Tag Archives: Mosaic Warfare

Chinese Military Operational Transition “Cyber Warfare” to “Mosaic Warfare”

中國軍事行動從「網路戰」轉型為「馬賽克戰」

現代英語:

Theory is the precursor of action. Strengthening innovation in combat concepts and promoting innovation in combat guidance have always been important ways for militaries around the world to develop military advantages. In recent years, the U.S. military has successively proposed cutting-edge combat theories such as “cyber warfare”“ and mosaic warfare”, in order to realize that the combat model “production relationship” can be more adapted to the development of combat capabilities “productivity”. Through comparative analysis of these two combat theories, the world can get a glimpse of the changes in the thinking of building the US military’s combat capabilities, especially the understanding of the winning mechanism “mosaic warfare”, so as to find targeted and effective checks and balances.

● From threat response to war design——

Active shaping and improvement of traction combat capability

“Threat-based ”or “capability-based” are two basic ways to build military combat capabilities.“ Threat-based ”reflecting demand traction and focusing on solving real-life problems in the near and medium term are the basic rules that the military should follow in building combat capabilities; “based on capabilities” embodying goal traction, aiming at future strategic missions, and supporting strategic concepts with new combat theories are the key to military combat capabilities. The only way to innovate and surpass. The development from “cyber warfare” to “mosaic warfare” reflects the differences and evolution of the internal laws of the above two approaches, and also reflects the changes in the thinking and concepts of the US military in promoting combat capability construction in recent years.

New changes in concept origin. Cyberspace was originally born to solve human communication needs. Later, it gradually evolved into a new combat domain independent of land, sea, air, and space. From this, a “cyber war” with the struggle for cyberspace control as the core was derived. In comparison, “mosaic warfare” is a new combat concept actively developed and designed by the US military in order to continue to maintain its strategic advantage and directly target competitors. Its formation process reflects the integration of demand traction and capability traction, and its strategy, initiative, and traction Sex is more prominent.

New ideas for the use of technology.“ Cyber warfare ”emphasis on supporting the transformation and implementation of combat concepts through the development of new generation technologies.“ Mosaic Warfare” breaks out of this model and does not place too much emphasis on the development of a new generation of equipment technology. It pays more attention to the rapid transformation of general military and civilian technologies and the incremental iteration of mature technologies. The basic idea is to build on existing equipment and follow the application concepts of service platforms such as online ride-hailing and crowdfunding development. Through module upgrades and intelligent transformation, various combat system units “mosaicization” will be transformed into single-function, flexible Assemble and replaceable “building blocks” or “pixels” to build a dynamically coordinated, highly autonomous, and seamlessly integrated combat system Embodied new technology-driven ideas.

Path Development New Design.“ Cyber warfare ”as a companion concept to the network space, wherever the network space develops, “cyber warfare” will follow suit. Generally speaking, “objective” material conditions will be considered first, and then “subjective” conceptual design will be carried out. It has strong dependence on path development.“ Mosaic warfare ”first from “subjective” to “objective”, by developing a force design model that can dynamically adjust the functional structure, it can adapt to different combat needs and changes in the battlefield environment.

It can be seen that “mosaic warfare” has clearer goals, more mature technology, and more reliable paths than previous combat concepts such as “cyber warfare”, reflecting the change in thinking actively shaped by the US military.

● From network center to decision center——

Group intelligence to achieve optimal system energy release

AI technology is a key variable in the information age and a core increment in the development of the “mosaic warfare” system.“ Cyber warfare ”emphasis on “network center”, “mosaic warfare” closely focuses on the core of artificial intelligence technology, adjusts the key to victory from “network center” to “decision-making center”, and changes the combat system structure from system level and platform level Joint transformation to functional level and factor level integration, seeking to fully gather energy in the network The “group intelligence technology” realizes the optimal release of the system and gives new connotation to the war winning mechanism in the intelligent era.

Use “fast” to control “slow” to seize the cognitive lead. In future wars, the battlefield situation will change rapidly, and the weight of time factors will continue to increase. “Fast” versus “Slow” can form a combat strike effect that is approximately dimensionally reduced.“ Mosaic War ” By using data information technology and artificial intelligence technology, we can improve the single-ring decision-making speed of our own “OODA” ring, expand the breadth of parallel decision-making, reduce the granularity of group decision-making, accelerate the progress of system operations, and create an overall one-step faster “First move” situation, aiming to firmly control the dominance of cognitive decision-making on the battlefield.

With “low” system “high”, we accumulate cost advantages. Different from the traditional combat concept of pursuing high-end weapon platforms, “mosaic warfare” focuses on using artificial intelligence technology to tap the potential and increase efficiency of existing weapon platforms and combat resources. By loading and operating intelligent algorithms and specific functional modules on many mid-to-low-end weapon platforms, it can achieve combat performance comparable to high-end weapon platforms, overall improving the cost-effectiveness ratio of the input and output of the weapon platform, thereby accumulating cost advantages.

To “disperse” control “gather” and seek sustainable survival. “ Mosaic Warfare ” emphasizes the adoption of decentralized ideas and asymmetric checks and balances, using an open system architecture, and decentralized configuration of various functions such as reconnaissance, positioning, communication, and strike on various manned/unmanned platforms to achieve power. Distributed deployment. At the same time, relying on intelligent algorithms to improve the self-organization, self-coordination, and independent attack capabilities of each platform to achieve dispersion and concentration of firepower. When some combat platforms are eliminated, interfered with or stripped away, the entire combat system can still operate normally, thereby enhancing the continued viability of the battlefield of the force cluster.

Use “movement” to control “stillness” to improve system flexibility. “ Mosaic warfare ” emphasizes further breaking through the barriers of various combat areas. By turning the fixed “kill chain” in different combat domains into a dynamically reconfigurable “kill net”, the “OODA” large ring is disassembled into small rings, and the single ring is differentiated into multiple rings. According to changes in combat processes and combat requirements, intelligent networking is relied on to realize the split-in-movement, call-in-movement and combination of combat forces. In this way, on the one hand, it can enhance the flexibility and adaptability of the combat system; on the other hand, it can also hedge and offset the node aggregation effect of complex networks, making it difficult for opponents to find key nodes to defeat their own systems.

“Mosaic warfare” provides a reference prototype for intelligent operations. But at the same time, as an idealized force design and application framework, “mosaic warfare” still needs closely related technical, doctrinal, policy and other supporting support. There is still a long way to go before it is fully realized, and it is consistent with traditional combat systems. The coexistence situation will exist for a long time.

● From factor integration to system restructuring——

Dynamic structure to enhance combat system flexibility

Structure and relationships often determine function and nature.“ Cyber warfare ”and “mosaic warfare” are built on the common material foundation of the information age and follow the same evolutionary paradigm, but the principles and effects of system construction are different.“ The system structure formed by cyber warfare” is statically deconstructable, while “mosaic warfare” dynamically combines functional units according to certain construction rules to form a flexible system structure with self-organizing and adaptive characteristics, similar to a “dynamic black box”, which is difficult to follow with conventional means. predict. And this flexible structure often “emerges” new capabilities to empower and increase effectiveness in the combat system.

The integrated development of network and cloud makes combat time and space more dynamic and malleable. The Internet and the cloud are the basic environment for the operation of the information combat system. They reshape the process elements of intelligence, accusation, strike, and support in traditional operations, and at the same time derive new combat time and space.“ Cyber warfare ”mainly focusing on network space, its combat time and space are relatively static.“ Mosaic warfare ” is not limited to a single combat space. Under the development trend of information infrastructure network following cloud movement and cloud network integration, tangible and intangible spaces can be further deep-linked. The boundaries between combat time and space are more flexible, and the allocation of combat resources is more flexible, the combat system structure is more dynamic.

Data flows across domains, making operational control more seamlessly coordinated. In the “Command and Control” link, “cyber warfare” focuses on the command and control of combat units by joint combat command agencies. Cross-domain exchange and flow of data is mainly concentrated on the theater battlefield.“ Mosaic warfare ”further sinks the level of joint operations to the tactical end. Through the autonomous cross-domain exchange and seamless flow of data at the tactical level, various data islands can be clustered into data clusters on demand, thereby producing a significant “spillover” effect, making the dynamic, discrete, agile, and parallel characteristics of the combat command control loop more obvious, and more conducive to achieving agile connection of each combat unit on demand Efficiently act in concert.

Algorithm full-dimensional penetration makes system operation more autonomous and efficient. Algorithms are the mapping of human consciousness in cyberspace, forming two basic forms: compilation codes transformed by intention and neural networks transformed by knowledge. In “cyber warfare”, compiled code is widely used, and neural networks are only used locally. In “Mosaic Warfare”, the algorithm expands the two key functions of shaping rules and providing engines, and the breadth and depth of application are more prominent. Shaping rules is mainly based on compilation code, supplemented by neural networks, to construct the process framework and operating logic of the “mosaic warfare” system, laying a structural foundation for its uncertainty, adaptability and ability “emergence”; the provision engine mainly integrates intelligent algorithms The model is distributed to the edge elements to operate, forming a knowledge diffusion effect, thereby comprehensively improving the intelligent autonomous combat capabilities of the “mosaic warfare” system.

The side end releases energy independently, making the combat style more flexible and polymorphic. The edge is an abstract model of various manned/unmanned combat functional units and a direct source of systemic capabilities “emergence”.“ Cyber warfare ”in a system where edge elements are closely coupled with superior and subordinate accusation processes and are in a state of precise control.“ In the mosaic warfare” system, the perception, interaction, reasoning, and decision-making capabilities of edge-end elements are greatly improved. Its “OODA” ring does not need to be linked back to the superior command structure, which is conducive to supporting the formation of a decentralized combat cluster with high and low matching and manned/unmanned combination. form, which can give edge-end elements more self-organizing authority and significantly enhance the battlefield confrontation advantage.

It can be seen that if “cyber warfare” is called a sophisticated war machine, “mosaic warfare” can be regarded as a complex “ecology” that can stimulate the dynamic growth of combat capabilities. New changes in network clouds, data, algorithms, and edges have contributed to The formation of a dynamically complex “system structure”. This structure in turn reversely regulates elements, platforms and systems, and new capabilities continue to emerge, playing an important role in enhancing and evolving the combat system.

● From “system breaking to compound confrontation——”

To analyse the advantages and disadvantages and seek effective checks and balances

“Mosaic warfare” represents to a certain extent the possible direction of the future development of joint operations. It is necessary to fully analyze and grasp the winning mechanism of “mosaic warfare”, shape the field of information and communication as a new quality and new domain that breaks the traditional boundaries of war time and space, create a new concept of network cloud-enabled combat, build and strengthen the support and support capabilities of national defense information infrastructure, and highlight military information network security defense capabilities, enhance the minimum support capabilities for the operation of strategic campaign command organizations, and continuously improve the network information system.

On the other hand, the emergence of the “mosaic warfare” theory makes it difficult for traditional combat methods to attack target nodes with limited capture and control to achieve the system-breaking effect of breaking points and breaking chains. But it should be noted that any system has its inherent contradictions, and the seemingly “impeccable” decentralized structure of “mosaic warfare” can still find ways to effectively crack it. For example, grasp its system complexity characteristics, use its correlation dependence, highlight the functional suppression of communication networks, construct network-electrical composite attack paths, and achieve disassembly and isolation of various units of the combat system; grasp its structural dissipation characteristics, and use Its external information dependence highlights the disguise and misleading of information data, prompting the combat system to transform into abnormal states such as information closure and information overload; Grasp its group autonomy characteristics, use its key technology dependence, highlight the confrontation and efficiency reduction of intelligent algorithms, and suppress the intelligent internal drive of each combat unit; grasp its functional non-linear characteristics, use its unknown vulnerabilities, and highlight battlefield differentiation Strike assessment, test and discover operational system imbalances with higher efficiency and faster speed, and find key weaknesses in system attack.

(Author’s unit: Unit 61001)

現代國語:

編者按

理論是行動的先導。加強作戰概念創新、推動作戰指導革新,歷來是世界各國軍隊培塑軍事優勢的重要途徑。近年來,美軍先後提出「賽博戰」「馬賽克戰」等前線作戰理論,以期實現作戰模式這一「生產關系」能夠更加適應作戰能力這一「生產力」的發展。透過對比分析這兩種作戰理論,世人可以一窺美軍作戰能力建設思路的變化,特別是認清「馬賽克戰」的製勝機理,從而有的放矢,找到有效制衡之策。

●從威脅應對到戰爭設計——

主動塑造,牽引作戰能力提升

「基於威脅」或「基於能力」是軍隊作戰能力建設的兩條基本途徑。 「基於威脅」體現需求牽引,聚焦解決近中期現實問題,是軍隊作戰能力建設應遵循的基本規律;「基於能力」體現目標牽引,瞄準未來戰略使命,以新作戰理論支撐戰略構想,是軍隊作戰能力創新超越的必由之路。從「賽博戰」向「馬賽克戰」的發展,體現了上述兩種途徑內在規律的差異與演進,也反映出美軍近年來推進作戰能力建設思維理念的變化。

概念發端新變化。網絡空間,最初為解決人類的通訊需求而生,後來逐漸演變為一個獨立於陸、海、空、天之外的新作戰域,由此衍生出以爭奪網絡空間制權為核心的「賽博戰」。與之相比,「馬賽克戰」是美軍為繼續保持戰略優勢地位,直接瞄準競爭對手而主動開發設計的新作戰概念,其形成過程體現了需求牽引與能力牽引的融合,戰略性、主動性、牽引性更加突顯。

技術運用新思路。 「賽博戰」強調,透過研發新世代技術支撐作戰概念轉化落地。 「馬賽克戰」則跳出這個模式,不過分強調研發新一代裝備技術,更加關注對軍民通用技術的快速轉化,對成熟技術的漸進迭代。其基本想法是立足現有裝備,按照類似網約車、眾籌開發等服務類平台的運用理念,通過模塊升級和智能化改造,將各類作戰系統單元“馬賽克化”為功能單一、靈活拼裝、便於替換的“積木”或“像素”,構建形成動態協調、高度自主、無縫融合的作戰體系,體現了新的技術驅動。

