Cognition is the basis for operational decisions and operations. Cognitive warfare is a confrontation activity carried out in the cognitive domain. The purpose is to attack the enemy’s knowledge system, social consciousness, people’s morale, etc., disrupt its judgment and decision-making, and cause it to lose its decision-making advantage and action advantage. To deepen the research on cognitive warfare and decipher the cognitive warfare code, the key is to embed the combat decision-making chain and explore how to influence and interfere with the cognitive activities of the enemy’s decision-making chain, causing the enemy to form false observations, wrong judgments and poor decisions, so as to fully control Cognitive initiative.
Seeing is false, changing the facts
Observation is the starting point of cognition. No matter what kind of war, when facing any opponent, the first step is observation. The observation here is a broad concept and is about all activities to obtain all relevant information about the hostile party. Just as people perceive external things through sensory organs, observation relies on the battlefield perception system to obtain relevant data and information from the battlefield environment according to the needs of the subject, providing “ source material ” for judgment and decision-making. Observation uses intelligence, reconnaissance, surveillance and other activities to obtain as much factual information and materials from all aspects of the enemy as possible and convert them into text, images, audio, video and sensor signals.
The history of war at home and abroad in ancient and modern times shows that the essence of command is the endless pursuit of certainty, including the status and intentions of enemy troops, various factors affecting the combat environment such as weather and terrain, as well as the status and actions of one’s own troops. Therefore, efficient command consists in clarifying each element and then coordinating it as a whole to achieve the best combat effect. Human judgment and decision-making are easily disturbed by information uncertainty. In the observation stage, the key to cognitive warfare is to make the enemy unable to clearly observe, incompletely observe, and distort the information of their own combat elements, and lack real information or accurate understanding, thereby weakening the enemy’s decision-making on combat at the source. The pursuit of certainty.
Measures for observing cognitive warfare, in addition to common information warfare methods, such as disguise, interference, deception, silence, etc., should also pay attention to the following aspects: First, create complex situations. War is inherently full of complexity. By creating complexity, it increases the fog and resistance on the battlefield, making it impossible for the enemy to observe the real specific situation. For example, by creating various events and operations in multi-dimensional combat areas such as land, sea, air, sky, and network, and making irregular changes, it can effectively increase the difficulty of enemy observation. The second is to interfere with observation and cognition. Observation is not aimless. It is carried out based on a certain cognition. Cognition determines what information needs to be observed, what kind of reconnaissance activities need to be carried out, etc. For example, during observation activities, by interfering with operations, the enemy’s attention in observation activities is affected, causing it to lose the ability to focus on essential issues and key issues, thereby making it unable to obtain key information. The third is to shape the factual narrative. Shaping factual narratives is to reformulate, combine, arrange, and reconstruct facts according to the needs of cognitive warfare. These facts are either created out of nothing, highlight certain details in the facts, or are difficult to verify and test, making their observation materials Mixed with fictional facts, the observed facts are far from objective facts. The fourth is to protect specific knowledge. Knowledge protection is an important aspect of cognitive warfare. The main contents include: commander’s decision-making style, combat theory reasoning process, premises and assumptions, key tactical ideas and combat principles, key decision-making procedures, mechanisms and methods, information analysis methods, especially some algorithms, passwords, etc.
Targeting the judgment, misleading the judgment
On the battlefield, simple observation and data collection do not make much sense. Only by analyzing these data “ by looking at the essence of the phenomenon, and then drawing various judgments, will we promote the formation of operational decisions. For example, during the Battle of Moscow in World War II, the Soviet Union had a lot of and messy information about the Japanese Kwantung Army. Finally, after careful analysis, it was concluded that “ the Soviet Union could be considered safe in the Far East, and the threat from Japan had been ruled out ” After the judgment, it was decided to transfer troops from the Far East to Moscow to participate in the Battle of Moscow. Judgment is the corresponding conclusion reached by analyzing and reasoning the observation results, which mainly includes: first, factual judgment, usually expressed in descriptive language, such as the current situation, enemy battlefield deployment, battlefield posture, etc.; second, value and relationship judgment, usually Expressed in evaluative language, such as threat assessment, correlation analysis, trend prediction, etc.
Judgment cognitive warfare is actually a game surrounding judgment. Normally, judgments arise on the basis of a judgment, without which there would be no conclusion of judgment. Whether a person has high blood pressure or diabetes is often based on some medical indicators, and these indicators are the criteria. The premises and assumptions of reasoning are actually based on judgments. “ Persian cat story ” circulated in World War I. Judging from the location of the command post from a Persian cat, it contains a series of judgments: there is no village around, and it cannot be a cat raised by ordinary civilians; the sound of artillery on the battlefield is rumbling, and it cannot be It is a wild cat that is cautious and avoids people; Persian cats are a valuable breed, and the position of cat owners is not low; cats appear at fixed times every day, and the command post should be near cats. Therefore, interfering with judgment is to target the judgment to design and produce information products so that the facts obtained do not match the judgment, or to minimize the leakage of information related to the judgment, so that the enemy cannot judge or make wrong judgments.
The main contents of the interference criterion are: First, the interference is based on experience. Based on enemy experience, create “ virtual facts ” to make errors in judgment. For example, in the Battle of Maling, Sun Bin halved the stove to lure Pang Juan, which is a typical example. Because according to experience, the number of stoves is directly proportional to the number of troops. Halving the number of stoves every day means that the number of people is decreasing. The possibility of reduction is that the soldiers have suffered greater casualties, which leads to the judgment of weakening combat power. The second is to interfere with the judgment based on the knowledge system. Such knowledge includes the enemy’s common sense, concepts, principles and some assumptions. For example, in the Fourth Middle East War that broke out in October 1973, Israel’s initial defeat was a misjudgment of the war situation. It believed that as long as its air force was still in an advantageous position, the other side would never dare to attack. However, Egypt began to adopt new military technology and used mobile surface-to-air missiles to support an air defense network, partially offsetting Israel’s air superiority. The third is to interfere with judgments based on universal culture. That is, design corresponding information and actions based on the enemy’s cultural characteristics so that they can be misjudged due to cultural differences. According to foreign information, during the Cold War, the United States studied the root causes of “ Soviet behavior, so it started from culture and behavior to induce the Soviet Union to make strategic misjudgments. The fourth is to interfere with methodological-based judgments. Generalizations, analogies, etc. are the basic methods of judgment. Cognitive interference based on methodology makes it difficult for the other party to understand facts and cannot be compared with known facts; complicating the causal relationship and confusing factual cause and effect, psychological cause and effect, conditional cause and effect, social cause and effect, etc., making it impossible to implement causal judgment; reducing possible signs and phenomena, making it impossible to see through the essence and make accurate judgments.
Focus on the process and influence decision-making
Operational decision-making is based on combat purposes and intentions. After observation and judgment, various factors are combined to derive the optimal solution to the problem. War or conflict behavior has game, competition and confrontation attributes, so decision-making is a game. Decisions address key issues such as whether to do it, how to do it, what purpose to achieve, or the state of termination. In information-based local wars, action-centeredness gradually replaces planning-centeredness, requiring an increase from data center warfare, information center warfare, and knowledge center warfare to decision-making center warfare. Combat decision-making has become one of the main areas of competition between the enemy and ourselves.
Decision-making cognitive warfare is to target enemy cognition and interfere with the decision-making process to affect the quality and efficiency of decision-making. Decision-making is affected by the knowledge structure of the decision-maker himself. If cognition is paranoid or the knowledge reserve is outdated, even if the judgment is correct, good decisions will still not be made. The decision-making process includes the application and change process of knowledge structure, which mainly involves procedural knowledge and conceptual principled knowledge. The former includes decision-making procedures and methods, decision-making mechanisms and evaluation methods, etc., while the latter includes understanding of battlefield posture, winning mechanism, combat concepts, combat rules, and weapons and equipment performance. Therefore, cognitive attacks on the decision-making process will greatly affect its decision-making speed and quality.
The main ways to influence cognitive warfare in decision-making are: First, squeezing the cognitive decision-making space. When watching tennis matches, commentary on non-forced errors and forced mistakes are often heard, with forced mistakes being those caused by putting pressure on the opponent. Interfering with the cognitive decision-making environment is to put pressure on the enemy’s cognitive decisions, thereby squeezing the cognitive space and weakening cognition to force the enemy to make mistakes in decision-making. For example, through virtual and real decision-making activities and actions, the opponent is trapped in decision-making difficulties, which increases the probability of low-level decision-making. The second is to attack rational cognition. Including: First, interfering with the understanding of threats and opportunities. Many examples of failures in military history are caused by misjudgment of threats and opportunities on the battlefield. Whether you despise the enemy or overestimate the enemy, you will form decision-making expectations that are different from objective reality, leading to adverse action results. Second, attack combat theory and doctrine. For example, by proposing the theory of mutual restraint, deliberately exaggerating the loopholes in the enemy’s doctrine, and amplifying the adverse effects of the enemy’s combat operations, the enemy can arouse doubts about its own theory and doctrine. Third, for procedural knowledge. Including decision-making mechanisms, procedures and methods, plan evaluation and combat evaluation methods, auxiliary decision-making systems, algorithms, thinking, etc. Attacking the weaknesses present will also cause decision-making errors. The third is to interfere with irrational factors. The use of irrational factors often creates decision-making traps, such as groupthink traps, conceit traps, etc., which have a significant impact on decision-making. The strategic deception successfully implemented by the Allied forces many times during World War II was to use the enemy’s ambiguous and misleading analysis to increase the probability that the wrong decision would win.
System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole.
In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze . System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“ 1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence 2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations 3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure 4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control 5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare 6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma 7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support 8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics 9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.
1. Overall deterrence Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.
1.1 Emphasis on multi-domain joint deterrence Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.
1.2 The implementation of overall deterrence should have three major elements Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.
Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.
1.3 Strong overall strength is the core of achieving effective deterrence The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war. In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.
2. Electromagnetic Disturbance Warfare Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.
2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.
2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.
2.3 Crack effective tactics for unmanned cluster operations “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.
3. Cyber-sabotage Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities. The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.
4. Cognitively Controlled Disturbance Warfare Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage. Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.
4.1 Control the cognitive rights of situational awareness and compete for information advantages In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.
4.2 Control and command decision-making power and compete for decision-making advantages Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.
4.3 Control “brain” power and seize the advantage of brain control Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.
5. Agile Mobile Warfare Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.
Table 1 Connotation of the concept of agile warfare
5.1 Efficient and fast decision-making To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.
5.2 High efficiency forms a favorable combat situation It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.
5.3 Efficient and instant gathering of combat power To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.
5.4 Agile mobile warfare is an innovative development of traditional mobile warfare In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.
6. Unmanned cluster autonomous warfare Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.
6.1 It is conducive to forming a system advantage to suppress the enemy Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.
6.2 Conducive to enhancing combat effectiveness In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.
6.3 Conducive to getting into enemy combat difficulties Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.
7. Pointkill Battle “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.
7.1 Achieve efficient combat cost ratio Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.
7.2 Targeting key nodes is an important option The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.
7.3 Large-scale system support is the basic condition The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.
7.4 It is inseparable from precise intelligence support In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.
8. Supply-breaking Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.
8.1 The supply guarantee chain has a huge impact on the overall combat situation Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.
8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.
8.3 The key is to choose the right time and make full use of tactics It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.
9. System “paralysis battle” System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.
9.1 The combat goal is to disorderly operate the enemy’s combat system In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.
9.2 A key node in the heavy strike combat system Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.
9.3 Implement soft strikes against the enemy’s combat system When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat.
