Theory is the precursor of action. Strengthening innovation in combat concepts and promoting innovation in combat guidance have always been important ways for militaries around the world to develop military advantages. In recent years, the U.S. military has successively proposed cutting-edge combat theories such as “cyber warfare”“ and mosaic warfare”, in order to realize that the combat model “production relationship” can be more adapted to the development of combat capabilities “productivity”. Through comparative analysis of these two combat theories, the world can get a glimpse of the changes in the thinking of building the US military’s combat capabilities, especially the understanding of the winning mechanism “mosaic warfare”, so as to find targeted and effective checks and balances.
● From threat response to war design——
Active shaping and improvement of traction combat capability
“Threat-based ”or “capability-based” are two basic ways to build military combat capabilities.“ Threat-based ”reflecting demand traction and focusing on solving real-life problems in the near and medium term are the basic rules that the military should follow in building combat capabilities; “based on capabilities” embodying goal traction, aiming at future strategic missions, and supporting strategic concepts with new combat theories are the key to military combat capabilities. The only way to innovate and surpass. The development from “cyber warfare” to “mosaic warfare” reflects the differences and evolution of the internal laws of the above two approaches, and also reflects the changes in the thinking and concepts of the US military in promoting combat capability construction in recent years.
New changes in concept origin. Cyberspace was originally born to solve human communication needs. Later, it gradually evolved into a new combat domain independent of land, sea, air, and space. From this, a “cyber war” with the struggle for cyberspace control as the core was derived. In comparison, “mosaic warfare” is a new combat concept actively developed and designed by the US military in order to continue to maintain its strategic advantage and directly target competitors. Its formation process reflects the integration of demand traction and capability traction, and its strategy, initiative, and traction Sex is more prominent.
New ideas for the use of technology.“ Cyber warfare ”emphasis on supporting the transformation and implementation of combat concepts through the development of new generation technologies.“ Mosaic Warfare” breaks out of this model and does not place too much emphasis on the development of a new generation of equipment technology. It pays more attention to the rapid transformation of general military and civilian technologies and the incremental iteration of mature technologies. The basic idea is to build on existing equipment and follow the application concepts of service platforms such as online ride-hailing and crowdfunding development. Through module upgrades and intelligent transformation, various combat system units “mosaicization” will be transformed into single-function, flexible Assemble and replaceable “building blocks” or “pixels” to build a dynamically coordinated, highly autonomous, and seamlessly integrated combat system Embodied new technology-driven ideas.
Path Development New Design.“ Cyber warfare ”as a companion concept to the network space, wherever the network space develops, “cyber warfare” will follow suit. Generally speaking, “objective” material conditions will be considered first, and then “subjective” conceptual design will be carried out. It has strong dependence on path development.“ Mosaic warfare ”first from “subjective” to “objective”, by developing a force design model that can dynamically adjust the functional structure, it can adapt to different combat needs and changes in the battlefield environment.
It can be seen that “mosaic warfare” has clearer goals, more mature technology, and more reliable paths than previous combat concepts such as “cyber warfare”, reflecting the change in thinking actively shaped by the US military.
● From network center to decision center——
Group intelligence to achieve optimal system energy release
AI technology is a key variable in the information age and a core increment in the development of the “mosaic warfare” system.“ Cyber warfare ”emphasis on “network center”, “mosaic warfare” closely focuses on the core of artificial intelligence technology, adjusts the key to victory from “network center” to “decision-making center”, and changes the combat system structure from system level and platform level Joint transformation to functional level and factor level integration, seeking to fully gather energy in the network The “group intelligence technology” realizes the optimal release of the system and gives new connotation to the war winning mechanism in the intelligent era.
Use “fast” to control “slow” to seize the cognitive lead. In future wars, the battlefield situation will change rapidly, and the weight of time factors will continue to increase. “Fast” versus “Slow” can form a combat strike effect that is approximately dimensionally reduced.“ Mosaic War ” By using data information technology and artificial intelligence technology, we can improve the single-ring decision-making speed of our own “OODA” ring, expand the breadth of parallel decision-making, reduce the granularity of group decision-making, accelerate the progress of system operations, and create an overall one-step faster “First move” situation, aiming to firmly control the dominance of cognitive decision-making on the battlefield.
With “low” system “high”, we accumulate cost advantages. Different from the traditional combat concept of pursuing high-end weapon platforms, “mosaic warfare” focuses on using artificial intelligence technology to tap the potential and increase efficiency of existing weapon platforms and combat resources. By loading and operating intelligent algorithms and specific functional modules on many mid-to-low-end weapon platforms, it can achieve combat performance comparable to high-end weapon platforms, overall improving the cost-effectiveness ratio of the input and output of the weapon platform, thereby accumulating cost advantages.
To “disperse” control “gather” and seek sustainable survival. “ Mosaic Warfare ” emphasizes the adoption of decentralized ideas and asymmetric checks and balances, using an open system architecture, and decentralized configuration of various functions such as reconnaissance, positioning, communication, and strike on various manned/unmanned platforms to achieve power. Distributed deployment. At the same time, relying on intelligent algorithms to improve the self-organization, self-coordination, and independent attack capabilities of each platform to achieve dispersion and concentration of firepower. When some combat platforms are eliminated, interfered with or stripped away, the entire combat system can still operate normally, thereby enhancing the continued viability of the battlefield of the force cluster.
Use “movement” to control “stillness” to improve system flexibility. “ Mosaic warfare ” emphasizes further breaking through the barriers of various combat areas. By turning the fixed “kill chain” in different combat domains into a dynamically reconfigurable “kill net”, the “OODA” large ring is disassembled into small rings, and the single ring is differentiated into multiple rings. According to changes in combat processes and combat requirements, intelligent networking is relied on to realize the split-in-movement, call-in-movement and combination of combat forces. In this way, on the one hand, it can enhance the flexibility and adaptability of the combat system; on the other hand, it can also hedge and offset the node aggregation effect of complex networks, making it difficult for opponents to find key nodes to defeat their own systems.
“Mosaic warfare” provides a reference prototype for intelligent operations. But at the same time, as an idealized force design and application framework, “mosaic warfare” still needs closely related technical, doctrinal, policy and other supporting support. There is still a long way to go before it is fully realized, and it is consistent with traditional combat systems. The coexistence situation will exist for a long time.
● From factor integration to system restructuring——
Dynamic structure to enhance combat system flexibility
Structure and relationships often determine function and nature.“ Cyber warfare ”and “mosaic warfare” are built on the common material foundation of the information age and follow the same evolutionary paradigm, but the principles and effects of system construction are different.“ The system structure formed by cyber warfare” is statically deconstructable, while “mosaic warfare” dynamically combines functional units according to certain construction rules to form a flexible system structure with self-organizing and adaptive characteristics, similar to a “dynamic black box”, which is difficult to follow with conventional means. predict. And this flexible structure often “emerges” new capabilities to empower and increase effectiveness in the combat system.
The integrated development of network and cloud makes combat time and space more dynamic and malleable. The Internet and the cloud are the basic environment for the operation of the information combat system. They reshape the process elements of intelligence, accusation, strike, and support in traditional operations, and at the same time derive new combat time and space.“ Cyber warfare ”mainly focusing on network space, its combat time and space are relatively static.“ Mosaic warfare ” is not limited to a single combat space. Under the development trend of information infrastructure network following cloud movement and cloud network integration, tangible and intangible spaces can be further deep-linked. The boundaries between combat time and space are more flexible, and the allocation of combat resources is more flexible, the combat system structure is more dynamic.
