Tag Archives: Winning Localized War under Conditions of Informationization

Understand Chinese Military Single-Domain & Multi-Domain Joint Operations

了解中國軍事單域和多域聯合作戰

現代英語:

Joint operations are the basic form of combat in modern warfare. They emphasize the strength of more than two services and arms and other participating forces, and jointly implement operations in multi-domain space under unified command. “Single domain” and “multidomain” interdependence and interaction in joint operations are a pair of important military categories. Grasping the relationship between single domain and multi-domain is the core content and key to solving the “internal interface” problem in the construction and application of joint combat forces. The relationship between the two should be viewed dialectically and correctly handled, and the winning mechanism of joint operations should be continuously enriched to promote joint operations. Really achieve cross-domain integration, energy gathering and efficiency improvement.

“Single domain” is the constituent element and development basis of “multi-domain”

Joint operations emphasize the formation of advantageous multi-domains based on advantageous single domains, and place higher demands on the coupling relationship between each single domain that makes up the multi-domain. The development of a single domain can provide a solid foundation for the development of multiple domains and create prerequisites for achieving cross-domain integration.

In terms of historical process, single domain to multi-domain is the process of domain expansion. Throughout human history, the wars of each era have applied the techniques of their own era, imprinted the imprint of their own era, and developed with the time and space of the war. War in the agricultural era, with cold weapons as the main military equipment, battlefield fighting is mainly limited to land and offshore waters. It is a lower-level “full contact” war, and the combat domain is relatively single, making early operations “loose” Joint characteristics.

Entering the industrial era, with the invention and use of steam engines and internal combustion engines, air combat weapons represented by combat aircraft appeared on the battlefield. The combat space broke through the limitations of land and sea areas, forming a three-dimensional battlefield between land, sea and air. The war turned “semi-contact”, making joint operations take on “cooperative” joint characteristics. Entering the information age, the combat space breaks through the three-dimensional geographical space and forms a multi-domain integration of land, sea, air, space, electricity, network, and cognitive fields, making joint operations present multi-domain “integrated” characteristics. With the development of single domain to multi-domain, single-domain control rights such as land control, sea control, air control, heaven control, and information control have continued to appear, and the subsequent importance of single-domain control has continued to increase, promoting the connotation of multi-domain control. Expanding and changing, the competition for comprehensive control has become the first priority in the confrontation between ourselves and the enemy.

In terms of development form, single domain to multi-domain is a process of clustering into a network. Restricted by technical conditions and other constraints, combat activities before the information age, whether in terms of battlefield time, battlefield space, or the deployment and use of combat forces, have clear sections between single domains and clear levels of action at all levels, showing a strong Sequential and progressive, showing a single-domain chain development form.

Entering the information age, under the full “adhesion” of the network system, the multi-domain force formation develops from “combination” to “convergence”, forming an elastic structure with spatial dispersion and deployment, time coordination, and multi-dimensional energy release. According to the battlefield situation and changes in the situation, combat activities use the network information system as a “link” to connect the “links” of the combat single domain into a “network” shape, forming the focus of similar strong points and complementary advantages, and realizing each single domain “shape and spirit gathering” and “gathering fingers into fists”, The transition from single-domain chain to multi-domain network was achieved.

In terms of performance index, single domain to multi-domain is a process of energy aggregation and efficiency. Both opposing sides in the war tried to exert their overall combat power in order to achieve combat victory. However, due to the clear boundaries and loose connections of each single domain in the past, improving the overall combat power can only be achieved through the linearity “superposition” of each combat domain. With the development of information technology and intelligent technology, especially the widespread application of information systems in the military, the network information system realizes the command and control of each single domain force and can seamlessly link each combat domain. Each combat force maximizes The advantages of spatial multidimensionality and power diversity have been realized, and the strength and strength of each single domain and each level have been realized The high degree of integration, multi-dimensional cohesion, overall linkage and integrated energy release in terms of means and actions has achieved the effect of complementary advantages, synergy and cohesion, which is conducive to achieving a comprehensive advantage or local overwhelming advantage over the enemy.

“Multi-domain” is the direction-dominant and powerful dominance of “single-domain”

The essence of the winning mechanism of joint operations lies in cross-domain integration to achieve excellence and efficiency, which requires that single domain and multi-domain must be functionally “unified in the same direction”. “Multi-domain” stipulates the status and role of each single domain in combat. Each single domain must start from the overall functional needs of joint operations, focus on providing the ultimate contribution rate to the combat system, and achieve synchronous cross-domain maneuvering, cross-domain coordination, and cross-domain strike, to achieve system advantages in overall confrontation. Currently, the multi-domain dominates and dominates the single-domain in the direction of forming a resultant force with the system mainly from the following aspects.

Transition of multidomain operational requirements to hybrid war threats. At present, conventional threats are expanding and unconventional threats are becoming new and present threats, with the boundaries between regular and irregular battlefields tending to be blurred, between combatants and non-combatants and between physical and virtual dimensions. Joint operations are still the basic form of operations, but specific combat styles show a trend towards combining multiple styles. Various threats from traditional or non-traditional, formal or informal, high-intensity or low-intensity exist on land, sea, air, space, electricity, network, cognition and other multi-domains. These threats add a new dimension to the concept of war. Therefore, it is necessary not only to do a good job in the fight against a single threat, but also to develop the ability to integrate into multi-domain operations to deal with hybrid warfare.

The focus of multi-domain operations shifts to the network information system. Several informatization local wars that have broken out in recent years have shown that no war, no alliance, no alliance, no victory, the network information system that condenses various single-domain combat elements has become the focus of operations, and the combat command information system that gathers the combat power of the network information system has become the main basis for military operations “nerve center” and has become the key point for opponents to attack. The degree of integration of command and information systems is getting higher and higher, and the command systems of each single domain must converge and move closer to the overall command system, so as to achieve system integration of various services and combat units and deep coupling of various combat elements. In line with this, the information domain, the cognitive domain, and the electromagnetic domain, as emerging fields of warfare, have increased in their core status and importance, and have increasingly become the core operational domains for opposing sides to compete for control, becoming capable of causing enemy “blind, incapacitated, and mentally retarded” key operational domains. Therefore, each single domain must strengthen its ability to organically integrate into the network information system within the framework of a unified standard system and achieve interconnection and interoperability between each single domain, so as to ensure that it provides basic support in multi-domain precision warfare and thus wins overall advantages.

Transformation of multi-domain combat forces into joint combat units. Integrated joint operations have the characteristics of platform operations, system support and tactical operations, and strategic support. Strategic-level planning, campaign-level command, and tactical-level operations will become the norm in future wars. Large-scale corps operations may become increasingly rare and will be replaced by joint battles more often on multi-domain battlefields. The joint combat unit will bring together various single-domain combat forces and cover various combat elements. The level of the joint is reflected in the tactical level, presenting an independent combat capability that includes early warning and reconnaissance, information support, combat command, multi-domain attack and defense, combat support and other elements. Joint tactical unit form. Each “single-domain combat force” has a closer coupling relationship, and its own characteristics and advantages will become more prominent.

Accelerate the expansion of “single-domain advantages” to “multi-domain advantages”

For the dialectical unity of a single domain and a multi-domain, we must not only see the unity of a multi-domain, but also respect the independence of a single domain; we must neither completely oppose the two, nor erase the connection between them. In view of the actual situation of combat opponents, combat environment, own strength, etc., and taking into account various political, economic, technological, cultural and other factors, we should accelerate the expansion of “single-domain advantage” to “multi-domain advantage”, so as to form an information advantage, decision-making advantage and operational advantage against the enemy.

First, we must consolidate and expand the advantages of single domain.“ Metcalfe’s law ” tells us that increasing a network entity is capable of producing nonlinear exponential convergence of the combat power of the system. Multi-domain operations are deeply integrated system operations. As the basic element of multi-domain existence, the strength of each single domain’s construction will definitely affect the effectiveness of multi-domain integration. The essence of forming a multi-domain advantage is to deeply aggregate the advantages of each single domain. It is necessary to continuously strengthen the construction of single domain capabilities to form a single domain advantage and limit the opponent’s strength advantage to the limit. In fact, consolidating and expanding the advantages of single domains is not only to enhance single domain performance, but also to serve the purpose of multi-domain convergence. Single-domain construction requires strengthening top-level design, formulating standards and specifications, and striving to overcome conflicts caused by different combat construction concepts formed by the unique combat styles and combat culture of different services. At the same time, it is necessary to coordinate all military construction resources and focus on the development of multi-domain combat weapon platforms to meet the overall needs of joint operations, rather than just the needs of each single domain itself.

Second, we must promote the achievement of cross-domain synergy. Cross-domain synergy emphasizes breaking the boundaries between services and arms and integrating combat forces across services, arms and institutions. Based on the network information system, the combat forces in each domain are distributed in a wide area, and the multiple domains are linked as a whole to complement each other’s advantages and increase efficiency, and quickly gather energy step by step, promoting the expansion of single-domain advantages into multi-domain integration advantages and system advantages, and forming a concentrated energy strike against important enemy targets. In “joint operations”, combat forces in various fields must not only have the ability to independently perform a variety of combat missions, but also need to use their own cross-domain perception, target recognition and strike capabilities to support or even directly participate in other combat domain operations.

3. “Flexible mobile combat application is required!”. The winning mechanism of joint operations lies in the rapid and continuous integration of multi-domain combat forces to form multiple advantages and immediate advantages in specific time windows, forcing the enemy into passivity, disadvantage and dilemma. For the use of single-domain and multi-domain forces, such as the use of fingers and fists, whether it is “pointing points with hands” or “clenching fingers into fists”, or even the mutual transformation and use in combat, we must adhere to seeking truth from facts and comprehensively consider the efficiency of combat effects. Scientifically make decisions based on factors such as efficiency and contribution to the victory of war, and effectively use troops according to circumstances, location, and situation. If the single-domain combat force can solve the problem well, it is no longer necessary to use multi-domain combat forces, thereby improving operational effectiveness.

現代國語:

聯合作戰是現代戰爭的基本作戰形式,強調兩個以上軍兵種力量及其他參戰力量,在統一指揮下於多域空間共同實施作戰。聯合作戰中的「單域」與「多域」相互依存、相互作用,是一對重要的軍事範疇。掌握單域與多域的關係,是解決聯合作戰力量建設與運用之「內接口」問題的核心內容與關鍵所在,應辯證看待並正確處理二者關係,不斷豐富聯合作戰制勝機理,推動聯合作戰真正實現跨域融合、聚能增效。

「單域」是「多域」的構成要素與發展基礎

聯合作戰強調以優勢單域為基礎構成優勢多域,對組成多域的各單域之間的耦合關係提出了更高要求。單域的發展才能為多域的發展提供堅實的基礎,為實現跨域融合創造前提條件。

從歷史進程來看,單域到多域是領域拓展的過程。縱觀人類歷史,每個時代的戰爭都運用所在時代的技術,印刻著所在時代的烙印,並隨著戰爭時間和空間的發展而發展。農業時代的戰爭,以冷兵器為主要軍事裝備,戰場廝殺主要局限在陸域及近海海域,屬於較低級的「全接觸式」戰爭,作戰域較為單一,使得早期的作戰呈現出「鬆散性」聯合特徵。

進入工業時代,隨著蒸汽機和內燃機的發明與使用,以作戰飛機為代表的空戰武器出現在戰場,作戰空間突破陸域和海域的局限,形成陸海空三維立體戰場,戰爭轉向“半接觸式”,使得聯合作戰呈現出“協同性”聯合特徵。進入資訊時代,作戰空間突破三維地理空間,形成陸、海、空、天、電、網、認知領域等多域一體,使得聯合作戰呈現多域「一體化」聯合特徵。伴隨著單域向多域發展,制陸權、制海權、制空權、製天權、制資訊權等單域制權不斷出現,且後續單域制權的重要性不斷提升,推動著多域制權內涵的拓展變化,對綜合製權的爭奪成為敵我對抗的首要。

從發展形態來看,單域到多域是聚鏈成網的過程。受技術條件等製約,資訊時代之前的作戰活動,不論是在戰場時間、戰場空間,還是在作戰力量布勢運用等方面,各單域間條塊分明,各級行動層次分明,表現出強烈的順序性和漸進性,呈現出單域鏈條式發展形態。

進入資訊時代,在網路系統的充分“粘合”下,多域力量編成由“組合”發展為“融合”,形成空間分散部署、時間協調一致、能量釋放多維一體的彈性結構。根據戰場態勢和情況變化,作戰活動以網路資訊體系為“紐帶”,將作戰單域的“形散神聚”聯結成“網絡”狀,形成同類強點聚焦、優勢互補,實現了各單域“形散神聚”和“聚指成拳”,實現了由單域鏈條式向多域網絡式的轉變。

從效能指數來看,單域到多域是聚能增效的過程。戰爭敵對雙方都力圖發揮整體作戰威力以求得作戰勝利,但由於以往各單域邊界清晰、聯繫較為鬆散,提高整體戰力只能透過各作戰域的線性「疊加」來實現。隨著資訊化技術和智慧化技術的發展,特別是資訊系統在軍事上的廣泛應用,網路資訊體系實現了對各單域力量的指揮調控,並能無縫連結各作戰域,各作戰力量最大限度地發揮空間多維性和力量多元性優勢,實現了各單域各層級在力量、手段和行動等方面的高度融合、多維聚力、整體聯動和集成釋能,達成了優勢互補、協同一致、內聚融合的效果,有利於實現對敵全面優勢或局部壓倒性優勢。

「多域」是「單域」的方向主導與強力支配

聯合作戰制勝機理本質在於跨域融合實現聚優增效,要求單域與多域在功能上必須「同向統一」。多域規定了各單域在作戰中的地位與作用,各單域必須從聯合作戰整體功能需要出發,著眼為作戰體系提供極限貢獻率,實現同步跨域機動、跨域協同、跨域打擊,達成整體對抗中的體系優勢。目前,多域主要從以下方面主導並支配單域朝向與體系形成合力的方向發展。

多域作戰需求轉變為混合戰爭威脅。目前,常規性威脅不斷拓展,非常規威脅成為新的現實威脅,正規戰場與非正規戰場之間的界線趨於模糊,戰鬥人員與非戰鬥人員之間的界線趨於模糊,物理維度與虛擬維度之間的界線趨於模糊。聯合作戰仍是基本作戰形式,但具體的作戰樣式呈現出向多種樣式結合方向發展的趨勢,來自於傳統或非傳統、正規或非正規、高強度或低強度的各種威脅存在於陸、海、空、天、電、網、認知等多域中。這些威脅為戰爭概念增添了新的內涵。因此,既要做好針對某單一威脅的鬥爭,更要發展出具有融入多域作戰應對混合戰爭的能力。

多域作戰重心轉移到網路資訊體系。近年來爆發的幾場資訊化局部戰爭表明,無戰不聯、無聯不勝,凝聚各單域作戰要素的網路資訊體系成為作戰重心,匯聚網路資訊體系戰力的作戰指揮資訊系統,成為軍隊作戰主要依託的“神經中樞”,成為對手打擊的要害。指揮資訊系統的一體化程度越來越高,各單域的指揮系統必然要向整體指揮體系匯聚和靠攏,從而實現各軍種、各作戰單位的系統集成以及各作戰要素的深度耦合。與之相適應,資訊域、認知域、電磁域作為戰爭的新興領域,其核心地位和重要性不斷增強,日益成為敵對雙方爭奪制權的核心作戰域,成為能夠致敵「眼盲、失能、智障」的關鍵作戰域。所以,各單域必須在統一的標準體系框架內,加強自身有機融入網路資訊體系的能力,達成各單域間的互聯互通互通,才能確保在多域精確戰中提供基礎支撐,進而贏得整體優勢。

多域作戰力量轉型為聯合作戰單元。一體化聯合作戰具有平台作戰、體系支撐與戰術行動、戰略保障的特點,戰略級規劃、戰役級指揮、戰術級行動將成為未來戰爭的常態。大規模兵團作戰可能愈發少見,代之的將是聯合戰鬥更多地出現在多域戰場。聯合戰鬥單元將匯集各單域作戰力量,涵蓋各作戰要素,聯合的層級體現在戰術級,呈現出一個包括預警偵察、資訊保障、作戰指揮、多域攻防、作戰保障等多要素的可獨立作戰的聯合戰術單元形態。各單域作戰力量耦合關係更加緊密,自身特色優勢將更加突出。

加速推動「單域優勢」向「多域優勢」拓展

單域與多域辯證統一,我們既要看到多域的統一性,又要尊重單域的獨立性;既不能把二者完全地對立起來,又不可抹殺它們之間的聯繫。應針對作戰對手、作戰環境、自身實力等實際情況,綜合考慮政治、經濟、技術、文化等各種因素,加速推動「單域優勢」向「多域優勢」拓展,形成對敵的資訊優勢、決策優勢與行動優勢。

一要鞏固拓展單域優勢。 「梅特卡夫定律」告訴我們,增加網路實體能夠產生對體系戰鬥力的非線性指數聚能。多域作戰是深度融合的體係作戰,各單域作為多域存在的基礎要素,其建設的強度必將影響多域融合的效能。形成多域優勢實質是深度聚合各單域優勢,必須不斷加強單域能力建構形成單域優勢,限制對手力量優勢極限發揮。事實上,鞏固和拓展單域優勢不僅是為了增強單域效能,更是為了實現多域融合而服務。單域建設要加強頂層設計,制定標準規範,努力克服因不同軍種特有作戰樣式與戰鬥文化形成的不同作戰建設理念而帶來的矛盾衝突。同時,要統籌好各項軍隊建設資源,注重研發多域作戰武器平台,滿足聯合作戰整體需求,而非僅是各單域自身需要。

二要促進實現跨域協同。跨域協同強調打破軍兵種間界限,進行跨軍種、跨兵種、跨建制的作戰力量融合。基於網路資訊體系,各域作戰力量廣域分佈,多域整體連動,優勢互補增效,快速逐級聚能,推動將單域優勢擴展為多域融合優勢和體系優勢,形成對敵重要目標的聚能打擊。在聯合作戰中各域作戰力量不僅要具備獨立遂行多種作戰任務的能力,更需要利用自身的跨域感知、目標識別和打擊能力,能夠支援甚至直接參與其他作戰域行動。

三要靈活機動作戰運用。聯合作戰的致勝機制在於透過多域作戰力量快速且持續地整合,在特定時間窗口形成多重優勢和即時優勢,迫敵陷入被動、劣勢和困境。對於單域和多域力量的運用,猶如指頭與拳頭的使用,究竟是“指針點穴”還是“攥指成拳”,甚至是作戰中相互轉化運用,都需堅持實事求是,綜合考慮作戰效果效率效益,以及對戰爭制勝的貢獻率等因素科學決斷,切實做到因情用兵、因地用兵。如果單域作戰力量能很好解決問題,就不必再使用多域作戰力量,進而提升作戰效益。

王榮輝  鄧仕峰

中國軍網 國防部網 2022年1月20日 星期四

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2022-01/20/content_307852888.htm

Chinese Military Operational Transition “Cyber Warfare” to “Mosaic Warfare”

中國軍事行動從「網路戰」轉型為「馬賽克戰」

現代英語:

Theory is the precursor of action. Strengthening innovation in combat concepts and promoting innovation in combat guidance have always been important ways for militaries around the world to develop military advantages. In recent years, the U.S. military has successively proposed cutting-edge combat theories such as “cyber warfare”“ and mosaic warfare”, in order to realize that the combat model “production relationship” can be more adapted to the development of combat capabilities “productivity”. Through comparative analysis of these two combat theories, the world can get a glimpse of the changes in the thinking of building the US military’s combat capabilities, especially the understanding of the winning mechanism “mosaic warfare”, so as to find targeted and effective checks and balances.

● From threat response to war design——

Active shaping and improvement of traction combat capability

“Threat-based ”or “capability-based” are two basic ways to build military combat capabilities.“ Threat-based ”reflecting demand traction and focusing on solving real-life problems in the near and medium term are the basic rules that the military should follow in building combat capabilities; “based on capabilities” embodying goal traction, aiming at future strategic missions, and supporting strategic concepts with new combat theories are the key to military combat capabilities. The only way to innovate and surpass. The development from “cyber warfare” to “mosaic warfare” reflects the differences and evolution of the internal laws of the above two approaches, and also reflects the changes in the thinking and concepts of the US military in promoting combat capability construction in recent years.

New changes in concept origin. Cyberspace was originally born to solve human communication needs. Later, it gradually evolved into a new combat domain independent of land, sea, air, and space. From this, a “cyber war” with the struggle for cyberspace control as the core was derived. In comparison, “mosaic warfare” is a new combat concept actively developed and designed by the US military in order to continue to maintain its strategic advantage and directly target competitors. Its formation process reflects the integration of demand traction and capability traction, and its strategy, initiative, and traction Sex is more prominent.

New ideas for the use of technology.“ Cyber warfare ”emphasis on supporting the transformation and implementation of combat concepts through the development of new generation technologies.“ Mosaic Warfare” breaks out of this model and does not place too much emphasis on the development of a new generation of equipment technology. It pays more attention to the rapid transformation of general military and civilian technologies and the incremental iteration of mature technologies. The basic idea is to build on existing equipment and follow the application concepts of service platforms such as online ride-hailing and crowdfunding development. Through module upgrades and intelligent transformation, various combat system units “mosaicization” will be transformed into single-function, flexible Assemble and replaceable “building blocks” or “pixels” to build a dynamically coordinated, highly autonomous, and seamlessly integrated combat system Embodied new technology-driven ideas.

Path Development New Design.“ Cyber warfare ”as a companion concept to the network space, wherever the network space develops, “cyber warfare” will follow suit. Generally speaking, “objective” material conditions will be considered first, and then “subjective” conceptual design will be carried out. It has strong dependence on path development.“ Mosaic warfare ”first from “subjective” to “objective”, by developing a force design model that can dynamically adjust the functional structure, it can adapt to different combat needs and changes in the battlefield environment.

It can be seen that “mosaic warfare” has clearer goals, more mature technology, and more reliable paths than previous combat concepts such as “cyber warfare”, reflecting the change in thinking actively shaped by the US military.

● From network center to decision center——

Group intelligence to achieve optimal system energy release

AI technology is a key variable in the information age and a core increment in the development of the “mosaic warfare” system.“ Cyber warfare ”emphasis on “network center”, “mosaic warfare” closely focuses on the core of artificial intelligence technology, adjusts the key to victory from “network center” to “decision-making center”, and changes the combat system structure from system level and platform level Joint transformation to functional level and factor level integration, seeking to fully gather energy in the network The “group intelligence technology” realizes the optimal release of the system and gives new connotation to the war winning mechanism in the intelligent era.