Soldiers are a major event for the country. In the great journey of “building a powerful country and rejuvenating the nation, and against the background of the accelerated evolution of major changes unseen in the world in a century, building and consolidating national defense and a strong people’s army are directly related to the future and destiny of the country and the nation”. The Third Plenary Session of the 20th Central Committee of the Communist Party of China pointed out that “national defense and military modernization are important components of Chinese-style modernization”, which fully reflects the great importance that the Party Central Committee with Comrade Xi Jinping as the core attaches to national defense and military construction, and provides guidance for national defense and military modernization on the new journey. Modernization points out the direction.
The modernization of the national defense and military is the security guarantee and strategic support for Chinese-style modernization
”If you fall behind, you will be beaten. Only when the army is strong can the country be safe”. Without a strong army, there can be no strong state. After the Opium War in 1840, modern China was repeatedly defeated in its battles with Western powers. The vast country gradually became a semi-colonial and semi-feudal society, with the country humiliated, the people in trouble, and civilization in dust. History has inspired us that the Chinese nation’s emergence from suffering and the liberation of the Chinese people depend on a heroic people’s army; to comprehensively promote the great cause of building a powerful country and national rejuvenation with Chinese-style modernization, we must place national defense and military modernization as a barrier to national security, plan and deploy in strategic positions based on career development, and accelerate the construction and consolidation of national defense and a strong people’s army.
The modernization of the national defense and military is closely linked and internally unified with Chinese-style modernization. Without the modernization of national defense and the military, there would be no Chinese-style modernization. Comrade Mao Zedong once profoundly pointed out “the original requirements for building socialism were industrial modernization, agricultural modernization, scientific and cultural modernization, and now we must add national defense modernization”; Comrade Deng Xiaoping also emphasized “four modernizations, one of which is national defense modernization”, these all reflect the great importance our party attaches to national defense and military construction.
Since the 18th National Congress of the Communist Party of China, President Xi has always adhered to the integrated operation of strengthening the country and the military, put national defense and military modernization in the chess game of Chinese-style modernization, and opened up the road to strengthening the military with Chinese characteristics, forming a new strategy for national defense and military modernization by 2027, 2035, and the middle of this century, a new “three-step” strategy for national defense and military modernization that connects near, medium and long-term goals Created a new situation in the cause of strengthening the military. Guided by the party’s goal of strengthening the military in the new era, we will comprehensively implement the strategy of reforming and strengthening the military, promote the reform of the leadership and command system, the reform of scale structure and force organization, and the reform of military policies and systems. Our military’s organizational structure will achieve historic changes, and the force system will achieve revolutionary changes. Reshaping, the basic framework of the socialist military policy system with Chinese characteristics has been constructed and formed. Our military system has been completely new, its structure has been completely new, its pattern has been completely new, and its appearance has been completely new It has laid a solid foundation for the modernization of national defence and the army.
Military means, as a means of guaranteeing the realization of great dreams, can only stop a war if it can be fought. The current and future periods are critical periods for comprehensively promoting the great cause of building a powerful country and rejuvenating the nation through Chinese-style modernization, and will inevitably encounter various risks, challenges and even turbulent waves. We must comprehensively modernize our national defense and military, build the People’s Army into a world-class military, effectively guarantee Chinese-style modernization, and safeguard national sovereignty, security, and development interests.
Comprehensive and accurate grasp of the scientific connotation of national defense and military modernization
Since the 18th National Congress of the Communist Party of China, President Xi has issued a series of important expositions around “Chinese-style modernization”, summarizing the Chinese characteristics, essential requirements and major principles for the formation of Chinese-style modernization, building a theoretical system for Chinese-style modernization, and promoting the new era and new journey. Chinese-style modernization provides scientific guidance and also carries out strategic design and scientific deployment for national defense and military modernization.
The most fundamental thing about modernizing the national defense and military is to uphold the absolute leadership of the party over the military. The leadership of the Party is the fundamental guarantee of Chinese-style modernization, which determines the fundamental nature of Chinese-style modernization, and it must also determine the fundamental nature of national defense and military modernization. To promote the modernization of national defense and the military on the new journey, we must fully implement a series of fundamental principles and systems for the party to lead the people’s army, comprehensively and thoroughly implement the chairman’s responsibility system of the Military Commission, and effectively unify thoughts and actions into the decisions and arrangements of the Party Central Committee and President Xi; Adhere to the party’s management of cadres and talents, and highlight political standards and combat capabilities Ensure that the barrel of the gun is always in the hands of those who are loyal and reliable to the party; improve the comprehensive and strict governance of the party system, enhance the political and organizational functions of party organizations at all levels, and integrate the party’s leadership throughout the entire process of continuing to deepen national defense and military reforms in all aspects.
To modernize national defense and the military is to modernize military doctrine, military organization, military personnel, and weapons and equipment. This reflects the inherent requirements for the construction of military forces resulting from changes in the concept of victory in modern warfare, elements of victory and methods of victory, and clarifies the main signs of the basic realization of national defence and military modernization. To realize the modernization of military theory is to keep pace with the times, innovate war and strategic guidance, and form a military theoretical system that is contemporary, leading, and unique; to realize the modernization of organizational form is to deepen the reform of national defense and the military, and the military force structure layout is scientific and reasonable, strategic deterrence capabilities are consolidated and improved, new areas and new quality combat forces continue to grow, and elite operations, system support, and joint victory have become the basic application models; To realize the modernization of military personnel is to deeply implement the strategy of strengthening the military with talents in the new era, promote the comprehensive transformation and upgrading of military personnel’s capabilities, structural layout, and development management, and forge high-quality, professional new military talents with both ability and political integrity; to realize the modernization of weapons and equipment, It is necessary to focus on strengthening national defense scientific and technological innovation and accelerating the development of strategic, cutting-edge and disruptive technologies Accelerate the upgrading of weapons and equipment and the development of intelligent weapons and equipment.
For the modernization of national defence and the military, we must adhere to the integrated development of mechanization, informatization and intelligence. The military conflicts and local wars that have taken place in recent years have shown that new qualitative combat capabilities generated based on intelligent combat systems are increasingly becoming core military capabilities. Based on mechanization, dominated by informatization, and oriented by intelligence, the three superimpose, penetrate, and support each other, jointly giving rise to new forms of warfare and methods of warfare. Only by accelerating the integrated development of mechanization, informatization and intelligence and keeping up with the new military revolutionary trends in the world can we seize the opportunity and take the initiative in seizing the commanding heights of the military struggle.
The modernization of national defence and the army is a guarantee of security for insisting on the path of peaceful development. Since ancient times, soldiers have not been warlike. Chinese-style modernization is modernization on the path of peaceful development. Building a consolidated national defense and a strong military commensurate with international status and national security and development interests is a strategic task of China’s socialist modernization drive and an insistence on taking the path of peaceful development. Safety guarantee is an inevitable choice for summarizing historical experience. China has always pursued a defensive defence policy and adhered to the strategic idea of active defence, and no matter how far it develops, China will never seek hegemony or engage in expansion. To promote the modernization of national defense and the military on the “new journey”, we must faithfully implement the concept of a community with a shared future for mankind, resolutely oppose all forms of hegemony and bullying, and contribute China’s strength to building a beautiful world of lasting peace and universal security.
Advancing the modernization of national defence and the military at a new historical starting point
The Third Plenary Session of the 20th Central Committee of the Communist Party of China included “continuous deepening of national defense and military reforms into the overall plan for further comprehensive deepening of reforms, and made a series of major strategic arrangements for improving the leadership and management system and mechanism of the people’s army, deepening the reform of the joint operations system, and deepening cross-military and civilian reforms”. On the new journey, we must deeply understand and grasp the themes, major principles, major measures, and fundamental guarantees for further comprehensively deepening reforms, resolutely implement the new “three-step” strategy for national defense and military modernization, and accelerate the modernization of military theory, military organizational form, and military personnel. Modernize and modernize weapons and equipment, and lead the modernization of national defense and the military to move forward with better strategies, higher efficiency, and faster speed.
Strengthening the Party’s theoretical and scientific leadership in military guidance. Our party insists on combining the basic principles of Marxism with the practice of building the people’s army, absorbing the essence of China’s excellent traditional military culture, and constantly exploring new realms in the development of contemporary Chinese Marxist military theory and military practice. As an important part of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, Xi Jinping Thought on Strengthening the Military has achieved a new leap forward in the Sinicization and modernization of Marxist military theory. It is the fundamental guiding ideology of our party building and military governance in the new era. We must unremittingly arm our minds with Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, further firmly establish the guiding position of Xi Jinping Thought on Strengthening the Military in national defense and military construction, and build and consolidate national defense and a strong people’s army under the guidance of Xi Jinping Thought on Strengthening the Military. Take new and greater steps on the road to strengthening the military with Chinese characteristics.
Efforts should be made to make the main responsibility and business of war preparation more solid and effective. The People’s Army is an armed group that performs the party’s political tasks. It must be both politically strong and capable. In the final analysis, this ability can win wars. To accelerate the modernization of national defense and the military, we must firmly grasp the fundamental direction of winning wars, establish the only fundamental standard of combat effectiveness, focus all our energy on fighting wars, and work hard on fighting wars. Conscientiously implement the military strategic policy for the new era, operate war preparation and cessation, deterrence and actual combat, war operations and the use of military forces in peacetime as a whole, innovate strategies, tactics and tactics, effectively shape the situation, manage crises, contain wars, and win wars. Adhere to the principle of “training troops as they fight, and comprehensively improve the actual combat level of military training and the ability to perform missions and tasks”.
Promote high-quality development of national defense and military construction through “reform and innovation”. Reform is a key move that will determine the growth of our army and its future. On the new journey, we must put innovation at the core of the overall military construction and development, transform development concepts, innovate development models, enhance development momentum, and promote the transformation of national defense and military modernization from quantitative growth to qualitative improvement. Focus on integrating national defense and military construction into the national economic and social development system on a wider scale, at a higher level, and to a deeper extent, continuously improve the quality and efficiency of national defense and military modernization, promote the simultaneous improvement of national defense strength and economic strength, and consolidate and improve the integration National strategic system and capabilities, and constantly write a new chapter of strengthening the country and the military.
Adhere to the integrated development of mechanized informatization and intelligence
——Seriously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China
The report to the 20th CPC National Congress emphasized “upholding the integrated development of mechanization, informatization, and intelligence,” elevating the requirement for the integrated development of mechanization, informatization, and intelligence (hereinafter referred to as the “three modernizations”) to a new strategic level. To thoroughly study, publicize, and implement the spirit of the 20th CPC National Congress and strive to achieve the goals of the PLA’s centenary, we must focus on understanding and grasping the primary characteristics, profound mechanisms, basic principles, and strategic measures of the integrated development of the “three modernizations,” and effectively promote their implementation.
Recognize the main characteristics of the integrated development of the “three transformations”
Mechanization, informatization, and intelligence are progressive and interdependent. From a chronological perspective, the three transformations did not originate simultaneously. Without the prerequisites and foundations of the previous transformations, the subsequent transformations could not occur and develop. For example, without mechanization, there would be no informatization. Informatization requires the physical substance provided by mechanization. Without mechanized combat platforms and ammunition as carriers of information nodes, the “connectivity” of informatization would be lost. Informatization is the nucleus of intelligence. Without the sufficient computing power and data provided by advanced informatization, the next generation of artificial intelligence cannot achieve the chain breakthroughs it promises. Without a solid foundation of mechanization, a military cannot advance informatization, and without a solid foundation of mechanization and informatization, it cannot effectively advance intelligence.
Based on this understanding, it’s difficult to leapfrog mechanization and informatization to embrace intelligence. Generally speaking, the latter can only replace the former in specific areas, not completely replace or surpass it. If the foundation of the former’s core technologies, foundational areas, and key stages is not solid, bottlenecks and shortcomings will be difficult to address quickly. Not only will these bottlenecks be difficult to address with the latter, but their weak foundation will also hinder the latter’s development, hindering overall development. If we skip mechanization and informatization and shift our focus entirely to intelligence, haste may lead to failure.