路徑發展新設計。 「賽博戰」作為網電空間的伴生概念,網電空間發展到哪裡,「賽博戰」就跟進到哪裡,總體上先考慮「客觀」的物質條件,再進行「主觀」的概念設計,在路徑發展上具有較強的依附性。 「馬賽克戰」則先由「主觀」再到「客觀」,透過開發可動態調整功能結構的兵力設計模型,使其能夠適應不同作戰需求及戰場環境變化。

由此可見,「馬賽克戰」相比「賽博戰」等過去作戰概念,其目標更加明確、技術更加成熟、路徑更加可靠,體現出美軍主動塑造的思路轉變。

●從網絡中心到決策中心—

群體智能,實現體系最優釋能

人工智慧技術是資訊時代的關鍵變量,也是「馬賽克戰」體系發展的核心增量。 《賽博戰》強調“網絡中心”,“馬賽克戰”則緊緊扭住人工智能技術這一核心,將製勝關鍵從“網絡中心”調整為“決策中心”,將作戰體系架構由系統級、平台級聯合轉變為功能級、要素級融合,謀求在網絡充分聚能的前提下,以群體性智能技術實現體系最優釋能,為勝理的戰爭賦予新涵機時代。

以“快”制“慢”,奪取認知先手。未來戰爭,戰場形勢瞬息萬變,時間要素的權重不斷上升,「快」對「慢」可以形成近似降維的作戰打擊效果。 「馬賽克戰」透過運用數據資訊技術與人工智慧技術,提升己方「OODA」環的單環決策速度,拓展並行決策廣度,降低組環決策粒度,加快體係作戰進度,在整體上塑造始終快人一步的「先手棋」態勢,旨在牢牢控制戰場認知決策的主導權。

以“低”制“高”,積累成本優勢。與追求高端武器平台的傳統作戰概念不同,「馬賽克戰」著重於利用人工智慧技術對現有武器平台及作戰資源的挖潛增效。透過在眾多中低階武器平台上加載運行智慧演算法和特定功能模塊,使其達到媲美高端武器平台的作戰性能,整體上提高了武器平台投入產出的效費比,進而積累形成成本優勢。

以“散”制“聚”,謀求持續生存。 「馬賽克戰」強調採用化整為零的去中心化思路和非對稱制衡理念,使用開放系統架構,在各類有人/無人平台上分散配置偵察、定位、通信、打擊等各類功能,實現力量的分佈式部署。同時,依托智能演算法提升各平台的自組織、自協同、自主攻擊能力,實現形散神聚、火力集中。當部分作戰平台被消滅、幹擾或剝離後,整個作戰體系仍能正常運轉,從而增強兵力集群的戰場持續生存能力。

以“動”制“靜”,提升體系彈性。 「馬賽克戰」強調進一步突破各作戰域壁壘。通過把不同作戰域中固定的“殺傷鏈”變成可動態重構的“殺傷網”,將“OODA”大環拆解為小環,單環分化為多環。根據作戰進程和作戰需求的變化,依托智能組網實現作戰力量的動中拆分、動中調用、動中組合。如此,一方面可增強作戰體系的靈活性、適應性;另一方面還可對沖抵消複雜網絡的節點聚集效應,使對手難以找到破擊己方體系的關鍵節點。

「馬賽克戰」為智慧化作戰提供了一種可藉鑑的參考原型。但同時,作為一種理想化的兵力設計和運用框架,「馬賽克戰」還需要與之緊密相關的技術、條令、政策等配套支持,距離完全實現還有很長的路要走,與傳統作戰體系共存的局面將長期存在。

●從要素整合到體系重組—

動態結構,增強作戰體係彈性

結構和關系往往決定功能和性質。 「賽博戰」與「馬賽克戰」建構於資訊時代共同的物質基礎,遵循相同的演進範式,但體系建構的原理和效果有所不同。 「賽博戰」形成的體系結構靜態可解構,而「馬賽克戰」則按照一定構建規則動態組合功能單元,形成具有自組織、自適應特徵的彈性體系結構,類似一種“動態黑箱”,常規手段難以跟踪預測。而這一彈性結構常會「湧現」出新的能力,為作戰體系賦能增效。

網雲融合發展,使作戰時空更動態可塑。網和雲是資訊化作戰體系運作的基礎環境,重塑了傳統作戰中情報、指控、打擊、保障的流程要素,同時衍生出新的作戰時空。 「賽博戰」主要聚焦網電空間,其作戰時空相對靜態。 「馬賽克戰」則不限於單一作戰空間,在資訊基礎設施網隨雲動、雲網一體的發展趨勢下,可進一步深度鉸鏈有形無形空間,作戰時空邊界更有彈性,作戰資源配置更加靈活,作戰體系結構更具動態。

數據跨域流轉,使作戰控制更加無縫協同。在指揮控制環節,「賽博戰」關注的重點是聯合作戰指揮機構對作戰單元的指揮控制,數據跨域交換流轉主要集中在戰區戰場。 「馬賽克戰」則進一步將聯合作戰的層級下沉至戰術末端,通過數據在戰術層面的自主跨域交換和無縫流轉,實現各類數據孤島按需集聚為數據集群,進而產生顯著的「溢出」效應,讓作戰指揮控制環路動態、離散、敏捷、並行的特徵更為明顯,更加有利於實現各作戰單元按需銜接、高效協同行動。

演算法全維滲透,使體系運作更加自主高效。演算法是人的意識在網絡空間的映射,形成了由意圖轉化的編譯代碼和由知識轉化的神經網絡兩種基本形態。在「賽博戰」中,編譯代碼大量應用,神經網絡只在局部應用。在「馬賽克戰」中,演算法擴展出塑造規則、提供引擎兩項關鍵職能,運用的廣度深度更加突出。塑造規則以編譯代碼為主,輔以神經網絡,構造「馬賽克戰」體系的流程框架和運行邏輯,為其不確定性、適應性和能力「湧現」性奠定結構基礎;提供引擎則主要將智能演算法模型分發至邊端要素運行,形成知識擴散效應,從而全面提升「馬賽克戰」體系的智能自主作戰能力。

邊端自主釋能,使作戰樣式更靈活多態。邊端是各類有人/無人作戰功能單元的抽像模型,也是體系能力「湧現」的直接來源。 「賽博戰」體系中,邊端要素與上下級指控流程緊密耦合,處於精確受控狀態。 「馬賽克戰」體系中,邊端要素的感知、交互、推理、決策能力大大提升,其「OODA」環不必回鏈至上級指揮機構,有利於支撐形成高低搭配、有人/無人結合的去中心化作戰集群形態,可以賦予邊端要素更多自組織權限,明顯增強了戰場對抗優勢。

可見,如果稱“賽博戰”為精密的戰爭機器,“馬賽克戰”則可以視為一種能夠激發作戰能力動態生長的復雜“生態”,網雲、數據、算法、邊端所產生的新變化,促進形成了動態復雜的“體系結構”。這一結構又反向調控要素、平台和系統,不斷湧現新的能力,為作戰體系增能、演變發揮重要作用。

●從體系破擊到復合對抗——

辨析優劣,尋求有效制衡之策

「馬賽克戰」某種程度上代表著未來聯合作戰形態發展的可能方向。應當充分研析把握「馬賽克戰」的製勝機理,將資訊通信領域作為打破傳統戰爭時空界限的新質新域加以塑造,打造網雲賦能作戰新概念,建強國防資訊基礎設施支撐保障能力,突顯軍事資訊網安全防禦能力,增強戰略戰役指揮機構運行的保底支撐能力,不斷完善網絡資訊體系。

另一方面,「馬賽克戰」理論的出現,使得打擊奪控有限目標節點的傳統作戰手段,難以達成毀點斷鏈的體系破擊效果。但應當看到,任何體係都有其固有矛盾,「馬賽克戰」看似「無懈可擊」的去中心化結構,仍可以找到有效破解的方法路徑。例如,掌握其體系複雜性特徵,利用其關聯關係依賴性,突出針對通信網絡的功能抑制,構建網電復合攻擊路徑,實現對作戰體系各單元的拆解孤立;把握其結構耗散性特徵,利用其外部信息依賴性,突出針對信息數據的偽裝誤導,促使作戰體係向信息封閉、信息過載等非正常狀態轉化;掌握其群體自主性特徵,利用其關鍵技術依賴性,突出針對智能算法的對抗降效,抑制各作戰單元的智能內驅力;把握其功能非線性特徵,利用其未知脆弱性,突出戰場差異化打擊評估,以更高的效率和更快的速度失衡、發現作戰體系擊點,尋找體系破擊的關鍵弱點。

(作者單位:61001部隊

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/4894734888.html?big=fan

Chinese Military Research on Conceptual System-based Superior Warfare – How to Fight in Information Warfare System Operations? Analysis of Nine Typical Combat Styles

中國軍事體系優勢作戰概念研究-資訊化作戰體系如何作戰?九種典型作戰風格分析

現代英語:

System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole. 


       In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze .

       System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“
        1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence
        2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations
       3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure
       4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control
       5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
       6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma
       7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support
       8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics
       9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system

        For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body
       The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.


       1. Overall deterrence
       Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.


       1.1 Emphasis on multi-domain joint deterrence
       Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.

1.2 The implementation of overall deterrence should have three major elements
       Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.


       Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.


       1.3 Strong overall strength is the core of achieving effective deterrence
       The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war.
       In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.


       2. Electromagnetic Disturbance Warfare
       Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.


       2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.


       2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.


       2.3 Crack effective tactics for unmanned cluster operations
     “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.


       3. Cyber-sabotage
       Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities.
       The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.


      4. Cognitively Controlled Disturbance Warfare
      Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage.
      Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.


       4.1 Control the cognitive rights of situational awareness and compete for information advantages
       In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.


       4.2 Control and command decision-making power and compete for decision-making advantages
       Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.


       4.3 Control “brain” power and seize the advantage of brain control
       Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.


      5. Agile Mobile Warfare
      Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.

Table 1 Connotation of the concept of agile warfare


      5.1 Efficient and fast decision-making
      To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.


      5.2 High efficiency forms a favorable combat situation
      It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.


      5.3 Efficient and instant gathering of combat power
      To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.


      5.4 Agile mobile warfare is an innovative development of traditional mobile warfare
      In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.


       6. Unmanned cluster autonomous warfare
       Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.


       6.1 It is conducive to forming a system advantage to suppress the enemy
       Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.


       6.2 Conducive to enhancing combat effectiveness
       In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.


       6.3 Conducive to getting into enemy combat difficulties
       Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.


       7. Pointkill Battle
       “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.


      7.1 Achieve efficient combat cost ratio
      Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.


       7.2 Targeting key nodes is an important option
       The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.


       7.3 Large-scale system support is the basic condition
       The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.


       7.4 It is inseparable from precise intelligence support
       In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.


       8. Supply-breaking
       Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.


       8.1 The supply guarantee chain has a huge impact on the overall combat situation
       Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.


       8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain
       The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.


       8.3 The key is to choose the right time and make full use of tactics
       It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.


       9. System “paralysis battle”
       System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.


       9.1 The combat goal is to disorderly operate the enemy’s combat system
       In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.


       9.2 A key node in the heavy strike combat system
       Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.


       9.3 Implement soft strikes against the enemy’s combat system
       When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat. 

現代國語:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制資訊權,進而贏得作戰主動;三是網路破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通信網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速回應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間訊息「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理信息,還要採取網絡輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假信息,破壞、擾亂敵對戰場態勢的感知、認知,最大限度地製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施法實作「攻芯」,透過反義程式定義、原則性反制勝;
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志”的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進信息作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵對決策,或使其失能,實現隱形敵作戰。如以人的認知思維為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施“注入”“侵入”式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵

5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提高作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全局作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人群聚自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘敵實施幹擾、欺騙,或配合主戰兵器實施分佈式協同攻擊,實現整體分散式協同攻擊者。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦探測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以作出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點與關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞著實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使線路、通信和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱密性突然打擊;隱形奇襲戰,使用潛艦、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確補給
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整和重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連接、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界有關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,基於網絡的各種戰爭資源,可以快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2基本著眼導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通信聯絡及資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱整個作戰控制能力,使敵軍系統失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊資訊網路和物理設施,摧毀敵人實體武器。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷和硬摧毀行動,破壞敵之網路體系,使敵能作戰系統整體下降甚至失能作戰。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運作機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟性打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強電磁幹擾,使其信息失靈,陷入戰爭迷霧之中;網絡戰,使用網絡進攻力量對敵網絡信息體系實施攻擊,使敵指揮通信系統和計算機網絡受到嚴重破壞,使其指揮失靈,陷入信息孤島乃至戰爭孤島;心理戰和作戰論戰,使用心理戰、輿論手段,對敵對認知,打擊其戰爭論戰,使用心理戰、輿論手段,對敵對心理打擊行為論組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗。

中國原創軍事資源:http://www.81it.com/2022/0901/13716888.html

Implementation of the “Outline of Joint Cooperation” Within the People’s Liberation Army of China

中國人民解放軍內部實施《聯合合作綱要》

現代英語:

With the approval of Xi Jinping, Chairman of the Central Military Commission, the Central Military Commission issued the “Outline of Joint Cooperation between the People’s Liberation Army of China (Trial Implementation)”, which will come into effect on November 7, 2020.

The Outline focuses on building a legal system for joint operations and strengthening the clear orientation of preparing for war. It is of great significance to consolidate and deepen the results of the reform of the leadership and command system, scale structure and force composition, and to promote the liberation and development of our military’s joint operations capabilities.

The Outline is the top-level regulation of our military’s new-era combat doctrine system. It focuses on clarifying the basic issues of joint combat organization and implementation, unifying combat thinking, clarifying responsibilities and procedures, and guiding combat operations. It also clarifies major principles, requirements, and basic procedures for joint combat command, combat operations, combat support, national defense mobilization, and political work.

The Central Military Commission requires that all levels should earnestly study and implement the “Outline”, adhere to combat effectiveness as the only fundamental standard, use the “Outline” as the basic basis for organizing and implementing joint operations and joint training, and comprehensively improve the ability to win in the new era.