Use “fast” to control “slow” to seize the cognitive lead. In future wars, the battlefield situation will change rapidly, and the weight of time factors will continue to increase. “Fast” versus “Slow” can form a combat strike effect that is approximately dimensionally reduced.“ Mosaic War ” By using data information technology and artificial intelligence technology, we can improve the single-ring decision-making speed of our own “OODA” ring, expand the breadth of parallel decision-making, reduce the granularity of group decision-making, accelerate the progress of system operations, and create an overall one-step faster “First move” situation, aiming to firmly control the dominance of cognitive decision-making on the battlefield.

With “low” system “high”, we accumulate cost advantages. Different from the traditional combat concept of pursuing high-end weapon platforms, “mosaic warfare” focuses on using artificial intelligence technology to tap the potential and increase efficiency of existing weapon platforms and combat resources. By loading and operating intelligent algorithms and specific functional modules on many mid-to-low-end weapon platforms, it can achieve combat performance comparable to high-end weapon platforms, overall improving the cost-effectiveness ratio of the input and output of the weapon platform, thereby accumulating cost advantages.

To “disperse” control “gather” and seek sustainable survival. “ Mosaic Warfare ” emphasizes the adoption of decentralized ideas and asymmetric checks and balances, using an open system architecture, and decentralized configuration of various functions such as reconnaissance, positioning, communication, and strike on various manned/unmanned platforms to achieve power. Distributed deployment. At the same time, relying on intelligent algorithms to improve the self-organization, self-coordination, and independent attack capabilities of each platform to achieve dispersion and concentration of firepower. When some combat platforms are eliminated, interfered with or stripped away, the entire combat system can still operate normally, thereby enhancing the continued viability of the battlefield of the force cluster.

Use “movement” to control “stillness” to improve system flexibility. “ Mosaic warfare ” emphasizes further breaking through the barriers of various combat areas. By turning the fixed “kill chain” in different combat domains into a dynamically reconfigurable “kill net”, the “OODA” large ring is disassembled into small rings, and the single ring is differentiated into multiple rings. According to changes in combat processes and combat requirements, intelligent networking is relied on to realize the split-in-movement, call-in-movement and combination of combat forces. In this way, on the one hand, it can enhance the flexibility and adaptability of the combat system; on the other hand, it can also hedge and offset the node aggregation effect of complex networks, making it difficult for opponents to find key nodes to defeat their own systems.

“Mosaic warfare” provides a reference prototype for intelligent operations. But at the same time, as an idealized force design and application framework, “mosaic warfare” still needs closely related technical, doctrinal, policy and other supporting support. There is still a long way to go before it is fully realized, and it is consistent with traditional combat systems. The coexistence situation will exist for a long time.

● From factor integration to system restructuring——

Dynamic structure to enhance combat system flexibility

Structure and relationships often determine function and nature.“ Cyber warfare ”and “mosaic warfare” are built on the common material foundation of the information age and follow the same evolutionary paradigm, but the principles and effects of system construction are different.“ The system structure formed by cyber warfare” is statically deconstructable, while “mosaic warfare” dynamically combines functional units according to certain construction rules to form a flexible system structure with self-organizing and adaptive characteristics, similar to a “dynamic black box”, which is difficult to follow with conventional means. predict. And this flexible structure often “emerges” new capabilities to empower and increase effectiveness in the combat system.

The integrated development of network and cloud makes combat time and space more dynamic and malleable. The Internet and the cloud are the basic environment for the operation of the information combat system. They reshape the process elements of intelligence, accusation, strike, and support in traditional operations, and at the same time derive new combat time and space.“ Cyber warfare ”mainly focusing on network space, its combat time and space are relatively static.“ Mosaic warfare ” is not limited to a single combat space. Under the development trend of information infrastructure network following cloud movement and cloud network integration, tangible and intangible spaces can be further deep-linked. The boundaries between combat time and space are more flexible, and the allocation of combat resources is more flexible, the combat system structure is more dynamic.

Data flows across domains, making operational control more seamlessly coordinated. In the “Command and Control” link, “cyber warfare” focuses on the command and control of combat units by joint combat command agencies. Cross-domain exchange and flow of data is mainly concentrated on the theater battlefield.“ Mosaic warfare ”further sinks the level of joint operations to the tactical end. Through the autonomous cross-domain exchange and seamless flow of data at the tactical level, various data islands can be clustered into data clusters on demand, thereby producing a significant “spillover” effect, making the dynamic, discrete, agile, and parallel characteristics of the combat command control loop more obvious, and more conducive to achieving agile connection of each combat unit on demand Efficiently act in concert.

Algorithm full-dimensional penetration makes system operation more autonomous and efficient. Algorithms are the mapping of human consciousness in cyberspace, forming two basic forms: compilation codes transformed by intention and neural networks transformed by knowledge. In “cyber warfare”, compiled code is widely used, and neural networks are only used locally. In “Mosaic Warfare”, the algorithm expands the two key functions of shaping rules and providing engines, and the breadth and depth of application are more prominent. Shaping rules is mainly based on compilation code, supplemented by neural networks, to construct the process framework and operating logic of the “mosaic warfare” system, laying a structural foundation for its uncertainty, adaptability and ability “emergence”; the provision engine mainly integrates intelligent algorithms The model is distributed to the edge elements to operate, forming a knowledge diffusion effect, thereby comprehensively improving the intelligent autonomous combat capabilities of the “mosaic warfare” system.

The side end releases energy independently, making the combat style more flexible and polymorphic. The edge is an abstract model of various manned/unmanned combat functional units and a direct source of systemic capabilities “emergence”.“ Cyber warfare ”in a system where edge elements are closely coupled with superior and subordinate accusation processes and are in a state of precise control.“ In the mosaic warfare” system, the perception, interaction, reasoning, and decision-making capabilities of edge-end elements are greatly improved. Its “OODA” ring does not need to be linked back to the superior command structure, which is conducive to supporting the formation of a decentralized combat cluster with high and low matching and manned/unmanned combination. form, which can give edge-end elements more self-organizing authority and significantly enhance the battlefield confrontation advantage.

It can be seen that if “cyber warfare” is called a sophisticated war machine, “mosaic warfare” can be regarded as a complex “ecology” that can stimulate the dynamic growth of combat capabilities. New changes in network clouds, data, algorithms, and edges have contributed to The formation of a dynamically complex “system structure”. This structure in turn reversely regulates elements, platforms and systems, and new capabilities continue to emerge, playing an important role in enhancing and evolving the combat system.

● From “system breaking to compound confrontation——”

To analyse the advantages and disadvantages and seek effective checks and balances

“Mosaic warfare” represents to a certain extent the possible direction of the future development of joint operations. It is necessary to fully analyze and grasp the winning mechanism of “mosaic warfare”, shape the field of information and communication as a new quality and new domain that breaks the traditional boundaries of war time and space, create a new concept of network cloud-enabled combat, build and strengthen the support and support capabilities of national defense information infrastructure, and highlight military information network security defense capabilities, enhance the minimum support capabilities for the operation of strategic campaign command organizations, and continuously improve the network information system.

On the other hand, the emergence of the “mosaic warfare” theory makes it difficult for traditional combat methods to attack target nodes with limited capture and control to achieve the system-breaking effect of breaking points and breaking chains. But it should be noted that any system has its inherent contradictions, and the seemingly “impeccable” decentralized structure of “mosaic warfare” can still find ways to effectively crack it. For example, grasp its system complexity characteristics, use its correlation dependence, highlight the functional suppression of communication networks, construct network-electrical composite attack paths, and achieve disassembly and isolation of various units of the combat system; grasp its structural dissipation characteristics, and use Its external information dependence highlights the disguise and misleading of information data, prompting the combat system to transform into abnormal states such as information closure and information overload; Grasp its group autonomy characteristics, use its key technology dependence, highlight the confrontation and efficiency reduction of intelligent algorithms, and suppress the intelligent internal drive of each combat unit; grasp its functional non-linear characteristics, use its unknown vulnerabilities, and highlight battlefield differentiation Strike assessment, test and discover operational system imbalances with higher efficiency and faster speed, and find key weaknesses in system attack.

(Author’s unit: Unit 61001)

現代國語:

編者按

理論是行動的先導。加強作戰概念創新、推動作戰指導革新,歷來是世界各國軍隊培塑軍事優勢的重要途徑。近年來,美軍先後提出「賽博戰」「馬賽克戰」等前線作戰理論,以期實現作戰模式這一「生產關系」能夠更加適應作戰能力這一「生產力」的發展。透過對比分析這兩種作戰理論,世人可以一窺美軍作戰能力建設思路的變化,特別是認清「馬賽克戰」的製勝機理,從而有的放矢,找到有效制衡之策。

●從威脅應對到戰爭設計——

主動塑造,牽引作戰能力提升

「基於威脅」或「基於能力」是軍隊作戰能力建設的兩條基本途徑。 「基於威脅」體現需求牽引,聚焦解決近中期現實問題,是軍隊作戰能力建設應遵循的基本規律;「基於能力」體現目標牽引,瞄準未來戰略使命,以新作戰理論支撐戰略構想,是軍隊作戰能力創新超越的必由之路。從「賽博戰」向「馬賽克戰」的發展,體現了上述兩種途徑內在規律的差異與演進,也反映出美軍近年來推進作戰能力建設思維理念的變化。

概念發端新變化。網絡空間,最初為解決人類的通訊需求而生,後來逐漸演變為一個獨立於陸、海、空、天之外的新作戰域,由此衍生出以爭奪網絡空間制權為核心的「賽博戰」。與之相比,「馬賽克戰」是美軍為繼續保持戰略優勢地位,直接瞄準競爭對手而主動開發設計的新作戰概念,其形成過程體現了需求牽引與能力牽引的融合,戰略性、主動性、牽引性更加突顯。

技術運用新思路。 「賽博戰」強調,透過研發新世代技術支撐作戰概念轉化落地。 「馬賽克戰」則跳出這個模式,不過分強調研發新一代裝備技術,更加關注對軍民通用技術的快速轉化,對成熟技術的漸進迭代。其基本想法是立足現有裝備,按照類似網約車、眾籌開發等服務類平台的運用理念,通過模塊升級和智能化改造,將各類作戰系統單元“馬賽克化”為功能單一、靈活拼裝、便於替換的“積木”或“像素”,構建形成動態協調、高度自主、無縫融合的作戰體系,體現了新的技術驅動。

路徑發展新設計。 「賽博戰」作為網電空間的伴生概念,網電空間發展到哪裡,「賽博戰」就跟進到哪裡,總體上先考慮「客觀」的物質條件,再進行「主觀」的概念設計,在路徑發展上具有較強的依附性。 「馬賽克戰」則先由「主觀」再到「客觀」,透過開發可動態調整功能結構的兵力設計模型,使其能夠適應不同作戰需求及戰場環境變化。

由此可見,「馬賽克戰」相比「賽博戰」等過去作戰概念,其目標更加明確、技術更加成熟、路徑更加可靠,體現出美軍主動塑造的思路轉變。

●從網絡中心到決策中心—

群體智能,實現體系最優釋能

人工智慧技術是資訊時代的關鍵變量,也是「馬賽克戰」體系發展的核心增量。 《賽博戰》強調“網絡中心”,“馬賽克戰”則緊緊扭住人工智能技術這一核心,將製勝關鍵從“網絡中心”調整為“決策中心”,將作戰體系架構由系統級、平台級聯合轉變為功能級、要素級融合,謀求在網絡充分聚能的前提下,以群體性智能技術實現體系最優釋能,為勝理的戰爭賦予新涵機時代。

以“快”制“慢”,奪取認知先手。未來戰爭,戰場形勢瞬息萬變,時間要素的權重不斷上升,「快」對「慢」可以形成近似降維的作戰打擊效果。 「馬賽克戰」透過運用數據資訊技術與人工智慧技術,提升己方「OODA」環的單環決策速度,拓展並行決策廣度,降低組環決策粒度,加快體係作戰進度,在整體上塑造始終快人一步的「先手棋」態勢,旨在牢牢控制戰場認知決策的主導權。

以“低”制“高”,積累成本優勢。與追求高端武器平台的傳統作戰概念不同,「馬賽克戰」著重於利用人工智慧技術對現有武器平台及作戰資源的挖潛增效。透過在眾多中低階武器平台上加載運行智慧演算法和特定功能模塊,使其達到媲美高端武器平台的作戰性能,整體上提高了武器平台投入產出的效費比,進而積累形成成本優勢。

以“散”制“聚”,謀求持續生存。 「馬賽克戰」強調採用化整為零的去中心化思路和非對稱制衡理念,使用開放系統架構,在各類有人/無人平台上分散配置偵察、定位、通信、打擊等各類功能,實現力量的分佈式部署。同時,依托智能演算法提升各平台的自組織、自協同、自主攻擊能力,實現形散神聚、火力集中。當部分作戰平台被消滅、幹擾或剝離後,整個作戰體系仍能正常運轉,從而增強兵力集群的戰場持續生存能力。

以“動”制“靜”,提升體系彈性。 「馬賽克戰」強調進一步突破各作戰域壁壘。通過把不同作戰域中固定的“殺傷鏈”變成可動態重構的“殺傷網”,將“OODA”大環拆解為小環,單環分化為多環。根據作戰進程和作戰需求的變化,依托智能組網實現作戰力量的動中拆分、動中調用、動中組合。如此,一方面可增強作戰體系的靈活性、適應性;另一方面還可對沖抵消複雜網絡的節點聚集效應,使對手難以找到破擊己方體系的關鍵節點。

「馬賽克戰」為智慧化作戰提供了一種可藉鑑的參考原型。但同時,作為一種理想化的兵力設計和運用框架,「馬賽克戰」還需要與之緊密相關的技術、條令、政策等配套支持,距離完全實現還有很長的路要走,與傳統作戰體系共存的局面將長期存在。

●從要素整合到體系重組—

動態結構,增強作戰體係彈性

結構和關系往往決定功能和性質。 「賽博戰」與「馬賽克戰」建構於資訊時代共同的物質基礎,遵循相同的演進範式,但體系建構的原理和效果有所不同。 「賽博戰」形成的體系結構靜態可解構,而「馬賽克戰」則按照一定構建規則動態組合功能單元,形成具有自組織、自適應特徵的彈性體系結構,類似一種“動態黑箱”,常規手段難以跟踪預測。而這一彈性結構常會「湧現」出新的能力,為作戰體系賦能增效。

網雲融合發展,使作戰時空更動態可塑。網和雲是資訊化作戰體系運作的基礎環境,重塑了傳統作戰中情報、指控、打擊、保障的流程要素,同時衍生出新的作戰時空。 「賽博戰」主要聚焦網電空間,其作戰時空相對靜態。 「馬賽克戰」則不限於單一作戰空間,在資訊基礎設施網隨雲動、雲網一體的發展趨勢下,可進一步深度鉸鏈有形無形空間,作戰時空邊界更有彈性,作戰資源配置更加靈活,作戰體系結構更具動態。

數據跨域流轉,使作戰控制更加無縫協同。在指揮控制環節,「賽博戰」關注的重點是聯合作戰指揮機構對作戰單元的指揮控制,數據跨域交換流轉主要集中在戰區戰場。 「馬賽克戰」則進一步將聯合作戰的層級下沉至戰術末端,通過數據在戰術層面的自主跨域交換和無縫流轉,實現各類數據孤島按需集聚為數據集群,進而產生顯著的「溢出」效應,讓作戰指揮控制環路動態、離散、敏捷、並行的特徵更為明顯,更加有利於實現各作戰單元按需銜接、高效協同行動。

演算法全維滲透,使體系運作更加自主高效。演算法是人的意識在網絡空間的映射,形成了由意圖轉化的編譯代碼和由知識轉化的神經網絡兩種基本形態。在「賽博戰」中,編譯代碼大量應用,神經網絡只在局部應用。在「馬賽克戰」中,演算法擴展出塑造規則、提供引擎兩項關鍵職能,運用的廣度深度更加突出。塑造規則以編譯代碼為主,輔以神經網絡,構造「馬賽克戰」體系的流程框架和運行邏輯,為其不確定性、適應性和能力「湧現」性奠定結構基礎;提供引擎則主要將智能演算法模型分發至邊端要素運行,形成知識擴散效應,從而全面提升「馬賽克戰」體系的智能自主作戰能力。

邊端自主釋能,使作戰樣式更靈活多態。邊端是各類有人/無人作戰功能單元的抽像模型,也是體系能力「湧現」的直接來源。 「賽博戰」體系中,邊端要素與上下級指控流程緊密耦合,處於精確受控狀態。 「馬賽克戰」體系中,邊端要素的感知、交互、推理、決策能力大大提升,其「OODA」環不必回鏈至上級指揮機構,有利於支撐形成高低搭配、有人/無人結合的去中心化作戰集群形態,可以賦予邊端要素更多自組織權限,明顯增強了戰場對抗優勢。

可見,如果稱“賽博戰”為精密的戰爭機器,“馬賽克戰”則可以視為一種能夠激發作戰能力動態生長的復雜“生態”,網雲、數據、算法、邊端所產生的新變化,促進形成了動態復雜的“體系結構”。這一結構又反向調控要素、平台和系統,不斷湧現新的能力,為作戰體系增能、演變發揮重要作用。

●從體系破擊到復合對抗——

辨析優劣,尋求有效制衡之策

「馬賽克戰」某種程度上代表著未來聯合作戰形態發展的可能方向。應當充分研析把握「馬賽克戰」的製勝機理,將資訊通信領域作為打破傳統戰爭時空界限的新質新域加以塑造,打造網雲賦能作戰新概念,建強國防資訊基礎設施支撐保障能力,突顯軍事資訊網安全防禦能力,增強戰略戰役指揮機構運行的保底支撐能力,不斷完善網絡資訊體系。

另一方面,「馬賽克戰」理論的出現,使得打擊奪控有限目標節點的傳統作戰手段,難以達成毀點斷鏈的體系破擊效果。但應當看到,任何體係都有其固有矛盾,「馬賽克戰」看似「無懈可擊」的去中心化結構,仍可以找到有效破解的方法路徑。例如,掌握其體系複雜性特徵,利用其關聯關係依賴性,突出針對通信網絡的功能抑制,構建網電復合攻擊路徑,實現對作戰體系各單元的拆解孤立;把握其結構耗散性特徵,利用其外部信息依賴性,突出針對信息數據的偽裝誤導,促使作戰體係向信息封閉、信息過載等非正常狀態轉化;掌握其群體自主性特徵,利用其關鍵技術依賴性,突出針對智能算法的對抗降效,抑制各作戰單元的智能內驅力;把握其功能非線性特徵,利用其未知脆弱性,突出戰場差異化打擊評估,以更高的效率和更快的速度失衡、發現作戰體系擊點,尋找體系破擊的關鍵弱點。

(作者單位:61001部隊

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/4894734888.html?big=fan

Military Intelligence Drives Accelerated Development of Chinese Army Cyberspace Operations

軍事情報推動中國軍隊網路空間作戰加速發展

現代英語:

The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.

Military intelligence leads to accelerated development of cyberspace operations

■Respect the soldiers Zhou Dewang and Huang Anwei

Three major technologies support the intelligence of cyberspace weapons

Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:

First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.

Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.

Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.

The intelligent trend of network-controlled weapons has become increasingly prominent

Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.

In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.

Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.

Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.

Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.

Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.

Intelligent command information system changes traditional combat command methods

Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.

In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.

In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.

To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.

In the future battlefield, fighting courage requires more fighting “wisdom”

■Yang Jian and Zhao Lu

At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.

Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.

It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.

In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.

