Joint operations, as a fundamental form of modern warfare, have evolved in their winning mechanisms along with advancements in military technology and changes in the nature of warfare. From the coordinated formations of the cold weapon era to the combined arms operations of infantry and artillery in the era of firearms, from joint operations of various services and branches in the era of mechanized warfare to multi-domain joint operations in the era of informationized warfare, each military revolution has brought about fundamental changes in the winning mechanisms of warfare.
Currently, emerging technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things are driving the evolution of warfare towards informatization and intelligence at an unprecedented pace. The connotation and extension of joint operations are constantly expanding, and the mechanisms of victory are also showing a series of new development trends. In-depth research into the development trends of the mechanisms of victory in joint operations, based on a multi-perspective analysis framework, systematically exploring the historical evolution and future development direction of these mechanisms from five dimensions—operation time, operation space, operation force, operation actions, and operation command and control—is of vital importance for accurately grasping the changes in future warfare, scientifically establishing the direction of military force development, and effectively enhancing joint operations capabilities.
From a combat time perspective: the strategy has evolved from step-by-step progression to instantaneous enemy destruction.
Time is one of the fundamental elements of war, and the art of utilizing operational time is key to victory in joint operations. In the era of mechanized warfare, limited by intelligence gathering methods, command and control capabilities, and weapon performance, joint operational operations are typically organized and implemented under strict time constraints, unfolding sequentially in stages: reconnaissance and early warning, fire preparation, forward breakthrough, deep attack, and fortification. Each branch of the armed forces carries out its operational mission according to a predetermined plan at each stage. This operational model results in a relatively slow pace of combat and inefficient use of time, often requiring several days or even months to complete a single operational phase. With the development of information technology and precision-guided weapons, the time-dimensional winning mechanism of modern joint operations is shifting towards “instantaneous enemy destruction.” The pace of combat operations has accelerated significantly, and the division of combat phases has become increasingly blurred. The traditional step-by-step approach is gradually being replaced by “instantaneous” warfare characterized by real-time perception, real-time decision-making, and real-time action. Real-time information sharing and rapid flow have drastically shortened the combat command and decision-making cycle, achieving the “detect and destroy” combat effect. The widespread application of precision-guided weapons has greatly improved the speed and accuracy of firepower strikes, enabling combat forces to carry out devastating strikes against key targets in an instant. In the future, with the development and application of artificial intelligence technology, the speed of combat decision-making and action will be further improved, and the instantaneous nature of joint operations will become more prominent.
From the perspective of operational space: expanding from the tangible battlefield to the intangible space
The operational space is the arena for joint combat forces, and its constantly evolving form and scope directly influence the mechanisms of victory in joint operations. In industrial-era warfare, the operational space was primarily confined to tangible physical spaces such as land, sea, and air. Operations mainly revolved around seizing and controlling key geographical points, transportation lines, and strategic locations, and the deployment of combat forces and the evaluation of operational effectiveness were also primarily based on the tangible spatial scope. Entering the information age, the operational space is undergoing revolutionary changes. In addition to the traditional tangible physical spaces of land, sea, air, and space, intangible spaces such as information space, cyberspace, and psychological space are increasingly becoming important battlefields for joint operations, even determining the outcome of combat to some extent. The struggle for information space has become a primary aspect of joint operations, the battle in cyberspace is intensifying, and the psychological warfare is constantly evolving. The battlefield of modern joint operations is characterized by a fusion of tangible and intangible spaces, and an equal emphasis on the physical and information domains. In the future, with the development of emerging technologies such as quantum technology, biotechnology, and artificial intelligence, the space for joint operations will further expand, potentially giving rise to new operational domains such as quantum space and biological space. The mechanisms for winning in joint operations will also undergo profound changes.
From the perspective of combat power: a shift from human-machine integration to human-machine collaboration.
Combat forces are the material foundation of joint operations, and their composition and deployment directly affect the outcome of such operations. In the era of mechanized warfare, the composition of joint combat forces was primarily a human-equipment integration model, with personnel as the main body and weapons and equipment as the tools. The effectiveness of combat forces depended mainly on the number and quality of personnel, the performance and quantity of weapons and equipment, and the degree of integration between personnel and equipment. Armies around the world emphasize improving the level of personnel-equipment integration through rigorous training to fully leverage the combat effectiveness of weapons and equipment. With the development of emerging technologies such as artificial intelligence, robotics, and big data, the composition and deployment of modern joint combat forces are undergoing profound changes, and human-machine collaboration is becoming a new logic for winning joint combat operations. Unmanned aerial vehicles (UAVs), unmanned ships, unmanned combat vehicles, and unmanned underwater vehicles have become an important component of joint combat forces. They are capable of performing reconnaissance, surveillance, strike, and interference missions in high-risk environments, significantly improving the survivability and combat effectiveness of combat forces. The application of artificial intelligence technology has also endowed weaponry with a certain degree of autonomous action, enabling them to autonomously collaborate with humans to complete complex tasks. Machine intelligence has not only changed the composition of combat forces but also their operational methods. In the future, with the continuous advancement of human-machine integration technology, the boundaries between humans and machines will become increasingly blurred, and human-machine collaboration will reach an even higher level.
From a combat operations perspective: The shift from segmented cooperation to cross-domain integration.
Joint operations are the concrete practice of joint warfare, and their organizational form and implementation methods directly affect the overall effectiveness of joint operations. In traditional joint operations, limited by command and control capabilities and coordination mechanisms between various services and branches, forces from each service and branch can only carry out missions within their respective operational domains and conduct limited cooperation through pre-established coordination plans. This domain-specific cooperation model is prone to problems such as coordination failures and operational disconnects. In the information age, with the improvement of all-domain awareness capabilities and the refinement of command and control methods, joint operations are gradually developing towards cross-domain integration. Cross-domain integration emphasizes breaking down the boundaries between different operational domains, achieving seamless connection and deep integration of operational forces across multiple domains such as land, sea, air, space, electromagnetic, and cyberspace, forming a coordinated overall operational effect. Operational forces in each domain can share battlefield information in real time, dynamically adjust operational actions, rapidly transcend geographical and domain boundaries, and conduct operations simultaneously in multiple domains. Through the integration and sharing of multi-domain information, a high degree of coordination and precise cooperation in operational actions across domains is achieved, forming a synergistic and effective overall operational effect. In the future, with the continuous development of information technology, the degree of cross-domain integration in joint operations will further deepen, becoming a key to victory in joint operations.
From the perspective of combat command and control: Evolution from central radiation to flexible periphery
Operational command and control is the “brain” and “nerve center” of joint operations; its mode selection and effectiveness directly determine the success or failure of joint operations. In the era of mechanized warfare, due to limited command and control technology, joint operational command and control typically adopted a centralized, hierarchical, tree-like organizational model. This model, centered on the highest command organization, implements operational command and control by transmitting orders downwards and feeding back information upwards, possessing significant advantages in centralized and unified action. However, it also suffers from drawbacks such as multiple command levels, slow information transmission, and poor responsiveness. With the development of information network technology and artificial intelligence technology, modern joint operational command and control is evolving towards greater flexibility. A modular and reconfigurable command structure enables the entire combat system to flexibly adjust command relationships and processes according to changes in combat missions and battlefield environments. While maintaining a centralized and unified strategic intent, it grants greater autonomy to tactical nodes at the system’s periphery, thereby enhancing the system’s flexibility and responsiveness, and better adapting to the rapidly changing challenges of future battlefields. In the future, with the development of technologies such as brain-computer interfaces and quantum communication, the real-time nature, accuracy, and flexibility of joint operations command and control will reach new heights.