The battle flag hunt, the military parade ground was full of ups and downs, and the climaxes continued——

From north to south, the surging iron torrents train elite soldiers; in the deep blue ocean, soldiers step on the waves to forge sharp swords; above the vast sky, eagles fly thousands of miles towards the blue sky; deep in the dense forests, the east wind roars to the sky; the skynet controls power, and the invisible war defeats the visible… One after another joint combat exercises are gradually unfolding in multiple domains and all dimensions, presenting a picture of a strong army that trains together to plan for war, uses training to promote war, and wins war through strong training, sounding the strong note of a new era in the history of our army’s training and preparation.

Over the past year, the world has been undergoing unprecedented changes unseen in a century, intertwined with the global COVID-19 pandemic. Under the sky shrouded by the epidemic, the international situation has been in constant turmoil and confrontation. The drone warfare that has shined in the Nagorno-Karabakh conflict has shown the world the unique characteristics of modern warfare.

“When times change, things change. When things change, we must be prepared for change.” In the future, “what kind of war to fight and how to fight it” carries the heavy mission, and the entire military is surging with enthusiasm for researching and winning wars.

Faced with new changes in the national security situation, new threats from powerful enemies and adversaries, and new developments in the form of warfare, we urgently need to provide answers to strengthening the military, winning battles, and meeting the needs of the times.

“Overall, modern warfare has indeed undergone profound changes. These changes may seem dazzling, but there are regularities behind them. The fundamental thing is that the winning mechanism of war has changed.” Faced with the rapid development of the new world military revolution and changes in the war situation, under the guidance of the commander-in-chief and in accordance with the unified deployment of the CMC’s policy and system reforms, the CMC Joint Staff Department organized experts from the Academy of Military Sciences and capable personnel from relevant departments of the CMC, various theater commands, various military services and armed police forces to form a joint research group to pool wisdom and strength to tackle key problems and advance the formulation of new-era combat regulations.

On November 7, 2020, the “Outline of the Joint Cooperation Warfare of the People’s Liberation Army of China (Trial Implementation)” was implemented throughout the army, marking a new coordinate system for our army’s joint cooperation war in the new era.

Since the issuance of the Outline, commanders have taken the lead in learning it, agencies have taken the lead in studying it, and troops have practiced learning it. The officers and soldiers of the whole army have been enthusiastic about learning and publicizing the Outline. A great discussion on joint operations in the new era, a great liberation of thoughts, and a great practice of preparation for war have been vigorously carried out in the whole army.

Pointing to victory, leading the new practice of preparing for war in the new era

“Following the main road, who would you follow to seek a shortcut?” In the world of soldiers, there is no such thing as “easy”. The only way to win a battle is to be prepared.

What kind of war we will fight in the future will require innovative tactics; if we cannot innovate tactics, it will be difficult to win future wars.

In essence, combat regulations are about solving the problem of how to fight and how to win, and are the refinement, deepening and concretization of military strategic policies. The Outline of Joint Cooperation of the People’s Liberation Army of China (Trial) (hereinafter referred to as the Outline) deeply studies the characteristics and laws of future wars, accurately grasps the era characteristics of the integrated development of mechanization, informatization and intelligentization of our army, and through the forward-looking and concrete design of future operations, implements the spiritual essence and content requirements of the new era’s military strategic policy into the troops’ preparation for war.

The Outline is not only a guideline for preparing for war, but also a guideline for winning joint operations.

At the beginning of the new year of 2021, a certain area of the Eastern Theater Command is organizing a multi-service, multi-directional, systematic combat training. Under the guidance of the newly issued “Outline”, this exercise involves the full-domain linkage of land, sea, air, space, network and electric power, close coordination of political and public opinion, and information-led throughout the entire process from combat preparation to situation shaping to mission implementation. All units work closely together, demonstrating the firm determination and strong ability to maintain national unity with a thunderous momentum, and also witnessing the transformation of our military joint cooperation from “formal linkage” to “spiritual linkage”.

In the west, at midnight in mid-spring 2021, a series of urgent alarm bells rang. According to the level transfer order of a certain base of the Western Theater Air Force, the officers and soldiers of a certain air defense battalion of the Army quickly rushed to their positions, and the level transfer time was further shortened. According to the unified deployment, more than 10 Army air defense forces in the theater air force responsibility area entered the Air Force command chain in an organized manner, breaking the information barrier of the services, sharing early warning information, and jointly taking on combat readiness duty, and initially forming a joint air defense combat system. “You lend me the ‘eye in the sky’, and I will help you with the ‘iron fist'”, the integrated joint air defense combat across the services has taken a new step and entered a new stage.

In the north, at the beginning of the summer of 2021, war eagles soared and iron currents rolled, and an exercise with the theme of air-ground joint operations was in full swing. According to the plan, a certain command post of the Air Force of the Northern Theater Command and a certain group army of the Army jointly organized a brigade-level command post exercise to study and explore the composition of joint command institutions and test the integrated joint combat command capabilities of the command post personnel. Intelligence analysis and processing, joint firepower strikes, and integrated rear-end support were coordinated and planned and carried out in an integrated manner, and the command institutions were organized in an integrated manner with all elements. Through repeated joint combat and training, the policy of leading training through combat and carrying out combat through training has been further implemented, and the joint combat and command capabilities of commanders of all services and arms have been significantly improved.

In the direction of the South China Sea, war eagles roared and attacked fiercely, dragons took off and stepped on the sea and waves, radars flew and missiles raised their heads… Under the unified command of the theater joint command, all mission forces worked as a whole and coordinated closely to quickly build a battlefield layout that was multi-domain joint, both offensive and defensive, and deployed in echelons. They adopted a combination of centralized command and decentralized command, and flexibly carried out sea and air escort and deterrence and expulsion in a reasonable, forceful and restrained manner, effectively maintaining peace and tranquility in the South China Sea.

In the past year since the implementation of the Outline, the orientation of preparing for war has become clearer and firmer, the sole fundamental standard of combat effectiveness has been more firmly established, training and preparation for war as the main responsibility of the troops has become more prominent, researching and planning war as the primary responsibility of officers and soldiers has become clearer, the ideas and measures for joint operations and victory have become increasingly effective, and the entire army has continued to set off a new upsurge in training and preparation for war.

Keep pace with the times and clarify the new mechanism of joint cooperation in the new era

“All beneficial ways go with the times.”

Military theorist Douhet once said: “Victory smiles only on those who can foresee the changes in the character of war, not on those who wait for the changes to happen and then adapt to them.”

Looking around the world, the game and struggle among major powers are intensifying, the threat of war exists, the war situation continues to evolve, new military reforms are booming, stealth, unmanned and intelligent weapons and equipment have become the mainstream trend, the battlefield space has expanded to all domains and dimensions, the integrated linkage of combat forces has become the norm, combat command, action and support have become more sophisticated, and winning future wars requires the support of more advanced combat theories.

The gap in combat concepts is the fundamental gap, and the backwardness of combat theory is the biggest backwardness. When modern wars are surging in the world, what is most needed is newer and braver minds.

The new-era combat regulations, led by the Outline, adhere to Xi Jinping’s military strategic thinking and the new-era military strategic policy as the soul and outline, deeply grasp the new changes in national security, new adjustments in combat opponents, new designs in strategic layout, new connotations of active defense, and new developments in combat guidance, and materialize the principles and methods of commanders’ understanding and guidance of war into norms and standards for the specific implementation of the troops, so as to promote our military-joint cooperation war to a higher level.

——It comprehensively expounds the contemporary connotation of war guidance under information conditions.

The Outline aims to win future high-end wars, accurately grasps the characteristics of lowered thresholds for future armed conflicts, blurred boundaries of war, and increasingly prominent mutual influence and efficiency between the war field and other fields, strengthens the political and social attributes of combat operations, innovatively develops military struggle paradigms, emphasizes relying on the country’s integrated strategic system and capabilities, emphasizes the integration of war and non-war domains, emphasizes the comprehensive implementation of military and political, diplomatic, economic, cultural and other means, and gives full play to the overall advantages of the party, government, military, police and people. It reflects the modern war concept and the war guidance for winning the people’s war and total war in the new era.

——All elements standardize the style and methods of our joint military operations.

The Outline is based on the tasks and development of our army, and systematically expounds on the possible joint operations in the future, covering the core missions of various strategic directions, covering land, sea, air, space, network and electromagnetic multi-dimensional space. At the same time, it also creatively summarizes the basic types of joint operations, highlights the basic actions that run through the joint operations and have common characteristics, and forms a closed-loop chain of joint operations with all elements and in all fields.

——The joint combat command system and organizational operation mode were designed throughout the entire process.

The implementation of joint operations organizations is extremely complex and difficult. Whether they can be “coordinated” in terms of strength, “joined” in operations, and “excellent” in effectiveness depends crucially on whether they can achieve “unification” in command. The “Outline” focuses on building a strong and efficient joint operations command structure, closely integrates the Central Military Commission and the theater joint command operation model mechanism, fully considers that it not only complies with the general direction and general requirements of the reform, but also leaves room for flexible formation in practice. It focuses on solving major issues such as the construction of a joint operations command system, the differentiation of command authority and responsibility interfaces, and the integration of services into the joint system, so as to ensure that thousands of troops and horses can jointly act under unified orders.

Taking joint training as the guideline, promoting a new leap forward in joint training in the new era

At the Central Military Commission’s military training conference, President Xi Jinping stressed the need to strengthen joint training, adhere to joint training as the key, develop a joint training system with Chinese characteristics, and accelerate the improvement of integrated joint combat capabilities. Soldiers should be trained in the way they fight, and troops should be trained in what is needed for fighting. Today’s world-class armies all regard improving joint training as the top priority for war preparation.

The Outline is the opening chapter of the new era combat doctrine and the guiding principle for the transformation of joint training in the new era. The Outline provides direction, inspires vitality, and gives birth to a new pattern of joint training in the new era.

——Incorporate combat into training to present an “integrated posture” of training.

In the Taiwan Strait, the naval and air fleets carried out joint combat readiness patrols to test and enhance the joint combat capabilities of multiple services, maintain a high state of alert at all times, and resolutely defend national sovereignty and territorial integrity. Exercise preparation is combat preparation, and the exercise state is the combat state. Joint military exercises are no longer simple training activities, but have become a preparation process to promote combat readiness and enhance capabilities. Joint training, the “source” and “main stream” full of power, is guiding and driving the in-depth advancement and vigorous development of military struggle preparations, and fully unleashing the role and effectiveness of training to carry out combat and training to promote preparations.

——Systematic training has become the “new normal” of joint training.

“East”, “South”, “West”, “North”, and “Central” are joint live-fire exercises organized by various theater commands, “Crossing”, “Mobility”, “Red Sword”, “Sky Sword”, and “Joint Logistics Mission” are series of systematic exercises organized by various services, covering all seasons, all weather, and all regions. The CMC, theater commands, and services are responsible for division of labor, overall design, and systematic organization. They are decomposed from top to bottom and integrated from bottom to top, driving the operation and inspection of the joint combat system. Joint exercises and systematic training present a new look, and new changes have taken place in the training and preparation mode. Our military’s joint training has entered a new stage of all-round transformation and overall improvement.

——Joint training between China and foreign countries highlights the “integration” of joint exercises.

At the foot of the Helan Mountains and in the heart of the Bronze Gorge Desert, the “Western Joint-2021” China-Russia joint exercise was booming. In this joint exercise, the Chinese and Russian militaries were mixed and planned together. The two sides shared their positions, coordinated closely, and acted together. They practiced more than 20 subjects such as joint air defense, joint obstacle removal, and joint three-dimensional seizure. With the support of the deeply integrated combat system between China and Russia, new breakthroughs in joint exercises and training were achieved. “Maritime Joint”, “Common Destiny”, “Peace Mission”… With the joint training between China and foreign countries as a “window”, the new changes in the joint training of the Chinese military are being brilliantly presented to the world.

——Intensive training in new domains, demonstrating an “open attitude” in research and warfare.

In joint exercises, underwater unmanned “fish schools”, land unmanned “wolf packs”, and air unmanned “bee swarms” began to emerge. New domains and new types of forces such as land aviation, special operations, electric power, unmanned, network, and aerospace were deeply integrated into the joint combat system and the joint exercise process, and realistic combat scenarios were carefully constructed to accurately experiment with modern war organization and management. As the most active practice area for preparing for war, joint training, with an innovative and open attitude, boldly tried and made great strides towards the new combat areas pointed out in the Outline.

Integrating war and construction to shape a new pattern of system construction in the new era

President Xi stressed that we must adhere to the principle of building the country in accordance with war, strengthen the coordination of war and construction, speed up the promotion of major strategic, leading and fundamental projects, and accelerate the creation of a high-level strategic deterrence and joint combat system.

If the “trouble” in the construction of the joint combat system is not resolved quickly, once the “interest” of the debt accumulates, it will become a “pain” on the battlefield tomorrow. From the perspective of war, the “Outline” calibrates the “sight” of construction and firmly points to the correct direction of military construction.

——Calibrate the construction “sight” to point to the needs of joint operations.

Under the guidance of the Outline, the concept of jointness has been gradually established, and the barriers of “coordination” of military operations and “integration” of combat domain capabilities have been gradually broken down. The land, sea, air, and fire arms have been combined in the same domain, and cross-domain integration of combat domains such as space, network, and electromagnetic space has gradually become a reality. With the support of the network information system and combat data information as the link, a full-time and smooth command link has been built. The system is internally connected to each combat sub-center, and is connected to each combat group (team) command post. When necessary, it can directly reach the end of the individual platform to achieve joint command to the end. All operational forces worked together around the overall intention, realizing the transformation of the joint combat concept from focusing on the “service attributes” of combat forces to focusing on the “operational domain”, which has become the main feature of future joint combat. Studying, planning, and training for war with the “Outline” has become a trend throughout the military.

——Calibrate construction’s “sights” to point to system shortcomings and weaknesses.

Based on the Outline, our army insists on combining inheritance and innovation, theory and practice, innovatively designs strategies for winning future wars, focuses on highlighting problem orientation, takes root in training and preparation for war, promotes the construction of joint combat command system and new combat force construction, and effectively solves the outstanding shortcomings and weaknesses in military combat preparation. In mid-May 2021, the Party Committee of the Northern Theater Command held a special war meeting, and in accordance with the Outline, thoroughly identified contradictions and problems in joint combat research, command and control mode transformation, joint handling level, and efficient command capabilities. According to the Outline, it optimized system support, improved command and control methods, and improved command means, which promoted the transformation of the operation mode of the theater joint command center and the improvement of command effectiveness. Looking across the entire military, similar practices are becoming more and more common. Referring to the Outline to find gaps, ideas, and methods in the near and long term has become the new mainstream for planning and promoting construction at all levels and in all fields.