現代國語:

資料來源:中國軍網綜合作者:敬兵 周德旺 皇安偉 等責任編輯:胡雪珂

黨的十九大報告指出,要「加速軍事智慧化發展,提升基於網路資訊體系的聯合作戰能力、全域作戰能力」。今天的《解放軍報》刊發文章指出,軍事智能化是機械化、資訊化之後軍事領域發展的新趨勢和新方向,我們要在現有機械化和資訊化基礎上發展智能化,同時用智能化牽引機械化和信息化向更高水平、更高層次發展。網路空間作為新型作戰領域,是科技含量高、最具創新活力的新領域,在軍事智慧化的牽引下,正迎來快速發展的機會期。

軍事智慧化牽引網路空間作戰加速發展

■敬兵 週德旺 皇安偉

三大技術支撐網路空間武器智慧化

智能是一種智慧和能力,是一切有生命週期的系統對規律的感應、認知與運用,智能化就是把這種智慧和能力固化下來,成為一種狀態。網路空間武器是網路空間遂行作戰任務的武器,其形態以軟體和程式碼為主,本質上是一段資料。網路空間武器的智慧化主要體現在以下三個方面:

一是智慧化漏洞挖掘。漏洞是網路武器設計的基礎,今年5月在全球傳播的勒索病毒軟體,就是利用了微軟作業系統漏洞,為網路安全界帶來了巨大震動。漏洞價格昂貴,零日漏洞價值幾萬到幾十萬美元不等。過去漏洞的發現,主要依靠有經驗的駭客,利用軟體工具對程式碼進行檢查和分析。今年中國網路安全大會期間舉辦的國際網路安全技術對抗聯賽總決賽中,參賽人員示範由智慧機器人現場進行漏洞挖掘,然後透過漏洞編寫網路程式碼,形成網路武器,攻破目標系統,奪取旗幟。這項變化,意味著漏洞挖掘進入了智慧化時代。

二是智能化訊號分析和密碼破譯。訊號是網路資料傳輸的載體,密碼是網路資料安全的最後屏障,訊號分析和密碼破解是網路空間作戰的核心技術,突破訊號和密碼是進入網路空間的基本路徑,也是網路武器攻擊的首要目標。智慧化訊號分析將訊號的協定分析、調變辨識、個體辨識等問題,透過大數據、雲端運算、深度學習等技術來解決。密碼破解是計算科學“皇冠上的明珠”,智能化密碼破譯通過對密碼數據樣本的積累,不斷學習、尋找規律,能找到破譯的鑰匙,從而打開網絡數據“保險櫃”的最後一扇門,解決網絡入侵和接入的關鍵環節。

三是智慧化武器平台設計。美軍在2009年提出「網路飛行器」項目,為網路空間作戰提供像戰車、艦艇、飛機這樣的平台,可以實現在網路空間裡自動偵察、載入網路武器、自主協同、自主攻擊,受到威脅時自我銷毀、清除痕跡,具備了一定的智慧化特徵。未來「網路飛行器」載入的武器,不是軟體人員編好的程式碼,而是根據偵察結果直接對發現的漏洞,現場即時進行智慧化網路武器設計,實現「訂購式」開發,從而大大提高網路空間作戰的針對性。

網控武器的智慧化趨勢愈加凸顯

受網路空間控制的武器簡稱網路武器,是透過網路連接,接受網路空間指令,執行跨域任務,在實體空間達成作戰效果的武器。未來的各種作戰武器平台,大多是聯網的武器平台,這樣軍事資訊網本質上就是物聯網,上聯衛星、雷達、無人機等網路實體,從感知到發現、追蹤、定位、打擊都可透過網路空間控制,網控武器的智慧化已在陸海空天電等戰場蓬勃發展。

2015年,敘利亞利用俄羅斯機器人軍團擊潰武裝分子,行動採用了包括6個履帶式機器人、4個輪式機器人、1個自動化火砲群、數架無人機和1套指揮系統。指揮官透過指揮系統調度無人機偵察發現武裝分子,機器人向武裝分子發動衝鋒,同時伴隨火砲和無人機攻擊力量支援,對武裝分子進行了致命打擊。這只是一場小規模的戰鬥,卻開啟了機器人「組團」作戰的先河。

海空戰場網控智慧武器正在大量研發驗證。 2014年,美國海軍使用13艘無人水面艇,示範驗證無人艇集群攔截敵方艦艇,主要透過交換感測器數據,取得了不錯的效果。 2016年再次試驗時,新增了協同任務分配、戰術配合等功能,「蜂群意識」成為其智慧化的顯著特徵。

用於空中作戰的小微型無人機蜂群也正在快速發展。近年來,美國國防部多次試驗「山銻」微型無人機,可一次投放數十架乃至上百架,透過提升其執行偵察任務時的協同能力,在無人機編隊、指揮、控制、智慧化管理等方面都取得了進展。

空天網控武器越來越「聰明」。空天領域主要包含偵察和打擊兩類網控武器,各種功能的衛星主要執行偵察任務,是典型的偵察感測器。隨著各種小微衛星群的出現,使衛星表現出新的特徵:體積小、發射快、數量多、更聰明。小微衛星群在執行偵察和通訊任務時,有了更大的彈性和可靠性,目前世界衛星強國都在積極制定覆蓋範圍更廣的小微衛星群計畫。

各種高超音速打擊武器在空天巡航,彷彿懸在人們頭頂的利劍。美國空軍研究室稱「高速打擊武器」將在2018年前後啟動飛行試驗,其它各國也正積極研發類似武器。這類武器最大的特色是速度快、航程遠、智能化程度高。

智慧化指揮資訊系統改變傳統作戰指揮方式

網路空間武器和受網路空間控制的武器,是智慧化戰爭的“拳頭”,而指揮這些武器運用的指揮資訊系統是智慧化戰爭的“大腦”,網路空間作戰指揮資訊系統要同步跟上智慧化的進程。目前,幾乎全球的指揮資訊系統都面臨著「智慧滯後」的難題,未來戰爭需要快速決策、自主決策,這對智慧輔助系統提出了更高要求。

2007年,美國國防部高級研究計劃局啟動關於指揮控制系統的研發計劃——“深綠色計劃”,以期能實現計算機輔助指揮官快速決策贏得制勝先機。這是一個戰役戰術級的指揮資訊系統,其研發目的是將該系統嵌入美國陸軍旅級C4ISR戰時指揮資訊系統中去,實現指揮官的智慧化指揮。直到今天,美軍也沒有放鬆對智慧化指揮資訊系統的發展。

在網路空間作戰中,網路目標表現為一個接取網路的IP位址,數量眾多導致人工難以有效率操作,作戰更需要智慧化指揮資訊系統的輔助支撐。目前,智慧化指揮資訊系統需要實現智慧情報分析、智慧感知、智慧導航定位、智慧輔助決策、智慧協同、智慧評估、智慧化無人作戰等功能,尤其是實現對無人網控系統的集群作戰操控,這都對智慧化指揮資訊系統提出了迫切需求,需要加快相應關鍵技術的研發和運用。

綜上所述,智慧化的網路武器和網路控制武器,透過智慧化的資訊系統調度,將形成巨大的作戰能力,基本能遂行現行作戰樣式中的所有行動。未來戰爭,從指揮力量編組、到目標選擇、行動方式、戰法運用等,都將在智能化的背景下展開,戰爭「遊戲化」的特徵將更顯著,作戰指揮方式也將發生重大變化。

未來戰場 鬥勇更需鬥“智”

■楊建 趙璐

目前,人工智慧發展進入嶄新階段,並開始向各個領域加速滲透。受此一進程的影響,各國圍繞智慧化的軍事競爭已揭開序幕。我軍歷來是一支英勇頑強、敢打必勝的人民軍隊,未來戰場上應繼續發揚光榮傳統,同時要更加廣泛地掌握和利用最新的科技成果,研製出更多智能化的武器裝備,在未來戰場上掌握制勝先機。

智慧化是人類社會發展的趨勢,智慧化戰爭正加速到來。正是由於超越原有體系結構計算模型的成功創新、奈米製造技術的逐步普及,以及對人腦機制研究的突破性進展,軍事智慧化發展才擁有了堅實的基礎。因此,智慧化武器裝備的表現日益突出,並在情報分析、戰鬥反應等方面開始超越並取代人類。此外,在人力需求、綜合保障、運作成本等方面,智慧化武器裝備也具有明顯的優勢,日益成為戰爭的主導力量。

事實證明,智慧化武器裝備的發展應用,拓展了軍事行動的能力範圍,大幅提升了部隊的作戰效能。在阿富汗和伊拉克戰場上,無人機已承擔了大部分偵察、情報、監視等作戰保障任務,並承擔了約三分之一的空中打擊任務。近兩年,俄羅斯在敘利亞戰場上也曾多次使用較高智慧化程度的無人偵察機、戰鬥機器人等裝備。智慧化武器裝備正愈來愈地展現出超越傳統武器的重要價值。

未來戰爭中,作戰體系智能化的較量將是高手過招、巔峰對決的勝利關鍵。隨著以科技為支撐的軍事手段發展的不平衡性越來越大,誰先具備實施智能化作戰的能力,誰就更能掌握戰場的主動權,擁有技術代差優勢的強者會盡可能將戰爭成本降到最低,而弱者必然遭受巨大損失,付出慘重代價。我們不僅要加緊核心技術創新、武器裝備研製,還要研究探索適應軍事智能化發展的組織結構、指揮方式和運用模式,更要培養一支能夠擔起推進軍事智能化發展、鍛造智能化作戰能力的人才隊伍,充分發揮我軍作戰體系的整體效能,在與對手的較量中,以更加“智慧”的方式贏得戰爭。

中國原創軍事資源:http://www.81.cn/jwzl/2017-11/24/content_7841895888.htm

Chinese Military Deciphering Cognitive Warfare Codes Capability Based on Operational Decision Chains

中國軍隊基於作戰決策鏈破解認知戰密碼的能力

現代英語:

Cognition is the basis for operational decisions and operations. Cognitive warfare is a confrontation activity carried out in the cognitive domain. The purpose is to attack the enemy’s knowledge system, social consciousness, people’s morale, etc., disrupt its judgment and decision-making, and cause it to lose its decision-making advantage and action advantage. To deepen the research on cognitive warfare and decipher the cognitive warfare code, the key is to embed the combat decision-making chain and explore how to influence and interfere with the cognitive activities of the enemy’s decision-making chain, causing the enemy to form false observations, wrong judgments and poor decisions, so as to fully control Cognitive initiative.

Seeing is false, changing the facts

Observation is the starting point of cognition. No matter what kind of war, when facing any opponent, the first step is observation. The observation here is a broad concept and is about all activities to obtain all relevant information about the hostile party. Just as people perceive external things through sensory organs, observation relies on the battlefield perception system to obtain relevant data and information from the battlefield environment according to the needs of the subject, providing “ source material ” for judgment and decision-making. Observation uses intelligence, reconnaissance, surveillance and other activities to obtain as much factual information and materials from all aspects of the enemy as possible and convert them into text, images, audio, video and sensor signals.

The history of war at home and abroad in ancient and modern times shows that the essence of command is the endless pursuit of certainty, including the status and intentions of enemy troops, various factors affecting the combat environment such as weather and terrain, as well as the status and actions of one’s own troops. Therefore, efficient command consists in clarifying each element and then coordinating it as a whole to achieve the best combat effect. Human judgment and decision-making are easily disturbed by information uncertainty. In the observation stage, the key to cognitive warfare is to make the enemy unable to clearly observe, incompletely observe, and distort the information of their own combat elements, and lack real information or accurate understanding, thereby weakening the enemy’s decision-making on combat at the source. The pursuit of certainty.

Measures for observing cognitive warfare, in addition to common information warfare methods, such as disguise, interference, deception, silence, etc., should also pay attention to the following aspects: First, create complex situations. War is inherently full of complexity. By creating complexity, it increases the fog and resistance on the battlefield, making it impossible for the enemy to observe the real specific situation. For example, by creating various events and operations in multi-dimensional combat areas such as land, sea, air, sky, and network, and making irregular changes, it can effectively increase the difficulty of enemy observation. The second is to interfere with observation and cognition. Observation is not aimless. It is carried out based on a certain cognition. Cognition determines what information needs to be observed, what kind of reconnaissance activities need to be carried out, etc. For example, during observation activities, by interfering with operations, the enemy’s attention in observation activities is affected, causing it to lose the ability to focus on essential issues and key issues, thereby making it unable to obtain key information. The third is to shape the factual narrative. Shaping factual narratives is to reformulate, combine, arrange, and reconstruct facts according to the needs of cognitive warfare. These facts are either created out of nothing, highlight certain details in the facts, or are difficult to verify and test, making their observation materials Mixed with fictional facts, the observed facts are far from objective facts. The fourth is to protect specific knowledge. Knowledge protection is an important aspect of cognitive warfare. The main contents include: commander’s decision-making style, combat theory reasoning process, premises and assumptions, key tactical ideas and combat principles, key decision-making procedures, mechanisms and methods, information analysis methods, especially some algorithms, passwords, etc.

Targeting the judgment, misleading the judgment

On the battlefield, simple observation and data collection do not make much sense. Only by analyzing these data “ by looking at the essence of the phenomenon, and then drawing various judgments, will we promote the formation of operational decisions. For example, during the Battle of Moscow in World War II, the Soviet Union had a lot of and messy information about the Japanese Kwantung Army. Finally, after careful analysis, it was concluded that “ the Soviet Union could be considered safe in the Far East, and the threat from Japan had been ruled out ” After the judgment, it was decided to transfer troops from the Far East to Moscow to participate in the Battle of Moscow. Judgment is the corresponding conclusion reached by analyzing and reasoning the observation results, which mainly includes: first, factual judgment, usually expressed in descriptive language, such as the current situation, enemy battlefield deployment, battlefield posture, etc.; second, value and relationship judgment, usually Expressed in evaluative language, such as threat assessment, correlation analysis, trend prediction, etc.

Judgment cognitive warfare is actually a game surrounding judgment. Normally, judgments arise on the basis of a judgment, without which there would be no conclusion of judgment. Whether a person has high blood pressure or diabetes is often based on some medical indicators, and these indicators are the criteria. The premises and assumptions of reasoning are actually based on judgments. “ Persian cat story ” circulated in World War I. Judging from the location of the command post from a Persian cat, it contains a series of judgments: there is no village around, and it cannot be a cat raised by ordinary civilians; the sound of artillery on the battlefield is rumbling, and it cannot be It is a wild cat that is cautious and avoids people; Persian cats are a valuable breed, and the position of cat owners is not low; cats appear at fixed times every day, and the command post should be near cats. Therefore, interfering with judgment is to target the judgment to design and produce information products so that the facts obtained do not match the judgment, or to minimize the leakage of information related to the judgment, so that the enemy cannot judge or make wrong judgments.

The main contents of the interference criterion are: First, the interference is based on experience. Based on enemy experience, create “ virtual facts ” to make errors in judgment. For example, in the Battle of Maling, Sun Bin halved the stove to lure Pang Juan, which is a typical example. Because according to experience, the number of stoves is directly proportional to the number of troops. Halving the number of stoves every day means that the number of people is decreasing. The possibility of reduction is that the soldiers have suffered greater casualties, which leads to the judgment of weakening combat power. The second is to interfere with the judgment based on the knowledge system. Such knowledge includes the enemy’s common sense, concepts, principles and some assumptions. For example, in the Fourth Middle East War that broke out in October 1973, Israel’s initial defeat was a misjudgment of the war situation. It believed that as long as its air force was still in an advantageous position, the other side would never dare to attack. However, Egypt began to adopt new military technology and used mobile surface-to-air missiles to support an air defense network, partially offsetting Israel’s air superiority. The third is to interfere with judgments based on universal culture. That is, design corresponding information and actions based on the enemy’s cultural characteristics so that they can be misjudged due to cultural differences. According to foreign information, during the Cold War, the United States studied the root causes of “ Soviet behavior, so it started from culture and behavior to induce the Soviet Union to make strategic misjudgments. The fourth is to interfere with methodological-based judgments. Generalizations, analogies, etc. are the basic methods of judgment. Cognitive interference based on methodology makes it difficult for the other party to understand facts and cannot be compared with known facts; complicating the causal relationship and confusing factual cause and effect, psychological cause and effect, conditional cause and effect, social cause and effect, etc., making it impossible to implement causal judgment; reducing possible signs and phenomena, making it impossible to see through the essence and make accurate judgments.

Focus on the process and influence decision-making

Operational decision-making is based on combat purposes and intentions. After observation and judgment, various factors are combined to derive the optimal solution to the problem. War or conflict behavior has game, competition and confrontation attributes, so decision-making is a game. Decisions address key issues such as whether to do it, how to do it, what purpose to achieve, or the state of termination. In information-based local wars, action-centeredness gradually replaces planning-centeredness, requiring an increase from data center warfare, information center warfare, and knowledge center warfare to decision-making center warfare. Combat decision-making has become one of the main areas of competition between the enemy and ourselves.

Decision-making cognitive warfare is to target enemy cognition and interfere with the decision-making process to affect the quality and efficiency of decision-making. Decision-making is affected by the knowledge structure of the decision-maker himself. If cognition is paranoid or the knowledge reserve is outdated, even if the judgment is correct, good decisions will still not be made. The decision-making process includes the application and change process of knowledge structure, which mainly involves procedural knowledge and conceptual principled knowledge. The former includes decision-making procedures and methods, decision-making mechanisms and evaluation methods, etc., while the latter includes understanding of battlefield posture, winning mechanism, combat concepts, combat rules, and weapons and equipment performance. Therefore, cognitive attacks on the decision-making process will greatly affect its decision-making speed and quality.

The main ways to influence cognitive warfare in decision-making are: First, squeezing the cognitive decision-making space. When watching tennis matches, commentary on non-forced errors and forced mistakes are often heard, with forced mistakes being those caused by putting pressure on the opponent. Interfering with the cognitive decision-making environment is to put pressure on the enemy’s cognitive decisions, thereby squeezing the cognitive space and weakening cognition to force the enemy to make mistakes in decision-making. For example, through virtual and real decision-making activities and actions, the opponent is trapped in decision-making difficulties, which increases the probability of low-level decision-making. The second is to attack rational cognition. Including: First, interfering with the understanding of threats and opportunities. Many examples of failures in military history are caused by misjudgment of threats and opportunities on the battlefield. Whether you despise the enemy or overestimate the enemy, you will form decision-making expectations that are different from objective reality, leading to adverse action results. Second, attack combat theory and doctrine. For example, by proposing the theory of mutual restraint, deliberately exaggerating the loopholes in the enemy’s doctrine, and amplifying the adverse effects of the enemy’s combat operations, the enemy can arouse doubts about its own theory and doctrine. Third, for procedural knowledge. Including decision-making mechanisms, procedures and methods, plan evaluation and combat evaluation methods, auxiliary decision-making systems, algorithms, thinking, etc. Attacking the weaknesses present will also cause decision-making errors. The third is to interfere with irrational factors. The use of irrational factors often creates decision-making traps, such as groupthink traps, conceit traps, etc., which have a significant impact on decision-making. The strategic deception successfully implemented by the Allied forces many times during World War II was to use the enemy’s ambiguous and misleading analysis to increase the probability that the wrong decision would win.

現代國語:

來源:中國軍網-解放軍報 作者:吳中和 朱小寧 責任編輯:王韻
2022-09-13 06:48:xx
吳中和 朱小寧

引言

認知是作戰決策與行動的基礎。認知戰是在認知域進行的對抗活動,目的是攻擊敵知識體系、社會意識、民心士氣等,打亂其判斷與決策,使其失去決策優勢與行動優勢。深化認知戰研究,破譯認知戰密碼,關鍵是嵌入作戰決策鏈,探究如何影響和乾擾敵決策鏈的認知活動,致敵形成不真實的觀察、錯誤的判斷和糟糕的決策,從而充分掌控認知主動權。

眼見為虛,改變事實

觀察是認知的起點。無論何種戰爭,面對任何對手,首先要做的第一步就是為觀察。這裡的觀察是一個廣義概念,是關於獲得敵對方所有相關資訊的一切活動。正如人類透過感覺器官感知外界事物一樣,觀察依托戰場感知系統,根據主體需要從戰場環境中獲得相關數據與訊息,為判斷和決策提供「原始材料」。觀察通過情報、偵察、監視等活動,盡可能多地獲取敵對方各方面的事實信息與材料,並將其轉化為文本、圖像、音頻、視頻和傳感器信號等。

古今中外的戰爭史表明,指揮的本質是對確定性的無盡追求,包括敵軍部隊狀態和意圖,天候、地形等影響作戰環境的種種因素,以及己方部隊的狀態和行動。因而,高效率的指揮在於廓清每個要素,然後將其整體協調起來行動,以達成最佳作戰效果。而人的判斷決策,很容易受資訊的不確定性幹擾。在觀察階段,認知戰的關鍵就在於,使敵人對己方各種作戰要素觀察不清、觀察不全、觀察的信息失真混亂,缺乏真實信息或準確理解,從而從源頭上削弱敵方對作戰決策確定性的追求。

觀察認知戰的措施,除了通常的資訊戰方法,如偽裝、幹擾、欺騙、靜默等,還應注意以下方面:一是製造復雜局面。戰爭本來就充滿複雜性,通過製造複雜性,增加戰場的迷霧和阻力,使敵人無法觀察到真實具體情況。如,透過在陸、海、空、天、網絡等多維作戰域製造各種事件與行動,並作無規則變動,可有效增加敵方觀察的難度。二是乾擾觀察認知。觀察不是毫無目的的,是基於某種認知進行的,認知決定需要觀察哪些資訊、採取何種偵察活動等。如,在觀察活動中,透過幹擾行動,影響敵方觀察活動的注意力,使其失去聚焦本質問題、關鍵問題的觀察能力,進而使其始終無法獲得關鍵資訊。三是塑造事實敘事。塑造事實敘事,就是根據認知戰需要,重新表述、組合、編排、再建構事實,這些事實要麼是無中生有,要麼是突出事實中的某些細節、要麼是難以查實和檢驗等,使其觀察材料中混雜於虛構事實,觀察的事實與客觀事實相距甚遠。四是保護特定知識。知識保護是認知戰的重要面向。主要內容有:指揮員決策風格,作戰理論推理過程、前提與假設,關鍵戰術思想與作戰原則,關鍵決策程序、機制與方法,資訊分析方法特別是一些演算法、密碼等。

瞄準判據,誤導判斷

戰場上,簡單的觀察和資料收集並沒有太多意義,只有對這些數據進行「透過現像看本質」地分析,進而得出各種判斷,才會推動形成作戰決策。如第二次世界大戰莫斯科保衛戰中,蘇聯有關日本關東軍的資訊多而雜亂,最後經過縝密分析,得出「蘇聯在遠東地區可以認為是安全的,來自日本方面的威脅已排除」的判斷後,才決定將遠東方面的部隊調往莫斯科,參加莫斯科保衛戰。判斷是對觀察結果進行分析推理而得出的相應結論,主要包括:一是事實判斷,通常用描述性語言表達,如當前形勢、敵方的戰場部署、戰場態勢等;二是價值和關系判斷,通常用評價性語言表達,如威脅評估、關聯分析、趨勢預測等。

判斷認知戰,實際上是圍繞判據展開的一種博弈。通常情況下,判斷是基於判據產生的,沒有判據,就不會有判斷結論。一個人是否患有高血壓、糖尿病,往往基於一些醫學指標,這些指標就是判據。推理的前提與假設,實際上也是基於判據。一戰中流傳的“波斯貓的故事”,從一隻波斯貓判斷出指揮所位置,就包含著一系列判據:周圍沒有村莊,不可能是普通平民養的貓;戰場上炮聲隆隆,不可能是謹慎避人的野貓;波斯貓是名貴品種,養貓的人職位不低;貓每天固定時間出現,指揮家應該就在貓出沒在貓出沒。因此,幹擾判斷就是瞄準判據進行資訊產品設計與生產,使其獲得的事實與判據不匹配,或盡量減少自己與判據相關資訊的洩漏,從而使敵方無法判斷或做出錯誤的判斷。

幹擾判據的主要內容有:一是乾擾以經驗為基礎的判據。根據敵方經驗,製造“虛擬事實”,使其判斷失誤。如馬陵之戰中孫臏日減半灶以誘龐涓,就是典型的例子。因為根據經驗,灶與軍隊人數成正比,日減半灶說明人數在減少,減少的可能性是士兵傷亡較大,從而得出戰力減弱的判斷。二是乾擾以知識體係為基礎的判據。此類知識,包括敵方的常識、概念、原則及一些假設等。如1973年10月爆發的第四次中東戰爭,以色列最初的失利在於對戰局的誤判,認為只要自己的空軍仍處於優勢地位,對方就絕對不敢進攻。但是,埃及開始採用新的軍事技術,運用移動式地空飛彈撐起一張空中防禦網,部分抵銷了以色列的空中優勢。三是乾擾以普遍文化為基礎的判據。即根據敵方文化特徵,設計相應資訊與行動,使其因文化差異而產生誤判。據國外資料介紹,冷戰時期美國曾研究了“蘇聯行為的根源”,因此從文化與行為上入手做文章,誘使蘇聯產生戰略誤判。四是乾擾以方法論為基礎的判據。概括、類比等是判斷的基本方法。針對方法論的認知幹擾,就是使對方難以了解事實,無法與已知事實類比;將因果關系復雜化,把事實因果、心理因果、條件因果、社會因果等混淆起來,無法實施因果判斷;減少可能的徵兆和現象,使其無法看透本質,無從進行準確判斷。

著眼過程,影響決策

作戰決策,是針對作戰目的和企圖,經過觀察和判斷,將各種因素綜合起來,推導出解決問題的最優方案。戰爭或沖突行為,具有博弈、競爭和對抗屬性,因而決策即是​​博弈。決策解決的是乾不干、怎麼幹,達到什麼目的或終止狀態等關鍵問題。在資訊化局部戰爭中,以行動為中心逐步取代以計畫為中心,要求從資料中心戰、資訊中心戰、知識中心戰上升為決策中心戰,作戰決策更成為敵我雙方競逐的主要領域之一。

決策認知戰,就是瞄準決策過程中敵方認知進行攻擊幹擾,以影響決策品質與效率。決策受到決策者本身知識結構的影響,如果認知發生偏執或知識儲備過時,即使判斷正確了,仍然得不出好的決策。決策過程包含了知識結構的運用與變化過程,主要涉及程序性知識和概念原理性知識,前者包括決策程序與方法、決策機制與評估方法等,後者包括對戰場態勢、制勝機理、作戰概念、作戰法則、武器裝備表現的認識等。因而,對決策過程中的認知攻擊,將大大影響其決策速度與品質。

影響決策認知戰的主要途徑有:一是擠壓認知決策空間。觀看網球比賽時,經常聽到非逼迫性失誤和逼迫性失誤的解說,逼迫性失誤是指由於給對手造成壓力引起的失誤。幹擾認知決策環境,就是給敵方認知決策壓力,從而擠壓認知空間,削弱認知力,以逼迫敵人決策出現失誤。如,透過虛實相間的決策活動與行動,讓對手陷入決策困境,致其增加出現低水準決策的機率。二是攻擊理性認知。包括:其一,幹擾對威脅與機會的認知。軍事史上許多失敗的戰例,都是誤判戰場上的威脅與機會所引起的。無論輕視敵人,或高估敵人,都會形成與客觀實際不一樣的決策預期,導致不利的行動結果。其二,攻擊作戰理論與條令。如透過提出相剋的理論、刻意渲染敵條令的漏洞、放大敵方作戰行動的不利效果等,引起敵方對自身理論與條令的懷疑。其三,針對程序性知識。包括決策的機制、程序與方法,方案評估與作戰評估方法,輔助決策系統、演算法、思維等,攻擊其中的弱點,也會造成決策失誤。第三是乾擾非理性因素。對非理性因素加以利用,往往會造成決策陷阱,如群思陷阱、自負陷阱等,對決策有重大影響。二戰中盟軍曾多次成功實施的戰略欺騙,就是利用了敵方模稜兩可和誤導性迷惑分析,讓錯誤的決策勝出的機率增大。

中國原創軍事資源:http://www.81.cn/xxqj_207719/xxjt/pl_207751/10184370888.html?big=fan

Chinese Military Research on Conceptual System-based Superior Warfare – How to Fight in Information Warfare System Operations? Analysis of Nine Typical Combat Styles

中國軍事體系優勢作戰概念研究-資訊化作戰體系如何作戰?九種典型作戰風格分析

現代英語:

System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole. 