Mechanization, informatization, and intelligence will overlap and coexist for a long time. The term “basic mechanization” generally refers to the fact that mechanization has reached a late stage of development, with its contribution to combat effectiveness having already experienced diminishing returns. Further investment in mechanization will significantly reduce the cost-effectiveness. This does not mean that there will be no more mechanization construction tasks; it simply means that the proportion of investment in informatization and intelligence will gradually decrease compared to informatization and intelligence. Informatization is not the end of mechanization; a certain degree of mechanization will continue during the informatization process. Similarly, intelligence is not the end of mechanization and informatization; a certain degree of informatization and mechanization will continue during the intelligence process. Each of the “three transformations” is only a construction focus for a specific historical period; no one “transformation” is exclusive to any given period.
Based on this understanding, we cannot pursue a “starting from scratch” approach, overthrowing mechanization and informatization in favor of intelligentization. The “three transformations” cannot be viewed in isolation. They are meant to be inclusive, integrated, and mutually exclusive, not selective. The subsequent transformation does not negate or terminate the previous one, nor does it mean discarding the achievements of the previous one and starting over with a new one. We must ensure a smooth transition and gradual upgrade of the combat system from mechanization to informatization and then to intelligentization. Taking intelligentization as an example, intelligentization does not mean completely overthrowing the existing informatized combat system and establishing a completely new, independent intelligent combat system.
Intelligent informationization uses the virtual to control the real, empowering and increasing efficiency in mechanization. The “real” here primarily refers to “hardware,” represented by physical entities such as combat platforms and ammunition, while the “virtual” primarily refers to “software,” centered around combat data and algorithms. While mechanization primarily relies on hardware development, informationization and intelligentization primarily rely on software development, optimizing and upgrading hardware and increasing its efficiency through software. In terms of development priorities, payloads surpass platforms, software surpasses payloads, and algorithms surpass software. Software costs in informationization and intelligentization far exceed hardware costs.
Based on this understanding, we must not pursue development that prioritizes hardware over software or creates a disconnect between the virtual and the real. In the era of intelligence, if the supporting software and core algorithms that serve as the “brains” of weapons and equipment lag behind, even the highest hardware performance indicators will be merely “inflated,” and it will be difficult to realize its combat potential in actual combat. Military combat practice demonstrates that in the era of intelligence, we should prioritize the development of general-purpose chips and core algorithms for military intelligence technology from the outset to avoid being caught in a passive position.
Clarify the profound mechanism of the integrated development of the “three transformations”
The integrated development of the “three transformations” is not a simple mixing, combination, or compounding of the “three transformations,” but rather a process of mutual inclusion, mutual penetration, and mutual promotion. From “you are you, I am me” to “you are in me, I am in you,” and then to “you are me, I am you,” achieving a seamless blend and unity, generating cumulative, aggregate, and multiplier effects, and achieving a qualitative leap in overall combat effectiveness. The integrated development of the “three transformations” primarily follows the following mechanisms:
Advantage-overlaying mechanism. Whether mechanization, informatization, or intelligentization, the supporting technology clusters for each “transformation” will give rise to a series of new weaponry and equipment, generate new combat forces, and ultimately form new combat capabilities with different operational mechanisms. The combined advantages of these new combat capabilities with existing combat capabilities can produce a systemic emergence effect, greatly enhancing the overall combat capability of the military; it can enrich one’s own combat means, methods, and approaches, and put the enemy in a dilemma of multiple difficulties.
Upgrade and expansion mechanism. Informatization, through the digital transformation and networking of various mechanized combat platforms, aggregates and upgrades mechanized combat systems into informationized combat systems, resulting in a qualitative leap in combat effectiveness. Intelligence can also be integrated with mechanization and informatization through upgrades and expansions. On the one hand, intelligent technologies are used to upgrade the control systems of mechanized combat platforms, continuously enhancing the autonomous combat capabilities of individual weapons and equipment. On the other hand, intelligent technologies are used to optimize and upgrade informationized combat systems, significantly enhancing their capabilities in information acquisition, transmission, processing, sharing, and security, and comprehensively improving the combat capabilities of the system.
A mechanism for addressing shortcomings and replacing them. The history of military development shows that as a particular “industry” develops, it often encounters bottlenecks that are difficult to resolve with its own technological system alone. This necessitates the urgent need for innovative solutions using the technical means and development strategies of other “industries.” Currently, machinery is becoming increasingly sophisticated and complex, making its design and control increasingly difficult. Informatization has led to an “information explosion,” making it increasingly difficult to quickly translate this information into decision-making information. These problems are difficult to effectively address within the technological systems of mechanization and informatization alone. However, the application of intelligent technology can effectively overcome bottlenecks in mechanical control and information processing capabilities. Furthermore, technological breakthroughs in the first “industry” can offset the shortcomings of the second. For example, hypersonic missiles can outpace the response capabilities of networked and informationized defense systems, enabling rapid penetration, which to some extent offsets an adversary’s information advantage.
Grasp the basic principles of the integrated development of the “three transformations”
In promoting the integrated development of the “three transformations”, we should focus on the following basic principles:
The principle of mutual promotion and symbiosis. Each “transformation” differs fundamentally in its combat effectiveness generation mechanisms and development goals. The simultaneous and parallel development of the three transformations presents both favorable conditions for mutual enhancement, mutual promotion, and mutual support, but also unfavorable factors such as competition over development areas, resource allocation, and investment volume. We must ensure that the three transformations form a healthy symbiotic relationship within the overall development process, avoiding conflicts, frictions, and constraints that could lead to a situation where 1+1+1 is less than 3, and strive to achieve systemic emergence and synergistic effects.
The principle of overall coordination. The importance of the “three transformations” is not ranked in order of importance. We should not emphasize one at the expense of the others. Instead, the three transformations should be considered as a system, coordinated and advanced as a whole. While informatization and intelligentization appear more advanced and complex, we should not assume that mechanization is low-end, simple, and easy to implement, or that the importance of mechanization can be ignored with the advent of informatization and intelligentization. On the one hand, if mechanization is not fully implemented, it will hinder progress and become a bottleneck restricting overall development. Similarly, without the sufficient computing power and data provided by full informatization, the next generation of artificial intelligence cannot achieve a series of breakthroughs. On the other hand, mechanization also has high-end cutting-edge fields such as hypersonic aircraft and deep-sea submersibles that can have a disruptive effect.
The principle of prioritizing key areas. Total investment in national defense and military development is limited. Given a relatively fixed overall budget, investing more in one area will inevitably result in less investment in others. We should accurately assess the contribution of each area to combat effectiveness over the coming period, identify the area that will most significantly increase combat effectiveness as the priority for development, rationally allocate resources in a prioritized manner, and scientifically determine the direction and amount of investment. Failure to prioritize the development of the “three areas” and applying a “sprinkle pepper” approach to each area can easily result in a low input-output ratio and may even cause military development to stray from its correct trajectory.
Strengthening strategic measures for the integrated development of “three transformations”
In practice, we should strive to change the inertial thinking of relying on latecomer advantages and unconsciously falling into the habit of following development, strive to get out of the passive catch-up development model, and turn to the pursuit of concurrent advantages and first-mover advantages. We should develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to drive mechanization and informatization to a higher level. We should use the integrated development of the “three transformations” as a powerful engine to promote the transformation and development of the military and achieve a comprehensive leap in the overall construction level.
We must effectively strengthen top-level design and overall coordination for the integrated development of the “three transformations.” We must fully recognize the long-term, complex, and arduous nature of the integrated development of the “three transformations,” adhere to the unity of technological and conceptual integration, and avoid simply applying the existing mechanization and informatization construction model to the integrated development of the “three transformations.” We must also avoid generalization and labeling of the “three transformations.” We must strengthen top-level design and overall coordination with strong organizational leadership, streamline multiple relationships, pool the strengths of all parties, and create a positive synergy.
Proactively plan key areas for the integrated development of the three transformations. First, address areas where one transformation affects and constrains the development of others. Quickly identify technical bottlenecks within each transformation, compile a list of these bottlenecks, and increase investment in focused research to address these shortcomings as quickly as possible. Second, address areas where one transformation could potentially offset the achievements of others. During the integrated development of the three transformations, even after one has become dominant, we should still prioritize developing new operational mechanisms within the others, potentially disrupting the strategic balance and generating disruptive impacts, potentially even offsetting the achievements of the others. Third, address areas where the three transformations intersect and intersect. The “edge zones, intersections, and junctions” of the three transformations are also crucial for rapidly generating new qualitative combat capabilities. Currently, we should particularly proactively plan for areas such as “ubiquitous network plus” and “artificial intelligence plus.”
(Author’s unit: Academy of Military Science, Institute of War Studies)
With the rapid development of intelligent technology and its widespread military application, intelligent warfare is becoming a new form of warfare after information warfare, while dissipative warfare has become a typical way of intelligent warfare. The so-called “dissipative warfare” refers to the combat method in which an intelligent warfare system achieves a comprehensive combat capability that integrates material consumption, energy release and information diffusion by enriching and integrating internally and suddenly emerging externally. Strengthening research on dissipative warfare will help us deeply reveal the winning mechanism of intelligent warfare and win the initiative in future war games.
Dissipation warfare is the inevitable result of the development of the times
Dissipative warfare is manifested in the comprehensive confrontation of physical domain, information domain and cognitive domain in the intelligent era. It is reflected in the high degree of unity in the form of political competition, economic competition, military offense and defense, cultural conflict and diplomatic checks and balances, reflecting the intelligent warfare system. The openness, complexity and emergence of.
Adapting to the requirements of the security situation in the intelligent era. Entering the era of intelligence, technologies such as wide networks, big data, large models, cloud computing, and deep learning are developing rapidly, and the connections between political groups, countries, and ethnic groups are even broader. Under the influence of multiple factors such as political pluralism, economic integration, social openness, and technological revolution, non-traditional security has emerged and become intertwined with traditional threats. Intelligent war subjects and categories have continued to expand, war time and space have continued to extend, and war and peace have followed each other like a shadow. And intertwined, the war system will further transcend local geographical restrictions, move from relatively closed to more open, and form a higher-level and larger-scale confrontation. Dissipative warfare emphasizes the comprehensive efforts of intelligent warfare systems in the physical domain, information domain and cognitive domain, and highly unifies and incorporates political competitions, economic competitions, military offensive and defensive, cultural conflicts and diplomatic checks and balances into the category of confrontation between ourselves and the enemy, adapting to the world. The requirements of the times as the security situation develops.
In line with the objective laws of the evolution of the war forms. The dissipation phenomenon of the war system has always existed since the emergence of war. However, before the emergence of intelligent war forms, due to technological constraints, it was always in a relatively low-level and simple state. War confrontation can only manifest itself in material consumption and energy. A certain form of dispersion and information diffusion. During the agricultural era, the forms of warfare were mainly represented by cold weapon warfare dominated by material elements and centered on the human body. During the industrialization era, the forms of warfare were mainly represented by thermonuclear weapons and mechanized warfare dominated by energy elements and centered on platforms. In the age of informatization, the forms of warfare are mainly characterized by information warfare dominated by information elements and centered on the network information system. Entering the era of intelligence, intelligent technology highly unifies the cognitive advantages, decision-making advantages and action advantages in the confrontation between ourselves and the enemy. In essence, it highly unifies matter, energy and information. Through intelligent empowerment, intelligent energy gathering, and Intelligent energy release has formed an intelligent war form dominated by intelligent elements and centered on intelligent algorithms The main form of expression is dissipative warfare that reflects the confrontation of complex systems of intelligent warfare.