Data flows across domains, making operational control more seamlessly coordinated. In the “Command and Control” link, “cyber warfare” focuses on the command and control of combat units by joint combat command agencies. Cross-domain exchange and flow of data is mainly concentrated on the theater battlefield.“ Mosaic warfare ”further sinks the level of joint operations to the tactical end. Through the autonomous cross-domain exchange and seamless flow of data at the tactical level, various data islands can be clustered into data clusters on demand, thereby producing a significant “spillover” effect, making the dynamic, discrete, agile, and parallel characteristics of the combat command control loop more obvious, and more conducive to achieving agile connection of each combat unit on demand Efficiently act in concert.
Algorithm full-dimensional penetration makes system operation more autonomous and efficient. Algorithms are the mapping of human consciousness in cyberspace, forming two basic forms: compilation codes transformed by intention and neural networks transformed by knowledge. In “cyber warfare”, compiled code is widely used, and neural networks are only used locally. In “Mosaic Warfare”, the algorithm expands the two key functions of shaping rules and providing engines, and the breadth and depth of application are more prominent. Shaping rules is mainly based on compilation code, supplemented by neural networks, to construct the process framework and operating logic of the “mosaic warfare” system, laying a structural foundation for its uncertainty, adaptability and ability “emergence”; the provision engine mainly integrates intelligent algorithms The model is distributed to the edge elements to operate, forming a knowledge diffusion effect, thereby comprehensively improving the intelligent autonomous combat capabilities of the “mosaic warfare” system.
The side end releases energy independently, making the combat style more flexible and polymorphic. The edge is an abstract model of various manned/unmanned combat functional units and a direct source of systemic capabilities “emergence”.“ Cyber warfare ”in a system where edge elements are closely coupled with superior and subordinate accusation processes and are in a state of precise control.“ In the mosaic warfare” system, the perception, interaction, reasoning, and decision-making capabilities of edge-end elements are greatly improved. Its “OODA” ring does not need to be linked back to the superior command structure, which is conducive to supporting the formation of a decentralized combat cluster with high and low matching and manned/unmanned combination. form, which can give edge-end elements more self-organizing authority and significantly enhance the battlefield confrontation advantage.
It can be seen that if “cyber warfare” is called a sophisticated war machine, “mosaic warfare” can be regarded as a complex “ecology” that can stimulate the dynamic growth of combat capabilities. New changes in network clouds, data, algorithms, and edges have contributed to The formation of a dynamically complex “system structure”. This structure in turn reversely regulates elements, platforms and systems, and new capabilities continue to emerge, playing an important role in enhancing and evolving the combat system.
● From “system breaking to compound confrontation——”
To analyse the advantages and disadvantages and seek effective checks and balances
“Mosaic warfare” represents to a certain extent the possible direction of the future development of joint operations. It is necessary to fully analyze and grasp the winning mechanism of “mosaic warfare”, shape the field of information and communication as a new quality and new domain that breaks the traditional boundaries of war time and space, create a new concept of network cloud-enabled combat, build and strengthen the support and support capabilities of national defense information infrastructure, and highlight military information network security defense capabilities, enhance the minimum support capabilities for the operation of strategic campaign command organizations, and continuously improve the network information system.
On the other hand, the emergence of the “mosaic warfare” theory makes it difficult for traditional combat methods to attack target nodes with limited capture and control to achieve the system-breaking effect of breaking points and breaking chains. But it should be noted that any system has its inherent contradictions, and the seemingly “impeccable” decentralized structure of “mosaic warfare” can still find ways to effectively crack it. For example, grasp its system complexity characteristics, use its correlation dependence, highlight the functional suppression of communication networks, construct network-electrical composite attack paths, and achieve disassembly and isolation of various units of the combat system; grasp its structural dissipation characteristics, and use Its external information dependence highlights the disguise and misleading of information data, prompting the combat system to transform into abnormal states such as information closure and information overload; Grasp its group autonomy characteristics, use its key technology dependence, highlight the confrontation and efficiency reduction of intelligent algorithms, and suppress the intelligent internal drive of each combat unit; grasp its functional non-linear characteristics, use its unknown vulnerabilities, and highlight battlefield differentiation Strike assessment, test and discover operational system imbalances with higher efficiency and faster speed, and find key weaknesses in system attack.
System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole.
In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze . System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“ 1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence 2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations 3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure 4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control 5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare 6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma 7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support 8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics 9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.
1. Overall deterrence Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.
1.1 Emphasis on multi-domain joint deterrence Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.
1.2 The implementation of overall deterrence should have three major elements Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.
Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.
1.3 Strong overall strength is the core of achieving effective deterrence The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war. In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.
2. Electromagnetic Disturbance Warfare Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.
2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.
2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.
2.3 Crack effective tactics for unmanned cluster operations “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.
3. Cyber-sabotage Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities. The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.
4. Cognitively Controlled Disturbance Warfare Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage. Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.
4.1 Control the cognitive rights of situational awareness and compete for information advantages In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.
4.2 Control and command decision-making power and compete for decision-making advantages Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.
4.3 Control “brain” power and seize the advantage of brain control Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.
5. Agile Mobile Warfare Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.
Table 1 Connotation of the concept of agile warfare
5.1 Efficient and fast decision-making To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.
5.2 High efficiency forms a favorable combat situation It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.
5.3 Efficient and instant gathering of combat power To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.
5.4 Agile mobile warfare is an innovative development of traditional mobile warfare In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.
6. Unmanned cluster autonomous warfare Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.
6.1 It is conducive to forming a system advantage to suppress the enemy Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.
6.2 Conducive to enhancing combat effectiveness In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.
6.3 Conducive to getting into enemy combat difficulties Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.
7. Pointkill Battle “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.
7.1 Achieve efficient combat cost ratio Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.
7.2 Targeting key nodes is an important option The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.
7.3 Large-scale system support is the basic condition The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.
7.4 It is inseparable from precise intelligence support In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.
8. Supply-breaking Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.
8.1 The supply guarantee chain has a huge impact on the overall combat situation Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.
8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.
8.3 The key is to choose the right time and make full use of tactics It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.
9. System “paralysis battle” System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.
9.1 The combat goal is to disorderly operate the enemy’s combat system In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.
9.2 A key node in the heavy strike combat system Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.
9.3 Implement soft strikes against the enemy’s combat system When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat.
With the approval of Xi Jinping, Chairman of the Central Military Commission, the Central Military Commission issued the “Outline of Joint Cooperation between the People’s Liberation Army of China (Trial Implementation)”, which will come into effect on November 7, 2020.
The Outline focuses on building a legal system for joint operations and strengthening the clear orientation of preparing for war. It is of great significance to consolidate and deepen the results of the reform of the leadership and command system, scale structure and force composition, and to promote the liberation and development of our military’s joint operations capabilities.
The Outline is the top-level regulation of our military’s new-era combat doctrine system. It focuses on clarifying the basic issues of joint combat organization and implementation, unifying combat thinking, clarifying responsibilities and procedures, and guiding combat operations. It also clarifies major principles, requirements, and basic procedures for joint combat command, combat operations, combat support, national defense mobilization, and political work.
