Tag Archives: Chinese Military Characteristics & Development Trends of Cognitive Domain Operations and Warfare

Information Support Force of the Chinese People’s Liberation Army – Cognitive and Cyber Warfare Capabilities

中國人民解放軍資訊保障部隊認知與網路戰能力

現代英語:

On April 19, the founding meeting of the Information Support Force of the Chinese People’s Liberation Army was held grandly at the Bayi Building in Beijing. Xi Jinping, General Secretary of the CPC Central Committee, President of the State, and Chairman of the Central Military Commission, awarded the military flag to the information support force and delivered a speech. This is Xi Jinping’s speech.

On April 19, the founding meeting of the Information Support Force of the Chinese People’s Liberation Army was held grandly at the Bayi Building in Beijing. Xi Jinping, General Secretary of the CPC Central Committee, President of the State, and Chairman of the Central Military Commission, awarded the military flag to the information support force and delivered a speech. This is the flag awarded by General Xi Jinping to Bi Yi, commander of the Information Support Force, and Li Wei, political commissar.

It is necessary to implement the thought of strengthening the army in the new era and the military strategic principles of the new era, adhere to the principle of building the army through politics, strengthening the army through reform, strengthening the army through science and technology, strengthening the army through talents, and running the army in accordance with the law. We must focus on preparing for war and follow the strategic requirements of system integration and global support. , forge ahead with determination, work hard, and strive to build a powerful modern information support force

  ■The adjustment and formation of the information support force is a major decision made by the Party Central Committee and the Central Military Commission based on the overall situation of strengthening the military. It is a strategic move to build a new structure of services and arms and improve the modern military force system with Chinese characteristics. It is also important for accelerating the modernization of national defense and the army and Effectively fulfilling the missions and tasks of the People’s Army in the new era is of great and far-reaching significance

  ■The information support force is a newly created strategic force and a key support for coordinating the construction and application of network information systems. It plays an important role and has great responsibilities in promoting the high-quality development of our military and winning modern wars. We must resolutely obey the party’s command, fully implement the fundamental principles and systems of the party’s absolute leadership over the military, comprehensively strengthen party building in the military, strengthen ideals and beliefs, strictly enforce discipline and rules, promote good styles, and ensure the absolute loyalty, purity, and reliability of the military. It is necessary to effectively support operations, adhere to information-led and joint victory, smooth information links, integrate information resources, strengthen information protection, deeply integrate into the military’s joint operations system, accurately and efficiently implement information support, and serve to support military struggles in all directions and fields. It is necessary to accelerate innovation and development, adhere to the fundamental traction of combat needs, strengthen system planning, promote joint construction and sharing, strengthen scientific and technological innovation, build a network information system that meets the requirements of modern warfare and has the characteristics of our military, and promote the accelerated improvement of the system’s combat capabilities with high quality. It is necessary to consolidate the foundation of the army, implement the requirements for comprehensive and strict military management, strictly manage education, maintain formal order, stimulate motivation and vitality, comprehensively forge excellent grassroots, ensure a high degree of unity, security and stability of the army, strive to create a new situation in army building, and resolutely complete the tasks assigned by the party and the people. various tasks

  Xinhua News Agency, Beijing, April 19 (Reporter Mei Changwei) The founding meeting of the Information Support Force of the Chinese People’s Liberation Army was held grandly at the Bayi Building in Beijing on the 19th. Xi Jinping, General Secretary of the CPC Central Committee, President of the State, and Chairman of the Central Military Commission, awarded the military flag to the Information Support Force and delivered a speech. On behalf of the Party Central Committee and the Central Military Commission, he extended warm congratulations to all officers and soldiers of the Information Support Force. He emphasized that it is necessary to implement the thought of strengthening the military in the new era, implement the military strategic principles of the new era, adhere to the principle of building the army through politics, strengthening the army through reform, strengthening the army through science and technology, strengthening the army through talents, and running the army in accordance with the law. Strategic requirements, forge ahead, work hard, and strive to build a powerful modern information support force.

  At 4 o’clock in the afternoon, the inaugural meeting began, and the entire audience sang the national anthem. The guard of honor guarded the military flag and walked forward to the rostrum. Xi Jinping awarded the general flag to Bi Yi, commander of the Information Support Force, and Li Wei, political commissar. The main leaders of the information support force saluted Xi Jinping, took the military flag from Xi Jinping, and stood in awe with the flag. All officers and soldiers solemnly saluted the military flag.

  After the flag-presenting ceremony, Xi Jinping delivered a speech. He pointed out that the adjustment and formation of the information support force is a major decision made by the Party Central Committee and the Central Military Commission based on the overall situation of strengthening the military. It is a strategic measure to build a new structure of services and arms and improve the modern military force system with Chinese characteristics. It is also important for accelerating national defense and military affairs. Modernizing and effectively fulfilling the missions and tasks of the People’s Army in the new era is of great and far-reaching significance.

  Xi Jinping emphasized that the information support force is a newly created strategic force and a key support for coordinating the construction and application of network information systems. It plays an important role and has great responsibilities in promoting the high-quality development of our army and winning modern wars. We must resolutely obey the party’s command, fully implement the fundamental principles and systems of the party’s absolute leadership over the military, comprehensively strengthen party building in the military, strengthen ideals and beliefs, strictly enforce discipline and rules, promote good styles, and ensure the absolute loyalty, purity, and reliability of the military. It is necessary to effectively support operations, adhere to information-led and joint victory, smooth information links, integrate information resources, strengthen information protection, deeply integrate into the military’s joint operations system, accurately and efficiently implement information support, and serve to support military struggles in all directions and fields. It is necessary to accelerate innovation and development, adhere to the fundamental traction of combat needs, strengthen system planning, promote joint construction and sharing, strengthen scientific and technological innovation, build a network information system that meets the requirements of modern warfare and has the characteristics of our military, and promote the accelerated improvement of the system’s combat capabilities with high quality. It is necessary to consolidate the foundation of the army, implement the requirements for comprehensive and strict military management, strictly educate and manage, maintain formal order, stimulate motivation and vitality, comprehensively forge excellent grassroots, ensure a high degree of unity, security and stability of the army, strive to create a new situation in army building, and resolutely complete the tasks assigned by the party and the people. various tasks.

  Li Wei spoke on behalf of the Information Support Force, saying that we must resolutely implement Chairman Xi’s important instructions, resolutely obey the commands of the Party Central Committee, the Central Military Commission and Chairman Xi, focus on preparing for war, faithfully perform our duties, and never let down the trust of the Party and the people.

  The conference ended with majestic military songs. Afterwards, Xi Jinping met with members of the leadership team of the Information Support Force and took photos with them.

  At the founding meeting, Zhang Youxia, member of the Political Bureau of the CPC Central Committee and Vice Chairman of the Central Military Commission, read out the Central Military Commission’s order on the establishment of the information support force, the order on the appointment of members of the leadership team of the information support force, and the composition notice of the Party Committee Standing Committee issued by Xi Jinping. Member of the Political Bureau of the CPC Central Committee , Vice Chairman of the Central Military Commission He Weidong presided over the meeting.

  Central Military Commission members Liu Zhenli, Miao Hua and Zhang Shengmin attended the conference. Relevant responsible comrades from all ministries and commissions of the Central Military Commission, all agencies directly under the Central Military Commission, all war zones, all services and arms, all units directly under the Central Military Commission, and the Armed Police Force, as well as representatives of officers and soldiers of all services and arms and the Armed Police Force, as well as representatives of civilian personnel, attended the conference.

  According to the decision of the Central Military Commission, the newly formed information support force will be directly commanded by the Central Military Commission. At the same time, the designation of the strategic support force will be revoked, and the leadership and management relationships of the military aerospace force and cyberspace force will be adjusted accordingly.

國語中文:

4月19日,中國人民解放軍資訊支援部隊成立大會在北京八一大樓隆重舉行。中共中央總書記、國家主席、中央軍委主席習近平授予資訊支援部隊軍旗並致訓詞。這是習近平致訓詞。
新華社記者 李 剛攝
4月19日,中國人民解放軍資訊支援部隊成立大會在北京八一大樓隆重舉行。中共中央總書記、國家主席、中央軍委主席習近平授予資訊支援部隊軍旗並致訓詞。這是習近平將軍旗授予資訊支援部隊司令員畢毅、政治委員李偉。
新華社記者 李 剛攝

■要貫徹新時代強軍思想,貫徹新時代軍事戰略方針,堅持政治建軍、改革強軍、科技強軍、人才強軍、依法治軍,聚焦備戰打仗,依照體系融合、全域支撐的戰略要求,銳意進取,札實工作,努力建立一支強大的現代化資訊支援部隊

■調整組建資訊支援部隊,是黨中央和中央軍委從強軍事業全局出發作出的重大決策,是構建新型軍兵種結構佈局、完善中國特色現代軍事力量體系的戰略舉措,對加快國防和軍隊現代化、有效履行新時代人民軍隊使命任務具有重大而深遠的意義

■資訊支援部隊是全新打造的戰略性兵種,是統籌網絡資訊體系建設運用的關鍵支撐,在推動我軍高質量發展和打贏現代戰爭中地位重要、責任重大。要堅決聽黨指揮,全面貫徹黨對軍隊絕對領導的根本原則和製度,全面加強部隊黨的建設,堅定理想信念,嚴肅紀律規矩,弘揚優良作風,確保部隊絕對忠誠、絕對純潔、絕對可靠。要強力支撐作戰,堅持資訊主導、聯合製勝,暢通資訊鏈路,融合資訊資源,加強資訊防護,深度融入全軍聯合作戰體系,精準高效實施資訊支援,服務保障各方向各領域軍事鬥爭。要加速創新發展,堅持作戰需求根本牽引,加強體系統籌,推進共建共享,強化科技創新,建設符合現代戰爭要求、具有我軍特色的網絡信息體系,高質量推動體係作戰能力加速提升。要夯實部隊基礎,落實全面從嚴治軍要求,嚴格教育管理,保持正規秩序,激發動力活力,全面鍛造過硬基層,確保部隊高度集中統一和安全穩定,奮力開創部隊建設新局面,堅決完成黨和人民賦予的各項任務

新華社北京4月19日電 (記者梅常偉)中國人民解放軍資訊支援部隊成立大會19日在北京八一大樓隆重舉行。中共中央總書記、國家主席、中央軍委主席習近平向資訊支援部隊授予軍旗並致訓詞,代表黨中央和中央軍委向資訊支援部隊全體官兵致以熱烈祝賀。他強調,要貫徹新時代強軍思想,貫徹新時代軍事戰略方針,堅持政治建軍、改革強軍、科技強軍、人才強軍、依法治軍,聚焦備戰打仗,依照體系融合、全域支撐的戰略要求,銳意進取,札實工作,努力建立一支強大的現代化資訊支援部隊。

下午4時,成立大會開始,全場高唱國歌。儀仗禮兵護衛著軍旗,正步行進到主席台前。習近平將軍旗授予資訊支援部隊司令員畢毅、政治委員李偉。資訊支援部隊主要領導向習近平敬禮,從習近平手中接過軍旗,持旗肅立。全體官兵向軍旗莊嚴敬禮。

授旗儀式後,習近平致訓詞。他指出,調整組建資訊支援部隊,是黨中央和中央軍委從強軍事業全局出發作出的重大決策,是構建新型軍兵種結構佈局、完善中國特色現代軍事力量體系的戰略舉措,對加快國防和軍隊現代化、有效履行新時代人民軍隊使命任務具有重大而深遠的意義。

習近平強調,資訊支援部隊是全新打造的戰略性兵種,是統籌網絡資訊體系建設運用的關鍵支撐,在推動我軍高質量發展和打贏現代戰爭中地位重要、責任重大。要堅決聽黨指揮,全面貫徹黨對軍隊絕對領導的根本原則和製度,全面加強部隊黨的建設,堅定理想信念,嚴肅紀律規矩,弘揚優良作風,確保部隊絕對忠誠、絕對純潔、絕對可靠。要強力支撐作戰,堅持資訊主導、聯合製勝,暢通資訊鏈路,融合資訊資源,加強資訊防護,深度融入全軍聯合作戰體系,精準高效實施資訊支援,服務保障各方向各領域軍事鬥爭。要加速創新發展,堅持作戰需求根本牽引,加強體系統籌,推進共建共享,強化科技創新,建設符合現代戰爭要求、具有我軍特色的網絡信息體系,高質量推動體係作戰能力加速提升。要夯實部隊基礎,落實全面從嚴治軍要求,嚴格教育管理,保持正規秩序,激發動力活力,全面鍛造過硬基層,確保部隊高度集中統一和安全穩定,奮力開創部隊建設新局面,堅決完成黨和人民賦予的各項任務。

李偉代表資訊支援部隊發言,表示要堅決貫徹習主席重要指示,堅決聽從黨中央、中央軍委和習主席指揮,聚力備戰打仗,忠誠履職盡責,決不辜負黨和人民重托。

大會在雄壯的軍歌聲中結束。之後,習近平接見了資訊支援部隊領導班子成員,並與大家合照。

成立大會上,中共中央政治局委員、中央軍委副主席張又俠宣讀了習近平簽發的中央軍委關於組建信息支援部隊的命令、信息支援部隊領導班子成員任職命令和黨委常委會組成通知,中共中央政治局委員、中央軍委副主席何衛東主持大會。

中央軍委會委員劉振立、苗華、張升民出席大會。軍委機關各部會、軍委各直屬機構、各戰區、各軍兵種、軍委各直屬單位、武警部隊有關負責同志,各軍兵種及武警部隊官兵代表、文職人員代表等參加大會。

根據中央軍委決定,新組建的資訊支援部隊由中央軍委直接領導指揮,同時撤銷戰略支援部隊番號,相應調整軍事航天部隊、網絡空間部隊領導管理關系。

中國共產黨原文來源:http://cpc.people.com.cn/BIG5/n1/2024/0420/c64094-40219888.html

Controlling Cognitive Power: an Important Support for Winning Wars

控制認知力:贏得戰爭的重要支撐

英文翻譯:

As the decisive factor in war, people’s thinking and cognitive level determines their role and ultimately determines who controls the war. In other words, mastering the cognitive control means mastering the initiative in war to a large extent. Finding ways to control cognitive control and then seize comprehensive control of the battlefield to achieve the greatest victory at the lowest cost is an important winning mechanism in modern warfare.

The deepest level of war confrontation is the confrontation of thinking and cognition

Thinking and cognition are powerful weapons for humans to understand and transform the world, and are the most fundamental support and deepest force in war confrontation. War confrontation is ultimately a competition and confrontation between people, groups of people, and their materialized weapons and equipment.

Thinking and cognition determine the quality of decision-making. In the “OODA” closed-loop link of war operation, decision-making undoubtedly occupies a central position and plays a key role. The essence of decision-making is thinking and cognition. The advantage of thinking and cognition fundamentally determines the advantage of war decision-making and can even offset the disadvantages in other aspects. When summarizing the combat situation in East China, Chen Yi once said that the higher our army is, the stronger it is. “For example, the battle organization above the brigade is stronger than others, the column is stronger, the field command is stronger, and the strategic guidance of the command is many times better than him.” This kind of “the higher it is, the stronger it is” organizational leadership and strategic guidance demonstrates the advantage of thinking and cognition, which in turn forms the advantage of war decision-making. The so-called “strategy and strategy, winning thousands of miles away” and “one soldier is a tyrant, and the general is a tyrant”. Correct decision-making is the greatest advantage, and wrong decision-making is the most fatal mistake. Seizing the advantage of war decision-making with the advantage of thinking and cognition is the primary factor in winning the war.

Thinking and cognition determine strategy and tactics. Strategy and tactics are the strategic methods needed to achieve the purpose of war. Different thinking and cognition determine different strategies and tactics, and different strategies and tactics lead to different war results. In the early days of the Great Revolution, due to insufficient cognition and lack of experience, our party simply applied the experience of the Soviet revolution and competed with the Kuomintang reactionaries for the central cities with weak forces, resulting in repeated setbacks; Mao Zedong combined the basic principles of Marxism with the specific reality of the Chinese revolution, proposed the correct revolutionary path of “surrounding the cities from the countryside and seizing power by force”, and pioneered the summary and implementation of guerrilla warfare strategies and tactics, bringing hope to the Chinese revolution. The strategic policy of “protracted war” is a scientific conclusion based on the correct understanding of the nature of the War of Resistance Against Japan and the national conditions of China and Japan, and the criticism of erroneous ideas such as “national destruction theory” and “quick victory theory”. Facts show that correct strategies and tactics are inseparable from correct thinking and cognition, the quality of thinking and cognition determines the quality of strategies and tactics, and thinking and cognition are important components of combat effectiveness.

Thinking and cognition affect the morale of the army. “Revolutionary ideals are higher than the sky.” The reason why our army was able to defeat the majority with the minority and the strong with the weak, and continued to move from victory to victory in the long-term revolutionary war, is very important because of the firm belief in the future of the revolution and the correct understanding of objective laws. The so-called defeat is like a mountain collapsing. In the North African battlefield of World War II, the Italian fascist army full of anti-war sentiment often surrendered without a fight and took the initiative to surrender to the US and British troops. They simply didn’t know why they were fighting and for whom they were fighting. An army that is full of doubts and even despair about its future and destiny will never have high morale and strong combat effectiveness, let alone win in the confrontation with a strong enemy. Only an army that bases its thinking and cognition on a firm and persistent revolutionary ideal and a clear understanding of the future and destiny can have the courage and strength to overcome all difficulties and hardships.

Control of cognitive power is the cornerstone of comprehensive battlefield control

Battlefield control refers to the control of the battlefield situation and its outcome by the two opposing sides in a war, including the main factors such as control of cognition, control of information, control of firepower, and control of action. As the core of war games, thinking cognition is the key to other control and the cornerstone of comprehensive control. Mastering the control of cognition means mastering the joints of battlefield control, and grasping the control of cognition means grasping the “lifeline” to victory.

Controlling cognitive power is an important destination of controlling information power. As a basic resource for the operation of information-based and intelligent warfare, an important purpose of controlling and utilizing information is to provide basic support for thinking and cognition. Only when thinking and cognition are based on sufficient information acquisition and possession can they form in-depth analysis, accurate judgment, and scientific decision-making, and promote commanders to make up their minds and organize troops to carry out operations. The reason why the popular stories such as borrowing arrows from a straw boat and the empty city plan were successful was that they took advantage of the opacity and asymmetry of battlefield information mastered by the enemy parties. In the Iraq War, the US military took advantage of its advantages in information technology to carry out a one-way transparent dimensionality reduction attack on the Iraqi army, which was still at the level of mechanized development. The Iraqi army’s command and decision-making were restricted by others due to its information disadvantages, and it soon lost the war. In a sense, modern warfare is a game of controlling cognitive power based on controlling information power. The basic logic of controlling comprehensive battlefield power and winning the war is to compete for information control power and then control cognitive control power.

The right to control cognition is the forerunner of the right to control action. Thought is the forerunner of action. Without correct thinking and cognition, there will be no correct decision-making and action. The so-called “decision before action”, this “decision” mainly refers to the fact that thinking and cognition decisions should be ahead of action and faster than the enemy. After the Zunyi Conference, Mao Zedong, with his keen perception of the enemy and our situation and scientific decision-making, commanded the Red Army to cross the Chishui River four times, cross the Jinsha River skillfully, seize the Luding Bridge, cross the snow-capped mountains, meet at Maogong, cross the grassland with difficulty, meet at Jiangtaibao… escaped the encirclement and blockade of the Kuomintang army and won the great victory of the Long March. The goal was to know the enemy first and move faster than the enemy. During the War to Resist U.S. Aggression and Aid Korea, the Volunteer Army’s highly concealed actions of marching, fighting, eating, living and hiding made the “United Nations Army” with modern reconnaissance equipment almost “blind” and “deaf”, greatly limiting its mobility and firepower advantages. The goal was to play to its strengths and avoid its weaknesses, hide the truth and show the false. Facts show that mastering the right to control cognition means mastering the initiative in action, which can fully contain the enemy, seek benefits and avoid harm, and defeat the enemy first.

The right to control cognition is a strong support for the right to control firepower. The so-called “speed is the essence of war” and “use speed to defeat the slow”, this “speed” not only refers to the rapid action of the troops, but also refers to the rapid firepower attack, and the latter is even more important than the former. In order to achieve fast action, fast response, and fast attack, we must take the initiative to detect the enemy, know the enemy, and predict the enemy. This requires thinking and cognition to be better than the enemy and faster than the enemy. During the Second World War, radar was widely used and became a weapon to expand human cognition. The Battle of Britain was the first large-scale air battle in the UK to deal with the bombing of the German Air Force. On September 15, 1940, the British Air Force intercepted more than 800 German aircraft with more than 300 fighters. With the help of radar, they took the initiative to detect enemy aircraft and occupy a favorable firing position. In the end, at the cost of losing more than 20 fighters, more than 180 German aircraft were shot down, which greatly dampened the morale of the German army and forced Nazi Germany to postpone the “Sea Lion Plan” to invade Britain indefinitely. Modern warfare has entered the “instant kill” era of discovery and destruction. Being one step faster in thinking and cognition means discovering and attacking the enemy one step faster, and the chances of defeating the enemy are greatly improved.

Strive to seize new advantages in cognitive power

Controlling cognition is an important magic weapon for winning modern wars. Adhering to the dual efforts of wisdom and technology, taking multiple measures, seizing the commanding heights of thinking and cognition, and seizing the control of combat cognition are becoming important aspects for the military of various countries to seize the initiative in war and gain combat advantages.

Deeply promote the innovation of the theory of control and cognitive power. As a new operational concept, control and cognitive power is in the initial exploration stage and has huge room for innovation and development. The army that can take the lead in the innovation of the concept of control and cognitive power, the exploration of mechanisms, the revelation of laws, the transformation and application of combat effectiveness, etc., will be able to seize the initiative in the competition for control and cognitive power. Therefore, we must truly take the innovation of the theory of control and cognitive power operations as an important support for seizing comprehensive battlefield control, seeking new advantages in our army’s cognitive operations, and thus winning modern wars, as an important part of the party’s military guidance theory innovation and the construction and application of new forces, and as an important part of building a world-class army in an all-round way. We must integrate high-quality resources and forces, increase investment, and produce more high-quality research results. Timely follow up and study typical cases of cognitive operations at home and abroad, conscientiously summarize practical experience from all aspects, combine the specific reality of our army, increase theoretical innovation, and form a theoretical system that is contemporary, leading, and unique as soon as possible.

Focus on the research and development of cognitive power technology. Science and technology are core combat power, core cognitive power, and core elements of cognitive power. The advantage of cognitive power is also mainly reflected in cognitive technology. In today’s world, military powers such as the United States and Russia attach great importance to cognitive warfare-related technologies such as artificial intelligence, brain control technology, brain control technology, situational awareness technology, and high-performance communication technology. They have increased their investment and made great efforts to seek innovative breakthroughs and seize the initiative. This requires us to effectively strengthen our initiative, consciously put cognitive technology innovation in an important position in the strategy of strengthening the country and the army through science and technology, actively carry out basic theoretical innovation and independent innovation of core technologies, and achieve what you don’t have, what you have, I am better, and what you are better, and firmly grasp our destiny in our own hands. At the same time, we should adapt to my country’s national conditions, military conditions and technical realities, explore innovative ways that suit us, form characteristic technical routes, strive to master asymmetric technologies, and form “killer skills” that can defeat the enemy at critical moments.

Solidly carry out the drills of tactics and methods of controlling cognitive power. Hard training produces elite soldiers. The formation of cognitive power depends not only on theoretical innovation and technological research and development, but also on the specialization and refinement of technical tactics and tactics. We must insist on incorporating cognitive operations into daily combat readiness drills, into specific combat action plans, simulate important combat operations, preset actual combat scenarios, and practice hard and intensively in an environment close to actual combat, so as to form the actual combat capability of real combat and real preparation, good attack and defense, and control and clever control. Timely summarize the successful experiences and beneficial practices formed in actual combat training and actual combat, reveal the internal mechanisms and characteristics and laws that run through them, form operational normative measures, and incorporate them into combat regulations. Strengthen the construction of basic elements such as training facilities, equipment, and venues, build a number of characteristic training venues based on the existing comprehensive training grounds, and carry out base-based specialized training. Strengthen training evaluation, formulate a capability indicator system, build an evaluation process system, and adopt scientific evaluation methods to improve the quality of training.