In conclusion, with the development of emerging technologies such as information technology and artificial intelligence and their widespread application in the military field, the form of joint operations is undergoing continuous evolution, and the mechanisms for winning joint operations are also undergoing profound changes. This not only reshapes traditional operational concepts and methods but also poses new and higher requirements for the development of future joint operational capabilities. Therefore, we must maintain strategic clarity and innovative vitality, closely monitor global military development trends, conduct in-depth research on the mechanisms for winning joint operations, and continuously promote innovation in joint operational theory and practice to lay a solid foundation for winning informationized and intelligent warfare.
Functional Orientation of the Modern Combat System with Chinese Characteristics
Key Points
● The coexistence, iterative development, dynamic evolution, and integrated development of multiple generations of mechanization, informatization, and intelligentization constitute the historical context of national defense and military construction in the new era, and also represent the historical position of building a modern combat system with Chinese characteristics.
● Traditional and non-traditional security threats are intertwined, and various strategic directions and security fields face diverse real and potential threats of local wars. This requires our military to abandon old models such as linear warfare, traditional ground warfare, and homeland defense warfare, and accelerate the transformation to joint operations and all-domain operations.
The report to the 19th National Congress of the Communist Party of China proposed that, standing at a new historical starting point and facing the demands of building a strong country and a strong military, “we should build a modern combat system with Chinese characteristics.” This is a strategic choice to adapt to the rapidly evolving nature of warfare, to thoroughly implement Xi Jinping’s thought on strengthening the military, to comprehensively advance the modernization of national defense and the armed forces, and to aim at building a world-class military. Among these choices, the grasp of the functional orientation of the modern combat system with Chinese characteristics greatly influences the goals, direction, and quality of its construction.
Seize the opportunities of the times and take the integrated development of mechanization, informatization and intelligentization as the historical orientation.
The combat system is the material foundation of war and is closely related to the form of warfare. In today’s world, a new round of technological and industrial revolution is brewing and emerging. Original and disruptive breakthroughs in some major scientific problems are opening up new frontiers and directions, prompting human society to rapidly transform towards intelligence, and accelerating the evolution of warfare towards intelligence. Currently, our military is in a stage of integrated mechanization and informatization development. Mechanization is not yet complete, informatization is being deeply advanced, and we are facing both opportunities and challenges brought about by the intelligent military revolution. The new era provides us with a rare historical opportunity to achieve innovative breakthroughs and rapid development, and also provides a rare historical opportunity for our military’s combat system construction to achieve generational leaps and leapfrog development.
A new era and a new starting point require establishing a new coordinate system. The coexistence, iterative development, dynamic evolution, and integrated development of multiple generations of mechanization, informatization, and intelligentization constitute the historical context of national defense and military construction in the new era, and also the historical position of building a modern combat system with Chinese characteristics. We should accurately grasp the historical process of the evolution of warfare, the historical stage of the combined development of mechanization and informatization, and the historical opportunities brought about by intelligent warfare. We must prioritize the development of military intelligence, using intelligence to lead and drive mechanization and informatization, coordinating mechanization and informatization within the overall framework of intelligent construction, and completing the tasks of mechanization and informatization development within the process of intelligentization. We must focus on top-level design for military intelligence development, researching and formulating a strategic outline and roadmap for military intelligence development, clarifying key areas, core technologies, key projects, and steps for intelligent development, and accelerating the construction of a military intelligent combat system. We must achieve significant progress as soon as possible in key technologies such as deep learning, cross-domain integration, human-machine collaboration, autonomous control, and neural networks, improving the ability to materialize advanced scientific and technological forces into advanced weaponry and equipment, and providing material conditions for building a modern combat system.
Emphasizing system-on-system confrontation, with the development of joint operations and all-domain operations capabilities as the core indicators.
Information-based local wars are characterized by integrated joint operations as their basic form, with network support, information dominance, and system-on-system confrontation as their main features. The combat capability generation model is shifting towards a network-based information system. Currently and for some time to come, my country’s geostrategic environment remains complex, with traditional and non-traditional security threats intertwined. Various strategic directions and security domains face diverse real and potential threats of local wars. Simultaneously, with the expansion of national interests, the security of overseas interests is becoming increasingly prominent, requiring the PLA to abandon old models such as linear warfare, traditional ground warfare, and territorial defense warfare, and accelerate its transformation towards joint operations and all-domain operations.
The report of the 19th CPC National Congress pointed out that “enhancing joint operational capabilities and all-domain operational capabilities based on network information systems” is a new summary of the PLA’s operational capabilities in the new era and a core indicator for building a modern operational system with Chinese characteristics. We should actively explore the characteristics, laws, and winning mechanisms of modern warfare, and proactively design future operational models, force application methods, and command and coordination procedures to provide advanced theoretical support for building a modern operational system with Chinese characteristics. Following the new pattern of the Central Military Commission exercising overall command, theater commands focusing on combat operations, and services focusing on force development, we should adapt to the new joint operational command system, the reform of the military’s size, structure, and force composition, highlighting the network information system as the core support, and building an operational system capable of generating powerful joint operational capabilities to fully leverage the overall power of the various services and branches. With a view to properly addressing various strategic directions and traditional and non-traditional security threats, ensuring the PLA can reliably carry out various operational missions, we should build an operational system capable of generating powerful all-domain operational capabilities, achieving overall linkage across multiple battlefields and domains, including land, sea, air, space, and cyberspace.
Focusing on real threats, the strategic objective is to gain an asymmetric advantage over the enemy.
The world today is at a new turning point in the international situation, with strategic competition among major powers taking on new forms and the struggle for dominance in the international and regional order becoming unprecedentedly fierce. The specter of hegemonism and power politics lingers, and some countries are intensifying their efforts to guard against and contain China. my country’s geostrategic environment is becoming increasingly complex, with multiple destabilizing factors, facing multi-directional security pressures, and an increasingly complex maritime security environment. All of these factors contribute to increasing the dangers and challenges to national security.
Effectively responding to real military security threats is a crucial strategic task in our military preparedness and a strategic direction for building a modern combat system with Chinese characteristics. We should focus on keeping up with technological advancements, vigorously developing advanced equipment, and striving to avoid creating new technological gaps with potential adversaries. This will provide solid material support for the construction of our combat system. Simultaneously, we must emphasize leveraging the PLA’s long-standing principles of flexibility, mobility, and independent operation, capitalizing on our strengths and avoiding weaknesses, targeting the enemy’s vulnerabilities and weaknesses. We should not simply compete with the best in high-tech fields, but rather focus on deterring the enemy and preventing war. We must accelerate the development of asymmetric counterbalancing mechanisms, strengthen the construction of conventional strategic means, new concepts and mechanisms, and strategic deterrence in new domains, supporting the formation of a new combat system with new deterrent and combat capabilities. We must not fear direct confrontation, preparing for the most complex and difficult situations, and building a combat system capable of providing multiple means, forces, and methods to address diverse war threats. This will ensure that, in the event of conflict, the comprehensive effectiveness of the combat system is fully utilized, guaranteeing victory in battle and deterring further war through war.
Promoting military-civilian integration and using the national strategic system to support winning the people’s war in the new era is a fundamental requirement.
The deepest roots of the power of war lie within the people. The concept of people’s war is the magic weapon for our army to defeat the enemy. Modern warfare is a comprehensive confrontation of the combined strength of opposing sides, involving political, economic, military, technological, and cultural fronts. Various armed forces are closely integrated, and various forms of struggle are coordinated with each other. The role and status of civilian technology and civilian forces in war are increasingly important, which further requires integrating the national defense system into the national economic and social system and striving to win the people’s war in the new era.
