Tag Archives: Cognitive Confrontation

Analyzing the Forms of Chinese Military Intelligent Combat

分析中國軍事情報作戰的形式

現代英語:

Operational form refers to the manifestation and state of combat under certain conditions, and is usually adapted to a certain form of warfare and combat method. With the development and widespread use of intelligent weapon systems, future intelligent warfare will inevitably present a completely different form from mechanized and informationized warfare.

  Cloud-based combat system

  The combat system is the fundamental basis for the aggregation and release of combat energy. An informationized combat system is based on a network information system, while an intelligent combat system is supported by a combat cloud. The combat cloud can organically reorganize dispersed combat resources into a flexible and dynamic combat resource pool. It features virtualization, connectivity, distribution, easy scalability, and on-demand services, enabling each combat unit to acquire resources on demand. It is a crucial support for achieving cross-domain collaboration and represents a new organizational form for intelligent combat systems.

  The cloud-supported combat system utilizes cloud technology to connect information, physical systems, and the ubiquitous Internet of Things. By configuring combat resource clouds at different levels and scales, it highly shares multi-dimensional combat data across land, sea, air, and space, achieving battlefield resource integration across combat domains such as land, sea, air, space, electronic, and cyber domains. This allows various combat elements to converge into the cloud, completing the network interaction of battlefield data.

  The cloud-connected combat system enables joint operations to integrate battlefield intelligence information widely distributed across various domains—space, air, ground, sea, and underwater—with the support of big data and cloud computing technologies. This allows for seamless, real-time, and on-demand distribution of information across these domains, achieving cross-domain information fusion and efficient sharing. It also enables command structures at all levels to leverage intelligent command and control systems for multi-dimensional intelligence analysis, battlefield situation assessment, operational optimization, decision-making, operational planning, and troop movement control. Furthermore, it allows combat forces to rapidly and flexibly adjust, optimize configurations, and recombine online based on real-time operational needs, forming adaptive task forces and implementing distributed, focused operations, supported by highly integrated cross-domain information technology. At the same time, through the cross-domain fusion capability of battlefield information in the combat cloud, it is also possible to form an integrated combat force with intelligent combat forces, traditional combat forces, manned combat forces and unmanned combat forces, and intangible space combat forces and tangible space combat forces. In the cloud, different combat units and combat elements in land, sea, air, space, electronic, and cyberspace can be highly integrated, coordinated, and have their strengths maximized. This enables cross-domain and cross-generational collaborative operations, transforming the overall combat effectiveness from the past gradual release and linear superposition of combat effects to non-linear, emergent, adaptive effects fusion and precise energy release.

  Decentralized and concentrated battlefield deployment

  Concentrating superior forces is an age-old principle of warfare. With the continuous improvement of network information systems and the widespread use of intelligent weapon systems, various combat forces, combat units, and combat elements can dynamically integrate into and rely on joint operations systems, disperse forces, quickly switch tasks, and dynamically aggregate effectiveness to cope with complex and ever-changing battlefield situations. This has become a force organization form that distinguishes intelligent warfare from information warfare.

  The battlefield deployment of dispersed and concentrated forces refers to the joint operations system supported by cloud computing, in which various participating forces rely on the high degree of information sharing and rapid flow. Through node-based deployment, networked mobility, and virtual centralization, it can combine various combat elements, weapon platforms, and combat support systems that are dispersed in a multi-dimensional and vast battlefield space in real time, dynamically and flexibly, so as to achieve the distributed deployment of combat forces, the on-demand reorganization of combat modules, and the cross-domain integration of combat effectiveness.

  The dispersed and concentrated battlefield deployment enables commanders at all levels to deeply perceive and accurately predict the battlefield situation through big data analysis, battlefield situation collection, and multi-source intelligence verification by intelligent command information systems. This allows for rapid and efficient situation assessment and early warning. Furthermore, the wide-area deployment and flexible configuration of various combat forces and units enable timely responses based on predetermined operational plans or ad-hoc collaborative needs. This allows for flexible and autonomous cross-domain coordination, rapid convergence and dispersal, and dynamic concentration of combat effectiveness. At critical times and in critical spaces, focusing on key nodes of the enemy’s operational system and high-value targets crucial to the overall strategic situation, it rapidly forms a system-wide operational advantage. Through a highly resilient and networked kill chain, it precisely releases combat effectiveness, generating an overall advantage spillover effect, thus forming an overwhelming advantage of multiple domains over one domain and the overall situation over the local situation. Especially during the release of combat effectiveness, each combat group, driven by “intelligence + data”, and based on pre-planned combat plans, can autonomously replan combat missions online around combat objectives, and automatically allocate targets online according to the actual combat functions and strengths of each combat unit within the group. This allows each unit to make the most of its strengths and advantages, and flexibly mobilize the free aggregation and dispersal of “materials + energy” in combat operations. Ultimately, this enables rapid matching and integration in terms of targets, situation, missions, capabilities, and timing, thereby forming a focused energy flow that releases systemic energy against the enemy.

  Human-machine integrated command and control

  The history of operational command development shows that decision-making and control methods in operational command activities always adapt to the development of the times. With the maturity of artificial intelligence technology and the continuous development of the self-generation, self-organization, and self-evolution of military intelligent systems, various weapon systems will evolve from information-based “low intelligence” to brain-like “high intelligence.” The combat style will evolve from information-based system combat to human-machine collaborative combat supported by the system. The autonomy of the war actors will become stronger, and the intelligence level of command and control systems will become higher. Fully leveraging the comparative advantages of “human and machine” and implementing decision-making and control through the “human-machine integration” model is a brand-new command form for future intelligent warfare.

  Human-machine integrated command and control, supported by a reasonable division of functions between humans and machines and efficient decision-making through human-machine interaction, fully leverages the complementary advantages of human brain and machine intelligence to achieve the integration of command art and technology. In the process of intelligent combat decision-making and action, it enables rapid, accurate, scientific, and efficient activities such as situation analysis and judgment, combat concept design, combat decision determination, combat plan formulation, and order issuance. It also adopts a “human-in-the-loop” monitoring mode that combines autonomous action by intelligent combat platforms with timely correction by operators to organize and implement combat operations.

  Human-machine integrated command and control, during planning and decision-making, can construct a combat cloud under the commander’s guidance through ubiquitous battlefield networks, intelligent auxiliary decision-making systems, and distributed intelligent combat platforms. Based on a model- and algorithm-driven intelligent “cloud brain,” it performs intelligent auxiliary decision-making, command and control, and evaluation simulations, combining “human strategy” with “machine strategy.” This leverages the respective strengths of both human and machine, achieving a deep integration of command strategy and intelligent support technologies, significantly improving the speed and accuracy of command decisions. During operational control, staff personnel can, based on operational intentions and missions, utilize intelligent battlefield perception systems, mission planning systems, and command and control systems, following a “synchronous perception—” approach. The basic principle of “rapid response and flexible handling” is based on a unified spatiotemporal benchmark and relies on a multi-dimensional networked reconnaissance and surveillance system to perceive changes in the battlefield situation in real time. It comprehensively uses auxiliary analysis tools to compare and analyze the differences between the current situation and the expected objectives and their impact, and makes timely adjustments to actions and adjusts troop movements on the spot to maintain combat advantage at all times. During the execution of operations, the command and control of intelligent combat platforms by operators of various weapon systems at all levels will be timely and precise to intervene according to the development and changes in the battlefield situation. While giving full play to the high speed, high precision and high autonomous combat capabilities of intelligent combat platforms, it ensures that they always operate under human control and always follow the overall combat intent.

  Autonomous and coordinated combat operations

  Implementing autonomous operations is crucial for commanders at all levels to seize opportunities, adapt to changing circumstances, and act rapidly on the ever-changing battlefield, gaining an advantage and preventing the enemy from making a move. This is a vital operational principle and requirement. Previously, due to constraints such as intelligence gathering, command and control methods, and battlefield coordination capabilities, truly autonomous and coordinated operations were difficult to achieve. However, with the continuous development and widespread application of information technology, collaborative control technology, and especially artificial intelligence in the military field, autonomous and coordinated operations will become the most prevalent form of collaboration in future intelligent warfare.

  Autonomous and coordinated combat operations refer to the rapid acquisition, processing, and sharing of battlefield situation information by various combat forces in a cloud environment supported by multi-dimensional coverage, seamless network links, on-demand extraction of information resources, and flexible and rapid organizational support. This is achieved by utilizing “edge response” intelligence processing systems and big data-based battlefield situation intelligent analysis systems. With little or no reliance on the control of higher command organizations, these forces can accurately and comprehensively grasp intelligence information related to their operations and actively and proactively organize combat and coordinated actions based on changes in the enemy situation and unified operational intentions.

  Autonomous and coordinated combat operations, while enhancing the autonomy of organizational operations at the local level, are further characterized by various intelligent weapon systems possessing the ability to understand combat intentions and highly adaptive and coordinated. They can automatically complete the “OODA” cycle with minimal or no human intervention, forming a complete closed-loop “adaptive” circuit. This enables them to efficiently execute complex and challenging combat missions. In rapidly changing battlefield environments, they can accurately and continuously conduct autonomous reconnaissance and detection of enemy situations, autonomously process battlefield situational information, autonomously identify friend or foe, autonomously track targets, and autonomously and flexibly select mission payloads, and autonomously launch attacks within the permissions granted by operators. Furthermore, during combat, intelligent weapon systems located in different spaces can, as the battlefield situation evolves and combat needs arise, form a combat power generation chain of “situational sharing—synchronous collaboration—optimal energy release” around a unified combat objective. Following the principle of “whoever is suitable, whoever leads; whoever has the advantage, whoever strikes,” they autonomously coordinate, precisely releasing dispersed firepower, information power, mobility, and protective power to the most appropriate targets at the most appropriate time and in the most appropriate manner, autonomously organizing combat operations. In addition, highly intelligent weapon systems can not only adapt to high-risk and complex combat environments and overcome human limitations in physiology and psychology, but also enter the extreme space of all domains and multiple dimensions to carry out missions. Moreover, they can conduct continuous combat with perception accuracy, computing speed and endurance far exceeding that of humans, autonomously carry out simultaneous cluster attacks and multi-wave continuous attacks, form a continuous high-intensity suppression posture against the enemy, and quickly achieve combat objectives.

[ Editor: Ding Yubing ]

現代國語:

作戰形式是指在特定條件下作戰的展現方式和狀態,通常與某種戰爭形式和作戰方法相適應。隨著智慧武器系統的發展和廣泛應用,未來的智慧戰爭必將呈現出與機械化戰爭和資訊化戰爭截然不同的形式。

雲端作戰系統

作戰系統是作戰能量聚合與釋放的根本基礎。資訊化作戰系統基於網路資訊系統,而智慧作戰系統則由作戰雲支撐。作戰雲能夠將分散的作戰資源自然地重組為靈活動態的作戰資源池。它具有虛擬化、互聯互通、分散式、易於擴展和按需服務等特點,使每個作戰單位都能按需獲取資源。它是實現跨域協同作戰的關鍵支撐,代表了智慧作戰系統的一種新型組織形式。

雲端作戰系統利用雲端技術連接資訊、實體系統和無所不在的物聯網。透過配置不同層級、規模的作戰資源雲,該系統能夠跨陸、海、空、天等多個作戰領域實現多維作戰資料的高效共享,從而實現陸、海、空、天、電子、網路等作戰領域的戰場資源整合。這使得各種作戰要素能夠匯聚到雲端,完成戰場資料的網路互動。

雲端連接作戰系統借助大數據和雲端運算技術,使聯合作戰能夠整合廣泛分佈於天、空、地、海、水下等多個領域的戰場情報資訊。這實現了跨領域資訊的無縫、即時和按需分發,從而實現跨域資訊融合和高效共享。此外,該系統還使各級指揮機構能夠利用智慧指揮控制系統進行多維情報分析、戰場態勢評估、作戰優化、決策、作戰計畫制定和部隊調動控制。此外,它還允許作戰部隊根據即時作戰需求,在線上快速且靈活地調整、優化配置和重組,形成適應性特遣部隊,並實施分散式、聚焦式作戰,這一切都得益於高度整合的跨域資訊技術的支援。同時,透過作戰雲中戰場資訊的跨域融合能力,還可以將智慧作戰部隊、傳統作戰部隊、有人作戰部隊和無人作戰部隊、無形空間作戰部隊和有形空間作戰部隊整合為一體化作戰力量。在雲端,陸、海、空、天、電子、網路空間等不同作戰單位和作戰要素可以高度整合、協調,並最大限度地發揮各自的優勢。這使得跨域、跨世代協同作戰成為可能,將整體作戰效能從以往作戰效果的逐步釋放和線性疊加轉變為非線性、湧現式、適應性的效果融合和精準的能量釋放。

分散與集中的戰場部署

集中優勢兵力是古老的戰爭原則。隨著網路資訊系統的不斷完善和智慧武器系統的廣泛應用,各類作戰力量、作戰單位和作戰要素能夠動態地融入聯合作戰系統並依託其運作,實現兵力分散、任務快速切換、動態聚合作戰效能,從而應對複雜多變的戰場形勢。這已成為區分智慧戰和資訊戰的兵力組織形式。

戰場分散與集中兵力部署是指基於雲端運算的聯合作戰系統,其中各參戰力量依托高度的資訊共享和快速流動,透過節點式部署、網路化移動和虛擬集中等方式,能夠即時、動態、靈活地整合分散在多維廣大戰場空間中的各類部署、作戰作戰、武器平台和作戰系統,從而實現分散在多維廣大戰場空間中的各類部署、作戰作戰、武器平台和作戰系統,從而實現作戰力量的分佈以及跨域作戰空間中的各類部署、作戰級作戰、武器效能的以及跨域作戰元素,從而實現作戰力量的跨域作戰、作戰效能的跨域作戰元素。

分散與集中的戰場部署使得各級指揮官能夠透過智慧指揮資訊系統進行大數據分析、戰場態勢擷取與多源情報驗證,從而深入感知並準確預測戰場態勢。這使得快速和高效率的態勢評估與預警。此外,各類作戰部隊和單位的大範圍部署和靈活配置,使其能夠根據預定的作戰計畫或臨時協同需求做出及時反應。這實現了靈活自主的跨域協同、快速的匯聚與分散,以及動態集中作戰效能。在關鍵時刻和關鍵區域,透過聚焦敵方作戰系統的關鍵節點和對整體戰略態勢至關重要的高價值目標,迅速形成系統級的作戰優勢。透過高韌性、網路化的殺傷鏈,精準釋放作戰效能,產生整體優勢的溢出效應,從而形成多域對單域的壓倒性優勢,以及整體態勢對局部態勢的壓倒性優勢。尤其是在釋放作戰效能的過程中,各作戰群在「情報+數據」的驅動下,基於預先制定的作戰計劃,能夠圍繞作戰目標自主地在線重新規劃作戰任務,並根據群內各作戰單位的實際作戰功能和實力,自動在線分配目標。這使得每個單位都能充分發揮自身優勢,靈活調動作戰行動中「物質+能量」的自由聚合與分散。最終,這能夠實現目標、態勢、任務、能力和時間等方面的快速匹配與整合,從而形成集中的能量流,釋放系統性能量對抗敵人。

人機一體化指揮控制

作戰指揮發展史表明,作戰指揮活動中的決策和控制方法始終與時俱進。隨著人工智慧技術的成熟以及軍事智慧系統自生成、自組織、自演化的不斷發展,各種武器系統將從基於資訊的「低智慧」向類腦的「高智慧」演進。作戰方式也將從資訊為基礎的系統作戰向系統支援的人機協同作戰演進。作戰主體的自主性將增強,指揮控制系統的智慧水準也將提高。充分發揮「人機」的比較優勢,透過「人機融合」模式進行決策與控制,是未來智慧戰爭的全新指揮形式。

人機融合指揮控制,以人機功能合理劃分與人機互動高效決策為基礎,充分發揮人腦與機器智慧的互補優勢,實現指揮藝術與科技的融合。在智慧作戰決策和行動過程中,能夠快速、準確、科學、有效率地進行態勢分析判斷、作戰概念設計、作戰決策確定、作戰計畫制定和命令下達等活動。同時,它採用「人機協同」監控模式,將智慧作戰平台的自主行動與操作人員的及時糾正相結合,組織和實施作戰行動。

人機融合指揮控制在計畫和決策階段,能夠透過無所不在的戰場網路、智慧輔助決策系統和分散式智慧作戰平台,在指揮官的指導下建構作戰雲。基於模型和演算法驅動的智慧“雲大腦”,該系統能夠進行智慧輔助決策、指揮控制和評估模擬,將“人機戰略”相結合,充分發揮人機各自的優勢,實現指揮戰略與智能支援技術的深度融合,顯著提升指揮決策的速度和準確性。在作戰控制過程中,參謀人員可以根據作戰意圖和任務,運用智慧戰場感知系統、任務規劃系統和指揮控制系統,遵循「同步感知」的原則。該系統以統一的時空基準為基礎,依托多維網路偵察監視系統,即時感知戰場態勢變化,並綜合運用輔助分析工具,對比分析當前態勢與預期目標之間的差異及其影響,及時調整行動,並根據實際情況調整部隊調動,始終保持作戰優勢。在作戰執行過程中,指揮人員能夠根據作戰意圖和任務,即時運用智慧輔助決策、指揮控制和評估模擬等手段,對戰場態勢變化進行即時感知和評估模擬。各級不同武器系統操作人員對智慧作戰平台的控制,將能夠根據戰場情勢的發展變化及時、精準地進行幹預。在充分發揮智慧作戰平台高速、高精度、高自主作戰能力的同時,確保其始終在人為控制下運行,並始終遵循整體作戰意圖。

自主協同作戰

對於各級指揮官而言,實施自主作戰至關重要,它能夠幫助他們抓住機會、適應不斷變化的環境、在瞬息萬變的戰場上迅速行動,取得優勢並阻止敵方行動。這是一項至關重要的作戰原則和要求。過去,由於情報收集、指揮控制方式以及戰場協同能力等方面的限制,真正實現自主協同作戰較為困難。然而,隨著資訊科技、協同控制技術,特別是人工智慧在軍事領域的不斷發展和廣泛應用,自主協同作戰將成為未來智慧戰爭中最普遍的協同作戰形式。

自主協同作戰是指在多維覆蓋、無縫網路鏈路、按需提取資訊資源以及靈活快速的組織支援等雲環境下,各作戰部隊快速獲取、處理和共享戰場態勢資訊。這主要透過利用「邊緣響應」情報處理系統和基於大數據技術的戰場態勢智慧分析系統來實現。這些部隊在幾乎無需依賴上級指揮機構的控制的情況下,能夠準確、全面地掌握與其作戰相關的情報信息,並根據敵情變化和統一作戰意圖,主動組織作戰和協同行動。

自主協同作戰在增強局部組織作戰自主性的同時,也具有多種智慧武器系統能夠理解作戰意圖並高度適應和協調的特徵。這些系統能夠在極少或無需人為幹預的情況下自動完成“OODA循環”,形成完整的閉環“自適應”迴路。這使得它們能夠有效率地執行複雜且具挑戰性的作戰任務。在瞬息萬變的戰場環境中,智慧武器系統能夠準確、持續地自主偵察敵情,自主處理戰場態勢訊息,自主辨識敵我,自主追蹤目標,自主靈活地選擇任務負荷,並在操作人員授權範圍內自主發動攻擊。此外,在戰鬥中,分佈於不同空間的智慧武器系統能夠隨著戰場態勢的演變和作戰需求的出現,圍繞著統一的作戰目標,形成「態勢共享—同步協同—最優能量釋放」的作戰能力生成鏈。遵循「適者先攻,優勢者出擊」的原則,它們自主協調,在最恰當的時間以最恰當的方式,將分散的火力、資訊能力、機動性和防護能力精準地釋放到最恰當的目標,自主組織作戰行動。此外,高度智慧化的武器系統不僅能夠適應高風險、複雜的作戰環境,克服人類生理和心理的限制,還能進入多域、多維度的極端空間執行任務。此外,它們能夠以遠超人類的感知精度、運算速度和續航能力進行持續作戰,自主執行同步集群攻擊和多波次連續攻擊,形成對敵持續高強度壓制態勢,並迅速達成作戰目標。

[ 編:丁玉冰 ]

中國原創軍事資源:https://mil.gmw.cn/2022-02/284/content_38585848178687.htm

China’s Forward-looking Intelligent Combat System Provides Chinese Military a “Smart” Advantage

中國前瞻性的智慧作戰系統為中國軍隊提供了「智慧」優勢

現代英語:

The evolution of warfare and combat styles is inextricably linked to profound changes in combat systems. The “intelligence” of intelligent combat systems lies not merely in the accumulation of technologies, but more importantly in the reconstruction of the paths for generating and releasing combat power, enabling leaps in combat effectiveness and serving as a key fulcrum for achieving victory in future wars. A deep understanding and forward-looking construction of the “intelligent” advantages of intelligent combat systems has become an essential requirement for winning intelligent warfare.

Survival advantages of elastic redundancy

The survival of operational elements is fundamental to victory in combat. Intelligent combat systems, through distributed and flexible deployment, modular functional reconfiguration, and autonomous damage recovery, have formed a resilient survival mode to cope with high-intensity confrontation and uncertainty.

Heterogeneous and distributed global deployment. Heterogeneity reflects the degree of aggregation of different capabilities on the same platform, while distribution reflects the degree of distribution of the same capability on different platforms. Intelligent combat systems enhance the diversity of platform capabilities through heterogeneity. For example, new combat aircraft can serve as multi-functional integrated platforms with sensing, command and control, relay, and strike capabilities. By distributing combat functions to different platforms, large-scale, low-cost global deployment can be achieved. For instance, the same combat function can be assigned to multiple platforms and systems such as UAVs and loitering munitions. With the heterogeneous dispersion and matrix cross-linking of intelligent nodes, continuous pressure can be formed everywhere and in all directions in physical space, while rapid aggregation in key directions can be achieved. This unifies global elasticity and dynamic real-time optimization, maximizing functional distribution and effectiveness release to cope with the uncertainties of intelligent combat.

Functional restructuring through modular combination. The intelligent combat system, employing a flexible paradigm of software-defined, task-oriented invocation, and modular reconfiguration, deconstructs functions fixed to specific equipment into standardized, interoperable hardware and software modules. During combat, based on rapidly changing battlefield demands, these modules can be quickly and flexibly loaded and combined online through a unified interface and open architecture, achieving non-linear functional combinations and flexible capability reshaping. This plug-and-play, on-demand generation model unlocks unlimited functional potential within a limited physical scale, realizing a shift from “using whatever weapons are available to fight” to “generating the appropriate capabilities for the specific battle,” fundamentally enhancing the adaptability and mission flexibility of the combat system.

Self-healing resilience. The advantage of an intelligent combat system lies not in its absolute invulnerability, but in its self-healing resilience—the ability to detect damage and reconstruct immediately upon interruption. When some nodes fail due to combat damage or interference, the system autonomously and rapidly diagnoses the damage based on preset functions and path redundancy rules. It then mobilizes nearby healthy nodes to take over the mission or activates backup communication paths to rebuild connections, propelling the system to quickly transition to a new stable state. This inherent elastic redundancy allows the system to maintain core functions and reconstruct the combat network even after enduring continuous attacks, minimizing the impact of combat damage on overall combat effectiveness.

The cognitive advantage of agile penetration

Cognitive advantage is key to gaining the initiative in battlefield information and achieving decisive victory. Its essence lies in breaking through the barriers of “information fog” and the constraints of “decision anxiety” through the deep integration of intelligent algorithms and advanced sensors, and realizing a leap from passive perception to proactive cognition.

Resilient communication capable of adapting to changing circumstances. Resilient communication refers to the ability of communication systems to detect interference in real time and dynamically reconfigure links in highly contested and complex electromagnetic environments to maintain the continuity and stability of command and control. Intelligent combat systems, relying on technologies such as cognitive radio, achieve on-demand allocation of communication resources, intelligent optimization of transmission paths, and autonomous reconfiguration of network topology, enabling them to “penetrate gaps” in complex electromagnetic environments and flexibly acquire communication “windows.” This resilience—able to maintain communication even amidst interference and resume operations even after interruptions—ensures the continuity of command and control relationships in extremely harsh electromagnetic environments, providing a reliable communication line for system cognitive activities.

The organic integration of multi-modal information. Multi-modal integration refers to the process of extracting consistency from diverse and heterogeneous information to form a high-value battlefield situation. The intelligent combat system, based on intelligent algorithms, performs cross-modal alignment of data from different sources such as radar, optoelectronics, reconnaissance, and cyber warfare. It automatically extracts enemy deployment, action patterns, and tactical intentions from massive and fragmented intelligence, achieving heterogeneous complementarity and cross-verification. This drives a qualitative leap from data redundancy to accurate intelligence, thereby providing commanders with a comprehensive and reliable battlefield cognitive map, clearing away the “fog of war,” and reaching the core of the situation.

Human-machine interaction achieves seamless intent. Intent-based intent aims to bridge the semantic gap between human commanders and intelligent combat systems, enabling precise and lossless conversion from natural language commands to machine-executable tasks. Intelligent combat systems utilize technologies such as natural language processing and knowledge graphs to construct an intelligent interaction engine with natural language understanding and logical reasoning capabilities. This engine automatically decomposes the commander’s general operational intent into task lists, constraints, and evaluation criteria, generating machine-understandable and executable tactical instructions and action sequences, which are then precisely distributed to the corresponding combat units, directly driving their execution. This “what is thought is what is directed, what is directed is what is attacked” command model significantly reduces the understanding and communication cycle in the traditional command chain, enabling deep integration of human and machine intelligence at the decision-making level and achieving a leap in command effectiveness.

Synergistic advantages of autonomous adaptation

Synergistic advantages are a multiplier for unleashing the effectiveness of system-of-systems warfare. The synergy of intelligent combat systems transcends programmed pre-setup, manifesting as the self-organizing and adaptive synchronization and cooperation of cross-domain combat units under unified rules and common missions. Its essence is the embodiment of system intelligence at the operational level.

Spatiotemporal coordination constrained by rules. Spatiotemporal coordination refers to setting action boundaries and interaction rules for widely dispersed combat units within a unified spatiotemporal reference framework, ensuring their orderly cooperation in the physical domain. Under a unified operational rule framework, each unit of the intelligent combat system autonomously calculates its relative position and predicts its trajectory through intelligent algorithms, achieving time-domain calibration, spatial-domain integration, and frequency-domain nesting of different platforms. This ensures conflict-free path planning, interference-free spectrum use, and accident-free firepower application. This collaborative mechanism, which combines order and flexibility, avoids mutual interference while maintaining tactical flexibility, providing a spatiotemporal reference for combat operations in complex battlefield environments.

Task-driven logical coordination. Logical coordination refers to using combat missions as the underlying logic, autonomously decomposing tasks, allocating resources, and planning actions to achieve intelligent organization and scheduling. The intelligent combat system, based on task analysis, capability matching, and planning generation algorithms, automatically decomposes combat objectives into specific action sequences and intelligently schedules corresponding combat units to “dispatch orders.” Each intelligent node, based on its understanding of the overall mission, real-time situational awareness, and its own capabilities, autonomously decides on action plans through a multi-agent negotiation mechanism and dynamically negotiates and cooperates with relevant units to “accept orders.” This task-oriented command greatly liberates higher-level commanders, enabling the system to possess agility and flexibility in responding to emergencies and significantly improving its mission adaptability.

Target-aligned awareness collaboration. Awareness collaboration refers to the autonomous decision-making and actions of combat units based on a shared understanding of the target and environment, resulting in synergistic effects. Intelligent combat systems consist of systems or nodes with predictive and reasoning capabilities. Driven by operational objectives, they can anticipate the actions of friendly forces and the course of the battlefield, and through local perception and independent decision-making, conduct self-organized and self-inspired collaborative support. This efficiency-driven, unspoken consensus transcends communication constraints and pre-set procedures, enabling the system to demonstrate exceptional adaptability and creativity when facing powerful adversaries.

The evolutionary advantages of learning iteration

Evolutionary advantage is key to a combat system’s sustained competitiveness and ability to seize the initiative on the battlefield. Intelligent combat systems rely on real-time adversarial data to drive overall optimization, accelerate capability diffusion through cross-domain experience transfer, and foster disruptive tactics through virtual gaming environments, thereby achieving autonomous evolution and generational leaps in combat effectiveness during the adversarial process.

The evolution of a system built upon accumulated experience. Intelligent combat systems will gather perception, decision-making, and action data acquired from complex adversarial environments in real time to a knowledge hub. Leveraging advanced algorithms such as reinforcement learning, they will conduct in-depth analysis and mining, performing closed-loop evaluation and dynamic adjustment of system-level operational logic such as command processes, coordination rules, and resource allocation strategies. This will form reusable and verifiable structured knowledge units, enhancing the combat system’s understanding of its environment and its autonomous adaptability. This will enable the entire system to form a shared “collective memory,” achieving adaptive radiation from single-point intelligence to overall operational effectiveness, and ultimately achieving individual evolution that becomes “more refined with each battle.”

Cross-domain empowerment of knowledge transfer. The intelligent combat system, relying on a unified semantic space and feature alignment framework, can rapidly embed localized experiences extracted and summarized from a specific battlefield or domain into other combat domains or mission scenarios. This breaks down information barriers between combat units, enabling the lossless transformation and cross-domain application of combat experience. Essentially, it promotes the secure flow and synergistic effect of knowledge within the system, completing the sublimation and reconstruction from “concrete experience” to “abstract knowledge,” achieving “gains from one battle benefiting all domains,” and accelerating the synchronous evolution of combat capabilities across various domains. This not only significantly improves the overall learning efficiency of the combat system and avoids repeated trial and error, but also achieves the intensive enhancement and systematic inheritance of combat capabilities.

The disruptive potential of game theory and confrontation is emerging. Systemic intelligent game theory aims to break through the boundaries of human cognition, fostering disruptive combat capabilities that transcend traditional experience. Its essence lies in the proactive creation and self-transcendence of knowledge at the system level. By constructing a high-intensity, long-term, realistic “red-blue” adversarial environment in a digital twin battlefield, and utilizing generative adversarial networks and multi-agent reinforcement learning frameworks, intelligent combat systems can explore the unknown boundaries of the strategy space in continuous game development. Based on game theory and complex systems theory, the system can spontaneously form better strategies during adversarial evolution, leading to combat modes and organizational forms that transcend conventional cognition. This makes the intelligent combat system a “super think tank” capable of continuously producing disruptive tactics.