——Calibrate the construction “sight” to point to the urgent need to balance powerful enemies.

To implement the principle of building the military in accordance with war and coordinating the military construction, we must not only focus on solving current practical problems, but also pay attention to solving long-term development problems. The Outline is anchored on the future of defeating the strong and contains a far-sighted plan to build a world-class military. Guided by the Outline and focusing on changes in the war situation and changes in scientific and technological development, the construction of asymmetric means to check and balance powerful enemies has ushered in a qualitative leap. Batches of new drones, new helicopters and other advanced weapons and equipment have been tested and deployed, and a series of high-tech equipment has been deployed and developed, which has given us more confidence and stronger capabilities to win the war. The Outline condenses the “war code” of historical wisdom and also integrates the way to build first-class and win the future in the new era.

“But look at the path you have come from, and you will see verdant and green mountains.” One year after the implementation of the Outline, the new-era combat regulations are releasing capabilities and increasing efficiency in building a joint combat system with Chinese military characteristics.

In the new era and new journey, our path of joint military operations will surely become broader, our ability to defend the country’s strategic development interests will surely become stronger, our confidence in winning future informationized wars will surely become firmer, and the great goal of building a world-class military will surely be fully realized.

“We have a string that is tightly tied to us, a mission that we shoulder, and a storm that we are watching closely… We are always ready!”

現代國語:

經中央軍委主席習近平批准,中央軍委印發《中國人民解放軍聯合作戰綱要(試行)》,於2020年11月7日起施行。

《綱要》著眼構建聯合作戰法規體系,強化備戰打仗的鮮明導向,對鞏固深化領導指揮體制、規模結構和力量編成改革成果,對推動我軍聯合作戰能力解放和發展,具有重要意義。

《綱要》是我軍新時代作戰條令體系的頂層法規,重在明確聯合作戰組織實施的基本問題,重在統一作戰思想、釐清權責程序、指導作戰行動,明確聯合作戰指揮、作戰行動、作戰保障、國防動員、政治工作等重大原則、要求和基本程序。

中央軍委要求,各級要認真抓好《綱要》的學習貫徹,堅持戰斗力這個唯一的根本的標准,將《綱要》作為組織實施聯合作戰和聯合訓練的基本依據,全面提高新時代打贏能力。

戰旗獵獵,演兵場上風起雲湧、高潮迭起——

大江南北,鐵流澎湃礪精兵;深藍大洋,蹈海踏浪鑄利劍;蒼穹之上,鵬飛萬裡向碧空;密林深處,東風浩蕩嘯九天;天網制權,無形之戰勝有形……一場場聯合作戰演練在多域全維漸次展開,鋪陳出一幅幅聯訓謀戰、以訓促戰、強訓勝戰的強軍畫卷,奏響著我軍練兵備戰史上新的時代強音。

一年來,世界百年未有之大變局交織全球新冠疫情之大流行,疫霾籠罩的天空之下,國際局勢波瀾不斷,伴隨著動蕩和對抗,納卡沖突中大放異彩的無人機作戰,向世界展現出現代戰爭獨有的特征。

“世異則事異,事異則備變。”未來“打什麼仗、怎麼打仗”承載著使命之重,全軍上下處處湧動著研戰謀勝的熱潮。

面對國家安全形勢新的變化,面對強敵對手新的威脅,面對戰爭形態新的演進,迫切需要我們給出強軍答案,給出勝戰答案,給出時代答案。

“總的看,現代戰爭確實發生了深刻變化。這些變化看上去眼花繚亂,但背後是有規律可循的,根本的是戰爭的制勝機理變了。”面對迅猛發展的世界新軍事革命和戰爭形態變化,在統帥指引下,按照軍委政策制度改革統一部署,軍委聯合參謀部組織軍事科學院專家力量和軍委機關有關部門、各戰區、各軍兵種和武警部隊精干人員成立聯合課題組,集智聚力攻關,緊前推動新時代作戰條令制定工作。

2020年11月7日,《中國人民解放軍聯合作戰綱要(試行)》在全軍施行,標定了新時代我軍聯合作戰新的坐標系。

《綱要》頒發以來,指揮員率先領學、機關帶頭熱學、部隊實際踐學,全軍官兵學習宣貫《綱要》熱潮奔湧,一場新時代聯合作戰大討論、思想大解放、備戰大實踐,在全軍部隊蓬勃開展。

劍指勝戰,引領新時代備戰打仗新實踐

“遵通衢之大道兮,求捷徑欲從誰?”軍人的世界,沒有“容易”二字。勝戰之道,唯有備戰。

未來打什麼樣的仗,就要創新什麼樣的戰法;創新不了戰法,就難以打贏未來的戰爭。

作戰條令實質上就是解決如何打仗、怎麼打贏的問題,是對軍事戰略方針的細化、深化和具體化。《中國人民解放軍聯合作戰綱要(試行)》(以下簡稱《綱要》)深入研究未來戰爭特點規律,准確把握我軍機械化、信息化、智能化融合發展的時代特征,通過對未來作戰的前瞻性具象化設計,將新時代軍事戰略方針的精神實質和內容要求具體落實到部隊備戰打仗實踐中去。

《綱要》既是備戰指導綱要,更是聯戰勝戰綱要。

2021年新春伊始,東部戰區某區域,正在組織一場多軍種多方向成體系實戰化訓練。此次演練,在新出台的《綱要》引領下,陸海空天網電全域聯動,政治輿論密切配合,從作戰准備到態勢塑造再到任務實施,全流程信息主導,各單位密切協同,以雷霆萬鈞之勢彰顯了維護國家統一的堅定決心和強大能力,也見證了我軍聯合作戰由“形聯”到“神聯”的蛻變。

西部方向,2021年仲春午夜,一陣急促的警鈴聲響起,根據西部戰區空軍某基地等級轉進指令,陸軍某防空營官兵迅速奔向戰位,等級轉進時間進一步縮短。按照統一部署,戰區空軍責任區內,10余支陸軍防空力量成建制進入空軍指揮鏈條,打破軍種信息壁壘,實現共享預警信息、共同擔負戰備值班,初步形成聯合防空作戰體系。“你借我‘天眼’,我助你‘鐵拳’”,跨軍兵種的一體化聯合防空作戰邁出了新步伐,進入了新階段。

北部方向,2021年盛夏之初,戰鷹翱翔,鐵流滾滾,一場以空地聯合為主題的演習正在火熱進行。根據計劃,北部戰區空軍某指揮所與陸軍某集團軍共同組織軍旅兩級指揮所演習,研究探索聯合指揮機構編成,檢驗指揮所人員一體化聯合作戰指揮能力。情報分析處理、聯合火力打擊、綜合後裝保障等環節協同籌劃、一體展開,指揮機構人員一體編設、要素齊全。在一次次聯戰聯訓的淬煉下,以戰領訓、以訓載戰進一步落地落實,各軍兵種指揮員的聯合作戰指揮能力得到明顯提升。

南海方向,戰鷹呼嘯、攻勢凌厲,蛟龍出動、蹈海踏浪,雷達飛轉、導彈昂首……在戰區聯指的統一指揮下,各任務部隊一體聯動、密切協同,迅速構建起多域聯合、攻防兼備、梯次部署的戰場布勢,采取集中指揮與分散指揮相結合的方式,靈活機動開展海空護航和威懾驅離,有理有力有節,有效維護了南海的和平與安寧。

《綱要》施行一年來,備戰打仗的導向更加鮮明堅定,戰斗力這個唯一的根本的標准樹得更牢,練兵備戰作為部隊主責主業更加突出,研戰謀戰作為官兵第一責任更加清晰,聯戰勝戰的思路舉措越來越見成效,全軍持續掀起練兵備戰新的熱潮。

與時俱進,釐清新時代聯合作戰新機理

“凡益之道,與時偕行。”

軍事理論家杜黑曾言:“勝利只向那些能預見戰爭特性變化的人微笑,而不是向那些等待變化發生再去適應的人微笑。”

放眼世界,大國博弈斗爭加劇,戰爭威脅現實存在,戰爭形態持續演進,新軍事變革蓬勃發展,武器裝備隱身化、無人化、智能化成為主流趨勢,戰場空間向全域全維拓展,作戰力量一體聯動成為常態,作戰指揮、行動和支援保障更趨精細,打贏未來戰爭需要更加先進的作戰理論支撐。

作戰理念的差距才是根本的差距,作戰理論的落後才是最大的落後。當現代化戰爭在世界洶湧澎湃的時候,最需要的是更新銳、更勇敢的頭腦。

以《綱要》為統領的新時代作戰條令,堅持把習近平軍事戰略思想、新時代軍事戰略方針作為魂和綱,深刻把握國家安全新變化、作戰對手新調整、戰略布局新設計、積極防御新內涵、作戰指導新發展,將統帥認知戰爭、指導戰爭的原則和方法,物化為部隊具體執行的規范標准,推進我軍聯合作戰邁向更高層次。

——全維度闡述了信息化條件下戰爭指導的時代內涵。

《綱要》瞄准打贏未來高端戰爭,准確把握未來武裝沖突門檻降低、戰爭界限模糊,戰爭領域與其他領域的斗爭相互影響增效日漸突出等特點,強化作戰行動的政治、社會屬性,創新發展軍事斗爭范式模式,強調依托國家一體化戰略體系和能力,強調戰與非戰多域融合,強調軍事與政治、外交、經濟、文化等多手段綜合施策,發揮黨政軍警民整體優勢,反映了現代戰爭理念和打贏新時代人民戰爭、總體戰的戰爭指導。

——全要素規范了我軍聯合作戰行動樣式和行動方法。

《綱要》立足我軍擔負任務和建設發展實際,對未來可能實施的聯合作戰樣式進行了系統闡述,覆蓋各戰略方向核心使命,遍及陸、海、空、天、網絡和電磁多維空間。同時,還創造性地總結歸納了聯合作戰基本行動類型,將貫穿聯合作戰始終並具有共性特征的基本行動突出出來,形成全要素全領域聯合行動的閉環鏈路。

——全流程設計了聯合作戰指揮體系及組織運行方式。

聯合作戰組織實施復雜度極高、難度極大,能否在力量上“合”、行動上“聯”、效能上“優”,關鍵要看指揮上能否實現“統”。《綱要》圍繞打造堅強高效的聯合作戰指揮機構,緊密結合軍委、戰區聯指運行模式機制,充分考慮到既順應改革大方向和總要求,又為實際中靈活編組留有余地,重點解決聯合作戰指揮體系構建、指揮權責界面區分、軍種融入聯合體系等重大問題,確保千軍萬馬在統一號令下聯合行動。

以聯為綱,推動新時代聯合訓練新躍升

一引其綱,萬目皆張。習主席在中央軍委軍事訓練會議上強調,要強化聯合訓練,堅持以聯為綱,發展我軍特色聯合訓練體系,加速提升一體化聯合作戰能力。仗怎麼打、兵就怎麼練,打仗需要什麼、部隊就應該練什麼。當今世界一流軍隊,無不把提高聯合訓練水平視為戰爭准備的第一要務。

《綱要》是新時代作戰條令的開篇之作,也是新時代聯合訓練轉型的指向遵循。《綱要》指引著方向,《綱要》激發著活力,催生了新時代聯合訓練的新格局。

——寓戰於訓,呈現訓備“一體態”。

台灣海峽,海空編隊實施聯合戰備警巡,檢驗提升多軍兵種聯合作戰能力,時刻保持高度戒備狀態,堅決捍衛國家主權和領土完整。演練准備就是作戰准備,演練狀態就是作戰狀態,聯合演兵不再是單純的訓練活動,已經成為推進備戰、提升能力的准備過程。聯合訓練這個充滿力量的“源頭”“干流”,正在牽引、帶動軍事斗爭准備深入推進、蓬勃發展,充分釋放以訓載戰、以訓促備的作用功效。

——體系實訓,成為聯訓“新常態”。

“東部”“南部”“西部”“北部”“中部”,各戰區組織的一場場聯合實兵演習,“跨越”“機動”“紅劍”“天劍”“聯勤使命”,各軍兵種組織的系列體系化演訓,覆蓋了全季節、全天候、全地域。軍委機關、戰區、軍兵種分工負責,整體化設計、體系化組織,從上到下逐級分解,從下向上逐級集成,帶動聯合作戰體系運轉檢驗。聯合演訓、體系練兵呈現新氣象,練兵備戰模式出現新變化,我軍聯合訓練進入了全方位變革、整體性提升的新階段。

——中外聯訓,突顯聯演“融合態”。

賀蘭山下,青銅峽大漠腹地,“西部·聯合-2021”中俄聯演炮聲隆隆。此次聯演,中俄兩軍混合編組、合帳籌劃,雙方態勢共享、密切協同、聯合行動,演練聯合防空、聯合破障、聯合立體奪要等20余個課目,在中俄深度融合的作戰體系支撐下,實現聯演聯訓的新突破。 “海上聯合”“共同命運”“和平使命”……以中外聯訓為“窗口”,中國軍隊聯合訓練的新變化正在向世界精彩呈現。

——新域精訓,展現研戰“開放態”。

一場場聯合演練活動中,水下無人“魚群”、陸上無人“狼群”、空中無人“蜂群”開始真正湧現,陸航、特戰、電抗、無人、網絡、空天等新域新質力量,深度融入聯合作戰體系,深度進入聯合演練流程,精細構設現實作戰場景,精准實驗現代戰爭組織管理。作為備戰打仗最活躍的實踐領域,聯合訓練以創新、開放的姿態,朝著《綱要》指出的新型作戰領域,大膽嘗試、闊步前進。