       In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze .

       System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“
        1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence
        2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations
       3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure
       4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control
       5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare
       6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma
       7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support
       8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics
       9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system

        For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body
       The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.


       1. Overall deterrence
       Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.


       1.1 Emphasis on multi-domain joint deterrence
       Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.

1.2 The implementation of overall deterrence should have three major elements
       Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.


       Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.


       1.3 Strong overall strength is the core of achieving effective deterrence
       The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war.
       In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.


       2. Electromagnetic Disturbance Warfare
       Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.


       2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.


       2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.


       2.3 Crack effective tactics for unmanned cluster operations
     “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.


       3. Cyber-sabotage
       Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities.
       The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.


      4. Cognitively Controlled Disturbance Warfare
      Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage.
      Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.


       4.1 Control the cognitive rights of situational awareness and compete for information advantages
       In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.


       4.2 Control and command decision-making power and compete for decision-making advantages
       Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.


       4.3 Control “brain” power and seize the advantage of brain control
       Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.


      5. Agile Mobile Warfare
      Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.

Table 1 Connotation of the concept of agile warfare


      5.1 Efficient and fast decision-making
      To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.


      5.2 High efficiency forms a favorable combat situation
      It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.


      5.3 Efficient and instant gathering of combat power
      To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.


      5.4 Agile mobile warfare is an innovative development of traditional mobile warfare
      In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.


       6. Unmanned cluster autonomous warfare
       Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.


       6.1 It is conducive to forming a system advantage to suppress the enemy
       Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.


       6.2 Conducive to enhancing combat effectiveness
       In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.


       6.3 Conducive to getting into enemy combat difficulties
       Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.


       7. Pointkill Battle
       “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.


      7.1 Achieve efficient combat cost ratio
      Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.


       7.2 Targeting key nodes is an important option
       The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.


       7.3 Large-scale system support is the basic condition
       The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.


       7.4 It is inseparable from precise intelligence support
       In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.


       8. Supply-breaking
       Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.


       8.1 The supply guarantee chain has a huge impact on the overall combat situation
       Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.


       8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain
       The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.


       8.3 The key is to choose the right time and make full use of tactics
       It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.


       9. System “paralysis battle”
       System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.


       9.1 The combat goal is to disorderly operate the enemy’s combat system
       In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.


       9.2 A key node in the heavy strike combat system
       Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.


       9.3 Implement soft strikes against the enemy’s combat system
       When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat. 

現代國語:

體系聚優戰是資訊化戰爭中的體係作戰,其不限定特指某一種作戰樣式,而是由多種作戰樣式和戰法組成的“組合拳”,或作戰樣式群。強調根據作戰任務、作戰對手和戰場情勢變化,只要有利於形成相對優勢、達成體系製勝,可以靈活運用任何適宜的作戰手段和样式,形成作戰優勢。在體系聚優戰具體實施過程中,這些具體作戰樣式和行動戰法既可以作為聯合全局作戰的一部分單獨組織實施,更強調打“組合拳”,多策並舉,整體制勝。
為更能理解其核心內涵,本文列舉了整體威懾戰、電磁擾阻戰、網路破擊戰、認知控擾戰等九大典型作戰樣式,並進行分析。

體系聚優戰――靈活運用多種作戰樣式的「組合拳」作者:學術plus高級觀察員 東週
本文主要內容及關鍵字
1.整體威懾戰:強調多域聯合威懾;實施整體威懾戰應具備三大要素;強大整體實力是實現有效威懾的核心
2.電磁擾阻戰:爭奪資訊優勢的關鍵;在組合手段方法上,透過「連結+共享」實現資訊賦能;破解無人集群作戰的有效戰法
3.網路破擊戰:軟殺傷為主,軟硬結合,重在破網降能失效
4.認知控擾:控制態勢感知認知權,爭奪資訊優勢;控制指揮決策權,爭奪決策優勢;控制「腦」權,奪取腦控優勢
5.敏捷機動戰:高效率快速決策;高效率形成有利作戰態勢;高效率即時聚合作戰力量;敏捷機動戰是對傳統機動作戰的創新發展
6.蜂群自主戰:有利於形成體系優勢壓制敵方;有利於增強作戰效果;有利於陷敵於作戰困境
7.精確點殺戰:實現作戰的高效費比;打關鍵節點目標是重要選項;大範圍體系支撐是基本條件;離不開精確情報保障
8.補給斷鍊戰:供應保障鏈對作戰全局影響巨大;打擊重心是斷敵供應保障鏈的關鍵節點;重在選準時機活用戰法
9.體系毀癱戰:作戰目標是使敵作戰體系運作失序;重拳打擊作戰體系的關鍵節點;對敵作戰體系實施軟打擊

僅供學習參考,歡迎交流指正!文章觀點不代表本機構立場
作戰概念首先是作為一種新的作戰樣式提出。創新作戰樣式是作戰概念開發的核心內容。可以說,體系聚優戰是一系列具體戰法的總稱。以下九大典型作戰樣式構成了體系聚優戰的戰法體系。分別為:一是整體威懾戰,在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵;二是電磁擾阻戰,運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制資訊權,進而贏得作戰主動;三是網路破擊戰,運用軟打擊和硬摧毀等多種手段,破敵指揮網、情報網、通信網、後勤補給網,亂敵指揮保障;四是認知控擾。透過資訊攻擊、輿論攻擊、腦攻擊,在認知空間形成控制優勢;五是敏捷機動戰。快速調整兵力兵器部署,在即設戰場快速聚集能力,搶奪作戰先機;六是蜂群自主戰。廣泛運用「蜂群」、「狼群」、「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝;七是精確點殺戰。精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化;八是補給斷鏈戰。組織精銳力量,打敵後勤物資裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥;九是體系毀癱戰。綜合採取破網、鍛鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰系統功能。
1.整體威懾戰
整體威懾戰是指在體系聚優戰中積極組織靜態威力展示和威懾行動,力爭不戰或小戰而屈人之兵。孫子曰:「不戰而屈人之兵,善之善者也。」威懾和戰爭是軍事活動的兩種主要形式。而威懾,主要是透過展現力量或威脅使用強大實力,向潛在對手錶明決心意志,以嚇阻對手行動的行為。可以說,體系聚優戰中的整體威懾戰是實現不戰而「止」人之兵的重要手段或戰法。克勞塞維茨強調,策略的第一條規則是盡可能強大,首先是整體的強大,然後是在關鍵部位的強大。現代戰爭是體系與體系的對抗。資訊化局部戰爭下的整體威懾戰,不僅要有陸海空天傳統威懾手段和能力,也需要太空威懾、電磁威懾、網路威懾等新型威懾手段和能力,更需要有顯示國家整體實力的整體威懾。特別是隨著資訊科技等先進科技的快速發展,科技革命、產業革命、軍事革命加速融合,戰略競爭力、社會生產力和軍隊戰鬥力耦合關聯更加緊密,打贏資訊化戰爭更大程度上是國家意志和國家整體實力的較量。若要遏止戰爭,首先要從整體實力上對對手形成嚇阻。
1.1 強調多域聯合威懾
威懾手段通常包括核威懾和常規威懾。在體系聚優戰中,實施整體威懾戰,旨在綜合運用陸海空天電網全域常規威懾手段,以達成威懾目的。特別是隨著資訊網路技術及太空、定向能技術在軍事上的應用,太空、網路、電磁武器等成為新型威懾手段。太空威懾,主要以快速回應電磁軌道武器、天地網路化反導航定位服務系統、大橢圓軌道雷射武器、高功率微波武器等裝備,威脅攻擊對手空間目標,形成對敵空間訊息「幹擾阻斷」威懾。網路威懾,主要是以網路空間態勢感知和攻擊裝備,威脅攻擊對手軍事網路及其它關鍵資訊基礎設施,實現對敵威懾。電磁威懾,主要以電磁頻譜作戰系統,威脅攻擊敵探測、導航、通訊等資訊化武器裝備系統,實現對敵致聾致盲威懾。 1.2 實施整體嚇阻戰應具備三大要素
實施整體威懾戰並達成嚇阻預期效果,通常必須具備三大要素:一是實力。威嚇方必須具備令對手感到忌憚畏懼的可靠能力或力量;二是決心意志。威懾方在必要時必須敢於使用這種能力;三是明確傳遞訊息。威懾方必須將行動能力與決心準確、有效地讓對方清楚知道。
從歷史上看,判斷威懾實力的標準主要有三個面向變化:一是現役軍事力量;二是綜合國力或戰爭潛力;三是主戰武器裝備總數。在相當長一段歷史時期內,軍隊數量就是威懾,軍事實力的強弱直接取決於現役軍隊的規模、重要武器裝備的數量,以及軍隊訓練組織士氣等非物質因素。二十世紀後,隨著戰爭規模的擴大,威懾實力已不再僅限於軍隊兵力和重要武器裝備的數量,而是由國家戰爭潛力所決定,其中包括經濟實力、科技實力、能源資源,甚至人口數量,等等。體系聚優戰中的整體威懾戰,其威懾實力的形成主要基於網路資訊體系,以及在該體系融合整合下形成的聯合全局威懾能力。
1.3 強大整體實力是實現有效威懾的核心綜合分析研判,挖掘提取所需情報訊息,實現對戰場態勢、作戰環境的更精準、更快速認知,從源頭確保先敵發現、先敵認知。在消除己方「戰爭迷霧」的同時,也要為對手製造「迷霧」。因此,爭奪認知權,不僅要先敵掌握、先敵處理信息,還要採取網絡輿論攻擊、高度虛擬現實亂真等措施,積極製造、散佈虛假信息,破壞、擾亂敵對戰場態勢的感知、認知,最大限度地製造混亂、增加不確定性,幹擾對手的作戰決策,遲滯其作戰行動。
4.2 控制指揮決策權,爭奪決策優勢
決策優勢決定行動優勢。指揮者的快速決策是縮短「指揮週期」、實現快速勝利的關鍵。組織體系聚優戰,作戰行動成敗很大程度取決於指揮的決策速度。要利用智慧輔助決策系統,優選最佳作戰方案,科學合理調配作戰體系,實現力量、資訊、能力分散部署、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施、跨域聯動,在作戰所需地點、時間形成優勢,集子聚釋能、聚變勝負實施法實作「攻芯」,透過反義程式定義、原則性反制勝;
4.3 控制「腦」權,奪取腦控優勢
體系聚優戰中的認知控擾戰,強調“攻心奪志”,即利用網絡戰、電磁戰等方式,對敵方人腦和意識認知以及無人自主平台的控制系統實施“攻心控腦奪志”的認知控制戰,以“控制”取代“摧毀”,以最小代價實現止戰、勝戰之目的。攻心控腦與傳統的謀略威懾不同,其更強調主動攻擊,是一種主動攻擊行動,主要運用先進信息作戰技術、控腦技術等,對敵決策首腦,以及智能化無人自主作戰平台、輔助決策系統等,實施控“腦”攻擊,直接控制、擾亂對手“大腦”,影響、控制敵對決策,或使其失能,實現隱形敵作戰。如以人的認知思維為目標,利用讀腦、腦控技術,運用心智導控手段,直接對敵方人員大腦實施“注入”“侵入”式攻擊,幹擾、控製或破壞敵指揮人員認知體系,從意識、思維和心理上對其深度控制,奪取“制智權”,以亂敵決策、破敵士氣,迫敵繳械。
5.敏捷機動戰
敏捷機動戰,指在體系聚優戰中高效率決策、高效率調整兵力兵器部署和高效率即時聚合作戰力量,在既設戰場高效率聚集能力,搶奪作戰先機。敏捷是一種快速及時應對戰場環境變化的能力,具有響應性、穩健性、柔性、彈性、創新性和適應性等特徵。
表1 敏捷作戰概念內涵