現代國語:

戰爭和作戰方式的演變與作戰系統的深刻變革密不可分。智慧作戰系統的「智慧」不僅在於技術的積累,更重要的是重構作戰能力生成與釋放路徑,從而實現作戰效能的飛躍,並成為未來戰爭取勝的關鍵支點。深入理解並前瞻性地建構智慧作戰系統的「智慧」優勢,已成為贏得智慧戰爭的必要條件。

彈性冗餘的生存優勢

作戰要素的生存是戰爭勝利的根本。智慧作戰系統透過分散式靈活部署、模組化功能重建和自主損傷恢復,形成了應對高強度對抗和不確定性的韌性生存模式。

異質分散式全球部署。異質性反映了不同能力在同一平台上的聚合程度,而分散式則反映了相同能力在不同平台上的分佈程度。智慧作戰系統透過異質性增強了平台能力的多樣性。例如,新型作戰飛機可以作為集感知、指揮控制、中繼和打擊能力於一體的多功能整合平台。透過將作戰功能分配到不同的平台,可以實現大規模、低成本的全球部署。例如,同一作戰功能可以分配給多個平台和系統,例如無人機和巡彈。借助智慧節點的異質分散和矩陣式交叉連接,可以在物理空間的各個方向形成持續的壓力,同時實現關鍵方向的快速聚合。這統一了全局彈性和動態即時最佳化,最大限度地提高功能分配和效能釋放,以應對智慧作戰的不確定性。

透過模組化組合進行功能重構。智慧作戰系統採用軟體定義、任務導向和模組化重構的靈活範式,將固定於特定設備的功能解構為標準化、可互通的硬體和軟體模組。在戰鬥中,基於瞬息萬變的戰場需求,這些模組可透過統一的介面和開放式架構,在線上快速靈活地載入和組合,實現非線性功能組合和靈活的能力重塑。這種即插即用、按需生成的模式,在有限的物理規模內釋放了無限的功能潛力,實現了從「使用任何可用武器作戰」到「為特定戰鬥生成合適的能力」的轉變,從根本上增強了作戰系統的適應性和任務靈活性。

自癒韌性。智慧作戰系統的優勢不在於其絕對的無懈可擊,而在於其自癒韌性——即在中斷發生後能夠立即檢測損傷並進行重建。當某些節點因戰鬥損傷或乾擾而失效時,系統會基於預設功能和路徑冗餘規則,自主快速地診斷損傷。然後,它會調動附近的健康節點接管任務,或啟動備用通訊路徑重建連接,從而使系統迅速過渡到新的穩定狀態。這種固有的彈性冗餘使系統即使在遭受持續攻擊後也能維持核心功能並重建作戰網絡,從而最大限度地降低戰鬥損傷對整體作戰效能的影響。

敏捷滲透的認知優勢

認知優勢是掌握戰場資訊主動權並取得決定性勝利的關鍵。其本質在於透過智慧演算法和先進感測器的深度融合,突破「資訊迷霧」的障礙和「決策焦慮」的束縛,實現從被動感知到主動認知的飛躍。

適應環境變化的彈性通訊。彈性通訊是指通訊系統在高度對抗且複雜的電磁環境中即時偵測幹擾並動態重配置鏈路,以維持指揮控制的連續性和穩定性的能力。智慧作戰系統依托認知無線電等技術,實現通訊資源的按需分配、傳輸路徑的智慧優化以及網路拓撲的自主重配置,使其能夠在複雜的電磁環境中「穿透縫隙”,靈活獲取通訊「視窗」。這種韌性-即使在…之中也能保持溝通即使中斷後也能進行幹擾並恢復操作-確保在極度惡劣的電磁環境下指揮控制關係的連續性,為系統認知活動提供可靠的通訊線路。

多模態訊息的有機融合。多模態融合是指從多樣化且異構的資訊中提取一致性,形成高價值的戰場態勢的過程。基於智慧演算法的智慧作戰系統,對雷達、光電、偵察和網路戰等不同來源的資料進行跨模態對齊。它能夠從海量且碎片化的情報中自動提取敵方部署、行動模式和戰術意圖,實現異質互補和交叉驗證。這實現了從數據冗餘到精準情報的質的飛躍,從而為指揮官提供全面可靠的戰場認知地圖,撥開“戰爭迷霧”,直擊戰局核心。

人機互動實現無縫意圖傳遞。基於意圖的意圖旨在彌合人類指揮官與智慧作戰系統之間的語義鴻溝,實現自然語言指令到機器可執行任務的精確無損轉換。智慧作戰系統利用自然語言處理和知識圖譜等技術建構具備自然語言理解和邏輯推理能力的智慧互動引擎。該引擎自動將指揮官的整體作戰意圖分解為任務清單、約束條件和評估標準,產生機器可理解和執行的戰術指令和行動序列,並將其精確地分發給相應的作戰單元,直接驅動其執行。這種「所想即所發,所發即所攻」的指揮模式顯著縮短了傳統指揮鏈中的理解和溝通週期,實現了決策層面的人機智能深度融合,從而大幅提升了指揮效能。

自主調適的協同優勢

協同優勢是釋放系統間作戰效能的倍增器。智慧作戰系統的協同作用超越了預設的程序,表現為跨域作戰單元在統一規則和共同任務下進行自組織、自適應的同步與協作。其本質是系統智能在作戰層面的體現。

規則約束下的時空協調。時空協調是指在統一的時空參考框架內,為分散部署的作戰單元設定行動邊界和交互規則,確保其在物理域內的有序協作。在統一的作戰規則框架下,智慧作戰系統的每個單元透過智慧演算法自主計算其相對位置並預測其軌跡,實現不同平台的時域校準、空域融合和頻域嵌套。這確保了無衝突的路徑規劃、無幹擾的頻譜使用和無事故的火力運用。這種兼具有序性和靈活性的協同機制,在保持戰術靈活性的同時避免了相互幹擾,為複雜戰場環境下的作戰行動提供了時空參考。

任務驅動的邏輯協調。邏輯協調是指以作戰任務為底層邏輯,自主分解任務、分配資源、規劃行動,進而達成智慧化的組織與調度。智慧作戰系統基於任務分析、能力匹配和計畫生成演算法,自動將作戰目標分解為具體的行動序列,並智慧調度相應的作戰單位進行「命令下達」。每個智慧節點基於對整體任務的理解、即時態勢感知以及自身能力,透過多智能體協商機制自主制定行動計劃,並與相關單位動態協商協作以「接受命令」。這種以任務為導向的指揮方式極大地解放了上級指揮官,使系統在應對突發事件時具備敏捷性和靈活性,顯著提升了任務適應性。

目標對齊感知協同。感知協同是指作戰單位基於對目標和環境的共同理解進行自主決策和行動,從而產生協同效應。智慧作戰系統由具備預測和推理能力的系統或節點組成。在營運目標的驅動下,它們可以智慧作戰系統能夠預判友軍行動和戰場局勢,透過局部感知和獨立決策,進行自組織、自發的協同支援。這種以效率為導向的、無聲的共識超越了溝通限制和預設程序,使系統在面對強大對手時展現出卓越的適應性和創造力。

學習迭代的演化優勢

演化優勢是作戰系統保持競爭力和在戰場上掌握主動權的關鍵。智慧作戰系統依靠即時對抗數據來驅動整體優化,透過跨域經驗轉移加速能力擴散,並透過虛擬博弈環境培養顛覆性戰術,從而在對抗過程中實現自主演化和作戰效能的世代飛躍。

基於經驗累積的系統演化。智慧作戰系統將從複雜的對抗環境中即時獲得的感知、決策和行動數據收集到知識中心。利用強化學習等先進演算法,該系統將進行深度分析和挖掘,對系統級運作邏輯(如指揮流程、協調規則和資源分配策略)進行閉環評估和動態調整,從而形成可重用、可驗證的結構化知識單元,增強作戰系統對環境的理解和自主適應能力。這將使整個系統形成共享的“集體記憶”,實現從單點智慧到整體作戰效能的自適應輻射,並最終實現“越戰越精進”的個體演進。

跨域知識遷移賦能。智慧作戰系統依托統一的語意空間和特徵對齊框架,能夠將從特定戰場或領域提取和總結的局部經驗快速嵌入到其他作戰領域或任務場景中,打破作戰單元之間的資訊壁壘,實現作戰經驗的無損轉換和跨域應用。本質上,它促進了系統內知識的安全流動和協同效應,完成了從「具體經驗」到「抽象知識」的昇華和重構,實現了「一戰多域」的效益,並加速了跨領域作戰能力的同步演進。這不僅顯著提高了作戰系統的整體學習效率,避免了重複試錯,而且實現了作戰能力的強化和系統繼承。

博弈論與對抗的顛覆性潛能正在顯現。系統智慧博弈論旨在突破人類認知的限制,培養超越傳統經驗的顛覆性作戰能力。其本質在於系統層面知識的主動創造與自我超越。透過在數位孿生戰場上建構高強度、長期、逼真的「紅藍」對抗環境,並利用生成對抗網路和多智能體強化學習框架,智慧作戰系統能夠在持續的博弈演進中探索戰略空間的未知邊界。基於博弈論和複雜系統理論,該系統能夠在對抗演化過程中自發性地形成更優策略,從而產生超越傳統認知的作戰模式和組織形式。這使得該智慧作戰系統成為一個能夠持續產生顛覆性戰術的「超級智庫」。

中國原創軍事資源:https://military.people.com.cn/n18/2025/18216/c1011-480682584829.html

Looking at Intelligent Warfare: Focusing on Counter-AI Operations in Chinese Military Operations During Intelligent Warfare

檢視情報戰:聚焦中國軍事行動中的反空戰策略

現代英語:

Original Title: A Look at Intelligent Warfare: Focusing on Counter-AI Operations in Intelligent Warfare

    introduction

    The widespread application of science and technology in the military field has brought about profound changes in the form of warfare and combat methods. Military competition among major powers is increasingly manifested as technological subversion and counter-subversion, surprise attacks and counter-surprise attacks, and offsetting and counter-offsetting. To win future intelligent warfare, it is necessary not only to continuously promote the deep transformation and application of artificial intelligence technology in the military field, but also to strengthen dialectical thinking, adhere to asymmetric thinking, innovate and develop anti-AI warfare theories and tactics, and proactively plan research on anti-AI technologies and the development of weapons and equipment to achieve victory through “breaking AI” and strive to seize the initiative in future warfare.

    Fully recognize the inevitability of anti-artificial intelligence warfare

    In his essay “On Contradiction,” Comrade Mao Zedong pointed out that “the law of contradiction in things, that is, the law of unity of opposites, is the most fundamental law of dialectical materialism.” Throughout the history of military technology development and its operational application, there has always been a dialectical relationship between offense and defense. The phenomenon of mutual competition and alternating suppression between the “spear” of technology and the “shield” of corresponding countermeasures is commonplace.

    In the era of cold weapons, people not only invented eighteen kinds of weapons such as knives, spears, swords, and halberds, but also corresponding helmets, armor, and shields. In the era of firearms, the use of gunpowder greatly increased attack range and lethality, but it also spurred tactical and technical innovations, exemplified by defensive fortifications such as trenches and bastions. In the mechanized era, tanks shone brightly in World War II, and the development of tank armor and anti-tank weapons continues to this day. In the information age, “electronic attack” and “electronic protection,” centered on information dominance, have sparked a new wave of interest, giving rise to electronic warfare units. Furthermore, numerous opposing concepts in the military field, such as “missiles” versus “anti-missile,” and “unmanned combat” versus “counter-unmanned combat,” abound.

    It should be recognized that “anti-AI warfare,” as the opposite concept of “intelligent warfare,” will inevitably emerge gradually with the widespread and in-depth application of intelligent technologies in the military field. Forward-looking research into the concepts, principles, and tactical implementation paths of anti-AI warfare is not only a necessity for a comprehensive and dialectical understanding of intelligent warfare, but also an inevitable step to seize the high ground in future military competition and implement asymmetric warfare.

    Scientific Analysis of Counter-AI Combat Methods and Paths

    Currently, artificial intelligence (AI) technology is undergoing a leapfrog development, moving from weak to strong and from specialized to general-purpose applications. From its underlying support perspective, data, algorithms, and computing power remain its three key elements. Data is the fundamental raw material for training and optimizing models, algorithms determine the strategies and mechanisms for data processing and problem-solving, and computing power provides the hardware support for complex calculations. Seeking ways to “break through” AI by addressing these three elements—data, algorithms, and computing power—is an important methodological approach for implementing counter-AI warfare.

    Counter-data warfare. Data is the raw material for artificial intelligence to learn and reason, and its quality and diversity significantly impact the accuracy and generalization ability of models. Numerous examples in daily life demonstrate how minute changes in data can cause AI models to fail. For instance, facial recognition models on mobile phones may fail to accurately identify individuals due to factors such as wearing glasses, changing hairstyles, or changes in ambient light; autonomous driving models may also misjudge road conditions due to factors like road conditions, road signs, and weather. The basic principle of counter-data warfare is to mislead the training and judgment processes of military intelligent models by creating “contaminated” data or altering its distribution characteristics. This “inferiority” in the data leads to “errors” in the model, thereby reducing its effectiveness. Since AI models can comprehensively analyze and cross-verify multi-source data, counter-data warfare should focus more on multi-dimensional features, packaging false data information to enhance its “authenticity.” In recent years, foreign militaries have conducted relevant experimental verifications in this area. For example, by using special materials for coating and infrared emitter camouflage, the optical and infrared characteristics of real weapon platforms, and even the vibration effects of engines, can be simulated to deceive intelligent intelligence processing models; in cyberspace, traffic data camouflage can be implemented to improve the silent operation capability of network attacks and reduce the effectiveness of network attack detection models.

    Anti-algorithm warfare. The essence of an algorithm is a strategy mechanism for solving problems described in computer language. Because the scope of application of such strategy mechanisms is limited, they may fail when faced with a wide variety of real-world problems. A typical example is Lee Sedol’s “divine move” in the 2016 human-machine Go match. Many professional Go players, after reviewing the game, stated that the “divine move” was actually invalid, yet it worked against AlphaGo. AlphaGo developer Silva explained this by saying that Lee Sedol exploited a previously unknown vulnerability in the computer; other analyses suggest that this move might have contradicted AlphaGo’s Go logic or been outside its strategic learning range, making it unable to respond. The basic principle of anti-algorithm warfare is to target the vulnerabilities in the algorithm’s strategy mechanism and weaknesses in its model architecture through logical attacks or deception to reduce the algorithm’s effectiveness. Anti-algorithm warfare should be combined with specific combat actions to achieve “misleading and deceiving” the algorithm. For example, drone swarm reconnaissance operations often use reinforcement learning algorithms to plan reconnaissance paths. In this case, irregular or abnormal actions can be created to reduce or disable the reward mechanism in the reinforcement learning algorithm model, thereby reducing its reconnaissance search efficiency.

    Counter-computing power warfare. The strength of computing power represents the speed at which data processing can be converted into information and decision-making advantages. Unlike counter-data warfare and counter-algorithm warfare, which primarily rely on soft confrontation, counter-computing power warfare employs a combination of hard and soft tactics. Hard destruction mainly refers to attacks on enemy computing centers and computing network infrastructure, crippling their AI models by cutting off their computing power. Soft confrontation focuses on increasing the enemy’s computing costs, primarily by creating a “fog of war” and data noise. For example, during operations, large quantities of meaningless data of various types, such as images, audio, video, and electromagnetic data, can be generated to constrain and deplete the enemy’s computing resources, reducing their effective utilization rate. Furthermore, attacks can also be launched against weak points in the defenses of the computing power support environment and infrastructure. Computing centers consume enormous amounts of electricity; attacking and destroying their power support systems can also achieve the effect of counter-computing power warfare.

    Forward-looking planning for the development of anti-artificial intelligence combat capabilities

    In all warfare, one engages with conventional tactics and wins with unconventional ones. Faced with intelligent warfare, while continuously advancing and improving intelligent combat capabilities, it is also necessary to strengthen preparedness for counter-AI warfare, proactively planning for theoretical innovation, supporting technology development, and equipment platform construction related to counter-AI warfare, ensuring the establishment of an intelligent combat system that integrates offense and defense, and combines defense and counter-attack.

    Strengthen theoretical innovation in counter-AI warfare. Scientific military theory is combat effectiveness. Whether it’s military strategic innovation, military technological innovation, or other aspects of military innovation, all are inseparable from theoretical guidance. We must adhere to liberating our minds, broadening our horizons, and strengthening dialectical thinking. We must use theoretical innovation in counter-AI warfare as a supplement and breakthrough to construct an intelligent warfare theoretical system that supports and serves the fight for victory. We must adhere to the principle of “you fight your way, I fight my way,” strengthening asymmetric thinking. Through in-depth research on the concepts, strategies, and tactics of counter-AI warfare, we must provide scientific theoretical support for seizing battlefield intelligence dominance and effectively leverage the leading role of military theory. We must adhere to the integration of theory and technology, enhancing our scientific and technological awareness, innovation, and application capabilities. We must establish a closed loop between counter-AI warfare theory and technology, allowing them to complement and support each other, achieving deep integration and positive interaction between theory and technology.

    Emphasis should be placed on accumulating military technologies for countering artificial intelligence. Science and technology are crucial foundations for generating and enhancing combat effectiveness. Breakthroughs in some technologies can have disruptive effects, potentially even fundamentally altering the traditional landscape of warfare. Currently, major world powers view artificial intelligence as a disruptive technology and have elevated the development of military intelligence to a national strategy. Simultaneously, some countries are actively conducting research on technologies related to countering artificial intelligence warfare, exploring methods to counter AI and aiming to reduce the effectiveness of adversaries’ military intelligent systems. Therefore, it is essential to both explore and follow up, strengthening research and tracking of cutting-edge technologies, actively discovering, promoting, and fostering the development of technologies with counter-disruptive capabilities, such as intelligent countermeasures, to seize the technological advantage at the outset of counter-AI warfare and prevent enemy technological surprise attacks; and to carefully select technologies, maintaining sufficient scientific rationality and accurate judgment to dispel the technological “fog” and avoid falling into the adversary’s technological traps.

Developing anti-AI warfare weapons and equipment. Designing weapons and equipment is designing future warfare; we develop weapons and equipment based on the types of warfare we will fight in the future. Anti-AI warfare is an important component of intelligent warfare, and anti-AI weapons and equipment will play a crucial role on the future battlefield. When developing anti-AI warfare weapons and equipment, we must first closely align with battlefield needs. We must closely integrate with the adversary, mission, and environment to strengthen anti-AI warfare research, accurately describe anti-AI warfare scenarios, and ensure that the requirements for anti-AI warfare weapons and equipment are scientifically sound, accurate, and reasonable. Secondly, we must adopt a cost-conscious approach. Recent local wars have shown that cost control is a crucial factor influencing the outcome of future wars. Anti-AI warfare focuses on interfering with and deceiving the enemy’s military intelligent systems. Increasing the development of decoy weapon platforms is an effective way to reduce costs and increase efficiency. By using low-cost simulated decoy targets to deceive the enemy’s intelligent reconnaissance systems, the “de-intelligence” effect can be extended and amplified, aiming to deplete their high-value precision-guided missiles and other high-value strike weapons. Finally, we must emphasize simultaneous development, use, and upgrading. Intelligent technologies are developing rapidly and iterating quickly. It is crucial to closely monitor the application of cutting-edge military intelligent technologies by adversaries, accurately understand their intelligent model algorithm architecture, and continuously promote the upgrading of the latest counter-artificial intelligence technologies in weapon platforms to ensure their high efficiency in battlefield application. (Kang Ruizhi, Li Shengjie)

現代國語:

原文標題:智慧化戰爭面面觀-關注智慧化戰爭中的反人工智慧作戰

引言

科學技術在軍事領域的廣泛運用,引起戰爭形態和作戰方式的深刻變化,大國軍事博弈越來越表現為技術上的顛覆與反顛覆、突襲與反突襲、抵消與反抵消。打贏未來智慧化戰爭,既要不斷推進人工智慧技術在軍事領域的深度轉化應用,還應加強辯證思維、堅持非對稱思想,創新發展反人工智慧作戰理論和戰法,前瞻佈局反人工智慧技術研究和武器裝備研發,實現「破智」制勝,努力掌握未來戰爭主動權。

充分認識反人工智慧作戰必然性

毛澤東同志在《矛盾論》中指出:「事物的矛盾法則,即對立統一的法則,是唯物辯證法的最根本的法則。」縱觀軍事技術發展及其作戰運用歷史,從來都充滿了攻與防的辯證關係,技術之矛與反制止制、反制止制相較制、相較制抗擊現象之間的技術之緣關係。

冷兵器時代,人們不僅發明出「刀、槍、劍、戟」等十八般兵器,與之對應的「盔、甲、盾」等也被創造出來。熱兵器時代,火藥的使用大幅提升了攻擊距離和殺傷力,但同時也催生了以「塹壕」「稜堡」等防禦工事為代表的技戰術創新。機械化時代,坦克在二戰中大放異彩,人們對「坦克裝甲」與「反坦克武器」相關技術戰術的開發延續至今。資訊時代,圍繞制資訊權的「電子攻擊」與「電子防護」又掀起一陣新的熱潮,電子對抗部隊應運而生。此外,「飛彈」與「反導」、「無人作戰」與「反無人作戰」等軍事領域的對立概念不勝枚舉。

應當看到,「反人工智慧作戰」作為「智慧化作戰」的對立概念,也必將隨著智慧科技在軍事領域的廣泛深度運用而逐漸顯現。前瞻性研究反人工智慧作戰相關概念、原則及其技戰術實現路徑,既是全面辯證認識智慧化戰爭的時代需要,也是搶佔未來軍事競爭高地、實施非對稱作戰的必然之舉。

科學分析反人工智慧作戰方法路徑

目前,人工智慧技術正經歷由弱向強、由專用向通用的跨越式發展階段。從其底層支撐來看,數據、演算法、算力依舊是其三大關鍵要素。其中,資料是訓練與最佳化模型的基礎原料,演算法決定了資料處理與問題解決的策略機制,算力則為複雜運算提供硬體支撐。從資料、演算法、算力三個要素的角度尋求「破智」之道,是實施反人工智慧作戰的重要方法路徑。

反資料作戰。數據是人工智慧實現學習和推理的原始素材,數據的品質和多樣性對模型的準確度和泛化能力有重要影響。生活中因為微小數據變化而導致人工智慧模型失效的例子比比皆是。例如,手機中的人臉辨識模型,可能會因人戴上眼鏡、改變髮型或環境明暗變化等原因,而無法準確辨識身分;自動駕駛模型也會因路況、路標及天氣等因素,產生對道路狀況的誤判。實施反數據作戰,其基本原理是透過製造“污染”數據或改變數據的分佈特徵,來誤導軍事智能模型的訓練學習過程或判斷過程,用數據之“差”引發模型之“謬”,從而降低軍事智能模型的有效性。由於人工智慧模型能夠對多源數據進行綜合分析、交叉印證,反數據作戰應更加註重從多維特徵出發,包裝虛假數據信息,提升其「真實性」。近年來,外軍在這方面已經有相關實驗驗證。例如,利用特殊材料塗裝、紅外線發射裝置偽裝等方式,模擬真實武器平台光學、紅外線特徵甚至是引擎震動效果,用來欺騙智慧情報處理模型;在網路空間,實施流量資料偽裝,以提升網路攻擊靜默運作能力,降低網路攻擊偵測模型的效果。

反演算法作戰。演算法的本質,是用電腦語言描述解決問題的策略機制。由於這種策略機制的適應範圍有限,在面對千差萬別的現實問題時可能會失效,一個典型例子就是2016年人機圍棋大戰中李世石的「神之一」。不少職業圍棋選手複盤分析後表示,「神之一手」其實並不成立,但卻對「阿爾法狗」發揮了作用。 「阿爾法狗」開發者席爾瓦對此的解釋是,李世石點中了電腦不為人知的漏洞;還有分析稱,可能是「這一手」與「阿爾法狗」的圍棋邏輯相悖或不在其策略學習範圍內,導致其無法應對。實施反演算法作戰,其基本原理是針對演算法策略機制漏洞和模型架構弱點,進行邏輯攻擊或邏輯欺騙,以降低演算法有效性。反演算法作戰應與具體作戰行動結合,達成針對演算法的「誤導欺騙」。例如,無人機群偵察行動常採用強化學習演算法模型規劃偵察路徑,針對此情況,可透過製造無規則行動或反常行動,致使強化學習演算法模型中的獎勵機制降效或失效,從而達成降低其偵察搜尋效率的目的。

反算力作戰。算力的強弱代表著將資料處理轉換為資訊優勢和決策優勢的速度。有別於反數據作戰和反演算法作戰以軟對抗為主,反算力作戰的對抗方式是軟硬結合的。硬摧毀主要指對敵算力中心、計算網路設施等實施的打擊,透過斷其算力的方式使其人工智慧模型難以發揮作用;軟對抗著眼加大敵算力成本,主要以製造戰爭「迷霧」和資料雜訊為主。例如,作戰時大量產生影像、音訊、視訊、電磁等多類型的無意義數據,對敵算力資源進行牽制消耗,降低其算力的有效作用率。此外,也可對算力的支撐環境和配套建設等防備薄弱環節實施攻擊,算力中心電能消耗巨大,對其電力支援系統進行攻擊和摧毀,也可達成反算力作戰的效果。

前瞻佈局反人工智慧作戰能力建設

凡戰者,以正合,以奇勝。面對智慧化戰爭,持續推動提升智慧化作戰能力的同時,也需強化對反人工智慧作戰的未雨綢繆,前瞻佈局反人工智慧作戰相關理論創新、配套技術發展與裝備平台建設,確保建立攻防兼備、防反一體的智慧化作戰體系。

加強反人工智慧作戰理論創新。科學的軍事理論就是戰鬥力,軍事戰略創新也好,軍事科技創新也好,其他方面軍事創新也好,都離不開理論指導。要堅持解放思想、開拓視野,強化辯證思維,以反人工智慧作戰理論創新為補充和突破,建構支撐和服務打贏制勝的智慧化作戰理論體系。要堅持你打你的、我打我的,強化非對稱思想,透過對反人工智慧作戰概念、策略戰法等問題的深化研究,為奪取戰場制智權提供科學理論支撐,切實發揮軍事理論的先導作用。要堅持理技融合,增強科技認知力、創新力、運用力,打通反人工智慧作戰理論與技術之間的閉環迴路,讓兩者互相補充、互為支撐,實現理論與技術的深度融合與良性互動。

注重反人工智慧軍事技術累積。科學技術是產生和提高戰鬥力的重要基礎,有些技術一旦突破,影響將是顛覆性的,甚至可能從根本上改變傳統的戰爭攻防格局。目前,世界各主要國家將人工智慧視為顛覆性技術,並將發展軍事智慧化上升為國家戰略。同時,也有國家積極進行反人工智慧作戰相關技術研究,探索人工智慧對抗方法,意圖降低對手軍事智慧系統效能。為此,既要探索跟進,加強對前沿技術的跟踪研究,積極發現、推動、催生智能對抗這類具有反顛覆作用的技術發展,在反人工智能作戰起步階段就搶佔技術先機,防敵技術突襲;還要精挑細選,注重保持足夠科學理性和準確判斷,破除技術“迷霧”,避免陷入對手技術陷阱。

研發反人工智慧作戰武器裝備。設計武器裝備就是設計未來戰爭,未來打什麼仗就發展什麼武器裝備。反人工智慧作戰是智慧化戰爭的重要組成部分,反人工智慧武器裝備也將在未來戰場上發揮重要作用。在研發反人工智慧作戰武器裝備時,首先要緊貼戰場需求。緊密結合作戰對手、作戰任務和作戰環境等,加強反人工智慧作戰研究,把反人工智慧作戰場景描述準確,確保反人工智慧作戰武器裝備需求論證科學、準確、合理。其次要建立成本思維。最新局部戰爭實踐表明,作戰成本控制是影響未來戰爭勝負的重要因素。反人工智慧作戰重在對敵軍事智慧系統的干擾與迷惑,加大誘耗型武器平台研發是一種有效的降本增效方法。透過低成本模擬示假目標欺騙敵智能偵察系統,可將「破智」效應延伸放大,力求消耗其精確導引飛彈等高價值打擊武器。最後要注重邊建邊用邊升級。智慧技術發展速度快、更新迭代快,要緊密追蹤對手前沿軍事智慧技術應用,摸準其智慧模型演算法架構,不斷推動最新反人工智慧技術在武器平台中的運用升級,確保其戰場運用的高效性。 (康睿智 李聖傑)

中國原創軍事資源:https://mil.news.sina.com.cn/zonghe/2025-05-20/doc-inexeiih2818486808984.shtml

Where is the Transformation of Chinese Military Intelligent War Preparedness Heading?

中國軍事情報戰備轉型將走向何方?

現代英語:

Where should the intelligent transformation for combat readiness go?

Currently, the form of warfare is rapidly evolving towards intelligence, and the era of intelligent warfare is imminent. To adapt to the development of military intelligent technology, the changing mechanisms of war, and the high-quality development of the armed forces, it is imperative to accelerate the advancement of intelligent combat readiness. Modern combat readiness must, while advancing the transformation from mechanization and semi-mechanization to informatization, further proactively address the challenges of military intelligence, adhere to intelligence as the guiding principle, and accelerate the integrated development of mechanization, informatization, and intelligence. In short, vigorously promoting intelligent combat readiness is a practical necessity for driving the high-quality development of national defense and the armed forces; only by successfully transforming to intelligent combat readiness can we promote the leapfrog development of the military’s combat capabilities.

Construct an intelligent warfare theoretical system. Focusing on solving key and difficult issues in intelligent warfare theory, such as war prediction, war forms, war design, operational concepts, operational styles, operational systems, troop formation, and troop training, we will deepen research on the application of intelligent warfare, explore the winning mechanisms, characteristics, laws, tactics, action methods, and comprehensive support of intelligent warfare, enrich the theories of intelligent warfare, intelligent operations, and the construction of intelligent combat forces, and gradually construct an intelligent warfare theoretical system.

Establish an intelligent command and control paradigm. Strengthen the development of technologies such as adversarial and game-theoretic operational planning, digital twin parallel simulation, and efficient organization and precise scheduling of complex operational resources. Enhance capabilities such as automatic planning of operational plans under large-scale, high-intensity conditions and autonomous decomposition of cross-domain and cross-level tasks. Achieve deep integration of military knowledge and machine intelligence, reliable and explainable auxiliary decision-making, and self-learning and self-evolving adversarial strategies. Integrate technological achievements such as sensing, networking, cloud computing, and quantum computing to enhance intelligent auxiliary capabilities in situation generation, operational command, and staff operations. Accelerate the development of intelligent staff business systems and intelligently upgrade and transform operational command information systems. Achieve intelligent information Q&A, intelligent plan generation, and decision support suggestions for typical campaign/tactical command, greatly reducing the workload of staff personnel and significantly improving the timeliness of command operations.

Develop intelligent weapon and equipment systems. Strengthen the intelligent upgrading and transformation of traditional weapons, promote the practical application of intelligent technologies in backbone equipment, and deploy low-cost, expendable unmanned combat platforms on a large scale. Develop intelligent individual soldier integrated systems, air-to-ground unmanned swarm collaborative attack systems, and underground space swarm warfare systems, etc., research and develop intelligent flexible wearable technologies and mobile intelligent terminal technologies, develop intelligent wearable equipment, brain-computer interface helmets, and human implant devices, etc., and accelerate the application of intelligent new weapon platforms, using the pioneering development of key equipment to drive overall breakthroughs.