With solid support of philosophical theoretical foundation. Social form is the matrix of war form. To explore and understand intelligent war, we must comprehensively examine the evolution of war form and the social form in which intelligent war is located based on the basic principles of historical materialism and dialectical materialism, and build a new concept of war. and contextual system. From a philosophical point of view, matter, energy and information are the three elements that make up the world. Matter embodies the existence of origin, energy embodies the existence of movement, and information embodies the existence of connection. The progressive alternation of the three dominates the evolution and operation of social forms and war forms. According to the negative principle of the negation of dialectical materialism, in the intelligent era after the information age, the elements that dominate society will take the turn of matter again after matter, energy, and information. However, this matter is formed after a highly informatized spiral. The main feature of new substances is that they have intelligent technical attributes. Thus, in essence, dissipative warfare is the highly unified nature of the intelligent element in terms of the characteristic advantages of matter, energy, and information in previous low-order war forms, and the highly unified nature of forms such as material consumption, energy release, and information diffusion prevalent in warfare, reflecting the typical characteristics of intelligent warfare.
Deeply grasp the inner essence of dissipative warfare
Dissipative warfare is based on the real world and covers the virtual world. It adapts to the rapid development of intelligent technology, the rise of non-traditional security threats, and the continuous expansion of the main body and scope of warfare, and presents many new features.
Antisynthetic game. As the intelligent war form accelerates to a higher depth and breadth, and the political, economic, cultural, diplomatic and other fields become more interconnected and influence more widely, the focus of war begins to shift from the military system to the social system, and the war stakeholders Confrontation will be reflected in various forms of comprehensive games such as political competition, economic competition, military offensive and defensive, cultural conflicts, and diplomatic checks and balances The war superiority pursued is no longer limited to the field of military confrontation. The winner of the war must adapt to the requirements of openness, complexity and emergence of the war system, and shift from the extensive consumption and use of a single substance, energy and information to the dissipation of the war system dominated by intelligent advantages, striving to win initiative and advantage in a multi-field comprehensive game.
Subjects cross-domain multivariate. The subjects of intelligent warfare are becoming increasingly general, and the potential forces of war that traditional warfare needs to mobilize will be in a state of normalized confrontation. Political forces, institutions and personnel of all kinds, together with troops and servicemen fighting on the battlefield in the traditional sense, constitute the main body of the war. Diversified war subjects will span the real and virtual domains and appear in multiple spatial domains such as land, sea, air, sky, electricity, and psychology, covering physical domains, information domains, cognitive domains, etc., and covering political, economic, cultural, diplomatic and other social domains. For example, “civilians in society can use smartphones to collect information on the military battlefield and transmit it to war stakeholders, causing the proliferation of key information about war, thereby affecting war decisions or the victory or defeat of a battle and battle”.
Enrichment. The virtual and real forces are one. Around the purpose of war, all possible real and virtual forces will be integrated with the support of intelligent technology, performing duties and acting according to regulations on parallel battlefields; with or without force. Unmanned combat forces will achieve a high degree of autonomy after going through the stages of manual operation, manual authorization, and human supervision, and can be deployed and combined with various types of manned forces on demand, effectively synergizing and coexisting in parallel under the constraints of common war rules; multi-party forces are integrated. Based on the broad contacts in various fields and the common purpose of the war system, all parties, including the party, government, military, police and civilians, closely cooperate and act in a unified manner between military operations and political, economic, diplomatic, public opinion and legal struggles to form a comprehensive combat force. In short, under the integrated planning of countries or political groups, the diverse participating forces in intelligent warfare, although physically dispersed, can focus on common war purposes to achieve logical concentration, instant enrichment, complementary advantages, and integration.
Efficacy cumulative emergence. The high-order war forms, while having new qualitative technical characteristics, still include the characteristic advantages of the low-order war forms. Dissipation warfare emphasizes continuous comprehensive confrontation in multiple domains, which includes both the consumption of ammunition, supplies, equipment and even combatants at the material level, as well as the continuous collection and release of energy levels, including through data, knowledge, algorithms at the information level. The diffusion and fusion of etc. have an unlimited impact on people’s thinking and cognition, value pursuit, moral concepts, emotional will, behavior patterns, etc. Under the normal deterrence of nuclear weapons, intelligent warfare has shown a downward trend of bleeding, but political isolation, economic blockade, cultural conflicts, diplomatic strangulation, etc. will become more severe and intense. When the role of various systems such as military, political, economic, cultural, and diplomatic systems continues to play, and the accumulation of effectiveness reaches a certain level, the war system will increase negative entropy, thereby achieving sudden changes in combat power and the emergence of system effectiveness, thereby gaining war advantages.
Fight a good dissipative war in the “select the right combat focus”
The intelligent warfare system maximizes the combat effectiveness of the system by enriching and integrating internally, suddenly emerging externally, increasing efficiency across domains, and dissipating intelligence. This is the winning mechanism contained in dissipative warfare. To win the victory in intelligent warfare, it is necessary to clarify the combat focus of dissipative warfare, identify the focus of war preparations based on the shortcomings and weaknesses of the opponent’s system.
Focusing on the openness of the system, closing off and isolating the opponent’s war system. Interrupting the exchange of material, energy and information between the adversary’s war system and the external battlefield environment, so that it lacks channels for the source of material, energy and information, and gradually moves towards isolation, closure and weakness. For example, “At the strategic level, political isolation is used to isolate the opponent’s war system, causing the system entropy to increase”. At the “campaign level”, methods such as cutting off data sources, destroying data backups, falsifying data, and tampering with information can be used to comprehensively use soft and hard means to force the war system to transform into a closed state, thereby reducing the effectiveness of the opponent’s system.
Focusing on the complexity of the system, it breaks down the adversary’s war system in different domains. The more and more closely connected the elements of an intelligent warfare system are, the less reliable the architecture will be. Using the principle that each layer in a complex system is relatively independent, strategic overall, campaign local and tactical action strategies can be formulated to achieve hierarchical and domain-based attack on the enemy’s war system. For example, “At the strategic level, the use of economic blockade greatly weakens the opponent’s war strength and development potential”. At the “campaign level”, we take advantage of the vulnerability of the combat system communication network, use network-to-electric composite attacks as the basic path and means, and use methods such as “destroying terminals, attacking elements, isolated groups, disconnecting networks, and breaking clouds” to break through the opponent’s combat system structure and promote The opponent’s war system “collapse”.
Focus on “system emergence and dismantle the system of evacuation of opponents”. Only when there are sudden changes and emergent effects in the intelligent warfare system can the system’s effectiveness be quickly formed and exerted, and the advantage of dissipative warfare be gained. It is not possible to form an emergence of advantages if only individual components or elements come into play. It is foreseeable that the current emerging technologies such as ChatGPT and more advanced intelligent technologies in the future will provide new ways of thinking to understand and discover the operating behaviors, states and laws of complex systems of war, as well as new means to explore objective laws and transform nature and society, the superior party in war confrontation will reduce the coupling degree of the opponent’s war system through a parallel confrontation method that combines virtuality and reality Achieving the purpose of dismantling the system of evacuation of enemy warfare.
As the world continued to actively combat the COVID-19 pandemic, the British newspaper The Guardian reported in late May 2021 that Fazze, a public relations and marketing agency with close ties to Russian officials, was accused of providing funding to influential YouTubers, bloggers, and other opinion leaders in France, Germany, and other European countries to spread false information claiming that vaccines like Pfizer (BNT) and AstraZeneca (AZ) had caused hundreds of deaths. The false information also criticized the EU vaccine procurement system for harming public health in European countries, with the goal of sowing public distrust of Western vaccines and shifting public acceptance toward Russia’s Sputnik V vaccine. This is the most significant example of “perception warfare” in recent international history.
In fact, human society has always adhered to the principle of “conquering the enemy without fighting” as the guiding principle for optimal military operations. While traditional warfare still primarily takes place in physical space, victory requires the physical capture of cities and territories, as well as the destruction of enemy forces. However, as humanity’s understanding of the nature of war deepens, the use of information technology has become a new trend in warfare, enabling the achievement of traditional combat effectiveness without the need for physical engagement. Given the increasing attention paid to “information warfare” and “hybrid warfare,” this article discusses the closely related concept of “cognitive warfare,” exploring the emerging threats facing our country and our national defense response strategy.
Whether it’s what the US calls “hybrid warfare” or what Russia calls “information warfare,” the implications are quite similar: centered on the cognitive realm, the use of information to influence and manipulate targets, encompassing both peacetime public opinion and wartime decision-making. The rise of Nazi Germany after World War I was arguably the first modern regime to master the use of information to shape perceptions within its own country and even abroad. Its successful use of propaganda and lies, delivered through various communication technologies, was highly successful. Principles such as “repetition is power” and “negative information is more easily accepted and remembered than positive information” would later profoundly influence authoritarian governments, including Russia.
Using information capabilities to subvert national regimes
At the beginning of the 21st century, Russia began to pay attention to the situation where international discourse power was completely controlled by Western countries. It successively put forward theories such as “Information Warfare Theory” and “Sixth Generation Warfare Theory”, arguing that the sixth generation of warfare is a non-contact war that uses precision weapons and information warfare to traverse the battlefield. The purpose of war is no longer a devastating global war, but to achieve effects that cannot be achieved through traditional warfare by exploiting the enemy’s information capabilities to exploit its weaknesses, including changing social and cultural orientations and values, and thus subverting national regimes.
In 2005, Russia established the international news channel “Russia Today.” Initially focused on soft power propaganda, it shifted its focus after the 2008 Georgian War to attacking negative aspects of Western society and fostering conspiracy theories. The 2014 Ukraine crisis became a training ground for Russian information warfare forces. Using electronic jamming and cyber theft, they intercepted Ukrainian communications, inferring subsequent Ukrainian actions and releasing damaging information at critical moments. They also targeted sensitive issues in eastern Ukraine, including the status of ethnic Russians and economic downturn, distributing a large amount of carefully selected, targeted information to resonate with the public, influencing their perceptions and behavior and gaining control of media opinion. In terms of “cognitive warfare,” Russia’s approach has been successful, and has become a model for the Chinese Communist Party.
Manipulating “brain control” to control the public
In 2014, the Chinese Communist Party (CCP) proposed the cognitive operational concept of “brain control,” building on its past “three warfares” of psychological warfare, legal warfare, and public opinion warfare, as well as Russia’s theoretical framework of “information warfare.” It states that a nation’s cognitive space is composed of the superposition of countless individuals, and that “brain control” uses national languages, propaganda media, and cultural products as weapons to comprehensively infiltrate and control the cognition, emotions, and consciousness of the general public and national elites, ultimately distorting, disintegrating, and reshaping their national spirit, values, ideology, history, and culture, thereby achieving the strategic goal of winning without fighting.
Therefore, the CCP’s “cognitive operations” fall under the broad category of psychological warfare. In the era of information globalization, it integrates information warfare, psychological warfare, and public opinion warfare, becoming the core of the CCP’s overall strategy. Since the 2016 military reform, it has been led by the newly formed “Strategic Support Force” and implemented at all political and military levels. On the one hand, the PLA has adopted American operational thinking in the field of “cognitive operations,” using units such as the 311 Base, the National University of Defense Technology, and the Academy of Military Sciences to develop tactics such as “psychological operations,” “ideological operations,” “consciousness manipulation,” and “strategic communication” to strengthen the “cognitive operations” capabilities jointly constructed by military-civilian integration and joint combat systems. On the other hand, it uses professional personnel to operate media platforms, shape the public opinion environment, and introduce “cognitive operations” into the actual combat application stage.
The CCP’s recent “cognitive warfare” offensive against Taiwan reveals its methods and tactics. First, the CCP primarily uses the internet to collect personal data from Taiwanese citizens, using big data databases to categorize information by target group, based on political leanings, age, occupation, and other factors. Second, it leverages intelligence gathering to launch targeted cognitive attacks on specific social media platforms, influencing the psychology of the targeted groups, particularly by releasing disinformation to weaken and distract Taiwanese society. Third, it employs online virtual organizations to set up fake social media accounts, infiltrate online communities, and disguise themselves as whistleblowers, deliberately spreading fabricated information to create confusion. Cybertroopers then massively repost and discuss this information, manipulating audience perceptions and creating a cycle of disrupting information retention, manipulating cognitive psychology, and altering thinking patterns.