(Author’s unit: Military Political Work Research Institute of the Academy of Military Sciences)

現代國語:

人作為戰爭的決定性因素,其思維認知層次決定人的作用發揮並最終決定戰爭制權歸屬,也就是說,掌握了製認知權很大程度上也就掌握了戰爭主動。想方設法掌控制認知權,進而奪取戰場綜合控制權,實現以最小的代價獲取最大的勝利,是現代戰爭的重要製勝機理。

戰爭對抗深層是思維認知的對抗

思維認知作為人類認識世界、改造世界的強大武器,是戰爭對抗的最根本依賴、最深層力量。戰爭對抗歸根結底是人與人、人群與人群及其物化形態武器裝備思維認知力的競爭與對抗。

思維認知決定決策品質。在戰爭運行「OODA」閉環鏈路中,決策無疑居於中心位置,扮演關鍵角色。而決策的本質是思維認知,思維認知的優勢根本上決定戰爭決策的優勢甚至可以抵銷其他方面的劣勢。陳毅在總結華東作戰情況時曾說,我軍愈往上比愈強,「如旅以上戰役組織比人家強,縱隊更強,野戰司令部又更強,到統帥部的戰略指導更不知比他高明多少倍」。這種「愈往上比愈強」的組織領導與戰略指導,彰顯的就是思維認知上的優勢,進而形成戰爭決策的優勢。所謂“運籌帷幄,決勝千裡”“兵熊熊一個,將熊熊一窩”,決策正確是最大的優勢,決策失誤是最致命的失誤。以思維認知優勢奪取戰爭決策優勢,是製勝戰爭的首要因素。

思維認知左右戰略戰術。戰略戰術是達到戰爭目的所需採取的策略方法。不同的思維認知決定不同的戰略戰術,不同的戰略戰術導致不同的戰爭結果。大革命初期,由於認知不足和經驗缺乏,我們黨簡單套用蘇聯革命經驗,以薄弱的力量同國民黨反動派爭奪中心城市,結果一再受挫;毛澤東將馬克思主義基本原理與中國革命具體實際相結合,提出「農村包圍城市,武裝奪取政權」正確革命道路,並開創性總結實施遊擊戰爭戰略戰術,讓中國革命迎來曙光。 「持久戰」的策略方針,就是基於對抗日戰爭性質和中日兩國國情正確認知及對「亡國論」「速勝論」等錯誤思想的批判後得出的科學結論。事實表明,正確的戰略戰術離不開正確的思維認知,思維認知質量決定戰略戰術質量,而思維認知力是戰鬥力重要構成要素。

思維認知影響軍心士氣。 “革命理想高於天”,我軍在長期的革命戰爭中之所以能以少勝多、以弱勝強,不斷從勝利走向勝利,很重要的在於對革命前途的堅定信念和對客觀規律的正確認知。所謂兵敗如山倒,第二次世界大戰北非戰場,充滿反戰情緒的義大利法西斯軍隊經常不戰而降,主動向美英軍隊繳械投誠,根本是不知為何而戰為誰而戰。一支對前途命運和未來充滿疑惑甚至絕望的軍隊,斷不會產生高昂的士氣和強大的戰鬥力,更不可能在與強敵對抗中勝出。只有將思維認知建立在對革命理想堅定執著和對前途命運清醒認知基礎上的軍隊,才能產生戰勝一切艱難困苦的勇氣和力量。

制認知權是戰場綜合製權的基石

戰場制權是戰爭中敵對雙方對戰場態勢及其走向結果的控制權,包括制認知權、制資訊權、制火力權、制行動權等主要因素。思維認知作為戰爭賽局的內核,是其他制權的要樞、綜合製權的基石。掌握了製認知權就掌握了戰場制權的關節,抓住了製認知權就抓住了走向勝利的「命門」。

制認知權是製資訊權的重要歸宿。資訊作為資訊化智慧化戰爭運作的基本資源,其控制利用的一個重要目的在於為思維認知提供基礎支撐。思維認知只有建立在充分的資訊取得和佔有基礎之上,才能形成深入的分析、準確的研判、科學的決策,推動指揮員定下決心,組織部隊開展行動。膾炙人口的草船借箭、空城計等之所以成功,利用的就是敵對雙方對戰場資訊掌握的不透明、不對稱。伊拉克戰爭中美軍利用在資訊技術上的優勢,對還處於機械化發展水平的伊拉克軍隊實施資訊單向透明的降維打擊,伊軍指揮決策因資訊劣勢處處受制於人,很快就輸掉了戰爭。現代戰爭在某種意義上是基於制資訊權的製認知權博弈,透過爭奪資訊制權進而掌控認知制權,是掌控戰場綜合製權進而贏得戰爭的基本邏輯。

制認知權是製行動權的先導引領。思想是行動的先導。沒有正確的思維認知就沒有正確的決策行動。所謂“謀定而後動”,這個“謀”,主要是指思維認知決策要先於行動、快於敵人。遵義會議後,毛澤東以對敵我形勢的敏銳感知和科學決策,指揮紅軍四渡赤水、巧渡金沙江、飛奪瀘定橋、翻越雪山、會師懋功,艱難過草地、會師將台堡… ……跳出國民黨軍的圍追堵截,贏得長徵的偉大勝利,打的就是先敵而知、快敵而動。在抗美援朝戰爭中,志願軍走打吃住藏行動高度隱蔽,令擁有現代化偵察裝備的“聯合國軍”幾乎成了“瞎子”“聾子”,極大限制了其機動和火力優勢發揮,打的就是揚長避短、隱真示假。事實顯示,掌握了認知制權就掌握了行動主動,就能充分牽制敵軍,趨利避害、先機制敵。

制認知權是製火力權的強力支撐。所謂“兵貴神速”“以快打慢”,這個“速”不僅僅指部隊行動迅速,更指火力打擊快速,甚至後者比前者更重要。而要做到快動、快反、快打,就要先機偵敵、知敵、料敵。這就要求思維認知優於敵人、快於敵人。第二次世界大戰期間,雷達廣泛應用成為拓展人類認知的利器。英國首次成規模用於應對德國空軍轟炸的不列顛空戰。 1940年9月15日,英國空軍以300餘架戰機攔截來犯的800餘架德軍飛機,在雷達幫助下先機發現敵機,先機佔據有利開火位置,最終以損失20多架戰機的代價擊落180多架德軍飛機,極大挫傷了德軍士氣,迫使納粹德國無限期推遲入侵英國的「海獅計畫」。現代戰爭已進入發現即摧毀的「秒殺」時代,在思維認知上快人一步,就意味著發現敵人、攻擊敵人快其一步,制敵勝算就極大提升。

努力奪取制認知權新優勢

制認知權是製勝現代戰爭的重要法寶。堅持智謀和技術雙向發力、多措並舉,搶佔思維認知制高點,奪取作戰認知控制權,正成為各國軍隊搶佔戰爭主動權、贏取作戰優勢的重要面向。

深入推進制認知權理論創新。制認知權作為新作戰概念,正處於起步探索階段,具有巨大創新發展空間。哪支軍隊能夠在製認知權概念創新、機理探索、規律揭示、戰鬥力轉化運用等方面走在前面,哪支軍隊就能在製認知權爭奪上搶佔先機。所以,要切實將製認知權作戰理論創新作為奪取戰場綜合製權、謀求我軍認知作戰新優勢進而製勝現代戰爭的重要支撐,作為黨的軍事指導理論創新和新質力量建設與運用的重要內容,作為全面建成世界一流軍隊的重要組成部分,整合優質資源力量,加大投入力度,多出高質量研究成果。及時跟進研究國內外認知作戰典型戰例,認真總結各方面實踐經驗,結合我軍具體實際,加大理論創新力度,儘早形成具有時代性、引領性、獨特性的理論體系。

突顯抓好制認知權技術研發。科學技術是核心戰鬥力,也是核心認知力,更是製認知權的核心要素。制認知權的優勢也主要體現在認知技術上。當今世界,美俄等軍事強國對諸如人工智慧、腦控技術、控腦技術、態勢感知技術、高性能通聯技術等與認知戰相關的技術都高度重視,紛紛加大投入力度,下大力謀求創新突破,努力搶佔先機。這就要求我們切實強化主動意識,自覺把認知技術創新放在科技強國強軍戰略的重要位置,積極搞好基礎理論創新和核心技術自主創新,做到你無我有、你有我優、你優我精,把命運牢牢掌握在自己手中。同時,適應我國國情和技術實際,探索適合自己的創新路子,形成特色技術路線,努力掌握非對稱技術,形成關鍵時刻能夠克敵制勝的「必殺技」。

札實開展制認知權戰法演練。苦練出精兵。制認知權的形成,既靠理論創新和技術研發,也靠技戰術和戰法的專攻精練。要堅持將認知作戰納入日常戰備演練,納入具體作戰行動計劃,模擬重要作戰行動,預設實戰場景,在近似實戰的環境中苦練精訓,形成真打實備、能攻善守、能控巧製的實戰能力。及時總結實戰化演訓和實戰中形成的成功經驗和有益做法,揭示貫穿其中的內在機理和特點規律,形成操作性規範措施,納入作戰條令條例。加強訓練設施、器材、場地等基本要素建設,依托現有綜合訓練場打造若干特色訓練場所,開展基地化專業化訓練。加強訓練評估,制定能力指標體系,建構評估流程體系,採用科學評估方法,提升訓練品質水準。

(作者單位:軍事科學院軍隊政治工作研究院)

延伸閱讀:

《元宇宙:未來認知戰的新高地》

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/4909888.html

Chinese Military Analysis of Winning Mechanisms of Modern Warfare and Emerging Combat Concepts

中國軍事對現代戰爭制勝機制與新興作戰概念的分析

現代英語翻譯:

he winning mechanism of war refers to the winning rules, paths, methods and means of war. Driven by scientific and technological progress, changes in weapons and equipment, changes in the purpose of war and other factors, the winning mechanism of modern war has also changed accordingly. President Xi Jinping pointed out profoundly: “Modern warfare has indeed undergone profound changes. These changes may seem dazzling, but there are rules behind them. The fundamental thing is that the winning mechanism of war has changed.” Today, the world’s military powers, led by the United States, are stepping up research on operational concept design. In-depth analysis of the connotation and characteristics of emerging operational concepts, excavation of their internal logic, and identification of the winning mechanism of modern warfare are of great significance for seizing the opportunities of new military changes in the world and winning future wars.

Using cognitive warfare to create cognitive leadership advantages

Cognitive warfare focuses on confrontation at the level of consciousness and thinking. By transmitting selectively processed information, it influences decision-making, changes values, and competes for people’s support, thereby guiding the war situation to develop in a direction that is beneficial to oneself and not to the enemy. Cognitive warfare is an offensive and defensive operation launched by both sides in the cognitive field. The core of the confrontation is the struggle for dominance in the ideological field. The focus is on strengthening cognitive attacks while taking into account cognitive defense.

Dominance in the ideological field is the core of cognitive warfare. First, it is to guide political cognition. Ideology determines the rational foundation of cognition. The struggle for dominance in the ideological field has become the core of the cognitive confrontation between the enemy and us, with the focus on shaping political beliefs, war attitudes and values ​​that are beneficial to oneself. Political cognitive guidance aims to portray the legitimacy of political parties, the rationality of governing ideas, and the health of the political ecology, to consolidate or destroy political consensus, to strengthen or shake political beliefs, to expand or disintegrate political camps, to cultivate recognition or negation of political positions, beliefs, and ideas, and to lay a political cognitive layout that is beneficial to oneself and unfavorable to the enemy.

The second is to guide value cognition. The guidance of war cognition aims to shape the nature, character, and legal basis of war, guide all parties to make value judgments on the justice and legitimacy of war, influence the direction of public opinion on supporting or opposing war, and regulate the strength of people’s willingness to assume war obligations. The guidance of value cognition aims to launch a fierce competition around the judgment and orientation of value concepts, and seek general emotional recognition in society by spreading ethics, morality, right and wrong, good and evil, and the beauty and ugliness of human nature.

War cognitive guidance aims to shape

The nature, character, and legal basis of war

The focus of cognitive warfare is to force cognition and win the hearts and minds of the people. Cognitive attack is the focus of cognitive warfare. Focusing on the content and methods of the attack, taking targeted attacks is of great significance for shaping the enemy’s wrong cognition and forming a situation that is beneficial to us. From the perspective of content, coercive cognition should focus on the psychological activities of social groups. By shaping cognitive differences, we seek to create antagonistic psychology between different nationalities, races, regions, classes, and groups, accumulate dissatisfaction with the regime from all walks of life, undermine the unity and stability within the country, and induce social unrest and division. From the perspective of methods, we should focus on “wartime” psychological attacks on the basis of “peacetime” cognitive coercion.

The targets of cognitive attacks during wartime include not only the forces participating in the war, but also the forces supporting the war. For the forces participating in the war, we should target the commanders at all levels of the enemy, and weaken their will to resist and interfere with their command decisions through cognitive manipulation, information deception, inducements and persuasion to surrender, so as to achieve the goal of disintegrating the enemy army; for the forces supporting the war, we should widely use radio, broadcasting, new media and other media to publicize major battle results, the enemy’s defeat and escape, tragic battlefield scenes and other content, so as to induce panic and war-weariness among the people and weaken the enemy’s war potential.

Building a strong defense line, gathering hearts and controlling the situation are the foundations of cognitive warfare. The focus of cognitive warfare is attack, while the foundation is defense. While strengthening cognitive attacks on the enemy, we should also focus on cognitive defense. The focus of cognitive defense is to build a strong defense line and stabilize the overall situation. For the participating forces, we should focus on giving full play to the advantages of political work, carry out extensive political mobilization, inspire the spirit of bravery and fearlessness, bravely killing the enemy, and the will to defend the country and sacrifice their lives, actively carry out meritorious service and set up typical examples to boost military morale; for social support forces, we should widely publicize the justice and legitimacy of the war, continuously strengthen patriotism education, inspire the sense of responsibility and sense of crisis of the whole people, and gather hearts and souls.

In addition, we should take positive and effective actions to maximize the support of the international community. Although the support of the international community is mainly obtained through political and diplomatic activities, actively carrying out humanitarian assistance and widely disseminating our own positions, attitudes and values ​​can often promote the change of the attitude of the international community and create favorable conditions for winning the broadest support from the international community.

Establishing strategic initiative advantage through hybrid warfare

Hybrid warfare is a war that uses a variety of means such as politics, economy, diplomacy, science and technology, culture, and military, and combines cyber warfare, public opinion warfare, economic warfare, scientific and technological warfare, and covert conventional military operations to disrupt the situation, destroy the opponent’s war potential, and ultimately achieve strategic goals. In the competition between the strong and the weak, the effective use of hybrid warfare can not only shape a favorable strategic situation and hedge against the strategic competition of major powers, but also achieve the excellent effect of defeating the enemy without fighting and establish a strategic initiative advantage.

Hybrid warfare is the comprehensive use of diverse means

Defeat the weak with the strong, and win without fighting . War is a large-scale and fierce military struggle between countries or political groups using armed forces to achieve certain political goals. This traditional war style uses military hard power competition as the main means of struggle. Although it can quickly and intuitively achieve strategic goals, it is very likely to lead to a passive situation of “hurting the enemy by 1,000 and losing 800 of our own”, and it is easy to attract international condemnation and comprehensive sanctions. Especially in the competition between the strong and the weak, the strong side has an absolute advantage, which is not only reflected in the military field, but also in many fields such as politics, economy, diplomacy, science and technology, and culture. Therefore, unconventional hybrid warfare supported by military strength shows more and more flexible and diverse possibilities of use. Making good use of hybrid warfare means that on the basis of mastering our own advantages and the enemy’s disadvantages, we give priority to non-military means such as politics, diplomacy, economy, and public opinion that can play to our strengths and avoid weaknesses, and use our own strengths to attack the enemy’s weaknesses, pursuing “less fighting” or “no fighting” to win.

Use the strong to counter the strong, and hedge against the competition among major powers. The world today is in a period of great development and great change, and the relations between major powers have entered a new stage of all-round struggle. In order to maintain its unilateral hegemonic status, some military powers have stepped up efforts to win over and divide, deliberately provoked disputes, and continuously used hybrid warfare to contain and suppress competitors, exacerbating the tension of competition among major powers. In the confrontation between the strong and the strong, if you want to avoid being at a disadvantage, you must pick up the weapon of hybrid warfare and give the enemy a taste of its own medicine. We must actively establish the concept of hybrid warfare thinking, understand the characteristics and laws of the enemy’s hybrid warfare, and flexibly use hybrid warfare strategies on the basis of comparing and mastering the advantages and disadvantages of the enemy and ourselves, and properly strengthen strategic prevention and response on the basis of ensuring equal countermeasures, so as to change the passive and unfavorable situation, seek strategic balance, and strive for strategic victory.

Use the weak to defeat the strong and create a favorable situation. The strong wins and the weak loses is a basic rule. If the weak side wants to take the initiative or reverse the decline, it must not fight the strong with the weak or fight against the stone with the egg. Actively adopting a hybrid warfare strategy is an excellent choice. Especially in the context of the accelerated evolution of the global integration process, the links between countries are closer, involving political, economic, social, cultural, military and many other fields. The exchanges are becoming closer, which also provides important practical support for the use of hybrid warfare. Although the weak side is in a disadvantaged position in overall strength, it can rely on its strengths in certain areas and insist on “you fight yours, I fight mine”, and plan and layout with flexible and proactive struggle strategies to trap and disturb the enemy, so that the enemy cannot play all its advantages, so as to change the situation of the comparison of strong and weak forces, strive for strategic balance, or strive for a strategic opportunity window for national security development and create favorable conditions.

Gaining system advantage through joint all-domain warfare

Since the US Army proposed multi-domain warfare (MDB) in 2016, the US military has successively proposed a number of joint combat concepts, from multi-domain operations (MDO), to all-domain operations (ADO), and then to joint all-domain operations (JADO). The essence of the concept of joint all-domain operations is the deep joint operations of multiple services, with the aim of achieving multi-domain coordination and cross-domain integration in all fields such as land, sea, air, space, network, and electricity, and winning modern wars with system advantages.

Joint All-Domain Command and Control (JADC2) is

An important supporting concept of the Joint Global Domain Operations concept

Cross-domain coordination is the cornerstone of victory in joint all-domain warfare. Unlike traditional joint operations that pursue the coordination between various services, joint all-domain operations pursue the coordination between various combat domains. Through multi-domain coordination and cross-domain coordination, we seek overall advantages over the enemy and achieve system victory. It is mainly manifested in the following two points: On the one hand, it is asymmetric checks and balances. Emphasis on asymmetric operations, avoid “tit-for-tat” head-on confrontation with opponents of equal strength in traditional combat fields, emphasize strengths and avoid weaknesses, give play to advantages in key fields such as network, electromagnetic and space, make good use of advantages in new fields such as artificial intelligence and biosecurity, and use advantages in key and critical fields to support joint operations to win. On the other hand, it is system checks and balances. The key to achieving cross-domain coordinated operations is to deeply integrate the space, network, and electromagnetic fields with traditional land, sea and air battlefields through joint all-domain command and control, ensure that joint task forces can efficiently use various combat capabilities in the six major combat domains of land, sea, air, space, network and electricity, replace “capability superposition” with “capability integration”, target the enemy’s shortcomings, and integrate the system to produce an overall effect that is better than the sum of its parts.

Prioritized decision-making is the magic weapon for defeating the enemy in joint all-domain warfare. The key to defeating the enemy in joint all-domain warfare is to ensure the advantage of one’s own decision-making and prioritize decision-making. The first is to gain information advantage. Joint all-domain command and control can integrate intelligence information from various domains, form a comprehensive and detailed battlefield situation map through correlation analysis and fusion integration, support commanders’ comprehensive situation awareness, and achieve information advantage.

The second is to establish decision-making advantages. Based on comprehensive and detailed battlefield situation information, with the support of intelligent decision-making assistance, commanders can make scientific and rapid decisions, form plans, and give priority to implementing efficient actions. Different from the traditional OODA theory of “achieving combat advantages by accelerating the OODA cycle”, the joint global command and control is committed to establishing a more efficient “DA cycle”, that is, by establishing an adaptive feedback process between decision-making (D link) and action (A link), determining actions based on decisions, and in turn adjusting decisions in a timely manner based on feedback from action results, and constantly accelerating this cycle, ensuring that while improving their own decision-making efficiency, the enemy is put into a “decision-making dilemma” to achieve the purpose of disturbing and defeating the enemy, thereby establishing decision-making advantages.

Finally, the use of advanced intelligent algorithms strengthens this advantage. Data processing algorithms make situational awareness and intelligence analysis more insightful, intelligent game algorithms make combat planning and auxiliary decision-making more creative, and autonomous control algorithms make force organization and task implementation more executable. It can be said that advanced intelligent algorithms are deeply integrated into all links of the kill chain of observation, judgment, decision-making, attack and evaluation, making the decision-making advantage of joint global operations further highlighted.

Agile command and control is an important support for joint global warfare. Joint global command and control is an important support for joint global operations to achieve agile and efficient command and control. Traditional command and control methods are difficult to achieve cross-domain integration of battlefield perception data, difficult to meet the requirements of cross-service integrated command and control, and difficult to cope with the complexity and timeliness of future operations. Joint global command and control aims to connect all sensors and shooters in real time, ensure seamless communication within the land, sea, air, space, electricity, and network combat domains, within each service, between services, and between allies, coordinate military operations, and strive to build a “network of networks” that supports unmanned intelligent operations.

On the one hand, cross-domain integrated command and control is realized. Joint global command and control focuses on realizing end-to-end information conversion and communication across services, evolving from a linear, static, chimney-style kill chain to a global interconnected kill network. Each service can flexibly call on sensors and strike platforms that are not built by itself, greatly enriching the reconnaissance means and strike options of a single service, while reducing target selection errors and significantly accelerating the OODA loop.

On the other hand, it can make decisions and take actions faster than the opponent. Joint global command and control greatly improves the perception and judgment capabilities in the OODA link through global multi-dimensional intelligence collection and efficient autonomous situation fusion. At the same time, it adopts a mesh communication structure with multi-path synchronous transmission to replace the traditional highly centralized communication nodes, optimize information distribution and sharing, speed up the effective information flow rate, make decisions and take actions before the enemy, and achieve the goal of defeating the enemy with speed.

原創現代國語:

战争制胜机理,是指战争的制胜规律、路径以及方式方法。受到科技进步的推动、武器装备的变革、战争目的的变化等因素的制约,现代战争制胜机理也随之发生变化。习主席深刻指出:“现代战争确实发生了深刻变化。这些变化看上去眼花缭乱,但背后是有规律可循的,根本的是战争的制胜机理变了。”今天,以美国为首的世界军事强国都在加紧作战概念设计研究。深入分析新兴作战概念内涵特点,挖掘其内在逻辑,找准现代战争制胜机理,对于把握世界新军事变革机遇,打赢未来战争,意义重大。

以认知战塑造认知先导优势

认知战聚焦意识思维层面的对抗,通过传递选择性加工后的信息,影响决策判断、改变价值观念、争夺人心向背,进而引导战争态势向利于己而不利于敌的方向发展。认知战是敌我双方在认知领域展开的攻防作战,对抗的核心是意识形态领域主导权的争夺,重点是加强认知攻击,同时兼顾认知防御。

主导意识形态领域是认知战的核心。一是引导政治认知。意识形态决定了认知的理性根基。围绕意识形态领域主导权的争夺成为敌我认知对抗的核心,重点是塑造有利于已的政治信念、战争态度和价值观念。政治认知引导旨在对政党合法性、执政理念合理性、政治生态健康性等内容的刻画,凝聚或破坏政治共识、坚定或动摇政治信念、拓展或瓦解政治阵营,培植对政治立场、信仰、理念等的认同或否定情感,铺设利己、不利于敌的政治认知布局。

二是引导价值认知。战争认知引导旨在塑造战争本质、性质、法理依据等内容,引导各方对战争正义性、合法性的价值评判,影响助战或反战舆论走向,调控民众承担战争义务意愿的强弱。价值认知引导旨在围绕价值观念评判与取向展开激烈争夺,通过传播伦理道德、是非善恶、人性美丑等内容,谋求社会普遍情感认同。

战争认知引导旨在塑造

战争本质、性质、法理依据等

迫诱认知攻心夺志是认知战的重点。认知攻击是认知战的重点,围绕攻击内容和方法,采取有重点的进攻,对于塑造敌方错误认知,形成有利于我之态势,意义重大。从内容上看,迫诱认知应重点围绕社会群类心理开展造势活动。通过塑造认知差异谋求不同民族、不同种族、不同地域、不同阶层、不同群体之间的对立心理,积累社会各界对政权当局的不满情绪,破坏国家内部的团结稳定,诱发社会动荡分裂。从方法上看,应在“平时”认知迫诱的基础上,聚焦“战时”攻心夺志。

战时认知攻击的对象不仅包括参战力量,还包括战争支持力量。针对参战力量,应靶向瞄准敌各级指挥员,通过认知操控、信息欺骗、利诱劝降等方式,削弱其抵抗意志,干扰其指挥决策,达成瓦解敌军目的;针对战争支持力量,应广泛运用电台、广播、新媒体等媒介,宣传重大战果、敌方溃败逃散、惨烈战场画面等内容,诱发民众恐慌厌战情绪,削弱敌战争潜力。

筑牢防线凝心控局是认知战的根基。认知战的重点是攻,而基础是守。在加强对敌方认知攻击的同时,还应重点做好认知防御。认知防御的重点是筑牢防线、稳控大局。针对参战力量,应注重发挥政治工作优势,广泛开展政治动员,激发官兵英勇无畏、奋勇杀敌的精神传承和保家卫国、舍身忘死的意志品质,积极开展立功受奖树立典型榜样,鼓舞军心士气;针对社会支撑力量,应广泛宣传战争正义性、合法性,不断强化爱国主义教育,激发全民责任意识和忧患意识,凝心聚魂。

此外,还应采取积极有效的行动,最大限度争取国际社会的支持。国际社会的支持,虽然主要依靠政治、外交活动争取,但积极开展人道主义救援,广泛传播己方立场态度与价值理念,往往能够推动国际社会态度的转变,为争取最广泛的国际社会支持创造有利条件。

以混合战确立战略主动优势

混合战争是综合运用政治、经济、外交、科技、文化、军事等多样化手段,将网络战、舆论战、经济战、科技战以及隐蔽的常规军事行动结合起来,搅局乱局,破坏对手战争潜力,以最终达成战略目的的战争。在强弱对抗竞争中,有效运用混合战争,不仅可以塑造有利战略态势,对冲大国战略竞争,而且能够达成不战而屈人之兵的绝佳效果,确立战略主动优势。