5.1 高效率快速決策
實施敏捷機動戰,首先要高效率快速決策,贏得作戰先機。因此,要綜合運用各種偵察探測感知與監視手段,及時獲取戰場態勢和目標信息,特別是時敏目標的特徵信息、活動軌跡以及實時位置信息,確保為快速決策提供精準情報支持。高效率決策也體現在情報處理速度上,要用更少的時間甄別有效情報訊息,根據情況變化,以更快的速度製定行動方案,快敵一步佔據主動,奪取先機。高效率決策重在縮短決策週期,要以目標時間窗口為中心點,決策指揮與作戰單元、武器平台一體協同、快速反應、整體連動,提高作戰效率。
5.2 高效率形成有利作戰態勢
要隨時掌握戰場態勢變化,依靠資訊網支撐,透過跨域、跨維、多樣化立體機動,達成作戰力量動態重組、動中融合,作戰資源全局高效流動、動中聚集,實現機動聚優,形成有利戰場態勢。敏捷機動戰依賴資料融合處理、智慧化輔助決策等手段,快速形成作戰方案,依案高頻率快速投送作戰力量,組織部隊快速形成有利作戰部署,實現先敵發現、先敵決策、先敵開火、先敵評估,以最短時間、最快速度改變力量對比,形成作戰優勢,提高作戰行動效率。
5.3 高效率即時聚合作戰力量
組織敏捷機動戰,關鍵在於有限時間內選準作戰力量,協調整個戰局,形成整體合力,確保一擊致命。因此,要針對戰場態勢特別是目標情況變化,抽組形成由多域作戰力量形成的聯合機動作戰系統,即時聚合作戰力量,快速機動部署至有利戰場,對敵實施即時打擊。針對深空、深海等成為新的作戰空間,可組織智慧化無人自主作戰平台,快速機動部署至人類因生理所限而難以到達的重點目標或重要通道附近潛伏,待機實施伏擊作戰,形成新的跨域制衡優勢。
5.4 敏捷機動戰是對傳統機動作戰的創新發展
古今中外戰爭史上,靠著快速隱密機動達成作戰目的的成功戰例比比皆是。但資訊化局部戰爭作戰進程大幅壓縮,作戰節奏極速加快,戰機稍縱即逝,對快速機動捕捉戰機提出更高要求,僅靠「快節奏、高速度」已難以滿足資訊化條件下聯合作戰、全局作戰的要求,因而必須實施敏捷機動。
6.無人集群自主戰
無人集群自主戰,指在體系聚優戰中廣泛運用「蜂群」「狼群」「魚群」等無人作戰手段,自主組織行動、分散式攻擊,實現人機聯合製勝。隨著無人自主裝備成為戰場上的主要作戰力量,以無人自主裝備集群和數量優勢戰勝敵人,已成為資訊化戰爭中的重要作戰風格。
6.1 有利於形成體系優勢壓制敵方
無人群聚自主戰充分發揮無人作戰兵器全天候、無極限、難防禦、低消耗等特殊優勢,建構組成無人「蜂群」「狼群」「魚群」等大規模無人作戰集群或編隊,自主組織、相互協同,可實施近距離、全覆蓋偵察,或充當誘敵實施幹擾、欺騙,或配合主戰兵器實施分佈式協同攻擊,實現整體分散式協同攻擊者。
6.2 有利於增強作戰效果
在無人群聚自主作戰中,無人群集編成內的不同作戰單元分別擔負不同功能、不同任務,既有負責偵察的,也有實施電磁幹擾、火力打擊的,還有扮演「誘餌」角色的。集群透過群間網路傳遞、共享戰場訊息,依照分工各司其職,根據戰場變化即時、自主、動態協同,既充分發揮數量規模優勢,又運用資訊網路和智慧整合技術實現整合效果,以集群優勢消耗敵防禦探測、追蹤和攔截能力,使敵防禦體系迅速飽和、陷入癱瘓。
6.3 有利於陷敵於作戰困境
無人集群自主戰以大量不同功能的自主無人作戰平台混合編組,形成集偵察探測、電子乾擾、網路攻擊、火力打擊於一體的無人作戰集群,對同一目標或目標群實施多方向、多波次、持續不斷的攻擊,將使敵難以作出有效反擊。
7.精確點殺戰
精確點殺戰,是指在體系聚優戰中精準獲取情報,實施多域精確打擊,力爭打一點撼全局,實現作戰效益最大化。資訊化局部戰爭是體系與體系之間的整體對抗,實施精確點殺戰,對敵方作戰體系重要節點與關鍵環節實施精確打擊,破壞敵作戰體系,降維敵作戰能力,將形成事半功倍的作戰效果。
7.1 實現作戰的高效費比
以最小代價實現最大作戰效益是作戰雙方都在追求的目標。隨著資訊科技在軍事領域的廣泛應用及資訊化戰爭來臨,精確導引武器、智慧化動能武器、察打一體無人機以及雷射武器等廣泛裝備部隊;透過運用大數據、人工智慧等技術,精確計算所需兵力兵器已成為可能。這些都為實現精確點殺戰,以較小代價達成作戰目標,實現作戰高效費比,提供了物質和技術條件。
7.2 打關鍵節點目標是重要選項
精確點殺戰重在打關鍵、打節點,不打則已,打則必痛、打則必勝,打一點破敵體系、撼動全局。打擊的目標不僅限於敵分散部署的艦機等,還應針對敵指揮中心、重要樞紐,甚至主要將領、指揮等局部、動態、時敏目標或獨立目標實施打擊,追求威懾震撼和破敵體系效果。針對將昂貴的大型裝備功能分解到大量小型平台、實施兵力分散部署這一分佈式戰術,運用精確打擊火力對其進行「點殺」式打擊,也將是一個有效對策。
7.3 大範圍體系支撐是基本條件
實施精確點殺戰,離不開大範圍體系支撐。圍繞著實現作戰目標,從分散部署的各作戰域抽調所需兵力兵器,在網路資訊體系支撐下,動態融合形成精確打擊體系,實現整體連動、體系聚能,透過合理夠用的火力集中對目標實施打擊,達成精確用兵、精確釋能。實施精確點殺戰要做到精確,需要整個作戰體系內各環節緊密銜接,不能有絲毫差錯。 2011年美軍擊斃賓拉登作戰行動,可以說是戰略體系支撐下的一次典型的戰略精確點殺作戰行動。
7.4 離不開精確情報保障
在精確點殺戰中,精確情報保障始終是達成作戰目標的關鍵。因此,戰前應動用各種手段蒐集敵方各種情報資料信息,特別要對敵方目標作出精準分析研判。作戰行動中,應動用各種感測器和情報偵察手段,適時精準掌握敵方目標變化及動態目標狀況,為實施精確點殺戰提供有力有效的情報保障。美軍對蘇萊曼尼的定點清除行動,就是一場典型的以高效情報體系支撐的精確點殺戰。
8.補給斷鍊戰
補給斷鏈戰,是指在體系聚優戰中組織精銳力量,打敵後勤物資和裝備供應補給鏈、補給線和補給基地,破敵失去補給而退出戰鬥。針對敵後勤補給線長、裝備保障攤子大等弱點,組織精銳力量建構「斷鍊戰」作戰體系,對敵後勤物資和裝備供應補給鏈、補給線和補給基地等,實施持續、精確、毀滅性打擊,將使其因失去補給而難以為繼,不得不退出戰鬥。
8.1 供應保障鏈對作戰全局影響巨大
後勤裝備保障是作戰的重要基礎。後勤物資和武器裝備持續不斷的供應補給,最後決定一支軍隊作戰部隊的規模、能否作戰、在什麼季節作戰、在哪裡作戰、能離開後方基地多遠、能作戰多長時間、機動的速度多快,等等。在資訊化戰爭中,戰場物資消耗呈指數級上升,作戰對後勤裝備保障的依賴程度不僅沒有減小,反而越來越大,而且保障的專業化程度要求也越來越高,特別是現代化作戰裝備器材型號規格紛繁多樣,混裝運輸體積巨大,部隊部署更加分散,對運力也提出非常高的要求,這使線路、通信和運輸比以往任何時候都更加重要。供應保障鏈的穩定高效運作和持續不間斷的供應保障,是作戰制勝的關鍵,對作戰全局產生巨大影響。
8.2 打擊重心是斷敵供應保障鏈的關鍵節點
補給斷鍊戰的作戰重心是打擊敵方供應保障鏈的關鍵環節,透過斷鍊使其喪失持續保障能力。因此,組織補給斷鍊戰應主要以敵方地面鐵路公路運輸線、海上補給船隊、軍事徵用的商船和戰鬥支援艦,空中大中型運輸機,以及後方補給基地等作為打擊目標。例如打擊敵方海上供應保障鏈,斷敵燃料、彈藥、淡水、食物補給,將使敵航母戰鬥群失去持續作戰能力,進而影響一場戰役的勝負。
8.3 重在選準時機活用戰法
組織實施補給斷鍊戰,選擇有利打擊時機至關重要。補給斷鍊戰的打擊時機,應選擇敵補給機動時組織實施,以出其不意攻其不備的隱蔽戰法,對敵補給車輛、艦船和運輸機實施突然打擊,終止其補給行動。具體戰法通常有隱蔽伏擊戰,組織精幹力量埋伏在敵運輸工具必經路線和航線上,伺機實施隱密性突然打擊;隱形奇襲戰,使用潛艦、隱形戰機等隱蔽前出,對敵運輸目標實施打擊,以奇制勝;遠程精確補給
9.體系毀癱戰
體系毀癱戰,指在體系聚優戰中,綜合採取破網、斷鍊、打節點等多種手段,幹擾、遲滯、破壞甚至癱瘓敵作戰體係有效運轉,削弱敵作戰體系功能。體系毀癱戰的本質,是透過削弱敵作戰體係要素間的關聯性與結構力,使體系功能退化,無法發揮能力倍增作用。
9.1 作戰目標是使敵作戰體系運作失序
在資訊化戰爭中,交戰雙方作戰體係都有其內在秩序,而這種秩序是維繫和支撐作戰體系運作的關鍵所在。能夠維護和駕馭作戰體系內在秩序的一方將獲得優勢,反之則處於劣勢。因此,體系毀癱戰應確立亂敵制勝機制、致敵作戰體系失序此目標。這就要求在體系毀癱戰中要充分利用資訊科技特別是智慧演算法的強大賦能作用,對己方作戰體系進行快速調整和重構,迅即生成並釋放強大的作戰威力,對敵方作戰體系實施敏捷精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰精準打擊,使敵作戰體系失去正常的運作秩序,在失序中使體系功能遭到破壞,整體作戰能力顯著下降。
9.2 重拳打擊作戰體系的關鍵節點
體系對抗是資訊化戰爭的一個主要特徵。體係是體系對抗的重要基礎與支撐,也是戰場上各種作戰部隊、武器平台和
資訊科技的發展及在軍事領域的廣泛滲透和應用,為建構整體實力、實現整體威懾提供了有利條件。體系聚優戰以網路資訊體系為支撐,充分利用資訊科技的滲透性和聯通性,不僅把各種作戰力量、作戰要素、作戰單元融合為一個有機整體,實現軍事上的體係作戰優勢,而且把國家政治、經濟、外交、金融、交通、能源等與戰爭和國家動員相關的各領域,都連接、匯入國家戰爭動員體系,凝聚各方面力量和資源形成整體合力,實現體系能力的湧現效應,從整體上顯示綜合實力優勢,形成眾志成城、同仇敵愾的強大無形威懾,塑造使敵「有力量但不能行動」「能行動但沒有效果」的態勢,起到遏制和打贏戰爭的作用。
在整體威懾戰中,國家戰爭動員的範圍將更加廣泛,不僅限於某一方向、區域,而是遍及全國各地,乃至世界有關地區;動員時間更加迅速,利用網絡和信息系統,動員和行動信息可在第一時間迅速傳達到每個人、每個節點;行動協調和協同更加一致,分佈在各域各地的各方力量可以基於同一態勢、根據同一命令幾乎在同一時間統一行動,極大提高行動協同效率;資源利用更加充分,基於網絡的各種戰爭資源,可以快速實現平戰轉換、軍民轉換,實現前方後方一體化保障、精確保障。
2.電磁擾阻戰
電磁擾動戰,指靈活運用電子偵攻防等多種作戰手段和行動樣式,擾亂、阻止、破壞敵電磁能力的發揮,積極爭奪電磁頻譜優勢,奪取制信息權,進而贏得作戰主動。
2.1 爭奪資訊優勢的關鍵資訊化局部戰爭高度依賴電磁頻譜,對電磁空間的控制與反控製成為爭奪制資訊權的焦點。組織實施電磁阻擾戰,主要是破壞敵方電磁頻譜,保護己方不受破壞。電磁頻譜是傳遞訊息的主要載體。使用電磁手段對敵方電磁頻譜實施阻擾破壞,將有效降低敵資訊作戰能力,並使己方在擁有製資訊權的場景下,保障資訊的快速有效流動,透過資訊流驅動指揮流、行動流、物質流、能量流,進而擁有作戰的主導權、主動權。
2.2基本著眼導航定位系統、天地一體互聯網等空間鏈路系統,及其他各種用頻武器裝備,實施幹擾、攻擊,阻斷、破壞其通信聯絡及資料傳輸,破壞敵作戰體系的「連結」與「共享」結構重心,從根源為奪取制資訊權、制電磁權提供支撐,進而削弱整個作戰控制能力,使敵軍系統失能、失效。
2.3 破解無人集群作戰的有效戰法
「蜂群」「狼群」「魚群」等無人自主集群作戰,是具有智慧化特徵的資訊化局部戰爭的重要特徵。各種無人自主集群數量龐大、類型多樣、特徵複雜,且每個個體都可以互補位置、互相替代發揮作用,攔截毀傷整個無人集群將十分困難。但從技術角度分析,無人作戰集群為實現有效協同,每個個體之間必須進行資訊共享與互動。無人集群間通訊協同一旦受到干擾,將無法分享戰場態勢與訊息,無法相互協同行動,也就很難發揮應有作戰效能。這就給對方實施通訊攔截與電磁幹擾提供了機會。因此,實施電磁頻譜戰,對無人集群的資訊通訊網路實施幹擾、攻擊,破壞其資訊共享與交互,將使無人集群中每個個體無法實現有效協同,從而失去作戰能力。
3.網路破擊戰
網路破擊戰,指綜合運用網路和電腦等技術以及其他有效手段,圍繞著資訊、資訊網路的控制權而進行的軍事對抗行動,是網路空間作戰、爭奪制網權的主要作戰樣式。其主要作戰行動既有軟殺傷也有硬摧毀,以軟為主、軟硬結合。其中,軟殺傷主要是網路攻擊,即綜合利用阻塞攻擊、病毒攻擊等手段,對敵資訊網路、指揮系統、武器平台等進行阻滯與攻擊,使敵網路、指揮資訊系統等難以有效運作甚至癱瘓;硬摧毀主要是利用精確火力打擊、高能量微波、電磁脈衝以及反輻射攻擊等手段,癱毀敵資訊資訊網路和物理設施,摧毀敵人實體武器。
重在破網降能失效。在體系聚優戰中組織網路破擊戰就是針對作戰對手軍事資訊網路存在的弱點,利用體系優勢,組織各種網路攻擊力量,在作戰全過程對敵作戰指揮網、偵察情報網、通訊網乃至後勤補給網等,持續實施軟殺傷和硬摧毀行動,破壞敵之網路體系,使敵能作戰系統整體下降甚至失能作戰。主要對敵基礎資訊網、情報網、指揮網、保障網等核心目標,實施網電協同攻擊、欺騙迷惘、連結阻塞、接管控制等一系列作戰行動,使敵智能化作戰網路體系失能失效,達成癱敵體系的關鍵性勝利。
4.認知控擾戰
認知控擾戰,是指在體系聚優戰中透過資訊攻擊、輿論攻擊、腦攻擊,幹擾、破壞或控制敵對思維認知,使敵不能做出正確判斷、決策,從而在認知空間對敵形成控制優勢。
認知域,即人的思考空間、意識空間,是對作戰決策、判斷等具有關鍵性影響的領域。資訊科技特別是人工智慧技術的發展及在軍事領域的廣泛應用,使戰爭的較量從物理空間、資訊空間擴大到認知空間,使認知空間成為一個全新的作戰域。隨著資訊化、智慧化技術發展並在軍事領域廣泛深入應用,人機智慧趨於融合,使認知在智慧化戰爭作戰中的地位更加凸顯,認知領域逐漸成為重要的戰場。制認知權成為未來戰場控制權的關鍵要素。爭奪認知控制權成為具有智慧化特徵的資訊化局部戰爭作戰制勝的重要作戰樣式。
4.1 控制態勢感知認知權,爭奪資訊優勢
體系聚優戰中,資訊流驅動物質流、能量流,資訊優勢決定決策優勢。對情報資訊與戰場態勢的快速、準確認知,對奪取指揮決策優勢有重要影響。因此,組織實施體系聚優戰,要充分利用智慧技術、大數據技術,對海量情報資訊資料進行武器系統聯為一體,有效發揮作戰效能的關鍵。體系能否保持健壯、順暢運轉,對取得戰爭和戰役勝利具有決定性影響。體系毀癱戰中,關鍵在於著眼敵方陸海空天電網整合作戰體系,破網、斷鍊、打節點,透過打關鍵節點目標,使敵方作戰體系運作機理失序,甚至遭到重創或毀癱。因此,體系毀癱戰的基本指向是選敵作戰體系的關鍵單元、關鍵節點、關鍵要素實施打擊,擊其一點、毀其一片、癱其整體,達成克敵制勝的目的。
9.3 對敵作戰體系實施軟性打擊
組織實施體系破擊戰硬摧毀時,同步組織電子戰、網路戰、心理戰、輿論戰等軟殺傷作戰行動,對敵作戰體系的資訊域、認知域實施軟打擊。電子戰,使用電子戰力量對敵實施強電磁幹擾,使其信息失靈,陷入戰爭迷霧之中;網絡戰,使用網絡進攻力量對敵網絡信息體系實施攻擊,使敵指揮通信系統和計算機網絡受到嚴重破壞,使其指揮失靈,陷入信息孤島乃至戰爭孤島;心理戰和作戰論戰,使用心理戰、輿論手段,對敵對認知,打擊其戰爭論戰,使用心理戰、輿論手段,對敵對心理打擊行為論組織民生戰,打擊對手的重大國計民生設施,同樣可以對敵作戰體係起到「釜底抽薪」作用。 1999年科索沃戰爭中,美軍沒有打擊南聯盟軍隊,而是打擊其戰爭潛力目標體系,使南聯盟軍民失去戰鬥意志走向失敗。

中國原創軍事資源:http://www.81it.com/2022/0901/13716888.html

Future Proofing China’s National Defense & Military An Important Aspect of Chinese-style Modernization

面向未來的中國國防和軍隊是中國式現代化的重要面向

現代英語:

Soldiers are a major event for the country. In the great journey of “building a powerful country and rejuvenating the nation, and against the background of the accelerated evolution of major changes unseen in the world in a century, building and consolidating national defense and a strong people’s army are directly related to the future and destiny of the country and the nation”. The Third Plenary Session of the 20th Central Committee of the Communist Party of China pointed out that “national defense and military modernization are important components of Chinese-style modernization”, which fully reflects the great importance that the Party Central Committee with Comrade Xi Jinping as the core attaches to national defense and military construction, and provides guidance for national defense and military modernization on the new journey. Modernization points out the direction.

  The modernization of the national defense and military is the security guarantee and strategic support for Chinese-style modernization

  ”If you fall behind, you will be beaten. Only when the army is strong can the country be safe”. Without a strong army, there can be no strong state. After the Opium War in 1840, modern China was repeatedly defeated in its battles with Western powers. The vast country gradually became a semi-colonial and semi-feudal society, with the country humiliated, the people in trouble, and civilization in dust. History has inspired us that the Chinese nation’s emergence from suffering and the liberation of the Chinese people depend on a heroic people’s army; to comprehensively promote the great cause of building a powerful country and national rejuvenation with Chinese-style modernization, we must place national defense and military modernization as a barrier to national security, plan and deploy in strategic positions based on career development, and accelerate the construction and consolidation of national defense and a strong people’s army.

  The modernization of the national defense and military is closely linked and internally unified with Chinese-style modernization. Without the modernization of national defense and the military, there would be no Chinese-style modernization. Comrade Mao Zedong once profoundly pointed out “the original requirements for building socialism were industrial modernization, agricultural modernization, scientific and cultural modernization, and now we must add national defense modernization”; Comrade Deng Xiaoping also emphasized “four modernizations, one of which is national defense modernization”, these all reflect the great importance our party attaches to national defense and military construction.

  Since the 18th National Congress of the Communist Party of China, President Xi has always adhered to the integrated operation of strengthening the country and the military, put national defense and military modernization in the chess game of Chinese-style modernization, and opened up the road to strengthening the military with Chinese characteristics, forming a new strategy for national defense and military modernization by 2027, 2035, and the middle of this century, a new “three-step” strategy for national defense and military modernization that connects near, medium and long-term goals Created a new situation in the cause of strengthening the military. Guided by the party’s goal of strengthening the military in the new era, we will comprehensively implement the strategy of reforming and strengthening the military, promote the reform of the leadership and command system, the reform of scale structure and force organization, and the reform of military policies and systems. Our military’s organizational structure will achieve historic changes, and the force system will achieve revolutionary changes. Reshaping, the basic framework of the socialist military policy system with Chinese characteristics has been constructed and formed. Our military system has been completely new, its structure has been completely new, its pattern has been completely new, and its appearance has been completely new It has laid a solid foundation for the modernization of national defence and the army.

  Military means, as a means of guaranteeing the realization of great dreams, can only stop a war if it can be fought. The current and future periods are critical periods for comprehensively promoting the great cause of building a powerful country and rejuvenating the nation through Chinese-style modernization, and will inevitably encounter various risks, challenges and even turbulent waves. We must comprehensively modernize our national defense and military, build the People’s Army into a world-class military, effectively guarantee Chinese-style modernization, and safeguard national sovereignty, security, and development interests.

   Comprehensive and accurate grasp of the scientific connotation of national defense and military modernization

  Since the 18th National Congress of the Communist Party of China, President Xi has issued a series of important expositions around “Chinese-style modernization”, summarizing the Chinese characteristics, essential requirements and major principles for the formation of Chinese-style modernization, building a theoretical system for Chinese-style modernization, and promoting the new era and new journey. Chinese-style modernization provides scientific guidance and also carries out strategic design and scientific deployment for national defense and military modernization.

  The most fundamental thing about modernizing the national defense and military is to uphold the absolute leadership of the party over the military. The leadership of the Party is the fundamental guarantee of Chinese-style modernization, which determines the fundamental nature of Chinese-style modernization, and it must also determine the fundamental nature of national defense and military modernization. To promote the modernization of national defense and the military on the new journey, we must fully implement a series of fundamental principles and systems for the party to lead the people’s army, comprehensively and thoroughly implement the chairman’s responsibility system of the Military Commission, and effectively unify thoughts and actions into the decisions and arrangements of the Party Central Committee and President Xi; Adhere to the party’s management of cadres and talents, and highlight political standards and combat capabilities Ensure that the barrel of the gun is always in the hands of those who are loyal and reliable to the party; improve the comprehensive and strict governance of the party system, enhance the political and organizational functions of party organizations at all levels, and integrate the party’s leadership throughout the entire process of continuing to deepen national defense and military reforms in all aspects.

  To modernize national defense and the military is to modernize military doctrine, military organization, military personnel, and weapons and equipment. This reflects the inherent requirements for the construction of military forces resulting from changes in the concept of victory in modern warfare, elements of victory and methods of victory, and clarifies the main signs of the basic realization of national defence and military modernization. To realize the modernization of military theory is to keep pace with the times, innovate war and strategic guidance, and form a military theoretical system that is contemporary, leading, and unique; to realize the modernization of organizational form is to deepen the reform of national defense and the military, and the military force structure layout is scientific and reasonable, strategic deterrence capabilities are consolidated and improved, new areas and new quality combat forces continue to grow, and elite operations, system support, and joint victory have become the basic application models; To realize the modernization of military personnel is to deeply implement the strategy of strengthening the military with talents in the new era, promote the comprehensive transformation and upgrading of military personnel’s capabilities, structural layout, and development management, and forge high-quality, professional new military talents with both ability and political integrity; to realize the modernization of weapons and equipment, It is necessary to focus on strengthening national defense scientific and technological innovation and accelerating the development of strategic, cutting-edge and disruptive technologies Accelerate the upgrading of weapons and equipment and the development of intelligent weapons and equipment.

  For the modernization of national defence and the military, we must adhere to the integrated development of mechanization, informatization and intelligence. The military conflicts and local wars that have taken place in recent years have shown that new qualitative combat capabilities generated based on intelligent combat systems are increasingly becoming core military capabilities. Based on mechanization, dominated by informatization, and oriented by intelligence, the three superimpose, penetrate, and support each other, jointly giving rise to new forms of warfare and methods of warfare. Only by accelerating the integrated development of mechanization, informatization and intelligence and keeping up with the new military revolutionary trends in the world can we seize the opportunity and take the initiative in seizing the commanding heights of the military struggle.

  The modernization of national defence and the army is a guarantee of security for insisting on the path of peaceful development. Since ancient times, soldiers have not been warlike. Chinese-style modernization is modernization on the path of peaceful development. Building a consolidated national defense and a strong military commensurate with international status and national security and development interests is a strategic task of China’s socialist modernization drive and an insistence on taking the path of peaceful development. Safety guarantee is an inevitable choice for summarizing historical experience. China has always pursued a defensive defence policy and adhered to the strategic idea of active defence, and no matter how far it develops, China will never seek hegemony or engage in expansion. To promote the modernization of national defense and the military on the “new journey”, we must faithfully implement the concept of a community with a shared future for mankind, resolutely oppose all forms of hegemony and bullying, and contribute China’s strength to building a beautiful world of lasting peace and universal security.

   Advancing the modernization of national defence and the military at a new historical starting point

  The Third Plenary Session of the 20th Central Committee of the Communist Party of China included “continuous deepening of national defense and military reforms into the overall plan for further comprehensive deepening of reforms, and made a series of major strategic arrangements for improving the leadership and management system and mechanism of the people’s army, deepening the reform of the joint operations system, and deepening cross-military and civilian reforms”. On the new journey, we must deeply understand and grasp the themes, major principles, major measures, and fundamental guarantees for further comprehensively deepening reforms, resolutely implement the new “three-step” strategy for national defense and military modernization, and accelerate the modernization of military theory, military organizational form, and military personnel. Modernize and modernize weapons and equipment, and lead the modernization of national defense and the military to move forward with better strategies, higher efficiency, and faster speed.

  Strengthening the Party’s theoretical and scientific leadership in military guidance. Our party insists on combining the basic principles of Marxism with the practice of building the people’s army, absorbing the essence of China’s excellent traditional military culture, and constantly exploring new realms in the development of contemporary Chinese Marxist military theory and military practice. As an important part of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, Xi Jinping Thought on Strengthening the Military has achieved a new leap forward in the Sinicization and modernization of Marxist military theory. It is the fundamental guiding ideology of our party building and military governance in the new era. We must unremittingly arm our minds with Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era, further firmly establish the guiding position of Xi Jinping Thought on Strengthening the Military in national defense and military construction, and build and consolidate national defense and a strong people’s army under the guidance of Xi Jinping Thought on Strengthening the Military. Take new and greater steps on the road to strengthening the military with Chinese characteristics.

  Efforts should be made to make the main responsibility and business of war preparation more solid and effective. The People’s Army is an armed group that performs the party’s political tasks. It must be both politically strong and capable. In the final analysis, this ability can win wars. To accelerate the modernization of national defense and the military, we must firmly grasp the fundamental direction of winning wars, establish the only fundamental standard of combat effectiveness, focus all our energy on fighting wars, and work hard on fighting wars. Conscientiously implement the military strategic policy for the new era, operate war preparation and cessation, deterrence and actual combat, war operations and the use of military forces in peacetime as a whole, innovate strategies, tactics and tactics, effectively shape the situation, manage crises, contain wars, and win wars. Adhere to the principle of “training troops as they fight, and comprehensively improve the actual combat level of military training and the ability to perform missions and tasks”.

  Promote high-quality development of national defense and military construction through “reform and innovation”. Reform is a key move that will determine the growth of our army and its future. On the new journey, we must put innovation at the core of the overall military construction and development, transform development concepts, innovate development models, enhance development momentum, and promote the transformation of national defense and military modernization from quantitative growth to qualitative improvement. Focus on integrating national defense and military construction into the national economic and social development system on a wider scale, at a higher level, and to a deeper extent, continuously improve the quality and efficiency of national defense and military modernization, promote the simultaneous improvement of national defense strength and economic strength, and consolidate and improve the integration National strategic system and capabilities, and constantly write a new chapter of strengthening the country and the military.