Leveraging the power of military-civilian integration to support the fight against people’s war in the new era with the national strategic system is a fundamental requirement for building a modern combat system with Chinese characteristics. We must deeply implement the national strategy of military-civilian integration, deeply integrate the construction of our military’s combat system into the national strategic system, utilize national resources and overall strength to achieve a continuous leap in combat effectiveness, and maximize the overall power of people’s war. We must focus on strengthening military-civilian integration in emerging strategic fields, actively seize the commanding heights of future military competition, and continuously create new advantages in people’s war. We must incorporate the military innovation system into the national innovation system, strengthen demand alignment and collaborative innovation, enhance independent innovation, original innovation, and integrated innovation capabilities, and proactively discover, cultivate, and utilize strategic, disruptive, and cutting-edge technologies to provide advanced technological support for building a modern combat system. We must also focus on the in-depth exploitation of civilian resources, strengthen the integration of various resources that can serve national defense and military construction, prevent duplication and waste, self-contained systems, and closed operations, and maximize the incubation effect of civilian resources on the construction of a modern combat system.
(Author’s affiliation: Institute of War Studies, Academy of Military Sciences)
The report to the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint operational capabilities and all-domain operational capabilities based on network information systems.” Today’s *PLA Daily* published an article stating that military intelligence is a new trend and direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, while using intelligence to drive mechanization and informatization to a higher level and a higher standard. Cyberspace, as a new operational domain, is a new field with high technological content and the greatest innovative vitality. Under the impetus of military intelligence, it is ushering in a period of rapid development opportunities.Illustration: Lei Yu
Military intelligence is driving the accelerated development of cyberspace operations.
■ Respected soldiers Zhou Dewang Huang Anwei
Three key technologies support the intelligentization of cyberspace weapons.
Intelligence is a kind of wisdom and capability; it is the perception, cognition, and application of laws by all systems with life cycles. Intelligentization is the solidification of this wisdom and capability into a state. Cyberspace weapons are weapons used to carry out combat missions in cyberspace. Their form is primarily software and code, essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:
First, there’s intelligent vulnerability discovery. Vulnerabilities are the foundation of cyber weapon design. The ransomware that spread globally this May exploited a vulnerability in the Microsoft operating system, causing a huge shock in the cybersecurity community. Vulnerabilities are expensive, with a single zero-day vulnerability costing tens to hundreds of thousands of dollars. Previously, vulnerability discovery relied mainly on experienced hackers using software tools to inspect and analyze code. However, at the International Cybersecurity Technology Competition finals held during this year’s China Internet Security Conference, participants demonstrated how intelligent robots could discover vulnerabilities on-site, then use these vulnerabilities to write network code, creating cyber weapons to breach target systems and capture the flag. This change signifies that vulnerability discovery has entered the era of intelligent technology.
Second, intelligent signal analysis and cryptography. Signals are the carriers of network data transmission, and cryptography is the last line of defense for network data security. Signal analysis and cryptography are core technologies for cyberspace warfare. Breaking through signals and cryptography is the fundamental path to entering cyberspace and a primary target of cyber weapons attacks. Intelligent signal analysis solves problems such as signal protocol analysis, modulation identification, and individual identification through technologies such as big data, cloud computing, and deep learning. Cryptography is the “crown jewel” of computational science. Intelligent cryptography, through the accumulation of cryptographic data samples, continuously learns and searches for patterns to find the key to decryption, thereby opening the last door of the network data “safe” and solving the critical links of network intrusion and access.
Thirdly, there is the design of intelligent weapon platforms. In 2009, the U.S. military proposed the “Cyber Aircraft” project, providing platforms similar to armored vehicles, ships, and aircraft for cyberspace operations. These platforms can automatically conduct reconnaissance, load cyber weapons, autonomously coordinate, and autonomously attack in cyberspace. When threatened, they can self-destruct and erase traces, exhibiting a certain degree of intelligence. In the future, the weapons loaded onto “Cyber Aircraft” will not be pre-written code by software engineers, but rather intelligent cyber weapons will be designed in real-time based on discovered vulnerabilities, enabling “order-based” development and significantly improving the targeting of cyberspace operations.
The trend of intelligentization in network-controlled weapons is becoming increasingly prominent.
Weapons controlled by cyberspace, or cyber-controlled weapons, are weapons that connect to a network, receive commands from cyberspace, execute cross-domain missions, and achieve combat effects in physical space. Most future combat weapon platforms will be networked, making military information networks essentially the Internet of Things (IoT). These networks connect to satellites, radars, drones, and other network entities, enabling control from perception and detection to tracking, positioning, and strike. The intelligence of cyber-controlled weapons is rapidly developing across land, sea, air, space, and cyber domains.
In 2015, Syria used a Russian robotic force to defeat militants. The operation employed six tracked robots, four wheeled robots, an automated artillery corps, several drones, and a command system. Commanders used the command system to direct drones to locate militants, and the robots then charged, supported by artillery and drone fire, inflicting heavy casualties. This small-scale battle marked the beginning of robotic “team” operations.
Network-controlled intelligent weapons for naval and air battlefields are under extensive research and development and verification. In 2014, the U.S. Navy used 13 unmanned surface vessels to demonstrate and verify the interception of enemy ships by unmanned surface vessel swarms, mainly by exchanging sensor data, and achieved good results. When tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became its prominent feature of intelligence.
The development of swarms of small, micro-sized drones for aerial combat is also rapid. In recent years, the U.S. Department of Defense has conducted multiple tests of the Partridge micro-drone, capable of deploying dozens or even hundreds at a time. By enhancing its coordination capabilities during reconnaissance missions, progress has been made in drone formation, command, control, and intelligent management.
Space-based cyber-control weapons are becoming increasingly “intelligent.” The space-based cyber-control domain primarily comprises two categories of weapons: reconnaissance and strike weapons. Satellites of various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various microsatellite constellations, satellites are exhibiting new characteristics: small size, rapid launch, large numbers, and greater intelligence. Microsatellite constellations offer greater flexibility and reliability in performing reconnaissance and communication missions, and currently, the world’s leading satellite powers are actively developing microsatellite constellation plans with broader coverage.
Various hypersonic strike weapons are cruising in the air, like a sword of Damocles hanging over people’s heads. The U.S. Air Force Research Laboratory stated that the “hypersonic strike weapon” will begin flight testing around 2018, and other countries are also actively developing similar weapons. The most prominent features of these weapons are their high speed, long range, and high level of intelligence.
Intelligent command information systems are changing traditional combat command methods.
Cyber weapons and weapons controlled by cyberspace constitute the “fist” of intelligent warfare, while the command information systems that direct the use of these weapons are the “brain” of intelligent warfare. Cyberspace operational command information systems must keep pace with the process of intelligentization. Currently, almost all global command information systems face the challenge of “intelligent lag.” Future warfare requires rapid and autonomous decision-making, which places higher demands on intelligent support systems.
In 2007, the U.S. Defense Advanced Research Projects Agency (DARPA) launched the “Deep Green Program,” a research and development program for command and control systems, aiming to enable computer-aided commanders to make rapid decisions and gain a decisive advantage. This is a campaign-level command information system, developed to be embedded into the U.S. Army’s brigade-level C4ISR wartime command information system, enabling intelligent command by commanders. Even today, the U.S. military has not relaxed its development of intelligent command information systems.