The Central Military Commission requires that all levels should earnestly study and implement the “Outline”, adhere to combat effectiveness as the only fundamental standard, use the “Outline” as the basic basis for organizing and implementing joint operations and joint training, and comprehensively improve the ability to win in the new era.
The battle flag hunt, the military parade ground was full of ups and downs, and the climaxes continued——
From north to south, the surging iron torrents train elite soldiers; in the deep blue ocean, soldiers step on the waves to forge sharp swords; above the vast sky, eagles fly thousands of miles towards the blue sky; deep in the dense forests, the east wind roars to the sky; the skynet controls power, and the invisible war defeats the visible… One after another joint combat exercises are gradually unfolding in multiple domains and all dimensions, presenting a picture of a strong army that trains together to plan for war, uses training to promote war, and wins war through strong training, sounding the strong note of a new era in the history of our army’s training and preparation.
Over the past year, the world has been undergoing unprecedented changes unseen in a century, intertwined with the global COVID-19 pandemic. Under the sky shrouded by the epidemic, the international situation has been in constant turmoil and confrontation. The drone warfare that has shined in the Nagorno-Karabakh conflict has shown the world the unique characteristics of modern warfare.
“When times change, things change. When things change, we must be prepared for change.” In the future, “what kind of war to fight and how to fight it” carries the heavy mission, and the entire military is surging with enthusiasm for researching and winning wars.
Faced with new changes in the national security situation, new threats from powerful enemies and adversaries, and new developments in the form of warfare, we urgently need to provide answers to strengthening the military, winning battles, and meeting the needs of the times.
“Overall, modern warfare has indeed undergone profound changes. These changes may seem dazzling, but there are regularities behind them. The fundamental thing is that the winning mechanism of war has changed.” Faced with the rapid development of the new world military revolution and changes in the war situation, under the guidance of the commander-in-chief and in accordance with the unified deployment of the CMC’s policy and system reforms, the CMC Joint Staff Department organized experts from the Academy of Military Sciences and capable personnel from relevant departments of the CMC, various theater commands, various military services and armed police forces to form a joint research group to pool wisdom and strength to tackle key problems and advance the formulation of new-era combat regulations.
On November 7, 2020, the “Outline of the Joint Cooperation Warfare of the People’s Liberation Army of China (Trial Implementation)” was implemented throughout the army, marking a new coordinate system for our army’s joint cooperation war in the new era.
Since the issuance of the Outline, commanders have taken the lead in learning it, agencies have taken the lead in studying it, and troops have practiced learning it. The officers and soldiers of the whole army have been enthusiastic about learning and publicizing the Outline. A great discussion on joint operations in the new era, a great liberation of thoughts, and a great practice of preparation for war have been vigorously carried out in the whole army.
Pointing to victory, leading the new practice of preparing for war in the new era
“Following the main road, who would you follow to seek a shortcut?” In the world of soldiers, there is no such thing as “easy”. The only way to win a battle is to be prepared.
What kind of war we will fight in the future will require innovative tactics; if we cannot innovate tactics, it will be difficult to win future wars.
In essence, combat regulations are about solving the problem of how to fight and how to win, and are the refinement, deepening and concretization of military strategic policies. The Outline of Joint Cooperation of the People’s Liberation Army of China (Trial) (hereinafter referred to as the Outline) deeply studies the characteristics and laws of future wars, accurately grasps the era characteristics of the integrated development of mechanization, informatization and intelligentization of our army, and through the forward-looking and concrete design of future operations, implements the spiritual essence and content requirements of the new era’s military strategic policy into the troops’ preparation for war.
The Outline is not only a guideline for preparing for war, but also a guideline for winning joint operations.
At the beginning of the new year of 2021, a certain area of the Eastern Theater Command is organizing a multi-service, multi-directional, systematic combat training. Under the guidance of the newly issued “Outline”, this exercise involves the full-domain linkage of land, sea, air, space, network and electric power, close coordination of political and public opinion, and information-led throughout the entire process from combat preparation to situation shaping to mission implementation. All units work closely together, demonstrating the firm determination and strong ability to maintain national unity with a thunderous momentum, and also witnessing the transformation of our military joint cooperation from “formal linkage” to “spiritual linkage”.
In the west, at midnight in mid-spring 2021, a series of urgent alarm bells rang. According to the level transfer order of a certain base of the Western Theater Air Force, the officers and soldiers of a certain air defense battalion of the Army quickly rushed to their positions, and the level transfer time was further shortened. According to the unified deployment, more than 10 Army air defense forces in the theater air force responsibility area entered the Air Force command chain in an organized manner, breaking the information barrier of the services, sharing early warning information, and jointly taking on combat readiness duty, and initially forming a joint air defense combat system. “You lend me the ‘eye in the sky’, and I will help you with the ‘iron fist'”, the integrated joint air defense combat across the services has taken a new step and entered a new stage.
In the north, at the beginning of the summer of 2021, war eagles soared and iron currents rolled, and an exercise with the theme of air-ground joint operations was in full swing. According to the plan, a certain command post of the Air Force of the Northern Theater Command and a certain group army of the Army jointly organized a brigade-level command post exercise to study and explore the composition of joint command institutions and test the integrated joint combat command capabilities of the command post personnel. Intelligence analysis and processing, joint firepower strikes, and integrated rear-end support were coordinated and planned and carried out in an integrated manner, and the command institutions were organized in an integrated manner with all elements. Through repeated joint combat and training, the policy of leading training through combat and carrying out combat through training has been further implemented, and the joint combat and command capabilities of commanders of all services and arms have been significantly improved.
In the direction of the South China Sea, war eagles roared and attacked fiercely, dragons took off and stepped on the sea and waves, radars flew and missiles raised their heads… Under the unified command of the theater joint command, all mission forces worked as a whole and coordinated closely to quickly build a battlefield layout that was multi-domain joint, both offensive and defensive, and deployed in echelons. They adopted a combination of centralized command and decentralized command, and flexibly carried out sea and air escort and deterrence and expulsion in a reasonable, forceful and restrained manner, effectively maintaining peace and tranquility in the South China Sea.
In the past year since the implementation of the Outline, the orientation of preparing for war has become clearer and firmer, the sole fundamental standard of combat effectiveness has been more firmly established, training and preparation for war as the main responsibility of the troops has become more prominent, researching and planning war as the primary responsibility of officers and soldiers has become clearer, the ideas and measures for joint operations and victory have become increasingly effective, and the entire army has continued to set off a new upsurge in training and preparation for war.
Keep pace with the times and clarify the new mechanism of joint cooperation in the new era
“All beneficial ways go with the times.”
Military theorist Douhet once said: “Victory smiles only on those who can foresee the changes in the character of war, not on those who wait for the changes to happen and then adapt to them.”
Looking around the world, the game and struggle among major powers are intensifying, the threat of war exists, the war situation continues to evolve, new military reforms are booming, stealth, unmanned and intelligent weapons and equipment have become the mainstream trend, the battlefield space has expanded to all domains and dimensions, the integrated linkage of combat forces has become the norm, combat command, action and support have become more sophisticated, and winning future wars requires the support of more advanced combat theories.
The gap in combat concepts is the fundamental gap, and the backwardness of combat theory is the biggest backwardness. When modern wars are surging in the world, what is most needed is newer and braver minds.