混合战争是多样化手段的综合运用

以强胜弱,不战屈人之兵。战争,是国家或者政治集团之间为了达成一定的政治目的,使用武装力量进行的大规模激烈交战的军事斗争。这种传统战争样式以军事硬实力比拼作为主要斗争手段,虽然能够快捷直观地达成战略目的,但极有可能出现“伤敌一千自损八百”的被动局面,且容易招致国际舆论谴责和全面制裁。特别是在强弱对抗竞争中,强者一方本就占据绝对优势,这不仅体现在军事领域,而且体现在政治、经济、外交、科技、文化等诸多领域。因此,以军事实力为支撑的非常规混合战争展现出愈发灵活多样的运用可能性。善用混合战争,就是在掌握我之优势、敌之劣势的基础上,优先选用政治、外交、经济、舆论等能够扬长避短的非军事手段,以已之长攻敌之短,追求“少战”或“不战”而屈人之兵。

以强对强,对冲大国竞争。当今世界正处于大发展大变革时期,大国关系进入全方位角力新阶段,有的军事强国为维护其单级霸权地位,加紧拉拢分化,蓄意挑起争端,并不断运用混合战争手段遏制打压竞争对手,加剧大国竞争紧张局势。在强与强的力量对抗中,要想不落下风,就必须拿起混合战争这个利器,以彼之道还施彼身。要积极确立混合战争思维理念,摸清搞透敌混合战争特点规律,在对比掌握敌我底数优长的基础上,灵活运用混合战争策略,以我之优势对敌之劣势,在确保对等反制的基础上,妥善加强战略防范与应对,以此改变被动不利局面,谋求战略均势,争取战略胜势。

以弱胜强,塑造有利态势。强胜弱败是基本法则。弱势一方要想占据主动或是扭转颓势,断然不能以弱碰硬、以卵击石,积极采取混合战争策略不失为一种绝佳选择。尤其是在全球一体化进程加速演进背景下,各国之间的联系更加紧密,涉及政治、经济、社会、文化、军事等诸多领域间的往来愈发密切,这也为混合战争运用提供了重要现实支撑。弱势一方虽然总体实力处于劣势地位,但可凭借某些领域的优长,坚持“你打你的,我打我的”,以灵活主动的斗争策略谋篇布局,困敌、扰敌,使敌无法发挥全部优势,以此改变强弱力量对比态势,努力争取战略均势,或是为国家安全发展争取战略机遇窗口期,创造有利条件。

以联合全域战赢得体系优势

自2016年美陆军提出多域战(MDB)以来,美军先后提出多个联合作战概念,从多域作战(MDO),到全域作战(ADO),再到联合全域作战(JADO),美军作战概念如雨后春笋般相继涌现。联合全域作战概念的本质是多军种深度联合作战,目的是实现陆、海、空、天、网、电等全领域的多域协同与跨域融合,以体系优势制胜现代战争。

联合全域指挥控制(JADC2)是

联合全域作战概念的重要支撑概念

跨域协同是联合全域战的制胜基石。与传统联合作战追求各军种之间的联合不同,联合全域作战追求的是各作战域之间的联合,通过多域联合、跨域协同,谋求整体对敌优势,实现体系制胜。主要表现为以下两点:一方面是非对称制衡。强调非对称作战,避免与实力相当的对手在传统作战领域展开“针尖对麦芒”的以硬碰硬,强调扬长避短,发挥网络、电磁和太空等关键领域优势,善用人工智能、生物安全等新型领域优势,以关键要害领域优势,支撑联合作战获得胜利。另一方面是体系制衡。实现跨域协同作战的关键是通过联合全域指挥控制将太空、网络、电磁领域与传统陆海空战场进行深度融合,确保联合任务部队在陆、海、空、天、网、电六大作战域内高效运用各种作战能力,以“能力集成”取代“能力叠加”,瞄准敌方短板弱项,体系融合发力,产生优于各部分总和的整体效果。

优先决策是联合全域战的克敌法宝。联合全域作战克敌的关键是确保己方决策优势,优先决策。首先是赢得信息优势。联合全域指挥控制能够融合来自各域的情报信息,通过关联分析、融合集成形成全面详实的战场态势图,支撑指挥员全面态势感知,实现信息优势。

其次是确立决策优势。指挥员基于全面详实的战场态势信息,在智能化辅助决策支持下,科学快速定下决心,形成方案计划,并优先落实高效行动。不同于“通过加快OODA循环以达成作战优势”的传统OODA理论,联合全域指挥控制致力于建立更为高效的“DA循环”,即通过在决策(D环节)和行动(A环节)之间建立自适应的反馈过程,依据决策确定行动,反过来根据行动结果反馈及时调整决策,并不断加速这一循环,确保在提高自身决策效率的同时,使敌陷入“决策困境”,达到扰敌、制敌目的,以此确立决策优势。

最后,先进智能算法的运用强化了这一优势。数据处理算法让态势感知和情报分析更有洞察力,智能博弈算法让作战筹划和辅助决策更有创造力,自主控制算法让兵力编组和任务实施更有执行力。可以说,先进智能算法深度融入观察、判断、决策、打击和评估杀伤链的各个环节,使得联合全域作战决策优势进一步凸显。

敏捷指控是联合全域战的重要支撑。联合全域指挥控制是联合全域作战实现敏捷高效指挥控制的重要支撑。传统的指控手段难以实现战场感知数据的跨域集成,难以满足跨军种一体化指挥控制要求,也难以应对未来作战的复杂性和时效性。而联合全域指挥控制旨在将所有传感器与射手实时地连接起来,确保在陆、海、空、天、电、网各作战域内,各军种内部、各军种间以及盟友之间,实现无缝通信,协调一致开展军事行动,努力构建支撑无人化智能化作战的“网络之网络”。

一方面,实现跨域一体化指挥控制。联合全域指挥控制聚焦实现跨军种的端到端信息转换与通信,从线性、静态、烟囱式的杀伤链向全域互联的杀伤网演进,各军种能够灵活调用非自身建制的传感器和打击平台,极大丰富了单一军种的侦察手段和打击选项,在降低目标选取失误的同时,显著加快OODA环。

另一方面,比对手更快完成决策和行动。联合全域指挥控制通过全域多维情报收集、高效自主态势融合,极大提升OODA链路中的感知和判断能力。同时,采用多路径同步传输的网状通信结构取代传统高度集中的通信节点,优化信息分发共享,加快有效信息流转速率,先敌决策,先敌行动,实现以快制敌。

版权声明:本文刊于2024年 4 期《军事文摘》杂志,作者:陈志华,如需转载请务必注明“转自《军事文摘》”。 

中國軍事資料來源:https//www.81it.com/2024/0710/15888.html

Chinese Military Research of System-based Superior Warfare:How to fight system-based warfare in informationized warfare using Nine Typical Combat Styles

中國軍事基於系統的優勢戰爭研究:
資訊化戰爭中如何打好體系戰“九種典型戰法”

現代英語翻譯:

System-based superior warfare is a system-based warfare in information warfare. It is not limited to a specific combat style, but a “combination punch” or a group of combat styles composed of multiple combat styles and tactics . It emphasizes that according to the changes in combat missions, combat opponents and battlefield situations, as long as it is conducive to forming relative advantages and achieving system victory, any appropriate combat means and styles can be flexibly used to form combat advantages. In the specific implementation of system-based superior warfare, these specific combat styles and operational tactics can be organized and implemented separately as part of joint full-domain operations, and more emphasis is placed on playing a “combination punch”, taking multiple measures simultaneously, and winning as a whole. In order to better understand its core connotation, this article lists nine typical combat styles, including overall deterrence warfare, electromagnetic interference warfare, network attack warfare, cognitive control and interference warfare, and analyzes them .

       Systematic Aggregation Warfare – Flexible Use of Multiple Combat Styles “Combination Punch”


       The main content and keywords of this article
1. Overall deterrence warfare: Emphasis on multi-domain joint deterrence; Three major elements should be possessed to implement overall deterrence warfare ; Strong overall strength is the core of achieving effective deterrence
2. Electromagnetic interference warfare : The key to competing for information advantage; In terms of combined means and methods, information empowerment is achieved through “connection + sharing” ; Effective tactics to crack unmanned cluster warfare
       3. Network attack warfare: Mainly soft killing, combining soft and hard, focusing on breaking the network and reducing energy
       4. Cognitive control and interference warfare: Control situational awareness and cognitive rights, compete for information advantages; control command and decision-making rights, compete for decision-making advantages; control “brain” rights, and seize brain control advantages
       5. Agile mobile warfare: High-efficiency and rapid decision-making; high Efficiency forms a favorable combat situation; high efficiency and instant aggregation of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
       6. Swarm autonomous warfare: conducive to forming system advantages to suppress the enemy; conducive to enhancing combat effectiveness; conducive to trapping the enemy in combat difficulties
       7. Precision point killing warfare: achieving high cost-effectiveness in combat; hitting key node targets is an important option; large-scale system support is a basic condition; inseparable from accurate intelligence support
       8. Supply chain disruption warfare: the supply guarantee chain has a huge impact on the overall combat situation; the focus of attack is the key node of the enemy’s supply guarantee chain; the focus is on choosing the right time to use tactics
       9. System destruction and paralysis warfare: the combat goal is to cause the enemy’s combat system to run out of order; heavy punches hit the key nodes of the combat system; soft strikes on the enemy’s combat system

The combat concept is first proposed as a new combat style. Innovative combat style is the core content of combat concept development. It can be said that system aggregation and optimization warfare is a general term for a series of specific tactics. The following nine typical combat styles constitute the combat method system of system aggregation and optimization warfare. They are: 

First, overall deterrence warfare, actively organizing static power demonstrations and deterrence actions in the system-based superiority warfare, striving to win the battle without fighting or with a small battle; 

Second, electromagnetic interference warfare, using a variety of combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for electromagnetic spectrum advantages, seize information control, and thus win the initiative in combat; 

Third, network attack warfare, using a variety of means such as soft strikes and hard destruction to break the enemy’s command network, intelligence network, communication network, and logistics supply network, and disrupt the enemy’s command and support; 

Fourth, cognitive control and interference warfare. Through information attacks, public opinion attacks, and brain attacks, control advantages are formed in cognitive space; 

Fifth, agile mobile warfare. Rapidly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; 

Sixth, swarm autonomous warfare. Widely use unmanned combat means such as “swarms”, “wolf packs”, and “fish schools” to autonomously organize actions and distributed attacks to achieve human-machine joint victory; 

seventh, precision point killing warfare. Accurately obtain intelligence, implement multi-domain precision strikes, strive to hit one point to shake the overall situation, and maximize combat effectiveness; 

Eighth, supply chain disruption warfare. Organize elite forces to attack the enemy’s logistics and equipment supply chain, supply lines and supply bases, and destroy the enemy’s loss of supply and withdrawal from the battle; 

Ninth, system destruction and paralysis warfare. Comprehensively adopt a variety of means such as breaking the network, training, and hitting nodes to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system.


       1. Overall deterrence warfare
       Overall deterrence warfare refers to actively organizing static power demonstrations and deterrence actions in system-based superior warfare, striving to defeat the enemy without fighting or fighting a small battle. Sun Tzu said: “To defeat the enemy without fighting is the best of the best.” Deterrence and war are the two main forms of military activities. Deterrence is mainly to show determination and will to potential opponents by showing strength or threatening to use strong strength to deter the opponent’s actions. It can be said that overall deterrence warfare in system-based superior warfare is an important means or method of achieving “stopping” the enemy’s troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first of all, strong in general, and then strong in key parts. Modern warfare is a confrontation between systems. The overall deterrence war under the informationized local war requires not only the traditional deterrence means and capabilities of land, sea, air and space, but also new deterrence means and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence, and more importantly, the overall deterrence that demonstrates the overall strength of the country. In particular, with the rapid development of advanced technologies such as information technology, the scientific and technological revolution, industrial revolution, and military revolution are accelerating their integration, and the coupling relationship between strategic competitiveness, social productivity, and military combat effectiveness is closer. Winning the informationized war is more of a contest of national will and national overall strength. If we want to contain war, we must first deter our opponents from the perspective of overall strength.
       1.1 Emphasize multi-domain joint deterrence
       Deterrence means usually include nuclear deterrence and conventional deterrence. In the system-based superiority war, the overall deterrence war is implemented, aiming to comprehensively use the conventional deterrence means of the land, sea, air, space, and power grid in the whole domain to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, network, and electromagnetic weapons have become new deterrent means .It mainly uses rapid response electromagnetic orbital weapons, space-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, high-power microwave weapons and other equipment to threaten and attack the opponent’s space targets, forming a “interference and blocking” deterrence against the enemy’s space information. Cyber ​​deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other key information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communication and other informationized weapon equipment systems to achieve deafening and blinding deterrence against the enemy. 1.2 Three elements should be possessed to implement overall deterrence warfare.

To implement overall deterrence warfare and achieve the expected deterrence effect, three elements must usually be possessed: one is strength. The deterrent party must have reliable capabilities or strength that make the opponent feel daunted and fearful; the second is determination and will. The deterrent party must dare to use this capability when necessary; the third is clear information transmission. The deterrent party must accurately and effectively let the other party know its action capabilities and determination.


       Historically, the criteria for judging deterrence strength have changed in three aspects: first, active military strength; second, comprehensive national strength or war potential; and third, the total number of main combat weapons and equipment. For a long period of history, the number of troops was deterrence, and the strength of military strength was directly determined by non-material factors such as the size of the active army, the number of important weapons and equipment, and the morale of the army’s training organization. After the 20th century, with the expansion of the scale of war, deterrence strength is no longer limited to the number of troops and important weapons and equipment, but is determined by the country’s war potential, including economic strength, scientific and technological strength, energy resources, and even population size. 

The overall deterrence war in the system-based superiority war, the formation of its deterrence strength is mainly based on the network information system and the joint full-domain deterrence capability formed under the integration of the system.


       1.3 Strong overall strength is the core of achieving effective deterrence
       The development of information technology and its extensive penetration and application in the military field have provided favorable conditions for building overall strength and achieving overall deterrence. System-based superior warfare is supported by a network information system and fully utilizes the penetration and connectivity of information technology. It not only integrates various combat forces, combat elements, and combat units into an organic whole to achieve a military system combat advantage, but also connects and integrates various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, energy, etc., into the national war mobilization system, gathers forces and resources from all aspects to form an overall synergy, realizes the emergence effect of system capabilities, and displays the overall strength advantage as a whole, forming a powerful invisible deterrent of unity and common hatred of the enemy, and shaping a situation in which the enemy “has the power but cannot act” and “can act but has no effect”, playing a role in containing and winning the war.
       In the overall deterrence war, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; the mobilization time will be faster, and the mobilization and action information can be quickly transmitted to everyone and every node at the first time by using the network and information system; the action coordination and collaboration will be more consistent, and the forces distributed in various regions can act in a unified manner almost at the same time based on the same situation and the same order, greatly improving the efficiency of action coordination; the resource utilization will be more sufficient, and various war resources based on the network can quickly realize the transition from peace to war and from military to civilian, and realize the integrated and precise guarantee of the front and rear.
       2. Electromagnetic interference warfare
       Electromagnetic interference warfare refers to the flexible use of various combat means and action styles such as electronic reconnaissance, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantage of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat.
       2.1 The key to competing for information advantage Informatization local wars are highly dependent on the electromagnetic spectrum, and the control and counter-control of electromagnetic space have become the focus of competing for the right to control information. Organizing and implementing electromagnetic interference warfare is mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. Using electromagnetic means to disrupt and destroy the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information warfare capability, and enable the friendly side to ensure the rapid and effective flow of information in the scenario of having information control, and drive the command flow, action flow, material flow, and energy flow through the information flow, thereby gaining the leading power and initiative in combat.
       2.2 The basic focus is to disable and invalidate the enemy’s combat system. The implementation of electromagnetic interference warfare in the system-based superiority war is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure the effective use of electromagnetic space by the friendly side, various electronic reconnaissance, interference, attack, defense and support forces are organized to interfere with and attack the enemy’s communication network, radar network, computer network and command center, communication hub, radar station, computer network node, global navigation positioning system, space-ground integrated Internet and other space link systems, and other various frequency-using weapons and equipment, block and destroy their communication and data transmission, and destroy the “connection” and “sharing” structural center of gravity of the enemy’s combat system, so as to provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities and disabling and invalidating the enemy’s entire combat system.
       2.3 Effective tactics to crack unmanned swarm warfare
     Unmanned autonomous swarm warfare such as “bee swarm”, “wolf pack” and “fish pack” is an important feature of information-based local wars with intelligent characteristics. Various unmanned autonomous swarms are huge in number, diverse in type and complex in characteristics, and each individual can complement each other and play a role in substitution. It will be very difficult to intercept and damage the entire unmanned swarm. However, from a technical perspective, in order to achieve effective coordination in unmanned combat swarms, each individual must share and interact with each other. Once the communication coordination between unmanned swarms is interfered with, it will be impossible to share battlefield situation and information, and it will be difficult to coordinate actions with each other, and it will be difficult to play its due combat effectiveness. This provides an opportunity for the other party to intercept communications and conduct electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attack on the information and communication network of unmanned swarms, and destruction of their information sharing and interaction will make it impossible for each individual in the unmanned swarm to achieve effective coordination, thereby losing combat capability.
       3. Network attack warfare
       Network attack warfare refers to the comprehensive use of network and computer technologies and other effective means to conduct military confrontation actions around the control of information and information networks. It is a major combat style for cyberspace operations and the struggle for network control. Its main combat operations include both soft kill and hard destruction, with soft as the main and a combination of soft and hard. Among them, soft kill is mainly network attack, that is, the comprehensive use of blocking attacks, virus attacks and other means to block and attack the enemy’s information network, command system, weapon platform, etc., making it difficult for the enemy’s network, command information system, etc. to operate effectively or even paralyzed; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses and anti-radiation attacks to paralyze the enemy’s information network physical facilities and destroy the enemy’s combat and weapon equipment entities. The
       focus is on breaking the network and reducing the power. Organizing a network attack war in the system concentration war is to target the weaknesses of the opponent’s military information network, take advantage of the system, organize various network attack forces, and continuously implement soft kill and hard destruction operations on the enemy’s combat command network, reconnaissance intelligence network, communication network and even logistics supply network throughout the combat process, destroy the enemy’s network system, and make the overall function of the enemy’s combat system decline or even become disabled. Mainly against the enemy’s basic information network, intelligence network, command network, support network and other core targets, implement a series of combat operations such as network and electronic coordinated attack, deception and confusion, link blocking, takeover and control, so as to disable the enemy’s intelligent combat network system and achieve a key victory in paralyzing the enemy system.
      4. Cognitive control and interference warfare:

Cognitive control and interference warfare refers to the use of information attack, public opinion attack, and brain attack in the system optimization war to interfere, destroy or control the enemy’s thinking and cognition, so that the enemy cannot make correct judgments and decisions, thereby forming a control advantage over the enemy in the cognitive space.
      Cognitive domain,That is, the human thinking space and consciousness space are areas that have a key impact on combat decisions and judgments. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the competition of war from physical space and information space to cognitive space, making cognitive space a new combat domain. With the development of information and intelligent technology and their extensive and in-depth application in the military field, human-machine intelligence tends to merge, making the position of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. Controlling cognitive rights has become a key factor in future battlefield control rights. Fighting for cognitive control rights has become an important combat style for winning in informationized local wars with intelligent characteristics.
       4.1 Controlling situational awareness cognitive rights and fighting for information advantage
       In the system-based superiority battle, information flow drives material flow and energy flow, and information advantage determines decision-making advantage. Rapid and accurate cognition of intelligence information and battlefield situation has an important impact on seizing command and decision-making advantages. Therefore, in order to organize and implement the system-based optimization war, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster cognition of the battlefield situation and combat environment, and ensure that we discover and recognize the enemy first from the source. While eliminating the “fog of war” of our own side, we must also create “fog” for the opponent. Therefore, in order to compete for the right of cognition, we must not only grasp and process information before the enemy, but also take measures such as network public opinion attacks and highly realistic virtual reality to actively create and spread false information, destroy and disrupt the enemy’s perception and cognition of the battlefield situation, maximize the creation of chaos, increase uncertainty, interfere with the opponent’s combat decision-making, and delay its combat operations.
       4.2 Control the command decision-making power and compete for decision-
       making advantages. Decision-making advantages determine action advantages. The commander’s quick decision-making is the key to shortening the “command cycle” and achieving rapid victory. In the organization of the system-based optimization war, the success or failure of combat operations depends to a large extent on the commander’s decision-making speed. We should make use of intelligent decision-making assistance systems to select the best combat plan, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access the required combat nodes and combat platforms at any time, build an integrated combat system, realize the decentralized deployment of forces, information, and capabilities, and cross-domain linkage, form advantages at the location and time required for combat, gather energy, and win by gathering advantages; implement “core attack war” to make the enemy’s command and decision-making errors or deviations by invading the opponent’s “chips”, tampering with their programs and command and decision-making system algorithms, etc.
       4.3 Control “brain” power and seize brain control advantage
       The cognitive control and disturbance war in the system of gathering advantages emphasizes “attacking the mind and winning the will”, that is, using network warfare, electromagnetic warfare and other methods to implement cognitive control warfare of “attacking the mind, controlling the brain and winning the will” on the enemy’s human brain and consciousness cognition and the control system of unmanned autonomous platforms, replacing “destruction” with “control”, and achieving the purpose of stopping the war and winning the war at the lowest cost. Different from traditional strategic deterrence, attacking the mind and controlling the brain is more focused on active attack. It is an active attack action, mainly using advanced information warfare technology, brain control technology, etc., to control the enemy’s decision-making leaders, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., to implement “brain” attacks, directly control and disrupt the opponent’s “brain”, influence and control the enemy’s decision-making, or disable it, and achieve invisible control of the enemy’s combat operations. For example, targeting human cognitive thinking, using brain reading and brain control technology, using mind guidance and control means, directly “inject” and “invade” attacks on the enemy’s brain, interfere with, control or destroy the enemy’s commander’s cognitive system, deeply control them from the consciousness, thinking and psychology, seize the “intelligence control power”, disrupt the enemy’s decision-making, break the enemy’s morale, and force the enemy to surrender.
      5. Agile mobile warfare
      Agile mobile warfare refers to high-efficiency decision-making, high-efficiency adjustment of troop and weapon deployment, and high-efficiency and immediate aggregation of combat forces in system-based superior warfare, high-efficiency aggregation of capabilities on the established battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and promptly to changes in the battlefield environment, and has characteristics such as responsiveness, robustness, flexibility, elasticity, innovation and adaptability.