In cyberspace warfare, network targets are represented by a single IP address accessing the network. Their sheer number makes efficient manual operation difficult, necessitating the support of intelligent command and information systems. Currently, intelligent command and information systems need to achieve functions such as intelligent intelligence analysis, intelligent sensing, intelligent navigation and positioning, intelligent decision support, intelligent collaboration, intelligent assessment, and intelligent unmanned combat. In particular, they must enable swarm operational control of unmanned network control systems. All of these requirements urgently demand intelligent command and information systems, necessitating accelerated research and development and application of relevant key technologies.
In conclusion, intelligent cyber weapons and network control weapons, coordinated through intelligent information systems, will form enormous combat capabilities, essentially enabling them to carry out all actions in current combat scenarios. Future warfare, from command force organization to target selection, action methods, and tactical applications, will all unfold within an intelligent context. The “gamification” of warfare will become more pronounced, and operational command methods will undergo significant changes.
In future battlefields, combat will require not only courage but also intelligence.
■ Yang Jian, Zhao Lu
Currently, artificial intelligence is entering a new stage of development and is rapidly penetrating various fields. Influenced by this process, military competition among nations surrounding intelligent technologies has begun. Our army has always been a brave and tenacious people’s army, determined to fight and win. On the future battlefield, we should continue to carry forward our glorious traditions while more broadly mastering and utilizing the latest technological achievements to develop more intelligent weapons and equipment, thereby gaining a decisive advantage on the future battlefield.
Intelligentization is a trend in human societal development, and intelligent warfare is rapidly approaching. The development of military intelligence has a solid foundation thanks to successful innovations that transcend existing computational models, the gradual popularization of nanotechnology, and breakthroughs in research on the mechanisms of the human brain. Consequently, intelligent weaponry is increasingly prominent, surpassing and even replacing human capabilities in areas such as intelligence analysis and combat response. Furthermore, intelligent weaponry offers significant advantages in terms of manpower requirements, comprehensive support, and operating costs, and is increasingly becoming the dominant force in warfare.
The development and application of intelligent weaponry have proven to expand the scope of military operations and significantly enhance the combat effectiveness of troops. In the battlefields of Afghanistan and Iraq, drones have undertaken most of the reconnaissance, intelligence, and surveillance support missions, and have been responsible for approximately one-third of the air strike missions. In the past two years, Russia has also repeatedly used highly intelligent unmanned reconnaissance aircraft and combat robots in the Syrian theater. Intelligent weaponry is increasingly demonstrating its significant value, surpassing that of traditional weapons.
In future wars, the contest of intelligent combat systems will be the key to victory in high-level competition and ultimate showdowns. As the development of technology-supported military means becomes increasingly uneven, whoever first acquires the capability to conduct intelligent warfare will be better positioned to seize the initiative on the battlefield. Those with a technological advantage will minimize the costs of war, while the weaker will inevitably suffer enormous losses and pay a heavy price. We must not only accelerate innovation in core technologies and the development of weaponry, but also research and explore organizational structures, command methods, and operational models adapted to the development of intelligent military operations. Furthermore, we must cultivate a talent pool capable of promoting intelligent military development and forging intelligent combat capabilities, fully leveraging the overall effectiveness of our military’s combat system, and winning wars in a more “intelligent” manner against our adversaries.
Since the beginning of the new century, the rapid development of intelligent technologies, with artificial intelligence (AI) at its core, has accelerated the process of a new round of military revolution, and competition in the military field is rapidly moving towards an era of intellectual dominance. Combat elements represented by “AI, cloud, network, cluster, and terminal,” combined in diverse ways, constitute a new battlefield ecosystem, completely altering the mechanisms of victory in warfare. AI systems based on models and algorithms will be the core combat capability, permeating all aspects and stages, playing a multiplicative, transcendent, and proactive role. Platforms are controlled by AI, clusters are guided by AI, and systems are made to decision by AI. Traditional human-centric tactics are being replaced by AI models and algorithms, making intellectual dominance the core control in future warfare. The stronger the intelligent combat capability, the greater the hope of subduing the enemy without fighting.
[Author Biography] Wu Mingxi is the Chief Scientist and Researcher of China Ordnance Industry Group, Deputy Secretary-General of the Science and Technology Committee of China Ordnance Industry Group, and Deputy Director of the Science and Technology Committee of China Ordnance Science Research Institute. His research focuses on national defense science and technology and weaponry development strategies and planning, policies and theories, management and reform research. His major works include “Intelligent Warfare – AI Military Vision,” etc.
Competition in the Age of Intellectual Property
The history of human civilization is a history of understanding and transforming nature, and also a history of understanding and liberating oneself. Through the development of science and technology and the creation and application of tools, humanity has continuously enhanced its capabilities, reduced its burdens, freed itself from constraints, and liberated itself. The control of war has also constantly changed, enriched, and evolved with technological progress, the expansion of human activity space, and the development of the times. Since the 19th century, humanity has successively experienced the control and struggle for land power, sea power, air power, space power, and information power. With the rapid development of intelligent technologies such as artificial intelligence (AI), big data, cloud computing, bio-interdisciplinary technologies, unmanned systems, and parallel simulation, and their deep integration with traditional technologies, humanity’s ability to understand and transform nature has been transformed in terms of epistemology, methodology, and operational mechanisms. This is accelerating the major technological revolutions in machine intelligence, bionic intelligence, swarm intelligence, human-machine integrated intelligence, and intelligent perception, intelligent decision-making, intelligent action, intelligent support, as well as intelligent design, research and development, testing, and manufacturing, thus accelerating the evolution of warfare towards the control and struggle for intellectual power.
The rapid development of intelligent technology has garnered significant attention from major countries worldwide, becoming a powerful driving force for the leapfrog development of military capabilities. The United States and Russia have placed intelligent technology at the core of maintaining their strategic status as global military powers, and significant changes have occurred in their development concepts, models, organizational methods, and innovative applications. They have also carried out substantive applications and practices of military intelligence (see Figure 1).
In August 2017, the U.S. Department of Defense stated that future AI warfare was inevitable and that the U.S. needed to “take immediate action” to accelerate the development of AI warfare technologies. The U.S. military’s “Third Offset Strategy” posits that a military revolution, characterized by intelligent armies, autonomous equipment, and unmanned warfare, is underway; therefore, they have identified intelligent technologies such as autonomous systems, big data analytics, and automation as key development directions. In June 2018, the U.S. Department of Defense announced the establishment of the Joint Artificial Intelligence Center, which, guided by the national AI development strategy, coordinates the planning and construction of the U.S. military’s intelligent military system. In February 2019, then-President Trump signed the “American Artificial Intelligence Initiative” executive order, emphasizing that maintaining U.S. leadership in AI is crucial for safeguarding U.S. economic and national security, and requiring the federal government to invest all resources in promoting innovation in the U.S. AI field. In March 2021, the U.S. National Security Council on Artificial Intelligence released a research report stating that, “For the first time since World War II, the technological advantage that has been the backbone of U.S. economic and military power is under threat. If current trends do not change, China possesses the power, talent, and ambition to surpass the United States as the global leader in artificial intelligence within the next decade.” The report argues that the United States must use artificial intelligence swiftly and responsibly to prepare for these threats in order to safeguard national security and enhance defense capabilities. The report concludes that artificial intelligence will transform the world, and the United States must take a leading role.