The new-era combat regulations, led by the Outline, adhere to Xi Jinping’s military strategic thinking and the new-era military strategic policy as the soul and outline, deeply grasp the new changes in national security, new adjustments in combat opponents, new designs in strategic layout, new connotations of active defense, and new developments in combat guidance, and materialize the principles and methods of commanders’ understanding and guidance of war into norms and standards for the specific implementation of the troops, so as to promote our military-joint cooperation war to a higher level.
——It comprehensively expounds the contemporary connotation of war guidance under information conditions.
The Outline aims to win future high-end wars, accurately grasps the characteristics of lowered thresholds for future armed conflicts, blurred boundaries of war, and increasingly prominent mutual influence and efficiency between the war field and other fields, strengthens the political and social attributes of combat operations, innovatively develops military struggle paradigms, emphasizes relying on the country’s integrated strategic system and capabilities, emphasizes the integration of war and non-war domains, emphasizes the comprehensive implementation of military and political, diplomatic, economic, cultural and other means, and gives full play to the overall advantages of the party, government, military, police and people. It reflects the modern war concept and the war guidance for winning the people’s war and total war in the new era.
——All elements standardize the style and methods of our joint military operations.
The Outline is based on the tasks and development of our army, and systematically expounds on the possible joint operations in the future, covering the core missions of various strategic directions, covering land, sea, air, space, network and electromagnetic multi-dimensional space. At the same time, it also creatively summarizes the basic types of joint operations, highlights the basic actions that run through the joint operations and have common characteristics, and forms a closed-loop chain of joint operations with all elements and in all fields.
——The joint combat command system and organizational operation mode were designed throughout the entire process.
The implementation of joint operations organizations is extremely complex and difficult. Whether they can be “coordinated” in terms of strength, “joined” in operations, and “excellent” in effectiveness depends crucially on whether they can achieve “unification” in command. The “Outline” focuses on building a strong and efficient joint operations command structure, closely integrates the Central Military Commission and the theater joint command operation model mechanism, fully considers that it not only complies with the general direction and general requirements of the reform, but also leaves room for flexible formation in practice. It focuses on solving major issues such as the construction of a joint operations command system, the differentiation of command authority and responsibility interfaces, and the integration of services into the joint system, so as to ensure that thousands of troops and horses can jointly act under unified orders.
Taking joint training as the guideline, promoting a new leap forward in joint training in the new era
At the Central Military Commission’s military training conference, President Xi Jinping stressed the need to strengthen joint training, adhere to joint training as the key, develop a joint training system with Chinese characteristics, and accelerate the improvement of integrated joint combat capabilities. Soldiers should be trained in the way they fight, and troops should be trained in what is needed for fighting. Today’s world-class armies all regard improving joint training as the top priority for war preparation.
The Outline is the opening chapter of the new era combat doctrine and the guiding principle for the transformation of joint training in the new era. The Outline provides direction, inspires vitality, and gives birth to a new pattern of joint training in the new era.
——Incorporate combat into training to present an “integrated posture” of training.
In the Taiwan Strait, the naval and air fleets carried out joint combat readiness patrols to test and enhance the joint combat capabilities of multiple services, maintain a high state of alert at all times, and resolutely defend national sovereignty and territorial integrity. Exercise preparation is combat preparation, and the exercise state is the combat state. Joint military exercises are no longer simple training activities, but have become a preparation process to promote combat readiness and enhance capabilities. Joint training, the “source” and “main stream” full of power, is guiding and driving the in-depth advancement and vigorous development of military struggle preparations, and fully unleashing the role and effectiveness of training to carry out combat and training to promote preparations.
——Systematic training has become the “new normal” of joint training.
“East”, “South”, “West”, “North”, and “Central” are joint live-fire exercises organized by various theater commands, “Crossing”, “Mobility”, “Red Sword”, “Sky Sword”, and “Joint Logistics Mission” are series of systematic exercises organized by various services, covering all seasons, all weather, and all regions. The CMC, theater commands, and services are responsible for division of labor, overall design, and systematic organization. They are decomposed from top to bottom and integrated from bottom to top, driving the operation and inspection of the joint combat system. Joint exercises and systematic training present a new look, and new changes have taken place in the training and preparation mode. Our military’s joint training has entered a new stage of all-round transformation and overall improvement.
——Joint training between China and foreign countries highlights the “integration” of joint exercises.
At the foot of the Helan Mountains and in the heart of the Bronze Gorge Desert, the “Western Joint-2021” China-Russia joint exercise was booming. In this joint exercise, the Chinese and Russian militaries were mixed and planned together. The two sides shared their positions, coordinated closely, and acted together. They practiced more than 20 subjects such as joint air defense, joint obstacle removal, and joint three-dimensional seizure. With the support of the deeply integrated combat system between China and Russia, new breakthroughs in joint exercises and training were achieved. “Maritime Joint”, “Common Destiny”, “Peace Mission”… With the joint training between China and foreign countries as a “window”, the new changes in the joint training of the Chinese military are being brilliantly presented to the world.
——Intensive training in new domains, demonstrating an “open attitude” in research and warfare.
In joint exercises, underwater unmanned “fish schools”, land unmanned “wolf packs”, and air unmanned “bee swarms” began to emerge. New domains and new types of forces such as land aviation, special operations, electric power, unmanned, network, and aerospace were deeply integrated into the joint combat system and the joint exercise process, and realistic combat scenarios were carefully constructed to accurately experiment with modern war organization and management. As the most active practice area for preparing for war, joint training, with an innovative and open attitude, boldly tried and made great strides towards the new combat areas pointed out in the Outline.
Integrating war and construction to shape a new pattern of system construction in the new era
President Xi stressed that we must adhere to the principle of building the country in accordance with war, strengthen the coordination of war and construction, speed up the promotion of major strategic, leading and fundamental projects, and accelerate the creation of a high-level strategic deterrence and joint combat system.
If the “trouble” in the construction of the joint combat system is not resolved quickly, once the “interest” of the debt accumulates, it will become a “pain” on the battlefield tomorrow. From the perspective of war, the “Outline” calibrates the “sight” of construction and firmly points to the correct direction of military construction.
——Calibrate the construction “sight” to point to the needs of joint operations.
Under the guidance of the Outline, the concept of jointness has been gradually established, and the barriers of “coordination” of military operations and “integration” of combat domain capabilities have been gradually broken down. The land, sea, air, and fire arms have been combined in the same domain, and cross-domain integration of combat domains such as space, network, and electromagnetic space has gradually become a reality. With the support of the network information system and combat data information as the link, a full-time and smooth command link has been built. The system is internally connected to each combat sub-center, and is connected to each combat group (team) command post. When necessary, it can directly reach the end of the individual platform to achieve joint command to the end. All operational forces worked together around the overall intention, realizing the transformation of the joint combat concept from focusing on the “service attributes” of combat forces to focusing on the “operational domain”, which has become the main feature of future joint combat. Studying, planning, and training for war with the “Outline” has become a trend throughout the military.
——Calibrate construction’s “sights” to point to system shortcomings and weaknesses.
Based on the Outline, our army insists on combining inheritance and innovation, theory and practice, innovatively designs strategies for winning future wars, focuses on highlighting problem orientation, takes root in training and preparation for war, promotes the construction of joint combat command system and new combat force construction, and effectively solves the outstanding shortcomings and weaknesses in military combat preparation. In mid-May 2021, the Party Committee of the Northern Theater Command held a special war meeting, and in accordance with the Outline, thoroughly identified contradictions and problems in joint combat research, command and control mode transformation, joint handling level, and efficient command capabilities. According to the Outline, it optimized system support, improved command and control methods, and improved command means, which promoted the transformation of the operation mode of the theater joint command center and the improvement of command effectiveness. Looking across the entire military, similar practices are becoming more and more common. Referring to the Outline to find gaps, ideas, and methods in the near and long term has become the new mainstream for planning and promoting construction at all levels and in all fields.