現代國語:

時間:2024年11月15日 08:20 來源:解放軍報
兵者,國之大事。在強國建設、民族復興偉大征程中,在世界百年未有之大變局加速演進的背景下,建構鞏固國防和強大人民軍隊直接關係國家和民族的前途命運。黨的二十屆三中全會指出,“國防和軍隊現代化是中國式現代化的重要組成部分”,充分體現了以習近平同志為核心的黨中央對國防和軍隊建設的高度重視,為新征程上國防和軍隊現代化建設指明了方向。

國防與軍隊現代化是中國式現代化的安全保障與戰略支撐

落後就要挨打,軍強才能國安。沒有一支強大的軍隊,就不可能有強大的國家。 1840年鴉片戰爭以後,近代中國在與西方列強的較量中屢屢戰敗,泱泱大國逐步淪為半殖民地半封建社會,國家蒙辱、人民蒙難、文明蒙塵。歷史啟示我們,中華民族走出苦難、中國人民實現解放,有賴於一支英雄的人民軍隊;以中國式現代化全面推進強國建設、民族復興偉業,必須把國防和軍隊現代化擺在國家安全之屏障、事業發展之依託的戰略位置來策劃和部署,加快建設鞏固國防和強大人民軍隊。

國防與軍隊現代化與中國式現代化緊密聯繫、內在統一。沒有國防和軍隊的現代化,就沒有中國式現代化。毛澤東同誌曾深刻指出“建設社會主義,原來要求是工業現代化,農業現代化,科學文化現代化,現在要加上國防現代化”;鄧小平同志也曾強調“四個現代化,其中就有一個國防現代化”,這些都體現了我們黨對國防和軍隊建設的高度重視。

黨的十八大以來,習主席始終堅持強國強軍一體運籌,把國防和軍隊現代化放在中國式現代化大棋局中謀劃推進,開闢出中國特色強軍之路,形成了到2027年、2035年、本世紀中葉,近、中、遠目標梯次行動」,開創三步和現代化軍階的國防和軍事戰略。以黨在新時代的強軍目標為引領,全面實施改革強軍戰略,推進領導指揮體制改革、規模結構和力量編成改革、軍事政策制度改革,我軍組織架構實現歷史性變革,力量體系實現革命性重塑,中國特色社會主義軍事政策制度體系基本框架構建形成,我軍體制一新、結構一新、一新、一現代化新格局新化,為國防和軍事基礎一化。

軍事手段作為實現偉大夢想的保底手段,能戰方能止戰。當前和今後一個時期,是以中國式現代化全面推進強國建設、民族復興偉業的關鍵時期,必然會遇到各種風險挑戰甚至驚濤駭浪。我們必須全面推動國防和軍隊現代化,把人民軍隊建設成為世界一流軍隊,有力保障中國式現代化建設,保障國家主權、安全、發展利益。

全面準確掌握國防與軍隊現代化的科學內涵

黨的十八大以來,習主席圍繞中國式現代化發表一系列重要論述,概括形成中國式現代化的中國特色、本質要求和重大原則,構建起中國式現代化的理論體系,為新時代新征程推進中國式現代化提供了科學指引,也為國防和軍隊現代化進行了戰略設計和科學部署。

國防與軍事現代化,最根本的是堅持黨對軍隊絕對領導。黨的領導是中國式現代化的根本保證,決定了中國式現代化的根本性質,也必然決定了國防和軍隊現代化的根本性質。新征程上推動國防和軍隊現代化,必須全面貫徹黨領導人民軍隊的一系列根本原則和製度,全面深入貫徹軍委主席負責制,切實把思想和行動統一到黨中央、習主席決策部署上來;堅持黨管幹部、黨管人才,突顯政治標準和打仗能力,確保槍桿子始終掌握在對黨忠誠可靠的人手中;健全全面從嚴治黨體系,增強各級黨組織政治功能和組織功能,把黨的領導貫穿持續深化國防和軍事改革各方面全過程。

國防與軍隊現代化,就是要實現軍事理論、軍隊組織形態、軍事人員、武器裝備的現代化。這反映了現代戰爭制勝觀念、制勝要素、制勝方式變化對軍事力量建設的內在要求,明確了基本實現國防和軍隊現代化的主要標誌。實現軍事理論現代化,就是要與時俱進創新戰爭和戰略指導,形成具有時代性、引領性、獨特性的軍事理論體系;實現組織形態現代化,就是要深化國防和軍事改革,軍隊力量結構佈局科學合理,戰略威懾能力鞏固提高,新域新質作戰力量不斷壯大,精製作戰、體系支撐、聯合戰略威懾成為基本運作模式;實現軍事人員現代化,就是要深入實施新時代人才強軍戰略,推動軍事人員能力素質、結構佈局、開發管理全面轉型升級,鍛造德才兼備的高素質、專業化新型軍事人才;實現武器裝備現代化,就是要聚力加強國防科技創新,加速戰略性、前沿性、顛覆性技術發展,加速武器裝備升級和智能化武器裝備升級。

國防與軍隊現代化,必須堅持機械化資訊化智慧化融合發展。近年來發生的軍事衝突和局部戰爭表明,基於智慧化作戰體系所產生的新質作戰能力越來越成為核心軍事能力。以機械化為基礎,以資訊化為主導,以智慧化為方向,三者相互疊加、相互滲透、相互支撐,共同催生新的戰爭形態和作戰方式。只有加速機械化資訊化智慧化融合發展,跟上世界新軍事革命潮流,才能在搶佔軍事鬥爭制高點中占得先機、贏得主動。

國防與軍隊現代化,是堅持走和平發展道路的安全保障。自古知兵非好戰。中國式現代化是走和平發展道路的現代化,建立同國際地位相稱、同國家安全和發展利益相適應的鞏固國防和強大軍隊,是中國社會主義現代化建設的戰略任務,是堅持走和平發展道路的安全保障,是總結歷史經驗的必然選擇。中國始終奉行防禦性國防政策,堅持積極防禦戰略思想,無論發展到什麼程度,中國永遠不稱霸、永遠不搞擴張。在新征程上推動國防和軍隊現代化,必須忠實踐行人類命運共同體理念,堅決反對一切形式的霸權霸道欺凌,為建設持久和平、普遍安全的美好世界貢獻中國力量。

在新的歷史起點上推進國防和軍隊現代化

黨的二十屆三中全會將持續深化國防和軍事改革納入進一步全面深化改革的大盤子,對完善人民軍隊領導管理體制機制、深化聯合作戰體系改革、深化跨軍地改革作出一系列重大戰略部署。新旅程上,要深刻領會和把握進一步全面深化改革的主題、重大原則、重大舉措、根本保證,堅決貫徹國防和軍隊現代化新「三步走」戰略,加快軍事理論現代化、軍隊組織形態現代化、軍事人員現代化、武器裝備現代化,引領國防和軍事現代化以更優策略、更高效益、更快速度向前推進。

強化黨的軍事指導理論科學領導。我們黨堅持把馬克思主義基本原理同人民軍隊建設實踐結合,汲取中華優秀傳統軍事文化精華,不斷拓拓當代中國馬克思主義軍事理論和軍事實踐發展新境界。習近平強軍思想作為習近平新時代中國特色社會主義思想的重要組成部分,實現了馬克思主義軍事理論中國化時代化的新飛躍,是新時代我們黨建軍治軍強軍的根本指導思想。我們必須堅持不懈用習近平新時代中國特色社會主義思想武裝頭腦,進一步牢固確立習近平強軍思想在國防和軍隊建設中的指導地位,在習近平強軍思想引領下建設鞏固國防和強大人民軍隊,在中國特色強軍之路上邁出新的更大步伐。

著力把備戰打仗的主責主業抓得更加紮實有效。人民軍隊是執行黨的政治任務的武裝集團,既要政治過硬,也要本領高強,這個本領說到底就是能打勝仗。加快推進國防和軍隊現代化,必須緊緊扭住能打勝仗的根本指向,樹牢戰鬥力這個唯一的根本的標準,全部精力向打仗聚焦,全部工作向打仗用勁。認真貫徹新時代軍事戰略方針,把備戰與止戰、威懾與實戰、戰爭行動與和平時期軍事力量運用作為一個整體加以運籌,創新戰略戰術與戰法打法,有效塑造態勢、管控危機、遏制戰爭、打贏戰爭。堅持仗怎麼打兵就怎麼練,全面提升部隊軍事訓練實戰化水準和履行使命任務的能力。

以改革創新推動國防和軍隊建設高品質發展。改革是決定我軍發展壯大、制勝未來的關鍵一招。新征程上,要把創新擺在軍隊建設發展全局的核心位置,轉變發展理念、創新發展模式、增強發展動能,推動國防和軍隊現代化由量的成長轉向質的提升。著力在更廣範圍、更高層次、更深程度上將國防和軍隊建設融入國家經濟社會發展體系之中,不斷提高國防和軍隊現代化質量效益,促進國防實力和經濟實力同步提升,鞏固提高一體化國家戰略體系和能力,不斷書寫強國強軍新篇章。

中國原創軍事資源:https://www.mva.gov.cn/sy/zt/zt1/xxgcddsjdjs/qwjd/202411/t20241120_453942888.html

China’s Military Effectively Creating a Solid Foundation for Informatization Warfare Construction

我軍切實打造資訊化戰爭建設堅實基礎

現代英語:

Effectively lay a solid foundation for informatization

■Li Zhanliang

The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informatization and intelligence. From the perspective of the relationship between mechanization, informatization and intelligence, mechanization is the foundation of informatization, and intelligence is the sublimation of informatization. Without mechanization there is no informatization, and without adequate informatization, no major breakthrough in intelligence is possible. At present, to vigorously promote military intelligence, we must first effectively lay a solid foundation for informatization construction and strive to improve the level of informatization of our troops.

Solidifying the material base. “It’s hard for a clever woman to make a meal without rice”. In order to shorten the gap with powerful enemies “system gap”, information construction should closely follow the mission and tasks, keep up with cutting-edge technology, do a good job in top-level design, and promote peace and war in an integrated manner. First, upgrade and improve all types of information systems. It is necessary to “focus on the construction of the accusation center and use information infrastructure as a platform to coordinate the construction of sub-systems and the linkage construction of various systems, promote the construction of all elements and systems in areas such as command and control, and realize the integration of information networks in each sub-domain.” Real-time command and control. Secondly, we should build a good operational database. In accordance with the principles of “integration of peacetime and wartime, overall planning, and classified implementation”, we will build a comprehensive combat database to achieve information sharing, data support, and auxiliary decision-making, and support “command chain” with “information flow”. Again, a preset backup mobile command post. We should actively draw on the useful practices of foreign military forces and vigorously strengthen civil defence projects, so as to form a mobile command capability with a multi-point layout, complementary movements and static forces, and rapid configuration.

Build a “strong team”. To win local information wars with intelligent characteristics, building a strong information force is an important guarantee. On the whole, efforts should be made to train four types of talents: first, information command talents. Frontline mid – and senior-level commanders should study information and data like troops, the construction of information systems like battle breakthroughs, and the use of electromagnetic spectrum like ammunition performance. Second, information warfare talent. Cultivate a group of intelligent staff officers, operational planners, cognitive operations and other talents who are competent in information-based operations. Third, information security talents. With the “information assurance department and information assurance operation and maintenance professional technical team personnel” as the main targets, we will continue to increase professional training and improve network management, system use, inspection and maintenance capabilities. Fourthly, information research and development talents. Adopt methods such as “invite in, go out, etc., let go of burdens, and hand in tasks, cultivate a group of expert technical talents with strong system research and development capabilities, establish an information-based high-end talent mobile station, and form “not for me, but for me”” Use a virtuous cycle.

Change command philosophy. Modern warfare is about system, and joint combat command is a key part of it. In order to respond to real threats and challenges, it is necessary to establish a new concept of command that is compatible with future wars. First, the establishment of a solid integrated command concept. Overcoming the narrow concept of command of a single service and arms, comprehensively coordinating multi-dimensional battlefield operations such as land, sea, air, space, electricity, and networks, and integrating various combat elements to effectively improve the combat effectiveness of overall victory and joint victory. Second, establish a solid digital command concept. Transform from “extensive to precise command”, concretize and refine mission distinction, force use, time and space division, goal determination, etc., standardize the command procedures, command methods, command content and other processes of joint combat forces, and standardize reconnaissance intelligence, weapons The platform, command and control and other networked and real-time operations shorten the command process and improve the command timeliness. Third, we need to establish a solid and intelligent command concept. Actively explore the systematic application of artificial intelligence technology, accelerate the development and application of new technologies such as intelligent decision-making, digital twins, big data, and cloud computing, improve the level of complex information processing on the battlefield, and enable commanders to control combat units and various types of weapons with the support of intelligent cloud brains. Task-based command of the platform.

Advancing innovative practices. In order to adapt to changes in science and technology, changes in war, and changes in opponents, we should speed up the construction of “three systems” to win the information war. First, the system of innovative tactics. In-depth study of the real strategies of preventing enemy information attacks, resisting enemy information interference, and counterattacking enemy information in the case of all-round information strikes and firepower destruction by powerful enemy opponents, and strive to achieve precise enemy control. Secondly, the system of innovative training. Focusing on “strong enemy opponents and combat tasks, set up an information combat environment, conduct in-depth research and training on command coordination, tactical application, system construction, comprehensive support and other topics, and promote actual combat deployment and application”. Innovation management systems again. Adhere to the integration of peacetime and wartime management and the combination of virtual and real management, establish a demand-driven mechanism, a plan-led mechanism, and an inspection and evaluation mechanism led by war, create an independent and controllable industrial chain, supply chain, and guarantee chain, and ensure “peace management ”“wartime Use” seamless connection to help continuously improve information combat capabilities.

(Author’s unit: Central Theater Command)

現代國語:

切實打牢資訊化建設基礎

■李佔良

黨的二十大報告強調,堅持機械化資訊化智慧化融合發展。從機械化、資訊化和智慧化之間的關係來看,機械化是資訊化的基礎,智能化是資訊化的昇華。沒有機械化就沒有資訊化,沒有充分的資訊化,智慧化也不可能有重大突破。目前,大力推動軍事智慧化,首先必須切實打牢資訊化建設基礎,著力提升部隊資訊化水準。

夯實物質基礎。巧婦難為無米之炊。為縮短與強敵的“體系差”,資訊化建設應緊貼使命任務,緊跟前沿科技,搞好頂層設計,平戰一體推進。首先,升級完善各類資訊系統。要以指控中心建設為重點,以資訊基礎設施為平台,統籌抓好分系統建設及諸系統聯動建設,全要素、成體系推進指揮控制等領域建設,實現各分域資訊網路一體化、指揮控制即時化。其次,建好用好作戰資料庫。依照「平戰一體、統籌規劃、分類實施」的原則,建好作戰綜合資料庫,實現資訊共享、資料支援、輔助決策,以「資訊流」支援「指揮鏈」。再次,預置備份機動指揮所。積極借鏡外軍有益做法,大力加強人防工程,形成多點佈局、動靜互補、快速配置的機動指揮能力。

建強力量隊伍。打贏具有智慧化特徵的資訊化局部戰爭,建強資訊力量隊伍是重要保證。綜合來看,應著力培養四類人才:一是資訊指揮人才。一線中高級指揮員,應該像研究用兵一樣研究資訊與數據,像研究戰役突破口一樣研究資訊系統的構建,像研究彈藥性能一樣研究電磁頻譜的使用。二是資訊作戰人才。培養一批勝任資訊化作戰的智慧參謀、作戰規劃、認知作戰等人才。三是資訊保障人才。以資訊保障部門及資訊保障維運專業技術分隊人員為主要對象,持續加強專業訓練力度,提升網路管理、系統使用、偵測維修等能力。四是資訊研發人才。採取請進來、走出去等方式,放手壓擔子、交任務,培養一批具有較強系統研發能力的專家型技術人才,建立資訊化高端人才流動站,形成「不為我有、但為我用」的良性循環。

變革指揮理念。現代戰爭拼的是體系,聯合作戰指揮是其中關鍵一環。為因應現實威脅挑戰,需確立與未來戰爭相適應的新型指揮觀。一是樹牢一體化指揮觀。克服狹隘的單一軍兵種指揮觀,全面協調陸、海、空、天、電、網等多維戰場行動,綜合整合各種作戰要素,實際提升整體制勝、聯合製勝的作戰效能。二是樹牢數位化指揮觀。由粗放式向精確化指揮轉變,將任務區分、力量使用、時空劃分、目標確定等具體化精細化,將聯合作戰力量的指揮程序、指揮方法、指揮內容等流程化標準化,將偵察情報、武器平台、指揮控制等網絡化實時化,縮短指揮流程,提高指揮時效。三是樹牢智能化指揮觀。積極探索人工智慧技術成體系應用,加速智慧決策、數位孿生、大數據、雲端運算等新型技術開發運用,提升戰場複雜資訊處理水平,實現指揮者在智慧雲腦支撐下對作戰分隊及各類武器平台的任務式指揮。

推進創新實踐。為適應科技之變、戰爭之變、對手之變,應加速建構打贏資訊化戰爭的「三個體系」。首先是創新戰法體系。在深入研討強敵對手全方位資訊打擊與火力硬破壞的情況下,防敵資訊攻擊、抗敵訊息幹擾、對敵訊息反擊的真招實策,努力實現精準制敵。其次是創新訓法體系。圍繞強敵對手及作戰任務,設置資訊作戰環境,深度研練指揮協同、戰法運用、體系建構、綜合保障等課題,推動實戰化部署運用。再次是創新管理體系。堅持平戰一體管、虛實結合管,建立以戰領建的需求牽引機制、計畫主導機制、檢驗評估機制,打造自主可控的產業鏈、供給鏈、保障鏈,確保「平時管」「戰時用」無縫銜接,助力資訊化作戰能力不斷提升。

(作者單位:中部戰區)

中國原創軍事資源:http://www.mod.gov.cn/gfbw/jmsd/4926263888.html

Chinese Military Research on U.S. Air Force Invisible Battlefield Armament Expansion – Cyber Warfare

中國軍方對美空軍隱形戰場裝備擴充-網路戰的研究

現代英語:

Recently, the U.S. Air Force released a new version of the Cyber ​​Warfare Doctrine (hereinafter referred to as the Doctrine). The U.S. Air Force has thus become the first military service to publish a new version of the Doctrine after the release of a series of strategic documents by the Cyberspace Command. The U.S. military’s arms expansion in the invisible battlefield is being fully rolled out.

Seeking cyber warfare advantage

The new version of the directive is the second time that the US Air Force has issued a programmatic document in the field of cyberspace, following the first version in 2010 and the revised version in 2011. The directive is mainly divided into three parts, including the threats and challenges faced by the US Air Force in cyberspace, the main functions of cyber warfare forces, and the force structure.

The new version of the order points out that the threats currently faced by the US Air Force are divided into “malicious acts that intentionally damage the Air Force’s network information system” and “unintentional but damaging network activities that cause impacts”, and proposes four challenges in the medium and long term, namely, the commercial technology and outsourced products currently in use have security vulnerabilities, attacks launched in cyberspace are difficult to trace, network connections have security risks of being invaded, and network infrastructure has weaknesses. Foreign media said that the US Air Force deliberately exaggerated the inherent security risks of the network in order to provide an excuse for strengthening the construction of cyber warfare forces and conducting military operations in this field.

The new version of the regulations further clarifies the main functions of the US Air Force’s cyber warfare forces. The new version of the regulations states that the US Air Force’s cyber warfare forces should not only support the US Air Force in conducting cyber warfare offensive and defensive operations in wartime or quasi-wartime states to gain competitive and operational advantages in this field, but also play a role in peacetime non-armed conflict military activities.

The U.S. Air Force’s cyber warfare style is mainly cyberspace offensive and defensive operations and the operation and maintenance of the U.S. Department of Defense information network. Its main combat force is the 16th Air Force. The unit is formed by the merger of the 24th Air Force responsible for cyberspace and the 25th Air Force responsible for global intelligence, surveillance and reconnaissance. It not only undertakes the U.S. Air Force’s cyber warfare and electronic warfare tasks, but also serves as the air force branch of the U.S. Cyber ​​Command.

The new version of the regulations states that according to the U.S. military’s institutional structure of separation of military, political and command, the 16th Air Force is commanded by the U.S. Cyber ​​Command, and the process of carrying out combat operations is formulated by the command. In addition, in order to clarify the relationship between the military forces and functional commands, the Air Force has set up the 616th Operations Command Center, which is responsible for converting the tasks assigned by the U.S. Cyber ​​Command and the needs and cooperation matters of the supported theater into the plans, programs and goals of the Air Force Cyber ​​Warfare Task Force, and connecting with subsequent evaluation work.

Integration into the joint combat system

In addition to the three main parts, the new version of the order also emphasizes that the US Air Force’s cyber warfare forces should be integrated into the “integrated deterrence” and joint combat system. Among them, the 16th Air Force will integrate intelligence reconnaissance and surveillance, electronic warfare and information warfare forces to create an “information environment advantage” for US Air Force operations in order to gain the upper hand in armed conflicts.

The new version of the regulations points out that the US Air Force’s military operations and combat plans in cyberspace should be integrated into the joint force’s combat plans, fully considering cross-agency cooperation, the linkage effects of the physical and cyber domains of the battlefield, and information sharing supported by the national intelligence system.

In order to better integrate into joint operations, the new version of the regulations clarifies the military terminology of the US Air Force’s cyber warfare forces and divides the evaluation of cyberspace combat effectiveness into tactics, campaigns and strategies to reflect the target effects of combat operations at different levels. According to the joint operations regulations of the US Joint Chiefs of Staff, the “blue”, “red” and “gray” combat opponent marking terms are introduced to represent allies, opponents and neutral parties in cyberspace respectively. “Cyberspace key terrain” is used to refer to cyberspace areas that can provide absolute advantages for cyber warfare mission units.

The concept of “cyberspace control” applies the “command and control” of the US military’s joint operations to new areas, and divides the control level into three levels from low to high: “balance”, “advantage” and “dominance” based on the degree of influence on the opponent’s network information field. This is slightly different from the three combat indicators of the US military’s joint forces: “weak”, “medium” and “strong”.

Foreign media said that under the guidance of the U.S. Cyber ​​Command’s “dominate the cyber domain” principle, the U.S. Air Force cyber warfare forces can “match” the terminology and concepts in the joint combat system, which will enable service commanders and joint force commanders to better use the “hybrid warfare” force of cyber warfare forces.

Strengthen construction in multiple areas

With the release of the new version of the regulations, the U.S. Air Force became the first service branch of the U.S. military to revise its cyber warfare guidelines, which also indicates that the U.S. military has extended its efforts to strengthen cyberspace armaments to combat forces.

The report said that at the same time as the US Air Force issued a new version of the regulations, the US Navy announced the strength of the 10th Fleet under the Cyber ​​Command, which has 14,000 active, civilian and reserve personnel, 28 active commands, 40 cyber mission forces and 27 reserve commands around the world. The US Navy’s cyber warfare force is the largest among all branches of the US military, and the US Air Force may follow the Navy’s system to build the force structure of this branch. A series of actions by the US military in the field of cyberspace will contribute to the expansion of arms in this field.

Since the beginning of this year, the U.S. Cyber ​​Command has successively released a series of documents, including the “Mission Statement of the Department of Defense Information Network Joint Force Command” and the “Mission Statement of the Coast Guard Cyber ​​Command”, to enrich the development plan of cyber warfare forces.

The U.S. Cyber ​​Command plans to invite the U.S. Department of Defense’s Joint Interoperability Test Command to serve as the testing agency for the “Joint Cyberspace Operations Architecture” to improve joint combat capabilities in the cyberspace field, and plans to take the lead in hosting the NATO “Locked Shield” cybersecurity joint military exercise in late April. At the same time, the United States also invites India and South Korea to conduct military research in the cyberspace and digital policy field.