Identify fake news and fight back together
At this stage, the CCP’s campaign for “brain control” over Taiwan aims to influence Taiwanese society’s cognition, distorting public opinion, devaluing democratic values, intensifying opposition, disrupting political conditions, and undermining public trust in the government. The following preventive measures can be taken within the national defense system:
1. Strengthening educational functions
Through national defense education in schools, institutions, and society, we will raise the public’s awareness of the threat posed by the CCP’s “cognitive warfare” and their ability to identify false information, and cultivate the habit of rationality, verification, and calmness.
2. Follow the constraints
Although there are currently no internationally accepted legal rules that can clearly define the extent to which cognitive warfare constitutes an act of war, making it even more difficult to hold people accountable, media platforms can still strengthen the review of their own reporting content in accordance with existing regulations, and the public can also refrain from spreading suspicious information and following the trend of tennis melee, so as to facilitate the establishment of information verification measures and mechanisms.
3. Combining Military and Civilian Strength
Incorporate information and communication-related institutions and industries into the national defense mobilization mechanism, coordinate in peacetime the review, analysis, and disposal of fake news, strengthen talent training and research cooperation, and enhance the capabilities of professional units of the government and the national army; in wartime, cooperate with the overall national actions and carry out countermeasures.
Currently, Taiwan already has the National Security Bureau’s National Security Operations Center responsible for responding to controversial information from hostile foreign forces. There’s also the non-profit Taiwan Fact-Checking Center. Facing the challenges of cognitive warfare, we must continue to integrate various sectors, strive for international intelligence exchange and experience sharing, optimize the media environment, collaborate across multiple channels, and instantly identify the authenticity and source of information, jointly building our offensive capacity to respond to cognitive warfare.
Conclusion
In reality, all countries around the world face threats related to cognitive warfare and information-based psychological warfare. However, democratic and free societies are by no means vulnerable to cognitive warfare attacks and must instead rely on diverse strategies and methods to protect them. We aim to establish a more comprehensive and substantive framework, build a powerful counterforce, and enhance the quality and discernment of our citizens, thereby gaining immunity from the CCP’s cognitive warfare campaign to seize control of our minds.
(The author is a PhD candidate at the Institute of Strategic Studies, Tamkang University)
With the approval of Xi Jinping, Chairman of the Central Military Commission, the Central Military Commission issued the “Outline of Joint Cooperation between the People’s Liberation Army of China (Trial Implementation)”, which will come into effect on November 7, 2020.
The Outline focuses on building a legal system for joint operations and strengthening the clear orientation of preparing for war. It is of great significance to consolidate and deepen the results of the reform of the leadership and command system, scale structure and force composition, and to promote the liberation and development of our military’s joint operations capabilities.
The Outline is the top-level regulation of our military’s new-era combat doctrine system. It focuses on clarifying the basic issues of joint combat organization and implementation, unifying combat thinking, clarifying responsibilities and procedures, and guiding combat operations. It also clarifies major principles, requirements, and basic procedures for joint combat command, combat operations, combat support, national defense mobilization, and political work.
The Central Military Commission requires that all levels should earnestly study and implement the “Outline”, adhere to combat effectiveness as the only fundamental standard, use the “Outline” as the basic basis for organizing and implementing joint operations and joint training, and comprehensively improve the ability to win in the new era.
The battle flag hunt, the military parade ground was full of ups and downs, and the climaxes continued——
From north to south, the surging iron torrents train elite soldiers; in the deep blue ocean, soldiers step on the waves to forge sharp swords; above the vast sky, eagles fly thousands of miles towards the blue sky; deep in the dense forests, the east wind roars to the sky; the skynet controls power, and the invisible war defeats the visible… One after another joint combat exercises are gradually unfolding in multiple domains and all dimensions, presenting a picture of a strong army that trains together to plan for war, uses training to promote war, and wins war through strong training, sounding the strong note of a new era in the history of our army’s training and preparation.
Over the past year, the world has been undergoing unprecedented changes unseen in a century, intertwined with the global COVID-19 pandemic. Under the sky shrouded by the epidemic, the international situation has been in constant turmoil and confrontation. The drone warfare that has shined in the Nagorno-Karabakh conflict has shown the world the unique characteristics of modern warfare.
“When times change, things change. When things change, we must be prepared for change.” In the future, “what kind of war to fight and how to fight it” carries the heavy mission, and the entire military is surging with enthusiasm for researching and winning wars.
Faced with new changes in the national security situation, new threats from powerful enemies and adversaries, and new developments in the form of warfare, we urgently need to provide answers to strengthening the military, winning battles, and meeting the needs of the times.
“Overall, modern warfare has indeed undergone profound changes. These changes may seem dazzling, but there are regularities behind them. The fundamental thing is that the winning mechanism of war has changed.” Faced with the rapid development of the new world military revolution and changes in the war situation, under the guidance of the commander-in-chief and in accordance with the unified deployment of the CMC’s policy and system reforms, the CMC Joint Staff Department organized experts from the Academy of Military Sciences and capable personnel from relevant departments of the CMC, various theater commands, various military services and armed police forces to form a joint research group to pool wisdom and strength to tackle key problems and advance the formulation of new-era combat regulations.
On November 7, 2020, the “Outline of the Joint Cooperation Warfare of the People’s Liberation Army of China (Trial Implementation)” was implemented throughout the army, marking a new coordinate system for our army’s joint cooperation war in the new era.
Since the issuance of the Outline, commanders have taken the lead in learning it, agencies have taken the lead in studying it, and troops have practiced learning it. The officers and soldiers of the whole army have been enthusiastic about learning and publicizing the Outline. A great discussion on joint operations in the new era, a great liberation of thoughts, and a great practice of preparation for war have been vigorously carried out in the whole army.
Pointing to victory, leading the new practice of preparing for war in the new era
“Following the main road, who would you follow to seek a shortcut?” In the world of soldiers, there is no such thing as “easy”. The only way to win a battle is to be prepared.
What kind of war we will fight in the future will require innovative tactics; if we cannot innovate tactics, it will be difficult to win future wars.
In essence, combat regulations are about solving the problem of how to fight and how to win, and are the refinement, deepening and concretization of military strategic policies. The Outline of Joint Cooperation of the People’s Liberation Army of China (Trial) (hereinafter referred to as the Outline) deeply studies the characteristics and laws of future wars, accurately grasps the era characteristics of the integrated development of mechanization, informatization and intelligentization of our army, and through the forward-looking and concrete design of future operations, implements the spiritual essence and content requirements of the new era’s military strategic policy into the troops’ preparation for war.
The Outline is not only a guideline for preparing for war, but also a guideline for winning joint operations.
At the beginning of the new year of 2021, a certain area of the Eastern Theater Command is organizing a multi-service, multi-directional, systematic combat training. Under the guidance of the newly issued “Outline”, this exercise involves the full-domain linkage of land, sea, air, space, network and electric power, close coordination of political and public opinion, and information-led throughout the entire process from combat preparation to situation shaping to mission implementation. All units work closely together, demonstrating the firm determination and strong ability to maintain national unity with a thunderous momentum, and also witnessing the transformation of our military joint cooperation from “formal linkage” to “spiritual linkage”.
In the west, at midnight in mid-spring 2021, a series of urgent alarm bells rang. According to the level transfer order of a certain base of the Western Theater Air Force, the officers and soldiers of a certain air defense battalion of the Army quickly rushed to their positions, and the level transfer time was further shortened. According to the unified deployment, more than 10 Army air defense forces in the theater air force responsibility area entered the Air Force command chain in an organized manner, breaking the information barrier of the services, sharing early warning information, and jointly taking on combat readiness duty, and initially forming a joint air defense combat system. “You lend me the ‘eye in the sky’, and I will help you with the ‘iron fist'”, the integrated joint air defense combat across the services has taken a new step and entered a new stage.
In the north, at the beginning of the summer of 2021, war eagles soared and iron currents rolled, and an exercise with the theme of air-ground joint operations was in full swing. According to the plan, a certain command post of the Air Force of the Northern Theater Command and a certain group army of the Army jointly organized a brigade-level command post exercise to study and explore the composition of joint command institutions and test the integrated joint combat command capabilities of the command post personnel. Intelligence analysis and processing, joint firepower strikes, and integrated rear-end support were coordinated and planned and carried out in an integrated manner, and the command institutions were organized in an integrated manner with all elements. Through repeated joint combat and training, the policy of leading training through combat and carrying out combat through training has been further implemented, and the joint combat and command capabilities of commanders of all services and arms have been significantly improved.
In the direction of the South China Sea, war eagles roared and attacked fiercely, dragons took off and stepped on the sea and waves, radars flew and missiles raised their heads… Under the unified command of the theater joint command, all mission forces worked as a whole and coordinated closely to quickly build a battlefield layout that was multi-domain joint, both offensive and defensive, and deployed in echelons. They adopted a combination of centralized command and decentralized command, and flexibly carried out sea and air escort and deterrence and expulsion in a reasonable, forceful and restrained manner, effectively maintaining peace and tranquility in the South China Sea.
In the past year since the implementation of the Outline, the orientation of preparing for war has become clearer and firmer, the sole fundamental standard of combat effectiveness has been more firmly established, training and preparation for war as the main responsibility of the troops has become more prominent, researching and planning war as the primary responsibility of officers and soldiers has become clearer, the ideas and measures for joint operations and victory have become increasingly effective, and the entire army has continued to set off a new upsurge in training and preparation for war.
Keep pace with the times and clarify the new mechanism of joint cooperation in the new era
“All beneficial ways go with the times.”
Military theorist Douhet once said: “Victory smiles only on those who can foresee the changes in the character of war, not on those who wait for the changes to happen and then adapt to them.”
Looking around the world, the game and struggle among major powers are intensifying, the threat of war exists, the war situation continues to evolve, new military reforms are booming, stealth, unmanned and intelligent weapons and equipment have become the mainstream trend, the battlefield space has expanded to all domains and dimensions, the integrated linkage of combat forces has become the norm, combat command, action and support have become more sophisticated, and winning future wars requires the support of more advanced combat theories.
The gap in combat concepts is the fundamental gap, and the backwardness of combat theory is the biggest backwardness. When modern wars are surging in the world, what is most needed is newer and braver minds.
The new-era combat regulations, led by the Outline, adhere to Xi Jinping’s military strategic thinking and the new-era military strategic policy as the soul and outline, deeply grasp the new changes in national security, new adjustments in combat opponents, new designs in strategic layout, new connotations of active defense, and new developments in combat guidance, and materialize the principles and methods of commanders’ understanding and guidance of war into norms and standards for the specific implementation of the troops, so as to promote our military-joint cooperation war to a higher level.
——It comprehensively expounds the contemporary connotation of war guidance under information conditions.
The Outline aims to win future high-end wars, accurately grasps the characteristics of lowered thresholds for future armed conflicts, blurred boundaries of war, and increasingly prominent mutual influence and efficiency between the war field and other fields, strengthens the political and social attributes of combat operations, innovatively develops military struggle paradigms, emphasizes relying on the country’s integrated strategic system and capabilities, emphasizes the integration of war and non-war domains, emphasizes the comprehensive implementation of military and political, diplomatic, economic, cultural and other means, and gives full play to the overall advantages of the party, government, military, police and people. It reflects the modern war concept and the war guidance for winning the people’s war and total war in the new era.
——All elements standardize the style and methods of our joint military operations.
The Outline is based on the tasks and development of our army, and systematically expounds on the possible joint operations in the future, covering the core missions of various strategic directions, covering land, sea, air, space, network and electromagnetic multi-dimensional space. At the same time, it also creatively summarizes the basic types of joint operations, highlights the basic actions that run through the joint operations and have common characteristics, and forms a closed-loop chain of joint operations with all elements and in all fields.