——Calibrate the construction “sight” to point to the urgent need to balance powerful enemies.
To implement the principle of building the military in accordance with war and coordinating the military construction, we must not only focus on solving current practical problems, but also pay attention to solving long-term development problems. The Outline is anchored on the future of defeating the strong and contains a far-sighted plan to build a world-class military. Guided by the Outline and focusing on changes in the war situation and changes in scientific and technological development, the construction of asymmetric means to check and balance powerful enemies has ushered in a qualitative leap. Batches of new drones, new helicopters and other advanced weapons and equipment have been tested and deployed, and a series of high-tech equipment has been deployed and developed, which has given us more confidence and stronger capabilities to win the war. The Outline condenses the “war code” of historical wisdom and also integrates the way to build first-class and win the future in the new era.
“But look at the path you have come from, and you will see verdant and green mountains.” One year after the implementation of the Outline, the new-era combat regulations are releasing capabilities and increasing efficiency in building a joint combat system with Chinese military characteristics.
In the new era and new journey, our path of joint military operations will surely become broader, our ability to defend the country’s strategic development interests will surely become stronger, our confidence in winning future informationized wars will surely become firmer, and the great goal of building a world-class military will surely be fully realized.
“We have a string that is tightly tied to us, a mission that we shoulder, and a storm that we are watching closely… We are always ready!”
In recent years, with the development of intelligent unmanned technology, the navies of developed countries in the world have proposed the concept of “distributed lethality” with surface ships as the main body, aiming to achieve distributed maritime operations and gain battlefield advantages. Distributed maritime operations aim to integrate combat platforms in multiple domains, build an all-round three-dimensional situational awareness network, and form a seamlessly linked combat system of manned platforms and distributed unmanned platforms through communication networks throughout various domains and an integrated command and control system, thereby improving the overall combat and strike effectiveness.
The concept of distributed maritime operations
Distributed maritime operations are the integration and expansion of combat concepts such as “distributed lethality” and “manned-unmanned collaborative operations”. The main idea is that large-scale, multi-purpose, high-value combat platforms are no longer required to independently complete diversified combat missions, but rather the main combat capabilities such as reconnaissance, command, strike, and interference are dispersedly deployed on various heterogeneous unmanned platforms in various combat domains. A highly resilient combat system is formed by the fusion of a small number of manned platforms and a large number of distributed unmanned platforms, which can complete various complex combat missions through efficient, precise, and real-time collaboration. This combat system includes a small number of high-value manned platforms and a large number of low-cost unmanned platforms. The manned platforms serve as battlefield decision makers, responsible for relatively complex tasks such as combat plan planning and combat mission allocation and implementation; the unmanned platforms are used to perform relatively dangerous or simple tasks such as situational awareness and fire strikes. Manned/unmanned platforms work closely together to complete combat missions.
The essence of distributed maritime operations is to seamlessly link and organically integrate high-value manned platforms and low-cost unmanned platforms at sea, and to achieve common operational goals through high information sharing, precise task aggregation, and efficient operational coordination. It has the remarkable characteristics of on-demand sharing of operational information, deep integration of operational tasks, precise planning of operational resources, and optimized organization of operational processes. Through manned/unmanned distributed coordination, a new type of efficient maritime combat system can be formed that complements each other’s strengths, integrates functions, and has complementary capabilities. Distributed maritime operations highlight the combinability, consumability, and “decentralization” of force utilization, and focus on the deep embedding and comprehensive application of artificial intelligence technology, which can enhance the resilience of the combat system and promote the development of joint global operations in the maritime direction towards intelligence.
Typical characteristics of distributed maritime operations
At present, intelligent unmanned equipment is developing rapidly, and is increasingly possessing advantages such as human-equipment integration, cross-domain coordination, cluster confrontation, and autonomous combat. Distributed maritime combat is accelerating to present typical characteristics such as wide-area distribution coordination, cross-domain multi-dimensional integration, and manned and unmanned integration.
Wide-area distributed coordination. Wide-area distributed coordination means that various combat elements or combat resources can be adaptively optimized and combined and dispatched according to the battlefield situation, so as to realize the precise energy concentration and release of the combat system. The first is the distributed deployment of the combat system. In distributed maritime operations, the combat space is deeply embedded in various combat domains, and the combat forces can be distributed and deployed in a decentralized wide area. The second is the intelligent reconstruction of the combat system. The combat system is lighter, more capable, and more agile, and its battlefield environment adaptability and system dynamic optimization and reconstruction capabilities are significantly enhanced, and it can quickly and flexibly adjust the required combat forces and battlefield resources. The third is the concentrated release of combat energy. The combat system can achieve rapid mobility, real-time response and coordinated operations of various combat platforms and combat forces in the global combat space through semi-autonomous or autonomous coordinated control of equipment, ensuring the precise concentration and release of combat forces.
Cross-domain multi-dimensional integration. Distributed maritime operations transform the centralized combat group mode into a distributed, agile combat mode. Various combat units are distributed in multiple combat domains, which can realize the monitoring and positioning of cross-domain targets, and then implement effective strikes. The first is the cross-domain integration of combat forces. The combat forces deployed in multiple domains will be dynamically networked through intelligent systems to form a cross-domain combat system. The second is the seamless connection between strategy, campaign, and tactics. New domain and new quality combat forces will directly participate in intelligent naval warfare as the main combat role, achieving comprehensive coverage from strategy to campaign, seamless connection from campaign to tactics, giving birth to a new quality combat capability of rapid assault, multi-dimensional integration, and full-domain offense and defense, and realizing cross-domain coordinated strikes on combat targets.
Manned and unmanned are one. Distributed maritime operations can rely on a large number of intelligent unmanned equipment to form a “manned-unmanned” joint strike system with high autonomy and coordination. By accelerating the development of unmanned equipment such as ship-borne drones, surface unmanned boats, and underwater unmanned vehicles, long-, medium-, and short-range echelon configurations can be achieved, and cross-domain integration of unmanned equipment such as air, surface, underwater, and land can be achieved. The unmanned and manned equipment systems are seamlessly integrated, and the mission domain is expanded from information assurance to firepower strikes. This will promote changes in maritime combat styles, accelerate the formation of new combat styles such as manned system collaborative operations, unmanned system single operations, unmanned system cluster operations, and frontier preset operations, and achieve a subversion of traditional manned combat styles.
The winning mechanism of distributed maritime operations
The reason why major scientific and technological progress can promote the evolution of the war situation is largely because it has profoundly changed the mechanism of winning wars. At present, cutting-edge technology has significantly improved the level of equipment intelligence, profoundly changed the combat power generation mode, and accelerated the evolution of the mechanism of winning naval battles.