戰建一體,塑造新時代體系建設新格局

習主席強調指出,要堅持以戰領建,加強戰建統籌,抓緊推進戰略性、引領性、基礎性重大工程,加快打造高水平戰略威懾和聯合作戰體系。

聯合作戰體系建設上的“患”,如不加快解決,一旦欠賬“復息”疊加,就將成為明天戰場上的“痛”。《綱要》從戰的角度,校准建的“准星”,堅定地指向軍隊建設正確的方向。

——校准建設“准星”指向聯合作戰所需。

在《綱要》指引下,聯合理念逐步確立,軍兵種行動“配合”、作戰域能力“整合”的壁壘逐漸被打破,陸、海、空、火等軍兵種並域聯合,太空、網絡、電磁空間等作戰域跨域融合逐步成為現實。以網絡信息體系為支撐,以作戰數據信息為紐帶,構建起全時暢通的指揮鏈路。系統內聯各作戰分中心,下接各作戰群(隊)指揮所,必要時直達單兵平台末端,實現聯合指揮到底到邊。各行動力量圍繞整體意圖共同發力,實現了聯合作戰理念以作戰力量“軍種屬性”為著眼,向以“作戰域”歸屬為著眼的轉變,成為未來聯合作戰的主要特征。拿著《綱要》研打仗、謀打仗、練打仗,在全軍上下蔚然成風。

——校准建設“准星”指向體系短板弱項。

以《綱要》為依據,我軍堅持繼承與創新、理論與實踐相結合,創新設計未來戰爭制勝之策,注重突出問題導向,植苗扎根練兵備戰,推進聯合作戰指揮體系建設、新型作戰力量建設,有效解決了軍事斗爭准備的突出短板弱項。2021年5月中旬,北部戰區黨委召開專題議戰會,對照《綱要》深入查找聯合作戰研究、指控模式轉變、聯合處置層次、高效指揮能力等方面的矛盾問題,依據《綱要》優化體系支撐、改進指控方法、完善指揮手段,推動了戰區聯指中心運行模式轉變和指揮效能提升。放眼全軍,類似的做法越來越多,參照《綱要》顧近及遠找差距、找思路、找方法,成為各層級各領域謀劃推動建設的新主流。

——校准建設“准星”指向制衡強敵所急。

落實以戰領建、戰建統籌,既要立足解決當前實際問題,又要注重解決長遠發展問題。《綱要》錨定未來制強勝強,蘊含著建設世界一流軍隊的深遠謀劃。以《綱要》為引領,著眼戰爭形態之變、科技發展之變,制衡強敵非對稱手段建設迎來了質的飛越。一批批新型無人機、新式直升機等先進武器裝備試驗列裝,一系列高新技術裝備部署研發,我們勝戰的底氣更足、能力更強。《綱要》濃縮了歷史智慧的“戰爭法典”,也融匯了新時代建設一流、制勝未來的勝戰之道。

“卻顧所來徑,蒼蒼橫翠微。”《綱要》施行一年來,新時代作戰條令正在為構建我軍特色的聯合作戰體系釋能增效。

新時代新征程,我軍聯合作戰之路必將更加寬廣,捍衛國家戰略發展利益的能力必將更加強大,打贏未來信息化戰爭的信心必將更加堅定,建設世界一流軍隊的偉大目標必將全面實現。

“有一根弦我們緊繃著,有一種使命我們肩扛著,有一片風浪我們緊盯著……我們時刻准備著!”

中國原創軍事資源:http://www.mod.gov.cn/gfbw/qwfb/4902340888.html

What are the Advantages of Chinese Navy Distributed Maritime Operations?

中國海軍分散式海上作戰有哪些優勢?

現代英語:

In recent years, with the development of intelligent unmanned technology, the navies of developed countries in the world have proposed the concept of “distributed lethality” with surface ships as the main body, aiming to achieve distributed maritime operations and gain battlefield advantages. Distributed maritime operations aim to integrate combat platforms in multiple domains, build an all-round three-dimensional situational awareness network, and form a seamlessly linked combat system of manned platforms and distributed unmanned platforms through communication networks throughout various domains and an integrated command and control system, thereby improving the overall combat and strike effectiveness.

The concept of distributed maritime operations

Distributed maritime operations are the integration and expansion of combat concepts such as “distributed lethality” and “manned-unmanned collaborative operations”. The main idea is that large-scale, multi-purpose, high-value combat platforms are no longer required to independently complete diversified combat missions, but rather the main combat capabilities such as reconnaissance, command, strike, and interference are dispersedly deployed on various heterogeneous unmanned platforms in various combat domains. A highly resilient combat system is formed by the fusion of a small number of manned platforms and a large number of distributed unmanned platforms, which can complete various complex combat missions through efficient, precise, and real-time collaboration. This combat system includes a small number of high-value manned platforms and a large number of low-cost unmanned platforms. The manned platforms serve as battlefield decision makers, responsible for relatively complex tasks such as combat plan planning and combat mission allocation and implementation; the unmanned platforms are used to perform relatively dangerous or simple tasks such as situational awareness and fire strikes. Manned/unmanned platforms work closely together to complete combat missions.

The essence of distributed maritime operations is to seamlessly link and organically integrate high-value manned platforms and low-cost unmanned platforms at sea, and to achieve common operational goals through high information sharing, precise task aggregation, and efficient operational coordination. It has the remarkable characteristics of on-demand sharing of operational information, deep integration of operational tasks, precise planning of operational resources, and optimized organization of operational processes. Through manned/unmanned distributed coordination, a new type of efficient maritime combat system can be formed that complements each other’s strengths, integrates functions, and has complementary capabilities. Distributed maritime operations highlight the combinability, consumability, and “decentralization” of force utilization, and focus on the deep embedding and comprehensive application of artificial intelligence technology, which can enhance the resilience of the combat system and promote the development of joint global operations in the maritime direction towards intelligence.

Typical characteristics of distributed maritime operations

At present, intelligent unmanned equipment is developing rapidly, and is increasingly possessing advantages such as human-equipment integration, cross-domain coordination, cluster confrontation, and autonomous combat. Distributed maritime combat is accelerating to present typical characteristics such as wide-area distribution coordination, cross-domain multi-dimensional integration, and manned and unmanned integration.

Wide-area distributed coordination. Wide-area distributed coordination means that various combat elements or combat resources can be adaptively optimized and combined and dispatched according to the battlefield situation, so as to realize the precise energy concentration and release of the combat system. The first is the distributed deployment of the combat system. In distributed maritime operations, the combat space is deeply embedded in various combat domains, and the combat forces can be distributed and deployed in a decentralized wide area. The second is the intelligent reconstruction of the combat system. The combat system is lighter, more capable, and more agile, and its battlefield environment adaptability and system dynamic optimization and reconstruction capabilities are significantly enhanced, and it can quickly and flexibly adjust the required combat forces and battlefield resources. The third is the concentrated release of combat energy. The combat system can achieve rapid mobility, real-time response and coordinated operations of various combat platforms and combat forces in the global combat space through semi-autonomous or autonomous coordinated control of equipment, ensuring the precise concentration and release of combat forces.

Cross-domain multi-dimensional integration. Distributed maritime operations transform the centralized combat group mode into a distributed, agile combat mode. Various combat units are distributed in multiple combat domains, which can realize the monitoring and positioning of cross-domain targets, and then implement effective strikes. The first is the cross-domain integration of combat forces. The combat forces deployed in multiple domains will be dynamically networked through intelligent systems to form a cross-domain combat system. The second is the seamless connection between strategy, campaign, and tactics. New domain and new quality combat forces will directly participate in intelligent naval warfare as the main combat role, achieving comprehensive coverage from strategy to campaign, seamless connection from campaign to tactics, giving birth to a new quality combat capability of rapid assault, multi-dimensional integration, and full-domain offense and defense, and realizing cross-domain coordinated strikes on combat targets.

Manned and unmanned are one. Distributed maritime operations can rely on a large number of intelligent unmanned equipment to form a “manned-unmanned” joint strike system with high autonomy and coordination. By accelerating the development of unmanned equipment such as ship-borne drones, surface unmanned boats, and underwater unmanned vehicles, long-, medium-, and short-range echelon configurations can be achieved, and cross-domain integration of unmanned equipment such as air, surface, underwater, and land can be achieved. The unmanned and manned equipment systems are seamlessly integrated, and the mission domain is expanded from information assurance to firepower strikes. This will promote changes in maritime combat styles, accelerate the formation of new combat styles such as manned system collaborative operations, unmanned system single operations, unmanned system cluster operations, and frontier preset operations, and achieve a subversion of traditional manned combat styles.

The winning mechanism of distributed maritime operations

The reason why major scientific and technological progress can promote the evolution of the war situation is largely because it has profoundly changed the mechanism of winning wars. At present, cutting-edge technology has significantly improved the level of equipment intelligence, profoundly changed the combat power generation mode, and accelerated the evolution of the mechanism of winning naval battles.

“Distributed interconnection, human-machine collaboration” wins. The distributed, intelligent, and networked command information system built on cloud computing, data chain, Internet of Things and other technologies has brought profound changes to modern naval warfare. Supported by the cloud edge, the command information system realizes real-time interaction between various combat platforms through high-speed and secure network connections, significantly improving the information interconnection, interoperability and interoperability between different combat platforms; it can efficiently analyze and process massive battlefield information, accurately judge the battlefield situation, and transform combat command to an intelligent decision-making method centered on “data, algorithms and models”; commanders at each node share information in real time in the cloud network, synchronously judge the situation, and coordinate command, so that command and control activities are concise and optimized, and combat decisions are more efficient and accurate. In addition, under “distributed interconnection”, intelligent unmanned combat has developed from a single platform to a multi-platform cluster, and from remote-controlled combat to semi-autonomous and autonomous combat. Multiple “single-person-single-machine” command chains running in parallel have gradually formed a single simple command chain of “commander-unmanned combat cluster”. Through the efficient and autonomous coordination of manned platforms and unmanned platforms and their clusters, the combat potential of intelligent unmanned equipment can be fully activated, and the advantages of various advanced equipment can be maximized.

“Algorithm-driven, fast and accurate cognition” wins. In intelligent warfare, advanced algorithms replace commanders’ thinking through precise and high-speed calculations, promoting the accelerated integration of rational combat knowledge and emotional commander experience. With advanced algorithms, we can quickly and accurately understand the situation on the naval battlefield, and then accurately and quickly plan scientific and feasible combat plans for changes in the situation on the naval battlefield, disrupting the opponent’s established deployment and combat intentions. Algorithms can effectively process massive amounts of high-value intelligence information and increase the speed of the “OODA” cycle. Mastering the advantages of algorithms can achieve fast and accurate cognition of the enemy’s situation, our situation, and the battlefield environment, thereby accurately predicting the enemy’s combat actions and innovating and optimizing our own action plans in a targeted manner.

“Cloud brain support, network failure and disconnection” will win. In distributed maritime operations, the command and control system will operate in a collaborative way of “human brain + cloud brain”, and the intelligent advantage will become an “advanced” advantage based on information advantage, and “network failure and disconnection” will become one of the main patterns of maritime operations. On the one hand, unmanned intelligent combat actions supported by cloud brain will penetrate the entire process of operations. In distributed maritime operations, the collaborative mode of “human brain + cloud brain” runs through all aspects of operations such as intelligent assisted command decision-making, automatic intelligence reconnaissance, automatic combat planning, autonomous precision strikes, and intelligent logistics support. On the other hand, targeting the intelligent ubiquitous network structure covering the entire domain and multiple dimensions, using intelligent equipment or means to attack key nodes and hubs such as its reconnaissance and surveillance network, information transmission network, command and control network, and comprehensive support network can paralyze its combat network system.

“Cross-domain integration, integrated energy release” wins. Distributed maritime operations will leap from integrated joint operations under information conditions to autonomous cross-domain collaborative operations under intelligent conditions. Different types of new-quality combat capabilities will be integrated and coordinated across domains, and flexibly and accurately integrated to release combat effectiveness. On the one hand, relying on the cross-domain, distributed, and networked collaborative combat system supported by the cloud edge, through the cross-domain mobility of the main combat platform, the cross-domain complementation of equipment functions, the cross-domain sharing of information and intelligence, the cross-domain coordination of combat command, the cross-domain response of mission actions, and the cross-domain interconnection of channel links, a variety of new-quality combat capabilities can be efficiently linked. On the other hand, cross-domain integration highlights the close coordination between the main domain master control and cross-domain support. For example, the navy will be the main control force in maritime offensive and defensive operations, and other forces will implement cross-domain coordinated support through the integration of air and space, sea and space, and network and space.

“Strike at acupoints and lure at agglomeration” to win. Distributed maritime operations will transform from traditional concentrated annihilation warfare to precise strike at acupoints, and high-value targets will face the threat of long-range autonomous precision strikes from intelligent combat equipment; from traditional large-scale manned attrition warfare to global unmanned cluster lure warfare, and important strategic targets will face the threat of saturation attacks and deceptive strikes from low-cost unmanned clusters. In the process of distributed maritime operations, unmanned equipment such as drones and unmanned submarines can be deployed to form a widely distributed, self-organized and coordinated reconnaissance network. Through autonomous reconnaissance, identification and strike actions, long-range and precise attacks can be carried out on the opponent’s high-value targets. Under the condition of minimizing collateral damage as much as possible, the opponent’s hand-wave network can be paralyzed from top to bottom to destroy its command system. Under the intelligent ubiquitous network system, based on the self-organized “swarm” combat of large-scale machine intelligent agents, full coverage reconnaissance of the opponent’s core area can be achieved, deceiving and luring the enemy, and consuming the opponent’s combat resources to the maximum extent.