Increase the proportion of intelligent combat forces. Focusing on optimizing structure and function, implement intelligent design for the existing organizational structure of the armed forces, and gradually increase the proportion of intelligent combat forces. Formulate talent development plans, cultivate the intelligent literacy of combat personnel, and explore a talent cultivation path that integrates military and civilian sectors, services, and enterprises. Build a new generation of combat forces that are intelligently led, cross-domain collaborative, all-domain mobile, and precise and multi-functional; focus on research on intelligent air defense and anti-missile systems, passive detection and intelligent identification of aerial targets, and build intelligent air combat forces such as anti-aircraft unmanned combat aircraft and “swarm” aircraft; emphasize research on intelligent missiles and develop long-range missile deterrence and strike capabilities; deepen research on the architecture design of intelligent attack and defense systems in cyberspace and the intelligent generation of attack strategies, upgrade the new generation of cyberspace reconnaissance, attack, and defense forces, and comprehensively enhance intelligent combat capabilities.

Optimize intelligent autonomous collaboration methods. Focusing on the human-machine “interaction-understanding-co-progress” framework, break through human-machine hybrid perception enhancement and human-machine adaptive multi-task collaboration to improve human-machine hybrid perception capabilities, cognitive abilities, and overall combat effectiveness in complex battlefield environments, achieving complementarity and intelligent enhancement between human wisdom and machine intelligence. Accelerate the development of applied research in areas such as intelligent swarm distributed elastic architecture, self-organizing anti-jamming communication and interaction, distributed autonomous collaboration in complex confrontation scenarios, and swarm intelligent command and control adapted to complex environments and tasks. Enhance the autonomous elastic planning and swarm intelligence confrontation learning capabilities of unmanned swarms in complex scenarios, promoting an overall leap in the combat effectiveness of multi-domain/cross-domain heterogeneous swarms.

Innovate an intelligent, all-dimensional support model. Facing the overall requirements of comprehensive support for future battlefields, including all-time intelligent perception, precise control of supplies and ammunition, and accurate delivery of combat supplies, enhance the intelligent combat logistics equipment support capabilities. Develop capabilities such as comprehensive multi-dimensional support demand mining across all domains, online networked dynamic monitoring of equipment status, autonomous early warning of support risks, and on-demand allocation of support resources. Promote research and verification of intelligent network information systems, intelligent military logistics systems, intelligent support for battlefield facilities and environment information, smart individual soldier support, intelligent rapid medical treatment for future battlefields, and intelligent energy support and transportation delivery, achieving the organic integration of combat, technology, and logistics support elements with combat command and troop movements.

現代國語:

智慧戰備轉型應走向何方?

當前,戰爭形式正迅速朝向智慧化演進,智慧戰時代迫在眉睫。為適應軍事智慧技術的發展、戰爭機制的轉變以及軍隊高品質發展,加速推動智慧戰備勢在必行。現代戰備在推動從機械化、半機械化轉型為資訊化的同時,必須更積極主動地應對軍事情報挑戰,堅持以情報為指導原則,加速機械化、資訊化、情報化整合發展。總之,大力推動智慧戰備是推動國防和軍隊高品質發展的現實需求;只有成功實現智慧戰備轉型,才能推動軍隊作戰能力的跨越式發展。

建構智能戰理論體系。我們將著力解決智慧戰理論中的關鍵難點問題,例如戰爭預測、戰爭形態、戰爭設計、作戰理念、作戰風格、作戰體系、部隊編組和部隊訓練等,深化智能戰應用研究,探索智能戰的製勝機制、特徵、規律、戰術、行動方法和綜合保障,豐富智能戰、智能作戰和智能作戰力量建設的理論,逐步構建的理論體系。

建立智慧指揮控制範式。加強對抗性與博弈論作戰規劃、數位孿生並行模擬、複雜作戰資源高效組織和精確調度等技術的研發。提升大規模、高強度條件下作戰計畫的自動規劃、跨域、跨層級任務的自主分解等能力。實現軍事知識與機器智慧的深度融合,實現可靠、可解釋的輔助決策,以及對抗策略的自學習、自我演化。整合感知、網路、雲端運算、量子運算等技術成果,提升態勢生成、作戰指揮、參謀運作等方面的智慧輔助能力。加速智慧參謀業務系統建設,實現作戰指揮資訊系統的智慧升級改造。實現典型戰役/戰術指揮的智慧資訊問答、智慧計畫生成、決策支援建議,大幅減輕參謀人員工作負擔,顯著提升指揮運作的時效性。

發展智慧武器裝備系統。加強傳統武器的智慧升級改造,推動智慧技術在骨幹裝備的實際應用,大規模部署低成本、消耗型無人作戰平台。研發智慧單兵一體化系統、空地無人群聚協同攻擊系統、地下空間集群作戰系統等,研發智慧柔性穿戴技術與行動智慧終端技術,開發智慧穿戴設備、腦機介面頭盔、人體植入式設備等,加速智慧新型武器平台的應用,以關鍵裝備的先導研發為驅動力,實現整體突破。

提高智慧作戰力量比例。著力優化結構與功能,對現有軍隊組織結構進行智慧化設計,逐步提升智慧作戰力量比例。制定人才培育計劃,提升作戰人員的智慧素養,探索軍民融合、服務業與企業融合的人才培育路徑。建構智慧主導、跨域協同、全域機動、精準多功能的新一代作戰力量;重點研發智慧防空反導系統、空中目標被動偵測與智慧辨識技術,建構以防空無人作戰飛機、「群聚」飛機等為代表的智慧空戰力量;重視智慧飛彈研發,發展遠程飛彈威懾與打擊能力;深化網路空間太空防空防電系統設計與智慧飛彈威懾策略的新一代攻擊能力。全面提升網路空間偵察、攻擊和防禦力量的智慧作戰能力。

優化智慧自主協同作戰方式。圍繞人機「互動-理解-協同-進步」框架,突破人機混合感知增強和人機自適應多任務協同作戰,提升複雜戰場環境下人機混合感知能力、認知能力和整體作戰效能,實現人機智慧互補與智能增強。加速智慧集群分散式彈性架構、自組織抗干擾通訊與互動、複雜對抗場景下的分散式自主協同作戰、適應複雜環境和任務的集群智慧指揮控制等領域的應用研究。增強複雜場景下無人群集的自主彈性規劃與群集智慧對抗學習能力,推動多域/跨域異質群集作戰效能的全面飛躍。

創新智能化全維度支援模式。面對未來戰場全面保障的整體需求,包括全時智慧感知、物資彈藥精準管控、作戰物資準確投放等,提升智慧作戰後勤裝備保障能力。發展跨域多維綜合保障需求挖掘、裝備狀態線上網路動態監控、保障風險自主預警、保障資源按需調配等能力。推動智慧網路資訊系統、智慧軍事後勤系統、戰場設施及環境資訊智慧保障、智慧單兵保障、未來戰場智慧快速醫療救治、智慧能源保障及運輸配送等研究驗證,實現作戰、技術、後勤支援要素與作戰指揮、部隊調動有機融合。

陶利民,秦昊

來源:中國軍網-解放軍報 作者:陶立民 秦浩 責任編輯:王粲

中國原創軍事資源:http://www.81.cn/ll_20888543/186482825186.html

Chinese Military Embracing the Challenges of Intelligent Warfare with New Combat Concepts

中國軍隊以新的作戰概念迎接智慧戰爭的挑戰

現代英語:

Foreword

Breakthroughs in artificial intelligence technology, marked by deep learning, and their applications across various fields have propelled intelligentization to new heights globally, becoming a focal point of attention. In the military field, where technological innovation and application are never lagging behind, a new revolution is also actively brewing. We must accurately grasp the pulse of intelligent warfare’s evolution and analyze its intrinsic nature in order to embrace and master intelligent warfare with a fresh perspective.

How far away is intelligent warfare from us?

Intelligent warfare is warfare primarily supported by artificial intelligence technology. Imbuing weapon platforms with human-like intelligence and replacing human combatants on the battlefield has been a dream for humanity for millennia. With the powerful impact of AI systems like AlphaGo and Atlas, and the emerging concepts and platforms of new warfare such as swarm warfare and flying aircraft carriers, the door to intelligent warfare seems to be quietly opening.

The laws of historical development foreshadow the inevitable rise of intelligent warfare on the battlefield. Advances in science and technology drive the evolution of weaponry, triggering fundamental changes in military organization, combat methods, and military theory, ultimately forcibly propelling a historical transformation in the form of warfare. The arrival of intelligent warfare aligns with this inevitable historical trend. Looking back at the evolution of human warfare, every major advancement in science and technology has driven significant military transformations. The invention of gunpowder ushered in the era of firearms, wiping out infantry and cavalry formations under the linear warfare tactics of firearms. The application of the steam engine in the military led to the mechanized era, giving rise to large-scale mechanized warfare led by armored ships, tanks, and aircraft. The emergence and application of intelligent technology will profoundly change human cognition, war thinking, and combat methods, once again triggering a major military revolution, and intelligent warfare will inevitably take center stage.

The development of artificial intelligence (AI) technology determines the pace of intelligent warfare. The continuous development and widespread application of AI technology are propelling intelligent warfare from its initial stages of uncertainty to reality, gradually emerging and growing, step by step approaching us. To truly enter the era of intelligent warfare, AI technology needs to advance through four stages. The first stage is computational intelligence, which means breaking through the limitations of computing power and storage space to achieve near real-time computing and storage capabilities—capabilities far beyond the reach of large computers and massive servers. The widespread application of cloud computing has already firmly placed humanity on this first stage. The second stage is perceptual intelligence, where machines can understand, see, distinguish, and recognize, enabling direct communication and dialogue with humans. Natural language understanding, image and graphics recognition, and biometric identification technologies based on big data have allowed humanity to reach this second stage. The third stage is cognitive intelligence, where machines can understand human thought, reason and make judgments and decisions like humans. Knowledge mining, knowledge graphs, artificial neural networks, and decision tree technologies driven by deep learning algorithms are propelling humanity towards this third stage. The fourth stage is human-machine integrated augmented intelligence, which involves complementary and two-way closed-loop interaction between humans’ strengths in perception, reasoning, induction, and learning, and machines’ strengths in search, computation, storage, and optimization. Virtual reality augmentation technology, brain-like cognitive technology, and brain-like neural network technology are exploring how humanity can reach this fourth stage. When humanity reached the second stage, the intelligent warfare began to approach; when we step onto the fourth stage, the era of intelligent warfare will fully begin.

Self-learning and growth are accelerating the sudden arrival of the intelligent warfare revolution. “Learning” ability is the core capability of artificial intelligence; once machines can learn on their own, their learning speed will be astonishing. Once machines possess self-learning capabilities, they will enter a rapid growth trajectory of continuous “intelligence enhancement and accelerated evolution.” All the technical difficulties in moving towards intelligent warfare will be readily resolved as “learning” deepens. The era of intelligent warfare may very well arrive suddenly in ways no one could have imagined!

What exactly will intelligent warfare change?

Intelligent warfare will break through the limits of traditional spatiotemporal cognition . In intelligent warfare, artificial intelligence technology can collect, calculate, and push information on the actions of all forces in combat in real time and across all domains. This will enable humans to break through the logical limits of thought, the physiological limits of senses, and the physical limits of existence, greatly improving the scope of cognition of time and space. It will allow for real-time and precise control over all actions of all forces, and enable the rapid transfer, aggregation, and attack of superior combat resources in multidimensional space and domains. Any time and any space may become a point in time and space where victory can be achieved.

Intelligent warfare will reshape the relationship between humans and weaponry . With the rapid advancement of intelligent technologies and the continuous improvement of their intelligence levels, weapon platforms and combat systems can not only passively and mechanically execute human commands, but also, based on deep understanding and prediction, leverage the computational, storage, and retrieval capabilities that machines excel at, thereby autonomously and proactively executing specific tasks to a certain extent. It can be said that weapon platforms and combat systems can also, to some extent, proactively exert human consciousness, even exceeding the scope of human understanding, autonomously and even creatively completing combat missions according to specific programs. The traditional distinction between humans and weaponry becomes blurred, even making it difficult to differentiate whether it is humans or machines at work. People are exclaiming that “humans and weaponry will become partners.” Therefore, in intelligent warfare, while humans remain the most important factor in combat effectiveness, the changing way humans and weaponry are integrated enriches the connotation of combat effectiveness, and the traditional relationship between humans and weaponry will be restructured on this basis.

Intelligent warfare will spur the emergence of new combat methods . Revolutionary advancements in science and technology inevitably lead to revolutionary changes in combat methods; significant progress in intelligent technologies will inevitably bring about a period of rapid transformation in combat methods. On the one hand, emerging technologies in fields such as deep cognition, deep learning, and deep neural networks, driven by computing, data, algorithms, and biology, along with their cross-integration with achievements in information, biology, medicine, engineering, and manufacturing, will inevitably drive an explosive emergence of new combat methods. On the other hand, the intense confrontation between intelligent weapon platforms and combat systems will inevitably become the target and driving force for innovative combat methods. The higher the level of intelligent technology in a war, the more it will become the focus of confrontation. Disadvantages in areas such as the limits of spatiotemporal cognition, massive information storage and computing capabilities, and neural network organization and generation capabilities will lead to new types of “blinding,” “deafening,” and “paralyzing” combat methods in new domains.

Intelligent warfare will incubate entirely new command and control methods. The advantages of command and control are a focal point in warfare, and intelligent warfare calls for entirely new command and control approaches. First, human-machine collaborative decision-making will become the primary command and decision-making method in intelligent warfare. In previous wars, command and decision-making was primarily driven by commanders, with technology playing a supporting role. In intelligent warfare, intelligent auxiliary decision-making systems will proactively urge or prompt commanders to make decisions based on changes in the battlefield situation. This is because the human brain can no longer quickly absorb and efficiently process the massive and rapidly changing battlefield situational information, and human senses can no longer withstand the extraordinary speed of change. Under such circumstances, decisions made solely by commanders are likely to be delayed and useless. Only human-machine collaborative decision-making driven by intelligent auxiliary decision-making systems can compensate for time and space differences and the gap between machine and brain, ensuring the advantage of command and decision-making. Second, brain-computer interface control will become the primary command and control method in intelligent warfare. In previous wars, commanders issued commands to control troops level by level through documents, radio, and telephone, in written or voice form. In intelligent warfare, commanders use intelligent, brain-like neurons to issue commands to troops through a neural network combat system platform. This reduces the conversion process of command presentation formats and shortens the time for commands to be converted across media, resulting in a faster pace and higher efficiency. When the combat system platform is attacked and partially damaged, this command and control method can autonomously repair or reconstruct the neural network, quickly restoring its main functions or even all functions, making it more resistant to attack.

How should we prepare for intelligent warfare?

In the research and exploration of intelligent warfare, we must not be content with lagging behind and following others. We must aim to win future wars and meet the challenges of intelligent warfare with a more proactive attitude, advanced concepts, and positive actions.

Breakthroughs in intelligent technologies will drive a leap in the effectiveness of intelligent combat systems. While significant progress has been made in areas such as neural network algorithms, intelligent sensing and networking technologies, data mining, and knowledge graph technologies, intelligent technologies are still largely in the weak intelligence stage, far from reaching the advanced stage of strong intelligence, and there is still vast potential for future development. It is essential to strengthen basic research in artificial intelligence, follow the laws of scientific and technological development, scientifically plan the development direction of intelligent technologies, select appropriate technological breakthroughs, and strengthen key core technologies in artificial intelligence, especially fundamental research that plays a supporting role. Emphasis should be placed on research into key military technologies. Driven by military needs, and focusing on key military technologies such as intelligent perception, intelligent decision-making, intelligent control, intelligent strike, and intelligent support, intelligent reconnaissance and perception systems, command and control systems, weapon systems, and combat support systems should be developed. Collaborative innovation between military and civilian technologies should be promoted, fully leveraging the advantages of civilian intelligent technology development, relying on the advantages of military and civilian resources, strengthening strategic cooperation between the military and civilian sectors, and building a service platform for the joint research and sharing of artificial intelligence scientific and technological achievements, the joint construction and sharing of conditions and facilities, and the integration of general standards between the military and civilian sectors, thus forming a new landscape of open, integrated, and innovative development of intelligent combat technologies.

Leading the innovation of combat methods with the concept of intelligent warfare. A shift in mindset is a prerequisite for welcoming the arrival of intelligent warfare. Mindset precedes action; if our mindset remains at the traditional level, it will be difficult to adapt to the needs of intelligent warfare. Intelligent warfare has brought about profound changes in technological support, combat forces, and winning mechanisms, requiring us to first establish the concept of intelligent warfare and use it to guide the innovation of our military’s future combat methods. First, we must strengthen the struggle for “intelligent control.” Artificial intelligence is the foundation of intelligent warfare. Depriving and weakening the opponent’s ability to utilize intelligence, while maintaining our own freedom to utilize intelligence, is fundamental to ensuring the smooth implementation of intelligent warfare. The militaries of developed Western countries are exploring various means, such as electromagnetic interference, electronic suppression, high-power microwave penetration, and takeover control, to block the opponent’s ability to utilize intelligence, seize “intelligent control,” and thus gain battlefield advantage. Second, we must innovate intelligent combat methods. We must focus on fully leveraging the overall effectiveness of the intelligent combat system, strengthening research on new intelligent combat methods such as human-machine collaborative intelligent warfare, intelligent robot warfare, and intelligent unmanned swarm warfare, as well as the processes and methods of intelligent combat command and intelligent combat support. With a view to effectively counter the threat of intelligent warfare from the enemy, we should study strategies to defeat the enemy, such as intelligent disruption warfare and intelligent interdiction warfare.

Intelligent training innovation is driving a transformation in combat capability generation. Intelligent warfare will be a war jointly waged by humans and machines, with intelligent unmanned combat systems playing an increasingly important role. It is imperative to adapt to the new characteristics of intelligent warfare force systems, innovate and develop intelligent training concepts, and explore new models for generating combat capability in intelligent warfare. On the one hand, it is necessary to strengthen training for humans in operating intelligent systems. By leveraging big data, cloud computing, VR technology, and other technologies to create new training environments, we can continuously improve human intelligence literacy, enhance human-machine cognition, understanding, and interaction quality, and improve the ability of humans to operate intelligent combat systems. On the other hand, it is necessary to explore new training models with machines as the primary focus. Previous training has primarily focused on humans, emphasizing the ability of humans to master and use weapons and equipment in specific environments to improve combat effectiveness. To adapt to the new characteristics of the force structure in intelligent warfare, the training organization concept and model of traditional training, which is centered on people, should be changed. Instead, the focus should be on improving the self-command, self-control, and self-combat capabilities of intelligent combat systems. By making full use of the characteristics of intelligent systems that can engage in self-competition and self-growth, a training system, training environment, and training mechanism specifically for intelligent combat systems should be formed. This will enable intelligent combat systems to achieve a geometric leap in combat capability after a short period of autonomous intensive training.

現代國語:

前言

以深度學習為代表的人工智慧技術的突破及其在各個領域的應用,已將全球智慧化推向新的高度,成為關注的焦點。在科技創新與應用從未落後的軍事領域,一場新的革命也正悄悄醞釀。我們必須精確掌握智慧戰爭演進的脈搏,分析其內在本質,才能以全新的視角擁抱和掌握智慧戰爭。

智慧戰爭離我們還有多遠?

智慧戰爭是指以人工智慧技術為主要的支撐戰爭。賦予武器平台類人智能,並在戰場上取代人類作戰人員,一直是人類數千年來的夢想。隨著AlphaGo和Atlas等人工智慧系統的強大影響力,以及集群作戰、飛行航空母艦等新型戰爭概念和平台的湧現,智慧戰爭的大門似乎正在悄悄開啟。

歷史發展的規律預示著智慧戰爭在戰場上的必然崛起。科技進步推動武器裝備的演進,引發軍事組織、作戰方式和軍事理論的根本性變革,最終強而有力地推動戰爭形式的歷史性轉型。智慧戰爭的到來正契合這不可避免的歷史趨勢。回顧人類戰爭的發展歷程,每一次科技的重大進步都帶來了意義深遠的軍事變革。火藥的發明開啟了火器時代,在火器線性戰術下,步兵和騎兵陣型被徹底摧毀。蒸汽機在軍事上的應用開啟了機械化時代,催生了以裝甲艦、坦克和飛機為主導的大規模機械化戰爭。智慧科技的出現與應用將深刻改變人類的認知、戰爭思維和作戰方式,再次引發一場重大的軍事革命,智慧戰爭必定成為戰爭的核心。

人工智慧(AI)技術的發展速度決定著智慧戰爭的進程。人工智慧技術的持續發展和廣泛應用正推動智慧戰爭從最初的不確定階段走向現實,逐步興起、發展壯大,一步步向我們逼近。要真正進入智慧戰爭時代,人工智慧技術需要經歷四個階段。第一階段是運算智能,這意味著突破運算能力和儲存空間的限制,實現近實時運算和儲存能力——這種能力遠遠超出大型電腦和海量伺服器的範疇。雲端運算的廣泛應用已經使人類穩固地邁入了這個階段。第二階段是感知智能,機器能夠理解、觀察、區分和識別,從而實現與人類的直接溝通和對話。基於大數據技術的自然語言理解、影像和圖形識別以及生物特徵識別技術,已經使人類邁入了第二階段。第三階段是認知智能,機器能夠理解人類的思維,像人類一樣進行推理、判斷和決策。知識探勘、知識圖譜、人工神經網路以及由深度學習演算法驅動的決策樹技術,正在推動人類邁向第三階段。第四階段是人機融合增強智能,它涉及人類在感知、推理、歸納和學習方面的優勢與機器在搜尋、計算、儲存和最佳化方面的優勢之間互補的雙向閉環互動。虛擬實境增強技術、類腦認知技術和類腦神經網路技術正在探索人類如何達到這個第四階段。當人類達到第二階段時,智慧戰爭開始逼近;當我們邁入第四階段時,智慧戰爭時代將全面開啟。

自主學習和成長正在加速智慧戰爭革命的到來。 「學習」能力是人工智慧的核心能力;一旦機器能夠自主學習,其學習速度將令人驚嘆。一旦機器擁有自主學習能力,它們將進入持續「智慧增強和加速進化」的快速成長軌跡。隨著「學習」能力的加深,邁向智慧戰爭的所有技術難題都將迎刃而解。智慧戰爭時代很可能以我們無法想像的方式突然降臨!

智慧戰爭究竟會帶來哪些改變?

智慧戰爭將突破…的限制。在傳統時空認知中,人工智慧技術能夠即時、跨域地收集、計算並推送所有作戰力量的行動資訊。這將使人類突破思維的邏輯限制、感官的生理限制以及存在的物理限制,大大拓展時空認知範圍。它將實現對所有作戰力量行動的即時精準控制,並能夠在多維空間和領域內快速調動、聚合和攻擊優勢作戰資源。任何時間、任何空間都可能成為取得勝利的時空點。

智慧戰爭將重塑人與武器之間的關係。隨著智慧技術的快速發展和智慧水準的不斷提升,武器平台和作戰系統不僅可以被動、機械地執行人類指令,還能基於深度理解和預測,充分利用機器強大的運算、儲存和檢索能力,在一定程度上自主、主動地執行特定任務。可以說,武器平台和作戰系統也能在某種程度上主動發揮人類意識,甚至超越人類理解的範疇,根據特定程序自主、甚至創造性地完成作戰任務。人與武器之間的傳統界線變得模糊,甚至難以區分究竟是人在工作還是機器在工作。人們開始高喊「人與武器將成為夥伴」。因此,在智慧戰爭中,雖然人仍是作戰效能的最重要因素,但人與武器融合方式的改變豐富了作戰效能的內涵,傳統的人與武器關係也將在此基礎上重構。

智慧戰爭將催生新的作戰方式。科技的革命性進步必然導致作戰方式的革命性變革;智慧技術的顯著進步必然會帶來作戰方式的快速轉型期。一方面,由計算、數據、演算法和生物學驅動的深度認知、深度學習和深度神經網路等領域的新興技術,以及它們與資訊、生物、醫學、工程和製造等領域成果的交叉融合,必將推動新型作戰方式的爆發式湧現。另一方面,智慧武器平台與作戰系統之間的激烈對抗,必將成為創新作戰方式的目標與驅動力。戰爭中智慧科技的程度越高,就越會成為對抗的焦點。時空認知能力、海量資訊儲存和運算能力以及神經網路組織和生成能力等方面的局限性,將導致在新的領域出現新型的「致盲」、「致聾」和「致癱」作戰方式。

智慧戰爭將孕育全新的指揮控制方式。指揮控制的優勢是戰爭的關鍵所在,而智慧戰爭需要全新的指揮控制方法。首先,人機協同決策將成為智慧戰中主要的指揮決策方式。以往戰爭中,指揮決策主要由指揮官主導,技術僅扮演輔助角色。而在智慧戰中,智慧輔助決策系統將根據戰場態勢的變化,主動敦促或提示指揮官做出決策。這是因為人腦已無法快速有效地吸收和處理大量且瞬息萬變的戰場態勢訊息,人類的感官也無法承受如此巨大的變化速度。在這種情況下,僅由指揮官做出的決策很可能滯後且無效。只有由智慧輔助決策系統驅動的人機協同決策才能彌補時空差異以及人機之間的差距,從而確保指揮決策的優勢。其次,腦機介面控制將成為智慧戰中主要的指揮控制方式。以往戰爭中,指揮官透過文件、無線電、電話等方式,以書面或語音形式,逐級下達命令來控制部隊。在智慧戰爭中,指揮官利用類似大腦的智慧神經元,透過神經網路作戰系統平台向部隊下達命令。這減少了命令呈現格式的轉換過程,並且 縮短跨媒介指令轉換時間,進而加快速度,提高效率。當作戰系統平台遭受攻擊並部分受損時,這種指揮控制方法可以自主修復或重建神經網絡,快速恢復其主要功能甚至全部功能,使其更具抗攻擊能力。

我們該如何應對智慧戰爭?

在智慧戰爭的研究和探索中,我們不能滿足於落後和跟隨他人。我們必須以贏得未來戰爭為目標,以更積極的態度、先進的理念和積極的行動迎接智慧戰爭的挑戰。

智慧技術的突破將推動智慧作戰系統效能的飛躍。雖然在神經網路演算法、智慧感知和網路技術、資料探勘和知識圖譜技術等領域已經取得了顯著進展,但智慧技術仍處於弱智慧階段,距離強智慧的先進階段還有很長的路要走,未來發展潛力巨大。必須加強人工智慧基礎研究,遵循科技發展規律,科學規劃智慧技術發展方向,選擇合適的技術突破點,強化人工智慧核心技術,特別是起到支撐作用的基礎研究。重點要加強關鍵軍事技術的研究。在軍事需求的驅動下,聚焦智慧感知、智慧決策、智慧控制、智慧打擊、智慧支援等關鍵軍事技術,發展智慧偵察感知系統、指揮控制系統、武器系統、作戰支援系統等。要推動軍民技術協同創新,充分發揮民用智慧技術發展優勢,依托軍民資源優勢,加強軍民戰略合作,建構人工智慧科技成果聯合研究共享、條件設施聯合建設共享、軍民通用標準融合的服務平台,形成智慧作戰技術開放、融合、創新發展的新格局。

以智慧戰理念引領作戰方式創新。思維方式的轉變是迎接智能戰到來的先決條件。思考方式先於行動;如果我們的思考方式仍停留在傳統層面,就難以適應智慧戰的需求。智能戰為技術保障、作戰力量和致勝機制帶來了深刻的變革,這就要求我們先確立智能戰的理念,並以此指導我軍未來作戰方式的創新。首先,我們必須加強對「智慧控制」的爭奪。人工智慧是智能戰的基礎。在保障自身智慧運用自由的同時,削弱和限制對手運用智慧的能力,是確保智能戰順利實施的根本。西方已開發國家的軍隊正在探索各種手段,例如電磁幹擾、電子壓制、高功率微波穿透和控制權奪取等,以阻斷對手運用智能的能力,奪取“智能控制權”,從而獲得戰場優勢。其次,我們必須創新智慧作戰方式。我們必須集中精力充分發揮智慧作戰系統的整體效能,加強對人機協同智能戰、智能機器人戰、智能無人集群戰等新型智能作戰方式以及智能作戰指揮、智能作戰支援的流程和方法的研究。為有效應對敵方智能戰的威脅,我們應研究擊敗敵方的策略,例如智慧幹擾戰、智慧封鎖戰等。

智慧訓練創新正在推動作戰能力產生方式的改變。智慧戰將是一場人機協同作戰,智慧無人作戰系統將發揮日益重要的作用。必須適應智慧戰部隊系統的新特點,創新發展智慧訓練理念,探索智慧作戰能力生成的新模式。智慧戰爭。一方面,需要加強操作智慧系統的人員的訓練。利用大數據、雲端運算、虛擬實境等技術創造新的訓練環境,可以不斷提高人員的智慧素養,增強人機認知、理解和互動質量,提高人員操作智慧作戰系統的能力。另一方面,需要探索以機器為核心的新型訓練模式。過去的訓練主要以人為中心,強調人員在特定環境下掌握和使用武器裝備以提升作戰效能的能力。為了適應智慧戰爭部隊結構的新特點,需要改變以人為中心的傳統訓練組織理念和模式,轉而專注於提升智慧作戰系統的自主指揮、自主控制和自主作戰能力。充分利用智慧系統能夠進行自我競爭和自我成長的特性,建構專門針對智慧作戰系統的訓練體系、訓練環境和訓練機制。這將使智慧作戰系統在經過短時間的自主強化訓練後,作戰能力實現幾何級的飛躍。

李始江 杨子明 陈分友

中国军网 国防部网
2018年7月26日 星期四

中國原創軍事資源:http://www.81.cn/jfjbmap/content/28018-07/286/content_28118827.htm

A Brief Analysis of the Characteristics and Patterns of Chinese Intelligent Warfare

中國情報戰的特徵和模式簡析

現代英語:

Currently, the rapid development of intelligent technologies, primarily artificial intelligence, has triggered a chain of breakthroughs in the military field, leading to significant changes in the concepts, elements, and methods of winning wars, and accelerating the evolution of warfare towards intelligence. Intelligent warfare, as a new form of warfare following mechanized and informationized warfare, represents a comprehensive upgrade and reshaping of force systems, combat methods, and battlefield space. A forward-looking analysis of the characteristics and patterns of intelligent warfare is crucial for accelerating the development of military intelligence, forging intelligent combat capabilities, seizing strategic initiative, and winning future intelligent wars.

Intellectual control becomes the core of winning wars.

Looking back at the history of human warfare, control of land, sea, air, and space has become the focus of contention in different historical periods. Control of physical space is crucial for winning mechanized warfare, while information warfare relies even more heavily on information superiority. Information superiority has surpassed physical space superiority to become the core superiority in information warfare. It is clear that technology has significantly influenced the historical trajectory of the evolution of war superiority. In the era of intelligent warfare, massive amounts of data need to be transmitted, acquired, and processed in real time. Manned, unmanned, and swarm combat platforms need to be more intelligent and autonomous, and the operational chain “OODA” (Output-Output-Action) needs to be efficiently and rapidly closed. All of these rely on intelligent technologies, primarily artificial intelligence, for empowerment. Intelligence superiority will dominate the outcome of future wars.