“Distributed interconnection, human-machine collaboration” wins. The distributed, intelligent, and networked command information system built on cloud computing, data chain, Internet of Things and other technologies has brought profound changes to modern naval warfare. Supported by the cloud edge, the command information system realizes real-time interaction between various combat platforms through high-speed and secure network connections, significantly improving the information interconnection, interoperability and interoperability between different combat platforms; it can efficiently analyze and process massive battlefield information, accurately judge the battlefield situation, and transform combat command to an intelligent decision-making method centered on “data, algorithms and models”; commanders at each node share information in real time in the cloud network, synchronously judge the situation, and coordinate command, so that command and control activities are concise and optimized, and combat decisions are more efficient and accurate. In addition, under “distributed interconnection”, intelligent unmanned combat has developed from a single platform to a multi-platform cluster, and from remote-controlled combat to semi-autonomous and autonomous combat. Multiple “single-person-single-machine” command chains running in parallel have gradually formed a single simple command chain of “commander-unmanned combat cluster”. Through the efficient and autonomous coordination of manned platforms and unmanned platforms and their clusters, the combat potential of intelligent unmanned equipment can be fully activated, and the advantages of various advanced equipment can be maximized.
“Algorithm-driven, fast and accurate cognition” wins. In intelligent warfare, advanced algorithms replace commanders’ thinking through precise and high-speed calculations, promoting the accelerated integration of rational combat knowledge and emotional commander experience. With advanced algorithms, we can quickly and accurately understand the situation on the naval battlefield, and then accurately and quickly plan scientific and feasible combat plans for changes in the situation on the naval battlefield, disrupting the opponent’s established deployment and combat intentions. Algorithms can effectively process massive amounts of high-value intelligence information and increase the speed of the “OODA” cycle. Mastering the advantages of algorithms can achieve fast and accurate cognition of the enemy’s situation, our situation, and the battlefield environment, thereby accurately predicting the enemy’s combat actions and innovating and optimizing our own action plans in a targeted manner.
“Cloud brain support, network failure and disconnection” will win. In distributed maritime operations, the command and control system will operate in a collaborative way of “human brain + cloud brain”, and the intelligent advantage will become an “advanced” advantage based on information advantage, and “network failure and disconnection” will become one of the main patterns of maritime operations. On the one hand, unmanned intelligent combat actions supported by cloud brain will penetrate the entire process of operations. In distributed maritime operations, the collaborative mode of “human brain + cloud brain” runs through all aspects of operations such as intelligent assisted command decision-making, automatic intelligence reconnaissance, automatic combat planning, autonomous precision strikes, and intelligent logistics support. On the other hand, targeting the intelligent ubiquitous network structure covering the entire domain and multiple dimensions, using intelligent equipment or means to attack key nodes and hubs such as its reconnaissance and surveillance network, information transmission network, command and control network, and comprehensive support network can paralyze its combat network system.
“Cross-domain integration, integrated energy release” wins. Distributed maritime operations will leap from integrated joint operations under information conditions to autonomous cross-domain collaborative operations under intelligent conditions. Different types of new-quality combat capabilities will be integrated and coordinated across domains, and flexibly and accurately integrated to release combat effectiveness. On the one hand, relying on the cross-domain, distributed, and networked collaborative combat system supported by the cloud edge, through the cross-domain mobility of the main combat platform, the cross-domain complementation of equipment functions, the cross-domain sharing of information and intelligence, the cross-domain coordination of combat command, the cross-domain response of mission actions, and the cross-domain interconnection of channel links, a variety of new-quality combat capabilities can be efficiently linked. On the other hand, cross-domain integration highlights the close coordination between the main domain master control and cross-domain support. For example, the navy will be the main control force in maritime offensive and defensive operations, and other forces will implement cross-domain coordinated support through the integration of air and space, sea and space, and network and space.
“Strike at acupoints and lure at agglomeration” to win. Distributed maritime operations will transform from traditional concentrated annihilation warfare to precise strike at acupoints, and high-value targets will face the threat of long-range autonomous precision strikes from intelligent combat equipment; from traditional large-scale manned attrition warfare to global unmanned cluster lure warfare, and important strategic targets will face the threat of saturation attacks and deceptive strikes from low-cost unmanned clusters. In the process of distributed maritime operations, unmanned equipment such as drones and unmanned submarines can be deployed to form a widely distributed, self-organized and coordinated reconnaissance network. Through autonomous reconnaissance, identification and strike actions, long-range and precise attacks can be carried out on the opponent’s high-value targets. Under the condition of minimizing collateral damage as much as possible, the opponent’s hand-wave network can be paralyzed from top to bottom to destroy its command system. Under the intelligent ubiquitous network system, based on the self-organized “swarm” combat of large-scale machine intelligent agents, full coverage reconnaissance of the opponent’s core area can be achieved, deceiving and luring the enemy, and consuming the opponent’s combat resources to the maximum extent.
Complexity science is one of the frontier fields of contemporary scientific development. It is a new tool for understanding, understanding, and exploring the phenomena, laws, and mechanisms of war. As the form of war evolves from information war to intelligent war, the complexity of war shows an exponential growth trend, and it becomes increasingly difficult to seize control of information. The key to combat is to put the enemy into a “decision-making dilemma” so that it can even Even with information superiority, it cannot make correct decisions, thus losing its combat advantage. The focus of operations will change from “information-centered” to “cognition-centered”, and the winning mechanism will change from “information winning” to “cognitive winning”.
“Three changes” reveal the driving forces behind the increasing complexity of war
War is a field full of possibilities, and change is the basic characteristic that runs through it. President Xi stressed that we must pay close attention to changes in technology, war, and opponents. Changes in science and technology are the foundation, changes in war are the subject, and changes in opponents are the key. Changes in science and technology lead to changes in war, and changes in war prompt changes in opponents. The “three changes” have promoted the evolution of war forms, the expansion of war fields, the transformation of war goals, and the expansion of war influence, revealing the driving forces behind the growth of war complexity.
Changes in technology have overturned the basis for winning wars. Science and technology are the core combat effectiveness and the most active and revolutionary factor in military development. Throughout the history of the world’s military development, every major scientific and technological innovation has started a new military revolution, and every military revolution has pushed military development into a new era. Scientific and technological innovation has become a huge engine to improve the military’s combat effectiveness. . At present, a new round of scientific and technological revolution and military revolution are accelerating. The degree of informatization of modern warfare is constantly increasing, and the characteristics of intelligence are becoming increasingly apparent. The role of driving the military revolution is becoming more and more prominent. The rapid development of some cutting-edge technologies may fundamentally change the face of war and war. According to the rules, the military game between great powers is more embodied in technological subversion and counter-subversion, raids and counter-raids, offsets and counter-offsets. The U.S. Navy’s “Nemesis” project includes reconnaissance, decoy, jamming and other systems. The decoy system covers air, surface and underwater. Under the scheduling and control of the distributed artificial intelligence engine, it can complement each other, coordinate deception, and truly create a A “ghost aircraft carrier formation” completely subverted traditional electronic deception methods and raised information deception to an unprecedented level. It can be said that science and technology has never had such a profound impact on the overall situation of national security and military strategy as it does today. It has profoundly intervened in, supported, and dominated the evolution of war forms and the innovation of combat styles, and has even subverted the mechanism of winning wars.
