities. After its establishment, the unit has continuously improved its multi-domain integration and cross-domain strike capabilities through exercises, and has quickly exerted two major functions with the support of the newly developed artificial intelligence technology platform: one is to serve as an elite weapon on the battlefield and fight in an asymmetric manner; the other is to serve as a test unit to continuously innovate and develop new combat concepts, combat theories and technical equipment, and to promote successful experiences to other units at any time.