The pursuit of dominance in warfare has always been a relentless endeavor in the military practices of various countries. Since the 1990s, the Gulf War, the Kosovo War, the Afghanistan War, and the Iraq War have fully demonstrated the battlefield dominance brought about by information superiority. Currently, countries worldwide are vigorously promoting the military application of artificial intelligence, establishing relevant functional departments, and clarifying development priorities. The US Department of Defense’s “Data, Analytics, and Artificial Intelligence Adoption Strategy” and the UK Ministry of Defence’s “Defense Artificial Intelligence Strategy” are both aimed at building powerful militaries for the intelligent era. In the future, the competition among militaries for intelligent superiority will continue and intensify, pushing the control of intelligence to become a core element of victory in warfare.

Human-machine integration has become a basic form of combat force.

From the perspective of combat force development, the dominance of unmanned combat forces is an inevitable trend. The deployment of unmanned systems on the battlefield does not simply change the way humans fight, but rather alters the most basic unit involved in combat. Currently, unmanned combat forces have become a key focus of development for militaries worldwide. In August 2023, the US military announced the “Replicator” program, aiming to deploy thousands of low-cost, expendable unmanned autonomous systems within 18-24 months. In April 2025, the US Department of Defense released a memorandum titled “Army Transformation and Acquisition Reform,” planning to equip each combat division with approximately 1,000 drones. Early Russian military plans clearly stated that by 2025, unmanned equipment would account for over 30% of its force. In May 2025, the British Army released the “20-40-40” strategic doctrine, aiming for an overall unmanned force ratio of 80%. Objectively speaking, the level of intelligence of unmanned equipment currently used in the military is generally low, with most still relying on remote control by combat personnel. For a considerable period in the future, improving the autonomy of machines will remain a key focus and trend in the development of unmanned equipment, and this increased autonomy will, in turn, lead to wider application of unmanned equipment.

From the perspective of artificial intelligence technology development trends, human-machine integration is an inevitable choice for achieving complementary advantages between humans and machines while ensuring the safety and controllability of machines. On the one hand, human-machine integration is an inevitable choice for fully leveraging the respective strengths of biological and machine intelligence. Looking at the development history of artificial intelligence, machines possess advantages surpassing humans in computation and perception, excelling in data processing, classification and recognition, and real-time analysis. However, humans still retain advantages in situational awareness, forward-looking reasoning, and command and decision-making. Effectively leveraging the respective strengths of humans and machines is the optimal choice for solving complex problems. On the other hand, human-machine integration is an inevitable choice for ensuring the safety and controllability of machine intelligence. No matter how superior a machine’s performance, it cannot escape human control and cannot harm humanity itself. Human-machine integration enables macroscopic controllability and microscopic autonomy of machines, thereby achieving the optimal state where humans lead the operational intent while machines handle the operational details.

Unmanned intelligent warfare has become the main form of combat.

Currently, technologies such as artificial intelligence and unmanned autonomous systems are deeply embedded in the military field, driving the continuous upgrading and reshaping of combat styles. Engels once profoundly pointed out: “Once technological advancements can be used for military purposes and have been used for military purposes, they immediately, almost forcibly, and often against the will of the commanders, cause changes or even revolutions in the methods of warfare.” Unmanned warfare first appeared during World War II, but due to the limited technological development at the time, its application scenarios and combat functions were relatively simple. Since the 21st century, the functions of unmanned warfare have been continuously expanding. In the Afghan War, the US military used MQ-1 “Predator” drones to kill al-Qaeda leaders; in the Iraq War, the US-led coalition used more than 20 types of ground unmanned systems and unmanned underwater vehicles for reconnaissance, mine clearance, and obstacle removal. In the latest local wars, unmanned warfare has been widely used in reconnaissance and surveillance, fire strikes, terminal guidance, and communication relay missions. Meanwhile, manned/unmanned collaborative operations have become an important form, and unmanned swarm operations have played a crucial role. Practice shows that combat personnel are quietly moving away from the front lines, and unmanned warfare has become an important style of modern warfare. With continuous breakthroughs in intelligent technology, the intelligence and autonomy of equipment, as well as the degree of human-machine integration, will be significantly improved. At the same time, artificial intelligence will improve the speed, quality, and accuracy of commanders’ decision-making, and the intelligence chain, command and control chain, strike chain, and support chain will be efficiently linked, promoting a second-level response in the “observation-judgment-decision-action” closed loop. This will drive unmanned warfare to develop to a higher level of intelligence, such as intelligent “swarms,” ​​”Trojan horse” infiltration, and distributed autonomous combat styles, which will fundamentally change the form and rules of traditional warfare. Unmanned intelligent warfare will become the main combat mode of intelligent warfare.

Real-time, multi-dimensional, cross-domain operations have become a key requirement for the struggle for spacetime.

Time and space are the fundamental components and operational basis of warfare. In the era of intelligent warfare, the spatiotemporal perspective of war will undergo fundamental changes. First, time will be extremely compressed. Intelligent warfare has truly entered the “detect and destroy” era, significantly accelerating the pace of combat. The increasing autonomy of unmanned equipment further separates humans from equipment, continuously compressing the time for detection and strike. The intelligent interconnection of unmanned and manned equipment further enhances the ability to perceive the battlefield and respond to complex battlefield environments. The temporal segmentation of battlefield situation changes is more detailed and precise, with increasingly shorter time slots and smaller granularities, resulting in an unprecedented increase in the amount of combat content carried per unit of time and its utilization efficiency. Second, space will expand infinitely. The military application of unmanned intelligent technologies is constantly breaking through the logical limits of human thinking, the physiological limits of senses, and the physical limits of existence. The battlefield is further extending to polar regions, the deep sea, and deep space. The territory of war is expanding from physical space and information space to cognitive space, forming operational domains such as the physical domain and the information domain. Third, time and space will act in parallel. Intelligent warfare is subverting the spatiotemporal relationship of the traditional battlefield, making traditional strategies and tactics of trading time for space or space for time ineffective. With increasingly tighter combat schedules, expanded combat spaces, and more diverse combat methods, coupled with a more synchronized spatiotemporal relationship and a more integrated spatiotemporal effect, the human-machine collaborative approach of “humans leading the intent, machines executing the operation” may become the optimal solution. Intelligent auxiliary command and control systems can optimize various functional combinations from spatially distributed combat resources based on the characteristics and time-sensitive features of the targets. They can also dynamically adjust on the spot, forming a multi-target—multi-sensor—multi-shooter parallel strike mode with a multi-kill chain, leaving the enemy nowhere to hide spatially and no time to escape, maximizing the combined effect of spatiotemporal elements.

Self-learning can evolve into a new mode of combat power generation.

Combat power generation models are a relatively stable set of methods, approaches, and standard forms for forming and improving combat power. In the era of mechanized warfare, combat power generation mainly relied on the additive effect of personnel and weaponry; in the era of information warfare, it mainly relied on the multiplicative effect of personnel, weaponry, and information; in the era of intelligent warfare, it mainly relies on the exponential effect of personnel, weaponry, and intelligence. Intelligent technologies, represented by artificial intelligence, are endowing combat systems with the ability to learn, grow, and evolve on their own. Among these, algorithms are the “accelerators” of combat power generation. Combat power in the intelligent era is generated based on accelerated algorithmic processes. The sophistication of algorithms determines the “intelligence” of intelligent equipment. Algorithms can drive the acceleration of situational awareness through sensory elements, accelerate analysis and judgment through data fusion, and accelerate decision-making through precise calculations, detailed calculations, in-depth calculations, and deep reasoning. Data is the “multiplier” of combat power generation, influencing combat power through algorithms. The quantity and quality of data have a significant impact on combat power generation; more high-quality data results in higher algorithmic intelligence and more efficient combat power generation. Computing power is the “catalyst” for combat power generation. In past warfare, limited by technological development, war calculations were mostly rough estimates, and computing power played a minor, inconspicuous role in combat capability generation. In the era of intelligent warfare, however, computing power, through algorithms, significantly catalyzes combat capability generation, becoming an indispensable and crucial element. The rapidly developing artificial intelligence models of recent years, based on algorithmic improvements, large-scale high-quality data supply, and high-performance computing support, demonstrate powerful self-learning and evolutionary capabilities. This migration of capabilities to the military field will inevitably have a profound impact on combat capability generation models. The self-learning and evolutionary capabilities previously possessed only by biological organisms will become essential capabilities of intelligent combat systems, thus significantly distinguishing them from information-based combat systems.

現代國語:

目前,以人工智慧為代表的智慧技術的快速發展,引發了軍事領域的一系列突破,導致戰爭理念、要素和方式發生重大變革,加速了戰爭向智慧化的演進。智能戰作為繼機械化戰爭和資訊化戰爭之後的新型戰爭形式,代表部隊體系、作戰方式和戰場空間的全面升級和重塑。對智慧戰的特徵和格局進行前瞻性分析,對於加速軍事情報發展、鍛造智慧作戰能力、奪取戰略主動權、贏得未來智能戰至關重要。

智力控製成為戰爭取勝的核心。

回顧人類戰爭史,陸海空四大領域的控制權在不同歷史時期都曾是爭奪的焦點。物理空間的控制是贏得機械化戰爭的關鍵,而資訊戰則更依賴資訊優勢。資訊優勢已超越實體空間優勢,成為資訊戰的核心優勢。顯而易見,科技對戰爭優勢演進的歷史軌跡產生了重大影響。在智慧戰爭時代,海量資料需要即時傳輸、取得和處理。有人、無人和集群作戰平台需要更智慧和自主化,作戰鏈「OODA」(輸出-輸出-行動)需要有效率快速地閉合。所有這些都依賴智慧技術,尤其是人工智慧,來賦能。情報優勢將主導未來戰爭的走向。

追求戰爭優勢一直是各國軍事實踐中不懈的努力。自1990年代以來,海灣戰爭、科索沃戰爭、阿富汗戰爭和伊拉克戰爭充分展現了資訊優勢帶來的戰場優勢。目前,世界各國都在大力推動人工智慧的軍事應用,建立相關職能部門,並明確發展重點。美國國防部的《數據、分析和人工智慧應用戰略》和英國國防部的《國防人工智慧戰略》都旨在為智慧時代打造強大的軍隊。未來,各國軍隊對智慧優勢的競爭將持續加劇,智慧控制將成為戰爭勝利的核心要素。

人機融合已成為作戰力量的基本形態。

從作戰力量發展的角度來看,無人作戰力量的主導地位是不可避免的趨勢。無人系統在戰場上的部署不僅改變了人類的作戰方式,也改變了作戰中最基本的單位。目前,無人作戰力量已成為世界各國軍隊發展的重點。 2023年8月,美國軍方宣布啟動「複製者」(Replicator)計劃,旨在18-24個月內部署數千套低成本、一次性使用的無人自主系統。 2025年4月,美國國防部發布了一份題為《陸軍轉型與裝備改革》的備忘錄,計畫為每位作戰師配備約1,000架無人機。俄羅斯早期的軍事計畫明確指出,到2025年,無人裝備將佔其兵力的30%以上。 2025年5月,英國陸軍發布了「20-40-40」戰略理論,目標是使無人部隊的總體比例達到80%。客觀而言,目前軍方使用的無人裝備智慧化程度普遍較低,且大多數仍依賴作戰人員的遠端操控。在未來相當長的一段時間內,提高機器的自主性仍將是無人裝備發展的關鍵重點和發展趨勢,而自主性的提升反過來又將推動無人裝備的更廣泛應用。

從人工智慧技術發展趨勢來看,人機融合是實現人機優勢互補、同時確保機器安全性和可控性的必然選擇。一方面,人機融合是充分發揮生物智慧和機器智慧各自優勢的必然選擇。回顧人工智慧的發展歷程,機器在計算和感知方面擁有超越人類的優勢,尤其擅長數據處理、分類識別和即時分析。然而,人類在態勢感知、前瞻性推理以及指揮決策方面仍保持著優勢。g. 有效發揮人機各自的優勢是解決複雜問題的最佳選擇。另一方面,人機融合是確保機器智慧安全性和可控性的必然選擇。無論機器的性能多麼卓越,它都無法脫離人類的控制,也無法對人類本身造成傷害。人機融合能夠實現機器的宏觀可控制性和微觀自主性,從而達到人類主導作戰意圖、機器處理作戰細節的最佳狀態。

無人智慧戰爭已成為主要的作戰形式。

目前,人工智慧、無人自主系統等技術已深度融入軍事領域,推動作戰方式的不斷升級與重塑。恩格斯曾深刻指出:「一旦技術進步能夠用於軍事目的,並且已經用於軍事目的,它就會立即、幾乎是強迫地、而且往往違背指揮官的意願,導致戰爭方式的改變,甚至革命。」無人作戰最早出現於第二次世界大戰期間,但由於當時技術發展有限,其應用場景和作戰功能相對簡單。進入21世紀以來,無人作戰的功能不斷擴展。在阿富汗戰爭中,美軍使用MQ-1「掠奪者」無人機擊斃基地組織領導人;在伊拉克戰爭中,美國領導的聯軍使用了20多種地面無人系統和無人水下航行器進行偵察、掃雷和清除障礙物等任務。在近期的局部戰爭中,無人作戰被廣泛應用於偵察監視、火力打擊、末端導引和通訊中繼等任務。同時,有人/無人協同作戰成為一種重要形式,無人集群作戰發揮了關鍵作用。實踐表明,作戰人員正在悄悄遠離前線,無人作戰已成為現代戰爭的重要形式。隨著智慧技術的不斷突破,裝備的智慧化和自主性以及人機融合程度將顯著提升。同時,人工智慧將提高指揮官決策的速度、品質和準確性,並使情報鏈、指揮控制鏈、打擊鍊和支援鏈高效銜接,推動「觀察-判斷-決策-行動」閉環中的二級回應。這將推動無人作戰朝向更高層次的智慧化發展,例如智慧「集群」、「特洛伊木馬」滲透和分散式自主作戰模式,從根本上改變傳統戰爭的形式和規則。無人智慧作戰將成為智慧戰爭的主要作戰模式。

即時、多維、跨域作戰已成為爭奪時空的關鍵要求。

時間和空間是戰爭的基本組成部分和作戰基礎。在智慧戰爭時代,戰爭的時空觀將會發生根本性的改變。首先,時間將被極大壓縮。智慧戰爭已真正進入「探測與摧毀」時代,顯著加快了作戰節奏。無人裝備自主性的不斷提高進一步拉開了人與裝備的距離,持續壓縮了探測與打擊的時間。無人裝備與有人裝備的智慧互聯進一步增強了對戰場的感知能力和對複雜戰場環境的反應能力。戰場態勢變化的時間分割更加細緻、精確,時間間隔越來越短,粒度越來越小,從而以前所未有的速度提升了單位時間內作戰內容的承載量及其利用效率。其次,空間將無限擴展。無人智慧技術的軍事應用不斷突破人類思維的邏輯極限、感官的生理極限以及存在的物理極限。戰場進一步延伸至極地、深海和深空。戰爭的疆域正從物理空間和資訊空間擴展到認知空間,形成物理域和資訊域等作戰領域。第三,時間和空間將並行運作。智慧戰爭正在顛覆傳統戰場的時空關係,使得以時間換空間或以空間換時間的傳統戰略戰術失效。隨著作戰時間日益縮短、作戰空間不斷擴大、作戰方式日益多樣化,以及時空關係日益同步與更加…時空一體化效應使得「人引導意圖,機器執行操作」的人機協同作戰模式成為最優解。智慧輔助指揮控制系統能夠根據目標的特徵和時間敏感性,優化空間分佈作戰資源的各種功能組合,並能進行現場動態調整,形成多目標、多感測器、多射手並行打擊模式,實現多殺傷鏈,使敵人無處可藏,無處可逃,最大程度地發揮時空要素的綜合效應。

自學習可以演化成一種新的戰鬥力生成模式。

戰鬥力生成模式是一套相對穩定的形成和提升戰鬥力的方法、途徑和標準形式。在機械化戰爭時代,戰鬥力生成主要依靠人員和武器的疊加效應;在資訊戰時代,則主要依靠人員、武器和資訊的乘積效應。在智慧戰爭時代,作戰主要依賴人員、武器和情報的指數級成長效應。以人工智慧為代表的智慧技術賦予作戰系統自主學習、成長和演進的能力。其中,演算法是作戰能力生成的「加速器」。智慧時代的作戰能力正是基於加速的演算法流程而產生的。演算法的複雜程度決定了智慧裝備的「智能」程度。演算法可以透過感知元素加速態勢感知,透過資料融合加速分析判斷,並透過精確計算、詳細計算、深度計算和深度推理加速決策。數據是作戰能力產生的“倍增器”,它透過演算法影響作戰能力。數據的數量和品質對作戰能力的產生有著顯著的影響;更多的高品質數據能夠帶來更高的演算法智慧和更有效率的作戰能力產生。運算能力是作戰能力生成的「催化劑」。在以往受限於科技發展的戰爭中,戰爭計算大多是粗略估計,運算能力在作戰能力生成中扮演的角色微不足道。然而,在智慧戰爭時代,運算能力透過演算法顯著促進了作戰能力的生成,成為不可或缺的關鍵要素。近年來,基於演算法改進、大規模高品質數據供應和高效能運算支援的快速發展的人工智慧模型,展現出強大的自學習和進化能力。這種能力向軍事領域的遷移必將對作戰能力生成模型產生深遠影響。以往僅生物體才具備的自學習與進化能力,將成為智慧作戰系統的核心能力,因而顯著區別於資訊型作戰系統。

中國原創軍事資源:http://www.81.cn/ll_208543/186841829899.html

Chinese Military AI Empowerment: Accelerating the Iterative Upgrade of Cognitive Electronic Warfare

中國軍事人工智慧賦能:加速認知電子戰迭代升級

現代英語:

In the invisible dimension of war, a silent contest has been raging for a century. From the electromagnetic fog of the Battle of Tsushima to the spectral chaos of modern battlefields, from the rudimentary metal chaff used during World War II to the cognitive electronic warfare systems incorporating artificial intelligence, electronic warfare has undergone a magnificent transformation from a supporting role to a pillar of war. It is now deeply embedded in the “operating system” of modern warfare, rewriting its form and rules. It is invisible and intangible, yet it profoundly controls the lifeline of battlefield operations; it is silent, yet it is enough to determine the life and death of thousands of troops. The balance of future wars will increasingly depend on who can see more clearly, react faster, and control more firmly in this silent yet deadly spectrum.

In modern warfare, the field of electronic warfare is evolving rapidly. The electromagnetic spectrum is considered an important operational domain after land, sea, air, space, and cyberspace, becoming a focal point for both sides to gain comprehensive dominance in joint operations. As warfare accelerates its evolution towards intelligence, cognitive electronic warfare, which integrates artificial intelligence and machine learning technologies, is increasingly demonstrating its autonomous countermeasure advantages, becoming a crucial tool for paralyzing entities in the electromagnetic space.

New Needs of Intelligent Warfare

In informationized and intelligent warfare, information equipment is widely distributed, and unmanned intelligent equipment is deployed, making the battlefield electromagnetic environment increasingly complex. Due to the adoption of cognitive and adaptive technologies, radar and communication equipment are becoming increasingly resistant to interference, rendering traditional electronic countermeasures inadequate. Therefore, it is necessary to leverage artificial intelligence and machine learning to endow electronic warfare systems with the ability to self-identify threats, extract threat source signals in real time, quickly organize and analyze them, determine the threat level and weaknesses of the signals, and promptly and effectively counteract them.

The need for precise perception. In modern warfare, to increase battlefield “transparency,” both sides extensively utilize electronic information equipment. Simultaneously, unmanned equipment and “swarm” systems are widely employed. On a battlefield filled with numerous information devices and massive amounts of electromagnetic signals, a single electronic warfare device may simultaneously receive radiation from dozens or even hundreds of other electronic devices, making signal identification extremely difficult. This necessitates that electronic warfare systems break through existing technological limitations, integrate big data analysis and deep learning technologies, enhance their perception capabilities, and comprehensively identify various electromagnetic radiation targets on the battlefield.

The need for intelligent countermeasures. Driven by emerging technologies, agile radar, frequency-hopping radios, and other equipment have been deployed extensively on the battlefield. These devices form a closed loop between transmission and reception, and can autonomously adjust their operating modes, transmission parameters, and waveform selection according to the environment, possessing autonomous interference avoidance capabilities. Traditional electronic warfare equipment, based on existing experience and pre-set interference rule libraries, has rigid functions and poor flexibility, making it unable to cope with emerging adaptive electronic targets. This necessitates that electronic warfare systems integrate intelligent algorithms to become “smarter,” possessing adaptive countermeasure capabilities of “using intelligence against intelligence.”

The need to disrupt networked systems. The winning mechanism of modern combat systems, when mapped onto the information domain, has spurred the networked operation of radar and communication systems. The aim is to eliminate the global loss of control caused by interference with a single device or part of the link through information fusion and redundant design, leveraging the resilience of the network system. Faced with networked information systems, electronic warfare systems need to embed intelligent countermeasure analysis and reasoning technologies, possessing the ability to effectively identify networked information systems in order to discover key nodes and critical parts, and implement targeted, integrated hardware and software attacks.

A New Transformation Driven by Digital Intelligence

Cognitive electronic warfare can be considered a combination of electronic warfare and artificial intelligence. It is a new generation of electronic warfare systems with autonomous perception, intelligent decision-making, and adaptive jamming capabilities, representing a major upgrade to traditional electronic warfare.

The shift from human to machine cognition. Advances in modern electronic technology have enabled electronic information equipment to offer diverse functions and multiple modes. Traditional electronic warfare systems rely on manually analyzed threat databases for countermeasures, which are only effective against known signal patterns and become significantly less effective against unknown threats. Cognitive electronic warfare systems, through autonomous interactive swarm learning and intelligent algorithms, can quickly intercept and identify signal patterns, analyze changing patterns, make autonomous decisions based on changes in the electromagnetic environment, optimize interference signal waveforms, and autonomously complete the operational cycle of “observation-judgment-decision-action.”

The focus is shifting from precision-driven to data-driven. Electronic warfare systems rely on the measurement and sensing of electronic signals as their fundamental premise. However, with the rise of new technologies, the sensitivity and resolution of these systems are approaching their limits, hindering their development and upgrades. Recognizing that electronic warfare systems can break through traditional models by utilizing big data analytics and mining large datasets can not only efficiently intercept and accurately identify unknown signals, but also predict the timing of frequency changes, mode adjustments, and power conversions. This allows for the correlation analysis of the electronic target’s operational patterns, enabling proactive adjustments to jamming strategies, rules, and parameters to conduct targeted electronic attacks.

The focus has shifted from jamming single targets to disrupting networked targets. Driven by network technology, new-generation radar and communication equipment are beginning to network, using system advantages to compensate for the shortcomings of single points. Traditional electronic warfare jamming relies on human experience and knowledge, lacking sufficient self-learning capabilities. It is mainly used to jam point and chain-like electronic targets, and cannot effectively jam networked targets. Cognitive electronic warfare systems utilize deep learning technology to perceive the network structure and operating modes of new networked systems such as radar and communication. Based on logical reasoning, it can identify nodes, hubs, and key links in the networked system, thereby implementing precise jamming and making it possible to disrupt the system.

New forms of structural reshaping

Cognitive electronic warfare systems, based on the traditional open-loop structure, introduce behavioral learning processes and reshape the modular architecture, enabling them to evaluate the effectiveness of interference and optimize interference strategies based on interference feedback, thus completing a closed loop of “reconnaissance-interference-evaluation” countermeasures.

Reconnaissance and Sensing Module. Reconnaissance and sensing is the primary link in electronic warfare and a crucial prerequisite for the successful implementation of cognitive electronic warfare. This module utilizes deep learning and feature learning techniques to continuously learn from the surrounding environment through constant interaction with the battlefield electromagnetic environment. It performs parameter measurement and sorting of signals, analyzes and extracts characteristic data of target threat signals with the support of prior knowledge, assesses behavioral intent, determines the threat level, and transmits the data to the decision-making and effectiveness evaluation module.

Decision-Making Module. The decision-making module is the core of the cognitive electronic warfare system, primarily responsible for generating interference strategies and optimizing interference waveforms. Based on the analysis and identification results of reconnaissance and perception, the feedback effect of interference assessment, and a dynamic knowledge base, this module uses machine learning algorithms to predict threat characteristics, generates countermeasures through reasoning from past experience, rapidly formulates attack strategies and optimizes interference waveforms, automatically allocates interference resources, and ultimately completes autonomous attacks on target signals.

Effectiveness assessment module. Effectiveness assessment is key to the closed-loop operation of cognitive electronic warfare systems, playing a crucial role in linking all modules. This module analyzes the target’s response to the jamming measures based on feedback information after the signals sensed by reconnaissance are jammed. It calculates and assesses the degree of jamming or damage to the target online, and then feeds the results back to the decision-making module to help adjust jamming strategies and optimize waveforms.

The dynamic knowledge base module primarily provides basic information and data support, including a threat target base, an interference rule base, and a prior knowledge base. This module provides prior information such as models, parameters, and data for reconnaissance and perception, decision-making, and performance evaluation. It utilizes feedback information for cognitive learning, accumulates learning results into experience, and updates the knowledge graph, knowledge rules, and reasoning models in the knowledge base, achieving real-time updates to the knowledge base.

New applications that enhance efficiency

With further breakthroughs in algorithm models and learning reasoning technologies, information-based and intelligent warfare will lead to more mature and sophisticated cognitive electronic warfare systems. Their role in empowering and enhancing efficiency will become more prominent, their application scenarios will become more diverse, and they will become an indispensable weapon on the battlefield.

Precision energy release for strike operations. Under informationized and intelligent conditions, the battlefield situation is presented in real time, command and decision-making are timely and efficient, and combat operations are controlled in real time, enabling precision operations to move from scenario conception to the real battlefield. At the same time, with the connection of cyber information facilities, the combat system has a higher degree of coupling and stronger resilience, becoming an important support for the implementation of joint operations. The cognitive electronic warfare system possesses high-precision perception capabilities and strong directional jamming capabilities. Through its distributed deployment across a wide battlefield, it can work in conjunction with troop assaults and fire strikes, under the unified command of joint operations commanders, to conduct precise attacks on key nodes and important links of the combat system. This includes precise targeting, precise frequency coverage, and precise and consistent modulation patterns, thereby blinding and degrading the effectiveness of enemy early warning detection and command and control systems, and facilitating the implementation of system disruption operations.

Networked Collaborative Swarm Warfare. In future warfare, unmanned swarms such as drones, unmanned vehicles, and unmanned boats will be the main force in combat, making the construction of a low-cost, highly redundant force system crucial for victory. Facing unmanned combat systems like “swarms,” ​​”wolf packs,” and “fish schools,” cognitive electronic warfare systems possess a natural advantage in evolving into unmanned electronic warfare swarms. Based on networked collaborative technologies, reconnaissance and jamming payloads are deployed on unmanned swarm platforms. Information and data exchange between platforms is achieved through information links. With the support of intelligent algorithms, cognitive electronic warfare systems can optimize the combination of jamming functions and dynamically allocate resources based on the battlefield electromagnetic situation. Based on autonomous collaborative guidance and centralized control, they can conduct swarm-to-swarm electronic attacks.

Electronic warfare and cyber warfare are two fundamentally different modes of combat. Electronic warfare focuses on low-level confrontation at the physical and signal layers, while cyber warfare focuses on high-level confrontation at the logical and information layers. However, with information networks covering the electromagnetic spectrum, the convergence of electronic and cyber warfare has become increasingly possible. Breakthroughs in wireless access and encryption technologies have enabled cognitive electronic warfare systems to infiltrate network infrastructure, achieving seamless integration of cyber and electronic space situational awareness and mission decision-making. By combining autonomous learning, pattern evaluation, and algorithmic prediction, a closed-loop system integrating cyber and electronic space perception, evaluation, decision-making, and feedback can be established, enabling integrated cyber and electronic warfare offense and defense.