The U.S. Navy’s “Nemesis” project is based on networked collaborative electronic warfare
Concept, integrating different systems and utilizing unmanned distributed
Clusters of electronic warfare platforms enable large-scale collaborative electronic warfare
The changes in war highlight the complexity of war. Modern warfare is undergoing profound changes, showing unprecedented diversity and complexity. This super complexity stems from many reasons: first, various advanced technologies or weapons are constantly emerging, bringing many uncertainties; second, the battlefield covers land, sea, air, space, network, electricity and cognitive and other multiple third, multiple combat objects, combat styles, combat areas, and combat methods are cross-correlated and combined to form a complex “hybrid war”; fourth, artificial intelligence algorithms build a large number of combat elements into a complex logic, and use human Machine speed beyond the reach of thinking prompts the combination, deconstruction, and recombination of various elements. In the Ukraine crisis in 2022, on the surface it is a confrontation between Russia and Ukraine, but in essence it is a “hybrid war” between the United States and Western countries and Russia; the Russian and Ukrainian armies extensively use military and civilian drones to expand The “unmanned +” application model shows the prototype of future unmanned intelligent operations; with the support of U.S. NATO air and space situational intelligence, the Ukrainian army frequently uses low-cost unmanned equipment to carry out raids on important Russian weapons platforms, highlighting its new qualities Combat forces have asymmetric attack advantages against large weapons and equipment in traditional combat systems. Changes in technology will eventually lead to changes in war. The impact of a single element on war will become weaker and weaker. The joint combat system composed of multiple elements will have a complex impact on war. War is non-linear, uncertain, chaotic and open. Complex characteristics such as adaptability and confrontation will increase exponentially, which will make it more difficult for people to judge the progress and outcome of the war.
Changes in opponents accelerate the growth of war complexity. Changes in war prompt changes in opponents. Currently, we are experiencing major changes unseen in a century. Major military powers are actively making strategic adjustments and promoting a new round of military reforms, which exhibit the following characteristics: first, the trend of joint, miniaturized, and autonomous institutional establishments has become more obvious; second, The first is that weapons and equipment are showing a development trend of digitization, precision, stealth, unmanned, and intelligence; the third is that the combat form is moving towards the “four nons” (non-contact, non-linear, asymmetric and irregular) and the “three nos” (Invisible, silent, unmanned) combat; fourth, the military command form is developing in the direction of flattening, automation, networking, and seamlessness. The United States regards China as its main strategic opponent and strives to suppress and contain China. It has vigorously strengthened the innovation of operational concepts and has successively proposed new operational concepts such as “hybrid warfare”, “multi-domain warfare” and “mosaic warfare”, claiming that it will fight to defeat its opponents. A high-end war in which “technology cannot be understood, strikes are difficult to predict, and speed cannot keep up.” The core of the US military’s “mosaic warfare” is unmanned, low-cost, fast, lethal, flexible and reconfigurable. It is based on distributed situational awareness, with the help of intelligent auxiliary decision-making tools and the concept of building blocks and jigsaw puzzles to adaptively formulate mission planning. , dynamically reorganize combat forces, decompose the functions of the combat platform into a larger number of single-function nodes, and build a combat system with a large number of functional nodes. Replace the “kill chain” with a “kill network”. Several nodes will fail or be missing, and the combat system can be adaptively reorganized.
The increasing complexity of war drives the transformation of the winning mechanism of war
With the rapid development of national defense science and technology, the upgrading of weapons and equipment, and the rapid evolution of war forms, modern warfare has shown exponential and explosive complex changes. These changes may seem dazzling, but there are rules to follow behind them. The fundamental thing is that the winning mechanism of war has changed. Only by thoroughly understanding the winning mechanism of modern war can we accurately recognize changes, respond scientifically, be good at seeking change, and firmly grasp the initiative in future wars.
The form of war has changed from cold weapon warfare to intelligent warfare . The shape of war is a holistic understanding of war. So far, human war has generally gone through four historical stages: cold weapon war, hot weapon war, mechanized war, and information war, and is moving towards intelligent warfare. The history of cognitive warfare is almost as old as the history of human warfare. In the era of cold weapon war, hot weapon war, and mechanized war, cognitive warfare appears more in the form of public opinion warfare and psychological warfare. As mankind enters the information age, the development of cyberspace technology has greatly expanded the space for cognitive warfare, enriched the technical means of cognitive warfare, and greatly enhanced the permeability, timeliness, and deterrence of cognitive warfare. The status and role of Zhizhan have been unprecedentedly improved. In the future, the form of war will enter intelligent warfare, and a large number of intelligent weapon systems and platforms will be equipped with the military and put into combat. Cognitive warfare can not only interfere with and deceive the cognition of enemy personnel, but also attack the cognition of smart equipment through algorithm deception methods such as “adversarial input” and “data poisoning”. Its application scenarios and scope will be further expanded. , the status and role will be further improved.
Drones have gradually become the protagonist of war,
Combat complexity further increases
The purpose of war has changed from conquering by force to conquering by spirit. The winning mechanism of modern war has undergone great changes compared with the past. The violence of war has been curbed. The purpose of combat has changed from the original siege of cities and territories and annihilation of the enemy’s effective forces to making the opponent obey one’s own will. The means of combat have changed from conquering by force to conquering more areas. The emphasis on psychological and spiritual conquest and transformation has made cognitive warfare increasingly prominent in its status and role in modern warfare. In recent years, “hybrid warfare” has become a major means of great power competition. More and more countries have begun to focus on using new fields and new means to achieve political, military, and economic goals that are difficult to achieve with traditional warfare. “Hybrid war” is a mixture of war subjects such as states, non-state actors and individuals, a mixture of conventional warfare, unconventional warfare and other war styles, a mixture of military operations such as combat, stability maintenance and reconstruction, and a mixture of political, military and economic The mixture of multiple fields such as military and people’s livelihood is a mixture of multiple combat goals such as defeating the enemy and winning the hearts and minds of the people. This is highly consistent with cognitive warfare. The operational field of “hybrid warfare” has expanded from the military field to politics, economy, culture, people’s livelihood and other fields; the combat methods have expanded from firepower warfare and troop warfare to diplomatic warfare, economic warfare, cyber warfare, psychological warfare, public opinion warfare and other directions. This is highly consistent with cognitive warfare. Its core essence is to “make profit out of chaos”, its main purpose is to win people’s hearts, and its combat guidance is to win by cleverness.
The winning domain of war changes from the physical domain and information domain to the cognitive domain. Modern war occurs in three fields: physics, information and cognition at the same time. The physical domain and information domain are separated from the material domain, and the cognitive domain is separated from the spiritual domain. The physical domain is a traditional war domain, consisting of combat platforms and military facilities, which provides the material basis for information warfare. The information domain is a newly emerging war field, that is, the space for information generation, transmission and sharing, and is the focus of information warfare competition. Cognitive domain is the scope and field involved in human cognitive activities. It is not only the space for human feeling, perception, memory and thinking activities, but also the space for knowledge generation, exchange, association, storage and application. It is also the space for perception, judgment and decision-making in combat activities. and spaces of command and control. The cognitive domain exists in the field of consciousness of combatants and affects their judgment and decision-making. It is a rising field of warfare. With the development of technologies such as network information and artificial intelligence, the scope of the cognitive domain has greatly expanded, and is expanding from the field of human consciousness to the field of modern cognitive tools and artificial intelligence. The development of military technology has expanded the scope of the cognitive domain and provided more advanced, faster, and more effective material and technical means for cognitive warfare, greatly enhancing the permeability, timeliness, and deterrence of cognitive warfare, fundamentally It has changed cognitive warfare, making the cognitive domain a new winning field that transcends the physical domain and information domain, and has become the ultimate domain for great power games and military confrontations.