——The joint combat command system and organizational operation mode were designed throughout the entire process.
The implementation of joint operations organizations is extremely complex and difficult. Whether they can be “coordinated” in terms of strength, “joined” in operations, and “excellent” in effectiveness depends crucially on whether they can achieve “unification” in command. The “Outline” focuses on building a strong and efficient joint operations command structure, closely integrates the Central Military Commission and the theater joint command operation model mechanism, fully considers that it not only complies with the general direction and general requirements of the reform, but also leaves room for flexible formation in practice. It focuses on solving major issues such as the construction of a joint operations command system, the differentiation of command authority and responsibility interfaces, and the integration of services into the joint system, so as to ensure that thousands of troops and horses can jointly act under unified orders.
Taking joint training as the guideline, promoting a new leap forward in joint training in the new era
At the Central Military Commission’s military training conference, President Xi Jinping stressed the need to strengthen joint training, adhere to joint training as the key, develop a joint training system with Chinese characteristics, and accelerate the improvement of integrated joint combat capabilities. Soldiers should be trained in the way they fight, and troops should be trained in what is needed for fighting. Today’s world-class armies all regard improving joint training as the top priority for war preparation.
The Outline is the opening chapter of the new era combat doctrine and the guiding principle for the transformation of joint training in the new era. The Outline provides direction, inspires vitality, and gives birth to a new pattern of joint training in the new era.
——Incorporate combat into training to present an “integrated posture” of training.
In the Taiwan Strait, the naval and air fleets carried out joint combat readiness patrols to test and enhance the joint combat capabilities of multiple services, maintain a high state of alert at all times, and resolutely defend national sovereignty and territorial integrity. Exercise preparation is combat preparation, and the exercise state is the combat state. Joint military exercises are no longer simple training activities, but have become a preparation process to promote combat readiness and enhance capabilities. Joint training, the “source” and “main stream” full of power, is guiding and driving the in-depth advancement and vigorous development of military struggle preparations, and fully unleashing the role and effectiveness of training to carry out combat and training to promote preparations.
——Systematic training has become the “new normal” of joint training.
“East”, “South”, “West”, “North”, and “Central” are joint live-fire exercises organized by various theater commands, “Crossing”, “Mobility”, “Red Sword”, “Sky Sword”, and “Joint Logistics Mission” are series of systematic exercises organized by various services, covering all seasons, all weather, and all regions. The CMC, theater commands, and services are responsible for division of labor, overall design, and systematic organization. They are decomposed from top to bottom and integrated from bottom to top, driving the operation and inspection of the joint combat system. Joint exercises and systematic training present a new look, and new changes have taken place in the training and preparation mode. Our military’s joint training has entered a new stage of all-round transformation and overall improvement.
——Joint training between China and foreign countries highlights the “integration” of joint exercises.
At the foot of the Helan Mountains and in the heart of the Bronze Gorge Desert, the “Western Joint-2021” China-Russia joint exercise was booming. In this joint exercise, the Chinese and Russian militaries were mixed and planned together. The two sides shared their positions, coordinated closely, and acted together. They practiced more than 20 subjects such as joint air defense, joint obstacle removal, and joint three-dimensional seizure. With the support of the deeply integrated combat system between China and Russia, new breakthroughs in joint exercises and training were achieved. “Maritime Joint”, “Common Destiny”, “Peace Mission”… With the joint training between China and foreign countries as a “window”, the new changes in the joint training of the Chinese military are being brilliantly presented to the world.
——Intensive training in new domains, demonstrating an “open attitude” in research and warfare.
In joint exercises, underwater unmanned “fish schools”, land unmanned “wolf packs”, and air unmanned “bee swarms” began to emerge. New domains and new types of forces such as land aviation, special operations, electric power, unmanned, network, and aerospace were deeply integrated into the joint combat system and the joint exercise process, and realistic combat scenarios were carefully constructed to accurately experiment with modern war organization and management. As the most active practice area for preparing for war, joint training, with an innovative and open attitude, boldly tried and made great strides towards the new combat areas pointed out in the Outline.
Integrating war and construction to shape a new pattern of system construction in the new era
President Xi stressed that we must adhere to the principle of building the country in accordance with war, strengthen the coordination of war and construction, speed up the promotion of major strategic, leading and fundamental projects, and accelerate the creation of a high-level strategic deterrence and joint combat system.
If the “trouble” in the construction of the joint combat system is not resolved quickly, once the “interest” of the debt accumulates, it will become a “pain” on the battlefield tomorrow. From the perspective of war, the “Outline” calibrates the “sight” of construction and firmly points to the correct direction of military construction.
——Calibrate the construction “sight” to point to the needs of joint operations.
Under the guidance of the Outline, the concept of jointness has been gradually established, and the barriers of “coordination” of military operations and “integration” of combat domain capabilities have been gradually broken down. The land, sea, air, and fire arms have been combined in the same domain, and cross-domain integration of combat domains such as space, network, and electromagnetic space has gradually become a reality. With the support of the network information system and combat data information as the link, a full-time and smooth command link has been built. The system is internally connected to each combat sub-center, and is connected to each combat group (team) command post. When necessary, it can directly reach the end of the individual platform to achieve joint command to the end. All operational forces worked together around the overall intention, realizing the transformation of the joint combat concept from focusing on the “service attributes” of combat forces to focusing on the “operational domain”, which has become the main feature of future joint combat. Studying, planning, and training for war with the “Outline” has become a trend throughout the military.
——Calibrate construction’s “sights” to point to system shortcomings and weaknesses.
Based on the Outline, our army insists on combining inheritance and innovation, theory and practice, innovatively designs strategies for winning future wars, focuses on highlighting problem orientation, takes root in training and preparation for war, promotes the construction of joint combat command system and new combat force construction, and effectively solves the outstanding shortcomings and weaknesses in military combat preparation. In mid-May 2021, the Party Committee of the Northern Theater Command held a special war meeting, and in accordance with the Outline, thoroughly identified contradictions and problems in joint combat research, command and control mode transformation, joint handling level, and efficient command capabilities. According to the Outline, it optimized system support, improved command and control methods, and improved command means, which promoted the transformation of the operation mode of the theater joint command center and the improvement of command effectiveness. Looking across the entire military, similar practices are becoming more and more common. Referring to the Outline to find gaps, ideas, and methods in the near and long term has become the new mainstream for planning and promoting construction at all levels and in all fields.
——Calibrate the construction “sight” to point to the urgent need to balance powerful enemies.
To implement the principle of building the military in accordance with war and coordinating the military construction, we must not only focus on solving current practical problems, but also pay attention to solving long-term development problems. The Outline is anchored on the future of defeating the strong and contains a far-sighted plan to build a world-class military. Guided by the Outline and focusing on changes in the war situation and changes in scientific and technological development, the construction of asymmetric means to check and balance powerful enemies has ushered in a qualitative leap. Batches of new drones, new helicopters and other advanced weapons and equipment have been tested and deployed, and a series of high-tech equipment has been deployed and developed, which has given us more confidence and stronger capabilities to win the war. The Outline condenses the “war code” of historical wisdom and also integrates the way to build first-class and win the future in the new era.
“But look at the path you have come from, and you will see verdant and green mountains.” One year after the implementation of the Outline, the new-era combat regulations are releasing capabilities and increasing efficiency in building a joint combat system with Chinese military characteristics.
In the new era and new journey, our path of joint military operations will surely become broader, our ability to defend the country’s strategic development interests will surely become stronger, our confidence in winning future informationized wars will surely become firmer, and the great goal of building a world-class military will surely be fully realized.
“We have a string that is tightly tied to us, a mission that we shoulder, and a storm that we are watching closely… We are always ready!”
In recent years, with the development of intelligent unmanned technology, the navies of developed countries in the world have proposed the concept of “distributed lethality” with surface ships as the main body, aiming to achieve distributed maritime operations and gain battlefield advantages. Distributed maritime operations aim to integrate combat platforms in multiple domains, build an all-round three-dimensional situational awareness network, and form a seamlessly linked combat system of manned platforms and distributed unmanned platforms through communication networks throughout various domains and an integrated command and control system, thereby improving the overall combat and strike effectiveness.
The concept of distributed maritime operations
Distributed maritime operations are the integration and expansion of combat concepts such as “distributed lethality” and “manned-unmanned collaborative operations”. The main idea is that large-scale, multi-purpose, high-value combat platforms are no longer required to independently complete diversified combat missions, but rather the main combat capabilities such as reconnaissance, command, strike, and interference are dispersedly deployed on various heterogeneous unmanned platforms in various combat domains. A highly resilient combat system is formed by the fusion of a small number of manned platforms and a large number of distributed unmanned platforms, which can complete various complex combat missions through efficient, precise, and real-time collaboration. This combat system includes a small number of high-value manned platforms and a large number of low-cost unmanned platforms. The manned platforms serve as battlefield decision makers, responsible for relatively complex tasks such as combat plan planning and combat mission allocation and implementation; the unmanned platforms are used to perform relatively dangerous or simple tasks such as situational awareness and fire strikes. Manned/unmanned platforms work closely together to complete combat missions.
The essence of distributed maritime operations is to seamlessly link and organically integrate high-value manned platforms and low-cost unmanned platforms at sea, and to achieve common operational goals through high information sharing, precise task aggregation, and efficient operational coordination. It has the remarkable characteristics of on-demand sharing of operational information, deep integration of operational tasks, precise planning of operational resources, and optimized organization of operational processes. Through manned/unmanned distributed coordination, a new type of efficient maritime combat system can be formed that complements each other’s strengths, integrates functions, and has complementary capabilities. Distributed maritime operations highlight the combinability, consumability, and “decentralization” of force utilization, and focus on the deep embedding and comprehensive application of artificial intelligence technology, which can enhance the resilience of the combat system and promote the development of joint global operations in the maritime direction towards intelligence.
Typical characteristics of distributed maritime operations
At present, intelligent unmanned equipment is developing rapidly, and is increasingly possessing advantages such as human-equipment integration, cross-domain coordination, cluster confrontation, and autonomous combat. Distributed maritime combat is accelerating to present typical characteristics such as wide-area distribution coordination, cross-domain multi-dimensional integration, and manned and unmanned integration.
Wide-area distributed coordination. Wide-area distributed coordination means that various combat elements or combat resources can be adaptively optimized and combined and dispatched according to the battlefield situation, so as to realize the precise energy concentration and release of the combat system. The first is the distributed deployment of the combat system. In distributed maritime operations, the combat space is deeply embedded in various combat domains, and the combat forces can be distributed and deployed in a decentralized wide area. The second is the intelligent reconstruction of the combat system. The combat system is lighter, more capable, and more agile, and its battlefield environment adaptability and system dynamic optimization and reconstruction capabilities are significantly enhanced, and it can quickly and flexibly adjust the required combat forces and battlefield resources. The third is the concentrated release of combat energy. The combat system can achieve rapid mobility, real-time response and coordinated operations of various combat platforms and combat forces in the global combat space through semi-autonomous or autonomous coordinated control of equipment, ensuring the precise concentration and release of combat forces.
Cross-domain multi-dimensional integration. Distributed maritime operations transform the centralized combat group mode into a distributed, agile combat mode. Various combat units are distributed in multiple combat domains, which can realize the monitoring and positioning of cross-domain targets, and then implement effective strikes. The first is the cross-domain integration of combat forces. The combat forces deployed in multiple domains will be dynamically networked through intelligent systems to form a cross-domain combat system. The second is the seamless connection between strategy, campaign, and tactics. New domain and new quality combat forces will directly participate in intelligent naval warfare as the main combat role, achieving comprehensive coverage from strategy to campaign, seamless connection from campaign to tactics, giving birth to a new quality combat capability of rapid assault, multi-dimensional integration, and full-domain offense and defense, and realizing cross-domain coordinated strikes on combat targets.