In addition, the U.S. Air Force has also implemented the goal of improving cyber warfare capabilities in military academies. The U.S. Air Force University Cyber ​​Academy requires students to take at least three courses related to information and cyberspace, and the Air Force War College has formally incorporated cyber warfare and other teaching content into its general courses.

China Military Network Ministry of National Defense Network
Friday, February 24, 2023

現代國語:

近日,美國空軍發布新版《網路作戰條令》(以下簡稱條令)。美國空軍也由此成為網路空間司令部系列戰略性文件出台後,首個公佈新版作戰條令的軍種部隊。美軍在無形戰場的軍備擴張正全面鋪面。

謀求網路作戰優勢

新版條令是繼2010年首版、2011年修訂版後,美國空軍再次發布網路空間領域的綱領文件。該條令主要分為3個部分,包括美國空軍在網路空間面臨的威脅與挑戰、網路戰部隊的主要功能、力量架構。

新版條令指出,美國空軍目前面臨的威脅分為“有意破壞空軍網路資訊系統的惡意行為”和“無意但造成破壞和影響的網路活動”,並據此提出中長期存在的4項挑戰,即正在使用的商業技術和外包產品存在安全漏洞、網路空間發起的攻擊難以溯源、網路連接存在被侵入的安全隱患、網路基礎設施存在弱點。外媒稱,美國空軍刻意放大網路固有的安全風險,意在為其強化網路戰部隊建立並在該領域遂行軍事行動提供口實。

關於美國空軍網路戰部隊的主要功能,新版條令予以進一步明確。新版條令提出,美國空軍網路戰部隊既要在戰時或準戰時狀態下支援美國空軍進行網路戰攻防行動,贏得該領域競爭優勢和作戰優勢,也要在平時的非武裝衝突類軍事活動中發揮作用。

美國空軍網路作戰樣式主要為網路空間攻防作戰及美國國防部資訊網路運作維護,其主要作戰力量為第16航空隊。該部隊由負責網路空間的第24航空隊和負責全球情報、監視和偵察的第25航空隊合併組建,其不僅擔負美國空軍的網路戰和電子戰任務,也是美軍網路司令部的空軍分支。

新版條令稱,根據美軍軍政軍令分離的體制結構,第16航空隊由美軍網路司令部指揮,遂行作戰行動的流程由該司令部製定。此外,為明確軍種部隊和職能司令部間的關係,該航空隊下設第616作戰指揮中心,負責將美軍網絡司令部賦予的任務及受支援戰區的需求和協作事項,轉化為空軍網絡戰任務部隊的計劃、方案和目標,並對接後續評估工作。

融入聯合作戰體系

除了3個主要部分外,新版條令也聚焦在美國空軍網路戰部隊應融入「一體化威懾」和聯合作戰體系。其中,第16航空隊將整合情報偵察監視、電子戰和資訊戰力量,為美國空軍行動創造“資訊環境優勢”,以在武裝衝突中取得先機。

新版條令指出,美國空軍在網路空間的軍事行動和作戰計畫應融入聯合部隊的作戰方案,充分考慮跨機構合作、戰場物理域和網路域連動效應,及國家情報體系支撐下的資訊共享。

為了更好地融入聯合作戰,新版條令明確美國空軍網路戰部隊的軍事術語,將網路空間作戰效能評估分為戰術、戰役和戰略,以體現不同層級作戰行動的目標效果。依據美軍參聯會的聯合作戰條令,引入「藍色」「紅色」和「灰色」的作戰對手標註術語,分別表示網路空間的盟友、對手和中立方。以「網路空間關鍵地形」指稱可為網路戰任務分隊提供絕對優勢的網路空間區域。

「網路空間控制」這個概念,則將美軍聯合作戰中「指揮與控制」應用至新領域,並結合對對手網路資訊領域的影響程度,把控制等級由低至高劃分為「均勢」「優勢」「統治」3個等級,這與美軍聯合部隊「弱」「中」指標「強」3個作戰指標略有差別。

外媒稱,在美軍網絡司令部“主宰網絡域”準則引導下,美國空軍網絡戰部隊與聯合作戰體系中的術語概念“對錶”,可以使軍種指揮官及聯合部隊指揮官更好地運用網絡戰部隊這一“混合戰”力量。

多點發力加強建設

隨著新版條令出爐,美國空軍成為美軍首個修訂網路戰綱領的軍種部隊,這也標誌著美軍已將加強網路空間軍備建設的舉措延伸至作戰部隊。

報道稱,就在美國空軍出台新版條令的同時,美國海軍公佈了隸屬於網絡司令部的第10艦隊實力,該部隊下轄1.4萬名現役、文職和預備役人員,在全球有28個現役指揮部、40支網絡任務部隊和27個預備役指揮部。美國海軍網路戰部隊在美軍各軍兵種中規模最大,美國空軍或將效法海軍體制,建構該軍種的力量結構。美軍在網路空間領域的一系列舉動,將助長該領域軍備擴張態勢。

今年以來,美軍網路司令部相繼發布《國防部資訊網路聯合部隊指揮部任務說明》《海岸防衛隊網路司令部任務說明》等系列文件,豐富網路戰部隊發展計畫。

美軍網路司令部計畫邀請美國國防部聯合互通性測試司令部擔任「聯合網路空間作戰架構」的測試機構,以提高網路太空領域的聯合作戰能力,並擬於4月下旬牽頭承辦北約「鎖盾」網路安全聯合軍演。同時,美國也拉印度、韓國進行網路空間和數位政策的軍事領域研究。

此外,美國空軍也將提升網路戰能力的目標落實到軍事院校。美國空軍大學網路學院要求學員至少選修3門資訊與網路空間相關的課程,空軍戰爭學院則在通用課程中正式編入網路戰等教學內容。

中國軍網 國防部網
2023年2月24日 星期五

中國原創軍事資源:http://www.81.cn/gfbmap/content/2023-02/24/content_334361888.htm

Advanced Military Satellite Navigation for China’s Intelligent Battlefield

先進軍用衛星導航協助中國智慧戰場

現代英語:

The satellite navigation system, also known as the global satellite navigation system, is an air-based radio navigation and positioning system that can provide users with all-weather three-dimensional coordinates, speed and time information at any location on the earth’s surface or in near-Earth space.

The satellite navigation system is an important space infrastructure for mankind. It is an indispensable tool for a country’s national security and economic and social development. It has a profound impact on the form of war, combat style, and people’s production and lifestyle.

At present, there are four major global satellite navigation systems in the world, namely, the United States’ GPS, Russia’s GLONASS, Europe’s Galileo and China’s Beidou. Global competition in satellite navigation technology is becoming increasingly fierce.

Standing at a new starting point of profound changes in the world’s military, and looking at the future battlefield with a high degree of integration of informatization and intelligence, intelligent navigation systems will come into being and play an important role.

Satellite navigation becomes a “standard” element of the intelligent battlefield

The future intelligent battlefield will present the characteristics of high-tech warfare, which will comprehensively use intelligent weapons and means under information conditions, realize efficient command and control, and implement precise and flexible strikes. Satellite navigation technology can provide high-precision, all-weather, large-scale and multi-purpose positioning, navigation and timing services for various objects on land, sea, air and space.

Provide a unified time and space benchmark for systematic operations. For the intelligent battlefield, there are many linked elements and the situation changes rapidly, which requires accurate positioning of combat units to achieve intelligence reconnaissance, command and control, battlefield maneuvers, offensive and defensive operations, and support and guarantee under a unified time and space benchmark, ensuring that all elements of the entire battlefield form a coordinated organic whole.

The basic function of satellite navigation is to provide accurate time and space references for various combat elements. Without an accurate and unified time and space reference, the precise command of joint operations may be out of balance, combat operations may be out of control, and intelligence fusion and target identification cannot be achieved. If the time error is one hundredth of a second, a target locked by more than a dozen radars will become more than a dozen targets, and accurate defense and counterattack will not be possible.

Under a unified standard time and geographic coordinate system, satellite navigation provides precision guidance for various weapon platforms, fine frequency calibration for electronic warfare weapons, and all-weather positioning and navigation for individual combatants, significantly improving the coordination and strike effectiveness of joint firepower strikes.

Provide synchronous situation cognition for combat command and control. Accurately grasping the battlefield situation is the premise and basis for commanders to flexibly and accurately implement command and control. The satellite navigation system provides strong support for battlefield situation awareness.

Since the 1990s, the U.S. military has developed a “Blue Force Tracking” system based on GPS and satellite communications to build a precise command and control system. The “Blue Force Tracking” system has effectively supported the U.S. military in forming a networked information advantage on the ground battlefield and effectively solved the problem of “where are we, our friends, and our enemies?”

Relying on the two major services of navigation positioning and position reporting of the global satellite network, the military has realized battlefield situation monitoring and sharing, which has become an important means for the military to “know itself”. At the same time, it has optimized the combat operation process, realized the issuance of combat orders at the minute level, and accelerated the development of the military’s command and control mode towards “integration” and “flattening”.

Providing a tool to enhance the precision strike of weapons and ammunition. In the intelligent battlefield, precision-guided weapons have become the “trump card” that determines victory or defeat. Using the satellite navigation system, the flight process of the missile can be corrected throughout to ensure the accuracy of the hit. It can be said that the satellite navigation system is a tool to enhance the precision strike of weapon platforms.

In recent local wars, the proportion of GPS precision-guided weapons of the US military has continued to rise: 7.6% in the Gulf War in 1991, 35% in the Kosovo War in 1999, 60% in the Afghanistan War in 2001, 68.3% in the Iraq War in 2003, and 100% in the Syrian War in 2018.

Intelligent battlefield requires satellite navigation to have new “responsibilities”

As the core and cornerstone of the precise and unified space-time system, the modern satellite navigation system must take on new responsibilities in response to the development needs of future intelligent battlefields.

In the era of intelligence, new combat elements represented by “AI, cloud, network, group, and terminal” will reconstruct the battlefield ecology and completely change the winning mechanism of war. Satellite navigation services need to adapt to the characteristics of the intelligent battlefield with wider dimensions, higher precision, and stronger system.

Navigation positioning and timing have a wider range and higher accuracy. The current satellite navigation system has achieved coverage of the earth’s surface. However, on the intelligent battlefield, it needs to extend to deep space and under the sea. The combat time domain and air domain are wider, requiring the construction of a comprehensive service system covering land, sea, air and space, with unified standards, high efficiency and intelligence, to form time and space information coverage at all times and everywhere, and to achieve more powerful, safer and more reliable time and space service capabilities.

For example, in the intelligent battlefield, unmanned combat has become the basic form. Autonomous driving of unmanned vehicles, precision approach of drones, and measurement of intelligent missile positions all urgently need to be improved by an order of magnitude on the basis of existing navigation accuracy to ensure higher navigation integrity, faster first positioning time, and stronger cross-domain capabilities of land, sea, air, and space.

The military navigation confrontation system is more complete and more powerful. The means of navigation confrontation in the information age is a simple confrontation form based on signal energy enhancement and interference attack. Navigation in the intelligent era is intertwined with detection, perception, communication, command, and decision-making. It requires a navigation capability level with higher power and faster effectiveness in any region of the world, the ability to intelligently adjust navigation signals, and the development of multiple navigation means such as quantum navigation, pulsar navigation, and deep-sea navigation. It is necessary to integrate navigation methods with different principles, methods, and carriers to achieve navigation confrontation capabilities at the system level and system level.

The bandwidth of navigation information interaction is larger and the access is wider. In the intelligent era, the role of cyberspace in the combat system is gradually increasing, and it is integrated with the navigation space-time system. The navigation information and cyberspace system that provide space-time position will connect the scattered combat forces and combat elements into a whole, forming a networked and systematic combat capability. This requires support for ubiquitous perception, left-right collaboration, and reliable and reconfigurable navigation capabilities, support for highly reliable, highly anti-interference, and readily accessible signaling channels, and timely acquisition of required navigation auxiliary information such as geography, maps, and images. On this basis, the real integration of communication and navigation is realized, achieving the effect of “one domain combat, multi-domain support”.

Adapting to the needs of military intelligence development and promoting the construction of intelligent navigation system

Judging from the development trend of the world’s military powers, facing the future intelligent battlefield, intelligent navigation systems are gradually building a space-time reference network and navigation information service network that integrates the earth and the sky, with space-based, systematized, on-demand and cloud-based as the main characteristics, forming a comprehensive navigation, positioning and timing system with unified reference, seamless coverage, security and reliability, high efficiency and convenience, and strong practicality.

The core of the transformation from a basic navigation system to an intelligent navigation system is to upgrade from “positioning navigation service” to “intelligent navigation service”, and the focus is on achieving the following four aspects of transformation:

The space-time benchmark is shifting from relying on ground systems to autonomous space-time benchmark maintenance. The space-time benchmark maintenance equipment of the ground system will gradually be transferred to the satellite, and the satellite will be equipped with higher-precision optical clocks and astronomical measurement equipment to form a more stable and reliable space-based space benchmark through high-precision anchoring and laser intersatellite measurement. The use of intelligent navigation systems can make ordinary navigation positioning accuracy reach sub-meter level, the timing accuracy will be increased by about 5 times, and the precision positioning service can achieve fast convergence of centimeter-level accuracy. Intelligent navigation can fully support the cross-domain integration of combat platforms, the doubling of the effectiveness of distributed lethal weapons, and the precise navigation of the entire process of air-space integrated drones from cruising to precision approach.

The satellite power confrontation mode is transformed into a navigation system confrontation. In terms of navigation confrontation services, the traditional satellite power confrontation mode will no longer meet the needs of the intelligent battlefield. Navigation system confrontation is the only way for the development of intelligent equipment in order to enhance the ability of troops to quickly adapt to the battlefield environment. Specifically, it includes precise release of navigation performance, heterogeneous backup of constellations, and global hotspot mobility. The main features are intelligent navigation signals and flexible theater reinforcements. Based on controllable point beam energy enhancement technology, energy delivery in hotspot areas, enhanced area expansion, deception or blocking interference, and digital transmission service guarantee are realized. In a high-interference and blocking environment, ensure service continuity and accuracy, and gradually release strength as the war progresses.

The simple integration of communication and navigation will be transformed into integrated on-demand services. It will provide deeper and broader navigation information services, deeply integrate into the military information network, and provide high, medium and low-speed classified and hierarchical navigation information services to users on land, sea, air and space. Reuse the favorable conditions of global multiple continuous coverage of navigation satellites to meet users’ communication and navigation needs in a global range and in any posture, and realize high reliability and strong interference-resistant search and rescue, position reporting, and signaling transmission. The navigation satellite space-based network interacts with the ground network information to build inter-satellite and satellite-to-ground high-speed backbone networks. Through miniaturized laser terminals and enhanced space routers, a stable and reliable space network is formed, equipped with a complete and standardized protocol system to support the autonomous and intelligent operation of hybrid constellation networks.

The computing resources of payload modules are separated and transformed into cloud computing resources of constellation. It will provide more intelligent space-based cloud computing services and reliable space-based intelligent support for intelligent weapon platforms. The main features are virtualization of onboard hardware resources and balancing of task loads. Through the configuration of public onboard computing modules, large-capacity storage units, and high-speed bus networks on navigation satellites, a ubiquitous space network shared resource pool is formed. The powerful data processing capability can support the autonomous establishment and maintenance of space-based space-time benchmarks, intelligent maintenance of navigation signal quality, and autonomous management of space networks. At the same time, it can provide computing, push, and storage services for complex information such as spatial position for various high-end users in the sky, air, land, and sea.

(The author is an academician of the Chinese Academy of Engineering)

Above: Schematic diagram of satellite navigation system supporting operations.

Friday, November 12, 2021 // China Military Network Ministry of National Defense Network

現代國語:

衛星導航系統,即全球衛星導航系統,是能在地球表面或近地空間任何地點,為使用者提供全天候三維座標和速度以及時間資訊的空基無線電導航定位系統。

衛星導航系統是人類重要的太空基礎設施,堪稱一個國家安全和經濟社會發展不可或缺的重器,對戰爭形態、作戰樣式和人們生產生活方式有深遠影響。

目前,全球有四大全球衛星導航系統,分別是美國的GPS、俄羅斯的格洛納斯、歐洲的伽利略和中國的北斗,衛星導航技術全球競爭日益激烈。

站在世界軍事深刻變革的新起點,瞭望資訊化智能化高度融合的未來戰場,智慧導航體系將應運而生,並發揮重要作用。

衛星導航成為智慧化戰場的「標配」要素

未來智慧化戰場,將呈現資訊化條件下綜合運用智慧化武器和手段、實現高效指揮控制及實施精確靈巧打擊的高技術作戰特性。衛星導航技術,能高精度、全天候、大範圍、多用途地為陸、海、空、天各種物件提供定位、導航、授時服務。

為體系化作戰提供統一時空基準。對於智慧化戰場來說,連結要素多、情況瞬息萬變,要求對作戰單元進行準確定位,實現統一時空基準下的情報偵察、指揮控制、戰場機動、攻防行動、支援保障,確保整個戰場各類要素形成統籌協調的有機整體。

衛星導航的基本功能是,為各個作戰要素提供精確的時空基準。如果沒有精確統一的時空基準,聯合作戰精準指揮可能失調,作戰行動就可能失控,情報融合、目標辨識就無法實現。時間誤差百分之一秒,十幾部雷達鎖定的一個目標就會變成十幾個目標,精準防禦反擊將無法實現。

在統一標準時間與地理座標系下,衛星導航提供各類武器平台精確導引,給予電子戰武器精細校頻,給予作戰單兵全天候定位導航,顯著提升聯合火力打擊的協同程度、打擊效能。

為作戰指揮控制提供態勢同步認知。準確掌握戰場態勢,是指揮官靈活準確實施指揮控制的前提與基礎。衛星導航系統為戰場態勢感知提供了強大支撐。

美軍從1990年代開始,研發以GPS和衛星通訊為基礎的「藍軍追蹤」系統,用來建構精確化指揮控制系統。 「藍軍追蹤」系統有力支撐著美軍形成地面戰場網路化資訊優勢,有效解決了「我、友、敵在哪裡」的難題。

軍隊依托全球衛星網路的導航定位和位置報告兩大服務,實現了戰場態勢監視共享,成為軍隊「知己」的重要手段。同時,優化了作戰行動流程,實現了作戰指令分秒下達,加速了軍隊指揮控制方式向「一體化」「扁平化」方向發展。

為武器彈藥精準打擊提供增效利器。在智慧化戰場上,精確導引武器已成為關乎勝負的「撒手鐧」。使用衛星導航系統,能對飛彈的飛行過程進行全程修正,確保命中精度。可以說,衛星導航系統是武器平台精準打擊的增效利器。

在近幾場局部戰爭中,美軍GPS精確導引武器比例不斷攀升:1991年海灣戰爭為7.6%,1999年科索沃戰爭為35%,2001年阿富汗戰爭為60%,2003年伊拉克戰爭為68.3%,2018年敘利亞戰爭達100%。

智慧化戰場需要衛星導航有新的“擔當”

現代衛星導航系統作為精確統一時空體系的核心與基石,面向未來智慧化戰場的發展需求,要有新的「擔當」。

智能化時代,以「AI、雲、網、群、端」為代表的全新作戰要素,將重建戰場生態,完全改變戰爭的勝利機制。衛星導航服務,需要適應智慧化戰場維度更廣、精準度更高、系統更強的特性。

導航定位授時範圍更廣精度更高。目前的衛星導航系統,實現了地球表面覆蓋。但在智慧化戰場上,需要向深空、海下延伸。作戰時域空域更廣,要求建構覆蓋陸海空天、基準統一、高效智慧的綜合服務體系,形成無時不有、無所不在的時空資訊覆蓋,實現更強大、更安全、更可靠的時空服務能力。

如智慧化戰場上,無人化作戰成為基本形態。無人車自動駕駛、無人機精密進場、智慧飛彈陣地測量等,都迫切需要在現有導航精度基礎上再提升一個量級,確保導航完好性更高、首次定位時間更快、陸海空天跨域能力更強。

軍事導航對抗體系更全更給力。資訊時代的導航對抗手段,是以訊號能量增強與幹擾攻擊為主的簡單對抗形態。智慧時代的導航與探測、感知、通訊、指揮、決策相互交織影響,需要全球任意區域、功率更高、生效更快的導航能力水平,需要導航訊號智慧調整能力,需要發展量子導航、脈衝星導航、深海導航等多元導航手段,把不同原理、不同方式、不同載體的導航方法融合在一起,實現體系級、系統級的導航對抗能力。

導航資訊互動頻寬更大存取更廣。智慧時代的網路空間,在作戰體系中地位作用逐步上升,並與導航時空體系合為一體。提供時空位置的導航資訊與網路空間系統,將把分散的作戰力量、作戰要素連結為一個整體,形成網路化體系化作戰能力。這就需要支援泛在感知、左右協作、可信賴的導航能力,支援高可靠、強抗干擾、隨遇接取的訊號通道,及時取得所需的地理、地圖和影像等導航輔助資訊。在此基礎上,實現真正意義上的通訊導航一體化,達到「一域作戰、多域支援」效果。

適應軍事智慧化發展需要推動智慧導航體系建設

從世界軍事強國發展趨勢來看,面向未來智慧化戰場,智慧導航系統在逐步建構天地一體化的時空基準網和導航資訊服務網,以天基化、體系化、按需化、雲端化為主要特徵,形成基準統一、覆蓋無縫、安全可信、高效便捷、實戰性強的綜合導航定位授時體系。

從基本導航系統轉變為智慧導航系統,其核心是從“定位導航服務”升級為“智慧導航服務”,並專注於以下4個面向轉變:

時空基準依賴地面系統維持轉變為時空基準天基自主維持。地面系統時空基準維持設備將逐步向星上轉移,衛星將配置更高精度的光鐘、天文測量設備,透過高精度錨固和雷射星間測量,形成更穩定可靠的天基空間基準。智慧導航系統的使用,可使一般導航定位精度達到亞米級,授時精度將提升5倍左右,精密定位服務達到快速收斂的公分精度。智慧導航可完整支撐作戰平台跨域融合、分散式殺傷武器效能倍增、空天一體無人機從巡航到精密進場的全過程精準導航。

衛星功率對抗模式向導航體系化對抗轉變。在導航對抗服務方面,傳統的衛星功率對抗模式將不再滿足智慧化戰場需求,導航體系化對抗是智慧裝備發展的必經之路,以便提升部隊快速適應戰場環境能力。具體包括導航性能精準釋放、星座異構備份、全球熱點機動,主要特徵是導航訊號智能化、戰區增援靈活化。基於可控制點波束能量增強技術,實現熱點區域能量傳遞、增強區域擴展、欺騙或阻塞幹擾、數傳服務保障。在高幹擾阻塞環境下,確保服務連續性和精確度,並隨著戰事進程逐步釋放實力。

通訊導航簡單整合向通導一體按需服務轉變。將提供更深更廣的導航資訊服務,深度融入軍事資訊網絡,向陸、海、空、天用戶的高、中、低速分類分層次導航資訊服務。重複利用導航衛星全球多重連續覆蓋的有利條件,滿足用戶在全球範圍、任意姿態的通導需求,實現高可靠性、抗強幹擾的搜救、位置報告、信令傳輸。導航衛星天基網路與地面網路資訊交互,建構星間、星地高速骨幹網路。透過小型化雷射終端和增強型空間路由器,形成穩定可靠的空間網絡,裝載完備、標準統一的協議體系,支援混合星座網絡自主智慧運作。

載重模組運算資源分離向星座運算資源雲端化轉變。將提供更智慧的天基雲端運算服務,為智慧武器平台提供可信賴的天基智慧支撐。主要特徵是,星載硬體資源虛擬化、任務負載平衡化。透過導航衛星配置公用的星載運算模組、大容量儲存單元、高速匯流排網絡,形成泛在的空間網路共享資源池。強大的資料處理能力,在支撐天基時空基準自主建立與維持、導航訊號品質智慧維持、空間網路自主管理等任務功能的同時,可為天、空、地、海各類高階用戶,提供空間位置等複雜資訊的運算、推播與儲存服務。

(作者係中國工程院院士)

上圖:衛星導航系統支援作戰示意圖。

中國原創軍事資源:http://www.81.cn/jfjbmap/content/2021-11/12/content_302917888.htm

Chinese Military Combat Management System: Core of Modern Combat Command & Control

中國軍事作戰管理系統:現代作戰指揮控制的核心

現代英語:

Source: China Military Network-People’s Liberation Army Daily Author: Yang Lianzhen Editor-in-charge: Yang Fanfan

2022-04-22 06:42

Combat management is the foundation for winning modern wars and the core of the modern combat system. It is the planning, organization, coordination and control of personnel, equipment, information, resources, time and space and other elements during the combat process.