現代國語:

在戰爭的無形維度中,一場無聲的較量已持續了一個世紀。從馬海戰的電磁迷霧到現代戰場的光譜混亂,從二戰時期簡陋的金屬箔條到融合人工智慧的認知電子戰系統,電子戰經歷了從輔助角色到戰爭支柱的華麗蛻變。如今,它已深深融入現代戰爭的“操作系統”,改寫了戰爭的形式和規則。它無形無質,卻深刻地掌控著戰場行動的生命線;它悄無聲息,卻足以決定成千上萬士兵的生死。未來戰爭的勝負將越來越取決於誰能更清晰地洞察、更快地反應、更牢固地掌控這片無聲卻致命的頻譜。

在現代戰爭中,電子戰領域正快速發展。電磁頻譜被視為繼陸地、海洋、空中、太空和網路空間之後的重要作戰領域,成為交戰雙方在聯合作戰中爭奪全面優勢的關鍵所在。隨著戰爭加速朝向智慧化演進,融合人工智慧和機器學習技術的認知電子戰正日益展現其自主對抗優勢,成為癱瘓電磁空間目標的關鍵工具。

智慧戰爭的新需求

在資訊化和智慧化戰爭中,資訊裝備廣泛分佈,無人智慧裝備也投入使用,使得戰場電磁環境日益複雜。由於認知和自適應技術的應用,雷達和通訊裝備的抗干擾能力不斷增強,傳統的電子對抗手段已難以應對。因此,必須利用人工智慧和機器學習技術,賦予電子戰系統自主識別威脅、即時提取威脅源訊號、快速整理分析、判斷威脅等級和訊號弱點並及時有效對抗的能力。

精準感知的需求。在現代戰爭中,為了提高戰場“透明度”,交戰雙方廣泛使用電子資訊裝備。同時,無人裝備和「集群」系統也被廣泛應用。在充斥著大量資訊設備和海量電磁訊號的戰場上,單一電子戰設備可能同時接收來自數十甚至數百個其他電子設備的輻射,使得訊號識別極為困難。這就要求電子戰系統突破現有技術限制,融合大數據分析與深度學習技術,增強感知能力,並全面辨識戰場上各種電磁輻射目標。

智能對抗的需求。在新興技術的推動下,敏捷雷達、跳頻無線電等設備已廣泛部署於戰場。這些設備在收發之間形成閉環,能夠根據環境自主調整工作模式、發射參數和波形選擇,並具備自主抗干擾能力。傳統的電子戰設備基於現有經驗和預設的干擾規則庫,功能僵化,靈活性差,難以應對新興的自適應電子目標。這就要求電子戰系統融合智慧演算法,變得更加“智慧”,具備“以智制智”的自適應對抗能力。

顛覆網路化系統的需求。現代作戰系統的致勝機制,一旦映射到資訊領域,便會推動雷達和通訊系統的網路化運作。其目標是透過資訊融合和冗餘設計,利用網路系統的韌性,消除因單一設備或連結某部分受到干擾而導致的全局失控。面對網路化資訊系統,電子戰系統需要嵌入智慧對抗分析和推理技術,具備有效識別網路化資訊系統的能力,從而發現關鍵節點和重要部件,並實施有針對性的軟硬體一體化攻擊。

數位智慧驅動的新轉型

認知電子戰可以被視為電子戰與人工智慧的結合。它是新一代電子戰系統,具備自主感知、智慧決策和自適應幹擾能力。智慧電子戰系統代表傳統電子戰的重大升級。

認知方式的轉變:從人腦認知轉向機器認知。現代電子技術的進步使得電子資訊設備能夠提供多樣化的功能和多種模式。傳統的電子戰系統依賴人工分析的威脅資料庫進行對抗,而這種方法僅對已知的訊號模式有效,而對未知威脅的對抗效果則顯著降低。認知電子戰系統透過自主互動群體學習和智慧演算法,能夠快速截獲和識別訊號模式,分析變化的模式,根據電磁環境的變化做出自主決策,優化干擾訊號波形,並自主完成「觀察-判斷-決策-行動」的作戰循環。

電子戰的重點正從精度驅動轉向數據驅動。電子戰系統以測量和感知電子訊號為基本前提。然而,隨著新技術的出現,這些系統的靈敏度和解析度正接近極限,阻礙了其發展和升級。認識到電子戰系統可以透過利用大數據分析和挖掘大型資料集來突破傳統模式,不僅可以高效截獲和準確識別未知訊號,還可以預測頻率變化、模式調整和功率轉換的時機。這使得對電子目標的運作模式進行關聯分析成為可能,從而能夠主動調整幹擾策略、規則和參數,並實施有針對性的電子攻擊。

幹擾的重點已從單一目標轉向幹擾網路化目標。在網路技術的驅動下,新一代雷達和通訊設備開始連網,利用系統優勢彌補單點目標的不足。傳統的電子戰幹擾依賴人的經驗和知識,缺乏足夠的自學習能力,主要用於幹擾點狀和鏈狀電子目標,無法有效幹擾網路化目標。認知電子戰系統利用深度學習技術感知雷達、通訊等新型網路化系統的網路結構與運作模式。基於邏輯推理,該系統能夠識別網路系統中的節點、樞紐和關鍵鏈路,從而實現精準幹擾,並有可能破壞系統。

新型結構重塑

認知電子戰系統在傳統開環結構的基礎上,引入行為學習過程並重塑模組化架構,使其能夠評估幹擾效果,並基於乾擾反饋優化干擾策略,從而形成「偵察-幹擾-評估」對抗的閉環。

偵察感知模組。偵察感知是電子戰的核心環節,也是成功實施認知電子戰的關鍵前提。本模組利用深度學習和特徵學習技術,透過與戰場電磁環境的持續交互,不斷學習周圍環境。它對訊號進行參數測量和分類,在先驗知識的支持下分析和提取目標威脅訊號的特徵數據,評估行為意圖,確定威脅等級,並將數據傳輸至決策和效果評估模組。

決策模組。決策模組是認知電子戰系統的核心,主要負責產生幹擾策略和最佳化干擾波形。此模組基於偵察感知的分析識別結果、幹擾評估的回饋效果以及動態知識庫,利用機器學習演算法預測威脅特徵,透過對過往經驗的推理生成對抗措施,快速制定攻擊策略並優化干擾波形,自動分配幹擾資源,最終完成對目標訊號的自主攻擊。

效果評估模組。效果評估是認知電子戰系統閉環運作的關鍵,在連接所有模組中發揮至關重要的作用。此模組在偵察感知到訊號被幹擾後,基於回饋資訊分析目標對幹擾措施的反應,在線上計算和評估目標受到的干擾或損害程度,並將結果回饋給決策模組,以幫助調整幹擾策略和優化波形。

動態知識庫模組主要提供…此模組提供基礎資訊和資料支持,包括威脅目標庫、幹擾規則庫和先驗知識庫。它提供先驗信息,例如用於偵察感知、決策和性能評估的模型、參數和數據。它利用回饋資訊進行認知學習,將學習結果累積為經驗,並更新知識庫中的知識圖譜、知識規則和推理模型,從而實現知識庫的即時更新。

提升效率的新應用

隨著演算法模型和學習推理技術的進一步突破,資訊化和智慧化戰爭將催生更成熟和精密的認知電子戰系統。它們在增強作戰效率方面的作用將更加突出,應用場景將更加多樣化,並將成為戰場上不可或缺的武器。

精確能量釋放用於打擊行動。在資訊化和智慧化條件下,戰場態勢即時呈現,指揮決策及時高效,作戰行動即時控制,使精確打擊行動能夠從場景構思到實際戰場。同時,隨著網路資訊設施的互聯互通,作戰系統具有更高的耦合度和更強的韌性,成為聯合作戰的重要支撐。認知電子戰系統具備高精度感知能力及強大的定向幹擾能力。透過其在廣大戰場上的分散部署,該系統可在聯合作戰指揮官的統一指揮下,與部隊突擊和火力打擊協同作戰,對作戰系統的關鍵節點和重要環節進行精確打擊。這種打擊包括精確目標定位、精確頻率覆蓋以及精確一致的調製模式,從而乾擾和削弱敵方預警和指揮控制系統的效能,並為系統破壞作戰的實施提供便利。

網路協同集群作戰。在未來的戰爭中,無人機、無人車輛、無人艇等無人集群將成為作戰的主力,因此建造低成本、高冗餘度的作戰系統對於取得勝利至關重要。面對「集群」、「狼群」和「魚群」等無人作戰系統,認知電子戰系統在演進為無人電子戰集群方面具有天然優勢。基於網路協同技術,偵察和乾擾載荷部署在無人集群平台上。平台間的資訊和資料交換透過​​資訊鏈路實現。在智慧演算法的支援下,認知電子戰系統能夠根據戰場電磁態勢優化干擾功能組合併動態分配資源。基於自主協同導引和集中控制,它們可以進行群集間的電子攻擊。

電子戰和網路戰是兩種截然不同的作戰模式。電子戰著重於實體層和訊號層的低層對抗,而網路戰則著重於邏輯層和資訊層的高層對抗。然而,隨著資訊網路覆蓋電磁頻譜,電子戰和網路戰的融合變得越來越可能。無線存取和加密技術的突破使得認知電子戰系統能夠滲透網路基礎設施,實現網路空間和電子空間態勢感知及任務決策的無縫融合。透過結合自主學習、模式評估和演算法預測,可以建立一個整合網路空間和電子空間感知、評估、決策和回饋的閉環系統,從而實現網路戰和電子戰的一體化攻防。

王志勇 楊連山 崔怡然

來源:中國軍網-解放軍報 作者:王志勇 楊連山 崔怡然 責任編輯:林詩清 發布:2026-01-22

中國原創軍事資源:http://www.81.cn/ll_208543/168483878784.html

[Chinese National Defense] Establishing Correct Awareness to Contain China and Conduct Cognitive Warfare Operations

[中國國防]建立正確的意識,以遏制中國並進行認知戰爭行動

現代英語:

As the world continued to actively combat the COVID-19 pandemic, the British newspaper The Guardian reported in late May 2021 that Fazze, a public relations and marketing agency with close ties to Russian officials, was accused of providing funding to influential YouTubers, bloggers, and other opinion leaders in France, Germany, and other European countries to spread false information claiming that vaccines like Pfizer (BNT) and AstraZeneca (AZ) had caused hundreds of deaths. The false information also criticized the EU vaccine procurement system for harming public health in European countries, with the goal of sowing public distrust of Western vaccines and shifting public acceptance toward Russia’s Sputnik V vaccine. This is the most significant example of “perception warfare” in recent international history.

 In fact, human society has always adhered to the principle of “conquering the enemy without fighting” as the guiding principle for optimal military operations. While traditional warfare still primarily takes place in physical space, victory requires the physical capture of cities and territories, as well as the destruction of enemy forces. However, as humanity’s understanding of the nature of war deepens, the use of information technology has become a new trend in warfare, enabling the achievement of traditional combat effectiveness without the need for physical engagement. Given the increasing attention paid to “information warfare” and “hybrid warfare,” this article discusses the closely related concept of “cognitive warfare,” exploring the emerging threats facing our country and our national defense response strategy.

 Whether it’s what the US calls “hybrid warfare” or what Russia calls “information warfare,” the implications are quite similar: centered on the cognitive realm, the use of information to influence and manipulate targets, encompassing both peacetime public opinion and wartime decision-making. The rise of Nazi Germany after World War I was arguably the first modern regime to master the use of information to shape perceptions within its own country and even abroad. Its successful use of propaganda and lies, delivered through various communication technologies, was highly successful. Principles such as “repetition is power” and “negative information is more easily accepted and remembered than positive information” would later profoundly influence authoritarian governments, including Russia.

 Using information capabilities to subvert national regimes

 At the beginning of the 21st century, Russia began to pay attention to the situation where international discourse power was completely controlled by Western countries. It successively put forward theories such as “Information Warfare Theory” and “Sixth Generation Warfare Theory”, arguing that the sixth generation of warfare is a non-contact war that uses precision weapons and information warfare to traverse the battlefield. The purpose of war is no longer a devastating global war, but to achieve effects that cannot be achieved through traditional warfare by exploiting the enemy’s information capabilities to exploit its weaknesses, including changing social and cultural orientations and values, and thus subverting national regimes.

 In 2005, Russia established the international news channel “Russia Today.” Initially focused on soft power propaganda, it shifted its focus after the 2008 Georgian War to attacking negative aspects of Western society and fostering conspiracy theories. The 2014 Ukraine crisis became a training ground for Russian information warfare forces. Using electronic jamming and cyber theft, they intercepted Ukrainian communications, inferring subsequent Ukrainian actions and releasing damaging information at critical moments. They also targeted sensitive issues in eastern Ukraine, including the status of ethnic Russians and economic downturn, distributing a large amount of carefully selected, targeted information to resonate with the public, influencing their perceptions and behavior and gaining control of media opinion. In terms of “cognitive warfare,” Russia’s approach has been successful, and has become a model for the Chinese Communist Party.

 Manipulating “brain control” to control the public

 In 2014, the Chinese Communist Party (CCP) proposed the cognitive operational concept of “brain control,” building on its past “three warfares” of psychological warfare, legal warfare, and public opinion warfare, as well as Russia’s theoretical framework of “information warfare.” It states that a nation’s cognitive space is composed of the superposition of countless individuals, and that “brain control” uses national languages, propaganda media, and cultural products as weapons to comprehensively infiltrate and control the cognition, emotions, and consciousness of the general public and national elites, ultimately distorting, disintegrating, and reshaping their national spirit, values, ideology, history, and culture, thereby achieving the strategic goal of winning without fighting.

 Therefore, the CCP’s “cognitive operations” fall under the broad category of psychological warfare. In the era of information globalization, it integrates information warfare, psychological warfare, and public opinion warfare, becoming the core of the CCP’s overall strategy. Since the 2016 military reform, it has been led by the newly formed “Strategic Support Force” and implemented at all political and military levels. On the one hand, the PLA has adopted American operational thinking in the field of “cognitive operations,” using units such as the 311 Base, the National University of Defense Technology, and the Academy of Military Sciences to develop tactics such as “psychological operations,” “ideological operations,” “consciousness manipulation,” and “strategic communication” to strengthen the “cognitive operations” capabilities jointly constructed by military-civilian integration and joint combat systems. On the other hand, it uses professional personnel to operate media platforms, shape the public opinion environment, and introduce “cognitive operations” into the actual combat application stage.

 The CCP’s recent “cognitive warfare” offensive against Taiwan reveals its methods and tactics. First, the CCP primarily uses the internet to collect personal data from Taiwanese citizens, using big data databases to categorize information by target group, based on political leanings, age, occupation, and other factors. Second, it leverages intelligence gathering to launch targeted cognitive attacks on specific social media platforms, influencing the psychology of the targeted groups, particularly by releasing disinformation to weaken and distract Taiwanese society. Third, it employs online virtual organizations to set up fake social media accounts, infiltrate online communities, and disguise themselves as whistleblowers, deliberately spreading fabricated information to create confusion. Cybertroopers then massively repost and discuss this information, manipulating audience perceptions and creating a cycle of disrupting information retention, manipulating cognitive psychology, and altering thinking patterns.

 Identify fake news and fight back together

 At this stage, the CCP’s campaign for “brain control” over Taiwan aims to influence Taiwanese society’s cognition, distorting public opinion, devaluing democratic values, intensifying opposition, disrupting political conditions, and undermining public trust in the government. The following preventive measures can be taken within the national defense system:

 1. Strengthening educational functions

 Through national defense education in schools, institutions, and society, we will raise the public’s awareness of the threat posed by the CCP’s “cognitive warfare” and their ability to identify false information, and cultivate the habit of rationality, verification, and calmness.

 2. Follow the constraints

 Although there are currently no internationally accepted legal rules that can clearly define the extent to which cognitive warfare constitutes an act of war, making it even more difficult to hold people accountable, media platforms can still strengthen the review of their own reporting content in accordance with existing regulations, and the public can also refrain from spreading suspicious information and following the trend of tennis melee, so as to facilitate the establishment of information verification measures and mechanisms.

 3. Combining Military and Civilian Strength

 Incorporate information and communication-related institutions and industries into the national defense mobilization mechanism, coordinate in peacetime the review, analysis, and disposal of fake news, strengthen talent training and research cooperation, and enhance the capabilities of professional units of the government and the national army; in wartime, cooperate with the overall national actions and carry out countermeasures.

 Currently, Taiwan already has the National Security Bureau’s National Security Operations Center responsible for responding to controversial information from hostile foreign forces. There’s also the non-profit Taiwan Fact-Checking Center. Facing the challenges of cognitive warfare, we must continue to integrate various sectors, strive for international intelligence exchange and experience sharing, optimize the media environment, collaborate across multiple channels, and instantly identify the authenticity and source of information, jointly building our offensive capacity to respond to cognitive warfare.

 Conclusion

 In reality, all countries around the world face threats related to cognitive warfare and information-based psychological warfare. However, democratic and free societies are by no means vulnerable to cognitive warfare attacks and must instead rely on diverse strategies and methods to protect them. We aim to establish a more comprehensive and substantive framework, build a powerful counterforce, and enhance the quality and discernment of our citizens, thereby gaining immunity from the CCP’s cognitive warfare campaign to seize control of our minds.

(The author is a PhD candidate at the Institute of Strategic Studies, Tamkang University)

現代國語:

在全球持續積極對抗新冠疫情之際,英國《衛報》2021年5月下旬報道,與俄羅斯官員關係密切的公關和營銷機構Fazze被指控向法國、德國和其他歐洲國家頗具影響力的YouTube用戶、博主和其他意見領袖提供資金,用於傳播虛假信息,聲稱輝瑞(BNTAZ)和阿斯特利康(BNTAZ)和阿斯特疫苗已導致數百人死亡。這些假訊息也批評歐盟疫苗採購體系損害了歐洲國家的公共衛生,目的是挑起大眾對西方疫苗的不信任,並促使大眾接受俄羅斯的Sputnik V疫苗。這是近代國際史上最顯著的「感知戰」案例。

事實上,人類社會自古以來,均以「不戰而屈人之兵」作為最佳軍事行動指導原則,儘管傳統戰爭主要仍在物理空間進行,需透過實際攻城掠地、消滅敵有生力量,才能獲得勝利。然隨人類對戰爭本質認知深化,利用資訊科技,於不需實體短兵相接的情況下,卻能達到傳統戰爭效果,已成為新型態戰爭趨勢。鑑於「資訊戰」、「混合戰」日益受重視,謹就與其密切相關的「認知作戰」概念進行論述,並探討我國所面臨的新型威脅及全民國防因應策略。

無論是美國所稱的「混合戰」,或俄國所說的「資訊戰」,其實指涉意涵很相似,即以認知領域為核心,利用訊息影響、操控對象目標涵蓋承平時期輿論及戰時決策的認知功能。一戰後,逐漸興起的納粹德國,可謂當代首個擅長運用資訊形塑本國,甚至外國民眾認知的政權,其透過各種傳播技術的政治宣傳與謊言包裝,相當成功;而所謂「重複是一種力量」、「負面訊息總是比正面訊息,更容易讓人接受和印象深刻」等實踐原則,日後更深刻影響專制極權政府與現在的俄羅斯。

藉資訊能力 顛覆國家政權

俄國於進入21世紀初,開始注意國際話語權遭西方國家完全掌控的情形,陸續提出「資訊戰理論」、「第6代戰爭理論」等論述,主張第6代戰爭是以精確武器及資訊戰,縱橫戰場的非接觸式戰爭,戰爭目的不再是毀滅性的全球大戰,而是藉利用敵方弱點的資訊能力,達成傳統戰爭無法實現的效果,包括改變社會文化取向、價值觀,進而顛覆國家政權等。

2005年,俄國成立國際新聞頻道「Russia Today」,起初主要是軟實力宣傳,2008年「喬治亞戰爭」後,轉為攻擊西方社會負面問題與製造陰謀論;2014年「烏克蘭危機」,成為俄軍資訊戰部隊的練兵場,透過電子干擾、網路竊密等手段,截收烏國對外通聯訊息,依此推判烏方後續舉動,並選擇在關鍵時機,釋放對烏國政府不利消息;另選定烏東地區敏感議題,包括俄裔民族地位、經濟不振等,投放大量經篩選的特定資訊,引發民眾共鳴,從而影響烏東人民認知與行為,取得媒體輿論主動權。就「認知作戰」言,俄國作法是成功的,更成為中共的效法對象。

操弄「制腦權」 控制社會大眾

中共2014年於過去心理戰、法律戰、輿論戰等「三戰」基礎,以及俄國「資訊戰」理論架構上,提出「制腦權」認知操作概念,指國家認知空間係由無數個體疊加而成,「制腦」是以民族語言、宣傳媒體、文化產品為武器,全面滲透、控制社會大眾與國家精英之認知、情感與意識,最終扭曲、瓦解、重塑其民族精神、價值觀念、意識形態、歷史文化等,達致不戰而勝的戰略目標。

是以,中共「認知作戰」屬於廣義心理戰範疇,是資訊全球化時代,融合資訊戰、心理戰及輿論戰的戰法,成為中共整體戰略主軸,並自2016年「軍改」後,由新組建的「戰略支援部隊」操盤,在各政略、軍事層次開展執行。一方面,共軍擷取美國在「認知作戰」領域的操作思維,以311基地、國防科技大學、軍事科學院等單位研提「心理作戰」、「思想作戰」、「意識操縱」、「戰略傳播」等戰法,以加強軍民融合及聯戰體系共同建構的「認知作戰」能力;另一方面,則以專業人員操作媒體平臺,形塑輿論環境,將「認知作戰」導入實戰運用階段。

從近年中共對臺進行的「認知作戰」攻勢,可拆解其途徑與手段。首先,中共主要係以網路蒐集國人個資,透過大數據資料庫,劃分政治傾向、年齡、職業等不同目標族群資訊;其次,配合情報偵蒐,針對個別社群媒體展開認知精準打擊,影響目標群眾心理,尤其釋放假訊息,以削弱、分散臺灣社會注意力;再次,則運用網路虛擬組織設置社群媒體假帳號,打入網路族群,偽裝成揭密者、吹哨者,刻意傳散變造資訊,製造混亂,再由網軍大量轉傳、討論,操弄受眾認知,進入阻斷資訊記憶、操縱認知心理、改變思考模式的運作循環。

識別假訊息 全民齊反制

基於現階段,中共對臺「制腦權」作戰,影響臺灣社會認知的目的,在於扭曲輿論、貶低民主價值、激化對立、擾亂政情、減損民眾對政府信任等,於全民國防體系可採取的防制辦法包括:

一、強化教育功能

分別透過全民國防之學校教育、機關教育、社會教育途徑,提高公眾對中共「認知作戰」威脅的認識,與對假訊息識別能力,養成理性、查證、冷靜習慣。

二、遵循約束規範

儘管目前尚無國際通用的法律規則,可明確定義何種程度的認知作戰已構成戰爭行為,更難以究責;然各媒體平臺仍可按既有規範,對自身報導內容加強審查,民眾也可做到不傳播可疑訊息、不跟風網壇混戰,俾利訊息查證措施與機制建立。

三、結合軍民力量

將資訊與傳播相關機構、產業,納入全民防衛動員機制,平時協調因應假訊息審查、分析、處置,加強人才培訓、研究合作,提升政府、國軍專業單位能力;戰時則配合國家整體作為,執行反制任務。

目前我國已有國安局「國家安全作業中心」執行對境外敵對勢力爭議訊息應處有關工作,民間亦有非營利組織成立的「臺灣事實查核中心」。面對「認知作戰」挑戰,仍應持續整合各界力量,爭取國際情報交流與經驗共享,優化媒體環境,多管道合作,即時辨識訊息真偽與來源,共同建設應處「認知作戰」攻勢能量。

結語

事實上,世界各國都同樣面臨「認知作戰」、「資訊心理戰」等相關威脅,然民主自由的社會環境,絕非易受「認知作戰」攻擊的溫床,更需仰賴多元策略與方式守護。期以更完善周全的實質架構,建構強而有力的反制力量,並提升我國公民素質及識別能力,於中共奪取「制腦權」的認知作戰中,獲得免疫。

(作者為淡江大學戰略研究所博士)

中國原創軍事資源:https://www.ydn.com.tw/news/newsInsidePage?chapterID=1431550

China’s Weaponized Communication in International Public Opinion Warfare: Scenarios and Risk Responses

中國在國際公眾輿論戰爭中的武器交流:場景和風險回應

現代英語:

【Abstract】 In the international public opinion war, weaponized communication has penetrated into military, economic, diplomatic and other fields, bringing imagination and practice “everything can be weaponized”. Weaponized communication manipulates public perception through technology, platforms, and policies, reflecting the complex interaction of power distribution and cultural games. Driven by globalization and digitalization, cognitive manipulation, social fragmentation, emotional polarization, digital surveillance, and information colonization have become new means of influencing national stability, which not only exacerbates competition between information-powerful and weak countries, but also provides information-weak countries with the opportunity to achieve reversal through flexible strategies and technological innovation. Under the global asymmetric communication landscape, how to find a point of convergence and balance between technological innovation and ethical responsibility, strategic goals and social balance will be key elements that will influence the future international public opinion landscape.

【Keywords】 Public opinion warfare; weaponized communication; information manipulation; asymmetric communication; information security

If “propaganda is a rational recognition of the modern world” [1], then weaponized communication is a rational application of modern technological means. In the “public opinion war”, each participating subject achieves strategic goals through different communication methods, making them superficially reasonable and concealed. Unlike traditional military conflicts, modern warfare involves not only physical confrontation, but also competition in several fields, including information, economics, psychology, and technology. With the advancement of technology and globalization, the shape of war has changed profoundly, and traditional physical confrontations have gradually shifted to multi-dimensional and multi-field integrated warfare. In this process, weaponized communication, as a modern form of warfare, becomes an invisible means of violence that affects the psychology, emotions and behavior of the opposing enemy or target audience by controlling, guiding and manipulating public opinion, thereby achieving political, military or strategic ends.》 “On War” believes that war is an act of violence that makes the enemy unable to resist and subservient to our will. [ 2] In modern warfare, the realization of this goal not only relies on the confrontation of military forces, but also requires support from non-traditional fields such as information, networks, and psychological warfare. Sixth Generation Warfare heralds a further shift in the shape of warfare, emphasizing the application of emerging technologies such as artificial intelligence, big data, and unmanned systems, as well as comprehensive games in the fields of information, networks, psychology, and cognition. The “frontline” of modern warfare has expanded to include social media, economic sanctions, and cyberattacks, requiring participants to have stronger information control and public opinion guidance capabilities.

At present, the spread of weaponization has penetrated into the military, economic, diplomatic and other fields, bringing with it the apprehension that “everything can be weaponized”. In the sociology of war, communication is seen as an extended tool of power, with information warfare penetrating deeply and accompanying traditional warfare. Weaponized communication is precisely under the framework of information control, by shaping public perceptions and emotions, consolidating or weakening the power of states, regimes or non-state actors. This process not only occurs in wartime, but also affects power relations within and outside the state in non-combatant states. In international political communication, information manipulation has become a key tool in the great power game, as countries try to influence global public opinion and international decision-making by spreading disinformation and launching cyberattacks. Public opinion warfare is not only a means of information dissemination, but also involves the adjustment of power games and diplomatic relations between countries, directly affecting the governance structure and power pattern of the international community. Based on this, this paper will delve into the conceptual evolution of weaponized communication, analyze the social mentality behind it, elaborate on the specific technical means and the risks they entail, and propose multidimensional strategies to deal with them at the national level.

1. From weaponization of communication to weaponization of communication: conceptual evolution and metaphor

Weapons have been symbols and tools of war throughout human history, and war is the most extreme and violent form of conflict in human society. Thus, “weaponized” refers to the use of certain tools for confrontation, manipulation or destruction in warfare, emphasizing the way in which these tools are used.“ Weaponization ”(weaponize) translated as“ makes it possible to use something to attack an individual or group of people”. In 1957, the term “weaponization” was proposed as a military term, and Werner von Braun, leader of the V-2 ballistic missile team, stated that his main work was “weaponizing the military’s ballistic missile technology‘ [3].

“Weaponization ”first appeared in the space field, during the arms race between the United States and the Soviet Union, and the two major powers tried to compete for dominance in outer space.“ Weaponization of space ”refers to the process of using space for the development, deployment or use of military weapons systems, including satellites, anti-satellite weapons and missile defense systems, etc., with the purpose of conducting strategic, tactical or defensive operations. From 1959 to 1962, the United States and the Soviet Union proposed a series of initiatives to ban the use of outer space for military purposes, especially the deployment of weapons of mass destruction in outer space orbit. In 2018, then-U.S. President Trump signed Space Policy Directive-3, launching the construction of the “Space Force” and treating space as an important combat area on the same level as land, air, and ocean. In 2019, the “Joint Statement of the People’s Republic of China and the Russian Federation on Strengthening Contemporary Global Strategic Stability” proposed “prohibiting the placement of any type of weapons in outer space” [4].

In addition to weaponization in the space sector, there is also a trend towards weaponization in the military, economic and diplomatic fields.“ Military weaponization” is the use of resources (such as drones, nuclear weapons, etc.) for military purposes, the deployment of weapons systems, or the development of military capabilities. During the Russo-Ukrainian War in 2022, a report from the Royal United Services Institute showed that Ukraine lost approximately 10,000 drones every month due to the impact of Russian jamming stations. [ 5] “weaponization” also often appears in expressions such as “financial war ”“diplomatic battlefield”. In the economic sphere, weaponization usually refers to the use of shared resources or mechanisms in the global financial system by countries or organizations; diplomatic weaponization is manifested in countries pursuing their own interests and exerting pressure on other countries through economic sanctions, diplomatic isolation, and manipulation of public opinion. Over time, the concept of “weaponization” has gradually expanded into the political, social, cultural and other fields, especially in the information field, and since the 2016 United States presidential election, manipulation of public opinion has become a universal tool in political struggles. David Petraeus, a former director of the CIA in the United States, once said at a National Institute for Strategic Studies conference that the time has come for “the weaponization of everything”.[ 6]

As a metaphor, “weaponization” not only refers to the use of actual physical tools, but also symbolizes the transformation of adversarial and aggressive behavior, emphasizing how the concept of “weapons” permeates daily life, cultural production, and political strategies, showing how social actors use various tools to achieve strategic goals. Nowadays, many areas that should remain neutral, such as the media, law and government agencies, are often described as “weaponized” to criticize their excessive politicization and improper use, highlighting their illegality and negative impact on society. Influence. Through this metaphor, one unconsciously contrasts the current political environment with an idealized and seemingly more moderate past, making one think that the political climate of the past was more rational and civilized, while the present appears too extreme and oppositional.[ 7] Therefore, the essence of “weaponization” is the process of political mediation, which is the use of various means and channels by political forces to influence or control areas that should remain neutral, making them political purposes and tools of political struggle.

In the field of information, the weaponization of communication is a long-standing and strategic means. During World War I and II, propaganda and public opinion warfare were widely used in various countries, and means of communication were used as a psychological tactic. Weaponized communication is the embodiment of the weaponization of communication in the modern information society. It uses algorithms and big data analysis to accurately control the speed and scope of information dissemination, and then controls public opinion and emotions. It reflects the combination of technology, platforms and strategies, making Political forces can more accurately and efficiently control the public perception and public opinion environment. As the ontology of public opinion, information is “weaponized” and used to influence social cognition and group behavior, and the concept of “war” has changed accordingly, no longer just traditional military confrontation, but also includes psychological warfare and cognitive warfare through information dissemination and public opinion manipulation. This shift has led to a range of new terms such as unrestricted warfare, new generation warfare, asymmetric warfare, and irregular warfare. Almost all of these terms are borrowed from “warfare” (warfare) to emphasize diverse conflicts in the information field, and information becomes the core content of “weaponization”.

Although there is some view that the term “war” does not apply to situations where hostilities are not formally declared [8], weaponized communication extends the concept of “war” by weakening the traditional political attributes of war and treating overt or covert forces and forms in various fields in general terms. as an act of communication. It is important to note that in English terms “weaponization” there are two formulations: one is “weaponized noun ”noun“, which means that something has been ”weaponized“ with a weapon function or purpose, and the other is ”weaponization of noun, which refers to the process of converting something into a weapon or having the nature of a weapon. In the academic sphere, Chinese translations differ, although weaponized communication and weaponization of communication are not yet strictly distinguished.“ Weaponized communication ”which focuses more on the means of communication or the message itself“ being weaponized” in order to achieve a certain strategic goal, and “weaponization of communication”, which emphasizes the process of communication itself as a transformation process of weapons. When discussing specific technical means, most academic papers adopt weaponized or weaponizing as a prefix to modify specific means of dissemination.

This article focuses on specific communication strategies in the international public opinion war, focusing on describing the weaponization phenomenon that has occurred, so unified use “weaponized communication” is a method of using communication means, technical tools and information platforms to accurately control information flow, public cognition and emotional response, a strategic communication method to achieve specific military, political or social purposes. Weaponized communication is also not a simple state of war or wartime, but a continuous communication phenomenon. It reflects the interaction and game between various subjects and is the flow of information sharing and meaning space.

2. Application scenarios and implementation strategies of weaponized communication

If at the end of the 1990s, weaponization in the information field was still a “dead topic”, and countries were mainly chasing upgrading competitions for physical weapons such as missiles and drones, then entering the 21st century, cyber wars have truly entered the public eye, and deeply embedded in people’s daily lives, through social media and smart devices, the public will inevitably be involved in the war of public opinion and unconsciously become participants or communication nodes. With the spread of technology, weaponized means gradually expanded from state-led instruments of war to socialized and politicized areas, and control over individuals and society shifted from explicit state apparatus to more covert conceptual manipulation. The exposure of Project Prism (PRISM) has raised strong global concerns about privacy breaches, highlighting the potential for states to use advanced technology for surveillance and control, seen as a new type of weaponization. Since Trump was elected President of the United States in 2016, the large-scale application of information weapons such as social robots has become a common phenomenon in the global political game. Information warfare ——including electronic warfare, computer network warfare, psychological warfare, and military deception—— is widely used to manipulate the flow of information and influence the landscape of public opinion. Not only do these methods work in military wars and political elections, but they also gradually permeate cultural conflicts, social movements and transnational games, perpetuating the traditional logic of information warfare. Nowadays, weaponized communication, as a socio-political tool, profoundly affects the ecology of public opinion, international relations and the daily lives of individuals.