Manned and unmanned are one. Distributed maritime operations can rely on a large number of intelligent unmanned equipment to form a “manned-unmanned” joint strike system with high autonomy and coordination. By accelerating the development of unmanned equipment such as ship-borne drones, surface unmanned boats, and underwater unmanned vehicles, long-, medium-, and short-range echelon configurations can be achieved, and cross-domain integration of unmanned equipment such as air, surface, underwater, and land can be achieved. The unmanned and manned equipment systems are seamlessly integrated, and the mission domain is expanded from information assurance to firepower strikes. This will promote changes in maritime combat styles, accelerate the formation of new combat styles such as manned system collaborative operations, unmanned system single operations, unmanned system cluster operations, and frontier preset operations, and achieve a subversion of traditional manned combat styles.
The winning mechanism of distributed maritime operations
The reason why major scientific and technological progress can promote the evolution of the war situation is largely because it has profoundly changed the mechanism of winning wars. At present, cutting-edge technology has significantly improved the level of equipment intelligence, profoundly changed the combat power generation mode, and accelerated the evolution of the mechanism of winning naval battles.
“Distributed interconnection, human-machine collaboration” wins. The distributed, intelligent, and networked command information system built on cloud computing, data chain, Internet of Things and other technologies has brought profound changes to modern naval warfare. Supported by the cloud edge, the command information system realizes real-time interaction between various combat platforms through high-speed and secure network connections, significantly improving the information interconnection, interoperability and interoperability between different combat platforms; it can efficiently analyze and process massive battlefield information, accurately judge the battlefield situation, and transform combat command to an intelligent decision-making method centered on “data, algorithms and models”; commanders at each node share information in real time in the cloud network, synchronously judge the situation, and coordinate command, so that command and control activities are concise and optimized, and combat decisions are more efficient and accurate. In addition, under “distributed interconnection”, intelligent unmanned combat has developed from a single platform to a multi-platform cluster, and from remote-controlled combat to semi-autonomous and autonomous combat. Multiple “single-person-single-machine” command chains running in parallel have gradually formed a single simple command chain of “commander-unmanned combat cluster”. Through the efficient and autonomous coordination of manned platforms and unmanned platforms and their clusters, the combat potential of intelligent unmanned equipment can be fully activated, and the advantages of various advanced equipment can be maximized.
“Algorithm-driven, fast and accurate cognition” wins. In intelligent warfare, advanced algorithms replace commanders’ thinking through precise and high-speed calculations, promoting the accelerated integration of rational combat knowledge and emotional commander experience. With advanced algorithms, we can quickly and accurately understand the situation on the naval battlefield, and then accurately and quickly plan scientific and feasible combat plans for changes in the situation on the naval battlefield, disrupting the opponent’s established deployment and combat intentions. Algorithms can effectively process massive amounts of high-value intelligence information and increase the speed of the “OODA” cycle. Mastering the advantages of algorithms can achieve fast and accurate cognition of the enemy’s situation, our situation, and the battlefield environment, thereby accurately predicting the enemy’s combat actions and innovating and optimizing our own action plans in a targeted manner.
“Cloud brain support, network failure and disconnection” will win. In distributed maritime operations, the command and control system will operate in a collaborative way of “human brain + cloud brain”, and the intelligent advantage will become an “advanced” advantage based on information advantage, and “network failure and disconnection” will become one of the main patterns of maritime operations. On the one hand, unmanned intelligent combat actions supported by cloud brain will penetrate the entire process of operations. In distributed maritime operations, the collaborative mode of “human brain + cloud brain” runs through all aspects of operations such as intelligent assisted command decision-making, automatic intelligence reconnaissance, automatic combat planning, autonomous precision strikes, and intelligent logistics support. On the other hand, targeting the intelligent ubiquitous network structure covering the entire domain and multiple dimensions, using intelligent equipment or means to attack key nodes and hubs such as its reconnaissance and surveillance network, information transmission network, command and control network, and comprehensive support network can paralyze its combat network system.
“Cross-domain integration, integrated energy release” wins. Distributed maritime operations will leap from integrated joint operations under information conditions to autonomous cross-domain collaborative operations under intelligent conditions. Different types of new-quality combat capabilities will be integrated and coordinated across domains, and flexibly and accurately integrated to release combat effectiveness. On the one hand, relying on the cross-domain, distributed, and networked collaborative combat system supported by the cloud edge, through the cross-domain mobility of the main combat platform, the cross-domain complementation of equipment functions, the cross-domain sharing of information and intelligence, the cross-domain coordination of combat command, the cross-domain response of mission actions, and the cross-domain interconnection of channel links, a variety of new-quality combat capabilities can be efficiently linked. On the other hand, cross-domain integration highlights the close coordination between the main domain master control and cross-domain support. For example, the navy will be the main control force in maritime offensive and defensive operations, and other forces will implement cross-domain coordinated support through the integration of air and space, sea and space, and network and space.
“Strike at acupoints and lure at agglomeration” to win. Distributed maritime operations will transform from traditional concentrated annihilation warfare to precise strike at acupoints, and high-value targets will face the threat of long-range autonomous precision strikes from intelligent combat equipment; from traditional large-scale manned attrition warfare to global unmanned cluster lure warfare, and important strategic targets will face the threat of saturation attacks and deceptive strikes from low-cost unmanned clusters. In the process of distributed maritime operations, unmanned equipment such as drones and unmanned submarines can be deployed to form a widely distributed, self-organized and coordinated reconnaissance network. Through autonomous reconnaissance, identification and strike actions, long-range and precise attacks can be carried out on the opponent’s high-value targets. Under the condition of minimizing collateral damage as much as possible, the opponent’s hand-wave network can be paralyzed from top to bottom to destroy its command system. Under the intelligent ubiquitous network system, based on the self-organized “swarm” combat of large-scale machine intelligent agents, full coverage reconnaissance of the opponent’s core area can be achieved, deceiving and luring the enemy, and consuming the opponent’s combat resources to the maximum extent.
Faced with changes in technology, warfare, and opponents, the combat mode of fixed formation, task balance, and tree-shaped command formed in traditional warfare will be difficult to adapt to battlefield needs. It is urgent to change the concept and innovate the implementation of self-coupling operations. The so-called self-coupling operations refer to the support of big data, cloud computing, and intelligent network information systems. The participating forces focus on the commander’s intentions, based on mission objectives and combat needs, breaking through regional, organizational, and field restrictions, and instantly perceive the situation, quickly and dynamically form groups, and autonomously match tasks, aggregate system advantages, and maximize the release of system combat capabilities.
Using the most appropriate forces to carry out the most appropriate tasks and achieve the best release of combat effectiveness has always been the highest level of war guidance.
Turning over the pages of human war history, coupling energy release is closely related to the development of war and command coordination. What has changed is the coupling organizational form – evolving from “other coupling” to “self coupling”; what remains unchanged is the pursuit of coupling value – the pursuit of the best release of combat effectiveness and the pursuit of the best combat benefits.
In the cold weapon era, the two sides formed simple formations and fought face to face. The war leaders often relied on their own exemplary role or simple organization to achieve effective coordination of different combat forces and combat actions, thereby maximizing the release of combat energy. In this sense, in the cold weapon era, combat was mainly organized by the commander’s orders, that is, “hetero-coupling”.
In the era of hot weapons, with the increase of the strike distance, weapons and equipment such as artillery, aircraft, tanks, and ships have appeared one after another. Combat operations have become more complicated and mutual coordination has become more important. Commanders and their command agencies must make careful pre-war planning and rely on wired/wireless communications to implement wartime control. The release of combat effectiveness is mainly achieved by the force organization, task allocation, action sequence, and support guarantee determined by the commander, that is, it has not yet gotten rid of the constraints of “other coupling”. However, due to the rapid changes in the battlefield situation, pre-war planning and organization have been difficult to adapt to actual combat needs. In response to battlefield uncertainty, with a focus on giving full play to the subjective initiative of the task force, command methods such as decentralized command, delegated command, and task-based command have emerged one after another. From the perspective of energy release, these command methods can be used as self-coupling operations based on command authorization.
In modern joint operations, unmanned forces have emerged, long-range precision strikes have become the new cutting-edge, stealth and high speed have gradually become the main force, multi-dimensional battlefields are deployed in full depth, multiple forces are mixed, and multi-domain operations are coordinated and efficient. Although the release of combat effectiveness still relies on “other coupling”, more emphasis is placed on “self-coupling”. The concept of “mosaic warfare” proposed by foreign militaries in recent years aims to emphasize the use of technical architecture to enable existing systems to be flexibly networked and quickly configured, and to provide the desired combat capabilities at the time and place specified by the commander. In recent years, in local wars and armed conflicts, the military of some countries has reconstructed the killing link based on the network information system, issued tasks based on the network, and the combat units implemented “order-based” strikes, which has begun to show signs of self-coupling operations.
Information and intelligent technology provides a means to support the best release of combat effectiveness, and it is mandatory to migrate to self-coupling combat.
With the widespread use of new technologies such as big data, cloud computing, artificial intelligence, and quantum communications, it has become possible to distribute combat forces in all dimensions and to make heterogeneous isomorphism, to make extreme use of combat resources and to release them on demand, thus forcing the transformation of combat methods to self-coupled combat.
Real-time battlefield situation perception provides a “smart eye” for self-coupled operations. Supported by information network technology, multi-domain, multi-dimensional and multi-dimensional early warning and reconnaissance means such as space-based monitoring, air early warning, maritime detection, underwater surveillance, and ground perception can obtain battlefield intelligence information in real time and efficiently process and integrate various types of information, so that combat units distributed in various fields and full depth can obtain complete, accurate, and real-time battlefield situations, so that the entire combat system can clearly perceive potential threats and accurately judge the targets of attack, providing a “clairvoyance” for its autonomous implementation of combat operations.
Cross-domain operations and real-time strikes provide an “arm” for self-coupling operations. The concept of “multi-domain warfare” proposed by foreign militaries is actually a combination of the strengths of multiple domains to overcome the weaknesses of other domains. In recent local wars, foreign militaries have practiced cross-generational integration, system-based counterattacks, division-based counterattacks, and unmanned clusters to attack high-value targets with humans, which mostly reflect this asymmetric balance concept of multi-domain operations. The development of intelligent technology will further change this way of fighting. The “perception-decision-strike-assessment” link of various combat units will achieve instantaneous transmission from “sensor to shooter”, and strike preparations will achieve “zero warm-up”, and “discovery is destruction” can be truly realized. This “zero reaction” of cross-domain operations provides a “fist” for the implementation of self-coupling operations.
Highly intelligent decision-making systems provide the “brain” for self-coupled operations. With the evolution of artificial intelligence, the “external brain” functions of staff officers, such as auxiliary decision-making, command and control, and evaluation and deduction, will be increasingly replaced by artificial intelligence “smart brains”, and ubiquitous “intelligent staff officers” will replace the large group of staff officers. With the support of intelligence, force allocation will shift to real-time task-based combination, force selection will shift to domain aggregation, system selection, and on-demand selection, combat operations will shift to immediate response, synchronous collaboration, and precise energy release, the command system will be reshaped into a command structure with star-point distribution and different authority, and the command method will shift to task issuance and node control. Strike power, information power, and protection power will be released on the most appropriate target at the most needed time and in the most appropriate way to achieve the maximum transformation of combat potential.
The network information system provides the “meridians” for self-coupling operations. With the development of information technology, the network aggregation function of the network information system is more powerful than ever before. The dispersed combat forces, combat units, and weapons and equipment become equal network information nodes based on various information links, and can obtain and use information without distinction. Just like the meridians of the human body, this characteristic of the network information system not only facilitates the command organization to issue instructions and control actions, but also transports blood and provides nutrients for combat units. Based on the network information system, the joint combat command organization can not only issue tasks in the cloud to truly achieve “decentralization”, but also monitor the battlefield situation, perceive the effects of operations, and deploy force resources; combat units can carry out “order-based” task selection, and carry out autonomous actions based on network intelligence brains to minimize internal consumption of forces and form local optimal combat capabilities.