Table 1 Concept of Agile Operations
      5.1 Efficient and rapid decision-making
      To implement agile mobile warfare, we must first make efficient and rapid decisions to gain the initiative in combat. Therefore, we must comprehensively use various reconnaissance, detection, perception and surveillance means to obtain battlefield situation and target information in a timely manner, especially the characteristic information, activity trajectory and real-time location information of time-sensitive targets, to ensure accurate intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. We must use less time to identify effective intelligence information, formulate action plans at a faster speed according to changes in the situation, take the initiative one step faster than the enemy, and seize the initiative. Efficient decision-making focuses on shortening the decision-making cycle. We must take the target time window as the center point, coordinate decision-making and command with combat units and weapon platforms, respond quickly, and link as a whole to improve combat efficiency.
      5.2 Efficiently form a favorable combat situation .
      We must keep abreast of changes in the battlefield situation at any time, rely on information network support, and achieve dynamic reorganization and integration of combat forces through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers, and achieve efficient flow and aggregation of combat resources across the entire domain, so as to achieve mobile aggregation and form a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent decision-making assistance and other means to quickly form combat plans, quickly deploy combat forces at a high frequency according to the plan, organize troops to quickly form favorable combat deployments, and achieve the first enemy discovery, first enemy decision-making, first enemy firing, and first enemy assessment, so as to change the balance of power in the shortest time and at the fastest speed, form combat advantages, and improve the efficiency of combat operations.
      5.3 High-efficiency and instant aggregation of combat forces
      The key to organizing agile mobile warfare is to select combat forces within a limited time, coordinate the entire battle situation, form an overall force, and ensure a fatal blow. Therefore, in response to changes in the battlefield situation, especially the target situation, a joint mobile combat system formed by multi-domain combat forces should be formed, combat forces should be aggregated in real time, and quickly deployed to a favorable battlefield to carry out immediate strikes on the enemy. In view of the deep space and deep sea becoming new combat spaces, intelligent unmanned autonomous combat platforms can be organized to quickly and flexibly deploy to key targets or important channels that are difficult for humans to reach due to physiological limitations, and wait for ambush operations to form a new cross-domain balance of power advantage.
      5.4 Agile mobile warfare is an innovative development of traditional mobile warfare.
      In the history of wars in ancient and modern times, there are many successful examples of relying on rapid and concealed maneuvers to achieve combat objectives. However, the combat process of local informationized wars has been greatly compressed, the combat rhythm has been accelerated, and the opportunity for war is fleeting, which puts higher requirements on rapid maneuvering to capture the opportunity. It is difficult to meet the requirements of joint operations and full-domain operations under informationized conditions by relying solely on “fast pace and high speed”, so agile maneuvers must be implemented.
       6. Unmanned cluster autonomous warfare
       Unmanned cluster autonomous warfare refers to the extensive use of unmanned combat means such as “bee swarms”, “wolf packs” and “fish schools” in system-based superior warfare, autonomously organizing actions and distributed attacks to achieve joint victory between man and machine. As unmanned autonomous equipment has become the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical advantages has become an important combat style in informationized warfare.
       6.1 It is conducive to forming a system advantage to suppress the enemy.
       Autonomous warfare of unmanned clusters gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds large-scale unmanned combat clusters or formations such as unmanned “bee swarms”, “wolf packs”, and “fish swarms”. They organize themselves autonomously and cooperate with each other. They can carry out close-range, full-coverage reconnaissance, or act as bait to implement interference and deception, or cooperate with main combat weapons to carry out distributed coordinated attacks, and achieve overall mobility and joint control of the enemy.
       6.2 It is conducive to enhancing combat effectiveness
       . In the autonomous combat of unmanned clusters, different combat units in the unmanned cluster formation are responsible for different functions and tasks. Some are responsible for reconnaissance, some are responsible for electromagnetic interference and firepower strikes, and some play the role of “bait”. The cluster transmits and shares battlefield information through the inter-cluster network, performs its duties according to the division of labor, and coordinates in real time, autonomously, and dynamically according to battlefield changes. It not only gives full play to the advantages of quantity and scale, but also uses information networks and intelligent integration technologies to achieve integration effects, and consumes the enemy’s defense detection, tracking and interception capabilities with the advantages of clusters, so that the enemy’s defense system is quickly saturated and paralyzed.
       6.3 It is conducive to trapping the enemy in a difficult situation in combat.
       Unmanned cluster autonomous warfare is a mixed formation of a large number of autonomous unmanned combat platforms with different functions, forming an unmanned combat cluster that integrates reconnaissance and detection, electronic interference, network attack, and firepower strike. It will carry out multi-directional, multi-wave, and continuous attacks on the same target or target group, making it difficult for the enemy to make an effective counterattack.
       7. Precision point killing war
       Precision point killing war refers to the precise acquisition of intelligence in the system-based superiority war, the implementation of multi-domain precision strikes, and the effort to hit one point to shake the overall situation and maximize combat effectiveness. Informationized local war is an overall confrontation between systems. Implementing precision point killing war, carrying out precision strikes on important nodes and key links of the enemy’s combat system, destroying the enemy’s combat system, and reducing the enemy’s combat capability will achieve twice the result with half the effort.
      7.1 Achieving high cost-effectiveness in combat
      Achieving maximum combat effectiveness at the lowest cost is the goal pursued by both sides in combat. With the widespread application of information technology in the military field and the advent of informationized warfare, precision-guided weapons, intelligent kinetic weapons, reconnaissance and strike integrated drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. All these provide material and technical conditions for achieving precision point-killing warfare, achieving combat objectives at a relatively low cost, and realizing high efficiency and cost-effectiveness in combat.
       7.2 Hitting key node targets is an important option
       . Precision point-killing warfare focuses on hitting key points and nodes. If you don’t hit, you’ll lose. If you hit, you’ll hurt and win. Hitting one point will break the enemy’s system and shake the overall situation. The targets of the strike are not limited to the enemy’s dispersed ships and aircraft, but should also be targeted at enemy command centers, important hubs, and even local, dynamic, time-sensitive targets or independent targets such as major generals and commanders, in order to achieve deterrence and shock and destroy the enemy’s system. In response to the distributed tactics of decomposing the functions of expensive large equipment into a large number of small platforms and implementing dispersed deployment of troops, using precision strike firepower to “point-kill” them will also be an effective countermeasure.
       7.3 Large-scale system support is a basic condition
       . The implementation of precision point-killing warfare cannot be separated from large-scale system support. Focusing on achieving combat objectives, the required forces and weapons are drawn from the dispersed combat domains. Under the support of the network information system, the precision strike system is dynamically integrated to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is attacked, and precise use of troops and precise energy are achieved. To implement precision point killing warfare, it is necessary to be precise. All links in the entire combat system must be closely connected, and there must not be any mistakes. The operation of the US military to kill Bin Laden in 2011 can be said to be a typical strategic precision point killing operation supported by the strategic system.
       7.4 Inseparable from accurate intelligence support
       In precision point killing warfare, accurate intelligence support is always the key to achieving combat objectives. Therefore, before the war, various means should be used to collect various intelligence data and information of the enemy, especially to make accurate analysis and judgment of the enemy’s targets. During combat operations, various sensors and intelligence reconnaissance means should be used to accurately grasp the changes in enemy targets and dynamic target situations in a timely manner, so as to provide strong and effective intelligence support for the implementation of precision point killing warfare. The US military’s targeted elimination of Soleimani is a typical precision point killing war supported by an efficient intelligence system.
       8. Supply Chain Disruption War
       Supply chain-breaking warfare refers to organizing elite forces in the system-based superiority war to attack the enemy’s supply chain, supply lines and supply bases for logistical materials and equipment, so that the enemy will lose supply and withdraw from the battle. Aiming at the enemy’s weaknesses such as long logistic supply lines and large equipment support, elite forces are organized to build a “chain-breaking warfare” combat system to carry out continuous, precise and devastating strikes on the enemy’s supply chain, supply lines and supply bases for logistical materials and equipment, which will make it difficult for them to continue due to loss of supply and have to withdraw from the battle.
       8.1 The supply support chain has a huge impact on the overall combat situation
       . Logistics equipment support is an important foundation for combat. The continuous supply of logistical materials and weapons and equipment ultimately determines the size of an army’s combat force, whether it can fight, in what season to fight, where to fight, how far it can leave the rear base, how long it can fight, how fast it can maneuver, etc. In information warfare, battlefield material consumption has increased exponentially. The reliance of operations on logistical equipment support has not only not decreased, but has become increasingly greater. In addition, the requirements for the degree of specialization of support have also become increasingly higher. In particular, the types and specifications of modern combat equipment are diverse, the mixed transportation volume is huge, and the deployment of troops is more dispersed, which also puts forward very high requirements for transportation capacity, making bases, communication lines and transportation more important than ever before. The stable and efficient operation of the supply support chain and the continuous and uninterrupted supply support are the key to winning the battle and have a huge impact on the overall situation of the battle.
       8.2 The focus of the attack is the key node of the enemy’s supply support chain.
       The focus of the supply chain-breaking war is to attack the key link of the enemy’s supply support chain, and to make it lose its continuous support capability by breaking the chain. Therefore, the supply chain-breaking war should mainly target the enemy’s ground railway and highway transportation lines, maritime supply fleets, military-requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, attacking the enemy’s maritime supply chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy’s aircraft carrier battle group lose its ability to continue to fight, and even affect the outcome of a battle.
       8.3 Focus on choosing the right time and using tactics
       to organize and implement the supply chain disruption war. It is crucial to choose a favorable time to strike. The timing of the supply chain disruption war should be selected when the enemy’s supply is maneuvering, using covert tactics to attack the enemy by surprise, and suddenly strike the enemy’s supply vehicles, ships, and transport aircraft to terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing elite forces to ambush on the routes and routes that the enemy’s transportation vehicles must pass through, waiting for an opportunity to carry out covert and sudden strikes; stealth surprise attack warfare, using submarines, stealth fighters, etc. to covertly advance and strike enemy transportation targets to win by surprise; long-range precision warfare, using long-range conventional ground-to-ground missile forces to carry out long-range precision strikes on enemy supply bases and airports, docks and other supply departure points.
       9. System Destruction and Paralysis Warfare
       System destruction and paralysis warfare refers to the use of a variety of means such as breaking the network, breaking the chain, and hitting the nodes in the system concentration and superiority war to interfere with, delay, destroy or even paralyze the effective operation of the enemy’s combat system and weaken the function of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural strength between the elements of the enemy’s combat system, so that the system function degenerates and cannot play the role of multiplying capabilities.
       9.1 The combat goal is to cause disorder in the operation of the enemy’s combat system.
       In information warfare, the combat systems of both warring parties have their own internal order, which is the key to maintaining and supporting the operation of the combat system. The party that can maintain and control the internal order of the combat system will gain an advantage, otherwise it will be at a disadvantage. Therefore, system destruction and paralysis warfare should establish the goal of disrupting the enemy’s winning mechanism and causing disorder in the enemy’s combat system. This requires that in the system destruction and paralysis war, we must make full use of the powerful enabling role of information technology, especially intelligent algorithms , to quickly adjust and reconstruct our own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, so that the enemy’s combat system loses its normal operating order, and the system function is destroyed in the disorder, and the overall combat capability is significantly reduced.
       9.2 Strike the key nodes of the combat system with a heavy punch
       System confrontation is a major feature of information warfare. The system is an important foundation and support for system confrontation, and it is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can maintain a strong and smooth operation has a decisive impact on winning wars and campaigns. In the system destruction and paralysis war, the key is to focus on the enemy’s integrated combat system of land, sea, air, space and power grids, break the network, break the chain, and hit the nodes. By hitting the key node targets, the operation mechanism of the enemy’s combat system is disordered, or even severely damaged or destroyed. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, hit them at one point, destroy them in a piece, and paralyze them as a whole, so as to achieve the goal of defeating the enemy.
       9.3 Implementing soft strikes on the enemy’s combat system
       When organizing and implementing the hard destruction of system destruction warfare, soft kill operations such as electronic warfare, network warfare, psychological warfare, and public opinion warfare are organized simultaneously to carry out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare, using electronic warfare forces to implement strong electromagnetic interference on the enemy, causing its information to fail and fall into the fog of war; network warfare, using network offensive forces to attack the enemy’s network information system, causing serious damage to the enemy’s command and communication system and computer network, causing its command to fail and fall into an information island or even a war island; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare means to implement psychological strikes and public opinion guidance on the enemy, severely damaging its combat will and inducing cognitive confusion. Organizing livelihood warfare to strike the opponent’s major national and livelihood facilities can also play a role in “cutting off the firewood from the bottom of the pot” for the enemy’s combat system. During the Kosovo War in 1999, the US military did not attack the Yugoslav army, but instead attacked its potential target system, causing the Yugoslav military and civilians to lose their will to fight and lead to defeat. 

現代國語翻譯:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示與威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動;三是網絡破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通訊網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速響應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間資訊「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連結、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界相關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,以網路為基礎的各種戰爭資源,可快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳輸訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2 基本著眼點是使敵作戰體系失能失效體系聚優戰中實施電磁擾阻戰,主要是針對敵方對電磁空間的依賴,同時為確保己方對電磁空間的有效利用,組織各種電子偵察、幹擾、攻擊、防禦和支援力量,對敵通信網、雷達網、電腦網和指揮中心、通信樞紐、雷達站、電腦網路節點,全球導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通訊聯絡與資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱敵指揮控制能力,使敵整個作戰體系失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊網路物理設施,摧毀敵作戰及武器裝備實體。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷與硬摧毀行動,破壞敵之網路體系,使敵作戰體系功能整體下降甚至失能。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理訊息,還要採取網路輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假訊息,破壞、擾亂敵對戰場態勢的感知、認知,盡量製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰資源,實現作戰效能最大化;利用泛在智慧網絡,隨遇接入所需作戰節點、作戰平台,建構形成一體化作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集聚釋能、聚優制勝;實施“攻芯戰”,通過侵入對方“芯片”、篡改其程序及指揮決策系統演算法等,使敵指揮決策發生錯誤或偏差。
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志」的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進資訊作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵決策,或使其失能,實現隱形操控敵作戰行動。如以人的認知思考為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施「注入」「侵入」式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵

5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提升作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全域作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人集群自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘餌實施幹擾、欺騙,或配合主戰兵器實施分散式協同攻擊,實現整體機動、聯合製敵。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦偵測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以做出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點和關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使基地、通信線路和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱蔽突然打擊;隱形奇襲戰,使用潛艇、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確戰,使用遠程常規地地飛彈部隊對敵補給基地和機場、碼頭等補給出發地實施遠程精確打擊。
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整與重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運行機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強烈電磁幹擾,使其資訊失靈,陷入戰爭迷霧之中;網路戰,使用網路進攻力量對敵網路資訊體系實施攻擊,使敵指揮通訊系統和電腦網路受到嚴重破壞,使其指揮失靈,陷入資訊孤島乃至戰爭孤島;心理戰和輿論戰,使用心理戰、輿論戰手段,對敵實施心理打擊和輿論引導,重創其作戰意志,誘導其認知錯亂。組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗.

中國軍事資訊科技原創來源:https//www.81it.com/2022/0901/13888.html

Chinese Intelligent Warfare is Accelerating and Advancing

中國智能化戰爭正在加速推進

中國軍網 國防部網. 2022年3月17日 星期四

現代英語:

With the widespread application of artificial intelligence in the military field, intelligent warfare has gradually become a hot topic. History has repeatedly proved that the evolution of war forms will lead to profound changes in the winning mechanism. In today’s era when information warfare is developing in depth and intelligent warfare is beginning to emerge, the armies of major countries in the world have made great efforts to promote military intelligence, and many of these trends are worthy of attention.

Strengthen top-level design

Outlining a “roadmap” for intelligent warfare

Driven by a new round of scientific and technological revolution and industrial revolution, intelligent military transformation is developing in depth. The United States, Russia, Japan and other countries have regarded artificial intelligence as a disruptive technology that “changes the rules of the war game” and have made early arrangements, strengthened top-level design and planning guidance, and explored the direction of military application of artificial intelligence.

The U.S. military has detailed the current status and development plan of artificial intelligence in documents such as “Preparing for the Future of Artificial Intelligence”, “National Artificial Intelligence Research and Development Strategic Plan”, “Artificial Intelligence and National Security”, “Integrated Roadmap for Unmanned Systems, Fiscal Year 2017-2042”, and “American Artificial Intelligence Initiative: First Annual Report”, and has elevated the development of artificial intelligence to the national strategic level. In 2021, the U.S. military pointed out in its “U.S. Department of Defense Artificial Intelligence Posture: Assessment and Improvement Recommendations” that the U.S. military should consider three guiding questions in developing artificial intelligence: what is the current state of artificial intelligence related to the U.S. military; what is the current situation of the U.S. military in artificial intelligence; and what internal actions and potential legislative or regulatory actions may enhance the U.S. military’s artificial intelligence advantage.

Russia has invested a lot of resources to maintain a balance with the United States in the competition for the application of artificial intelligence in the military field. In 2021, Russian President Vladimir Putin stated at the first Defense Ministry meeting of the year that artificial intelligence will greatly promote changes in the military field, and the Russian Federation Armed Forces must accelerate the research and development of artificial intelligence application technologies such as robots, intelligent individual systems, and intelligent weapon modules, so as to form core technical capabilities and battlefield competitive advantages as soon as possible. Documents such as “Special Outline for the Research and Development of Future Military Robot Technology and Equipment before 2025”, “Future Russian Military Robot Application Concept”, and “The Development Status and Application Prospects of Artificial Intelligence in the Military Field” have established a series of mechanisms at the national level for the Russian military to promote the military application of artificial intelligence.

The Japanese government has also issued an “Artificial Intelligence Strategy” to lead the research and development of artificial intelligence technology and industrial development. In the “Robotics and Artificial Intelligence” strategic plan formulated by the United Kingdom, the application of artificial intelligence in battlefield construction is emphasized. In January 2021, the Australian Department of Defense released “Fighting the Artificial Intelligence War: Operational Concepts for Future Intelligent Warfare”, which explores how to apply artificial intelligence to land, sea and air combat.

Innovative combat concepts

Promoting the “Thinking First” Approach to Intelligent Warfare

The innovation of operational concepts has an ideological driving effect on the development of military science and technology and the evolution of war forms. In the past, people’s understanding and grasp of war mainly came from the summary of practical experience, and operational concepts were empirical concepts. In the future era of intelligent warfare, operational concepts are not only empirical concepts, but also the conception, design and foresight of operations.

The U.S. Army has proposed the concept of “multi-domain warfare”, which requires deep integration and close coordination of combat capabilities in various domains such as land, sea, air, space, electromagnetic, and network. To this end, the U.S. Army has successively issued white papers such as “Multi-Domain Warfare: The Development of Synthetic Arms in the 21st Century (2025-2040)”, “U.S. Army Multi-Domain Warfare (2028)”, and “Using Robotics and Autonomous Technologies to Support Multi-Domain Warfare”. In March 2021, the U.S. Department of the Army issued the document “Army Multi-Domain Transformation: Preparing to Win in Competition and Conflict”, indicating that “multi-domain warfare” has become a “flag” leading the transformation and development of the U.S. Army. The Defense Advanced Research Projects Agency proposed the concept of “mosaic warfare”, which aims to create a highly decentralized and highly adaptable “kill net” composed of different combat functional units, based on advanced computer technology and network technology. The U.S. Department of Defense strongly supports the concept of “joint all-domain operations”. In March 2020, the U.S. Air Force took the lead in writing “joint all-domain operations” into the doctrine to explore how the Air Force can play a role in “joint all-domain operations”.

The Russian military proposed the concept of “charge disintegration”. “Disintegration” is one of the most important operational concepts in Russia at present. The Russian electronic warfare forces set the goal of making the enemy’s information, charge, electronic warfare and robot systems ineffective, and believe that this goal will “determine the fate of all military operations”. Disrupting the command and control of enemy forces and weapon systems and reducing the efficiency of enemy reconnaissance and use of weapons are the primary tasks of electronic warfare. At present, the Russian military is considering forming 12 types of electronic warfare forces. The Russian military also proposed the concept of “non-nuclear containment system”, the core of which is to use non-nuclear offensive strategic weapons to contain opponents. The non-nuclear offensive strategic weapons it defines include all ballistic missiles equipped with non-nuclear warheads, as well as strategic bombers and long-range air-based and sea-based cruise missiles. In addition, the Russian military also proposed the concept of “hybrid warfare”, hoping to use artificial intelligence systems to seek battlefield information advantages.

The British Ministry of Defense has proposed the concept of “multi-domain integration” and will develop a new command and control system with intelligent capabilities to achieve comprehensive, persistent, accurate and rapid battlefield perception and force coordination.

Focus on technology research and development

Shaping the Intelligent Warfare Operational Model

The key to the effectiveness of artificial intelligence is the combination with other technologies, which is also described as the “AI stack”. Various technologies interact to produce a combined effect, thereby enhancing the capabilities and effects of each technology. In the intelligent warfare supported by artificial intelligence technology, the collaborative combat mode of “man-machine integration, cloud brain control”, the cluster combat mode of “mixed formation, group intelligence”, and the cognitive combat mode of “intelligence-led, attacking with intelligence first” will constantly update people’s understanding of war.

Focus on the research and development of innovative projects. The US military is vigorously promoting the application of artificial intelligence chips in existing weapons and equipment systems, adding “intelligent brains” to weapons to enable them to have human-like thinking and autonomous interaction capabilities. In October 2021, the US Navy launched the “Beyond Plan”, which is regarded as the “current highest priority”. It aims to accelerate the delivery of artificial intelligence and machine learning tools by building a military Internet of Things for maritime operations, integrating manned and unmanned joint formations, supporting a new intelligent naval architecture, enhancing large-scale firepower killing, and realizing intelligent distributed operations of the navy. In addition, the Defense Advanced Research Projects Agency has also carried out cognitive electronic warfare projects such as “Adaptive Electronic Warfare Behavior Learning”, “Adaptive Radar Countermeasures”, and “Communications under Extreme Radio Frequency Spectrum Conditions”, and developed a prototype of a cognitive radar electronic warfare system. The Russian Ministry of Defense’s Intelligent Technology and Equipment Research and Experimental Center cooperated with the Institute of Control Problems of the Russian Academy of Sciences to develop and test autonomous intelligent algorithms including drone swarm command and control, and also jointly developed an object automatic recognition software system based on neural network principles with the National Aviation System Research Institute.

Establish innovative R&D institutions. The continuous emergence of new technologies is an inexhaustible driving force for the vigorous development of military intelligence. High-level military intelligence construction cannot be separated from the technical research and development of professional institutions. Some countries and militaries have established R&D centers, focusing on innovative development from a technical level. The U.S. Department of Defense has established a joint artificial intelligence center, which is planned to be built into a national key laboratory to lead the promotion of hundreds of artificial intelligence-related projects and ensure the efficient use of artificial intelligence-related data and information to maintain the United States’ technological advantage in this field. Russia has established an artificial intelligence and big data alliance, a national artificial intelligence center, and a robotics technology research and experimental center under the Ministry of Defense, mainly conducting theoretical and applied research in the fields of artificial intelligence and information technology. France has established an innovative defense laboratory, the United Kingdom has set up an artificial intelligence laboratory, and India has established an artificial intelligence task force to explore related technologies.

Strengthen equipment research and development and deployment. In recent years, many countries have attached great importance to the research and development of intelligent weapons and equipment, and unmanned aerial vehicles, unmanned combat vehicles, unmanned ships, unmanned submarines, etc. have continued to emerge. At present, the US Air Force has begun to practice the combat concept of “man-machine collaboration, man in the loop” on the F-35 fighter. The US XQ-58A “Valkyrie” stealth drone previously mainly carried out man-machine collaborative operations with F-35 and F-22 fighters. In April 2021, the stealth drone successfully launched the ALTIUS-600 small drone system, further enhancing its manned and unmanned collaborative combat capabilities. Russia is focusing on reconnaissance and surveillance, command and decision-making, firepower strikes, combat support and other fields, and is developing and deploying intelligent equipment. It plans to increase the proportion of unmanned combat systems in weapons and equipment to more than 30% by 2025. Russia’s ground unmanned combat weapons, represented by the “Uranus” series and “Platform-M” and “Argo” models, are developing rapidly. Among them, the Nerekhta unmanned combat vehicle can be equipped with remote-controlled machine guns and rocket launchers. In addition to the combat capabilities of ordinary armored vehicles, it also has transportation and reconnaissance functions. In addition, the Japanese Self-Defense Forces plan to officially deploy an unmanned aerial formation with strong combat capabilities in 2035.

(Author’s unit: National University of Defense Technology)

國語中文:

■賈珍珍 丁 寧 陳方舟

隨著人工智慧在軍事領域的廣泛應用,智慧化戰爭逐漸成為備受矚目的焦點話題。歷史多次證明,戰爭形態的演進將引發致勝機理的深刻改變。在資訊化戰爭向縱深發展、智慧化戰爭初露端倪的當今時代,世界主要國家軍隊紛紛下大力推動軍事智慧化,其中的諸多動向值得關注。

加強頂層設計

勾勒智能化戰爭“路線圖”

在新一輪科技革命與產業革命推動下,智慧化軍事變革正向縱深發展。美國、俄羅斯、日本等國紛紛把人工智慧視為「改變戰爭遊戲規則」的顛覆性技術,並事先佈局,加強頂層設計和規劃引領,探索人工智慧的軍事應用方向。

美軍在《為人工智慧的未來做好準備》《國家人工智慧研究與發展戰略計畫》《人工智慧與國家安全》《2017至2042財年無人係統綜合路線圖》《美國人工智慧計畫》:在首個年度報告》等文件中,詳述了人工智慧的發展現狀和發展規劃,並將人工智慧發展提升至國家戰略層面。 2021年,美軍在發布的《美國防部人工智慧態勢:評估與改進建議》中指出,美軍發展人工智慧應考慮三個指導性問題:與美軍相關的人工智慧現處於何種狀態;美軍目前在人工智慧方面的態勢如何;哪些內部行動以及潛在的立法或監管行動可能會增強美軍的人工智慧優勢。

俄羅斯投入大量資源,以維持與美國在人工智慧軍事領域應用競爭的平衡。 2021年,俄總統普丁在年度首場國防部會議上表示,人工智慧將大幅推動軍事領域變革,俄國聯邦武裝力量要加速機器人、智慧單兵系統和武器智慧化模組等人工智慧應用技術的研發工作,早日形成核心技術能力和戰場競爭優勢。 《2025年前未來軍用機器人技術裝備研發專題綱要》《未來俄軍用機器人應用構想》《人工智慧在軍事領域的發展現狀以及應用前景》等文件,從國家層面為俄軍推動人工智慧軍事應用確立了一系列機制。

日本政府也推出了《人工智慧戰略》,旨在引領人工智慧技術研發和產業發展。在英國制定的《機器人與人工智慧》戰略規劃中,強調了人工智慧在戰場建設中的應用。 2021年1月,澳洲國防部發布《打好人工智慧戰爭:未來智慧化戰爭之作戰構想》,這份文件探討如何將人工智慧應用到陸、海、空作戰領域。

創新作戰概念

推動智慧化戰爭“思想先行”

作戰概念創新對軍事科技發展、戰爭形態演變具有思想牽引作用。過去人們對戰爭的認識與掌握,主要源自於對實踐經驗的歸納總結,作戰概念即經驗概念。未來智慧化戰爭時代,作戰概念不僅是經驗概念,更是對作戰的構想、設計與前瞻。

美陸軍提出「多域戰」概念,要求陸、海、空、天、電磁、網路等各域作戰能力深度整合與密切協同。為此,美陸軍先後發布《多域戰:21世紀合成兵種的發展(2025至2040)》《美國陸軍多域戰(2028)》《運用機器人與自主技術支援多域戰》等白皮書。 2021年3月,美陸軍部發布文件《陸軍多域轉型:準備在競爭和衝突中取勝》,顯示「多域戰」已成為引領美陸軍轉型發展的一面「旗幟」。美國防高級研究計畫局提出「馬賽克戰」概念,旨在打造一種由不同作戰功能單元構成的、以先進電腦技術與網路技術為基礎的、高度分散、具有高度適應性的「殺傷網」。美國防部大力支持「聯合全域作戰」概念。 2020年3月,美空軍率先將「聯合全域作戰」寫入條令,探討空軍如何在「聯合全域作戰」中發揮作用。