Russia also attaches great importance to the technological development and military application of artificial intelligence. The Russian military generally believes that artificial intelligence will trigger the third revolution in the military field, following gunpowder and nuclear weapons. In September 2017, Russian President Vladimir Putin publicly stated that artificial intelligence is the future of Russia, and whoever becomes the leader in this field will dominate the world. In October 2019, Putin approved the “Russian National Strategy for the Development of Artificial Intelligence until 2030,” aiming to accelerate the development and application of artificial intelligence in Russia and seek a world-leading position in the field.
In July 2017, the State Council of China issued the “New Generation Artificial Intelligence Development Plan,” which put forward the guiding ideology, strategic goals, key tasks and safeguard measures for the development of new generation artificial intelligence towards 2030, and deployed efforts to build a first-mover advantage in the development of artificial intelligence and accelerate the construction of an innovative country and a world-class science and technology power.
Other major countries and military powers around the world have also launched their own artificial intelligence development plans, indicating that the global struggle for “intellectual power” has fully unfolded. Land power, sea power, air power, space power, information power, and intellectual power are all results of technological progress and products of their time, each with its own advantages and disadvantages, and some theories are constantly expanding with the changing times. From the development trend of control over warfare since modern times, it can be seen that information power and intellectual power involve the overall situation, carrying greater weight and influence. In the future, with the accelerated pace of intelligent development, intellectual power will become a rapidly growing new type of battlefield control with greater strategic influence on the overall combat situation.
The essence of military intelligence lies in leveraging intelligent technologies to establish diverse identification, decision-making, and control models for the war system. These models constitute artificial intelligence (AI), the core of the new era’s intellectual power struggle. The war system encompasses: equipment systems such as individual units, clusters, manned/unmanned collaborative operations, and multi-domain and cross-domain warfare; combat forces such as individual soldiers, squads, detachments, combined arms units, and theater command; operational links such as networked perception, mission planning and command, force coordination, and comprehensive support; specialized systems such as network attack and defense, electronic warfare, public opinion control, and infrastructure management; and military industrial capabilities such as intelligent design, research and development, production, mobilization, and support. AI, in the form of chips, algorithms, and software, is embedded in every system, level, and link of the war system, forming a systematic brain. Although AI is only a part of the war system, its increasingly powerful “brain-like” functions and capabilities “surpassing human limits” will inevitably dominate the overall situation of future warfare.
Battlefield Ecosystem Reconstruction
Traditional warfare involves relatively independent and separate combat elements, resulting in a relatively simple battlefield ecosystem, primarily consisting of personnel, equipment, and tactics. In the intelligent era, warfare is characterized by significant integration, correlation, and interaction among various combat elements. This will lead to substantial changes in the battlefield ecosystem, forming a combat system, cluster system, and human-machine system comprised of an AI brain, distributed cloud, communication networks, collaborative groups, and various virtual and physical terminals—collectively known as the “AI, Cloud, Network, Cluster, Terminal” intelligent ecosystem (see Figure 2). Among these, AI plays a dominant role.
AI Brain System. The AI brain system of the intelligent battlefield is a networked and distributed system that is inseparable from and interdependent with combat platforms and missions. It can be classified in several ways. Based on function and computing power, it mainly includes cerebellum, swarm brain, midbrain, hybrid brain, and cerebrum; based on combat missions and stages, it mainly includes sensor AI, combat mission planning and decision-making AI, precision strike and controllable destruction AI, network attack and defense AI, electronic warfare AI, intelligent defense AI, and integrated support AI; based on form, it mainly includes embedded AI, cloud AI, and parallel system AI.
The cerebellum mainly refers to the embedded AI in sensor platforms, combat platforms, and support platforms, which mainly performs tasks such as battlefield environment detection, target recognition, rapid maneuver, precision strike, controlled destruction, equipment support, maintenance support, and logistical support.
“Swarm brain” mainly refers to the AI that enables intelligent control of unmanned swarm platforms on the ground, in the air, at sea, in the water, and in space. It mainly performs tasks such as collaborative perception of the battlefield environment, swarm maneuver, swarm attack, and swarm defense. The key components include algorithms for homogeneous swarm systems and algorithms for heterogeneous systems such as manned-unmanned collaboration.
The midbrain mainly refers to the AI system of the command center, data center, and edge computing of the front-line units on the battlefield. It mainly performs dynamic planning, autonomous decision-making, and auxiliary decision-making for tactical unit combat missions under online and offline conditions.
Hybrid brain mainly refers to a hybrid decision-making system in which commanders and machine AI collaborate in combat operations of organized units. Before the battle, it mainly performs human-based combat mission planning; during the battle, it mainly performs adaptive dynamic mission planning and adjustment based on machine AI; and after the battle, it mainly performs hybrid decision-making tasks oriented towards counter-terrorism and defense.
The “brain” primarily refers to the model, algorithm, and tactical libraries of the theater command center and data center, playing a key supporting role in campaign and strategic decision-making. Due to the abundant data, various battlefield AI systems can be trained and modeled here, and then loaded into different mission systems once mature.
In future battlefields, there will be other AIs of different functions, types, and sizes, such as sensor AI, which mainly includes image recognition, electromagnetic spectrum recognition, sound recognition, speech recognition, and human activity behavior recognition. With the rapid development and widespread application of intelligence, AIs of all sizes will exist throughout society, serving the public and society in peacetime, and potentially serving the military in wartime.
Distributed cloud. Military cloud differs from civilian cloud. Generally speaking, a military cloud platform is a distributed resource management system that uses communication networks to search, collect, aggregate, analyze, calculate, store, and distribute operational information and data. By constructing a distributed system and a multi-point fault-tolerant backup mechanism, a military cloud platform possesses powerful intelligence sharing capabilities, data processing capabilities, resilience, and self-healing capabilities. It can provide fixed and mobile, public and private cloud services, achieving “one-point collection, everyone sharing,” greatly reducing information flow links, making command processes flatter and faster, and avoiding redundant and decentralized construction at all levels.
From the perspective of future intelligent warfare needs, military cloud needs to construct at least a four-tiered system: tactical front-end cloud, troop cloud, theater cloud, and strategic cloud. Based on operational elements, it can also be divided into specialized cloud systems such as intelligence cloud, situational awareness cloud, firepower cloud, information warfare cloud, support cloud, and nebula.
1. Front-end cloud primarily refers to computing services provided by units, squads, and platforms, including information perception, target identification, battlefield environment analysis, autonomous and assisted decision-making, and operational process and effect evaluation. The role of front-end cloud is mainly reflected in two aspects. First, it facilitates the sharing and collaboration of computing and storage resources among platforms, and the interactive integration of intelligent combat information. For example, if a platform or terminal is attacked, relevant perception information, damage status, and historical data will be automatically backed up, replaced, and updated through a networked cloud platform, and the relevant information will be uploaded to the higher command post. Second, it provides online information services and intelligent software upgrades for offline terminals.
2. Military cloud primarily refers to the cloud systems built at the battalion and brigade level for operations. Its focus is on providing computing services such as intelligent perception, intelligent decision-making, autonomous action, and intelligent support in response to different threats and environments. The goal of military cloud construction is to establish a networked, automatically backed-up, distributed cloud system connected to multiple links with higher-level units. This system should meet the computing needs of different forces, including reconnaissance and perception, mobile assault, command and control, firepower strikes, and logistical support, as well as the computing needs of various combat missions such as tactical joint operations, manned/unmanned collaboration, and swarm offense and defense.
3. Theater Cloud primarily provides battlefield weather, geographical, electromagnetic, human, and social environmental factors and information data for the entire operational area. It offers comprehensive information on troop deployments, weaponry, movement changes, and combat losses for both sides, as well as relevant information from higher command, friendly forces, and civilian support. Theater Cloud should possess networked, customized, and intelligent information service capabilities. It should interconnect with various operational units through military communication networks (space-based, airborne, ground-based, maritime, and underwater) and civilian communication networks (under secure measures) to ensure efficient, timely, and accurate information services.