(1) Information manipulation warfare in the military field

Information flow can directly influence the direction of military conflicts, shaping public and military perceptions and decisions, which in turn affects morale, strategic judgment, and social stability. In modern warfare, information is no longer a mere aid, and the field of information has become a central battleground. By manipulating the flow of information, the enemy’s situation assessment may be misled, the will to fight is weakened, and the trust and support of the people are shaken, which in turn affects the decision-making process and continuity of the war.

The Gulf War is regarded as the beginning of modern information warfare. In this war, the United States carried out systematic strikes against Iraq through high-tech means ——including electronic warfare, air strikes, and information operations——. The U.S. military used satellites and AWACS early warning aircraft to monitor the battlefield situation in real time, and induced the Iraqi army to surrender from a psychological level by airdropping leaflets and radio stations to convey to Iraqi soldiers the advantages of the U.S. military and its preferential treatment policy after surrender. The war marked the key place of information control in military conflicts, demonstrating the potential of information warfare in modern warfare. In the 21st century, cyberwarfare has become an important part of information warfare. Cyberwarfare involves not only the dissemination and manipulation of information, but also control over enemy social functions through attacks on critical infrastructure. In 2007, Estonia suffered a large-scale DDoS (Distributed Denial of Service Attack) attack, demonstrating a trend towards the fusion of information manipulation and cyberattacks. In the WannaCry ransomware incident in 2017, attackers used a Windows system vulnerability (EternalBlue) to encrypt the files of approximately 200,000 computers in 150 countries around the world and demanded a ransom, seriously affecting the British National Health Service (NHS) and causing the interruption of emergency services. and hospital system paralysis, further revealing the threat of cyber warfare to critical infrastructure. In addition, in long-term conflicts, infrastructure control is widely used to undermine the strategic capabilities of adversaries to compete for public information space due to its ability to directly determine the speed, scope, and direction of information dissemination. Israel has effectively weakened Palestinian communications capabilities by restricting the use of radio spectrum, controlling Internet bandwidth and disrupting communications facilities. At the same time, Israel also restricts the development of the Palestinian telecommunications market through economic sanctions and legal frameworks, suppresses Palestinian competitiveness in the flow of information, and consolidates its own strategic advantage in the conflict [9] in order to maintain the unequal flow of information.

Social media provides an immediate and extensive channel for information manipulation, allowing it to cross borders and influence global public sentiment and political situations, as well as shifting the focus of war from mere physical destruction to manipulation of public opinion. During the Russo-Ukrainian War, deepfake technology was used as a visual weapon, which significantly interfered with public perception and public opinion about the war. On March 15, 2022, a fake video of Ukrainian President Volodymyr Zelenskyy was circulated on Twitter, in which he “called” Ukrainian soldiers to lay down their weapons, triggering public confusion for a short period of time. Similarly, fake videos of Russian President Vladimir Putin have been used to confuse the public. Although the videos were promptly annotated “Stay informed” by the platform (pending instructions on understanding the situation), they still caused obvious interference to public emotions and perceptions within a short period of time. These events highlight the critical role of social media in modern information warfare, where state and non-state actors can exert interference in military conflicts through disinformation, emotional manipulation, and other means.

The complexity of information manipulation warfare is also reflected in its dual nature ——both a tool for attack and a means of defense. In the military sphere, states ensure national security, protect critical infrastructure, maintain military secrets, and in some cases influence adversary combat effectiveness versus decision-making by defending against and countering cyberattacks. In 2015 and 2017, Russian hackers launched large-scale cyber attacks against Ukraine (such as BlackEnergy and NotPetya). Ukraine successfully resisted some attacks and took countermeasures by quickly upgrading its cyber defense systems, avoiding larger-scale infrastructure paralysis. In addition, units such as the NATO Center of Excellence for Strategic Communications and the British 77th Brigade focus on researching public opinion shaping in peacetime [10], using strategic communications, psychological warfare, and social media monitoring to expand strategic control in the information field and strengthen defense and public opinion shaping capabilities, further increasing the strategic height of information warfare.

Today, information manipulation warfare is a key link in modern military conflicts. Through the high degree of integration of information technology and psychological manipulation, it not only changes the rules of traditional warfare, but also profoundly affects public perception and the global security landscape. By taking control of critical infrastructure and social media platforms, countries, multinational corporations or other actors can gain strategic advantages in the global information ecosystem by restricting the flow of information and manipulating communication paths.

(2) Public opinion intervention in political elections

Political elections are the most direct field of competition for power in democratic politics, and the dissemination of information has an important influence on voter decision-making in the process. By calculating propaganda and other means, external forces or political groups are able to manipulate the sentiments of voters and mislead the public, thereby influencing the results of elections, destabilizing politics or weakening the democratic process, and elections are thus the most effective application scenario for weaponized communication.

In recent years, global political elections have shown a trend towards polarization, with large ideological differences between groups with different political affiliations. Polarization leads the public to selectively accept information that is consistent with their own views, while excluding other information, and this “echo chamber effect” intensifies the public’s one-sided perception of positions, giving greater scope for public opinion intervention. And the rise of information dissemination technology, especially computational propaganda, has enabled external forces to more accurately manipulate public opinion and influence voter decision-making. Computational Propaganda refers to the use of computing technology, algorithms and automated systems to control the flow of information to disseminate political information, interfere with election results and influence public opinion. Its core characteristics are algorithm-driven accuracy and the scale of automated communication. By breaking through The limitations of traditional manual communication have significantly enhanced the effect of public opinion manipulation. In the 2016 U.S. presidential election, the Trump team analyzed Facebook user data through Cambridge Analytica and pushed customized political advertisements to voters, accurately affecting voters’ voting intentions [11]. This incident was seen as a classic case of computational propaganda interfering in elections, and also provided an operational template for other politicians, driving the widespread use of computational propaganda worldwide. In the 2017 French presidential election, candidate Emmanuel Macron’s team was hacked, and internal emails were stolen and made public, claiming that Macron had secret accounts overseas and was involved in tax evasion in an attempt to discredit his image. During the 2018 Brazilian presidential election, the team of candidate Jair Bolsonaro used WhatsApp groups to spread inflammatory political content, targeting and pushing a large number of images, videos and inflammatory messages to influence voter sentiment. According to statistics, from 2017 to 2019, the number of countries using computing for propaganda worldwide increased from 28 to 70, and in 2020 this number rose to 81. This suggests that computational propaganda is redefining the rules of public opinion in global elections through technical means and communication strategies.

Computational propaganda is also an important tool for state actors in the war of public opinion intervention. In 2011, the U.S. Defense Advanced Research Projects Agency (DARPA) launched Operation “Voice of Ernest” in the Middle East to distort conversations on Arabic-language social media by establishing and managing multiple false identities (sockpuppets). Russia also frequently uses computational propaganda to intervene, operating about 200,000 social media accounts in Canada, using far-right and far-left movements to spread pro-Russian rhetoric, create false social hot spots, and try to undermine Canada’s support for Ukraine [12]. As an important part of computing propaganda, social robots create the heat of public opinion through automation and scale, increase the exposure of information on social platforms through specific tags, and control the priority of issues. During the 2016 U.S. election, Russia used social robots to post content supporting Putin and attacking the opposition, covering up the opposition’s voice through information overload, and strengthening the pro-Putin public opinion atmosphere. [ 13] During the 2017 Gulf crisis, Saudi Arabia and Egypt used Twitter bots to create anti-Qatar hashtags#AlJazeeraInsultsKingSalman, which made it a hot topic and fictionalized the peak of anti-Qatar sentiment, which in turn affected global public opinion attitudes towards Qatar. [ 14] Deepfake technology further improves the accuracy and concealment of computing propaganda. In 2024, a fake video of U.S. President Joe Biden went viral on X (formerly Twitter), showing him using offensive language in the Oval Office, sparking controversy in public opinion and influencing voter sentiment. According to a survey by cybersecurity firm McAfee, 63% of respondents had watched a political deepfake video within two months, and nearly half said the content influenced their voting decisions.[ 15]

Globally, computing propaganda has infiltrated public opinion wars in various countries, affecting social stability and national security. The Israel Defense Forces waged a public opinion war against Palestine through digital weapons, Turkey cultivated “a patriotic troll army” to manipulate public opinion at home and abroad, and the Mexican government used botnets to influence public opinion. Computational propaganda is changing the landscape of global political communication as an important means of modern public opinion intervention warfare. With the development of technologies such as artificial intelligence and quantum computing, computing propaganda may also interfere with electoral processes through more covert and efficient means, or even directly threaten the core operating logic of democratic institutions.

(3) Symbolic identity war in the cultural field

Weaponized communication attempts to influence the public’s thoughts, emotions, and behaviors by manipulating information, symbols, and values, which in turn shapes or changes society’s collective cognition and cultural identity. This mode of communication consists not only in the transmission of information, but also in promoting the transmission and identification of a specific ideological or political idea through a specific narrative framework, cultural symbols and emotional resonance. Through the manipulation of cultural symbols, social emotions and collective memory, weaponized communication interferes with social structure and cultural identity in the cultural field, becoming a core means of symbolic identity warfare.

Memes, as a cultural symbol that combines visual elements and concise words, stimulate the emotional response of the audience in a humorous, satirical or provocative way, affecting their political attitudes and behaviors. Pepe the Frog began as a harmless comic book character that was repurposed and weaponized by far-right groups to spread hate speech, gradually evolving into a racist and anti-immigrant symbol. Memes transform complex political sentiments into easy-to-spread visual symbols that quickly stir up public distrust and anger over policy, seen as “weaponized iconoclastic weaponization” (Iconoclastic Weaponization). This process, by manipulating cultural symbols in order to achieve the purpose of political or social struggle [16], aggravates the public’s division of society and politics. For example, during Brexit, memes bearing the words “Take Back Control” Take Back Control spread rapidly, reinforcing nationalist sentiments.

In addition to the manufacture of cultural symbols, the screening and shielding of symbols are equally capable of shaping or deepening a certain cultural identity or political stance. Censorship has been an important means for power to control information since ancient times, and as early as the ancient Greek and Roman periods, governments censored public speeches and literary works to maintain social order and power stability. Entering the digital age, the rise of the Internet and social media has driven the modernization of censorship, and platform censorship has gradually replaced traditional censorship methods as a core tool for contemporary information control and public opinion guidance. Algorithm review detects sensitive topics, keywords, and user behavior data through artificial intelligence, automatically deletes or blocks content deemed “violations”, and the review team of social media manually screens user-generated content to ensure its compliance with platform policies and laws and regulations. The role of platform censorship is not only to limit the dissemination of certain content, but also to guide public opinion and shape the public perception framework through push, deletion and blocking. Although mainstream social platforms control the spread of information through strict content moderation mechanisms, some edge platforms such as Gab, Gettr, Bitchute, and others have become hotbeds of extreme speech and malicious information due to the lack of effective censorship. These platforms do not place sufficient restrictions on content publishing, allowing extreme views and disinformation to spread wantonly. For example, Gab has been repeatedly criticized for its extremist content and is accused of promoting violence and hatred. In the “echo chamber”, users can only access information that is consistent with their own views. This information environment further strengthens extreme ideas and leads to increased antagonism among social groups.[ 17]

Language, as a carrier and tool for information dissemination, can profoundly influence group behavior and cultural identity through emotional manipulation, symbolic politics, and social mobilization. The weaponization of language focuses on how language forms and cultural contexts affect the way information is received, emphasizing how language can be used to manipulate, guide or change people’s cognition and behavior. This involves not only the use of specific lexical and rhetorical devices, but also the construction of specific social meanings and cultural frameworks through linguistic representations. As another important tool of symbolic identity warfare, language shapes the narrative framework “of antagonism between the enemy and the enemy”. The Great Translation Movement spread the nationalist rhetoric of Chinese netizens to international social media platforms through selective translation, triggering negative perceptions of China. This language manipulation amplifies controversial content through emotional expression and deepens the cultural bias of the international community.

The deep logic of the weaponization of language lies in emotional and inflammatory forms of language. Western countries often justify acts of intervention by using the labels of justice such as “human rights” and “democracy”, legitimizing political or military action. White supremacists reshape ideologies using vague labels such as “alt-right”, transforming traditional “white supremacist” with strongly negative connotations into a more neutral concept, reducing the vocabulary’s social resistance, broadening the base of its supporters with a broad “umbrella” identity. Through the infiltration of secular discourse, hate politics and extreme speech are justified, gradually creating a political normality. Language is truly weaponized after the public routineizes this politics.[ 18] In Nigeria, hate-mongering content spreads through racial, religious and regional topics, profoundly deteriorating social relations. [ 19] Linguistic ambiguity and reasonable denial strategies have also become powerful tools for communicators to circumvent their responsibilities and spread complex social and political issues in simplified narratives. Through negative labeling and emotional discourse, Trump’s America First policy deliberately puts forward views that are opposed to mainstream opinions by opposing globalization, questioning climate change science, and criticizing traditional allies, stimulating public distrust of globalization, reshaping the cultural identity of national interests first. [ 20]

III Risks and challenges of weaponized dissemination: legitimacy and destructiveness

Although weaponized communication poses a great risk to the international public opinion landscape, it may be given some legitimacy by certain countries or groups through legal, political or moral frameworks in specific situations. For example, after the “9/11” incident, the United States passed the Patriot Act to expand the surveillance authority of intelligence agencies and implement extensive information control in the name of “anti-terrorism”. This “legitimacy” is often criticized as undermining civil liberties and eroding the core values of democratic society.

In the international political game, weaponized transmission is more often seen as a means of “Gray Zone” (Gray Zone). Confrontations between countries are no longer limited to economic sanctions or diplomatic pressure, but are waged through non-traditional means such as information manipulation and social media intervention. Some States use “the protection of national interests” as a pretext to disseminate false information, arguing that their actions are compliant and, although they may be controversial under international law, are often justified as necessary means “to counter external threats”. In some countries where the regulation of information lacks a strict legal framework, interference in elections is often tolerated or even seen as a “justified” political exercise. At the cultural level, certain countries attempt to shape their own cultural influence on a global scale by disseminating specific cultural symbols and ideologies. Western countries often promote the spread of their values in the name of “cultural sharing” and “communication of civilizations”, but in actual operations, they weaken the identity of other cultures by manipulating cultural symbols and narrative frameworks, leading to global cultural ecology. imbalance. The legal framework also provides support, to a certain extent, for the justification of weaponized dissemination. In the name of “counter-terrorism” and “against extremism”, some countries restrict the dissemination of so-called “harmful information” through information censorship, content filtering and other means. However, this justification often pushes moral boundaries, leading to information blockades and suppression of speech. Information governance on the grounds of “national security”, although internally recognized to a certain extent, provides space for the proliferation of weaponized communications.

Compared to legitimacy, the spread of weaponization is particularly devastating. At present, weaponized communication has become an important tool for power structures to manipulate public opinion. It not only distorts the content of information, but also profoundly affects public perception, social emotions, and international relations through privacy violations, emotional mobilization, and cultural penetration.

(1) Information distortion and cognitive manipulation

Distortion of information means that information is deliberately or unintentionally distorted during dissemination, resulting in significant differences between what the public receives and the original information. On social media, the spread of disinformation and misleading content is rampant, and generated content from artificial intelligence models (such as GPT) may be exacerbated by bias in training data. Gender, race, or social bias may be reflected in automatically generated text, amplifying the risk of information distortion. The fast-spreading nature of social media also makes it difficult for traditional fact-checking mechanisms to keep up with the spread of disinformation. Disinformation often dominates public opinion in a short period of time, and cross-platform dissemination and anonymity complicate clarification and correction. The asymmetries in communication undermine the authority of traditional news organizations, and the public’s preference for trusting instantly updated social platform information over in-depth coverage by traditional news organizations further diminishes the role of news organizations in resisting disinformation.

In addition to the distortion of the information itself, weaponized communication makes profound use of the psychological mechanisms of cognitive dissonance. Cognitive dissonance refers to the psychological discomfort that occurs when an individual is exposed to information that conflicts with their pre-existing beliefs or attitudes. By creating cognitive dissonance, communicators shake the established attitudes of their target audience and even induce them to accept new ideologies. In political elections, targeted dissemination of negative information often forces voters to re-examine their political positions or even change their voting tendencies. Weaponized communication further intensifies the formation of “information cocoon houses” through selective exposure, allowing audiences to tend to access information consistent with their own beliefs, ignoring or rejecting opposing views. This not only reinforces the cognitive biases of individuals, but also allows disinformation to spread rapidly within the group, making it difficult to be broken by external facts and rational voices, and ultimately forming a highly homogeneous ecology of public opinion.

(2) Privacy leakage and digital monitoring

In recent years, the abuse of deepfakes has exacerbated the problem of privacy violations. In 2019, the “ZAO” face-changing software was removed from the shelves due to default user consent to portrait rights, revealing the risk of overcollection of biometric data. Photos uploaded by users that have been processed through deep learning can either generate an accurate face-changing video or become a source of privacy leaks. What’s more, techniques such as deepfakes are abused for gender-based violence, the faces of multiple European and American actresses are illegally planted with fake sex videos and widely distributed, and although the platforms remove this content in some cases, the popularity of open-source programs makes it easy for malicious users to copy and share forged content. In addition, when users use social media, they tend to authorize the platform by default to access their devices’ photos, cameras, microphones and other app permissions. Through these rights, the platform not only collects a large amount of personal data, but also analyzes users’ behavioral characteristics, interest preferences, and social relationships through algorithms, allowing it to accurately deliver ads, recommend content, and even implement information manipulation. This large-scale data acquisition drives global discussion of privacy protections. In Europe, the General Data Protection Regulation attempts to strengthen the protection of individuals’ right to privacy through strict regulations on data collection and use. However, due to “implicit consent” or complex user agreements, platforms often bypass regulations that make the data-processing process less transparent, making it difficult for regular users to understand what the data is actually used for. Section 230 of the U.S. Communications Decency Act provides that online platforms are not legally responsible for user-generated content, a provision that has fueled the development of content moderation on platforms but has also left them with little incentive to respond to privacy infringements. Platforms, motivated by commercial interests, often lag behind in dealing with disinformation and privacy issues, leading to ongoing shelving of audit responsibilities.

In terms of digital surveillance, social platforms work with governments to make user data a core resource “of surveillance capitalism”. The National Security Agency (NSA) implements mass surveillance through phone records, Internet communications, and social media data, and works with large enterprises such as Google and Facebook to obtain users’ online behavioral data for intelligence gathering and behavioral analysis worldwide. The abuse of transnational surveillance technologies is what pushes privacy violations to an international level. Pegasus spyware developed by the Israeli cybersecurity company NSO, which compromises target devices through “zero-click attacks”, can steal private information and communication records in real time. In 2018, in the case of the murder of Saudi journalist Jamal Khashoggi, the Saudi government monitored its communications through Pegasus, revealing the profound threat this technology poses to individual privacy and international politics.

(3) Emotional polarization and social division

Emotions play a key role in influencing individual cognition and decision-making. Weaponized communication influences rational judgment by inciting feelings of fear, anger, sympathy, etc., and pushes the public to react irrationally, driven by emotions. War, violence and nationalism often become the main content of emotional mobilization. Through carefully designed topics, communicators implant elements such as patriotism and religious beliefs into information dissemination, quickly arousing public emotional resonance. The widespread adoption of digital technologies, particularly the combination of artificial intelligence and social media platforms, further amplifies the risk of emotional polarization. The rapid spread of disinformation and extreme speech on the platform comes not only from the sharing behavior of ordinary users, but is also driven by algorithms. Platforms tend to prioritize the push of emotional and highly interactive content, which often contains inflammatory language and extreme views, thus exacerbating the spread of hate speech and extreme views.

Social media hashtags and algorithmic recommendations play a key role in emotional polarization. After the Charlie Hebdo incident, the #StopIslam hashtag became a communication tool for hate speech, with the help of which users posted messages of hatred and violent tendencies. During the 2020 presidential election in the United States, extreme political rhetoric and misinformation on social platforms were also amplified in a bitter partisan struggle. Through precise emotional manipulation, weaponized communication not only tears apart public dialogue, but also greatly affects the democratic process of society. Another particular extremist mobilization tactic is “Weaponized Autism”, where far-right groups use the technical expertise of autistic individuals to implement emotional manipulation. These groups recruit technically competent but socially challenged individuals, transforming them into enforcers of information warfare by giving them a false sense of belonging. These individuals, guided by extremist groups, are used to spread hate speech, carry out cyberattacks and promote extremism. This phenomenon reveals not only the deep-seated mechanisms of emotional manipulation, but also how technology can be exploited by extremist groups to serve the larger political and social agenda.[ 21]

(4) Information colonization and cultural penetration

“Weaponized Interdependence” theory Weaponized Interdependence Theory reveals how states use key nodes in political, economic, and information networks to exert pressure on other states. [ 22] Especially in the field of information, developed countries further consolidate their cultural and political advantages by controlling the implementation of information flows “information colonization”. Digital platforms became the vehicles of this colonial process, the countries of the Global South were highly dependent on Western-dominated technology platforms and social networks for information dissemination, and in sub-Saharan Africa, Facebook has become synonymous with “the Internet”. This dependence not only generates huge advertising revenues for Western businesses, but also has a profound impact on indigenous African cultures and values through algorithmic recommendations, especially in terms of gender, family, and religious beliefs, making cultural penetration the norm.

Digital inequality is another manifestation of information colonization. The dominance of developed countries in digital technology and information resources has increasingly marginalized countries of the South in the economic, educational and cultural fields. Palestine’s inability to effectively integrate into the global digital economy due to inadequate infrastructure and technological blockade both limits local economic development and further weakens its voice in global information dissemination. Through technological blockades and economic sanctions, the world’s major economies and information powers restrict other countries’ access to key technological and innovation resources, which not only hinders the development of science and technology in target countries, but also exacerbates the rupture of the global technology and innovation ecosystem. Since withdrawing from the Iran Nuclear Deal in 2018, U.S. economic sanctions on Iran have blocked its development in the semiconductor and 5G sectors, and the asymmetry between technology and innovation has widened the gap in the global technology ecosystem, putting many countries at a disadvantage in information competition.

IV Reflection and discussion: the battle for the right to speak in the asymmetric communication landscape

In the competitive landscape of “Asymmetric Communication”, strong parties often dominate public opinion through channels such as mainstream media and international news organizations, while weak parties need to use innovative communication technologies and means to make up for their disadvantages and compete for the right to speak. At the heart of this communication landscape lies Information Geopolitics, the idea that the contest of power between states depends not only on geographical location, military power, or economic resources, but also on control over information, data, and technology. The game between the great powers is no longer limited to the control of physical space, but extends to the competition for public opinion space. These “information landscapes” involve the right to speak, information circulation and media influence in the global communication ecosystem. In this process, the country continuously creates landscapes to influence international public opinion and shape the global cognitive framework, thereby achieving its strategic goals. The strategy of asymmetric communication is not only related to the transmission of information content, but more importantly, how to bridge the gap between resources and capabilities with the help of various communication technologies, platforms and means. The core of information communication is no longer limited to the content itself, but revolves around the right to speak. The competition unfolds. With the rise of information warfare and cognitive warfare, whoever has the information will have a head start in global competition.

(1) Technology catching up under the advantage of latecomers

Traditional large countries or strong communicators control the dominance of global public opinion, and by contrast, weak countries often lack communication channels to compete with these large countries. The theory of latecomer advantage advocates that latecomer countries can rapidly rise and circumvent inefficient and outdated links in early technological innovation by leaping forward and bypassing traditional technological paths and introducing existing advanced technologies and knowledge. In the context of weaponized communication, this theory provides information-weak countries with a path to break through the barriers of communication in large countries through emerging technologies, helping them to catch up at the technical level. Traditional media are often constrained by resources, influence and censorship mechanisms, with slow dissemination of information, limited coverage and vulnerability to manipulation by specific countries or groups. The rise of digital media has brought about a fundamental change in the landscape of information dissemination, enabling disadvantaged countries, with the help of globalized Internet platforms, to directly target international audiences without having to rely on traditional news organizations and mainstream media. Through emerging technologies, disadvantaged countries can not only transmit information more precisely, but also rapidly expand their influence in international public opinion through targeted communication and emotional guidance. Later-developing countries can use advanced technologies (such as big data, artificial intelligence, 5G networks, etc.) to achieve precise information dissemination and create efficient communication channels. Taking “big data analysis” as an example, latecomer countries can gain an in-depth understanding of audience needs and public opinion trends, quickly identify the pulse of global public opinion, implement targeted communication, and quickly expand international influence. AI technology not only predicts the direction of public opinion development, but also optimizes communication strategies in real time. The popularization of 5G networks has greatly improved the speed and coverage of information dissemination, allowing latecomer countries to break through the limitations of traditional communication models in a low-cost and efficient manner and form unique communication advantages.

Through transnational cooperation, late-developing countries can integrate more communication resources and expand the breadth and depth of communication. For example, Argentina has established “Latin American News Network” with other Latin American countries to push Latin American countries to speak with a single voice in international public opinion and counter the single narrative of Western media through news content sharing. In Africa, South Africa has partnered with Huawei to promote the “Smart South Africa” project to build a modern information infrastructure and promote digital transformation and efficiency improvements in public services. Governments of late-developing countries should invest more in technological research and development and innovation, and encourage the development of local enterprises and talent. At the same time, attention should be paid to the export of culture and the construction of the media industry, so as to enhance the country’s voice in the international information space through globalized cooperation and decentralized communication models. Governments can fund digital cultural creations, support the growth of local social media platforms, and integrate more communication resources through an international cooperation framework.

(2) Construction of barriers in information countermeasures

Unlike a full-scale conflict that may be triggered by military action, or the risks that economic sanctions may pose, weaponized dissemination is able to achieve strategic objectives without triggering full-scale war, and it is extremely attractive based on cost and strategic considerations. Because weaponized communication is characterized by low cost and high returns, an increasing number of State and non-State actors have chosen to manipulate information in order to reach strategic objectives. The spread of this means of dissemination makes countries face even more complex and variable threats in the face of attacks involving information from outside and inside. With the increasing intensity of information warfare, mere traditional military defense can no longer meet the needs of modern warfare. Instead, building a robust information defense system becomes a key strategy for the country to maintain political stability, safeguard social identity, and enhance international competitiveness. Therefore, how to effectively deal with external interference in information and manipulation of public opinion, as well as counter-information, has become an urgent issue for all countries to address. A complete cybersecurity infrastructure is key to maintaining national security against the manipulation or tampering of sensitive information from outside. Take, for example, the European Union’s push to strengthen cybersecurity in member states through its “Digital Single Market” strategy, which requires internet companies to be more aggressive in dealing with disinformation and external interference. The EU’s cybersecurity directives also provide for member states to establish emergency response mechanisms to protect critical information infrastructure from cyberattacks. In addition, the EU has established cooperation with social platform companies, such as Facebook, Twitter and Google, to combat the spread of fake news by providing anti-disinformation tools and data analysis technologies. Artificial intelligence, big data, and automation technologies are becoming important tools for information defense, used to monitor information propagation paths in real time, identify potential disinformation, and resist public opinion manipulation. In the field of cybersecurity, big data analysis helps decision makers identify and warn against malicious attacks, and optimize countermeasures. The application of these technologies will not only enhance information defence capabilities at the domestic level, but also enhance national initiative and competitiveness in the international information space.

Counter-mechanisms are another important component of the information defence system, especially under pressure from international public opinion, where real-time monitoring of the spread of external information and timely correction of disinformation become key to safeguarding the initiative of public opinion. Since the 2014 Crimean crisis, Ukraine has built a rather large-scale cyber defense system through cooperation with NATO and the United States. Ukraine’s National Cyber Security Service has set up “information countermeasures teams” to counter cyberthreats, using social media and news release platforms to refute false Russian reports in real time, a tactic that has significantly boosted Ukraine’s reputation and trust in international public opinion.

(3) Agenda setting in public opinion guidance

In the global competitive landscape of informatization and digitalization, public opinion guidance involves not only the content of information dissemination, but more importantly, how to set the agenda and focus on hot topics of global concern. The agenda-setting theory suggests that whoever can take control of the topics of information circulation can guide the direction of public opinion. Agenda setting influences public attention and evaluation of events by controlling the scope and focus of discussion of topics, and the rise of social media provides a breakthrough for information-disadvantaged countries to compete for dominance in information dissemination through multi-platform linkage. In the case of Ukraine, for example, during the Russo-Ukrainian War, it disseminated the actual war situation through social media, not only publishing the actual combat situation, but also incorporating the emotional demands of the people, and using the tragic narrative of civilian encounters and urban destruction to inspire sympathy and attention from the international community. While resisting interference from external information, the State also needs to proactively disseminate positive narratives and tell cultural stories that can resonate with the international community. The story should correspond to the emotional needs of international public opinion, while at the same time showing the uniqueness of the country and strengthening the link with the international community. Taking my country’s “One Belt, One Road” co-construction as an example, in the “One Belt, One Road” co-construction country, my country has invested in and constructed a large number of infrastructure projects. These projects not only helped improve local economic basic conditions, but also demonstrated China’s globalization process. Responsibility provides a window for cultural cooperation and exchange activities, showing the rich history and culture of the Chinese nation to the world It has demonstrated the inclusiveness and responsibility of Chinese culture to the international community.

However, because countries of the Global South often face constraints in terms of resources, technology and international communication platforms, and have difficulty in competing directly with developed countries, they rely on more flexible and innovative means of communication to participate in the setting of the global agenda. For example, Brazil is under negative public opinion pressure from the Western media when it comes to dealing with issues of environmental protection and climate change, especially the deforestation of the Amazon forest. To this end, the Brazilian government actively creates the country’s image in the field of environmental protection by using social media to publish recent data and success stories about Amazon protection. At the same time, Brazil has strengthened its voice on climate issues by engaging with other developing countries in global climate change negotiations and promoting South-South cooperation. Large international events, humanitarian activities and the production of cultural products, among others, are also effective ways of telling national stories. International sports events such as the World Cup and the Olympic Games are not only a display platform for sports competitions, but also an exhibition venue for national image and cultural soft power. By hosting or actively participating in these global events, the country can show its strength, value and cultural charm to the world, promoting a positive public opinion agenda.