Strive to explore the way of combat operations dominated by “other coupling” in strategic campaigns and “self coupling” in tactics
Victory always smiles upon those who can foresee the changes in the nature of war. In response to changes in technology, warfare, and opponents, we must base ourselves on the current reality of the troops, look forward to future combat developments, and step up efforts to promote concept renewal, training transformation, and condition building, so as to get closer and closer to actual combat.
Actively promote the renewal of combat concepts. At present, intelligent unmanned combat forces have been widely used in modern battlefields, and joint operations are rapidly developing towards cohesive integration. We should break through the constraints of the concept of controlling platform weapons and transform to system optimization, highlight the rapid combination of forces and planning actions in battle, and build a modular and resilient combat system; we should break through the constraints of the traditional concept of the number of combat resources and transform to micro-group multi-function, build a highly intelligent combat group, and promote the transformation of the combat system to adaptive and system-emergent functions; we should break through the constraints of the traditional concept of overall control and transform to task command, set tasks, goals, and forces based on the situation, and promote the action mode of superior card point command and multi-level parallel implementation; we should break through the constraints of the traditional concept of coordination and transform to autonomous combat, based on task allocation, rule coordination, and situation collaboration, to promote the optimal release of combat energy.
Speed up the improvement of the combat rules system. The promotion of self-coupling combat is inseparable from the rules and constraints of unified action, mutual integration, and coordination of various combat forces within the system. These rules are not only the necessary prerequisites for intelligent decision-making support systems, but also the key to avoiding arbitrary actions and coordination disorders. An efficiency priority rule should be established, that is, according to the combat capabilities and strike effects of multi-domain combat units, the effectiveness of paralysis and disability should be used as the force selection standard to provide a basis for the integration of combat forces in different domains and of different qualities; a force-dominant rule should be established, that is, the coordination relationship between different forces should be clarified, and force-dominant rules should be established according to tasks, sub-targets, and fields, to provide a basis for the timing and coordination of combined domain actions; an authorization rule should be established, that is, combat units perform the command and responsibility of a certain field, a certain direction, or a certain action according to the authorization of the commander, to provide a basis for responding to the battlefield and commanding the lower level; a control rule should be established to clarify the timing, method, and authority of the commander’s control to ensure that the operation is always carried out according to the commander’s intention.
Focus on building a strong information support network. The joint combat system supported by cloud connection is the prerequisite for achieving system confrontation and system optimization. We should focus on the high-speed flow of information, build a cloud battlefield network chain that penetrates the barriers of military services, shares intelligence information, and connects combat units, to provide support for the dispersed deployment, network-based reorganization, and cross-domain integration of combat forces; we should aim at intelligent decision-making, accelerate the development of intelligent auxiliary models for rapid information processing and rapid solution generation, and provide support for cloud-based task release and intelligent order matching; we should improve the data resource pool, distinguish between enemy and friendly combat targets, platform equipment, combat units, and combat groups, and build a resource pool with fresh and authentic data and dynamic updates to provide objective support for mission operations.
With the continuous improvement of information technology and the expansion of combat space, the combat capabilities of various services in modern warfare have been qualitatively improved. The joint combat concept that used to focus on the “service attributes” of combat forces is shifting to the “combat domain” affiliation of combat forces. On the basis of achieving “divided domain jointness” in a single combat domain, it seeks “cross-domain jointness” between various combat domains, thereby maximizing the combat capability of one’s own system.
Cross-domain joint operations are an advanced form of joint operations development
Since the transition from mechanization to informatization of warfare, the concept of joint operations that comprehensively utilizes the combat capabilities of various services has been gradually established, and has demonstrated a strong system combat power in recent local wars. At present, with the continuous development of information technology, supported by information and communication technology, the combat capabilities of various services are constantly enhanced, and the tentacles of action are constantly extending to multiple spaces, with overlapping situations in various dimensions. The traditional integration and integration of joint combat capabilities based on “services and arms” seems to be somewhat inadequate and difficult to meet the development requirements of information-based joint operations. It needs to be coordinated with a new concept of joint operations.
The combat domain has become the glue point for the integration of joint combat capabilities. There is no clear definition of the combat domain at present. Combined with the definition of domain in the modern Chinese dictionary, it can be understood as the scope involved in combat operations. There are many ways to divide this scope in the field of military operations. The most common one is according to the spatial scope involved in military operations, namely, land, sea, air, space, network, electromagnetic and other combat spaces. These combat spaces all have professional combat forces relying on this space. Around the competition for control of this space, an independent combat space domain, namely, the combat domain, has gradually formed. At present, the combat forces and combat operations of each service have more or less extended their tentacles to the traditional scope of other services. In joint operations, if the service continues to integrate joint capabilities, the operations in a certain combat space will appear in a situation of multiple command and control, with low command efficiency and large internal losses. Therefore, it is necessary to find another way to seek a new glue point for the integration of joint combat capabilities of various services. At present, integrating joint combat capabilities based on combat domains has become a new development direction. For example, during the Iraq War, the U.S. Army’s Joint Ground Component Command unified the command of the combat operations of the Army’s 5th Army and the 1st Marine Expeditionary Force’s ground forces, and the Joint Air Component Command unified the command of the combat operations of the Air Force, Navy and Marine Corps flight forces.
Cross-domain joint operations are the combination of combat domains and military services. Cross-domain operations involve at least two combat domains in terms of the scope of combat space. For example, operations conducted by naval ships, naval aviation, and the Marine Corps involve three combat domains: land, sea, and air, and may even involve cyber and electromagnetic space. However, this may only be naval operations, and is not considered a joint operation. Joint operations involve at least two military services in terms of the military service attributes of combat forces. For example, operations jointly conducted by the Marine Corps, the Air Force Airborne Force, and the Army’s ground combat forces can be called land joint operations. However, this type of joint operation is mainly carried out on land, and cross-domain operations are not fully reflected. Cross-domain joint operations are a combination of the concepts of cross-domain operations and joint operations, that is, combat operations must involve at least two combat domains, and at least two military services must participate in combat operations.
Cross-domain joint operations are the main mode of future joint operations
With the support of the network information system, the barriers that previously affected the “coordination” of combat operations between the various services and arms and the “integration” of combat capabilities between various combat domains have been gradually broken down, and the conditions for implementing high-level and high-efficiency joint operations have basically been met. In future joint operations, the combat operations of various participating forces will be linked by the network information system and will work together around the overall combat intent. The combat concept of multi-domain coordination and cross-domain integration has become a general trend.
Future joint operations require multi-domain coordination. At present, from the perspective of the combat space of each service, each service has a certain cross-domain combat capability. The Army has the Army Aviation, the Air Force has the Airborne Force, and the Navy has the Naval Aviation and Marine Corps. At the service level, multiple combat domains have the ability to coordinate and engage in combat. This multi-domain coordination can be called “small coordination”. In future joint operations based on network information systems, these multi-domain coordination at the service level must develop to a higher level, toward the direction of integrating the capabilities of different services in the same combat space, that is, the direction of “big coordination”, that is, to achieve domain-specific joint operations between different services. In addition, combat domains such as space, network, and electromagnetic space are indispensable and important components of joint operations. Even if a certain service implements relatively independent combat operations in a specific range and a certain joint combat stage, it will also need the support of space, network, and electromagnetic space combat operations. Therefore, future joint operations will inevitably be coordinated engagements in multiple combat space domains.
Future multi-domain operations require cross-domain joint operations. From the overall perspective of operations, the future will involve joint operations involving multiple services and multiple combat domains, and the operations of various services in various combat domains are interconnected and mutually supportive. On the surface, although some operations are carried out in a certain combat domain, the effects or targets they produce are in other combat domains. For example, the army destroys or occupies the enemy’s airport in ground combat, which has a significant impact on the air force’s seizure of air superiority; for example, electronic countermeasures forces implement electronic interference on space targets, causing the enemy’s reconnaissance and communication satellites to be paralyzed, which will have a huge impact on combat operations in land, sea, air and network combat domains. Therefore, future joint operations must be multi-domain operations, and multi-domain operations must achieve cross-domain joint operations, and better promote the achievement of combat objectives through the connection of actions and effects.
Cross-domain collaboration is an important way to achieve cross-domain efficiency
As the development direction of future joint operations, cross-domain joint operations seek to integrate the combat capabilities of different combat domains and complement each other’s advantages, so as to achieve the best combat effect in each combat domain. By superimposing the effects of each combat domain, the battle situation will develop in a direction that is beneficial to oneself, thereby achieving the overall or local goals of the war. Cross-domain joint operations based on network information systems can achieve cross-domain effects and cross-domain efficiency.
Transformation from cross-domain action to cross-domain effect. There are two ways to understand cross-domain: the traditional understanding is the cross-domain of combat entities in geographic space, which is mainly reflected in the potential relationship in the combat space field, that is, the attack platform and the target platform are divided into different geographic spaces. For example, using land-based anti-satellite weapons to attack the opponent’s satellite is cross-domain; while using space-based anti-satellite weapons to attack the opponent’s satellite does not fall into the cross-domain category. Another understanding is cross-domain combat effectiveness, that is, combat operations in the same geographic space can also produce cross-domain effects. For example, the action of land combat forces to destroy the opponent’s airport and thus reduce the opponent’s air combat capability can also be considered as a cross-domain category.
The first understanding has already existed in the mechanized warfare period. The corresponding effect is mainly achieved through the coordinated actions of various military services, that is, the “action domain” and the “target domain” belong to different spaces, and the combat effectiveness is directly reflected in the “target domain”, focusing on the spatial attributes of the equipment means. In the current and even future information-based joint operations, cross-domain operations will be more inclined to the second understanding, that is, the “action domain” and the “target domain” can be both “same domain” and “different domains”, but the combat effectiveness can be reflected in the “different domain”, which is not limited by the spatial attributes of the equipment means themselves, but is related to the space and scope of the impact of the combat effect, and therefore has a wider range of applicability.
Transformation from joint efficiency enhancement to cross-domain efficiency enhancement. With the continuous expansion of the combat space and the improvement of the performance of weapons and equipment, a relationship of mutual checks and balances has been formed between the various combat space fields. For example, the so-called “controlling the land with the air” and “controlling the land with the sea” are the embodiment of this kind of checks and balances. The reason why each service develops its own cross-domain combat capabilities is also to focus on this kind of checks and balances in the combat space field. However, each service has its own key areas of construction, and it is impossible to develop the combat capabilities of each combat space field in a balanced manner. This requires the use of the combat effects of other services to promote the improvement of the combat effectiveness of this service.
In the era of mechanized warfare and the early stage of information warfare, each service fully exerted the combat effectiveness of its own service forces in combat according to the plan, and created conditions for the combat of other services on the basis of completing its own combat tasks. Compared with the army without joint combat capability, its combat effectiveness is significantly higher by several orders of magnitude. However, due to the imperfect construction of command information system and network, and the long-term fragmentation of various services, information transmission and sharing are restricted, the coordination between the forces of various services is relatively mechanical, and the complementarity, integration and utilization rate of combat effects cannot reach the ideal state. With the advancement of information technology, the participating forces in joint operations based on the network information system can smoothly realize the joint operation of different domains, and on this basis, conduct cross-domain joint operations with other combat domains. Through the efficient flow of information, the combat operations of each domain can achieve self-synchronous coordination around the combat mission, and the combat effect of a certain domain will be quickly utilized by other domains, and a cascade amplification effect will be generated, spreading to each domain, thereby achieving cross-domain efficiency.