4. Strategic cloud is mainly established by a country’s defense system and military command organs. It is primarily based on military information and covers comprehensive information and data related to defense technology, defense industry, mobilization support, economic and social support capabilities, as well as politics, diplomacy, and public opinion. It provides core information, assessments, analyses, and suggestions such as war preparation, operational planning, operational schemes, operational progress, battlefield situation, and battle situation analysis; and provides supporting data such as strategic intelligence, the military strength of adversaries, and war mobilization potential.
The various clouds mentioned above are interconnected, exhibiting both hierarchical and horizontal relationships of collaboration, mutual support, and mutual service. The core tasks of the military cloud platform are twofold: first, to provide data and computing support for building an AI-powered intelligent warfare system; and second, to provide operational information, computing, and data support for various combat personnel and weapon platforms. Furthermore, considering the needs of terminals and group operations, it is necessary to pre-process some cloud computing results, models, and algorithms into intelligent chips and embed them into weapon platforms and group terminals, enabling online upgrades or offline updates.
Communication networks. Military communication and network information constitute a complex super-network system. Since military forces primarily operate in land, sea, air, space, field maneuver, and urban environments, their communication networks encompass strategic and tactical communications, wired and wireless communications, secure communications, and civilian communications. Among these, wireless, mobile, and free-space communication networks are the most crucial components of the military network system, and related integrated electronic information systems are gradually established based on these communication networks.
Military communications in the mechanized era primarily followed the platform, terminal, and user, satisfying specific needs but resulting in numerous silos and extremely poor interconnectivity. In the information age, this situation is beginning to change. Currently, military communication networks are adopting new technological systems and development models, characterized by two main features: first, “network-data separation,” where information transmission does not depend on any specific network transmission method—”network access is all that matters”—any information can be delivered as long as the network link is unobstructed; second, internet-based architecture, utilizing IP addresses, routers, and servers to achieve “all roads lead to Beijing,” i.e., military networking or grid-based systems. Of course, military communication networks differ from civilian networks. Strategic and specialized communication needs exist at all times, such as nuclear button communications for nuclear weapons and command and control of strategic weapons, information transmission for satellite reconnaissance, remote sensing, and strategic early warning, and even specialized communications in individual soldier rooms and special operations conditions. These may still adopt a mission-driven communication model. Even so, standardization and internet connectivity are undoubtedly the future trends in military communication network development. Otherwise, not only will the number of battlefield communication frequency bands, radios, and information exchange methods increase, leading to self-interference, mutual interference, and electromagnetic compatibility difficulties, but radio spectrum management will also become increasingly complex. More importantly, it will be difficult for platform users to achieve automatic communication based on IP addresses and routing structures, unlike email on the internet where a single command can be sent to multiple users. Future combat platforms will certainly be both communication user terminals and also function as routers and servers.
Military communication network systems mainly include space-based communication networks, military mobile communication networks, data links, new communication networks, and civilian communication networks.
1. Space-Based Information Networks. The United States leads in the construction and utilization of space-based information networks. This is because more than half of the thousands of orbiting platforms and payloads in space are American-owned. Following the Gulf War, and especially during the Iraq War, the US military accelerated the application and advancement of space-based information networks through wartime experience. After the Iraq War, through the utilization of space-based information and the establishment of IP-based interconnection, nearly 140 vertical “chimneys” from the Gulf War period were completely interconnected horizontally, significantly shortening the “Out-of-Target-Action” (OODA) loop time. The time from space-based sensors to the shooter has been reduced from tens of hours during the Gulf War to approximately 20 seconds currently using artificial intelligence for identification.
With the rapid development of small satellite technology, low-cost, multi-functional small satellites are becoming increasingly common. As competition intensifies in commercial launches, costs are dropping dramatically, and a single launch can carry several, a dozen, or even dozens of small satellites. If miniaturized electronic reconnaissance, visible light and infrared imaging, and even quantum dot micro-spectroscopy instruments are integrated onto these satellites, achieving integrated reconnaissance, communication, navigation, meteorological, and mapping functions, the future world and battlefield will become much more transparent.
2. Military Mobile Communication Networks. Military mobile communication networks have three main uses. First, command and control between various branches of the armed forces and combat units in joint operations; this type of communication requires a high level of confidentiality, reliability, and security. Second, communication between platforms and clusters, requiring anti-jamming capabilities and high reliability. Third, command and control of weapon systems, mostly handled through data links.
Traditional military mobile communication networks are mostly “centralized, vertically focused, and tree-like structures.” With the acceleration of informatization, the trend towards “decentralized, self-organizing networks, and internet-based” is becoming increasingly apparent. As cognitive radio technology matures and is widely adopted (see Figure 3), future network communication systems will be able to automatically identify electromagnetic interference and communication obstacles on the battlefield, quickly locate available spectrum resources, and conduct real-time communication through frequency hopping and other methods. Simultaneously, software and cognitive radio technology can be compatible with different communication frequency bands and waveforms, facilitating seamless transitions from older to newer systems.
3. Data Links. A data link is a specialized communication technology that uses time division, frequency division, and code division to transmit pre-agreed, periodic, or irregular, regular or irregular critical information between various combat platforms. Unless fully understood or deciphered by the enemy, it is very difficult to interfere with. Data links are mainly divided into two categories: dedicated and general-purpose. Joint operations, formation coordination, and swarm operations primarily utilize general-purpose data links. Satellite data links, UAV data links, missile-borne data links, and weapon fire control data links are currently mostly dedicated. In the future, generalization will be a trend, and specialization will decrease. Furthermore, from the perspective of the relationship between platforms and communication, the information transmission and reception of platform sensors and internal information processing generally follow the mission system, exhibiting strong specialization characteristics, while communication and data transmission between platforms are becoming increasingly general-purpose.
4. New Communication Technologies. Traditional military communication primarily relies on microwave communication. Due to its large divergence angle and numerous application platforms, corresponding electronic jamming and microwave attack methods have developed rapidly, making it easy to carry out long-range interference and damage. Therefore, new communication technologies such as millimeter waves, terahertz waves, laser communication, and free-space optical communication have become important choices that are both anti-jamming and easy to implement high-speed, high-capacity, and high-bandwidth communication. Although high-frequency electromagnetic waves have good anti-jamming performance due to their smaller divergence angle, achieving precise point-to-point aiming and omnidirectional communication still presents certain challenges, especially under conditions of high-speed maneuvering and rapid trajectory changes of combat platforms. How to achieve alignment and omnidirectional communication is still under technological exploration.
5. Civilian Communication Resources. The effective utilization of civilian communication resources is a strategic issue that must be considered and cannot be avoided in the era of intelligentization. In the future, leveraging civilian communication networks, especially 5G/6G mobile communications, for open-source information mining and data correlation analysis to provide battlefield environment, target, and situational information will be crucial for both combat and non-combat military operations. In non-combat military operations, especially overseas peacekeeping, rescue, counter-terrorism, and disaster relief, the military’s dedicated communication networks can only be used within limited areas and regions, raising the question of how to communicate and connect with the outside world. There are two main ways to utilize civilian communication resources: one is to utilize civilian satellite communication resources, especially small satellite communication resources; the other is to utilize civilian mobile communication and internet resources.