現代國語:

中國軍網 國防部網
2024年8月15日 星期四

邱志明

近年來,隨著智慧無人技術的發展,世界發達國家海軍提出以水面艦艇為主體的「分散式殺傷」概念,意在實現分散式海上作戰,獲得戰場優勢。分散式海上作戰旨在融合多域空間的作戰平台,構建全方位立體式的態勢感知網,透過遍布各域的通訊網絡和一體化的指揮控制系統,形成有人平台與分散式無人平台無縫鉸鏈的作戰體系,從而提高整體作戰與打擊效能。

分散式海上作戰的概念內涵

分散式海上作戰是「分散式殺傷性」與「有人無人協同作戰」等作戰理念的融合與拓展,主要思路是不再由大型的、集多用途於一體的高價值作戰平台獨立完成多樣化作戰任務,而是將偵察、指揮、打擊、幹擾等主要作戰能力分散部署到各類作戰域的多異構體作戰平台上,由少量平台和海量協同發展為一般人的綜合設施,通過大量的綜合操作,有人這個作戰體系包括少量高價值有人平台和大量低成本無人平台,其中有人平台作為戰場決策者,負責作戰方案籌劃以及作戰任務分配和實施等相對復雜的任務;無人平台用於執行態勢感知、火力打擊等相對危險或簡單的任務,有人/無人密切協同完成作戰任務。

分散式海上作戰的本質是將海上高價值有人平台與低成本無人平台無縫鉸鏈與有機融合,透過高度的資訊共享、精準的任務聚合、高效的作戰協同來實現共同的作戰目標,具有作戰資訊按需共享、作戰任務深度整合、作戰資源精準規劃、作戰過程優化組織等顯著特點。透過有人/無人分散式協同,可以形成取長補短、功能銜接、能力相濟的新型海上高效作戰體系。分散式海上作戰突顯了兵力運用的可組合性、可消耗性和“去中心化”,注重人工智慧技術深度嵌入與全面應用,可以提升作戰體系韌性,推動實現海上方向聯合全局作戰向智能化方向發展。

分散式海上作戰的典型特徵

當前,智慧無人裝備加速發展,日益具備人裝融合、跨域協同、群集對抗、自主作戰等優勢,分散式海上作戰加速呈現廣域分佈協同、跨域多維融合、有人無人一體等典型特徵。

廣域分佈協同。廣域分佈協同是指,各作戰要素或作戰資源能根據戰場態勢進行自適應優化組合與調度,實現作戰體系精確聚能釋能。一是作戰體系分散部署。分散式海上作戰,作戰空間深度嵌入各個作戰域,作戰力量能夠進行分散式廣域分佈與部署。二是作戰體系智能重構。作戰體系更為輕便、精幹、靈敏,戰場環境自適應能力與體係動態優化重組能力顯著增強,能快速靈活調整所需作戰兵力與戰場資源。三是作戰能量集中釋放。作戰體系能夠透過裝備半自主或自主協調控制,實現全域作戰空間內各種作戰平台、作戰力量的快速機動、即時反應和協同作戰,確保作戰力量的精確集中能。

跨域多維融合。分散式海上作戰將集中式的戰鬥群模式轉變為分散式、敏捷式作戰模式,各種作戰單元分佈於多個作戰域,可實現對跨域目標的監視、定位,進而實施有效打擊。一是作戰力量跨域融合。將分散部署在多個領域的作戰力量,透過智慧系統進行動態組網,形成跨域作戰體系。二是戰略、戰役、戰術無縫連結。新域新質作戰力量將作為主戰角色直接參與到智能化海戰中,實現從戰略到戰役的全面覆蓋,從戰役到戰術的無縫鏈接,催生快速突擊、多維一體、全局攻防的新質戰鬥力,實現對作戰目標的跨域協同打擊。

有人無人一體。分散式海上作戰可以依賴大量智慧無人裝備,形成一個「有人-無人」聯合打擊體系,具有很高的自主性與協同性。通過加快推進艦載無人機、水面無人艇、水下無人航行器等無人裝備發展,實現遠、中、近程梯次配置,空中、水面、水下、陸岸等無人裝備跨域集成,無人與有人裝備體系無縫融合,任務領域從信息保障擴展到火力打擊領域,助推海上作戰樣式變革,加速形成系統協同作戰系統、獨立作戰系統

分散式海上作戰的致勝機理

科技的重大進步之所以能推動戰爭形態的演變,很大程度上在於深刻改變了戰爭制勝機理。當前,前沿技術顯著提升了裝備智慧化水平,深刻改變了戰鬥力生成模式,加速海戰制勝機理發生嬗變。

「分佈互聯,人機協同」制勝。依托雲計算、數據鏈、物聯網等技術打造的分散式、智慧化、網路化指揮資訊系統,為現代海戰帶來了深刻變革。指揮資訊系統在雲邊端支撐下,通過高速、安全的網絡連接,實現各作戰平台間的實時交互,明顯提升了不同作戰平台間的信息互聯互通互通能力;能夠高效分析處理海量戰場信息,精準研判戰場態勢,作戰指揮向“以數據、算法和模型為中心”的智能化決策方式此外,在「分散互聯」下,智慧無人作戰由單平台向多平台集群方向發展,由遙控作戰向半自主、自主作戰方向演進,由多條並行運行的「單人-單機」指揮鏈逐步形成「指揮員-無人作戰的集群」的單一簡易指揮鏈,通過有人平台與無人平台及其集群的高效自主協同,充分激活智能化的潛力裝備,高級平台及其集群的高效自主協同,充分激活智能設備的高級設備。

「演算法驅動,快準認知」制勝。智慧化戰爭,先進的演算法透過精確、高速的運算取代指揮人員的思考,推動理性的作戰知識與感性的指揮者經驗加速融合。擁有先進的演算法,便能又快又準地實現對海戰場態勢的認知,進而針對海戰場態勢變化準確、快速地籌劃出科學可行的作戰方案,打亂對手既定部署和作戰企圖。演算法能有效處理大量高價值情報訊息,提升「OODA」循環速度。掌握演算法優勢即可實現對敵情、我情以及戰場環境又快又準的認知,從而準確地預測敵方作戰行動,有針對性地創新優化己方行動方案。

「雲腦支撐,癱網斷鏈」制勝。分散式海上作戰,指揮控制系統將以「人腦+雲腦」的協作方式運行,智慧優勢成為以資訊優勢為基礎的「進階」優勢,「癱網斷鏈」成為海上作戰主要樣式之一。一方面,在雲腦支撐下的無人智慧作戰行動將滲透到作戰的全流程。分散式海上作戰中,「人腦+雲腦」的協作方式貫穿智慧輔助指揮決策、自動情報偵察、自動作戰規劃、自主精確打擊、智慧後勤保障等作戰全環節。另一方面,針對覆蓋全球多維的智慧化泛在網絡結構,運用智慧化裝備或手段對其偵察監視網、資訊傳輸網、指揮控製網、綜合保障網等關鍵節點與樞紐部分實施攻擊,可使其作戰網絡體系癱瘓失能。

「跨域融合,整合釋能」制勝。分散式海上作戰將由資訊化條件下的一體化聯合作戰躍升到智能化條件下的自主跨域協同作戰,不同類型的新質作戰能力跨域融合、協同聯動,並靈活精準地集成釋放作戰效能。一方面,以雲邊端支撐下的跨領域、分散式、網絡化的協同作戰系統為依托,透過主戰平台跨域機動、裝備功能跨域互補、資訊情報跨域共享、作戰指揮跨域協同、任務行動跨域響應、通道鏈路跨域聯通,實現多種新質作戰能力的高效聯動。另一方面,跨域融合凸顯主域主控與跨域支援的緊密配合。例如,海上攻防作戰將以海軍為主控力量,其他力量透過空天一體、海天一體、網天一體運用,實施跨域協同支援。

「點穴打擊,集群誘耗」制勝。分散式海上作戰將從傳統的集中殲滅戰向精確的點穴打擊戰轉化,高價值的目標將面臨智慧化作戰裝備的遠程自主精準打擊威脅;從傳統的規模化有人消耗戰向全局的無人集群誘耗戰轉化,重要的戰略目標將面臨低成本無人集群的飽和攻擊與誘騙打擊威脅。分散式海上作戰過程中,可投放無人機、無人潛航器等無人裝備,形成廣域分佈、自組織協同的偵察網絡,通過自主偵察、判別和打擊行動,對對手高價值目標實施遠程精準攻擊,在盡可能減少附帶損傷的情況下,自上而下癱瘓對手指揮網絡,破壞其指揮體系。在智慧泛在網絡體系下,基於大規模機器智能體自組織的「蜂群」作戰,可實現對對手核心區域的全覆蓋偵察,進行欺騙誘敵,最大限度地誘耗對手作戰資源。

中國原創軍事資源:http://www.81.cn/szb_223187/szbxq/index.html?paperName=jfjb&paperDate=2024-08-15&paperNumber=07&articleid=937599888

Chinese Military – Cognition-centered warfare: operational concepts for dealing with complex wars

中國軍事-以認知為中心的戰爭:因應複雜戰爭的作戰理念

音譯外語:

Complexity science is one of the frontier fields of contemporary scientific development. It is a new tool for understanding, understanding, and exploring the phenomena, laws, and mechanisms of war. As the form of war evolves from information war to intelligent war, the complexity of war shows an exponential growth trend, and it becomes increasingly difficult to seize control of information. The key to combat is to put the enemy into a “decision-making dilemma” so that it can even Even with information superiority, it cannot make correct decisions, thus losing its combat advantage. The focus of operations will change from “information-centered” to “cognition-centered”, and the winning mechanism will change from “information winning” to “cognitive winning”.

“Three changes” reveal the driving forces behind the increasing complexity of war

War is a field full of possibilities, and change is the basic characteristic that runs through it. President Xi stressed that we must pay close attention to changes in technology, war, and opponents. Changes in science and technology are the foundation, changes in war are the subject, and changes in opponents are the key. Changes in science and technology lead to changes in war, and changes in war prompt changes in opponents. The “three changes” have promoted the evolution of war forms, the expansion of war fields, the transformation of war goals, and the expansion of war influence, revealing the driving forces behind the growth of war complexity.

Changes in technology have overturned the basis for winning wars. Science and technology are the core combat effectiveness and the most active and revolutionary factor in military development. Throughout the history of the world’s military development, every major scientific and technological innovation has started a new military revolution, and every military revolution has pushed military development into a new era. Scientific and technological innovation has become a huge engine to improve the military’s combat effectiveness. . At present, a new round of scientific and technological revolution and military revolution are accelerating. The degree of informatization of modern warfare is constantly increasing, and the characteristics of intelligence are becoming increasingly apparent. The role of driving the military revolution is becoming more and more prominent. The rapid development of some cutting-edge technologies may fundamentally change the face of war and war. According to the rules, the military game between great powers is more embodied in technological subversion and counter-subversion, raids and counter-raids, offsets and counter-offsets. The U.S. Navy’s “Nemesis” project includes reconnaissance, decoy, jamming and other systems. The decoy system covers air, surface and underwater. Under the scheduling and control of the distributed artificial intelligence engine, it can complement each other, coordinate deception, and truly create a A “ghost aircraft carrier formation” completely subverted traditional electronic deception methods and raised information deception to an unprecedented level. It can be said that science and technology has never had such a profound impact on the overall situation of national security and military strategy as it does today. It has profoundly intervened in, supported, and dominated the evolution of war forms and the innovation of combat styles, and has even subverted the mechanism of winning wars.

The U.S. Navy’s “Nemesis” project is based on networked collaborative electronic warfare

Concept, integrating different systems and utilizing unmanned distributed

Clusters of electronic warfare platforms enable large-scale collaborative electronic warfare

The changes in war highlight the complexity of war. Modern warfare is undergoing profound changes, showing unprecedented diversity and complexity. This super complexity stems from many reasons: first, various advanced technologies or weapons are constantly emerging, bringing many uncertainties; second, the battlefield covers land, sea, air, space, network, electricity and cognitive and other multiple third, multiple combat objects, combat styles, combat areas, and combat methods are cross-correlated and combined to form a complex “hybrid war”; fourth, artificial intelligence algorithms build a large number of combat elements into a complex logic, and use human Machine speed beyond the reach of thinking prompts the combination, deconstruction, and recombination of various elements. In the Ukraine crisis in 2022, on the surface it is a confrontation between Russia and Ukraine, but in essence it is a “hybrid war” between the United States and Western countries and Russia; the Russian and Ukrainian armies extensively use military and civilian drones to expand The “unmanned +” application model shows the prototype of future unmanned intelligent operations; with the support of U.S. NATO air and space situational intelligence, the Ukrainian army frequently uses low-cost unmanned equipment to carry out raids on important Russian weapons platforms, highlighting its new qualities Combat forces have asymmetric attack advantages against large weapons and equipment in traditional combat systems. Changes in technology will eventually lead to changes in war. The impact of a single element on war will become weaker and weaker. The joint combat system composed of multiple elements will have a complex impact on war. War is non-linear, uncertain, chaotic and open. Complex characteristics such as adaptability and confrontation will increase exponentially, which will make it more difficult for people to judge the progress and outcome of the war.

Changes in opponents accelerate the growth of war complexity. Changes in war prompt changes in opponents. Currently, we are experiencing major changes unseen in a century. Major military powers are actively making strategic adjustments and promoting a new round of military reforms, which exhibit the following characteristics: first, the trend of joint, miniaturized, and autonomous institutional establishments has become more obvious; second, The first is that weapons and equipment are showing a development trend of digitization, precision, stealth, unmanned, and intelligence; the third is that the combat form is moving towards the “four nons” (non-contact, non-linear, asymmetric and irregular) and the “three nos” (Invisible, silent, unmanned) combat; fourth, the military command form is developing in the direction of flattening, automation, networking, and seamlessness. The United States regards China as its main strategic opponent and strives to suppress and contain China. It has vigorously strengthened the innovation of operational concepts and has successively proposed new operational concepts such as “hybrid warfare”, “multi-domain warfare” and “mosaic warfare”, claiming that it will fight to defeat its opponents. A high-end war in which “technology cannot be understood, strikes are difficult to predict, and speed cannot keep up.” The core of the US military’s “mosaic warfare” is unmanned, low-cost, fast, lethal, flexible and reconfigurable. It is based on distributed situational awareness, with the help of intelligent auxiliary decision-making tools and the concept of building blocks and jigsaw puzzles to adaptively formulate mission planning. , dynamically reorganize combat forces, decompose the functions of the combat platform into a larger number of single-function nodes, and build a combat system with a large number of functional nodes. Replace the “kill chain” with a “kill network”. Several nodes will fail or be missing, and the combat system can be adaptively reorganized.

The increasing complexity of war drives the transformation of the winning mechanism of war

With the rapid development of national defense science and technology, the upgrading of weapons and equipment, and the rapid evolution of war forms, modern warfare has shown exponential and explosive complex changes. These changes may seem dazzling, but there are rules to follow behind them. The fundamental thing is that the winning mechanism of war has changed. Only by thoroughly understanding the winning mechanism of modern war can we accurately recognize changes, respond scientifically, be good at seeking change, and firmly grasp the initiative in future wars.