俄軍提出「指控瓦解」概念。 「瓦解」是當前俄羅斯最重要的作戰概念之一,俄軍電子戰部隊把使敵人的訊息、指控、電子戰和機器人系統失效作為目標,認為這一目標將「決定所有軍事行動的命運」。擾亂敵方部隊和武器系統的指揮和控制,降低敵方偵察和使用武器的效率,是進行電子戰的首要任務。目前,俄軍正在考慮組建12種類型的電子戰部隊。俄軍也提出「非核武遏制體系」概念,核心是使用非核武進攻性戰略武器來遏制對手。其所定義的非核武攻擊性戰略武器既包括所有裝備非核彈頭的彈道飛彈,也包括戰略轟炸機和遠程空基、海基巡航飛彈。此外,俄軍也提出「混合戰爭」概念,希望利用人工智慧系統謀求戰場資訊優勢。

英國防部提出「多域融合」概念,將發展具備智慧化能力的新型指控系統,以實現全面、持久、準確、快速的戰場感知與力量協同。

注重技術研發

塑造智慧化戰爭作戰模式

人工智慧發揮效用的關鍵是與其他多種技術的組合,這種組合也被描述為「人工智慧堆疊」。各種技術透過互動的方式產生組合效應,進而提升每項技術所產生的能力與效果。在人工智慧技術支援的智慧化戰爭中,「人機一體、雲腦控制」的協同作戰模式,「混搭編組、群體智慧」的集群作戰模式,「智慧主導、攻智為上」的認知作戰模式等,將不斷更新人們對戰爭的認知。

聚焦創新專案研發。美軍正在大力推廣人工智慧晶片在現有武器裝備系統中的應用,為武器加上“智慧大腦”,使之具備類人思考和自主互動能力。 2021年10月,美海軍推出被視為“當前最高優先事項”的“超越計劃”,旨在通過構建海上作戰軍事物聯網,整合有人無人聯合編隊,加速交付人工智能和機器學習工具,支撐全新的智慧化海軍架構,提升大規模火力殺傷、實現海軍智慧化分散式作戰。此外,美國防高級研究計畫局也進行了「自適應電子戰行為學習」「自適應雷達對抗」「極端射頻頻譜條件下的通訊」等認知電子戰項目,研發出認知雷達電子戰系統原型機。俄國防部智慧技術裝備科研試驗中心與俄聯邦科學院控制問題研究所合作,開發測試了包括無人機群指揮控制在內的自主智慧演算法,也與國家航空系統科研所共同開發基於神經網路原理的物體自動辨識軟體系統。

組成創新研發機構。新技術的不斷湧現是軍事智慧化蓬勃發展的不竭動力,高水準的軍事智慧化建設離不開專職機構的技術研發。一些國家和軍隊組成研發中心,注重從技術層面創新發展。美國國防部建立了聯合人工智慧中心,計劃將該中心打造成國家級重點實驗室,用於領導數百個與人工智慧相關的項目,確保對人工智慧相關數據資訊的高效利用,以保持美國在該領域的技術優勢。俄羅斯組成了人工智慧和大數據聯盟、國家人工智慧中心和隸屬國防部的機器人技術科研試驗中心,主要進行人工智慧和資訊科技領域的理論和應用研究。法國成立了創新國防實驗室,英國設立了人工智慧實驗室,印度組成了人工智慧特別工作小組,進行相關技術探索。

加強裝備研發列裝。近年來,多國重視研發智慧武器裝備,無人飛行器、無人戰車、無人艦艇、無人潛航器等不斷湧現。目前,美空軍已開始在F-35戰機上實踐「人機協同,人在迴路」的作戰理念。美XQ-58A「女武神」隱身無人機先前主要與F-35和F-22戰機進行人機協同作戰,2021年4月該隱身無人機成功投放ALTIUS-600小型無人機系統,進一步提升了其有人無人協同作戰能力。俄羅斯正聚焦偵察監視、指揮決策、火力打擊、作戰支援等多個領域,展開智慧裝備研發和列裝工作,計畫到2025年將無人作戰系統在武器裝備中的比例提高到30%以上。以“天王星”系列和“平台-M”“阿爾戈”等型號為代表的俄地面無人作戰武器發展迅速。其中,Nerekhta無人戰車可搭載遙控機槍和火箭發射器,除擁有一般裝甲車的戰鬥力外,還兼具運輸和偵察功能。此外,日本自衛隊計劃在2035年正式部署具有較強作戰能力的無人空中編隊。

(作者單位:國防科技大學)

中國軍事資料來源:https://www.81.cn/jfjbmap/content/2022-03/17/content_311555.htm

How Chinese Military Will Achieve Precise Strikes in Cognitive Domain Operations

中國軍隊如何在認知域作戰中實現精準打擊

現代英語:

How to achieve precise strikes in cognitive domain operations

■Bu Jiang Jiang Rilie

introduction

Currently, driven by intelligent technology, cognitive domain operations are showing new characteristics such as precise perception, precise prediction and precise calculation. Studying and grasping the connotation mechanism of precision strikes in cognitive domain operations to ensure clear operational targets, personalized information generation, and precise information delivery will be more conducive to seizing the commanding heights and initiative in future cognitive domain operations.

Accurately establish combat goals

The establishment of operational goals is often the primary issue of concern in cognitive domain operations. With the continuous application of artificial intelligence, big data and other technologies, the party with a technological advantage is often able to quickly and efficiently collect cognitive data of different dimensions, levels and modalities, thereby discovering the weaknesses and sensitivities of the opponent’s cognitive system. point and detonation point.

Massive “data sources” refine target clarity. Today, as the Internet becomes more popular, cognitive data is growing exponentially. With the support of big data, psychometric and other technologies, target portraits are gradually evolving rapidly towards accurate portraits and intelligent portraits. According to foreign statistics, as of July 2022, the global Internet penetration rate reached 69%, and the Internet has become an essential platform for users’ daily lives. With the help of the Internet, both combatants can widely and quickly realize target object cognitive data collection and cognitive situation awareness, providing support for analyzing the target object’s political beliefs, values, national sentiments, public opinion positions, etc. It is reported that in foreign elections in recent years, foreign data analysis companies have captured social media user data, established character analysis models, accurately portrayed voters’ personalities and cognitive characteristics, and on this basis pushed suggestive campaigns to swing voters. advertising, thereby influencing their electoral decisions.

Dynamic “tag pool” improves target recognition rate. Labeling usually refers to the abstract classification and generalization of certain characteristics of a specific group or object. In cognitive domain operations, labeling is an important process to achieve classification and visualization of cognitive data. In the face of massive user data, establishing a mature and reliable label system is a prerequisite for sorting out, analyzing, and making good use of cognitive data. Using the label system to filter useless data and mine potential value information can provide information for presetting combat scenarios in the cognitive domain. Direct frame of reference. The development of the labeling system should be based on the logical starting point of cognitive domain operations, and ultimately comes down to the application of cognitive domain operations. For the target object, the transfer of interests, changes in personality, and changes in emotion are real-time and dynamic. The establishment of a “tag pool” can sense the cognitive dynamics of the target object in real time and accurately improve the target recognition rate.

Intelligent “algorithm library” shows target relevance. If data is compared to the “fuel” of cognitive domain operations, algorithms are the “engine” and an important source of power for cognitive precision strikes. In a certain sense, cognitive domain operations are “confrontation of data or algorithms.” Through intelligent algorithms, we can deeply mine the multi-dimensional correlation data of the target object’s behavior, build an accurate target portrait, and then combine it with machine learning algorithms to build a prediction model to automatically match and associate cognitive information with the target object, at the right time and at the right place. Deliver cognitive information in an appropriate manner to change the target object’s cognition. As analyzed by some foreign research institutions, with 10 likes, the algorithm can know you better than your colleagues; with 150 likes, the algorithm will know you better than your parents; with 300 likes, the algorithm will know you better than your closest partner you.

Accurately generate information “ammunition”

Designing information “ammunition” that conforms to the target’s thinking habits and perception style is the key to improving the cognitive domain killing effect. The development and application of intelligent science and technology provides a convenient means to achieve “private customization” of cognitive information themes, content and forms, making it possible to instantly and forcibly change the decisions and actions of target objects.

Information theme planning based on target value orientation. Cognitive information theme is the central idea represented by the information and the core of the information content. From legal advice, military deterrence, conflict and separation, and emotional summons, to moral guidance, war mobilization, behavioral instructions, and motivational incentives, different information themes exert different influences. Practice shows that the theme of cognitive information must be planned closely around the target object. According to the different value orientations shown by different combat stages and different target objects, the information theme must be optimized in a timely manner so that the information “ammunition” can satisfy the target object to the maximum extent. needs. According to the analysis of foreign research institutions, foreign election campaign advertisements in recent years are often inseparable from the support of big data. Accurately designing different advertising themes for voters with different values ​​​​can resonate with voters’ values.

Information content design based on target mindset. In the Internet era, the life trajectory, geographical location, hobbies, social relationships, etc. of the target object are all recorded on the Internet, making it possible to accurately create an “information cocoon” that caters to the target object’s way of thinking. Driven by big data technology, the interaction trajectories of target objects in the virtual world can also be easily captured, perceived and calculated. With the assistance of multimedia content intelligent generation systems, information similar to the target’s thinking habits can be generated in batches, causing the target to be trapped in an “information cocoon”. The scope of information acceptance narrows, and the perception of the outside world gradually decreases, and then falls into cognitive confusion. Know the trap. In recent years, many “color revolutions” that have occurred around the world are inseparable from the support of cognitive control. Some Western countries use “deep forgery” technology to instill false information in target objects that conforms to their way of thinking, creating anti-intellectual, The information environment stupefies the people, forming cognitive biases and inducing them to deny their own national and cultural values, thereby creating anti-government sentiments.

Information form selection based on target perceptual characteristics. Psychology believes that the formation and change of the cognitive subject’s attitude needs to go through three processes of “attention-understanding-acceptance”. Whether the target object can be affected by the dissemination of information, attracting attention is the first step. Information form is an important carrier to attract the attention of the target audience, and its form design is crucial to improving the acceptance, dissemination and infectivity of information “ammunition”. Through big data technology, we can mine the national emotions, customs and habits, religious beliefs, personal preferences and other characteristics of the target object, and scientifically judge the perceptual characteristics such as information receiving habits. On this basis, we can comprehensively use text, language, video, image and other information carriers to integrate Color, layout and other elements can cause strong stimulation to the target object’s senses. Since 2011, some Syrian anti-war activists have produced a number of anti-war propaganda short films from the perspectives of children and women and spread them on the international Internet, arousing strong responses from international public opinion. This internationally accepted information carrier meets the aesthetic needs of the public, avoids differential interpretation by the audience, and can often achieve unexpected results.

Accurately deliver information

Cognitive information delivery follows the laws of information dissemination. In order to achieve the effect of precise cognitive attack, it is necessary to deal with issues such as delivery objects, delivery channels, and delivery timing.

Extract cognitive features and filter information delivery objects. The profiling technology supported by big data makes it possible to extract the cognitive characteristics of target objects. Through the cognitive characteristic library, objects with similar characteristics can be screened out from groups of different races, different parties, different occupations, etc., thereby upgrading the traditional extensive screening method. , so that the information “ammunition” is more closely matched with the target object, thereby improving the pertinence and accuracy of cognitive attacks. In recent years, Cambridge Analytica has used machine learning methods to classify Facebook users according to five personality types: openness to experience, conscientiousness, extroversion, agreeableness, and emotional instability, and established a linear regression of the five personality traits. model to establish a “target” for precise delivery of campaign advertisements. This move has many implications for the world. In the future, cognitive domain operations, based on the extensive collection of users’ cognitive characteristics, will place more emphasis on accurately dividing groups, and carry out targeted campaigns based on the differences in values ​​and behavioral habits of different groups. information delivery and behavior prediction.

Follow social habits and match information delivery channels. The deep popularization of the Internet has brought about tremendous changes in the way information is disseminated, and the ways in which people receive information are becoming more diversified and diversified. According to data from foreign research institutions, there are currently more than 4.62 billion social media users worldwide, and social media platforms have become the main battlefield in the cognitive domain. In the many “color revolutions” that have occurred in recent years, social media such as Facebook, Twitter, and YouTube, controlled by Western countries, have played an important role in spreading public opinion, organizing protests, and mobilizing the public. It is reported that in similar operations, Facebook is often used to determine the schedule, Twitter is used to coordinate actions, and YouTube is used to spread the word widely. Future operations in the cognitive domain will place great emphasis on focusing on the target’s social habits and characteristics, fully understanding the target’s social circle and life circle, and selecting information delivery methods from multiple channels, including online and offline, military and civilian, to ensure the effectiveness of cognitive information. Delivery rate.

Track cognitive dynamics and accurately deliver information at the right time. Changes in cognition do not happen overnight. Blindly pursuing high rhythm and achieving goals in an instant will have the opposite effect. Therefore, cognitive domain operations must grasp the rhythm and intensity of “time immersion”, select the correct delivery time based on the cognitive dynamics of the target object, and gradually seek to expand the effect advantage. Before the target object has formed a preliminary understanding of a certain event, it is necessary to actively seize the priority of information release, carry out information “bombing” as soon as possible, and strive to “preemptively strike first.” In addition, during the public opinion fermentation stage of the incident, the subject’s cognition has not yet been completely solidified. At this time, by repeatedly disseminating a specific information, the purpose of subtly reconstructing the subject’s cognition can also be achieved.

(Author’s unit: National University of Defense Technology)

國語中文:

如何實現認知域作戰精準打擊

■卜江 蔣日烈

引言

目前,在智慧化技術的推動下,認知域作戰正呈現出精確感知、精確預測和精確計算等全新特徵。研究掌握好認知域作戰精準打擊的內涵機理,從而確保作戰目標清晰化、資訊生成個性化、資訊投射精準化,將更有利於奪取未來認知域作戰制高點和主動權。

精準確立戰目標

作戰目標的確立往往是認知域作戰關注的首要問題。隨著人工智慧、大數據等技術的不斷應用,佔據技術優勢的一方往往能夠快速、有效率地採集不同維度、不同層級、不同模態的認知數據,進而發現對手認知體系的薄弱點、敏感點和爆燃點。

海量「資料來源」細化目標清晰度。在網路深入普及的今天,認知數據正呈指數級增長,目標畫像在大數據、心理測量等技術的支撐下,正逐漸朝著精準畫像、智慧畫像的方向快速演進。根據國外統計數據顯示,截至2022年7月,全球互聯網滲透率達69%,互聯網已成為用戶日常生活的必備平台。借助互聯網,作戰雙方能夠廣泛快速地實現目標對象認知數據收集和認知態勢感知,為分析目標對象的政治信念、價值觀念、民族情感、輿論立場等提供支撐。據悉,在近年的國外大選中,國外數據分析公司就曾透過抓取社群媒體用戶數據,建立人物分析模型,精準刻畫選民性格、認知特徵,在此基礎上對搖擺選民推送暗示性競選廣告,從而影響其選舉決策。

動態「標簽池」提升目標辨識率。貼標簽通常是指對某一類特定群體或物件的某項特徵進行的抽象分類和概括。在認知域作戰中,貼標簽是實現認知資料分類與可視化的重要過程。面對海量的用戶數據,建立一套成熟可靠的標簽體係是梳理分析、用活用好認知數據的前提,利用標簽體系過濾無用數據,挖掘潛在價值信息,能夠為認知域作戰場景預設提供直接參考框架。標簽體系的開發要基於認知域作戰這個邏輯起點,最終歸結於認知域作戰應用。對於目標對象來講,興趣的遷移、性格的改變、情感的變化是即時動態的,建立「標簽池」能夠即時感知目標對象的認知動態,精準提升目標辨識率。

智慧“演算法庫”顯現目標關聯性。如果將數據比作認知域作戰的“燃料”,演算法則是“引擎”,是認知精準打擊的重要動力源。從一定意義上講,認知域作戰是「數據或演算法的對抗」。透過智慧演算法,可以深度挖掘目標對象行為的多維關聯數據,構建精準目標畫像,再結合機器學習演算法構建預測模型,將認知資訊與目標對象進行自動匹配關聯,在合適的時間、合適的地點,以合適的方式投送認知訊息,從而改變目標對象認知。正如國外一些研究機構分析發現,透過10個點贊,演算法可以比同事更了解你;150個點贊,演算法將比你父母更了解你;300個點贊,演算法將比最親密的伴侶更了解你。

精準生成資訊“彈藥”

設計符合目標對象思維習慣和感知風格的訊息“彈藥”,是提升認知域殺傷效果的關鍵所在。智慧科學技術的發展運用,為實現認知資訊主題、內容和形式的「私人客製化」提供了便捷手段,即時、強制地改變目標對象決策和行動成為可能。

基於目標價值取向的資訊主題策劃。認知資訊主題是資訊所表現的中心思想,是資訊內容的核心。從法理勸告、軍事威懾、矛盾離間、情感召喚,到義理引導、戰爭動員、行為指示、動機激勵,不同的訊息主題發揮不同的影響作用。實踐表明,認知訊息的主題必須緊緊圍繞目標對像做策劃,針對不同作戰階段、不同目標對象所表現出來的不同價值取向,及時優化信息主題,才能使信息“彈藥”最大限度地滿足目標對象的需求。根據國外研究機構分析,近年來的國外大選競選廣告背後往往離不開大數據的支撐,針對不同價值觀的選民精準設計不同廣告主題,可以引起選民價值共鳴。

基於目標思維方式的資訊內容設計。在互聯網時代,目標對象的生活軌跡、地理位置、興趣愛好、社交關係等都被網絡所記錄,精準打造迎合目標對象思維方式的「資訊繭房」成為可能。在大數據技術驅動下,目標對像在虛擬世界中的互動軌跡也很容易被捕捉、被感知和被計算。在多媒體內容智慧生成系統等輔助下,可大量產生與目標對象思維習慣類似的訊息,致使其陷於「訊息繭房」之中,訊息接受範圍變窄,對外界的感知度逐漸降低,進而陷入認知陷阱。近年來,全球發生的多起「顏色革命」背後都離不開認知控制的支撐,一些西方國家利用「深度偽造」技術,向目標對象灌輸符合其思維方式的虛假信息,製造反智化、愚民化資訊環境,形成認知偏差,誘導其否定自身民族文化價值理念,進而產生反政府情緒。

基於目標感知特性的資訊形式選擇。心理學認為,認知主體的態度的形成與改變需經過「注意力-了解-接受」三個過程,目標對象能否受到訊息傳播的影響,吸引註意是第一步。資訊形式作為引起目標對象注意的重要載體,其形式設計對提高訊息「彈藥」的接受度、傳播力、感染性至關重要。透過大數據技術可以挖掘目標對象民族情感、風俗習慣、宗教信仰、個人喜好等特徵,科學判斷訊息接受習慣等感知特性,在此基礎上綜合運用文本、語言、視頻、圖像等資訊載體,加以融入色彩、佈局等元素,可以給目標感官造成強烈刺激。自2011年以來,一些敘利亞反戰人士以兒童、婦女等視角,製作出多部反戰宣傳短片在國際互聯網上傳播,引起國際社會輿論強烈反響。這種國際通用的資訊載體,符合大眾審美需求,避免了受眾差異性解讀,往往能達到意想不到的效果。

精準實現資訊投送

認知訊息投送遵循資訊傳播規律,要達到認知精準打擊效果,需要處理好投送對象、投送管道、投送時機等問題。

提取認知特徵,篩選訊息傳遞對象。大數據支撐的畫像技術使提取目標對象認知特徵成為可能,透過認知特徵庫,可以從不同種族、不同黨派、不同職業等群體中篩選出具有相似特徵的對象,從而升級傳統的粗放篩選方式,讓資訊「彈藥」與目標對象更加匹配,從而提高認知攻擊的針對性和精準性。近年來,劍橋分析公司曾使用機器學習方法,依照經驗開放型、盡責型、外向型、親和型、情緒不穩定型五類人格對臉書用戶進行分類,建立了五種人格特質的線性回歸模型,為精準投送競選廣告立起「標靶」。此舉對世人的啟示是多方面的,未來認知域作戰,在廣泛蒐集用戶認知特徵的基礎上,將更加強調精準劃分群體,依據不同群體的價值觀念和行動習慣的差異,進行有目的地信息投送和行為預測。

遵循社交習慣,匹配資訊投送管道。互聯網的深度普及使資訊的傳播方式正發生巨大變革,人們接受資訊的方式更加多樣化、多元化。根據國外調研機構數據顯示,目前全球社群媒體用戶超過46.2億,社群媒體平台成為認知域作戰主戰場。在近年來發生的多起「顏色革命」中,臉書、推特、優兔等社群媒體在西方國家操縱下,在輿論傳播、組織抗議、動員民眾等方面發揮了重要作用。據悉,在類似行動中臉書往往用來確定日程,推特用來協調行動,優兔用來廣泛傳播。未來的認知域作戰,十分強調著眼目標對象社交習慣和特點,充分掌握目標對象的社交圈、生活圈,從線上線下、軍用民用等多渠道選擇信息投送方式,從而確保認知信息的送達率。

追蹤認知動態,把準資訊投送時機。認知的改變,並非一蹴而就,一味地追求高節奏、瞬間達成目的反而會起到反面效果。因此,認知域作戰要掌握好「時間沉浸」的節奏與力度,根據目標對象認知動態選準投送時間,逐步漸進地謀求擴大效果優勢。在目標對像對某一事件還未形成初步認知前,要積極搶佔信息的發布優先權,第一時間進行信息“轟炸”,力求“先發製人、先入為主”。此外,在事件的輿論發酵階段,主體的認知還未徹底固化,此時透過不斷重復傳播某個特定訊息,也可以達到潛移默化地重構主體認知的目的。

(作者單位:國防科技大學)

中國軍事資料來源:https://www.81.cn/yw_208727/16209631.html

How the Chinese Military Identify Key Targets for Cognitive Domain Operations

中國軍隊如何辨識認知域作戰的關鍵目標

現代英語:

Cognitive domain combat targets refer to the specific role of cognitive domain combat. In cognitive domain combat, compared with combat targets, combat targets solve the problem of precise aiming, that is, to let commanders understand and grasp the precise coordinates of what to hit, where to hit, and to what extent. Only by deeply understanding the connotation and characteristics of cognitive domain combat targets can we accurately find key targets through appearances and thus seize the initiative in future combat.

Cognitive focus that influences behavioral choices

The cognitive focus is the “convergence point” of the cognitive subject’s multi-dimensional thinking cognition in war activities. As a dynamic factor, it affects the cognitive process and behavioral results. Generally speaking, the cognitive factors that affect individual behavioral choices in war activities mainly include political attribute cognition, interest-related cognition, group belonging cognition, risk loss cognition, emotional orientation cognition, war morality cognition, etc. For war activities and groups or individuals who pay attention to war activities, the cognitive focus that affects their attitudes, tendencies and behaviors is not the same. Judging from the local wars and regional conflicts in the world in recent years, there are obvious differences in the cognitive focus of different groups or individuals. Politicians pay more attention to political attribute cognition and interest-related cognition, those who may intervene in the war pay more attention to risk loss cognition and interest-related cognition, ordinary people pay more attention to interest-related cognition and emotional orientation cognition, and people in other countries outside the region generally pay more attention to war morality cognition and group belonging cognition because their own interests will not be directly lost. In combat practice, foreign militaries are good at targeting the cognitive focus of different objects, accurately planning topics, and pushing related information to induce specific behavioral choices. For example, before the Gulf War, the Hill Norton public relations company fabricated the non-existent “incubator incident” by using Naira, the daughter of the Kuwaiti ambassador to the United States, as a “witness” to show the “inhumanity” of the Iraqi army, induce the American people’s ethical and moral cognition, and then support the US government to send troops to participate in the Gulf War.

Style preferences that constrain command decisions

Cognitive style directly affects decision-making behavior preferences. Cognitive style refers to the typical way of individual cognition, memory, thinking, and problem solving. According to the preference of command decision-making style, commanders can be divided into calm cognitive style and impulsive cognitive style. Commanders with calm cognitive style pay attention to accuracy but not speed in the decision-making process. The quality of the decisions they make is high, but they are prone to fall into the comparison and analysis of various intelligence information sources and overemphasize the accuracy and objectivity of information analysis. Commanders with calm cognitive style are often easily disturbed by the diverse and diverse information stimulation in battlefield cognitive offensive and defensive operations, and their mental energy is easily disturbed and dissipated, which may lead to missed opportunities. Commanders with impulsive cognitive style pay attention to speed but not accuracy. The decision-making reaction speed is fast, but the quality is not high. They are easily emotional and prone to conflict with team members. Commanders with impulsive cognitive style are also prone to over-interpret the ambiguous external security environment, and constantly look for “evidence” to strengthen and verify individual erroneous thinking, narrowing individual attention and leading to command decision-making deviations. In combat practice, foreign armies pay more attention to analyzing the decision-making style of commanders of combat opponents, and then select specific information to influence them psychologically. For example, during the U.S. invasion of Panama, when besieging the hiding place of Panamanian President Noriega, the U.S. military repeatedly played rock and heavy metal music, and used language that stimulated and humiliated Noriega to carry out cognitive and psychological attacks on him, causing Noriega to gradually collapse physically and mentally.