The core issue in the interactive utilization of military and civilian communication resources is addressing security and confidentiality. One approach is to employ firewalls and encryption, directly utilizing civilian satellite communications and global mobile communication infrastructure for command and communication; however, the risks of hacking and cyberattacks remain. Another approach is to utilize emerging technologies such as virtualization, intranets, semi-physical isolation, one-way transmission, mimicry defense, and blockchain to address these challenges.
Collaborative swarms. By simulating the behavior of bee colonies, ant colonies, flocks of birds, and schools of fish in nature, this research studies the autonomous collaborative mechanisms of swarm systems such as drones and smart munitions to accomplish combat missions such as attacking or defending against enemy targets. This can achieve strike effects that are difficult to achieve with traditional combat methods and approaches. Collaborative swarms are an inevitable trend in intelligent development and a major direction and key area of intelligent construction. No matter how advanced the combat performance or how powerful the functions of a single combat platform, it cannot form a collective or scalable advantage. Simply accumulating quantity and expanding scale, without autonomous, collaborative, and orderly intelligent elements, is just a disorganized mess.
Collaborative swarms mainly comprise three aspects: first, manned/unmanned collaborative swarms formed by the intelligent transformation of existing platforms, primarily constructed from large and medium-sized combat platforms; second, low-cost, homogeneous, single-function, and diverse combat swarms, primarily constructed from small unmanned combat platforms and munitions; and third, biomimetic swarms integrating human and machine intelligence, possessing both biological and machine intelligence, primarily constructed from highly autonomous humanoid, reptile-like, avian-like, and marine-like organisms. Utilizing collaborative swarm systems for cluster warfare, especially swarm warfare, offers numerous advantages and characteristics.
1. Scale Advantage. A large unmanned system can disperse combat forces, increasing the number of targets the enemy can attack and forcing them to expend more weapons and ammunition. The survivability of a swarm, due to its sheer number, is highly resilient and resilient; the survivability of a single platform becomes less important, while the overall advantage becomes more pronounced. The sheer scale prevents drastic fluctuations in combat effectiveness, because unlike high-value manned combat platforms and complex weapon systems such as the B-2 strategic bomber and advanced F-22 and F-35 fighter jets, the loss of a low-cost unmanned platform, once attacked or destroyed, results in a sharp decline in combat effectiveness. Swarm operations can launch simultaneous attacks, overwhelming enemy defenses. Most defensive systems have limited capabilities, able to handle only a limited number of threats at a time. Even with dense artillery defenses, a single salvo can only hit a limited number of targets, leaving some to escape. Therefore, swarm systems possess extremely strong penetration capabilities.
2. Cost Advantage. Swarm warfare, especially bee warfare, primarily utilizes small and medium-sized UAVs, unmanned platforms, and munitions. These have simple product lines, are produced in large quantities, and have consistent quality and performance requirements, facilitating low-cost mass production. While the pace of upgrades and replacements for modern weapons and combat platforms has accelerated significantly, the cost increases have also been staggering. Since World War II, weapons development and procurement prices have shown that equipment costs and prices have risen much faster than performance improvements. Main battle tanks during the Gulf War cost 40 times more than those during World War II, while combat aircraft and aircraft carriers cost as much as 500 times more. From the Gulf War to 2020, the prices of various main battle weapons and equipment increased several times, tens of times, or even hundreds of times. In comparison, small and medium-sized UAVs, unmanned platforms, and munitions with simple product lines have a clear cost advantage.
3. Autonomous Advantage. Under a unified spatiotemporal reference platform, through networked active and passive communication and intelligent perception of battlefield targets, individual platforms in the group can accurately perceive the distance, speed, and positional relationships between each other. They can also quickly identify the nature, size, priority, and distance of target threats, as well as their own distance from neighboring platforms. With pre-defined operational rules, one or more platforms can conduct simultaneous or wave-based attacks according to the priority of target threats, or they can attack in groups simultaneously or in multiple waves (see Figure 4). Furthermore, the priority order for subsequent platforms to replace a damaged platform can be clearly defined, ultimately achieving autonomous decision-making and action according to pre-agreed operational rules. This intelligent combat operation, depending on the level of human involvement and the difficulty of controlling key nodes, can be either completely autonomous, or semi-autonomous, with human intervention.
4. Decision-making advantage. The future battlefield environment is becoming increasingly complex, with combatants vying for dominance in intense strategic maneuvering and confrontation. Therefore, relying on humans to make decisions in a high-intensity confrontation environment is neither timely nor reliable. Thus, only by entrusting automated environmental adaptation, automatic target and threat identification, autonomous decision-making, and coordinated action to collaborative groups can adversaries be rapidly attacked or effective defenses implemented, thereby gaining battlefield advantage and initiative.
The coordination group brings new challenges to command and control. How to implement command and control of the cluster is a new strategic issue. Control can be implemented in a hierarchical and task-based manner, which can be roughly divided into centralized control mode, hierarchical control mode, consistent coordination mode, and spontaneous coordination mode. [1] Various forms can be adopted to achieve human control and participation. Generally speaking, the smaller the tactical unit, the more autonomous action and unmanned intervention should be adopted; at the level of organized unit operations, since the control of multiple combat groups is involved, centralized planning and hierarchical control are required, and human participation should be limited; at the higher strategic and operational levels, the cluster is only used as a platform weapon and combat style, which requires unified planning and layout, and the degree of human participation will be higher. From the perspective of mission nature, the operation and use of strategic weapons, such as nuclear counterattacks, requires human operation and is not suitable for autonomous handling by weapon systems. When conducting offensive and defensive operations against important or high-value targets, such as decapitation strikes, full human participation and control are necessary, while simultaneously leveraging the autonomous functions of the weapon systems. For offensive operations against tactical targets, if the mission requires lethal strikes and destruction, limited human participation is permissible, or, after human confirmation, the coordinated group can execute the operation automatically. When performing non-strike missions such as reconnaissance, surveillance, target identification, and clearance, or short-duration missions such as air defense and missile defense where human involvement is difficult, the coordinated group should primarily execute these tasks automatically, without human involvement. Furthermore, countermeasures for swarm operations must be carefully studied. Key research should focus on countermeasures against electronic deception, electromagnetic interference, cyberattacks, and high-power microwave weapons, electromagnetic pulse bombs, and artillery-missile systems, as their effects are relatively significant. Simultaneously, research should be conducted on countermeasures such as laser weapons and swarm-to-swarm tactics, gradually establishing a “firewall” that humans can effectively control against coordinated groups.
Virtual and physical terminals. Virtual and physical terminals mainly refer to various terminals linked to the cloud and network, including sensors with pre-embedded intelligent modules, command and control platforms, weapon platforms, support platforms, related equipment and facilities, and combat personnel. Future equipment and platforms will be cyber-physical systems (CPS) and human-computer interaction systems with diverse front-end functions, cloud-based back-end support, virtual-physical interaction, and online-offline integration. Simple environmental perception, path planning, platform maneuverability, and weapon operation will primarily rely on front-end intelligence such as bionic intelligence and machine intelligence. Complex battlefield target identification, combat mission planning, networked collaborative strikes, combat situation analysis, and advanced human-computer interaction will require information, data, and algorithm support from back-end cloud platforms and cloud-based AI. The front-end intelligence and back-end cloud intelligence of each equipment platform should be combined for unified planning and design, forming a comprehensive advantage of integrated front-end and back-end intelligence. Simultaneously, virtual soldiers, virtual staff officers, virtual commanders, and their intelligent and efficient interaction with humans are also key areas and challenges for future research and development.