The mechanism for winning wars changes from information victory to cognitive victory. In the final analysis, war confrontation is a game and confrontation of cognition. Mastering the right to control cognition will largely control the initiative in war. Losing the right to control cognition will put you in a passive position of being beaten in the war. Obtaining higher and stronger control rights is the key to defeating powerful enemies. Finding ways to control cognitive power and then seize comprehensive battlefield control, so as to achieve maximum victory at the minimum cost, is an important mechanism and inherent law of modern warfare, especially cognitive warfare. In recent years, the U.S. military has successively proposed new concepts of future warfare represented by “decision-centered warfare” and “mosaic warfare”, intending to use complexity as a weapon to create multiple dilemmas for opponents, requiring it to ensure its own tactical “selective advantage”. At the same time, by creating highly complex decision-making influences on the enemy and interfering with its decision-making capabilities, it can achieve a subversive advantage over the enemy in the cognitive domain. In the primary and intermediate stages of information warfare, the key to combat is to seize network control and information control, which runs through the progressive model of “network advantage → information advantage → decision-making advantage → combat advantage”. After information warfare enters an advanced stage, it becomes more and more difficult to seize control of information. The key to combat is to make the enemy fall into a “decision-making dilemma” so that even if it has information superiority, it cannot make correct decisions, thereby losing its combat advantage and having recognition. Only by knowing the advantages can you have the combat advantage. In future wars, cognitive advantage will be the most important strategic advantage, and cognitive confrontation will be the most important form of confrontation. It can be said that “without cognition, there is no war.”
Coping with complex wars has given rise to the concept of cognitive-centered warfare
In order to cope with the exponential growth trend of the complexity characteristics of modern warfare, we must use the theories and methods of complexity science to change the concept of platform-centered warfare where firepower is supreme and killing is king, and establish a cognitive-centered combat thinking. Cognition-centered warfare refers to taking the cognitive domain as the winning area, taking the cognitive advantage as the operational goal, and focusing on interfering with cognitive means, suppressing cognitive channels, affecting cognitive production, and conducting cognitive operations on enemy personnel and intelligent equipment. Interference, suppression, deception and inducement are a new operational concept that obtains combat advantages by seizing and maintaining cognitive advantages. Its main winning mechanisms are as follows.
Sun Tzu mentioned in “The Art of War” that “there is no constant force in an army;
Water has no permanent shape; those who can win due to the changes of the enemy are called gods.
Use cyber deterrence to destroy the enemy’s will to fight. Targeting the enemy’s political, economic, military, diplomatic, and cultural contradictions and weaknesses, disseminate deterrent information through cyberspace, or publish military parades, large-scale military exercises, new weapons and equipment research and development and other information through the Internet, so as to cause extreme cognitive and psychological changes in the opponent. Great fear and shock, deterring the enemy is not conducive to the implementation of my actions. Comprehensive use of network and electricity attack methods to carry out point strikes and warning attacks against the enemy’s important network and electricity targets and key core nodes, destroying the enemy’s system combat capabilities, affecting the normal performance of the enemy’s weapons and equipment, and providing psychological deterrence to the enemy. The US military’s “gray zone operations” theory relies on its own technological advantages and mainly takes actions such as cyber and electronic countermeasures to respond to the opponent’s “gray zone provocation” and deter the opponent from giving up “confrontation” or escalating the conflict, putting it in a dilemma.
Use information deception to induce the enemy to make misjudgments. Aiming at the enemy’s reconnaissance equipment, intelligence agencies and command systems, use cyber attacks, electronic deception and other means to conceal one’s military intentions, military operations and military objectives, and transmit to the enemy erroneous and false combat plans, troop configurations and operations. capabilities, combat plans, battlefield situation, etc., or use the enemy’s command information system to send false orders and information to induce the enemy to make wrong judgments and disrupt the enemy’s combat command. Implement new attacks such as “adversarial input” and “data poisoning” against artificial intelligence algorithms, allowing them to obtain preset conclusions through deep learning training, or causing them to fall into local optimal solutions and ignore the global optimal. Use technologies such as computer imaging, video synthesis, virtual reality, and artificial intelligence to synthesize sound, video, images, text information, etc., or use “deep fake” technology to generate false information that is confusingly real and difficult to distinguish between true and false, and transmit it through the Internet Spread in large quantities to confuse and deceive opponents and influence their decisions and actions.
Use information suppression to block the enemy’s cognitive means. Target the enemy’s important network targets, as well as core routers, switches, gateways, key servers, etc., and use “soft” and “hard” attack methods to destroy their network nodes. Based on the networking characteristics of wireless links such as the enemy’s command and control network, communication transmission network, weapon hinge network, and early warning detection network, comprehensively use technologies and means such as electronic jamming, GPS spoofing attacks, command link takeover, and data hijacking control to suppress them. data communication, blocking its communication links and interfering with its combat command. Implement cyber-paralysis attacks on enemy command and control, military communications, early warning detection, aerospace information and other military networks, destroying core networks that affect their operations and weakening their combat capabilities.
Use public opinion propaganda to create a favorable public opinion environment . Cooperate with the country’s political, military, and diplomatic struggles, vigorously promote one’s own justice in the war, and stimulate the enthusiasm of all people to fully support the war. With the help of new media platforms such as instant messaging tools, online forums, podcasts, Twitter, and WeChat, we can systematically disseminate information that targets the enemy’s weaknesses. After gaining widespread attention and consensus, we can then promptly report information, create new hot spots, and repeatedly build momentum. Enhance the influence and form a resonance effect to expand the effect. Propaganda “sets the tone” by cleverly setting agendas, building public opinion through powerful media, setting off a “spiral of silence”, controlling and guiding public opinion, and changing people’s opinions and behaviors.
Use psychological attacks to undermine the morale of enemy soldiers and civilians. Through the Internet, processed and processed information is widely disseminated to promote one’s justice, demonstrate one’s strength, will and determination, vilify the enemy politically and morally, gather the thoughts and will of the military and civilians internally, and strive to win externally. The commanding heights of law and morality can “soften” and “weaken” the enemy spiritually. Use a variety of network communication methods and technical means to send various deceptive, disruptive, inductive, and deterrent messages to the enemy’s military and civilians in a targeted manner to attack the enemy’s psychological defense line, promote an ineffective confrontation mentality, and then lose combat capabilities. . Through the Internet to create, guide, plan, build, and expand momentum, we can create a “momentum” that is beneficial to ourselves but not beneficial to the enemy, causing a psychological impact on the other party’s people, thereby affecting or changing their psychological state, and implementing effective psychological attacks.
Use legal struggle to gain legal and moral support. Use legal weapons to curb the enemy’s possible or future illegal acts, declare the legality of our actions, affirm our power of military counterattack, declare our determination to pursue war responsibilities, and deter the enemy. By exposing the illegality of the enemy’s provocative behavior, criticizing the legal basis for the enemy’s combat operations, and condemning the enemy’s illegal behavior, it causes the enemy’s strategic defeat and our own strategic gain. Use legal means to restrict the enemy’s possible actions, limit the possible interference of third parties, and block other parties from interfering with our own actions. Formulate the laws and regulations necessary for our operations to provide legal protection for our operations, or take legal remedial measures to reduce the possible negative impacts of our operations and ensure that combat operations are carried out in accordance with the law.
This article was published in the 7th issue of “Military Digest” magazine in 2023.