Backdoor channel to control thinking and cognition

Once a computer is infected with a “Trojan” virus, it will send a connection request to the hacker control terminal at a specific time. Once the connection is successful, a backdoor channel will be formed, allowing the hacker to control the computer at will. Similarly, the human brain also has a cognitive “backdoor” and may be controlled by others. Cognitive psychologists have found that by sending information to the target object’s audio-visual perception channel, carefully pushing information content that the target object recognizes and accepts, catering to the target object’s existing experience memory, conforming to the target object’s thinking habits, and stimulating the target object’s emotional pain points, it is possible to control and interfere with the target object’s cognition and promote its instinctive emotional and behavioral reactions. With the support of cutting-edge cognitive science and technology, using the two modes of automatic start and control processing of brain information processing, the target object can easily fall into a “cognitive cocoon”. In cognitive domain operations, by immersing individuals in massive amounts of artificially constructed information, and continuously providing them with “evidence” to prove that their judgments and cognitions are “correct”. Over time, the individual’s cognitive vision becomes smaller and smaller, and the ability to perceive the external environment gradually decreases. Eventually, they will not be able to see the truth of the matter and will be immersed in the “cognitive cocoon” and unable to extricate themselves. When foreign militaries conduct operations in the cognitive domain, they often target their opponents’ cognitive biases on a certain issue and continuously push situational information and intelligence information through various channels to support their opponents’ so-called “correct cognition,” causing errors and deviations in their opponents’ command decisions.

Sensory stimuli that induce attention

Effective perceptual stimulation is the first prerequisite for attracting the attention of the target object. The human brain will perceive and react to stimuli within the perceptual range. Cognitive psychology experimental research has found that information such as dynamic, dangerous, relevant, survival safety, and contrast between before and after is more likely to attract the attention of the human brain. In the era of intelligence, the psychological cognitive process of the target object often follows the law of “attracting attention, cultivating interest, actively searching, strengthening memory, actively sharing, and influencing others”. In combat, foreign troops often use exclusive revelations, intelligence leaks, authoritative disclosures, on-site connections, and other methods, and cleverly use exaggeration, contrast, association, metaphor, suspense, and contrast to push information that subverts common sense, cognitive conflicts, and strong contrasts to attract the attention of the target object. For example, the “Lin Qi rescue incident” created by the US military in the Iraq War and the “Gaddafi Golden Toilet” in the Libyan War mostly choose stories familiar to the audience as the blueprint, hiding the purpose and embedding the viewpoint in the story plot, which attracted the attention of the general public. In addition, the human brain will also process stimuli outside the perceptual range. In recent years, the military of Western countries has attached great importance to the research of subthreshold information stimulation technology, and has developed subthreshold visual information implantation technology, subthreshold auditory information implantation technology, subthreshold information activation technology, subconscious sound manipulation technology of the nervous system, etc., continuously expanding the application scope of neurocognitive science and technology in the military field.

Meta-value concepts that give rise to cognitive resonance

In cognitive theory, cognitive resonance refers to information that can cross the cognitive gap between the two parties and trigger the ideological and psychological resonance and cognitive empathy of both parties, thereby achieving the deconstruction and reconstruction of the other party’s cognitive system. In cognitive domain warfare, this cognitive energy-gathering effect is not a simple concentration of power, but an internal accumulation of system synergy. Under the diffusion and dissemination of modern information media, this cognitive resonance effect can spread rapidly to all parts of the world in a short period of time, and produce secondary indirect psychological effects or more levels of derivative psychological effects, presenting a state of cumulative iteration. Once it exceeds the psychological critical point, it will present a state of psychological energy explosion, thereby changing the direction or outcome of the event. The targets that can induce this cognitive resonance are mainly value beliefs, moral ethics, common interests, etc. In war, if one party touches or violates human meta-values, common emotional orientation, etc., it is very easy to induce collective condemnation, bear the accusation of violating human morality, and fall into a moral trough. For example, a photo during the Vietnam War shows a group of Vietnamese children, especially a 9-year-old girl, running naked on the road because of burns after being attacked by US napalm bombs. In 1972, this photo caused a huge sensation after it was published, setting off an anti-war wave in the United States and even the world, and accelerating the end of the Vietnam War.

Cognitive gaps in a split cognitive system

In daily life, seemingly hard steel is very easy to break due to the brittleness of the material due to factors such as low temperature environment, material defects, and stress concentration. The same is true for the cognitive system. Cognitive gaps refer to the cracks, pain points, weaknesses, and sensitive points in the cognitive thinking of the target object, which are mainly manifested as the individual’s worry that he is unable to cope with or adapt to the environment, and under the influence of anxiety, cognitive vulnerability is formed. The experience of security threats, the looseness of group structure, the confusion of beliefs and ideals, and the loss of voice of authoritative media will all cause cognitive conflicts and tearing of the target object. In cognitive domain operations, sometimes seemingly powerful combat opponents hide a large number of thinking cracks and psychological weaknesses behind them. Often a news event can shake the cognitive framework of the combat opponent and puncture the cognitive bubble. In addition, this cognitive psychological conflict will also cause moral damage and psychological trauma to individuals. In recent years, the U.S. and Western countries’ troops carrying out overseas missions have faced “enemies disguised as civilians” that appear anytime and anywhere, and their uncertainty about the battlefield environment has continued to increase. They generally lack the perception of the significance of combat, and are filled with guilt and sin. A large number of soldiers developed post-traumatic stress disorder, the number of self-harm on the battlefield, post-war suicides and crimes increased sharply, and the number of suicides among veterans of the war even exceeded the number of deaths on the battlefield.

(Author’s unit: Political Science Academy of National Defense University)

國語中文:

引言

認知域作戰標靶是指認知域作戰的具體作用指向。在認知域作戰中,相較於作戰對象,作戰標靶解決的問題是精確瞄準,也就是讓指揮官了解掌握具體打什麼、往哪裡打、打到什麼程度的精準座標問題。只有深刻理解認知域作戰標靶的內涵特點,才能透過表象準確找到關鍵標靶,以便在未來作戰中掌握先機。

影響行為選擇的認知重心

認知重心是戰爭活動中認知主體多元思維認知的“匯聚點”,作為一種能動因素影響認知進程和行為結果。一般而言,影響戰爭活動中個人行為選擇的認知因素,主要包含政治屬性認知、利益關聯認知、群體歸屬認知、風險損失認知、情緒定向認知、戰爭道德認知等。對於戰爭活動以及關注戰爭活動的群體或個體而言,影響其態度、傾向和行為的認知重心並不相同。從近年來的世界局部戰爭和地區衝突來看,不同群體或個體關注的認知重心有著明顯差異,政治人物更加關注政治屬性認知和利益關聯認知,戰爭可能介入者更關注風險損耗認知和利益關聯認知,一般民眾更關注利益關聯認知和情感定向認知,而域外他國民眾由於自身利益不會受到直接損失,普遍更關注戰爭道德認知和群體歸屬認知。外軍在作戰實踐中,善於針對不同對象的認知重心,精準策劃主題,推送關聯訊息,誘發特定的行為選擇。如同在海灣戰爭前,希爾·諾頓公關公司炮製了根本不存在的“育嬰箱事件”,就是利用科威特駐美大使的女兒娜伊拉“做證”,展現伊拉克軍隊的“慘無人道”,誘發美國民眾的倫理道德認知,進而支持美國政府派兵參加海灣戰爭。

制約指揮決策的風格偏好

認知風格直接影響決策行為偏好。認知風格是指個體認知、記憶、思考、解決問題的典型方式。根據指揮決策風格偏好,指揮家可以分為冷靜型認知風格和衝動型認知風格。冷靜型認知風格的指揮者在決策過程中重視準確但不重視速度,作出的決策品質較高,但容易陷入對各類情報資訊來源的比對分析,過度強調資訊分析的準確客觀。冷靜型認知風格的指揮在戰場認知攻防行動中,常常容易受到紛繁多元的信息刺激幹擾,心智精力容易被擾亂和耗散,進而可能貽誤戰機。衝動型認知風格的指揮者重視速度但不重視準確度,作出的決策反應速度較快,但品質不高,且容易情緒激動,易與團隊成員發生衝突。衝動型認知風格的指揮者也容易將模稜兩可的外在安全環境進行過度曲解,並不斷尋找「證據」強化和驗證個體錯誤思維,使個體注意力變窄,導致出現指揮決策偏差。外軍在作戰實務中,比較著重分析作戰對手指揮官決策風格,進而選擇特定資訊對其進行心理影響。如美軍入侵巴拿馬戰爭中,在圍攻巴拿馬總統諾列加躲藏處時,美軍反複播放搖滾和重金屬音樂,運用刺激和羞辱諾列加的語言對其進行認知打擊和心理進攻,使諾列加身心逐漸崩潰。

控制思維認知的後門通道

電腦一旦中了「木馬」病毒,會在特定時間向駭客控制端發送連線請求,一旦連線成功就會形成後門通道,使得駭客可以隨心所欲地控制電腦。與之相似,人類大腦也存在認知“後門”,也可能被他人控制。認知心理學家研究發現,透過給目標對象視聽感知通道發送訊息,精心推送目標對象認可的、接受的信息內容,迎合目標對像已有的經驗記憶,順應目標對象思維習慣,刺激目標對象的情感痛點,就可以控制干擾目標物認知,促進其產生本能情緒行為反應。在尖端認知科學技術的支撐下,運用大腦資訊加工的自動啟動和控制加工兩種模式,目標物很容易陷入「認知繭房」之中。認知域作戰中,透過讓個體沉浸在人為構設的海量資訊之中,並源源不斷地為其提供「證據」用來佐證其判斷和認知是「正確」的。長此以往,個體的認知視野就變得越來越小,對外在環境的感知能力逐漸降低,最終會看不到事情的真相,沉湎於「認知繭房」中無法自拔。外軍在認知域作戰中,常常針對作戰對手對某一問題的認知偏差,持續透過多種管道推送佐證作戰對手自以為「正確認知」的態勢訊息和情報訊息,使作戰對手指揮決策出現失誤和偏差。

誘發關注的感知覺刺激

有效的知覺刺激是引發目標對象關注的首要前提。人類大腦對感知覺範圍內的刺激會有所察覺,並做出各種反應。認知心理學實驗研究發現,動態、危險、利害關係人、生存安全、前後反差等類別資訊更容易引起人類大腦的注意。在智慧化時代,目標對象的心理認知過程往往遵循「引起注意、培養興趣、主動搜尋、強化記憶、主動分享、影響他人」的規律。外軍在作戰中,常運用獨家爆料、情報外洩、權威揭露、現場連線等方式,巧用誇張、對比、聯想、比喻、懸念、襯託等手法,推播顛覆常識、認知衝突、對比強烈等訊息,來引發目標對象注意。例如伊拉克戰爭中美軍塑造的“營救女兵林奇事件”,利比亞戰爭中的“卡扎菲黃金馬桶”,大多選擇受眾對象熟知的故事為藍本,藏目的、寓觀點於故事情節,吸引了廣大民眾的注意力。此外,人類大腦也會對感知覺範圍外的刺激進行加工。近年來,西方國家軍隊非常重視知覺閾下資訊刺激技術的研究,開發發展了閾下視覺訊息植入技術、閾下聽覺訊息植入技術、閾下訊息啟動技術、神經系統潛意識聲音操控技術等,不斷擴大神經認知科學技術在軍事領域的應用範圍。

催生認知共振的後設價值概念

認知理論中,認知共振是指跨越雙方認知鴻溝,能夠引發雙方思想心理與認知共鳴共感的訊息,進而實現對對方認知體系的解構與重建。在認知域作戰中,這種認知聚能效應不是簡單意義上的力量集中,而是體系合力的內在累積。在現代資訊傳媒的擴散傳播作用下,這種認知共振效應能在短時間內迅速擴散到全球各地,並產生二次間接心理效應或更多層次的衍生心理效應,呈現出一種累積迭代的狀態,一旦超過心理臨界點,即呈現出心理能量爆發狀態,從而改變事件走向或結果。能夠誘發這種認知共振的靶標,主要有價值信念、道德倫理、共通利益等。戰爭中,若某一方觸及或違反人類元價值觀、共同情感指向等,則極易誘發集體聲討,承擔違背人類道德的指責,陷於道義低谷。如越戰期間的一張照片,畫面呈現的是遭遇美軍凝固汽油彈襲擊後,一群越南孩子特別是一名9歲女孩在公路上因為燒傷而裸體奔跑。 1972年,這張照片刊登後引發巨大轟動,掀起美國乃至全球的反戰浪潮,加速了越戰的結束。

分裂認知體系的認知縫隙

日常生活中,看似堅硬的鋼鐵,受低溫環境、材質缺陷、應力集中等因素影響,非常容易因材料脆性而斷裂,認知體係也是如此。認知縫隙是指目標對象認知思考中的裂縫、痛點、弱點與敏感點,主要表現為個體擔心自己沒有能力應對或無法適應環境的想法,並在焦慮情緒的作用下,構成認知脆弱性。安全威脅的經驗、團體結構的鬆散、信念理想的迷惘、權威媒介的失聲等,都會使得目標物出現認知上的衝突與撕裂。認知域作戰中,有時看似強大的作戰對手,背後卻潛藏著大量的思維裂隙與心理弱點,往往一個新聞事件就能動搖作戰對手的認知框架,刺破認知泡沫。此外,這種認知心理衝突也會使個體產生道德損傷和心理創傷。近年來,執行海外任務的美西方國家軍隊面對隨時隨地出現的“偽裝成平民的敵人”,對戰場環境的不確定感不斷提升,普遍缺乏作戰意義感知,進而內心充滿內疚與罪惡。大量士兵產生戰爭創傷後壓力障礙,戰場自殘自傷、戰後自殺與犯罪人數激增,參戰老兵自殺人數甚至超過戰場死亡人數。

(作者單位:國防大學政治學院)唐國東

中國軍網 國防部網 // 2023年3月23日 星期四

中國原創軍事資源:https://www.81.cn/jfjbmap/content/2023-03/23/content_336888.htm

People’s Liberation Army Looking ahead to the “Battlefield Metaverse”

解放軍展望“戰場元宇宙”

現代英語:

Recently, the “metaverse” has become a hot topic of concern. On November 26 last year, this edition published an article titled “Unveiling the Veil of the Metaverse”, which mentioned the concept of the “battlefield metaverse”.

Simply put, the “metaverse” will be the ultimate form of the next generation of the Internet. It is a virtual world that is parallel and isomorphic to the real world, with main features such as multi-dimensionality, full sensory perception, virtual-real integration, and seamless interaction. The “battlefield metaverse” is the manifestation of the “metaverse” in the military field, with stricter security and confidentiality standards, more powerful simulation computing capabilities, more real-time and sophisticated interaction requirements, and more prominent battlefield time consistency, virtual-real integration, boundary security, decision-making intelligence, and performance fidelity.

Imagine a typical application scenario

We can preliminarily outline the outline of the “battlefield metaverse” by imagining a typical military training application scenario in the future:

An aircraft carrier fleet was cruising in a certain sea area. Suddenly, in the fleet command room, a virtual AI staff officer projected a virtual figure through the “Battlefield Metaverse” terminal, making a clear voice to convey the upper level’s combat readiness inspection instructions.

The fleet commander immediately issued an “exercise combat alert” command to the fleet according to the plan. The fleet’s combat command and control system began to automatically receive combat missions and battlefield situations sent by the “Battlefield Metaverse” terminal. Except for the personnel on duty at the bridge of each ship in the fleet who continued to cruise and guard according to the scheduled route, all other personnel were transferred to the combat scene set by the “Battlefield Metaverse”.

On the flight deck of an aircraft carrier, all deck workers immediately put on enhanced terminals of the “Battlefield Metaverse” after hearing the “combat alert”. Depending on the login user ID, the corresponding virtual information in the “Battlefield Metaverse” is seamlessly superimposed on the workers’ field of vision, supporting the deck workers to complete relevant practical operations in the real world.

Under the unified command of the flight deck commander, all deck operators perform virtual and real integrated deck operations for various types of carrier-based aircraft in accordance with combat mission requirements and carrier-based aircraft take-off procedures, including refueling, bomb loading, towing, safety inspection, ejection, recovery, and ammunition emergency disposal.

In the flight briefing room, all pilots of various types of carrier-based aircraft participating in this mission have put on the immersive terminals of the “Battlefield Metaverse” and entered the cockpit of the virtual world, waiting for their carrier-based aircraft to complete take-off preparations.

In the cockpit of the virtual carrier-based fighter, an AI assistant with the same configuration as the actual carrier-based aircraft is confirming the status of the aircraft with the pilot and planning the upcoming combat operations according to the combat mission received. During the combat mission, the virtual carrier-based fighter can equivalently feedback the situation information of the enemy and our own reconnaissance, electronic interference, combat damage, etc., providing real-time information for the pilot to make decisions and take actions…

It can be seen from the above typical application scenarios that the “battlefield metaverse” requires a large number of revolutionary breakthroughs in key technologies as its basic support, including VR/AR/MR technology, digital twin technology, cloud computing technology, blockchain technology, high-speed network technology, AI technology, etc.

Construction requires many basic conditions

Compared with the “metaverse” that is open to the public and reconstructs the network ecology, the “battlefield metaverse” needs to be developed based on the actual topological structure of the military network and the construction results of various military information systems, and has higher requirements on key technical indicators. Specifically, the construction of the “battlefield metaverse” should have at least the following basic conditions:

– Independent network communication links. The “Battlefield Metaverse” is an independent form built on the military high-speed network architecture and infrastructure, which is significantly different from the design concept of the “Metaverse” global access. Users of the “Battlefield Metaverse” need to verify and log in through a secure military network node in a relatively fixed place or area. The remote wireless network link is not open to the outside world and has the ability to resist communication interference and network attacks.

——Strict identity authentication mechanism. All individual users accessing the “Battlefield Metaverse” are required to be military personnel who have passed confidentiality review and military scientific research personnel with confidentiality qualifications. The authentication information of all types of users cannot be tampered with, fabricated, or misused in the “Battlefield Metaverse”. All user operations will be recorded in detail in the “Battlefield Metaverse” to facilitate tracking and analysis by the operation and maintenance security department, and any illegal users and operations will have no chance to take advantage.

——Diverse user access capabilities. Users who access the “Battlefield Metaverse” can be divided into individual users, equipment users, and system users according to their types. Among them, individual users are organic individuals who directly enter the “Battlefield Metaverse” activities; equipment users and system users are key digital equipment and information systems that need to access the “Battlefield Metaverse”, and their operators or maintenance personnel participate in the activities in the “Battlefield Metaverse” in an indirect way through operational control behaviors in the real world.

——Clear command, coordination and interaction relationship. Different from the high degree of freedom of ordinary users in the “metaverse”, all types of users in different locations in the “battlefield metaverse” participate in specific activities, play designated roles or undertake major tasks, which are uniformly planned, deployed and coordinated by the only event organizer. Before each activity is launched, the event organizer determines the user identification, command relationship, coordination relationship, information interaction permissions, etc. of the participants based on the elements required to achieve the goal.

——Immersive real-time interaction capabilities. Individual users who access the “Battlefield Metaverse” need to log in through a human-computer interaction terminal and achieve real-time interaction with the “Battlefield Metaverse” and other users in the real world. In addition to having basic immersive interaction and time-based functions, terminal devices also need to enhance the user’s operational freedom and sensitivity, so that users can operate and use a variety of weapons, equipment and information systems in the “Battlefield Metaverse”.

——Powerful AI individuals. Similar to the “metaverse”, AI individuals with intelligence and autonomous behavior capabilities will act as permanent residents in the “battlefield metaverse”. They can play the role of virtual red team, blue team, and third-party entities to participate in combat, training and test tasks, and can also play the role of instructors, examiners, staff, system operation and maintenance personnel, etc., to assist individual users in making decisions and taking actions.

——Realistic performance simulation capability. All weapons, equipment and information systems mapped into the “Battlefield Metaverse” need to have functional performance and consistent operation methods equivalent to those in the real world. Through signal-level simulation models and performance algorithms, simulation of reconnaissance detection effectiveness, electronic countermeasure effectiveness, firepower strike effectiveness and comprehensive protection effectiveness can be achieved, ensuring that the experience accumulated by individual users in the “Battlefield Metaverse” can guide actual combat operations.

——Flexible scenario generation capability. The “Battlefield Metaverse” needs to set a battlefield area for each activity, including the geographical environment, electromagnetic environment, meteorological environment, and hydrological environment of the area. Its scenario data is required to be more real and accurate, and requires institutions with relevant qualifications to build and maintain it step by step.

Application, bringing significant benefits in multiple fields

In the future, the “metaverse” may first be applied to areas such as online social networking, online games, and online economy, becoming the starting point for the virtualization of human society.

After the “Battlefield Metaverse” is built, it will have a huge impact on the application fields of education, training, testing, research, etc. of the troops, greatly change the original methods of organizing and implementing activities, significantly improve the comprehensive benefits of various military activities, and effectively stimulate the innovation capabilities of military personnel and scientific researchers.

In the field of education, the “Battlefield Metaverse” can play an important role in centralized education in colleges and universities, in-service distance education, etc. The teachers and students can interact and communicate with each other freely in different locations, which is conducive to creating a harmonious and relaxed teaching atmosphere. On the one hand, the teachers can use more powerful teaching content to demonstrate their teaching ability and achieve more vivid teaching effects; on the other hand, the students can recognize and understand the problems more intuitively, effectively improving their personal interest in self-study and subjective initiative.

In the field of training, the “Battlefield Metaverse” can fully meet the requirements of actual combat training in the context of large-scale combat. Participants at all levels can play the roles of their current positions or proposed positions, and repeatedly receive training and assessments in a larger, more confrontational, and longer-lasting environment. While honing combat skills, honing tactical coordination, and forging combat will, they can apply the accumulated simulated combat experience to actual combat operations. The evaluation of training effects will also be more quantitative and intuitive, which is more conducive to selecting talents.

In the field of testing, the “Battlefield Metaverse” can provide a practical background and large-scale test scenarios with equivalent simulation capabilities for the design and demonstration of new weapons and equipment, weapons and equipment performance testing, weapons and equipment compatibility testing, and weapon system combat effectiveness testing. It can bring virtual and real equipment into a peer environment to operate together, and fully grasp the various states and parameter changes of the equipment, thereby effectively solving practical problems such as limited test times, simple test links, low complexity of the test background, and difficulty in building a combat system.

In the field of research, the “Battlefield Metaverse” can provide a public platform for remote simulation and verification for the use of new equipment and innovation of tactics. On the basis of coordinating expert resources from various regions and centrally calling simulation computing power, virtual AI is used to play the combat forces of all parties, conduct uninterrupted simulation calculations, obtain massive data samples, and mine and analyze knowledge and conclusions that meet the research objectives. During the research process, researchers can also communicate and collaborate with relevant experts, intervene in real time and improve the simulation elements to ensure that the research results can stand the test of actual troops.

From the perspective of system architecture and functional characteristics, although the “Battlefield Metaverse” cannot directly affect actual combat operations, it can serve as a backup for wartime command and communication networks. When the command and communication network is paralyzed by enemy network attacks or key nodes are damaged by attacks, combat troops can try to access the communication link of the “Battlefield Metaverse” to ensure the most basic combat command and information exchange.

The above picture is a schematic diagram of the “Battlefield Metaverse”.