The form of war has changed from cold weapon warfare to intelligent warfare . The shape of war is a holistic understanding of war. So far, human war has generally gone through four historical stages: cold weapon war, hot weapon war, mechanized war, and information war, and is moving towards intelligent warfare. The history of cognitive warfare is almost as old as the history of human warfare. In the era of cold weapon war, hot weapon war, and mechanized war, cognitive warfare appears more in the form of public opinion warfare and psychological warfare. As mankind enters the information age, the development of cyberspace technology has greatly expanded the space for cognitive warfare, enriched the technical means of cognitive warfare, and greatly enhanced the permeability, timeliness, and deterrence of cognitive warfare. The status and role of Zhizhan have been unprecedentedly improved. In the future, the form of war will enter intelligent warfare, and a large number of intelligent weapon systems and platforms will be equipped with the military and put into combat. Cognitive warfare can not only interfere with and deceive the cognition of enemy personnel, but also attack the cognition of smart equipment through algorithm deception methods such as “adversarial input” and “data poisoning”. Its application scenarios and scope will be further expanded. , the status and role will be further improved.

Drones have gradually become the protagonist of war,

Combat complexity further increases

The purpose of war has changed from conquering by force to conquering by spirit. The winning mechanism of modern war has undergone great changes compared with the past. The violence of war has been curbed. The purpose of combat has changed from the original siege of cities and territories and annihilation of the enemy’s effective forces to making the opponent obey one’s own will. The means of combat have changed from conquering by force to conquering more areas. The emphasis on psychological and spiritual conquest and transformation has made cognitive warfare increasingly prominent in its status and role in modern warfare. In recent years, “hybrid warfare” has become a major means of great power competition. More and more countries have begun to focus on using new fields and new means to achieve political, military, and economic goals that are difficult to achieve with traditional warfare. “Hybrid war” is a mixture of war subjects such as states, non-state actors and individuals, a mixture of conventional warfare, unconventional warfare and other war styles, a mixture of military operations such as combat, stability maintenance and reconstruction, and a mixture of political, military and economic The mixture of multiple fields such as military and people’s livelihood is a mixture of multiple combat goals such as defeating the enemy and winning the hearts and minds of the people. This is highly consistent with cognitive warfare. The operational field of “hybrid warfare” has expanded from the military field to politics, economy, culture, people’s livelihood and other fields; the combat methods have expanded from firepower warfare and troop warfare to diplomatic warfare, economic warfare, cyber warfare, psychological warfare, public opinion warfare and other directions. This is highly consistent with cognitive warfare. Its core essence is to “make profit out of chaos”, its main purpose is to win people’s hearts, and its combat guidance is to win by cleverness.

The winning domain of war changes from the physical domain and information domain to the cognitive domain. Modern war occurs in three fields: physics, information and cognition at the same time. The physical domain and information domain are separated from the material domain, and the cognitive domain is separated from the spiritual domain. The physical domain is a traditional war domain, consisting of combat platforms and military facilities, which provides the material basis for information warfare. The information domain is a newly emerging war field, that is, the space for information generation, transmission and sharing, and is the focus of information warfare competition. Cognitive domain is the scope and field involved in human cognitive activities. It is not only the space for human feeling, perception, memory and thinking activities, but also the space for knowledge generation, exchange, association, storage and application. It is also the space for perception, judgment and decision-making in combat activities. and spaces of command and control. The cognitive domain exists in the field of consciousness of combatants and affects their judgment and decision-making. It is a rising field of warfare. With the development of technologies such as network information and artificial intelligence, the scope of the cognitive domain has greatly expanded, and is expanding from the field of human consciousness to the field of modern cognitive tools and artificial intelligence. The development of military technology has expanded the scope of the cognitive domain and provided more advanced, faster, and more effective material and technical means for cognitive warfare, greatly enhancing the permeability, timeliness, and deterrence of cognitive warfare, fundamentally It has changed cognitive warfare, making the cognitive domain a new winning field that transcends the physical domain and information domain, and has become the ultimate domain for great power games and military confrontations.

The mechanism for winning wars changes from information victory to cognitive victory. In the final analysis, war confrontation is a game and confrontation of cognition. Mastering the right to control cognition will largely control the initiative in war. Losing the right to control cognition will put you in a passive position of being beaten in the war. Obtaining higher and stronger control rights is the key to defeating powerful enemies. Finding ways to control cognitive power and then seize comprehensive battlefield control, so as to achieve maximum victory at the minimum cost, is an important mechanism and inherent law of modern warfare, especially cognitive warfare. In recent years, the U.S. military has successively proposed new concepts of future warfare represented by “decision-centered warfare” and “mosaic warfare”, intending to use complexity as a weapon to create multiple dilemmas for opponents, requiring it to ensure its own tactical “selective advantage”. At the same time, by creating highly complex decision-making influences on the enemy and interfering with its decision-making capabilities, it can achieve a subversive advantage over the enemy in the cognitive domain. In the primary and intermediate stages of information warfare, the key to combat is to seize network control and information control, which runs through the progressive model of “network advantage → information advantage → decision-making advantage → combat advantage”. After information warfare enters an advanced stage, it becomes more and more difficult to seize control of information. The key to combat is to make the enemy fall into a “decision-making dilemma” so that even if it has information superiority, it cannot make correct decisions, thereby losing its combat advantage and having recognition. Only by knowing the advantages can you have the combat advantage. In future wars, cognitive advantage will be the most important strategic advantage, and cognitive confrontation will be the most important form of confrontation. It can be said that “without cognition, there is no war.”

Coping with complex wars has given rise to the concept of cognitive-centered warfare

In order to cope with the exponential growth trend of the complexity characteristics of modern warfare, we must use the theories and methods of complexity science to change the concept of platform-centered warfare where firepower is supreme and killing is king, and establish a cognitive-centered combat thinking. Cognition-centered warfare refers to taking the cognitive domain as the winning area, taking the cognitive advantage as the operational goal, and focusing on interfering with cognitive means, suppressing cognitive channels, affecting cognitive production, and conducting cognitive operations on enemy personnel and intelligent equipment. Interference, suppression, deception and inducement are a new operational concept that obtains combat advantages by seizing and maintaining cognitive advantages. Its main winning mechanisms are as follows.

Sun Tzu mentioned in “The Art of War” that “there is no constant force in an army;

Water has no permanent shape; those who can win due to the changes of the enemy are called gods.

Use cyber deterrence to destroy the enemy’s will to fight. Targeting the enemy’s political, economic, military, diplomatic, and cultural contradictions and weaknesses, disseminate deterrent information through cyberspace, or publish military parades, large-scale military exercises, new weapons and equipment research and development and other information through the Internet, so as to cause extreme cognitive and psychological changes in the opponent. Great fear and shock, deterring the enemy is not conducive to the implementation of my actions. Comprehensive use of network and electricity attack methods to carry out point strikes and warning attacks against the enemy’s important network and electricity targets and key core nodes, destroying the enemy’s system combat capabilities, affecting the normal performance of the enemy’s weapons and equipment, and providing psychological deterrence to the enemy. The US military’s “gray zone operations” theory relies on its own technological advantages and mainly takes actions such as cyber and electronic countermeasures to respond to the opponent’s “gray zone provocation” and deter the opponent from giving up “confrontation” or escalating the conflict, putting it in a dilemma.

Use information deception to induce the enemy to make misjudgments. Aiming at the enemy’s reconnaissance equipment, intelligence agencies and command systems, use cyber attacks, electronic deception and other means to conceal one’s military intentions, military operations and military objectives, and transmit to the enemy erroneous and false combat plans, troop configurations and operations. capabilities, combat plans, battlefield situation, etc., or use the enemy’s command information system to send false orders and information to induce the enemy to make wrong judgments and disrupt the enemy’s combat command. Implement new attacks such as “adversarial input” and “data poisoning” against artificial intelligence algorithms, allowing them to obtain preset conclusions through deep learning training, or causing them to fall into local optimal solutions and ignore the global optimal. Use technologies such as computer imaging, video synthesis, virtual reality, and artificial intelligence to synthesize sound, video, images, text information, etc., or use “deep fake” technology to generate false information that is confusingly real and difficult to distinguish between true and false, and transmit it through the Internet Spread in large quantities to confuse and deceive opponents and influence their decisions and actions.

Use information suppression to block the enemy’s cognitive means. Target the enemy’s important network targets, as well as core routers, switches, gateways, key servers, etc., and use “soft” and “hard” attack methods to destroy their network nodes. Based on the networking characteristics of wireless links such as the enemy’s command and control network, communication transmission network, weapon hinge network, and early warning detection network, comprehensively use technologies and means such as electronic jamming, GPS spoofing attacks, command link takeover, and data hijacking control to suppress them. data communication, blocking its communication links and interfering with its combat command. Implement cyber-paralysis attacks on enemy command and control, military communications, early warning detection, aerospace information and other military networks, destroying core networks that affect their operations and weakening their combat capabilities.

Use public opinion propaganda to create a favorable public opinion environment . Cooperate with the country’s political, military, and diplomatic struggles, vigorously promote one’s own justice in the war, and stimulate the enthusiasm of all people to fully support the war. With the help of new media platforms such as instant messaging tools, online forums, podcasts, Twitter, and WeChat, we can systematically disseminate information that targets the enemy’s weaknesses. After gaining widespread attention and consensus, we can then promptly report information, create new hot spots, and repeatedly build momentum. Enhance the influence and form a resonance effect to expand the effect. Propaganda “sets the tone” by cleverly setting agendas, building public opinion through powerful media, setting off a “spiral of silence”, controlling and guiding public opinion, and changing people’s opinions and behaviors.

Use psychological attacks to undermine the morale of enemy soldiers and civilians. Through the Internet, processed and processed information is widely disseminated to promote one’s justice, demonstrate one’s strength, will and determination, vilify the enemy politically and morally, gather the thoughts and will of the military and civilians internally, and strive to win externally. The commanding heights of law and morality can “soften” and “weaken” the enemy spiritually. Use a variety of network communication methods and technical means to send various deceptive, disruptive, inductive, and deterrent messages to the enemy’s military and civilians in a targeted manner to attack the enemy’s psychological defense line, promote an ineffective confrontation mentality, and then lose combat capabilities. . Through the Internet to create, guide, plan, build, and expand momentum, we can create a “momentum” that is beneficial to ourselves but not beneficial to the enemy, causing a psychological impact on the other party’s people, thereby affecting or changing their psychological state, and implementing effective psychological attacks.

Use legal struggle to gain legal and moral support. Use legal weapons to curb the enemy’s possible or future illegal acts, declare the legality of our actions, affirm our power of military counterattack, declare our determination to pursue war responsibilities, and deter the enemy. By exposing the illegality of the enemy’s provocative behavior, criticizing the legal basis for the enemy’s combat operations, and condemning the enemy’s illegal behavior, it causes the enemy’s strategic defeat and our own strategic gain. Use legal means to restrict the enemy’s possible actions, limit the possible interference of third parties, and block other parties from interfering with our own actions. Formulate the laws and regulations necessary for our operations to provide legal protection for our operations, or take legal remedial measures to reduce the possible negative impacts of our operations and ensure that combat operations are carried out in accordance with the law.

This article was published in the 7th issue of “Military Digest” magazine in 2023.

Authors: Wang Xin, Huang Xiaoyan, etc.

原始繁體中文:

複雜性科學是當代科學發展的前沿領域之一。 它是認識、理解和探索戰爭現象、規律和機制的新工具。 隨著戰爭形式從資訊戰爭向智慧化戰爭演變,戰爭的複雜性呈指數級增長趨勢,奪取資訊控制權變得越來越困難。 作戰的關鍵是讓敵人陷入“決策困境”,使其即使擁有資訊優勢,也無法做出正確決策,從而失去戰鬥優勢。 作戰重心將從“以資訊為中心”轉變為“以認知為中心”,制勝機制將從“資訊制勝”轉變為“認知制勝”。
「三個變化」揭示戰爭複雜化背後的驅動力
戰爭是一個充滿可能性的領域,變化是貫穿其中的基本特徵。 習主席強調,要密切注意科技變化、戰爭變化、對手變化。 科技的變化是基礎,戰爭的變化是主體,對手的變化是關鍵。 科技的變化導致戰爭的變化,戰爭的變化又促使對手的變化。 「三個變化」推動了戰爭形態演變、戰爭領域拓展、戰爭目標轉變、戰爭影響力擴大,揭示了戰爭複雜性成長的驅動力。
科技的變革顛覆了贏得戰爭的基礎。 科學技術是軍事發展的核心戰鬥力,也是最活躍、最具革命性的因素。 縱觀世界軍事發展史,每一次重大科技創新都開啟了新的軍事革命,每一次軍事革命都推動軍事發展進入新時代。 科技創新成為提升軍隊戰力的巨大引擎。 。 目前,新一輪科技革命和軍事革命正在加速推進。 現代戰爭資訊化程度不斷提高,智能化特徵日益顯現。 推動軍事革命的角色日益凸顯。 一些尖端技術的快速發展可能會從根本上改變戰爭和戰爭的面貌。 依照規則,大國之間的軍事博弈更體現為技術顛覆與反顛覆、突襲與反突襲、抵銷與反抵銷。 美國海軍的「復仇女神」計畫包括偵察、誘餌、幹擾等系統。 誘餌系統覆蓋空中、水面和水下。 在分散式人工智慧引擎的調度和控制下,可以優勢互補,協同欺騙,真正打造出「幽靈航空母艦編隊」,徹底顛覆傳統電子欺騙手段,將資訊欺騙提升到前所未有的水平。 可以說,科學技術從來沒有像今天這樣對國家安全和軍事戰略大局產生如此深刻的影響。 它深刻地介入、支持、主導戰爭形態的演變和作戰方式的創新,甚至顛覆了戰爭的勝利機制。