Combat management system refers to the command information system used to support combat management activities, including intelligence collection, information transmission, target identification, threat assessment, weapon allocation, mission planning, etc. It has gradually developed with the evolution of war and technological progress.

Combat Management System: The Core of Modern Combat System

Schematic diagram of the combat management system

Past and present life

Implementing timely and accurate command and control of combat operations and making timely and decisive combat decisions are the goals and dreams that commanders have always pursued in different war periods. Before the emergence of scientific management, there was no concept of combat management in war, and naturally there was no combat management system. However, simple combat management activities and systems have always been associated with war and developed in an integrated manner.

The core of combat management is to ensure that commanders and troops can exchange information and instructions smoothly. In the ancient combat command system, gongs, drums, and flags were called the “three officials”. “When words cannot be heard, gongs and drums are used; when sight cannot be seen, flags are used.” Sight and hearing are the primitive means of command and control.

After the invention of the telegraph, telephone, and radio, long-distance and rapid transmission of combat orders and combat information became a reality, and the scope of combat management shifted from two-dimensional to three-dimensional. The war decision-making of “planning and winning thousands of miles away” is no longer a myth. Of course, traditional battlefield management methods are not completely ineffective. For example, in the Korean War, due to limited communication conditions, our army still used bugles to transmit combat orders to the company and below, and there were more than 20 types of bugle calls related to combat. “The sound of bugles from all sides rose up,” and the bugles on the Korean battlefield once frightened the US military. Ridgway wrote in his memoirs: “As soon as it sounded, the Chinese Communist Army would rush towards the coalition forces as if it were under a spell. At this time, the coalition forces were always beaten back like a tide.”

At the beginning of the 20th century, the concept of scientific management gradually gained popularity, and the military quickly applied it to combat. The term “combat management” first appeared in the US Air Force, where combat managers provided long-range target indication and voice guidance to fighters based on radar detection. The core combat organization is called the BM/C3 system, namely Battle Management and Command, Control, and Communication. In 1946, the first electronic computer “ENIAC” was successfully developed, and the military began to use computers to store and process various data related to combat. In 1958, the US military built the world’s first semi-automated combat management system-the “Seqi” air defense command and control system, which used computers to realize the automation of part of the information collection, processing, transmission and command decision-making process for the first time. In the same year, the Soviet Army built the “Sky No. 1” semi-automated air defense command and control system. Combat management systems began to appear on the war stage, and human-machine collaborative decision-making gradually became the main form of combat decision-making for commanders. During the “Rolling Thunder” campaign of the Vietnam War, the U.S. military commanded more than 5,000 aircraft to dispatch 1.29 million sorties and dropped 7.75 million tons of bombs, which would have been impossible to achieve by manual command alone.

The combat management system has gone through weapon-centered, platform-centered, network-centered, and system-centered construction stages, and has gradually been able to receive and process information from sensors and other sources in multiple domains, perceive and generate combat situation maps in real time, automatically implement command and control of troops and equipment, and intelligently assist commanders in making decisions, involving the army, navy, air force and other military services.

For example, the Israeli Army’s “Ruler” combat management system uses a single-soldier digital device to connect to a channel state information device to provide real-time situational awareness and command and control information for troops performing tactical operations and fire support. The U.S. Navy’s “Aegis” combat system uses a multi-task signal processor to integrate air defense and anti-missile capabilities, and realizes the integration of shipborne phased array radars, command decisions, and weapon control. The NATO Air Force’s ACCSLOC1 system, based on network distributed deployment, integrates 40 types of radars and more than 3,000 physical interfaces, and undertakes air operations such as mission planning, combat command, and combat supervision. From the launch of the first Gulf War to the Libyan War, the time from sensor information acquisition to firing by the U.S. military has been shortened from 24 hours to 2.5 minutes.

Features

The combat management system is a rapidly developing and constantly improving distributed operating system. It mainly collects and processes sensor data, facilitates the transmission and integration of various types of information, conducts situation identification and prediction, generates combat plans, completes action evaluation and selection, and issues combat orders to weapon platforms and shooters. Its essence is to achieve an efficient combat “observation-judgment-decision-action” cycle (OODA loop).

The combat management system widely uses situation assessment and prediction, combat space-time analysis, online real-time planning, combat resource management and control, and combat management engine technologies, and adopts a “cloud + network + terminal” technical architecture based on information technology.

For example, the U.S. military took the lead in using information technology to build a C4ISR system that integrates command, control, computers, communications, intelligence, surveillance and reconnaissance, laying the foundation for the combat management system. In the Afghanistan War, the C4ISR system achieved near-real-time transmission of combat information to combat platforms for the first time. With the continuous maturity of sensors, networks and artificial intelligence, technologies such as intelligent situation understanding and prediction, intelligent information push, intelligent task planning, intelligent collaborative control, intelligent rapid reconstruction and intelligent parallel command and control are having an increasingly significant impact on combat management systems.

Combat management systems usually support functions such as situational awareness, mission planning, engagement management, communications, modeling, simulation and analysis, and test training. For example, a missile defense combat management system mainly includes command and control, engagement management, and communications. The command and control function enables pre-battle combat planning and battlefield situation awareness; the engagement management function enables auxiliary combat decision-making, allocation of anti-missile weapons, and completion of strike missions; and the communication function enables the transmission and sharing of intelligence and data among the anti-missile units in the system.

The combat management system is an open and complex system. The structure determines the function. Different system structures determine the functional expansion of different systems: the ship’s self-defense combat management system enables the ship to have a strong self-defense capability through automated weapon control regulations, collaborative engagement management systems and tactical data links; the electromagnetic combat management system improves the planning, sharing and mobility of the electromagnetic spectrum by integrating and displaying battlefield electromagnetic spectrum data; the individual combat system enhances the soldier’s mobility, support, lethality and survivability by integrating individual protection, individual combat weapons and individual communication equipment.

Combat management systems generally have the characteristics of integration, automation, optimization, and real-time. The combat mode of modern warfare is complex and the battlefield scale is expanding. The requirements for force control, resource integration, and task scheduling have increased, and system integration must be achieved. The French Army’s “Scorpion” system fully integrates tanks, armored vehicles, infantry fighting vehicles, unmanned ground vehicles, drones, and attack helicopters into the same combat group, and links all platforms and combat units in the task group.

With the increase of combat elements in modern warfare and the expansion of battlefield perception space, the command automation system that relies heavily on people can no longer fully adapt, and the system must be automated. All operating functions of Pakistan’s combat management artillery control system are fully automated, “providing an automated solution for preparing, coordinating, transmitting, executing and modifying fire support plans and firing plans.”

The pace of modern warfare is accelerating and battlefield data is massive. It is necessary to quickly grasp the situation and make decisions efficiently, and it is necessary to achieve system optimization decision-making. Military powers are combining artificial intelligence, cloud computing, the Internet of Things and big data technologies to facilitate faster decision-making in multi-domain operations.

Future Development

Traditional combat management systems place more emphasis on pre-established engagement sequences and combat rules. However, future wars will emphasize the confrontation between systems, and it is impossible to exhaust all situations in advance. The battlefield information that needs to be mastered is also becoming more complex and massive. For this reason, the armies of various countries have begun to abandon the traditional method of developing combat management systems for each combat domain separately, and are network-centric and supported by artificial intelligence, trying to help commanders make combat decisions more quickly and realize real-time connection between sensors in each combat domain and any shooter.

The combat management system will promote the implementation of combat concepts. The “Advanced Combat Management System” developed by the US Air Force plans to connect all military services and their weapon platforms in real time in a military Internet of Things. Its core is to seamlessly link various intelligence reconnaissance platforms, command and control platforms, strike platforms and combat management platforms with various cross-domain capabilities, convert intelligence and target indication data into timely and usable information, shorten the “discovery-positioning-tracking-targeting-strike-assessment” cycle, and execute combat operations at a speed that opponents cannot keep up. The Russian military proposed the “military unified information space” theory and organized the development of the “automatic control system” for integrated joint operations of land, sea and air networks. By establishing a network-centric command model, it attempts to integrate the command, communication, reconnaissance, firepower, and support of the entire army, realize cross-domain operations in the true sense, and improve battlefield situation awareness and combat command efficiency.

The combat management system will rely on artificial intelligence technology. The application of artificial intelligence will not only multiply the capabilities of weapon systems, but will also fundamentally change the implementation of the OODA loop. In future combat management systems, artificial intelligence technology will become the core support and driving engine, and the key factor is the quality of the algorithm. The system will have built-in upgradeable artificial intelligence, and people will be in a supervisory or collaborative state to minimize manual input, spontaneously identify and classify threat targets in the combat environment, autonomously evaluate and weigh, and automatically allocate weapons, thereby providing adaptive combat advantages and decision-making options.

For example, the “Intelligent Autonomous Systems Strategy” released by the US Navy in July 2021 aims to accelerate the development and deployment of intelligent platforms through a highly distributed command and control architecture, integrate unmanned systems, artificial intelligence, and autonomous driving technologies, and realize future combat decisions facilitated by intelligent autonomous systems. The Russian military has more than 150 artificial intelligence projects under development, one of the focuses of which is to introduce artificial intelligence into command and control systems, adapt intelligent software to different weapon platforms, achieve the unification of physical and cognitive domains, and double combat effectiveness through intelligent empowerment.

The combat management system will achieve a breakthrough in cross-domain capabilities. The military’s combat management capabilities are shifting towards full-domain coordination, including land, sea, air, space, electricity, network, cognitive domain, and social domain. To adapt to the full-domain environment, the combat management system needs to have the following functions: a resilient and redundant communication system, flexible and secure data operation; artificial intelligence and machine learning directly extract and process data from sensors, and conduct decentralized integration and sharing; segmented access based on confidentiality levels to meet perception, understanding, and action needs. On this basis, it is also necessary to provide troops with reconnaissance and surveillance, tactical communications, data processing, network command and control, and other capabilities.

The future combat management system will focus on security processing, connectivity, data management, application, sensor integration and effect integration, optimize data sharing, collaborative operations and command and control in the entire combat domain, and support decision-making advantages from the tactical level to the strategic level. Its purpose is only one: to give commanders the ability to surpass their opponents.

(The author is the deputy director and professor of the Training Management Department of the Armed Police Command Academy)

現代國語:

作戰管理,是打贏現代化戰爭的基礎,是現代化作戰體系的核心,也是作戰過程中對人員、裝備、資訊、資源和時空等要素進行的規劃、組織、協調與控制活動。

作戰管理系統,指用來支撐作戰管理活動的指揮資訊系統,包括情報採集、資訊傳輸、目標識別、威脅判斷、分配武器、任務規劃等。其隨戰爭演化、技術進步而逐步發展。

作戰管理系統:現代化作戰體系核心

■楊蓮珍

作戰管理系統示意圖

前世今生

對作戰行動實施適時精確的指揮控制和作出及時果斷的作戰決策,是不同戰爭時期指揮員始終追求的目標與夢想。在科學管理產生前,戰爭中並無作戰管理這一概念,自然談不上作戰管理系統。但樸素的作戰管理活動和系統一直與戰爭相伴、融合發展。

作戰管理的核心是保證指揮員與部隊能順暢地交換資訊和指示。在古代作戰指揮號令系統中,金、鼓、旗號稱為“三官”,“言不相聞,故為之金鼓;視不相見,故為之旌旗”,目視耳聽是原始的指揮控製手段。

電報、電話、無線電發明後,作戰命令和戰鬥訊息的遠距離快速傳輸成為現實,作戰管理範圍由平面走向立體,「運籌帷幄、決勝千裡」的戰爭決策不再是神話。當然,傳統的戰場管理手段並非完全失去作用,例如在抗美援朝戰場上,我軍因通信條件受限,連以下分隊仍在通過軍號傳遞作戰命令,與作戰相關的號聲就有20餘種。 “四面邊聲連角起”,朝鮮戰場上的軍號曾讓美軍聞風喪膽。李奇微在回憶錄裡寫道:“只要它一響,中共軍隊就如著了魔法一般,全部不要命地撲向聯軍。這時,聯軍總被打得如潮水般潰退。”

20世紀初,科學管理的概念逐漸升溫,軍隊迅速將其應用於作戰。 「作戰管理」一詞,最早出現在美國空軍,其編成內的作戰管理員,基於雷達探測情況向戰機進行遠程目標指示和話音引導。作戰核心組織則稱為BM/C3系統,即作戰管理(Battle Management)和指揮、控制、通訊(Command,Control,Communication)。 1946年,第一台電子計算機「埃尼阿克」研製成功,軍隊開始使用計算機存儲和處理有關作戰的各種數據。 1958年,美軍建成世界上第一個半自動化作戰管理系統-「賽其」防空指揮控制系統,使用電腦首次實現了資訊擷取、處理、傳輸和指揮決策過程部分作業的自動化。同年,蘇軍建成「天空1號」半自動化防空指揮控制系統。作戰管理系統開始登上戰爭舞台,人機協作決策逐漸成為指揮主要的作戰決策形式。越戰中的「滾雷」戰役,美軍指揮5,000多架飛機出動129萬架次,投彈775萬噸,如果單靠人工指揮是不可能實現的。

作戰管理系統經歷了以武器為中心、以平台為中心、以網絡為中心和以體係為中心的建設階段,逐步能夠接收、處理來自多域的傳感器和其他來源信息,實時感知並生成作戰態勢圖,自動對兵力及裝備實施指揮控制,智能輔助指揮員決策,涉及陸、海、空等軍兵種。

如以色列陸軍的「統治者」作戰管理系統,單兵數字化裝置連接通道狀態資訊設備,用於為執行戰術作戰、火力支援等部隊提供即時態勢感知和指揮控制資訊。美國海軍的「宙斯盾」作戰系統,採用多任務訊號處理器整合防空與反導能力,實現艦載相控陣雷達、指揮決策、武器控制等一體化整合。北約空軍的ACCSLOC1系統,基於網路分散部署,整合40種型號的雷達和3000多個物理接口,承擔任務規劃、作戰指揮和戰鬥監督等空中行動。從發動第一次海灣戰爭到利比亞戰爭,美軍從傳感器獲取資訊到開火,時間由24小時縮短至2.5分鐘。

功能特徵

作戰管理系統是一個迅速發展並不斷完善的分散式操作系統,主要通過收集、處理傳感器數據,暢通各類信息傳輸和融合,進行態勢識別和預測,生成作戰方案,完成行動評估與選擇,下發作戰指令給武器平台和射手。其本質是實現高效率的作戰「觀察-判斷-決策-行動」循環(OODA環)。

作戰管理系統廣泛使用態勢評估與預測、作戰時空分析、線上即時規劃、作戰資源管控和作戰管理引擎技術等,採用基於資訊技術的「雲+網+端」的技術架構。

如美軍率先運用資訊技術,建構了集指揮、控制、計算機、通訊、情報、監視和偵察於一體的C4ISR系統,為作戰管理系統打下了基礎。阿富汗戰爭中,C4ISR系統首次實現作戰資訊近實時傳輸到作戰平台。隨著傳感器、網絡和人工智慧的不斷成熟,智能態勢理解和預測、智慧資訊推送、智慧任務規劃、智慧協同控制、智慧快速重構和智慧平行指控等技術,正在對作戰管理系統產生越來越重大的影響。

作戰管理系統通常支援態勢感知、任務規劃、交戰管理、通訊、建模及模擬與分析、試驗訓練等功能。如導彈防禦作戰管理系統,主要包括指揮控制、交戰管理及通訊等功能構成。指揮控制功能,實現對戰前的作戰規劃及對戰場態勢的感知;交戰管理功能,實現輔助作戰決策和分配反導武器並完成打擊任務;通信功能,實現系統各反導單元情報、數據的傳輸和共享。

作戰管理系統是一個開放的複雜系統。結構決定功能,不同的系統結構,決定不同系統的功能拓展:艦艇自防禦作戰管理系統通過自動化武器控制條令、協同交戰管理系統和戰術數據鍊等,使艦艇具備了強大的自防禦能力;電磁作戰管理系統通過融合並顯示戰場電磁頻譜數據,提高電磁戰兵器規劃能力、共享電磁力和單兵作戰力量;

作戰管理系統普遍具有一體化、自動化、最優化、即時化等特徵。現代戰爭作戰模式複雜、戰場規模擴大,對力量管控、資源整合和任務調度要求的提高,必須實現系統一體化整合。法國陸軍的「蝎子」系統,就將坦克、裝甲車、步兵戰車、無人地面車輛、無人機與攻擊直升機完整整合到同一個作戰群,並連結任務群中的所有平台和作戰單元。

現代戰爭作戰要素增加、戰場感知空間擴大,對人依賴較高的指揮自動化系統已無法完全適應,必須實現系統自動化運作。巴基斯坦作戰管理火砲控制系統所有操作功能全部自動化,「為準備、協調、傳遞、執行和修改火力支援計畫與射擊方案提供了自動化解決方案」。

現代戰爭作戰節奏加快、戰場數據海量,需要快速掌握狀況、有效率定下決心,必須實現系統最優化決策。各軍事強國正將人工智慧、雲端運算、物聯網與大數據技術結合起來,以利在多域作戰中更快決策。

未來發展

傳統作戰管理系統,更強調基於事先制定的交戰序列、作戰規則。但未來戰爭更突出體係與體系之間的對抗,不可能預先窮盡各種情況,需要掌握的戰場資訊也更趨複雜、海量。為此,各國軍隊開始摒棄傳統上為各作戰域單獨開發作戰管理系統的方法,以網絡為中心、以人工智能為支撐,力圖幫助指揮員更迅速作出作戰決策,實現各作戰域的傳感器與任意射手的實時連接。

作戰管理系統將推動作戰概念落地。美國空軍開發的“先進作戰管理系統”,規劃將各軍種及其武器平台實時連接在一個軍事物聯網中,其核心是將各類情報偵察平台、指揮控制平台、打擊平台和作戰管理平台與各種跨域能力無縫鏈接,把情報和目標指示數據轉化為及時、可用的信息,縮短“發現-定位-跟踪-瞄準-打擊-評估”速度,以執行對手的速度執行。俄羅斯軍隊提出“軍隊統一資訊空間”理論,組織開發陸海空網絡一體化聯合作戰“自動控制系統”,通過建立網絡中心指揮模式,試圖將全軍指揮、通信、偵察、火力、保障等進行融合,實現真正意義上的跨域作戰,提升戰場態勢感知能力與作戰指揮效率。

作戰管理系統將依賴人工智慧技術。人工智慧的應用不僅引起武器系統能力的倍增,也將從根本上改變OODA環的實現。未來的作戰管理系統,人工智慧技術將成為核心支撐和驅動引擎,關鍵因素是演算法的品質。系統將內置可升級的人工智慧,人們將處於監督或協同狀態的位置,最大限度地減少人工輸入,對作戰環境中的威脅目標進行自發識別分類、自主評估權衡和自動分配武器,從而提供自適應的作戰優勢和決策可選性。

如2021年7月美海軍發布的“智能自主系統戰略”,旨在通過高度分佈式的指揮和控制架構,加速智能平台的開發和部署,綜合無人系統、人工智能和自動駕駛等技術,實現由智能自主系統促成的未來作戰決策。俄軍在研的人工智慧項目超過150個,其重點之一是將人工智慧引入指揮控制系統,為不同武器平台適配智慧軟件,實現物理域與認知域的統一,以智慧賦能的方式實現戰鬥力倍增。

作戰管理系統將實現跨域能力突破。軍隊作戰管理能力正向陸、海、空、天、電、網和認知域、社會域等全域協同轉變。適應全局環境,作戰管理系統需要具備以下功能:有彈性和冗餘的通信系統,靈活安全的數據運行;人工智能和機器學習直接從傳感器中提取、處理數據,並進行去中心化集成、共享;根據保密級別分段訪問,滿足感知、理解和行動需要。在此基礎上,還需具備向部隊提供偵察監視、戰術通訊、數據處理、網路指控等能力。

未來的作戰管理系統,將聚焦安全處理、連通性、數據管理、應用、傳感器整合和效果整合等能力,優化全作戰域的數據共享、協同作戰和指揮控制,支援從戰術級到戰略級的決策優勢。其目的只有一個:賦予指揮員超越對手的能力。

(作者係武警指揮學院訓練管理系副主任、教授)

中國原創軍事資源:http://www.81.cn/yw_208727/10149663888.html