Gaosong System

國語中文:

近期,「元宇宙」成為人們關注的熱點。本版去年11月26日曾刊登《揭開「元宇宙」面紗》一文,並提到了「戰場元宇宙」概念。

簡單地說,「元宇宙」將是下一代網路的終極形態,是與現實世界平行同構的一個虛擬世界,具備多維度、全感官、虛實融合、無縫互動等主要特徵。 “戰場元宇宙”,則是“元宇宙”在軍事領域的表現形態,具有更嚴格的安全保密標準、更強大的仿真計算能力、更實時的精細交互要求,更突出的戰場時統一致性、虛實一體性、邊界安全性、決策智能性、效能逼真性。

設想,一個典型應用場景呈現

我們可透過假想未來一個典型軍事訓練應用場景,初步描繪出「戰場元宇宙」的輪廓——

一支航母編隊正在某海域巡航。突然,編隊指揮室內,虛擬的AI參謀透過「戰場元宇宙」終端,投射生成一個虛擬人影,發出清脆聲音,傳達上一級戰備檢查指令。

編隊指揮官立即依照預案,向編隊下達「演習戰鬥警報」命令。編隊作戰指控系統開始自動接收「戰場元宇宙」終端發送的作戰任務和戰場態勢,除編隊各艦艦橋部位的值更人員按照預定航線繼續進行巡航和警戒外,其餘人員全部轉入「戰場元宇宙」設定的作戰場景之中。

在航空母艦飛行甲板上,所有甲板作業人員在聽到「戰鬥警報」後,立即穿戴好「戰場元宇宙」的增強型終端,根據登入使用者ID的不同,「戰場元宇宙」中對應的虛擬資訊無縫疊加至作業人員視野,支撐甲板作業人員在真實世界完成相關實作動作。

在飛行甲板指揮官統一指揮下,所有甲板作業人員依照作戰任務要求和艦載機起飛流程,對各型艦載機進行虛實融合的甲板作業,包括加油、掛彈、牽引、安全檢查、彈射、回收、彈藥緊急處置等內容。

飛行簡報室內,所有參與本次任務的各型艦載機飛行員已穿戴好「戰場元宇宙」的沉浸型終端,進入虛擬世界的駕駛座艙中,等待自己的艦載機完成起飛準備。

虛擬的艦載戰鬥機座艙內,一位與艦載機實裝配置相同的AI助理正在向飛行員確認飛機的各項狀態,並根據受領的作戰任務,籌劃即將開始的作戰行動。在執行作戰任務期間,虛擬艦載戰鬥機能等效反饋敵我雙方的偵察探測、電子乾擾、交戰毀傷等態勢信息,實時供飛行員決策判斷和採取行動…

透過上述典型應用場景可以看出,「戰場元宇宙」需要大量關鍵技術的革命性突破作為基礎支撐,包括VR/AR/MR技術、數位孿生技術、雲端運算技術、區塊鏈技術、高速網路技術、AI技術等。

構建,需要具備許多基本條件

相較於面向大眾、重構網路生態的“元宇宙”,“戰場元宇宙”需要在軍用網路實際拓撲結構和各類軍用資訊系統的建設成果上展開,對關鍵技術指標上的要求更高。具體來說,建構「戰場元宇宙」應至少具備以下基本條件:

——獨立的網路通訊鏈路。 「戰場元宇宙」是建立在軍用高速網路架構和基礎設施上的獨立形態,與「元宇宙」全球隨遇接入的設計理念有明顯差異。 「戰場元宇宙」的使用者需要在相對固定的場所或區域,透過安全的軍用網路節點進行驗證登入。遠端無線網路連結不對外開放,並具備抵禦通訊幹擾和網路攻擊能力。

——嚴格的身份認證機制。所有接取「戰場元宇宙」的個人用戶,均要求是透過保密審查的軍方人員和具備保密資質的軍工科研人員。所有類型用戶的認證資訊在「戰場元宇宙」中不可篡改、虛構、冒用,所有用戶的操作行為在「戰場元宇宙」中將被詳細記錄,以利於運維安全部門追蹤分析,任何非法用戶及操作均無機可乘。

——多樣化的用戶接入能力。接取「戰場元宇宙」的用戶,依類型可分為個人用戶、裝備用戶及系統用戶等。其中,個人使用者是直接進入「戰場元宇宙」活動的有機個體;裝備使用者和系統使用者則是需要連接「戰場元宇宙」的關鍵數位化裝備和資訊化系統,其操作或維運人員透過在現實世界中的操作控制行為,以間接方式參與「戰場元宇宙」內的活動。

——明確的指揮協同互動關係。與「元宇宙」中普通用戶高自由度不同,異地分佈的所有類型用戶在「戰場元宇宙」中參與的特定活動、扮演的指定角色或擔負的主要任務,均由唯一的活動組織者進行統一籌劃、部署和協調。在每項活動展開前,由活動組織者圍繞達成目標所需的要素,確定參與活動的使用者標識、指揮關係、協同關係、資訊互動權限等。

——沉浸式的即時互動能力。接取「戰場元宇宙」的個人用戶,需透過人機互動終端進行登錄,並與「戰場元宇宙」及現實世界中其他用戶達成即時互動。終端設備在具備基本的沉浸式互動功能和時統功能基礎上,也需要強化使用者的操作自由度和靈敏度,以便於使用者在「戰場元宇宙」中操作使用各式各樣武器裝備和資訊系統。

——強大的AI個體。與「元宇宙」類似,具備智慧和自主行為能力的AI個體,將作為「戰場元宇宙」中永久居民進行活動,既可扮演虛擬的紅方、藍方、第三方實體,參與到作戰、訓練和試驗任務中,也可扮演教官、考官、參謀、系統維運人員等角色,輔助個人使用者進行決策與行動。

——逼真的效能模擬能力。所有映射到「戰場元宇宙」中的武器裝備和資訊系統,均需要具有與真實世界等效的功能性能和一致的操作方法。透過訊號級的模擬模型和效能演算法,實現對偵察探測效能、電子對抗效能、火力打擊效能和綜合防護效能的仿真,確保個人用戶在「戰場元宇宙」中累積的經驗能指導實際作戰行動。

——靈活的場景生成能力。 「戰場元宇宙」需要針對每次活動,設定戰場區域,包括該區域地理環境、電磁環境、氣象環境和水文環境等。其情境資料需求更真實且準確,需要具備相關資格的機構進行逐步建置與持續維護。

應用,多個領域帶來顯著效益

未來,「元宇宙」可能首先應用於網路社交、網路遊戲、網路經濟等領域,成為人類社會虛擬化起點。

「戰場元宇宙」建成後,則會對部隊的教育、訓練、試驗、研究等應用領域帶來巨大影響,極大改變原有的活動組織實施方式,顯著提升各類軍事活動的綜合效益,有效激發軍事人員和科學研究人員的創新能力。

在教育領域,「戰場元宇宙」能在院校集中教育、在職遠距教育等方面發揮重要作用,施教方與受教方在不同地點就能進行自由度極高的互動交流,有利於營造和諧輕鬆的授課氛圍。一方面,施教方能利用更強大的教學內容來展現宣講能力,達成更生動的宣教效果;另一方面,受教方能更直觀地認識和理解問題,有效提升個人自學興趣和主觀能動性。

在訓練領域,「戰場元宇宙」能充分滿足大規模作戰背景下的實戰化訓練要求,各級參訓對象可透過扮演現任職位或擬任崗位的角色,在更大規模、更具對抗性、在更長持續時間的環境中,反覆接受訓練與考核,在錘鍊戰鬥技巧、磨合戰術配合、鍛造戰鬥意志的同時,將累積的模擬作戰經驗應用到實際作戰行動中。訓練效果的評鑑也將更量化直觀,更有利於選賢任能。

在試驗領域,「戰場元宇宙」能為新型武器裝備設計論證、武器裝備性能試驗、武器裝備相容性試驗、武器系統體係作戰效能檢驗等,提供具備等效模擬能力的實戰化背景及大規模試驗場景,將虛實裝備納入對等的環境中共同運行,並全面掌握裝備的各種狀態和參數的變化情況,從而有效解決試驗次數受限、試驗環節簡單、試驗背景複雜度低、作戰體系構建困難等現實問題。

在研究領域,「戰場元宇宙」能為新型裝備運用和戰法創新提供遠端推演驗證的公共平台。在協調各地專家資源與集中調用模擬算力的基礎上,利用虛擬AI扮演各方作戰力量,進行不間斷推演計算,得出海量資料樣本,並從中挖掘分析出符合研究目標的知識和結論。在研究過程中,研究人員還可與相關專家共同交流協作,即時介入並完善推演要素,以確保研究成果經得起實兵檢驗。

從體系架構和功能特性來看,「戰場元宇宙」雖然無法直接影響實際作戰行動,但可作為戰時指揮通訊網路的備份手段。當指揮通訊網路遭受敵方網路攻擊而癱瘓或關鍵節點遭受打擊被損毀時,作戰部隊可嘗試接取「戰場元宇宙」的通訊鏈路,確保最基本的作戰指揮和資訊互動。

上圖為「戰場元宇宙」示意圖。

高 嵩制

中國軍事資料來源:https://www.81.cn/jfjbmap/content/2022-01/21/content_307950.htm

Chinese Military Training and the Metaverse: Challenges & Opportunities Coexist

中國軍事訓練與虛擬世界:挑戰與機會並存

現代英語:

 In the field of military training, the basic technology of the Metaverse has long been used as a virtual resource by the military to varying degrees. It must be acknowledged that the value and potential of the Metaverse in military training is immeasurable and is the focus of current and future military competition. However, due to the immaturity of the development of Metaverse-related technologies and their application in military training, the bright prospects are accompanied by potential risks.

1. The past and present of the military training metaverse
       
 The metaverse relies on a technology group with virtual reality technology as its core. In its early form in the military field, it is also called virtual simulation or simulated Internet. It can be said that virtual simulation training is very close to today’s concept of the metaverse and is the primary form of the military training metaverse. From ancient times to the present, the progress that has brought great influence in the field of science and technology is generally for winning wars or maintaining combat effectiveness. As the leading technology of the third scientific and technological revolution, the metaverse is used for military training in different forms of basic metaverses in the global military field.
      The US military began to deploy the “Military Metaverse” plan very early. In 1978, Jack Thorpe, a captain of the US Air Force, proposed the idea of ​​a military simulator network in his paper, hoping to establish a distributed or networked military modeling system to facilitate training. In 1983, the Advanced Research Projects Agency (DARPA) of the US Department of Defense developed the Virtual Battlefield Network Simulator (SIMNET Simulator), which uses computers to generate virtual battlefields, simulate the situation of fighting between the two sides, and summarize errors and failures. Replacing field exercises in this way saves costs to a certain extent and improves the effectiveness of training. Although the SIMNET simulator, as the earliest version, was still at a lower level of battlefield simulation, it pioneered distributed or networked modeling and simulation. By the end of the 1980s, the project reached its peak, and eventually more than 200 simulated interconnected tank and aircraft simulators based on local area networks and wide area networks were formed across the United States and across Europe, and used for large-scale training and exercises. The distributed interactive simulation (DIS) protocol developed at that time is still in use today, and through more advanced high-level architectures, different military simulations can be linked to provide a richer collective training or mission preparation experience. It can be said that the SIMNET simulator project directly or indirectly promoted the development of many key technologies of the current metaverse. Today, the US military is very interested in the metaverse that has sprung up like mushrooms after rain. The newly established military branch, the United States Space Force (USSF), wants to create a military-specific metaverse for collaborative operations, training, and mission execution. Its chief technology officer, Lisa Costa, declared: “Soldiers cannot go to space in person. The only way they can experience their own combat territory is through visual data display. The virtual reality environment will provide them with situational awareness and understand their options in order to make decisions.”
       In recent years, virtual reality and augmented reality technologies of the metaverse have been incorporated into the regular military training of the US military. In 2014, the BlueShark project developed by the Office of Naval Research and the Institute for Creative Technologies at the University of Southern California allowed soldiers to collaborate in a virtual environment to conduct driving technology training; in 2018, the US Army and Microsoft cooperated to develop an integrated visual enhancement system IVAS for soldiers to conduct regular training; in 2020, the US Navy launched the Avengers Project to conduct flight course training through virtual reality, artificial intelligence and biometric technology; in 2021, Boeing created a military aircraft training system that enables maintenance personnel to use AR technology for related simulated maintenance drills; on May 10, 2022, two US fighter pilots took a jet and completed a high-altitude prototype metaverse experiment over the California desert. Refueling operations were performed using a virtual tanker through a specially designed augmented reality display connected to a computer system that displayed a glowing image of a virtual refueling aircraft.

 (I) The US military uses virtual reality technology for military training on a large scale
       
 . At the same time, Russia is also a leader in the development of virtual training systems. Almost all of its advanced weapons and equipment are equipped with corresponding virtual training systems, and are developing in the direction of universalization and embeddedness. For example, the Sound M universal virtual training system is a universal virtual training equipment for combat personnel of surface-to-air missile weapon systems. The Tor M1 surface-to-air missile system is also equipped with a special virtual training vehicle, which can complete battlefield simulation training while searching for targets and conducting weapon operations.

 (II) The Tor M1 surface-to-air missile system is also equipped with a dedicated virtual training vehicle.
        
 In addition, other countries have also begun to explore the combination of metaverse technology and military training. The British Army has been committed to studying the use of extended reality technology, which can put more than 30 soldiers in the same virtual training scene. The British Ministry of Defense’s “Single Synthetic Environment” has used this technology in soldier training. In South Korea, a developer and supplier of a military training simulator called “Optimus Prime” completed the development of the DEIMOS military training system based on metaverse technology in 2019 and applied it to the training of the armed forces. The system can create various environments for professional military training, including precision shooting training, tactical behavior training and observation training.

       2. The inherent advantages of the metaverse in military training Military training
       
is a commonplace in the military, specifically referring to the military theory and related professional knowledge education, combat skills training and military operations exercises conducted by the armed forces and other trainees. The continuous innovation of technologies such as artificial intelligence and virtual reality has accelerated the trend of intelligentization in future wars. Single actual combat exercises in traditional forms will be difficult to meet the combat requirements under the new situation. As a huge group of new technologies, the metaverse plays an increasingly important role in military training. If training is an important support for combat effectiveness, then the primary use of the metaverse in military training is as an important “enabler” for simulation training.       Immersive experience can improve the effectiveness of battlefield environment simulation. As a practical science, military training is centered on experience and the key to training is immersion. The virtual space created by the metaverse makes people feel a “common sense of embodied presence”, allowing trainees to fully immerse themselves in the virtual space and experience a war close to reality. Battlefield environment simulation uses virtual reality technology to process battlefield element data such as battlefield terrain, battlefield personnel, weapons and equipment through computer systems, and finally creates a realistic three-dimensional battlefield environment. Soldiers are immersed in digital environments such as deserts, mountains or plateaus. Each environment has different tactics, techniques and procedures, and soldiers can constantly practice tasks. Even if the soldiers are not in the actual battlefield environment, this technology is enough to restore the authenticity of the environment. More importantly, through battlefield simulation training, not only can soldiers become familiar with the battlefield environment and obtain information to the greatest extent, but they can also improve their ability to observe things from multiple angles and solve emergencies. The US military has developed a virtual reality system called a laser sand table, which can identify and convert photos and videos sent back by satellites, and turn them into realistic three-dimensional maps, presenting the battlefield environment thousands of miles away to commanders. Before the wars in Afghanistan and Iraq, the US military used virtual reality technology to create real war scenes, including battlefield conditions, personnel appearances, etc., in order to allow soldiers to adapt to the environment in advance and improve their combat capabilities.

 (II) On the eve of the wars in Afghanistan and Iraq, the U.S. military used virtual reality technology to create real war scenes
        
. Open interconnection better supports synthetic training. The various parts of the Metaverse ecosystem can be interconnected and operated, and information can be transmitted across platforms and across the world (between virtual worlds or between the virtual world and the real world) without hindrance. Synthetic training uses the open interconnection advantage of Metaverse technology to supplement actual combat training. According to statistics, since 2015, the number of non-combat deaths in the U.S. military has exceeded the number of deaths in actual military operations each year, and many of the deaths in non-combat operations are caused by conventional military training. Therefore, the U.S. Army has begun to use Metaverse to carry out synthetic training in an attempt to establish a virtual synthetic training environment (STE) to reduce casualties in training. From urban warfare to mountain warfare, the “synthetic training environment” integrates “real-time, virtual and constructive training environments into a single synthetic training environment, and provides training functions to ground, transport and air platforms and command posts where needed.” Practice has proved that the synthetic training environment built by the metaverse, with the help of multi-sensory simulation and restoration, can help soldiers break through the limitations of theoretical learning and cognition, and improve the quality and ability of team combat coordination, injury treatment and safe evacuation. On the eve of the Iraq War, the US military stationed in Kuwait conducted synthetic training on Iraq’s urban conditions, which enhanced the soldiers’ urban combat capabilities while minimizing casualties in actual combat. The
      imaginative space stimulates innovation in military training thinking to the greatest extent. War exercises have been valued by military strategists since ancient times. During the Warring States Period, Mozi and Gongshu Ban’s deduction games of “untying belts to make a city” and “wooden pieces to make weapons” rehearsed the real situation on the battlefield, thus avoiding fighting between the two armies. In the deep scene era opened by the future metaverse, the military system will become highly intelligent, and the two sides of the war may be able to conduct war deductions in the battlefield metaverse, and even compete in the virtual world. Based on the information obtained in the virtual world, the two sides of the deduction capture and predict the changes in the battlefield through thinking processes such as association, reasoning and logical judgment, which is not only conducive to learning more war laws, but also can exercise the soldiers’ logical deduction ability. In the Gulf War of 1991, the U.S. military conducted war games based on the training level of the troops, the possible course of the war, and the time required for actual combat before implementing Operation Desert Storm. Practice has proved that the U.S. military used the problems found in this war game to transform the combat concept into an actual action plan and ultimately won. This also fully demonstrates that the real battlefield is full of uncertainties, so it is necessary to be fully prepared through continuous war exercises. Undoubtedly, it is almost impossible for the enemy and us to conduct coordinated deductions in the real world, but if the deployment of the enemy and us can be made public to a certain extent by their respective satellites, air and ground reconnaissance equipment, then at a certain time point, between two or more parties about to break out a military crisis, it is expected that the deployment of troops in the metaverse can be carried out first, and the actual military conflict can be resolved.
      The application of metaverse technology in military training can not only avoid accidental casualties during training, but also allow a single or many trainees to complete training tasks in different virtual environments without leaving home and without actual contact. And this kind of non-contact training plays a more obvious role in the regular form of the new crown epidemic.
       3. Potential risks of the metaverse in military training
      
Although the metaverse provides technical support for military training to a large extent, it should never be simply understood as a training program or considered as a means of conducting training. Even if the metaverse technology brings convenience and innovation to military training, the technology itself and its accompanying challenges and uncertainties cannot be ignored.
      The development of metaverse technology may cause security issues. The metaverse is a huge technology group. Its system architecture, core algorithms and immersive technology are still in a stage of continuous development. The supporting industry, value consensus, management standards, etc. have not yet been reached. In general, the metaverse is still a new thing, and its application in military training is even more so. Although the use of virtual training systems can reduce casualties to a certain extent, it is worth thinking about whether such training can be truly used in combat sites. It is still an unknown. And whether the technology is safe enough in operation is also an urgent problem to be solved. James Crowley of Virtual City Training Experts pointed out that computer power may be the most influential part of it. Unless the delay can be reduced to a level that does not make people uncomfortable and feels real, and unless the movement and communication data between different people can be stored in different simulators, it will not be able to provide practical training tools. At the same time, another challenge is the security issue of mutual contact between the armies of different countries in the open virtual world of the Metaverse.
      Virtual training environments are prone to cognitive illusions. Military training in the Metaverse world is the result of a contest between human intelligence and technology. War simulations and military training conducted in a virtual environment can have a powerful deterrent effect on future wars, just like “nuclear weapons”. Although it makes up for the limited senses of people at the physiological level, it also brings psychological cognitive illusions to trainees. Taking unmanned combat military training as an example, long-term combat training under a virtual system will cause the operator to have a gaming mentality. Because the audiovisual senses are out of touch with the real battlefield situation, they are alienated from the real people and society, and have a numb mentality towards the behavior of depriving others of their lives. With the continuous maturity of Metaverse technology, the interaction between the virtual world and the real world will become closer and closer, forming a mixed world that is difficult to distinguish between the real and the virtual. By then, it will not only cause a distinction dilemma for the cognitive psychology of soldiers, but also a major challenge for future military training. The
      “decentralization” of the Metaverse deviates from the traditional military training structure. In the world of the metaverse, all parties involved are virtual entities with equal status after computer processing and digitization. They can act autonomously in the metaverse, so they pursue “decentralization”. However, the traditional military training organizational structure is highly centralized and hierarchical management from top to bottom, which is contrary to the value needs of the metaverse. The US military has made a lot of efforts in pursuing “decentralized” operations, such as the “network-centric warfare” proposed in the 1990s, and the current distributed lethality and mosaic warfare. However, the traditional military training structure and thinking inertia are still obstacles to “decentralization”, and this situation is common in the armies of various countries.
     Yuval Noah Harari said in “Sapiens: A Brief History of Humankind” that humans conquer the world by relying on the ability of fiction and imagination. The metaverse gives us the ability to fiction and imagine, and at the same time, the uncertainty of the metaverse in the field of military training also increases the element of fear. Therefore, we must pay attention to innovative scientific and technological theories, develop cutting-edge metaverse technologies, continuously stimulate the potential of the military training metaverse, and at the same time improve relevant laws, regulations and moral and ethical regulations to make advance preparations for winning future intelligent wars.

國語中文:

在軍事訓練領域,元宇宙的基本技術其實早就作為一種虛擬資源,在不同程度上為軍方使用。必須承認,元宇宙在軍事訓練中的價值潛力不可估量,是當下和未來軍事領域爭鋒的焦點。但由於元宇宙相關技術的發展及其在軍事訓練中的應用尚不成熟,美好前景背後也伴隨著潛在風險。
一、軍事訓練元宇宙的前世今生
元宇宙依賴的是以虛擬實境技術為核心的技術群,在軍事領域的早期形態又稱為虛擬模擬或模擬互聯網。可以說,虛擬模擬訓練已經非常接近今天的元宇宙概念,是軍事訓練元宇宙的初級形態。從古至今,科技領域帶來巨大影響力的進步普遍都是為了贏得戰爭或保持戰鬥力。作為第三次科技革命的領導技術,元宇宙在全球軍事領域,以不同形式的基本元宇宙被用於軍事訓練。
美軍很早就開始部署「軍事元宇宙」計畫。 1978年,美空軍上尉傑克·索普在自己的論文中提出了軍事模擬器網路的構想,希望建立一個分散式或網路化的軍事建模系統方便訓練。 1983年美國防部高級研究計畫局(DARPA),開發了虛擬戰場網路模擬器(SIMNET模擬器),以電腦生成虛擬戰場,模擬雙方交戰的情形進行推演,總結錯誤和失敗。用這樣的方式取代實地演習,一定程度上節省了成本,也提高了訓練的效果。雖然SIMNET模擬器作為最早的版本仍處於較低階的戰場仿真,但卻開闢了分散式或網路化建模仿真的先河。到了20世紀80年代末,該計畫達到頂峰,最終落地形成200多個遍布美國、橫跨歐洲,基於區域網路和廣域網路的模擬互聯坦克和飛機模擬器,並用於大規模訓練與演習。而當時開發的分散式互動式模擬(DIS)協議,至今仍在使用,並且透過更先進的高階體系結構,可以連結不同的軍事模擬,以提供更豐富的集體訓練或任務準備體驗。可以說SIMNET模擬器專案直接或間接推動了當前元宇宙的許多關鍵技術的發展。時至今日,美軍對如雨後春筍般崛起的元宇宙興趣正濃,新成立的軍種——美國太空部隊(USSF)欲打造軍事專用元宇宙,用於協同作戰、訓練、執行任務。其技術主管利薩·科斯塔宣稱:「軍人們並不能親自上太空,他們體驗自身作戰疆域的唯一途徑就是視覺數據顯示,虛擬現實環境會為他們提供態勢感知,並了解自己的選項,以便做出決策。
近年來,元宇宙的虛擬實境和擴增實境技術已納入美軍的常規軍事訓練。 2014年,南加州大學海軍研究辦公室和創意技術研究所開發的BlueShark項目,讓士兵在虛擬環境中協作配合,進行駕駛技術訓練;2018年,美陸軍與微軟合作開發了一款集成視覺增強系統IVAS ,供士兵進行常規訓練;2020年,美海軍又推出了復仇者計劃,透過虛擬現實、人工智慧以及生物識別技術,開展飛行課程培訓;2021年,波音公司打造了一個軍用飛機培訓系統,使維修人員利用AR技術進行相關模擬維修演練;2022年5月10日,兩名美軍戰鬥機飛行員乘坐噴射機,在加州沙漠上空完成了一次高空原型元宇宙實驗。透過特製的擴增實境顯示器,連接到一個虛擬加油飛機發光影像的電腦系統,使用虛擬加油機進行了加油操作。
(一)美軍大量採用虛擬實境技術進行軍事訓練
同時,俄羅斯在虛擬訓練系統的開發上也是領先者,其先進武器裝備幾乎都配有相應的虛擬訓練系統,並且正在朝著通用化和嵌入式的方向發展。如音色M通用虛擬訓練系統就是用於地對空飛彈武器系統作戰人員的通用虛擬訓練裝備。道爾M1型地對空飛彈系統也配備有專用虛擬訓練車,可在目標搜尋和武器作戰的同時完成戰地模擬訓練。

(二)道爾M1型地空飛彈系統也配備有專用虛擬訓練車
此外,其他國家也紛紛開始探索元宇宙技術與軍事訓練的結合。英陸軍一直致力於研究擴展實境技術的使用,可以讓30多名士兵處於相同的虛擬訓練場景。英國防部的「單一合成環境」已經在士兵訓練中使用了這項技術。在韓國,一家名為「擎天柱」的軍事訓練模擬器的開發商和供應商,在2019年完成了基於元宇宙技術的DEIMOS軍事訓練系統研發並應用於武裝部隊的訓練。該系統能夠為專業軍事訓練創造各種環境,包括精準射擊訓練、戰術行為訓練和觀察訓練。
二、軍事訓練元宇宙的內在優勢
軍事訓練乃是兵家常事,具體指武裝力量及其他受訓對象所進行的軍事理論及相關專業知識教育、作戰技能教練和軍事行動演練的活動。人工智慧、虛擬實境等技術的不斷革新,加速了未來戰爭的智慧化趨勢。傳統形式下的單一實戰演練將難以滿足新情勢下的作戰要求。而元宇宙作為一個龐大的新技術群,在軍事訓練中扮演越來越重要的角色。如果說訓練是戰鬥效能的重要支撐,那麼元宇宙在軍事訓練中的首要用途便是作為模擬訓練重要的「賦能器」。
沉浸式體驗能夠提升戰場環境模擬效能。軍事訓練作為實踐科學,訓練的核心在體驗,訓練的關鍵在沉浸。元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”,讓受訓者完全沉浸虛擬空間,體驗一場接近真實的戰爭。戰場環境模擬正是利用虛擬實境技術,透過電腦系統對取得的戰場要素資料如戰場地形、戰場人員、武器裝備等進行處理,最終創設出逼真的立體戰場環境。士兵們沉浸在沙漠、山區或高原的數位環境中,每個環境都有不同的戰術、技術和程序,士兵們可以不斷地演練任務。即便士兵不是在實際的戰場環境中,但這項技術足以還原環境的真實度,更重要的是透過戰場模擬訓練,不僅能夠讓士兵熟悉戰場環境,最大程度獲取信息,而且還能提升其多角度觀察事物、解決突發狀況的能力。美軍目前已研發出一款被稱為雷射沙盤的虛擬實境系統,能夠辨識和轉換衛星發回的照片和錄像,並將其轉變成逼真的立體地圖,將遠在千里外的戰場環境呈現給指揮員。在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術來打造真實的戰爭場景,包括戰地狀況、人員樣貌等。旨在讓士兵提前適應環境,提升作戰能力。

(一)元宇宙所創造的虛擬空間,使人感受到一種“共同的具身在場感”