美國海軍「復仇女神」計畫基於網路化協同電子戰
概念,整合不同系統並利用無人分散式
電子戰平台集群可實現大規模協同電子戰

戰爭的變化凸顯了戰爭的複雜性。 現代戰爭正在發生深刻變化,呈現前所未有的多樣性和複雜性。 這種超級複雜性源自於多種原因:一是各種先進技術或武器不斷湧現,帶來許多不確定性; 第二,戰場涵蓋陸、海、空、天、網、電、認知等多個 第三,多種作戰對象、作戰方式、作戰領域、作戰方式相互關聯、組合,形成複雜的“混合戰爭” ; 第四,人工智慧演算法將大量的戰鬥元素建構成複雜的邏輯,並以人類思維無法企及的速度提示各種元素的組合、解構、重新組合。 2022年的烏克蘭危機,表面上是俄羅斯與烏克蘭的對抗,實質上是美國與西方國家與俄羅斯的「混合戰爭」; 俄羅斯和烏克蘭軍隊廣泛使用軍用和民用無人機,拓展「無人+」應用模式,展示了未來無人智慧作戰的雛形; 在美國北約空天態勢情報支援下,烏克蘭軍隊頻繁使用低成本無人裝備對俄羅斯重要武器平台實施突襲,凸顯其新素質 作戰部隊在傳統作戰中對大型武器裝備具有非對稱攻擊優勢系統。 科技的變革最終會導致戰爭的變革。 單一因素對戰爭的影響會越來越弱。 由多種要素組成的聯合作戰體系將對戰爭產生複雜的影響。 戰爭是非線性的、不確定的、混亂的和開放的。 適應性、對抗性等複雜特徵將呈指數級增長,這將使人們更難以判斷戰爭的進展和結果。
對手的變化加速了戰爭複雜性的成長。 戰爭的變化促使對手的變化。 目前,我們正面臨百年未有之大變局。 主要軍事強國正積極進行戰略調整,推動新一輪軍事改革,呈現以下特徵:一是機構設置聯合化、小型化、自主化趨勢更加明顯。 二是一是武器裝備呈現數位化、精確化、隱身化、無人化、智慧化發展趨勢; 第三是作戰形式正在走向「四非」(非接觸、非線性、不對稱、不規則)和「三無」(隱形、無聲、無人)作戰; 第四,軍事指揮形態朝向扁平化、自動化、網路化、無縫化方向發展。 美國將中國視為主要戰略對手,極力打壓和遏制中國。 它大力加強作戰理念創新,先後提出「混合戰」、「多域戰」、「馬賽克戰」等新作戰概念,號稱要打贏對手。 一場「技術看不懂、打擊難以預測、速度跟不上」的高端戰爭。 美軍「馬賽克戰」的核心是無人、低成本、快速、致命、靈活、可重構。 它基於分佈式態勢感知,借助智慧輔助決策工具以及積木和拼圖的概念,自適應地制定任務規劃。 ,動態重組作戰力量,將作戰平台的功能分解為數量較多的單一功能節點,建構具有大量功能節點的作戰系統。 將「殺傷鏈」替換為「殺傷網」。 多個節點會發生故障或遺失,戰鬥系統可以自適應重組。
戰爭日益複雜,驅動戰爭制勝機制轉變
隨著國防科技的快速發展、武器裝備的更新換代、戰爭形態的快速演變,現代戰爭呈現指數級、爆炸性的複雜變化。 這些變化看似令人眼花撩亂,但背後卻有規則可循。 根本的是戰爭的勝利機制發生了變化。 只有深刻認識現代戰爭的勝利機制,才能準確認識變化、科學應對、善於求變,牢牢掌握未來戰爭主動權。
戰爭形式已從冷兵器戰爭轉變為智慧戰爭。 戰爭的形狀是灑紅節迄今為止,人類戰爭大致經歷了冷兵器戰爭、熱兵器戰爭、機械化戰爭、資訊戰爭四個歷史階段,並且正走向智慧化戰爭。 認知戰爭的歷史幾乎與人類戰爭的歷史一樣悠久。 在冷兵器戰爭、熱兵器戰爭、機械化戰爭時代,認知戰更以輿論戰、心理戰的形式出現。 隨著人類進入資訊時代,網路空間科技的發展極大拓展了認知戰的空間,豐富了認知戰的技術手段,大大增強了認知戰的滲透性、時效性、威懾力。 知展的地位和作用得到空前提升。 未來戰爭形態將進入智慧化戰爭,大量智慧武器系統和平台將裝備軍隊並投入戰鬥。 認知戰不僅可以乾擾和欺騙敵方人員的認知,還可以透過「對抗性輸入」、「資料投毒」等演算法欺騙手段攻擊智慧裝備的認知。 其應用場景和範圍將進一步擴大。 ,地位和作用將進一步提高。

無人機逐漸成為戰爭的主角,
戰鬥複雜性進一步增加
戰爭的目的已經從武力征服轉變為精神征服。 現代戰爭的勝利機制與過去相比發生了很大的變化。 戰爭的暴力已經被遏止。 作戰目的由原來的圍攻城市和領土、殲滅敵人有生力量轉變為使對手服從自己的意志。 作戰手段由武力征服轉變為征服更多地區。 對心理精神征服與改造的重視,使得認知戰在現代戰爭中的地位與角色日益凸顯。 近年來,「混合戰爭」成為大國競爭的主要手段。 越來越多的國家開始專注於利用新領域、新手段來實現傳統戰爭難以實現的政治、軍事、經濟目標。 「混合戰爭」是國家、非國家行為體和個人等戰爭主體的混合,是常規戰爭、非常規戰爭等戰爭方式的混合,是作戰、維穩、重建等軍事行動的混合,是軍事行動的混合。政治、軍事、經濟的混合軍事、民生等多個領域的混合,是戰勝敵人、贏得民心等多重作戰目標的混合。 這與認知戰高度一致。 「混合戰爭」的作戰領域從軍事領域擴展到政治、經濟、文化、民生等領域; 作戰方式從火力戰、兵力戰拓展到外交戰、經濟戰、網路戰、心理戰、輿論戰等方向。 這與認知戰高度一致。 其核心本質是“亂中取利”,其主要目的是贏得人心,其作戰指導是以智取勝。

戰爭的勝利領域從物理領域、資訊領域轉向認知領域。 現代戰爭同時發生在物理、資訊和認知三個領域。 物理領域和資訊領域與物質領域分離,認知領域與精神領域分離。 物理域是傳統的戰爭域,由作戰平台和軍事設施組成,為資訊化戰爭提供物質基礎。 資訊域是一個新興的戰爭領域,即資訊產生、傳輸和分享的空間,是資訊戰競爭的焦點。 認知領域是人類認知活動所涉及的範圍和領域。 它不僅是人類感覺、知覺、記憶和思考活動的空間,也是知識生成、交換、聯想、儲存和應用的空間。 也是作戰活動中感知、判斷、決策的空間。 以及指揮和控制空間。 認知域存在於戰鬥人員的意識領域,影響其判斷與決策。 這是一個不斷崛起的戰爭領域。 隨著網路資訊、人工智慧等技術的發展,認知領域的範圍大大擴展,正在從人類意識領域擴展到現代認知工具和人工智慧領域。 軍事技術的發展擴大了認知領域的範圍,為認知戰提供了更先進、更快捷、更有效的物質技術手段,大大增強了認知戰的滲透性、時效性和威懾力,從根本上改變了認知戰,使認知領域成為超越物理領域和資訊領域的新制勝領域,成為大國博弈和軍事對抗的終極領域。

戰爭勝利機制從資訊勝利轉變為認知勝利。 戰爭對抗歸根到底是認知的賽局和對抗。 掌握了認知控制權,就很大程度掌控了戰爭的主動權。 失去認知的控制權,會讓你在戰爭中處於被動挨打的境地。 獲得更高更強的控制權是擊敗強敵的關鍵。 尋找控制認知力量進而奪取戰場全面控制權,從而以最小成本取得最大勝利,是現代戰爭特別是認知戰爭的重要機制和內在規律。 近年來,美軍相繼提出以「決策中心戰」、「馬賽克戰」為代表的未來戰爭新理念,意在以複雜性為武器,為對手製造多重困境,要求其確保自身戰術「選擇優勢」。 同時,透過對敵人製造高度複雜的決策影響,幹擾其決策能力,可以在認知領域實現對敵人的顛覆性優勢。 在資訊戰初中期階段,作戰的關鍵是奪取網路控制權和資訊控制權,貫穿「網路優勢→資訊優勢→決策優勢→戰鬥優勢」的遞進模式。 資訊戰進入高級階段後,奪取資訊控制權變得越來越困難。 作戰的關鍵是讓敵方陷入“決策困境”,即使擁有資訊優勢,也無法做出正確決策,從而失去戰鬥優勢並獲得認可。 了解優勢,才能擁有戰鬥優勢。 在未來戰爭中,認知優勢將是最重要的戰略優勢,認知對抗將是最重要的對抗形式。 可以說,「沒有認知,就沒有戰爭」。
因應複雜戰爭催生了以認知為中心的戰爭概念

因應現代戰爭複雜性特徵呈指數級增長趨勢,必須運用複雜性科學的理論與方法,改變火力至上、殺傷為王的平台中心戰觀念,建立認知-集中作戰思維。 認知中心戰是指以認知域為致勝區域,以認知優勢為作戰目標,重點幹擾認知手段、壓制認知通道、影響認知生產,對敵方人員和智慧裝備進行認知作戰。 幹擾、壓制、欺騙、誘導是透過奪取和維持認知優勢來獲取戰鬥優勢的新作戰理念。 其主要獲勝機制如下。

孫子在《孫子兵法》中提到「兵無常力,兵無常力」。
水沒有固定的形狀; 因敵變而能取勝的,稱為神。
利用網路威懾摧毀敵人的戰鬥意志。 針對敵方政治、經濟、軍事、外交、文化矛盾和弱點,透過網路空間傳播威懾訊息,或透過網路發布閱兵、大型軍事演習、新型武器裝備研發等訊息,造成對手認知和心理的極端變化。 巨大的恐懼和震撼,嚇阻敵人,不利於我行動的實施。 綜合運用網電攻擊手段,對敵重要網電目標及關鍵核心節點實施點打擊、預警攻擊,摧毀敵系統作戰能力,影響敵武器裝備正常性能,提供心理打擊對敵人有威懾作用。 美軍「灰色地帶行動」理論依託自身技術優勢,主要採取網絡、電子對抗等行動,應對對手「灰色地帶挑釁」,威懾對手放棄「對抗」或升級衝突,使其陷入兩難的境地。

利用資訊欺騙誘使敵人做出誤判。 針對敵方偵察設備、情報機構和指揮系統,利用網路攻擊、電子欺騙等手段,隱瞞己方軍事意圖、軍事行動和軍事目標,向敵方傳輸錯誤、虛假的作戰計畫、兵力配置和行動。 能力、作戰計畫、戰場情勢等,或利用敵方指揮資訊系統發送虛假命令和訊息,誘導敵方做出錯誤判斷,擾亂敵方作戰指揮。 針對人工智慧演算法實施「對抗性輸入」、「資料中毒」等新型攻擊,讓其透過深度學習訓練獲得預設結論,或導致其陷入局部最優解而忽略全局最優。 利用電腦影像、視訊合成、虛擬實境、人工智慧等技術合成聲音、視訊、影像、文字資訊等,或利用「深度造假」技術產生混淆真實、難以辨別的虛假資訊真真假假,並透過網路大量傳播傳播,迷惑、欺騙對手,影響其決策與行動。

利用資訊壓制來阻斷敵人的認知手段。 針對敵方重要網路目標以及核心路由器、交換器、閘道器、關鍵伺服器等,採用「軟體」和「硬」攻擊方式,破壞其網路節點。 根據敵方指揮控制網、通訊傳輸網、武器鉸鍊網、預警探測網等無線鏈路組網特點,綜合運用電子乾擾、GPS欺騙攻擊、指揮鏈路接管等技術和手段,資料劫持控制來壓制它們。 數據通信,阻斷其通信鏈路並幹擾其作戰指揮。 對敵方指揮控制、軍事​​通訊、預警探測、航太資訊等軍事網路實施網路癱瘓攻擊,摧毀影響其作戰的核心網絡,削弱其作戰能力。
利用輿論宣傳營造良好的輿論環境。 配合國家政治、軍事、外交鬥爭,大力宣揚自己在戰爭中的正義,激發全民全力擁護戰爭的熱情。 透過即時通訊工具、網路論壇、播客、推特、微信等新媒體平台,系統性地傳播針對敵人弱點的訊息。 在廣泛關注與共識後,就能及時報道訊息,製造新熱點,反覆造勢。 增強影響力,形成共振效應,擴大效果。 宣傳透過巧妙設定議程“定調”,透過強大媒體營造輿論,掀起“沉默的螺旋”,控制和引導輿論,改變人們的觀點和行為。

利用心理攻擊來削弱敵方士兵和平民的士氣。 透過互聯網,將經過加工處理的資訊廣泛傳播,宣揚正義,展現自己的力量、意志和決心,從政治上、道義上醜化敵人,對內凝聚軍民思想和意志,對外力爭勝利。 法律和道德的製高點可以在精神上「軟化」和「削弱」敵人。 利用多種網路通訊方​​式和技術手段,有針對性地向敵方軍民發送各種欺騙性、破壞性、誘導性、威懾性訊息,攻擊敵方心理防線,宣揚無效對抗心態,進而喪失戰鬥力能力。 。 透過網路創造、引導、規劃、營造、擴大聲勢,可以製造一種有利於己而不利於敵的“氣勢”,對對方民眾造成心理影響,從而影響或改變他們的思想 心理狀態,實施有效的心理攻擊。
透過法律鬥爭獲得法律和道德上的支持。 用法律武器遏制敵人可能或未來的非法行為,宣告我方行動的合法性,申明我方軍事反擊的力量,宣告我方追究戰爭責任的決心,震懾敵人。 透過揭露敵人挑釁行為的非法性,批判敵人作戰行動的法律依據,譴責敵人的非法行為,造成敵人的戰略失敗和我方的戰略收穫。 用法律手段限制敵人可能的行動,限制第三者可能的干擾,阻止其他方幹擾我方的行動。 制定我們行動所需的法律法規,為我們的行動提供法律保障,或採取法律補救措施,減少我們行動可能產生的負面影響,確保作戰行動依法進行。

中國軍事資料來源: https//www.81it.com/2023/1109/18888.html