“War is nothing more than the continuation of politics through another means”[23]. This classic Clausewitz assertion is modernized in the context of weaponized communication. Weaponized communication breaks through the physical boundaries of traditional warfare and becomes a modern strategic means of integrating information warfare, cognitive warfare, and psychological warfare. It manipulates the flow of information and public perception in a non-violent form, so that State and non-State actors can achieve political goals without relying on direct military action, reflecting a highly strategic and targeted nature. By manipulating information, emotions and values, weaponized communication can achieve strategic goals while avoiding all-out war, and in global competition and conflict, it has become an important means of political suppression by powerful countries against weak ones.

The core of weaponized communication lies in weakening the enemy’s decision-making and operational capabilities through information manipulation, but its complexity makes the communication effect difficult to fully predict. Although information-powerful countries suppress information-weak countries through technological advantages and communication channels, the effectiveness of communication is uncertain. Especially in the context of the globalization of social media and digital platforms, the boundaries and effects of information flow are becoming increasingly difficult to control. This complexity offers the weak countries the opportunity to break through the hegemony of discourse and promote the reverse game of information dissemination. Weak countries can use these platforms to launch confrontations, challenge the information manipulation of powerful countries, and take their place in global public opinion. The asymmetric game reflects the dynamic balance of international public opinion, whereby communication is no longer one-way control, but more complex interaction and dialogue, giving the weak the possibility of influencing public opinion. The current international public opinion landscape is still dominated by the one-way suppression of information-weak countries by information-powerful countries, but this situation is not unbreakable. Information warfare has a high degree of asymmetry, and information-weak countries can counter it step by step with technological innovation, flexible strategies and transnational cooperation. By exerting “asymmetric advantages”, weak countries are not only able to influence global public opinion, but also to enhance their voice with the help of joint action and information-sharing. Transnational cooperation and the establishment of regional alliances provide the weak countries with a powerful tool to counter the powerful, enabling them to form a synergy in international public opinion and challenge the dominance of the information powers. Under the “war framework”, countries can flexibly adjust their strategies and proactively shape the information dissemination pattern, rather than passively accepting information manipulation by powerful countries.

Sociology of war emphasizes the role of social structure, cultural identity, and group behavior in warfare. Weaponized communication is not only a continuation of military or political behavior, but also profoundly affects the psychosocial, group emotions, and cultural identity. Powerful countries use information dissemination to shape other countries’ perceptions and attitudes in order to achieve their own strategic goals. However, from a sociological perspective, weaponized transmission is not a one-way suppression, but rather the product of complex social interactions and cultural responses. In this process, the information-weak countries are not completely vulnerable, but, on the contrary, they can counter external manipulation with “soft power” with the help of cultural communication, social mobilization and dynamic confrontation of global public opinion, shaping a new collective identity and demonstrating the legitimacy of “weak weapons”.

(Fund Project: Research results of the National Social Science Fund Major Project to Study and Interpret the Spirit of the Third Plenary Session of the 20th Central Committee of the Communist Party of China “Research on Promoting the Integrated Management of News Publicity and Online Public Opinion” (Project No.: 24ZDA084))

現代國語:

作者:

郭小安 康如诗来源:

  发布时间:

2025-05-06

【摘要】在國際輿論戰中,武器化傳播已滲透軍事、經濟、外交等領域,帶來“一切皆可武器化”的想像與實踐。武器化傳播通過技術、平台和政策操控公眾認知,體現了權力分配與文化博弈的複雜互動。在全球化和數字化的推動下,認知操控、社會分裂、情感極化、數字監控、信息殖民已成為影響國家穩定的新型手段,這不僅加劇了信息強國與弱國間的競爭,也為信息弱國提供了通過靈活策略和技術創新實現逆轉的機會。在全球非對稱傳播格局下,如何在技術創新與倫理責任、戰略目標與社會平衡間找到契合點和平衡點,將是影響未來國際輿論格局的關鍵要素。

【關鍵詞】輿論戰;武器化傳播;信息操縱;非對稱傳播;信息安全

如果說“宣傳是對現代世界的理性認可”[1],那麼武器化傳播則是對現代技術手段的理性應用。在輿論戰中,各參與主體通過不同傳播手段實現戰略目標,做到表面合理且隱蔽。與傳統軍事衝突不同,現代戰爭不僅涉及物理對抗,還涵蓋信息、經濟、心理及技術等多個領域的競爭。隨著技術進步和全球化的推動,戰爭形態發生深刻變化,傳統的物理對抗逐漸轉向多維度、多領域的綜合作戰。在這一過程中,武器化傳播作為一種現代戰爭形式,成為通過控制、引導和操縱輿論,影響敵對方或目標受眾的心理、情感與行為,進而實現政治、軍事或戰略目的的隱形暴力手段。 《戰爭論》認為,戰爭是讓敵人無力抵抗,且屈從於我們意志的一種暴力行為。 [2]在現代戰爭中,這一目標的實現不僅依賴於軍事力量的對抗,更需要信息、網絡與心理戰等非傳統領域的支持。第六代戰爭(Sixth Generation Warfare)預示戰爭形態的進一步轉變,強調人工智能、大數據、無人系統等新興技術的應用,以及信息、網絡、心理和認知領域的全面博弈。現代戰爭的“前線”已擴展到社交媒體、經濟制裁和網絡攻擊等層面,要求參與者俱備更強的信息控制與輿論引導能力。

當前,武器化傳播已滲透到軍事、經濟、外交等領域,帶來“一切皆可武器化”的憂慮。在戰爭社會學中,傳播被視為權力的延伸工具,信息戰爭深刻滲透並伴隨傳統戰爭。武器化傳播正是在信息控制的框架下,通過塑造公眾認知與情感,鞏固或削弱國家、政權或非國家行為者的權力。這一過程不僅發生在戰時,也在非戰斗狀態下影響著國家內外的權力關係。在國際政治傳播中,信息操控已成為大國博弈的關鍵工具,各國通過傳播虛假信息、發動網絡攻擊等手段,試圖影響全球輿論和國際決策。輿論戰不僅是信息傳播的手段,更涉及國家間權力博弈與外交關係的調整,直接影響國際社會的治理結構與權力格局。基於此,本文將深入探討武器化傳播的概念流變,分析其背後的社會心態,闡述具體的技術手段及所帶來的風險,並從國家層面提出多維應對策略。

一、從傳播武器化到武器化傳播:概念流變及隱喻

武器在人類歷史上一直是戰爭的象徵和工具,戰爭則是人類社會中最極端、暴力的衝突形式。因此,“被武器化”是指將某些工具用於戰爭中的對抗、操控或破壞,強調這些工具的使用方式。 “武器化”(weaponize)譯為“使得使用某些東西攻擊個人或團體成為可能”。 1957年,“武器化”一詞作為軍事術語被提出,V-2彈道導彈團隊的領導者沃納·馮·布勞恩表示,他的主要工作是“將軍方的彈道導彈技術‘武器化’”[3]。

“武器化”最早出現在太空領域,時值美蘇軍備競賽時期,兩個大國力圖爭奪外太空主導權。 “太空武器化”是指將太空用於發展、部署或使用軍事武器系統的過程,包括衛星、反衛星武器和導彈防禦系統等,目的是進行戰略、戰術或防禦性行動。 1959年至1962年,美蘇提出了一系列倡議,禁止將外太空用於軍事目的,尤其是禁止在外層空間軌道部署大規模毀滅性武器。 2018年,當時的美國總統特朗普簽署了《空間政策指令-3》,啟動“太空軍”建設,將太空視為與陸地、空中、海洋同等的重要作戰領域。 2019年,《中華人民共和國和俄羅斯聯邦關於加強當代全球戰略穩定的聯合聲明》中倡議“禁止在外空放置任何類型武器”[4]。

除太空領域的武器化外,軍事、經濟、外交等領域也顯現武器化趨勢。 “軍事武器化”是將資源(如無人機、核武器等)用於軍事目的、部署武器系統或發展軍事能力。 2022年俄烏戰爭期間,英國皇家聯合軍種研究所的報告顯示,烏克蘭每月因俄羅斯干擾站的影響,損失約10000架無人機。 [5]“武器化”也常出現在“金融戰爭”“外交戰場”等表述中。在經濟領域,武器化通常指國家或組織對全球金融系統中的共享資源或機制的利用;外交武器化則表現為國家通過經濟制裁、外交孤立、輿論操控等手段,追求自身利益並對他國施加壓力。隨著時間的推移,“武器化”概念逐漸擴展到政治、社會、文化等領域,尤其在信息領域,自2016年美國總統大選以來,輿論操縱已成為政治鬥爭的普遍工具。美國前中央情報局局長戴維·彼得雷烏斯曾在國家戰略研究所會議上表示,“萬物武器化”(the weaponization of everything)的時代已經來臨。 [6]

作為一種隱喻,“武器化”不僅指實際物理工具的使用,還像徵著對抗性和攻擊性行為的轉化,強調“武器”這一概念如何滲透至日常生活、文化生產和政治策略中,展現社會行動者如何利用各種工具達成戰略目的。時下,許多本應保持中立的領域,如媒體、法律和政府機構,常被描述為“武器化”,用以批判它們的過度政治化和被不正當利用,突出其非法性及對社會的負面影響。通過這一隱喻,人們無意識地將當前的政治環境與理想化的、看似更溫和的過去進行對比,使人們認為過去的政治氛圍更加理性和文明,而現今則顯得過於極端和對立。 [7]因此,“武器化”的實質是政治中介化的過程,是政治力量通過各種手段和渠道,影響或控製本應保持中立的領域,使其成為政治目的和政治鬥爭的工具。

在信息領域,傳播武器化是長期存在的一種戰略手段。第一、二次世界大戰期間,各國就廣泛使用了宣傳和輿論戰,傳播手段被作為一種心理戰術使用。武器化傳播是傳播武器化在現代信息社會中的體現,其利用算法和大數據分析精準地控制信息的傳播速度和範圍,進而操控輿論和情感,反映了技術、平台和策略的結合,使得政治力量可以更加精準和高效地操控公眾認知與輿論環境。信息作為輿論的本體,被“武器化”並用於影響社會認知和群體行為,“戰爭”的概念也隨之變化,不再只是傳統的軍事對抗,還包括通過信息傳播和輿論操控實現的心理戰和認知戰。這種轉變促生了一系列新術語,例如無限制戰爭(unrestricted warfare)、新一代戰爭(new generation warfare)、非對稱戰爭(asymmetric warfare)和非常規戰爭(irregular warfare)等。這些術語幾乎都藉用“戰爭”(warfare)強調信息領域中的多樣化衝突,信息成為被“武器化”的核心內容。

儘管有部分觀點認為“戰爭”一詞不適用於未正式宣布敵對行動的情況[8],但武器化傳播通過弱化戰爭的傳統政治屬性,將各領域的公開或隱蔽的力量和形式籠統地視作傳播行為,從而擴展了“戰爭”這一概念的外延。值得注意的是,在英文術語中“武器化”有兩種表述方式:一種是“weaponized noun(名詞)”,即表示某物已經“被武器化”,具備武器功能或用途;另一種是“weaponization of noun”,指將某物轉化為武器或具有武器性質的過程。在學術領域,儘管weaponized communication和weaponization of communication尚未嚴格區分,但中文翻譯有所區別。 “武器化傳播”更側重於傳播手段或信息本身“被武器化”,以實現某種戰略目標;“傳播武器化”則強調傳播過程本身作為武器的轉化過程。在討論具體技術手段時,多數學術論文采用weaponed或weaponizing作為前綴,以修飾具體的傳播手段。

本文重點討論的是國際輿論戰中的具體傳播策略,著重描述已經發生的武器化現象,故統一使用“武器化傳播”,其是一種利用傳播手段、技術工具和信息平台,通過精確操控信息流動、公眾認知與情感反應,達到特定軍事、政治或社會目的的策略性傳播方式。武器化傳播也並非單純的戰爭或戰時狀態,而是一種持續的傳播現象,它反映了各主體間的互動與博弈,是信息共享和意義空間的流動。

二、武器化傳播的應用場景及實施策略

如果說20世紀90年代末,信息領域的武器化仍是一個“死話題”,各國主要追逐導彈、無人機等實體武器的升級競賽,那麼步入21世紀,網絡戰爭則真正衝進了公眾視野,並深刻嵌入人們的日常生活,經由社交媒體和智能設備,公眾不可避免地捲入輿論戰爭,不自覺地成為參與者或傳播節點。隨著技術的普及,武器化手段逐漸從國家主導的戰爭工具擴展到社會化和政治化領域,對個人和社會的控制從顯性的國家機器轉向更隱蔽的觀念操控。棱鏡計劃(PRISM)的曝光引發了全球對隱私洩露的強烈擔憂,凸顯了國家利用先進技術進行監視和控制的潛力,這被視為一種新型的武器化。自2016年特朗普當選美國總統以來,社交機器人等信息武器的大規模應用,成為全球政治博弈中的常見現象。信息作戰——包括電子戰、計算機網絡作戰、心理戰和軍事欺騙——被廣泛用於操控信息流動,影響輿論格局。這些手段不僅在軍事戰爭和政治選舉中發揮作用,還逐漸滲透到文化衝突、社會運動及跨國博弈之中,傳統的信息作戰邏輯得以延續。如今,武器化傳播作為一種社會政治工具,深刻影響著輿論生態、國際關係以及個人的日常生活。

(一)軍事領域的信息操縱戰

信息流能夠直接影響軍事衝突的走向,塑造公眾和軍隊的認知與決策,進而影響士氣、戰略判斷和社會穩定。在現代戰爭中,信息不再是單純的輔助工具,信息領域已成為核心戰場。通過操控信息流向,敵方的形勢評估可能被誤導,戰鬥意志被削弱,民眾的信任與支持被動搖,進而影響戰爭的決策過程與持續性。

海灣戰爭(Gulf War)被視為現代信息戰的開端。在這場戰爭中,美國通過高科技手段——包括電子戰、空中打擊和信息操作——實施了對伊拉克的系統性打擊。美軍利用衛星和AWACS預警機實時監控戰場態勢,通過空投傳單和廣播電台向伊拉克士兵傳遞美軍優勢及投降後的優待政策,從心理層面誘使伊軍投降。這場戰爭標誌著信息控制在軍事衝突中的關鍵地位,展示了信息戰在現代戰爭中的潛力。進入21世紀,網絡戰成為信息戰的重要組成部分。網絡戰不僅涉及信息的傳播和操控,還包括通過攻擊關鍵基礎設施實現對敵方社會功能的控制。 2007年愛沙尼亞遭遇大規模DDoS(Distributed Denial of Service Attack)攻擊,展示了信息操縱與網絡攻擊融合的趨勢。 2017年在WannaCry勒索軟件事件中,攻擊者利用Windows系統漏洞(EternalBlue)加密全球150個國家約20萬台計算機文件,要求支付贖金,嚴重影響英國國家健康服務體系(NHS),導致急診服務中斷和醫院系統癱瘓,進一步揭示了網絡戰對關鍵基礎設施的威脅。此外,在長期衝突中,基礎設施控制因能夠直接決定信息傳播的速度、範圍和方向,被廣泛用於削弱對手的戰略能力,爭奪公共信息空間。以色列通過限制無線電頻譜使用、控制互聯網帶寬和破壞通信設施,有效削弱了巴勒斯坦的通信能力。同時,以色列還通過經濟制裁和法律框架限制巴勒斯坦電信市場的發展,壓制巴勒斯坦在信息流動中的競爭力,鞏固自身在衝突中的戰略優勢[9],以維持信息的不平等流動。

社交媒體為信息操縱提供了即時、廣泛的信息傳播渠道,使其能夠跨越國界,影響全球公眾情緒和政治局勢,也使戰爭焦點從單純的物理破壞轉向輿論操控。俄烏戰爭期間,深度偽造技術作為視覺武器,對公眾認知和戰爭輿論產生了顯著干擾。 2022年3月15日,烏克蘭總統澤連斯基的偽造視頻在Twitter上傳播,視頻中他“呼籲”烏克蘭士兵放下武器,引發了短時間內的輿論混亂。同樣,俄羅斯總統普京的偽造視頻也被用以混淆視聽。儘管這些視頻被平台迅速標註“Stay informed”(等待了解情況)的說明,但其在短時間內仍然對公眾情緒和認知造成明顯干擾。這些事件凸顯了社交媒體在現代信息戰中的關鍵作用,國家和非國家行為體可以通過虛假信息、情感操控等手段對軍事衝突施加干擾。

信息操縱戰的複雜性還體現在其雙重特性上——既是攻擊工具,也是防禦的手段。在軍事領域,各國通過防禦和反擊網絡攻擊來確保國家安全、保護關鍵基礎設施、維護軍事機密,並在某些情況下影響對手的戰鬥力與決策。 2015年和2017年,俄羅斯黑客發起了針對烏克蘭的大規模網絡攻擊(如BlackEnergy和NotPetya),烏克蘭通過迅速升級網絡防禦系統,成功抵禦部分攻擊並採取反制措施,避免了更大規模的基礎設施癱瘓。此外,北約戰略傳播卓越中心和英國第77旅等單位專注研究和平時期的輿論塑造[10],利用戰略傳播、心理戰和社交媒體監控等手段,擴大信息領域的戰略控制,並強化了防禦與輿論塑造能力,進一步提高了信息戰的戰略高度。

如今,信息操縱戰已經成為現代軍事衝突中的關鍵環節。通過信息技術與心理操控的高度結合,它不僅改變了傳統戰爭的規則,也深刻影響著公眾認知和全球安全格局。國家、跨國公司或其他行為體通過掌控關鍵基礎設施和社交媒體平台,限制信息流動、操控傳播路徑,從而在全球信息生態中獲得戰略優勢。

(二)政治選舉的輿論干預戰

政治選舉是民主政治中最直接的權力競爭場域,信息傳播在此過程中對選民決策具有重要影響。通過計算宣傳等手段,外部勢力或政治團體能夠操縱選民情緒、誤導公眾認知,從而左右選舉結果、破壞政治穩定或削弱民主進程,選舉因此成為武器化傳播最具效果的應用場景。

近年來,全球政治選舉呈現極化趨勢,持不同政治立場的群體之間存在巨大的意識形態差異。極化導致公眾選擇性接受與自身觀點一致的信息,同時排斥其他信息,這種“回音室效應”加劇了公眾對立場的片面認知,為輿論干預提供了更大的空間。而信息傳播技術,尤其是計算宣傳的興起,使外部勢力能夠更加精準地操控輿論和影響選民決策。計算宣傳(Computational Propaganda)指利用計算技術、算法和自動化系統操控信息流動,以傳播政治信息、干預選舉結果和影響輿論,其核心特徵在於算法驅動的精準性和自動化傳播的規模化,通過突破傳統人工傳播的限制,顯著增強了輿論操控的效果。 2016年美國總統選舉中,特朗普團隊通過劍橋分析公司分析Facebook用戶數據,為選民定向推送定制化的政治廣告,精準影響了選民的投票意向[11]。這一事件被視為計算宣傳干預選舉的典型案例,也為其他政客提供了操作模板,推動了計算宣傳在全球範圍內的廣泛應用。 2017年法國總統選舉中,候選人埃馬紐埃爾·馬克龍(Emmanuel Macron)團隊遭遇黑客攻擊,內部郵件被竊取並公開,內容稱馬克龍在海外擁有秘密賬戶並涉及逃稅,企圖抹黑其形象。 2018年巴西總統選舉期間,候選人雅伊爾·博索納羅(Jair Bolsonaro)團隊利用WhatsApp群組傳播煽動性政治內容,定向推送大量圖像、視頻和煽動性消息以影響選民情緒。據統計,自2017年至2019年,全球採用計算宣傳的國家由28個增加至70個,2020年這一數量上升至81個。這表明,計算宣傳正通過技術手段和傳播策略,重新定義全球選舉中的輿論規則。

計算宣傳也是國家行為者在輿論干預戰中的重要工具。 2011年,美國國防高級研究計劃局(DARPA)在中東地區開展“歐內斯特之聲”行動,通過建立和管理多個虛假身份(sockpuppets),扭曲阿拉伯語社交媒體的對話。俄羅斯也頻繁利用計算宣傳實施干預,在加拿大操作約20萬個社交媒體賬戶,借助極右翼和極左翼運動散佈親俄言論,製造虛假的社會熱點,試圖破壞加拿大對烏克蘭的支持[12]。作為計算宣傳的重要組成部分,社交機器人通過自動化和規模化手段製造輿論熱度,藉由特定標籤在社交平台上增加信息的曝光率,操控議題的優先級。 2016年美國大選期間,俄羅斯利用社交機器人發布支持普京和攻擊反對派的內容,通過信息過載(information overload)掩蓋反對派聲音,強化親普京的輿論氛圍。 [13]2017年海灣危機期間,沙特阿拉伯和埃及通過Twitter機器人製造反卡塔爾標籤#AlJazeeraInsultsKingSalman的熱度,使其成為熱門話題,虛構了反卡塔爾情緒的高峰,進而影響了全球範圍內對卡塔爾的輿論態度。 [14]深度偽造技術則進一步提升了計算宣傳的精準性與隱蔽性。 2024年,美國總統喬·拜登的偽造視頻在X(原Twitter)上迅速傳播,視頻顯示其在橢圓形辦公室使用攻擊性語言,引發輿論爭議並影響選民情緒。據網絡安全公司McAfee調查,63%的受訪者在兩個月內觀看過政治深度偽造視頻,近半數表示這些內容影響了他們的投票決定。 [15]

在全球範圍內,計算宣傳已滲透各國輿論戰中,影響著社會穩定與國家安全。以色列國防軍通過數字武器對巴勒斯坦展開輿論戰,土耳其培養了“愛國巨魔軍隊”操控國內外輿論,墨西哥政府利用殭屍網絡影響輿論。作為現代輿論干預戰的重要手段,計算宣傳正在改變全球政治傳播的格局。隨著人工智能、量子計算等技術的發展,計算宣傳還可能通過更隱蔽和高效的方式乾預選舉流程,甚至直接威脅民主制度的核心運行邏輯。

(三)文化領域的符號認同戰

武器化傳播通過操控信息、符號和價值觀,試圖影響公眾的思想、情感和行為,進而塑造或改變社會的集體認知與文化認同。這種傳播方式不僅在於信息的傳遞,更通過特定的敘事框架、文化符號和情感共鳴,推動某種特定的意識形態或政治理念的傳播與認同。通過操縱文化符號、社會情感和集體記憶,武器化傳播在文化領域干擾社會結構與文化認同,成為符號認同戰的核心手段。

模因(Meme)作為一種集視覺元素和簡潔文字於一體的文化符號,以幽默、諷刺或挑釁的方式激發觀眾的情感反應,影響他們的政治態度和行為。佩佩模因(Pepe the Frog)起初是一個無害的漫畫角色,被極右翼群體重新利用並武器化,用以傳播仇恨言論,逐漸演變為種族主義和反移民的象徵。模因將復雜的政治情緒轉化為便於傳播的視覺符號,迅速激起公眾對政策的不信任和憤怒,被視為“武器化的偶像破壞主義”(Iconoclastic Weaponization)。這一過程通過操控文化符號,以達到政治或社會鬥爭的目的[16],加劇了公眾對社會和政治的分裂。例如,在英國脫歐期間,帶有“Take Back Control”(奪回控制權)字樣的模因迅速傳播,強化了民族主義情緒。

除了文化符號的製造外,符號的篩选和屏蔽同樣能夠塑造或加深某種文化認同或政治立場。審查制度自古以來就是權力控制信息的重要手段,早在古希臘和古羅馬時期,政府就對公共演講和文學作品進行審查,以維持社會秩序和權力穩定。進入數字時代,互聯網和社交媒體的興起推動了審查制度的現代化,平台審查逐漸取代傳統的審查方式,成為當代信息控制和輿論引導的核心工具。算法審查通過人工智能檢測敏感話題、關鍵詞和用戶行為數據,自動刪除或屏蔽被視為“違規”的內容,社交媒體的審核團隊會對用戶生成的內容進行人工篩選,確保其符合平台政策和法律法規。平台審查的作用不僅是限制某些內容的傳播,更是通過推送、刪除和屏蔽等方式引導輿論,塑造公眾認知框架。儘管主流社交平台通過嚴格的內容審核機制控制信息傳播,但一些邊緣平台,如Gab、Gettr、Bitchute等因缺乏有效審查,成為極端言論和惡意信息的溫床。這些平台未對內容髮布做出足夠限制,極端觀點和虛假信息得以肆意擴散,例如,Gab因極端主義內容屢遭批評,被指助長暴力和仇恨。在迴聲室中,用戶只能接觸與自身觀點一致的信息,這種信息環境更強化了極端思想,導致社會群體間的對立加劇。 [17]

語言作為信息傳播的載體和工具,能夠通過情感操控、符號政治和社會動員等方式,深刻影響群體行為和文化認同。語言武器化聚焦於語言形式和文化語境如何影響信息的接收方式,強調語言如何被用來操控、引導或改變人們的認知與行為。這不僅涉及特定詞彙和修辭手法的使用,更包括通過語言表述建構特定的社會意義和文化框架。作為符號認同戰的另一重要工具,語言塑造了“敵我對立”的敘事框架。大翻譯運動(Great Translation Movement)通過選擇性翻譯中國網民的民族主義言論,將其傳播到國際社交媒體平台,引發了對中國的負面認知。這種語言操控通過情緒化表達放大了爭議性內容,加深了國際社會的文化偏見。

語言武器化的深層邏輯在於情緒化和煽動性的語言形式。西方國家常以“人權”與“民主”等正義化標籤為乾預行為辯護,合法化政治或軍事行動。白人至上主義者使用“另類右翼”等模糊標籤重塑意識形態,將傳統的帶有強烈負面含義的“白人至上主義”轉化為一個較為中立的概念,降低了該詞彙的社會抵抗力,用寬泛的“傘式”身份擴大其支持者的基礎。通過對世俗話語的滲透,仇恨政治和極端言論被正當化,逐漸形成一種政治常態。當公眾將這種政治日常化後,語言實現了真正的武器化。 [18]在尼日利亞,煽動仇恨的內容通過種族、宗教和地區話題擴散,深刻惡化了社會關係。 [19]語言的模糊性和合理否認策略也成為傳播者規避責任的有力工具,在被簡化的敘事中傳播複雜的社會和政治議題。特朗普的美國優先(America First)政策通過否定性標籤和情緒化話語,以反對全球化、質疑氣候變化科學、抨擊傳統盟友等方式,故意提出與主流意見相對立的觀點,激發公眾對全球化的不信任,重塑國家利益優先的文化認同。 [20]

三、武器化傳播的風險與挑戰:正當性與破壞性

儘管武器化傳播給國際輿論格局帶來了巨大風險,但特定情形下,其可能會被某些國家或團體通過法律、政治或道德框架賦予一定的正當性。如“9·11”事件後,美國通過《愛國法案》擴大了情報部門的監控權限,以“反恐”為名實施廣泛的信息控制,這種“正當性”常被批評為破壞公民自由,侵蝕了民主社會的核心價值。

在國際政治博弈中,武器化傳播更常被視為“灰色區域”(Gray Zone)的手段。國家間的對抗不再局限於經濟制裁或外交壓力,而是通過信息操控、社交媒體干預等非傳統方式展開。部分國家以“保護國家利益”為藉口傳播虛假信息,辯稱其行為是合規的,儘管這些行為可能在國際法上存在爭議,但往往被合理化為“反制外部威脅”的必要手段。在一些信息監管缺乏嚴格法律框架的國家,選舉的干預行為往往被容忍,甚至被視為一種“正當”的政治活動。在文化層面,某些國家通過傳播特定的文化符號和意識形態,試圖在全球範圍內塑造自身的文化影響力。西方國家常以“文化共享”和“文明傳播”為名,推動其價值觀的傳播,而在實際操作中,卻通過操控文化符號和敘事框架,削弱其他文化的認同感,導致全球文化生態的不平衡。法律框架也在一定程度上為武器化傳播的正當性提供了支持。一些國家以“反恐”和“反對極端主義”為名,通過信息審查、內容過濾等手段限制所謂“有害信息”的傳播。然而,這種正當性往往突破了道德邊界,導致信息封鎖和言論壓制。以“國家安全”為理由的信息治理,雖然在一定程度上獲得了內部認可,卻為武器化傳播的氾濫提供了空間。

相較於正當性,武器化傳播的破壞性尤為顯著。目前,武器化傳播已成為權力結構操控輿論的重要工具,其不僅扭曲了信息內容,還通過隱私侵犯、情感動員和文化滲透等方式,深刻影響了公眾認知、社會情緒以及國際關係。

(一)信息失真與認知操控

信息失真指信息在傳播過程中被故意或無意扭曲,導致公眾接收到的內容與原始信息存在顯著差異。在社交媒體上,虛假信息和誤導性內容的傳播日益猖獗,人工智能模型(如GPT)的生成內容,可能因訓練數據的偏見而加劇這一問題。性別、種族或社會偏見可能被反映在自動生成的文本中,放大信息失真的風險。社交媒體的快速傳播特性也使傳統的事實核查機制難以跟上虛假信息的擴散速度。虛假信息在短時間內往往佔據輿論主導地位,跨平台傳播和匿名性使得澄清與糾正變得更加複雜。傳播的不對稱性削弱了傳統新聞機構的權威性,公眾更傾向於相信即時更新的社交平台信息,而非傳統新聞機構的深入報導,這進一步削弱了新聞機構在抵制虛假信息中的作用。

除了信息本身的失真,武器化傳播還深刻利用了認知失調的心理機制。認知失調指個體接觸到與其已有信念或態度相衝突的信息時產生的心理不適感。傳播者通過製造認知失調,動搖目標受眾的既有態度,甚至誘導其接受新的意識形態。在政治選舉中,定向傳播負面信息常迫使選民重新審視政治立場,甚至改變投票傾向。武器化傳播通過選擇性暴露進一步加劇了“信息繭房”的形成,讓受眾傾向於接觸與自身信念一致的信息,忽視或排斥相反觀點。這不僅強化了個體的認知偏見,也讓虛假信息在群體內部快速擴散,難以被外界的事實和理性聲音打破,最終形成高度同質化的輿論生態。

(二)隱私洩露與數字監控

近年來,深度偽造技術的濫用加劇了隱私侵權問題。 2019年,“ZAO”換臉軟件因默認用戶同意肖像權而被下架,揭示了生物特徵數據的過度採集風險。用戶上傳的照片經深度學習處理後,既可能生成精確的換臉視頻,也可能成為隱私洩露的源頭。更嚴重的是,深度偽造等技術被濫用於性別暴力,多名歐美女演員的面孔被非法植入虛假性視頻並廣泛傳播,儘管平台在部分情況下會刪除這些內容,但開源程序的普及讓惡意用戶能夠輕鬆複製和分享偽造內容。此外,用戶在使用社交媒體時,往往默認授權平台訪問其設備的照片、相機、麥克風等應用權限。通過這些權限,平台不僅收集了大量個人數據,還能夠通過算法分析用戶的行為特徵、興趣偏好和社交關係,進而精準投放廣告、內容推薦甚至實施信息操控。這種大規模數據採集推動了對隱私保護的全球討論。在歐洲,《通用數據保護條例》(General Data Protection Regulation)試圖通過嚴格的數據收集和使用規定,加強個人隱私權保障。然而,由於“隱性同意”或複雜的用戶協議,平台常常繞過相關規定,使數據處理過程缺乏透明度,導致普通用戶難以了解數據的實際用途。美國《通信規範法》第230條規定,網絡平台無需為用戶生成的內容承擔法律責任,這一規定推動了平台內容審核的發展,但也使其在應對隱私侵權時缺乏動力。平台出於商業利益的考慮,往往滯後處理虛假信息和隱私問題,導致審核責任被持續擱置。