(二)在阿富汗戰爭和伊拉克戰爭前夕,美軍都採用了虛擬實境技術打造真實的戰爭場景
開放式互聯較能支撐合成訓練開展。元宇宙生態系統各部分之間可以實現相互連接和操作,資訊可以暢通無阻地實現跨平台和跨世界傳輸(在虛擬世界之間或虛擬世界與現實世界之間)。合成訓練正是利用元宇宙技術的這一開放式互聯優勢,來實現實戰訓練的補充。根據統計,從2015年開始,美軍每年的非戰鬥死亡人數超出了在實際軍事行動中犧牲的人數,而在非戰鬥行動中喪生的人員很多是由常規軍事訓練造成的。因此,美陸軍已經開始採用元宇宙進行合成訓練,試圖建立虛擬合成訓練環境(STE)來減少訓練中的傷亡。從城市作戰到山地作戰,「合成訓練環境」將「即時、虛擬和建設性的訓練環境整合到一個單一的合成訓練環境中,並在有需要的地方向地面、運載和空中平台以及指揮所提供訓練功能」。實務證明,透過元宇宙建構的合成訓練環境,藉助多感官模擬還原,能夠幫助戰士突破理論學習和認知局限,提升團隊作戰協同、傷情處置和安全撤離等素質和能力。伊拉克戰爭前夕,駐紮在科威特的美軍就對伊拉克的城市狀況進行了合成訓練,增強了士兵城市作戰能力的同時,把實戰中的傷亡降到了最低。
想像性空間最大程度激發軍事訓練思維創新。戰爭演習自古就受到兵家重視,戰國時期墨子和公輸班「解帶為城」「木片為械」的推演遊戲將戰場上的真實情況演練出來,從而避免了兩軍交戰。在未來元宇宙開啟的深度場景時代,軍事體系將走向高度智慧化,作戰雙方或許能在戰場元宇宙進行戰爭推演,甚至在虛擬世界一決高下。推演雙方根據虛擬世界獲取的信息,透過聯想、推理和邏輯判斷等思維過程,對戰場風雲變化進行捕捉和預判,不僅有利於習得更多戰爭規律,還能夠鍛鍊士兵的邏輯推演能力。 1991年的海灣戰爭中,美軍就在實施「沙漠風暴」行動前,根據部隊的訓練水準和可能的戰爭進程,以及實際作戰所需時間進行了兵棋推演。實踐證明,美軍借助這次兵棋推演發現的問題,將作戰設想轉化為實際行動方案,最終取得勝利。這也充分說明了真實的戰場充滿了種種不確定性,因此需要透過不斷進行戰爭演習來做好充分準備。毋庸置疑,敵我雙方在現實世界中進行協同推演幾乎是不可能的,但若敵我雙方的兵力部署可以被各自的衛星、空中和地面偵查設備進行一定程度的公開,那麼在某個時間節點,在即將爆發軍事危機的雙方或多方之間,先在元宇宙中進行排兵布陣,可以化解現實的軍事衝突則有望實現。
元宇宙技術在軍事訓練中的應用不僅可以避免訓練中的人員意外傷亡,還可以讓單一或眾多參訓者在足不出戶,無需實際接觸便可在不同虛擬環境下完成訓練任務。而這種非接觸式訓練在新冠疫情的常規化形態下,所扮演的角色更加明顯。
三、軍事訓練元宇宙的潛在風險
元宇宙在很大程度上雖然為軍事訓練提供技術支撐,但絕不能僅僅將其簡單地理解為一種訓練項目,或者被認為是一種開展訓練的手段。即使元宇宙技術為軍事訓練帶來便利和創新,也不能忽視科技本身及其伴生的挑戰和不確定性。
元宇宙技術發展或引發安全問題。元宇宙是一個龐大的技術群,其體系架構、核心演算法和沈浸技術等尚處於不斷開發的階段,配套產業、價值共識、管理標準等還沒有達成,總的來說,元宇宙還是一個新事物,在軍事訓練中的應用更是如此。儘管使用虛擬訓練系統能夠在一定程度上減少傷亡,但值得思考的是這樣的訓練是否能夠真正用於作戰現場,目前仍是一個未知數。而技術在運作中是否夠安全也是一個亟待解決的問題。虛擬城市訓練專家公司的詹姆斯·克勞利指出,電腦能力可能是其中最有影響力的部分,除非可以將延遲降低到不會讓人不適並且感覺真實的程度,除非可以在不同的模擬器中儲存不同人之間的行動和通訊數據,否則將無法提供實用的訓練工具。同時,另一個擺在眼前的挑戰則是在開放的元宇宙虛擬世界中,不同國家軍隊之間相互接觸的安全問題。
虛擬訓練環境易造成認知錯覺。元宇宙世界裡的軍事訓練是人類智力和技術較量的結果,在虛擬環境下進行的戰爭推演、軍事訓練等對未來戰爭的作用,如同「核武」一般,不用動用實槍實彈也能起到強大的威懾效果。儘管在生理層面彌補了人的有限感官,同時也帶來了受訓者在心理上的認知錯覺。以無人作戰的軍事訓練為例,長期在虛擬系統下進行作戰訓練,將會造成操縱者的遊戲心態。由於視聽感官與真實戰場情況脫節,而疏離了現實的人與社會,對於剝奪他人生命的行為產生麻木心態。隨著元宇宙技術的不斷成熟,虛擬世界、現實世界的互動將會越來越緊密,形成虛實難分的混合世界。到那時,不僅對士兵的認知心理造成區分困境,對於未來的軍事訓練也是重大挑戰。
元宇宙「去中心化」與傳統軍事訓練結構相背離。在元宇宙的世界中,參與各方都是經過電腦處理、資料化後產生的地位平等的虛擬主體,可以在元宇宙中自主活動,因而其追求「去中心化」。但傳統的軍事訓練組織結構則是高度集中、自上而下的分層化管理,這一方面與元宇宙的價值需求是背離的。美軍在追求“去中心化”作戰上做出了很多努力,如20世紀90年代提出的“網絡中心戰”,以及當前的分散式殺傷以及馬賽克戰等。但傳統的軍事訓練結構和思維慣性仍然是「去中心化」的阻力,而這種情況普遍存在於各國軍隊。
尤瓦爾·赫拉利在《人類簡史》中談道,人類靠著的是虛構和想像的能力征服世界。元宇宙給了我們虛構和想像的能力,同時元宇宙在軍事訓練領域的不確定性也增加了恐懼的成分。因此,我們必須關注創新科技理論、發展元宇宙前沿科技,不斷激發軍事訓練元宇宙的潛力,同時完善相關法律法規和道德倫理規約,為打贏未來智慧化戰爭做好超前準備。
版權聲明:本文刊於2023年1期《軍事文摘》雜誌,作者:張愷悅、李傑春,如需轉載請務必註明「轉自《軍事文摘》」。

中國軍事原文來源:https//www.81it.com/2023/0321/14167.html

Chinese Military Characteristics & Development Trends of Cognitive Domain Operations and Warfare

中國軍事特徵及認知域作戰與戰爭發展趨勢

國語對外語音譯:

Cognitive domain operations take people’s will, beliefs, thinking, psychology, etc. as direct combat objects, and then affect their decision-making and actions by changing the opponent’s cognition. Entering the era of information-based and intelligent warfare, cognitive domain warfare has become an important form of great power competition, with all parties trying to achieve political goals in a relatively controllable manner. Gaining insight into the characteristics and development trends of cognitive domain operations is of urgent and important practical significance for winning future wars.

At present, the cognitive domain has entered the war stage as an independent domain, and has increasingly become a common domain, a battleground, and a weight for victory in the game between great powers. Analyzing the operational characteristics and development trends in the cognitive domain reflects at least the following eight aspects.

The cognitive domain is the key domain for transforming military advantage into political victory.

Military confrontation, on the surface, seems to be a confrontation between the hard power of both sides, but on a deeper level, no matter what the nature and purpose of the war, it is ultimately a contest of human wills. The key to victory is the ability to impose your will on your audience. As long as the enemy’s will to fight is deprived and defeated, the war is won. Cognitive domain warfare uses human will, spirit, psychology, etc. as the target of confrontation, strengthening one’s own will while weakening the enemy’s will, thereby achieving the political goal of conquering the heart and mind. In this sense, the cognitive domain is a key area for transforming military advantage into political victory. As the form of war accelerates to evolve towards intelligence, cognitive quality advantages bring decision-making and action advantages, which can not only occupy the commanding heights in morality and legal principles, create a favorable situation of justice and legality, but also achieve small-scale control through hybrid warfare and comprehensive game means. The purpose of fighting or even winning without fighting. Especially in the context of great power competition, the cost of war is high. All parties hope to increase the intensity of competition for cognitive domains and force their opponents to retreat in a “humane” and “economic” manner.

By changing the opponent’s perception, it can change its decisions and actions

The purpose of implementing cognitive attacks is to use an “invisible hand” to control the opponent’s will, making the opponent feel “I can’t” and “I dare not”, thereby achieving the effect of “I don’t want to”. Foreign military practice has shown that cognitive attacks on people’s will, beliefs, thinking, and psychology can be long-term cultural implantation, information suppression in the form of “information ocean + covering one’s mouth to silence”, or preemptive speech. It can also take the initiative to shape and use historical grievances to provoke the outbreak of conflicts. At present, information technology, artificial intelligence technology, and media technology have strengthened their direct effects on the cognitive domain. Using intelligence to generate software, a large amount of cognitive “ammunition” can be created to accurately act on the cognitive layer of combat targets, directly imposing “will” to rivals” and quickly change the strategic situation. Looking forward to the information-based smart battlefield, situational awareness forces and platforms are widely distributed in combat domains such as land, sea, air, and space networks. Cognitive behaviors such as planning, decision-making, and control dominate operations in each combat domain, especially the cognition of human-machine hybrids in future intelligent warfare. Advantages will dominate the battlefield. Cognitive interference, cognitive confusion, cognitive blocking and other means can be used to create a “fog” of war cognition, inducing opponents to misjudge the situation and make wrong decisions and actions.

Cognitive domain operations are full-time offense and defense, full personnel coverage, full use, full domain shaping, and full government action

Cognitive domain operations are all-round, multi-level, hyper-temporal and cross-domain, blurring the boundaries between wartime and peacetime, front and rear, crossing battlefields and national boundaries, transcending the pure military field, and widely penetrating into politics , economy, diplomacy and other social fields, showing the characteristics of “five completes”. Full-time offense and defense, there is no distinction between peacetime and wartime, and there is no difference between the front and the rear. It is expressed as being online all the time and in war all the time. Covering all personnel, anyone, including intelligent robots, may become the target of cognitive domain operations. It is used throughout the whole process of joint operations before and during the war. Before the joint military operation is launched, the cognitive shaping operation has begun and will accompany the military operation and will not stop with the military operation. Global shaping, cognitive shaping runs through all levels of strategy, operations, and tactics, and its scope covers all domains of land, sea, air, and space networks. Cross-domain empowerment has an impact on all-domain operations. As a whole-of-government action, cognitive shaping is naturally strategic and requires consistent and coordinated actions across departments, fields, military and military areas, and levels to achieve the best communication effect.

The key lies in seizing the right to define the nature of the action or activity, the right to dominate the process, and the right to judge the outcome.

The struggle in the cognitive game involves multiple opposing parties and seems complicated. The key lies in the struggle around the “three powers” in the cognitive domain. First, fight for the right to define the nature of the event. That is, how to view this incident, whether it is just or unjust, legal or illegal. Usually, preemptive definitions are adopted, group alliances are formed to force definitions, information is suppressed and unilateral definitions are used, and issues are set and applied to definitions, etc., to guide and shape the public to form qualitative perceptions. Second, compete for dominance over the event process. That is, how to do something, how not to do it, who did it right and who did it wrong, usually by setting up a trap and other methods, trying to dominate the development direction of the target event according to the state that one’s own side expects. Fast and slow, pause, continue and end. Third, compete for the right to judge the outcome of the incident. That is, how to evaluate this matter, who is the gainer and who is the loser, who is the immediate loser, who is the long-term loser, etc. All parties try to control the outcome of the incident by amplifying the advantages to themselves and the disadvantages to the enemy. The purpose is to use the extended effect of the incident to continue to hurt the enemy and benefit themselves.

Morality and legal principles are the focus of contention between all parties

Military operations have always paid attention to the principle of “discipline and reputation”. Although the shape of war is evolving at an accelerated pace, the essential nature of war as subordinate to politics will not change; the nature of war and the support of people’s hearts are still the key factors that affect the outcome of a war. On the battlefield in the cognitive domain, by occupying the commanding heights of politics, morality, and law, we can win the hearts and minds of the people and moral support, create a public opinion atmosphere in which moral support is abundant, and then seize the opportunity to defeat the enemy. In every war or conflict, whether it is the strong or the weak, the attacker, the defender, or a third party, all parties will try their best to seize cognitive dominance and the initiative of public opinion. They will do everything they can to wrap themselves up with morality, focus on declaring a just position, and try to find ways to defend themselves. Qualify the war, justify the action, eliminate resistance, increase support, and create a favorable situation in which “righteous” fights “unjust”. The strength balance between the two sides in the war is different, and the cognitive confrontation methods aimed at occupying the moral and legal high ground will also be different. Recent wars have shown that when a party has strong soft and hard power, that is, it has strong military strength, many allies and partners, and a large share of international voice, it often declares war in a high-profile manner; when military actions may trigger chain reactions, it is often handled in a vague manner. The word “war”.

Information is the basic “ammunition” for cognitive attack and defense

In the Internet information age, human communication methods continue to undergo complex and profound changes. On-site interactions have gradually given way to online connections. Some large-scale social platforms have become the main battleground for the cognitive game and the main channel to influence public cognition. Information is used as ammunition to compete for international network blockade rights and discourse control rights. Becoming one of the main actions in today’s cognitive confrontation. On these platforms, various short videos have become the “first scene” for the public to understand the war situation, and information travels faster than artillery shells. The use and blocking, dominance and regulation of platforms have become the focus of battles in the cognitive domain. All parties strive to spread and amplify their own propaganda, denounce and suppress the other party’s propaganda by manipulating social platforms, forming a “I say more, you say more” There is a situation of “less”, “what I said is right and what you said is wrong” and “only I can say it and you are not allowed to say it”. As users of large-scale social platforms, the public is influenced by and influenced by others in the process of “listening”, “speaking” and even “acting”, and unknowingly becomes the agents and attack props of those behind the scenes.

Military operations play a key supporting role in shaping cognition

The history of human war shows that military warfare is always the basic support of political contests, while psychological warfare is the effectiveness multiplier of military warfare. What cannot be retrieved on the battlefield cannot be expected to be retrieved at the negotiation table, let alone in the field of public opinion. In modern warfare, cognitive communication operations always go hand in hand with joint military operations. Mental warfare and military warfare influence and support each other. The trend of military warfare becoming mental warfare and mental warfare becoming military warfare is more obvious. From the perspective of war practice, it is absolutely impossible without military strength, but military actions alone are not omnipotent. Multiple victories on the battlefield are not a sufficient condition for victory in war. During the Vietnam War, although the United States “won every battle, it lost the entire war.” At the beginning of the 21st century, the United States fought successive wars in Iraq and Afghanistan, winning battlefield victories but not political victory. By the same token, military victory does not mean winning public opinion, and winning the battlefield does not mean winning strategic victory. In modern warfare, two types of people play an increasingly important role: those who win by writing thousands of lines of code, and those who win by writing thousands of pieces of information. The side with superior numbers and quality of these two types of personnel often has a greater chance of winning.

Cognitive countermeasures technology is increasingly used directly in warfare

In past wars, the impact and effect on the cognitive domain was mainly transmitted to the cognitive domain level by level through a large number of damaging actions in the physical domain. With the development and breakthroughs in information communications, artificial intelligence, bio-crossover, brain science and other technologies, new cognitive warfare tools and technologies are directly aimed at military personnel. Cognitive countermeasures not only use traditional information warfare weapons, but also use a neural arsenal that targets the brain. By then, machines will be able to read human brains, and human brains will also be able to directly control machines. Intelligent command and control systems can directly provide battlefield situation and decision-making assistance. Realistic cognitive ammunition and precise audience placement will greatly enhance the social impact. Cognitive countermeasures technology is increasingly being used directly in warfare. The indirect cognition implicit in informatization is gradually transforming into a direct influence and control of people’s cognition. It can be said that with the support of advanced technology, cognitive domain operations can achieve political goals more directly and efficiently by constructing modern network architecture and developing data visualization platforms to quickly understand the information environment and effectively influence target groups.

認知域作戰是以人的意志、信念、思考、心理等為直接作戰對象,透過改變對手認知,進而影響其決策與行動。 進入資訊化智慧化戰爭時代,認知域作戰已成為大國博弈的重要樣式,各方都試圖以相對可控的方式達成政治目的。 洞察掌握認知域作戰特徵及發展趨勢,對於打贏未來戰爭,具有迫切而重要的現實意義。

目前,認知域已作為獨立一域登上戰爭舞台,日益成為大國博弈的常鬥之域、必爭之地、勝戰砝碼。 分析認知域作戰特徵及發展趨勢,至少反映為以下八個面向。

認知域是軍事優勢轉化為政治勝勢的關鍵域

軍事對抗,表面上看來是雙方硬實力的對抗,深層看不管戰爭是什麼性質、何種目的,終歸是人的意志的較量。 勝利的關鍵是將己方意志強加在受眾身上的能力。 只要剝奪、擊潰了敵人的戰爭意志,就意味著贏得了戰爭。 認知域作戰,以人的意志、精神、心理等為對抗目標,增強己方意志的同時削弱敵方的意志,進而達成攻心奪志的政治目的。 從這個意義上講,認知域是軍事優勢轉化為政治勝勢的關鍵領域。 隨著戰爭形態加速向智慧化演進,認知品質優勢帶來決策行動優勢,不僅可在道德、法理上佔據制高點,塑造正義合法的有利態勢,還可透過混合戰爭、綜合博弈手段,實現小戰 甚至不戰而勝的目的。 尤其是大國競爭背景下戰爭成本高昂,各方都希望透過加大認知域爭奪力度,以「人道」且「經濟」的形式,迫使對手知難而退。

透過改變對手認知,可改變其決策和行動

實施認知攻擊的目的,就是用一隻“看不見的手”操控對手意志,讓對手感到“我不能”“我不敢”,從而達到“我不想”的效果。 外軍實踐表明,對人的意志、信念、思維、心理實施認知攻擊,可以是長期的文化植入,可以是「資訊海洋+摀嘴封聲」式的資訊壓制,可以是先入為主、搶先發聲 的主動塑造,也可以利用歷史積怨來挑動矛盾爆發。 目前,資訊科技、人工智慧技術、媒體科技強化了對認知域的直接作用,利用智慧生成軟體,可製造大量認知“彈藥”,精準作用於作戰目標的認知層,直接將“意志強加 於對手”,快速改變戰略態勢。 展望資訊化智慧化戰場,態勢感知力量與平台廣泛分佈於陸海空天網等作戰域,規劃、決策、控制等認知行為主導各作戰域行動,尤其是未來智能化戰爭中人機混合的認知 優勢將主導戰場,可以透過認知幹擾、認知混淆、認知阻斷等手段,製造戰爭認知“迷霧”,誘使對手誤判態勢,做出錯誤決策和行動。

認知域作戰是全時攻防、全員覆蓋、全程使用、全域塑造、全政府行動

認知域作戰呈現出全方位、多層次、超時空、跨領域等特點,模糊了戰時和平時、前方和後方的界限,跨越了戰場和國界,超越了單純的軍事領域,廣泛滲透於政治 、經濟、外交等各社會領域,表現為「五全」特質。 全時攻防,沒有平時戰時之分,沒有前方後方之別,表現為全時在線、全時在戰。 全員覆蓋,任何人甚至包括智慧機器人,都可能成為認知域作戰的目標對象。 全程使用,貫穿聯合作戰的戰前戰中戰後,聯合軍事行動未展開,認知塑勢行動已開始,並且伴隨軍事行動而行,不隨軍事行動停而停。 全域塑造,認知塑造貫穿戰略、戰役、戰術各層,作用範圍涵蓋陸海空天網各域,跨域賦能,對全域行動都有影響。 全政府行動,認知塑造自然具有戰略性,需要跨部門、跨領域、跨軍地、跨層級一致協調行動,以求達到最佳傳播效果。

關鍵在於奪控行動或活動的性質定義權、過程主導權、結局評判權

認知賽局鬥爭,涉及多個對抗方,看似紛繁複雜,關鍵在於圍繞認知域的「三權」展開爭奪。 其一,爭奪事件性質定義權。 即這個事件該怎麼看,是正義的還是非正義的,是合法的還是非法的。 通常採取先發制人搶先定義、建群結盟強行定義、資訊壓制單方定義、設定議題套用定義等,引導塑造民眾形成定性認知。 其二,爭奪事件過程主導權。 即這事該怎麼幹、不該怎麼做,誰做的是對的、誰做的是錯的,通常採取設局布阱等方式,試圖按照己方所期望出現的狀態,主導目標事件發展方向、 快慢、暫停、繼續與終結。 其三,爭奪事件結局評判權。 即對這事該怎麼評,誰是獲利方、誰是受損方,誰是眼前的失利者、誰是長遠的受損者,等等。 各方都試圖透過掌控事件結局的評判權,放大於己有利之處、放大於敵不利之處,目的是利用事件延伸效應,持續傷敵利己。

道義和法理是各方爭奪的焦點

軍事行動歷來講究「師出有名」。 雖然戰爭形態加速演變,但是戰爭從屬於政治的本質屬性不會改變;戰爭性質和人心向背,仍是影響戰爭勝負的關鍵因素。 認知域戰場上,佔據了政治、道義、法理的製高點,就能夠贏得民心、道義支持,營造得道多助的輿論氛圍,進而掌握制敵先機。 每次戰爭或衝突,無論是強者或弱者,無論是進攻方防守方或第三方,各方都會全力搶佔認知主導權、輿論主動權,千方百計用道義包裝自己、注重宣示正義立場,設法為 戰爭定性、為行動正名,以消除阻力、增加助力,塑造以「有道」伐「無道」的有利態勢。 戰爭雙方實力對比不同,瞄準佔據道德法理制高點進行的認知對抗方式也會不同。 近幾場戰爭表明,當一方軟硬實力均很強大時,即軍事實力強、盟友夥伴眾多、國際話語權佔有率大,常常高調宣戰;當軍事行動有可能引發連鎖反應時,則常常模糊處理 「戰」的提法。

資訊是認知攻防的基本“彈藥”

網路資訊時代,人類溝通方式持續發生複雜深刻變化。 現場互動互動逐漸讓位給網路線上連線,一些大型社群平台成為認知博弈鬥爭的主陣地、影響民眾認知的主管道,以資訊為彈藥進行國際網路封鎖權、話語控制權爭奪成為當今認 知對抗的主要行動之一。 在這些平台上,各種短視頻成為公眾了解戰況的“第一現場”,訊息比砲彈跑得快。 圍繞平台的使用與封鎖、主導與規製成為認知域作戰爭奪的焦點,各方努力透過操控社交平台來傳播、放大己方宣傳,聲討、壓制對方宣傳,形成「我說的多、你說的少 」「我說的對、你說的錯」「只能我說、不讓你說」的局面。 民眾作為大型社群平台的使用者,在「聽」與「說」甚至「做」的過程中,受別人影響,也影響別人,不知不覺地成為幕後推手的代理人和攻擊道具。

軍事行動對認知塑造有關鍵支撐作用

人類戰爭史表明,兵戰永遠是政治較量的基礎支撐,心戰則是兵戰的效能倍增器。 戰場上拿不回來的東西,不能指望在談判桌上拿回來,更不能指望在輿論場上拿回來。 現代戰爭中,認知傳播行動總是與聯合軍事行動如影隨形,心戰與兵戰互相影響、互為支撐,兵戰心戰化和心戰兵戰化趨勢更為明顯。 從戰爭實踐看,沒有軍事實力是萬萬不能的,但僅有軍事行動又不是萬能的。 戰場上的多次勝利,並不是奪取戰爭勝利的充分條件。 越戰中,美雖「贏得了每次戰鬥,卻輸掉了整場戰爭」。 21世紀初,美國連續打的伊拉克戰爭、阿富汗戰爭,贏得了戰場勝利,也沒有贏得政治勝勢。 同樣的道理,軍事上的勝勢不等於贏得輿論上的強勢,贏得戰場勝利也不意味著贏得戰略的勝利。 現代戰爭中,兩類人員的角色越來越大,一類人員透過編寫成千上萬行程式碼謀勝,一類人員透過編寫成千上萬條資訊謀勝。 這兩類人員數品質都佔優的一方,取勝的機率往往就大。

認知對抗技術越來越直接運用於戰爭

過去戰爭中,對認知域的影響和作用,主要是透過物理域的大量毀傷行動,逐級逐層傳遞到認知域。 隨著資訊通訊、人工智慧、生物交叉、腦科學等技術的發展和突破,新的認知戰工具和技術直接瞄準軍事人員。 認知對抗不僅使用傳統的資訊戰武器,也使用以大腦為作戰目標的神經武器庫。 屆時,機器將可以讀懂人腦,人腦也將能夠直接控制機器,智慧指控系統可以直接提供戰場態勢和決策輔助,逼真的認知彈藥和精準的受眾投放將極大增強社會影響效果。 認知對抗技術越來越直接運用於戰爭,原來資訊化所隱含的間接認知,正逐步轉變為直接對人的認知進行影響與控制。 可以說,先進科技的支撐,使認知域作戰透過建構現代網路架構、開發資料視覺化平台,快速了解資訊環境並有效影響目標人群,可以更直接且有效率地達成政治目的。

原始國語中文資源:https://www.sohu.com/a/577196886_358040#google_vignette