在數字監控方面,社交平台與政府的合作使用戶數據成為“監控資本主義”的核心資源。美國國家安全局(NSA)通過電話記錄、互聯網通信和社交媒體數據,實施大規模監控,並與Google、Facebook等大型企業合作,獲取用戶的在線行為數據,用於全球範圍內的情報收集和行為分析。跨國監控技術的濫用更是將隱私侵犯推向國際層面。以色列網絡安全公司NSO開發的Pegasus間諜軟件,通過“零點擊攻擊”入侵目標設備,可實時竊取私人信息和通信記錄。 2018年,沙特記者賈馬爾·卡舒吉(Jamal Khashoggi)被謀殺一案中,沙特政府通過Pegasus監聽其通信,揭示了這種技術對個體隱私和國際政治的深遠威脅。

(三)情感極化與社會分裂

情感在影響個體認知與決策中起著關鍵作用。武器化傳播通過煽動恐懼、憤怒、同情等情緒,影響理性判斷,推動公眾在情緒驅動下做出非理性反應。戰爭、暴力和民族主義常成為情感動員的主要內容,傳播者通過精心設計的議題,將愛國主義、宗教信仰等元素植入信息傳播,迅速引發公眾情感共鳴。數字技術的廣泛應用,特別是人工智能和社交媒體平台的結合,進一步放大了情感極化的風險。虛假信息與極端言論在平台上的快速傳播,不僅來自普通用戶的分享行為,更受到算法的驅動。平台傾向優先推送情緒化和互動性高的內容,這些內容常包含煽動性語言和極端觀點,從而加劇了仇恨言論和偏激觀點的傳播。

社交媒體標籤和算法推薦在情感極化中扮演著關鍵角色。在查理周刊事件後,#StopIslam標籤成為仇恨言論的傳播工具,用戶借助該標籤發布仇視和暴力傾向的信息。在美國2020年總統選舉期間,社交平台上的極端政治言論和錯誤信息也在激烈的黨派鬥爭中被放大。通過精確的情感操控,武器化傳播不僅撕裂了公共對話,還極大影響了社會的民主進程。另一種特殊的極端主義動員策略是“武器化自閉症”(Weaponized Autism),即極右翼團體利用自閉症個體的技術專長,實施情感操控。這些團體招募技術能力較強但有社交障礙的個體,通過賦予虛假的歸屬感,將其轉化為信息戰的執行者。這些個體在極端組織的指引下,被用於傳播仇恨言論、執行網絡攻擊和推動極端主義。這種現像不僅揭示了情感操控的深層機制,也表明技術如何被極端團體利用來服務於更大的政治和社會議程。 [21]

(四)信息殖民與文化滲透

“武器化相互依賴”理論(Weaponized Interdependence Theory)揭示了國家如何利用政治、經濟和信息網絡中的關鍵節點,對其他國家施加壓力。 [22]特別是在信息領域,發達國家通過控制信息流實施“信息殖民”,進一步鞏固其文化和政治優勢。數字平台成為這一殖民過程的載體,全球南方國家在信息傳播中高度依賴西方主導的技術平台和社交網絡,在撒哈拉以南非洲地區,Facebook已成為“互聯網”的代名詞。這種依賴不僅為西方企業帶來了巨大的廣告收入,還通過算法推薦對非洲本土文化和價值觀,尤其是在性別、家庭和宗教信仰等方面,產生了深遠影響,使文化滲透成為常態。

數字不平等是信息殖民的另一表現。發達國家在數字技術和信息資源上的主導地位,使南方國家在經濟、教育和文化領域日益邊緣化。巴勒斯坦因基礎設施不足和技術封鎖,難以有效融入全球數字經濟,既限制了本地經濟發展,又進一步削弱了其在全球信息傳播中的話語權。全球主要經濟體和信息強國通過技術封鎖和經濟制裁,限制他國獲取關鍵技術與創新資源,這不僅阻礙了目標國的科技發展,也加劇了全球技術與創新生態的斷裂。自2018年退出《伊朗核協議》以來,美國對伊朗的經濟制裁導致其在半導體和5G領域發展受阻,技術與創新的不對稱拉大了全球技術生態的差距,使許多國家在信息競爭中處於劣勢。

四、反思與討論:非對稱傳播格局中的話語權爭奪

在國際非對稱傳播(Asymmetric Communication)競爭格局下,強勢方常常通過主流媒體和國際新聞機構等渠道佔據輿論的主導地位,而弱勢方則需要藉助創新傳播技術和手段來彌補劣勢,爭奪話語權。這一傳播格局的核心在於信息地緣政治(Information Geopolitics),即國家之間的權力較量不僅僅取決於地理位置、軍事力量或經濟資源,更取決於對信息、數據和技術的控制。大國間的博弈已不再僅限於物理空間的控制,而擴展至輿論空間的爭奪。這些“信息景觀”涉及全球傳播生態中的話語權、信息流通和媒體影響力等,在這一過程中,國家通過不斷製造景觀,以影響國際輿論、塑造全球認知框架,進而實現其戰略目標。非對稱傳播的策略不僅關乎信息內容的傳遞,更重要的是如何借助各種傳播技術、平台和手段彌補資源與能力上的差距,信息傳播的核心不再局限於內容本身,而圍繞著話語權的爭奪展開。隨著信息戰和認知戰的興起,誰掌握了信息,誰就能在全球競爭中占得先機。

(一)後發優勢下的技術赶超

傳統的大國或強勢傳播者掌控著全球輿論的主導權,相比之下,弱勢國家往往缺乏與這些大國抗衡的傳播渠道。後發優勢理論主張後發國家能夠通過跳躍式發展,繞過傳統的技術路徑,引進現有的先進技術和知識,從而迅速崛起並規避早期技術創新中的低效和過時環節。在武器化傳播的背景下,這一理論為信息弱國提供了通過新興科技突破大國傳播壁壘的路徑,有助於其在技術層面上實現赶超。傳統媒體往往受到資源、影響力和審查機制的限制,信息傳播速度慢、覆蓋面有限,且容易受到特定國家或集團的操控。數字媒體的崛起使信息傳播的格局發生了根本性變化,弱勢國家能夠借助全球化的互聯網平台,直接面向國際受眾,而不必依賴傳統的新聞機構和主流媒體。通過新興技術,弱勢國家不僅能更精準地傳遞信息,還能通過定向傳播和情感引導,迅速擴大其在國際輿論中的影響力。後發國家可以利用先進技術(如大數據、人工智能、5G網絡等)實現精準的信息傳播,打造高效的傳播渠道。以大數據分析為例,後發國家可以深入了解受眾需求和輿情趨勢,快速識別全球輿論脈搏,實施定向傳播,快速擴大國際影響力。人工智能技術不僅能夠預測輿論發展方向,還能實時優化傳播策略。 5G網絡的普及大大提升了信息傳播的速度與覆蓋範圍,使後發國家能夠以低成本、高效率的方式突破傳統傳播模式的局限,形成獨特的傳播優勢。

通過跨國合作,後發國家可以整合更多的傳播資源,擴大傳播的廣度與深度。例如,阿根廷與拉美其他國家共同建立了“拉美新聞網絡”,通過新聞內容共享,推動拉美國家在國際輿論中發出統一的聲音,反擊西方媒體的單一敘事。在非洲,南非與華為合作推動“智慧南非”項目,建設現代化信息基礎設施,促進數字化轉型和公共服務效率的提升。後發國家政府應加大對技術研發和創新的投入,鼓勵本土企業和人才的發展。同時,還應注重文化輸出和媒體產業建設,通過全球化合作和去中心化傳播模式提升國家在國際信息空間中的話語權。政府可以資助數字文化創作,支持本地社交媒體平台的成長,並通過國際合作框架整合更多傳播資源。

(二)信息反制中的壁壘構建

與軍事行動可能引發的全面衝突,或經濟制裁可能帶來的風險不同,武器化傳播能夠在不觸發全面戰爭的情況下實現戰略目標,基於成本和戰略考量,其具有極大的吸引力。由於武器化傳播具備低成本、高回報的特點,越來越多的國家和非國家行為體選擇通過操控信息來達到戰略目標。這種傳播手段的普及,使得國家在面對來自外部和內部的信息攻擊時,面臨更加複雜和多變的威脅。隨著信息戰爭的日益激烈,單純的傳統軍事防禦已經無法滿足現代戰爭的需求。相反,構建強有力的信息防禦體系,成為國家保持政治穩定、維護社會認同和提升國際競爭力的關鍵策略。因此,如何有效應對外部信息干擾和輿論操控,並進行信息反制,已成為各國迫切需要解決的問題。完善的網絡安全基礎設施是維護國家安全的關鍵,用以防范敏感信息不被外部操控或篡改。以歐盟為例,歐盟通過“數字單一市場”戰略推動成員國加強網絡安全建設,要求互聯網公司更積極地應對虛假信息和外部干預。歐盟的網絡安全指令還規定各成員國建立應急響應機制,保護重要信息基礎設施免受網絡攻擊。此外,歐盟還與社交平台公司,如Facebook、Twitter和Google等建立合作,通過提供反虛假信息工具和數據分析技術來打擊假新聞傳播。人工智能、大數據和自動化技術正在成為信息防禦的重要工具,被用以實時監控信息傳播路徑,識別潛在的虛假信息和抵禦輿論操控。在網絡安全領域,大數據分析幫助決策者識別和預警惡意攻擊,並優化反制策略。這些技術的應用不僅能夠在國內層面增強信息防禦能力,還能提高國家在國際信息空間中的主動性和競爭力。

反制機制是信息防禦體系的另一重要組成部分,尤其是在國際輿論壓力下,實時監控外部信息傳播並及時糾正虛假信息成為維護輿論主動權的關鍵。烏克蘭自2014年克里米亞危機以來,通過與北約和美國合作,建立了頗具規模的網絡防禦體系。烏克蘭的國家網絡安全局為應對網絡威脅設立了“信息反制小組”,利用社交媒體和新聞發布平台實時駁斥俄羅斯的虛假報導,這一策略顯著提升了烏克蘭在國際輿論中的聲譽和信任度。

(三)輿論引導中的議程設置

在信息化和數字化的全球競爭格局中,輿論引導不僅涉及信息傳播內容,更關鍵的是如何設置議程並聚焦全球關注的熱點話題。議程設置理論表明,誰能掌控信息流通的議題,誰就能引導輿論的方向。議程設置通過控制話題的討論範圍和焦點,影響公眾對事件的關注與評價,社交媒體的興起為信息弱勢國提供了突破口,使其可以通過多平台聯動來爭奪信息傳播的主導權。以烏克蘭為例,其在俄烏戰爭中通過社交媒體傳播戰爭實況,不僅發布戰鬥實況,還融入民眾的情感訴求,借助平民遭遇和城市破壞的悲情敘事,激發國際社會的同情與關注。在抵禦外部信息干擾的同時,國家還需要主動傳播正面敘事,講述能夠引發國際社會共鳴的文化故事。故事應該符合國際輿論的情感需求,同時展現國家的獨特性,強化與國際社會的聯繫。以我國的“一帶一路”共建為例,在“一帶一路”共建國家,我國投資建設了大量基礎設施項目,這些項目不僅幫助改善了當地的經濟基礎條件,也展示了中國在全球化進程中的責任擔當,更為文化合作和交流活動提供了窗口,向世界展示了中華民族豐富的歷史文化,為國際社會展現了中華文化的包容性和責任感。

但由於全球南方國家往往面臨資源、技術與國際傳播平台的限制,難以直接與發達國家競爭,因此它們依賴更加靈活、創新的傳播手段來參與全球議程的設置。例如,巴西在應對環保和氣候變化議題上,尤其是亞馬遜森林的砍伐問題,面臨來自西方媒體的負面輿論壓力。為此,巴西政府利用社交媒體發布關於亞馬遜保護的最新數據和成功案例,積極塑造國家在環境保護領域的形象。同時,巴西通過與其他發展中國家合作,參與全球氣候變化談判,推動南南合作,增強了在氣候問題上的話語權。大型國際事件、人道主義活動和製作文化產品等,也是講述國家故事的有效方式。國際體育賽事如世界杯、奧運會等,不僅是體育競技的展示平台,更是國家形象和文化軟實力的展現場所,通過承辦或積極參與這些全球性事件,國家能夠向世界展示其實力、價值和文化魅力,推動積極的輿論議程。

“戰爭無非是政治通過另一種手段的延續”[23]。這一克勞塞維茨的經典論斷在武器化傳播的語境下得到了現代化的詮釋。武器化傳播突破了傳統戰爭的物理邊界,成為一種融合信息戰、認知戰和心理戰的現代戰略手段。它以非暴力的形式操控信息流向和公眾認知,使國家和非國家行為者無須依賴直接軍事行動即可實現政治目標,體現出極強的戰略性和目標性。通過操控信息、情緒和價值觀,武器化傳播能夠在避免全面戰爭的同時達成戰略目的,在全球競爭和衝突中,已成為強國對弱國進行政治壓制的重要手段。

武器化傳播的核心在於通過信息操控削弱敵方的決策力與行動能力,但其複雜性使得傳播效果難以完全預測。儘管信息強國通過技術優勢和傳播渠道壓制信息弱國,傳播效果卻充滿不確定性。尤其是在社交媒體和數字平台全球化的背景下,信息流動的邊界和效果愈加難以控制。這種複雜性為弱國提供了突破話語霸權的機會,推動信息傳播的反向博弈。弱國可以利用這些平台發起對抗,挑戰強國的信息操控,在全球輿論中佔據一席之地。非對稱性博弈反映了國際輿論的動態平衡,傳播不再是單向的控制,而是更為複雜的交互和對話,賦予弱者影響輿論的可能性。當前國際輿論格局仍以信息強國對信息弱國的單向壓制為主,但這一局面並非不可打破。信息戰爭具有高度的不對稱性,信息弱國可以憑藉技術創新、靈活策略和跨國合作逐步反制。通過發揮“非對稱優勢”,弱國不僅能夠影響全球輿論,還能藉助聯合行動和信息共享提升話語權。跨國合作與地區聯盟的建立,為弱國提供了反制強國的有力工具,使其能夠在國際輿論上形成合力,挑戰信息強國的主導地位。在戰爭框架下,各國可以靈活調整策略,主動塑造信息傳播格局,而非被動接受強國的信息操控。

戰爭社會學強調社會結構、文化認同和群體行為在戰爭中的作用。武器化傳播不僅是軍事或政治行為的延續,更深刻影響社會心理、群體情感和文化認同。強國利用信息傳播塑造他國的認知與態度,以實現自己的戰略目標。然而,從社會學視角來看,武器化傳播並非單向的壓制,而是複雜的社會互動和文化反應的產物。在這一過程中,信息弱國並非完全處於弱勢,相反,它們可以藉助文化傳播、社會動員和全球輿論的動態對抗,以“軟實力”反擊外部操控,塑造新的集體認同,展示“弱者武器”的正當性。

(基金項目:研究闡釋黨的二十屆三中全會精神國家社科基金重大專項“推進新聞宣傳和網絡輿論一體化管理研究”(項目編號:24ZDA084)的研究成果)

References:

[1] Lasswell H D Propaganda techniques in the world wars [M] Beijing: Renmin University Press, 2003

[2] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978.

[3]Herrman J. If everything can be ‘weaponized,’ what should we fear? [EB/OL]. (2017-03-14)[2024-12-20].https://www.nytimes.com/2017/03/14/magazine/if-everything-can-be-weaponized-what-should-we-fear.html.

[4] Ministry of Foreign Affairs of the People’s Republic of China Joint statement by the People’s Republic of China and the Russian Federation on strengthening contemporary global strategic stability (full text) [EB/OL].https://www.mfa.gov.cn/web/ziliao_674904/1179_674909/201906/t20190606_7947892.shtml.

[5]Mazarr M J, Casey A, Demus A, et al. Hostile social manipulation: present realities and emerging trends[M]. Santa Monica, CA USA: Rand Corporation, 2019.

[6]Bob Y J. Ex-CIA director Petraeus: Everything can be hijacked, weaponized[EB/OL].(2018-01-30)[2024-12-20].https://www.jpost.com/israel-news/ex-cia-director-petraeus-everything-can-be-hijacked-weaponized-540235.

[7]Mattson G. Weaponization: Metaphorical Ubiquity and the Contemporary Rejection of Politics[EB/OL].OSF(2019-01-08)[2024-12-20].osf.io/5efrw.

[8]Robinson L, Helmus T C, Cohen R S, et al. Modern political warfare[J]. Current practises and possible responses, 2018.

[9]Kreitem H M. Weaponization of Access, Communication Inequalities as a Form of Control: Case of Israel/Palestine[J]. Digital Inequalities in the Global South, 2020: 137-157.

[10]Laity M. The birth and coming of age of NATO StratCom: a personal history[J]. Defence Strategic Communications, 2021, 10(10): 21-70.

[11]Confessore N. Cambridge Analytica and Facebook: The scandal and the fallout so far[J]. The New York Times, 2018(4).

[12]McQuinn B, Kolga M, Buntain C, et al. Russia Weaponization of Canada’s far Right and far Left to Undermine Support for Ukraine[J]. International Journal,(Toronto,Ont),2024,79(2):297-311.

[13]Stukal D, Sanovich S, Bonneau R, et al. Why botter: how pro-government bots fight opposition in Russia[J]. American political science review, 2022, 116(3): 843-857.

[14]Jones M O. The gulf information war| propaganda, fake news, and fake trends: The weaponization of twitter bots in the gulf crisis[J]. International journal of communication13(2019):27.

[15]Genovese D. Nearly 50% of voters said deepfakes had some influence on election decision. [EB/OL].(2024-10-30)[2024-12-20].https://www.foxbusiness.com/politics/nearly-50-voters-said-deepfakes-had-some-influence-election-decision.

[16]Peters C, Allan S. Weaponizing memes: The journalistic mediation of visual politicization[J]. Digital Journalism, 2022, 10(02):217-229.

[17]Gorissen S. Weathering and weaponizing the# TwitterPurge: digital content moderation and the dimensions of deplatforming[J]. Communication and Democracy, 2024, 58(01): 1-26.

[18]Pascale C M. The weaponization of language: Discourses of rising right-wing authoritarianism[J]. Current Sociology, 2019, 67(06): 898-917.

[19]Ridwa1ah A O, Sule S Y, Usman B, et al. Politicization of Hate and Weaponization of Twitter/X in a Polarized Digital Space in Nigeria[J]. Journal of Asian and African Studies, 2024.

[20]Mercieca J R. Dangerous demagogues and weaponized communication[J]. Rhetoric Society Quarterly, 2019, 49(03): 264-279.

[21]Welch C, Senman L, Loftin R, et al. Understanding the use of the term “Weaponized autism” in an alt-right social media platform[J]. Journal of Autism and Developmental Disorders, 2023, 53(10): 4035-4046.

[22]Farrell H, Newman A L. Weaponized interdependence: How global economic networks shape state coercion[J]. International security,2019,44(01):42-79.

[23] Clausewitz C V. On War: Volume 1 [M] Academy of Military Sciences of the People’s Liberation Army of China, translated Beijing: The Commercial Press, 1978

作者簡介:郭小安,重慶大學新聞學院教授、博士生導師,重慶市哲學社會科學智能傳播與城市國際推廣重點實驗室執行主任(重慶 400044);康如詩,重慶大學新聞學院碩士生(重慶 400044)。

中國原創軍事資源:https://www.cjwk.cn/journal/guidelinesDetails/192031322246497484888

Chinese Military to Utilize Artificial Intelligence Empowering Cognitive Confrontation Success on the Modern Battlefield

中國軍隊將利用人工智慧增強現代戰場認知對抗的成功

現代英語:

With the advent of the “smart +” era, artificial intelligence is widely used in the military field, and conventional warfare in physical space and cognitive confrontation in virtual space are accelerating integration. Deeply tapping the potential of artificial intelligence to empower cognitive confrontation is of great significance to improving the efficiency of cross-domain resource matching and controlling the initiative in future operations.

Data mining expands the boundaries of experience and cognition

Data-driven, knowing the enemy and knowing yourself. With the advancement of big data-related technologies, data information has become cognitive offensive and defensive ammunition, and information advantage has become increasingly important on the battlefield. Empowering traditional information processing processes with artificial intelligence technology can enhance the ability to analyze related information, accelerate information integration across domains through cross-domain data collection and false information screening, and enhance dynamic perception capabilities. Artificial intelligence can also help alleviate battlefield data overload, organically integrate enemy information, our own information, and battlefield environment information, and build a holographic intelligent database to provide good support for cognitive confrontation.

Everything is connected intelligently, and humans and machines collaborate. Modern warfare is increasingly integrated between the military and civilians, and the boundaries between peace and war are blurred. Technology has redefined the way people interact with each other, people with equipment, and equipment with equipment, and battlefield data is constantly flowing. Through big data mining and cross-domain comparative analysis, unstructured data such as images, audio, and video can be refined, and the truth can be retained to expand the boundaries of experience cognition and improve the level of human-machine collaboration. The in-depth application of the Internet of Things and big data technologies has promoted the continuous improvement of the intelligent level of data acquisition, screening, circulation, and processing processes, laying a solid foundation for the implementation of cognitive domain precision attacks.

Break through barriers and achieve deep integration. Relying on battlefield big data can effectively break through the barriers of full-domain integration, help connect isolated information islands, promote cross-domain information coupling and aggregation, accelerate barrier-free information flow, and promote the transformation of data fusion and information fusion to perception fusion and cognitive fusion. The comprehensive penetration of intelligent equipment into the command system can accelerate the deep integration of situation awareness, situation prediction and situation shaping, optimize multi-dimensional information screening and cognitive confrontation layout, and promote the continuous iteration and upgrading of cognitive domain combat styles.

Intelligent algorithms enhance decision-making efficiency

Accelerate decision-making and cause confusion to the enemy. The outcome of cognitive confrontation depends to a certain extent on the game of commanders’ wisdom and strategy. Through full-dimensional cross-domain information confrontation and decision-making games, with the help of intelligent technology, we can analyze and intervene in the opponent’s cognition and behavior, and finally gain the initiative on the battlefield. At present, artificial intelligence has become a catalyst for doubling combat effectiveness. In peacetime, it can play the role of an intelligent “blue army” to simulate and deduce combat plans; in wartime, through intelligent decision-making assistance, it can improve the quality and efficiency of the “detection, control, attack, evaluation, and protection” cycle, create chaos for the enemy, and paralyze its system.

Autonomous planning and intelligent formation. In the future intelligent battlefield, “face-to-face” fighting will increasingly give way to “key-to-key” offense and defense. In cognitive domain operations, the use of intelligent algorithms to accurately identify identity information, pre-judge the opponent’s intentions, and control key points in advance can quickly transform information advantages into decision-making advantages and action advantages. Using intelligent algorithms to support cognitive domain operations can also help identify the weaknesses of the enemy’s offense and defense system, autonomously plan combat tasks according to the “enemy”, intelligently design combat formations, and provide real-time feedback on combat effects. Relying on data links and combat clouds to strengthen intelligent background support, we can strengthen combat advantages in dynamic networking and virtual-real interaction.

Make decisions before the enemy and attack with precision. Intelligent algorithms can assist commanders in predicting risks, dynamically optimizing combat plans according to the opponent’s situation, and implementing precise cognitive attacks. In future intelligent command and control, the “cloud brain” can be used to provide algorithm support, combined with intelligent push to predict the situation one step ahead of the enemy, make decisions one step faster than the enemy, and completely disrupt the opponent’s thinking and actions. We should focus on using intelligent technology to collect and organize, deeply analyze the opponent’s decision-making and behavioral preferences, and then customize plans to actively induce them to make decisions that are beneficial to us, aiming at the key points and unexpectedly delivering a fatal blow to them.

Powerful computing power improves the overall operation level

Plan for the situation and create momentum, and suppress with computing power. “He who wins before the battle has more calculations; he who loses before the battle has less calculations.” The situation of cognitive confrontation is complex and changeable, and it is difficult to deal with it only by relying on the experience and temporary judgment of commanders. Intelligent tools can be used to strengthen the penetration of enemy thinking before the battle, actively divide and disintegrate the cognitive ability of the enemy team, and improve our battlefield control ability and combat initiative. At the same time, we should use powerful intelligent computing power to improve flexible command and overall planning capabilities, take advantage of the situation, build momentum, and actively occupy the main position of cognitive confrontation.

Smart soft attack, computing power raid. The rapid development of artificial intelligence has promoted the transformation of war from “hard destruction” to “soft killing”, which is expected to completely subvert the traditional war paradigm. For example, the latest technical concepts can be used to gain in-depth insights into the operating mechanism of the enemy system, actively familiarize oneself with the opponent, and mobilize the opponent. It is also possible to use the psychological anchoring effect and the network superposition amplification effect to interfere with the opponent’s cognitive loop link, disrupt the opponent’s command decision-making, and slow down the opponent’s reaction speed.

Cross-domain coordination and computing power support. To win the proactive battle of cognitive confrontation, we must coordinate across domains, gather forces in multiple dimensions, use intelligent tools to autonomously control the flow of information, realize the integrated linkage of physical domain, information domain and cognitive domain, lead forward-looking deployment and distributed coordination, launch a comprehensive parallel offensive, and form cognitive control over the enemy. Effectively carry out joint actions of virtual and real interaction in the entire domain, intervene in the enemy’s cognition, emotions and will, and use powerful computing power to take the initiative and fight proactive battles.

China Military Network Ministry of National Defense Network

Thursday, April 20, 2023

Chen Jialin, Xu Jun, Li Shan

現代國語:

伴隨「智慧+」時代的到來,人工智慧廣泛應用於軍事領域,物理空間的常規戰爭與虛擬空間的認知對抗加速融合。深度挖掘人工智慧潛力為認知對抗賦權,對提升跨域資源匹配效率,掌控未來作戰主動權具有重要意義。

資料挖潛拓展經驗認知邊界

數據驅動,知彼知己。隨著大數據相關技術的進步,數據資訊已成為認知攻防彈藥,資訊優勢在戰場上變得越來越重要。運用人工智慧技術賦能傳統資訊加工流程,可強化關聯資訊分析能力,透過跨領域資料擷取、虛假資訊甄別,加速資訊全局融合,強化動態感知能力。人工智慧還可協助緩解戰場數據過載,有機整合敵情、我情、戰場環境訊息,建立全像智慧資料庫,為認知對抗提供良好支撐。

萬物智聯,人機協同。現代戰爭日漸軍民一體、平戰界線模糊,技術重新定義了人與人、人與裝備、裝備與裝備的互動方式,戰場資料源源不絕。透過大數據探勘與跨域比較分析,可對影像、音訊、視訊等非結構化資料去粗取精、去偽存真,拓展經驗認知邊界,提升人機協同水準。物聯網、大數據技術的深度運用,推動資料取得、篩選、流轉、加工流程的智慧化程度不斷提升,為實施認知域精準攻擊夯實基礎。

打通壁壘,深度融合。依靠戰場大數據可有效突破全域融合的壁壘,有助於聯通條塊分割的資訊孤島,促進跨域資訊耦合聚合,加速資訊無障礙流通,推動資料融合與資訊融合向感知融合與認知融合轉化。智慧裝備全面滲透進入指揮體系,能夠加速態勢感知、態勢預測與態勢塑造的深度融合,優化多維資訊篩選與認知對抗佈局,推動認知域作戰樣式不斷迭代升級。

智慧演算法強化輔助決策效能

加速決策,致敵混亂。認知對抗的勝負,某種程度上取決於指揮家智慧謀略的博弈。可透過全維度跨域資訊對抗與決策博弈,借助智慧技術分析並介入對手認知與行為,最終贏得戰場主動。目前,人工智慧已成為戰鬥力倍增的催化劑,平時可扮演智慧「藍軍」模擬推演作戰方案;戰時透過智慧輔助決策,提升「偵、控、打、評、保」循環品質效率,給敵方製造混亂,促使其體系癱瘓。

自主規劃,智能編組。未來智慧化戰場上,「面對面」的拼殺將越來越多地讓位給「鍵對鍵」的攻防。在認知域作戰中,利用智慧演算法精準甄別身分資訊、預先研判對手企圖、事先扼控關鍵要點,能夠將資訊優勢快速轉化為決策優勢與行動優勢。利用智慧演算法支撐認知域作戰,還可協助摸清敵方攻防體系弱點,因「敵」制宜自主規劃作戰任務,智慧設計作戰編組,即時回饋作戰效果,依托資料鏈、作戰雲強化智慧後台支撐,在動態組網、虛實互動中強化作戰勝勢。

先敵決策,精準攻擊。智慧演算法可輔助指揮者預判風險,根據對手狀況動態優化作戰方案,實施精準認知攻擊。在未來智慧化指揮控制中,可利用「雲端大腦」提供演算法支撐,結合智慧推送先敵一步預判態勢,快敵一招制定決策,徹底打亂對手思路和行動。應著重運用智慧科技收集整理、深度分析對手決策和行為偏好,進而專項客製化計劃,積極誘導其作出有利於我的決策,瞄準要害出其不意地對其進行致命一擊。

強大算力提升全域運籌水平

謀勢造勢,算力壓制。 「夫未戰而廟算勝者,得算多也;未戰而廟算不勝者,得算少也。」認知對抗態勢複雜多變,僅靠指揮經驗和臨時判斷難以應對,可利用智能工具在戰前即對敵思維認知加強滲透,積極分化瓦解敵方團隊認知力,提升我戰場控局能力和作戰性。同時,應藉助強大智能算力,提升靈活指揮與全局運籌能力,順勢謀勢、借勢造勢,積極佔領認知對抗主陣地。

巧打軟攻,算力突襲。人工智慧的快速發展,推動戰爭進一步從「硬摧毀」轉向「軟殺傷」,可望徹底顛覆傳統戰爭範式。如可運用最新技術理念,深入洞察敵方體系運作機理,積極熟悉對手、調動對手。還可利用心理沉錨效應和網路疊加放大效應,幹擾對手認知循環鏈路,打亂對手指揮決策,遲滯對手反應速度。

跨域統籌,算力支撐。打贏認知對抗主動仗須全域跨域統籌、多維同向聚力,利用智慧工具自主控制資訊的流量流向,實現物理域、資訊域與認知域的一體聯動,引領前瞻性布勢與分散式協同,全面展開並行攻勢,形成對敵認知控制。有效進行全域虛實相生的聯合行動,對敵認知、情緒和意志實施幹預,借助強大算力下好先手棋、打好主動仗。

中國軍網 國防部網 // 2023年4月20日 星期四

陳佳琳 徐 珺 李 山

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2023-04/20/content_338002888.htm