Qualitative change in the form of warfare
Since modern times, human society has mainly experienced large-scale mechanized warfare and smaller-scale informationized local wars. The two world wars that occurred in the first half of the 20th century were typical examples of mechanized warfare. The Gulf War, the Kosovo War, the Afghanistan War, the Iraq War, and the Syrian War since the 1990s fully demonstrate the form and characteristics of informationized warfare. In the new century and new stage, with the rapid development and widespread application of intelligent technologies, the era of intelligent warfare, characterized by data and computing, models and algorithms, is about to arrive (see Figure 5).
Mechanization is a product of the industrial age, focusing on mechanical power and electrical technology. Its weaponry primarily manifests as tanks, armored vehicles, artillery, aircraft, and ships, corresponding to mechanized warfare. Mechanized warfare is mainly based on classical physics, represented by Newton’s laws, and large-scale socialized production. It is characterized by large-scale, linear, and contact warfare. Tactically, it typically involves on-site reconnaissance, terrain surveys, understanding the opponent’s forward and rear deployments, making decisions based on one’s own capabilities, implementing offensive or defensive maneuvers, and assigning tasks, coordinating operations, and ensuring logistical support. It exhibits clear characteristics such as hierarchical command and control and sequential temporal and spatial operations.
Information technology, a product of the information age, focuses on information technologies such as computers and network communications. Its equipment primarily manifests as radar, radios, satellites, missiles, computers, military software, command and control systems, cyber and electronic warfare systems, and integrated electronic information systems, corresponding to the form of information warfare. Information warfare is mainly based on the three laws of computers and networks (Moore’s Law, Gilder’s Law, and Metcalfe’s Law), emphasizing integrated, precise, and three-dimensional operations. It establishes a seamless and rapid information link from sensor to shooter, seizing information dominance and achieving preemptive detection and strike. Tactically, it requires detailed identification and cataloging of the battlefield and targets, highlighting the role of networked perception and command and control systems, and placing new demands on the interconnectivity and other information functions of platforms. Due to the development of global information systems and diversified network communications, information warfare blurs the lines between front and rear lines, emphasizing horizontal integration of reconnaissance, control, strike, assessment, and support, as well as the integration and flattening of strategy, campaign, and tactics.
Intelligentization is a product of the knowledge economy era. Technologically, it focuses on intelligent technologies such as artificial intelligence, big data, cloud computing, cognitive communication, the Internet of Things, biological cross-disciplinary, hybrid enhancement, swarm intelligence, autonomous navigation and collaboration. In terms of equipment, it mainly manifests as unmanned platforms, intelligent munitions, swarm systems, intelligent sensing and database systems, adaptive mission planning and decision-making systems, combat simulation and parallel training systems, military cloud platforms and service systems, public opinion early warning and guidance systems, and intelligent wearable systems, which correspond to the form of intelligent warfare.
Intelligent warfare, primarily based on biomimetic, brain-like principles, and AI-driven battlefield ecosystems, is a new combat form characterized by “energy mobility and information interconnection,” supported by “network communication and distributed cloud,” centered on “data computing and model algorithms,” and focused on “cognitive confrontation.” It features multi-domain integration, cross-domain offense and defense, unmanned operation, cluster confrontation, and integrated interaction between virtual and physical spaces.
Intelligent warfare aims to meet the needs of nuclear and conventional deterrence, joint operations, all-domain operations, and non-war military operations. It focuses on multi-domain integrated operations encompassing cognitive, informational, physical, social, and biological domains, exhibiting characteristics such as distributed deployment, networked links, flattened structures, modular combinations, adaptive reconfiguration, parallel interaction, focused energy release, and nonlinear effects. Its winning mechanisms overturn traditions, its organizational forms undergo qualitative changes, its operational efficiency is unprecedentedly improved, and its combat power generation mechanisms are transformed. These substantial changes are mainly reflected in the following ten aspects.
The Winning Mechanism Dominated by AI. Under intelligent conditions, new combat elements represented by “AI, cloud, network, cluster, and terminal” will reshape the battlefield ecosystem, completely changing the winning mechanism of war. Among them, AI systems based on models and algorithms are the core combat capability, permeating all aspects and links, playing a multiplicative, transcendent, and proactive role. Platforms are controlled by AI, clusters are guided by AI, and systems are made by AI. The traditional human-based combat methods are being replaced by AI models and algorithms. Algorithmic warfare will play a decisive role in war, and the combat system and process will ultimately be dominated by AI. The right to intelligence will become the core control in future warfare.
Different eras and different forms of warfare result in different battlefield ecosystems, with entirely different compositions of combat elements and winning mechanisms. Mechanized warfare is platform-centric warfare, with “movement” as its core and firepower and mobility as its dominant forces, pursuing energy delivery and release through equipment. Combat elements mainly include: personnel + mechanized equipment + tactics. The winning mechanism is based on human-led decision-making in the operational use of mechanized equipment, achieving victory with superior numbers, overwhelming smaller forces, and controlling slower forces, with comprehensive, efficient, and sustainable mobilization capabilities playing decisive or important roles. Informationized warfare is network-centric warfare, with “connectivity” as its core and information power as its dominant force, pursuing energy aggregation and release through networks. Combat elements and their interrelationships mainly consist of “personnel + informationized equipment + tactics” based on network information. Information permeates personnel, equipment, and tactics, establishing seamless information connections “from sensor to shooter,” achieving system-wide and networked combat capabilities, using systems against localized forces, networks against discrete forces, and speed against slow forces, becoming a crucial mechanism for achieving victory in war. Information plays a multiplier role in equipment and combat systems, but the platform remains human-centric. Information assists in decision-making, but most decisions are still made by humans. Intelligent warfare is cognitive-centric warfare, with “computation” at its core and intelligence as the dominant force. Intelligence will carry more weight than firepower, mobility, and information power, pursuing the use of intelligence to control and dominate capabilities, using the virtual to overcome the real, and achieving victory through superiority. The side with more AI and whose AI is smarter will have greater initiative on the battlefield. The main combat elements and their interrelationships are: AI × (cloud + network + swarm + human + equipment + tactics), which can be simplified to an interconnected and integrated battlefield ecosystem composed of “AI, cloud, network, swarm, and terminal” elements. In the future, AI’s role in warfare will become increasingly significant and powerful, ultimately playing a decisive and dominant role.
Emphasizing the leading role of AI does not deny the role of humans in warfare. On the one hand, human intelligence has been pre-emptively utilized and endowed into AI; on the other hand, at the pre-war, post-war, and strategic levels, for a considerable period of time and in the foreseeable future, AI cannot replace humans.
Modern warfare is becoming increasingly complex, with combat operations moving at ever faster paces. The ability to quickly identify and process massive amounts of information, respond rapidly to battlefield situations, and formulate decisive strategies is far beyond human capability and exceeds the limits of current technology (see Tables 1 and 2). As AI becomes more widely applied and plays a more significant role in warfare, operational processes will be reshaped, and the military kill chain will be accelerated and made more efficient. Rapid perception, decision-making, action, and support will become crucial factors for victory in future intelligent warfare.
In the future, intelligent recognition and pattern recognition of images, videos, electromagnetic spectrum, and voice will enable rapid and accurate target identification from complex battlefield information gathered by air, land, and sea sensor networks. Utilizing big data technology, through multi-source, multi-dimensional directional search and intelligent correlation analysis, not only can various targets be accurately located, but also human behavior, social activities, military operations, and public opinion trends can be precisely modeled, gradually improving the accuracy of early warning and prediction. Based on precise battlefield information, each theater and battlefield can adaptively implement mission planning, autonomous decision-making, and operational process control through extensive parallel modeling and simulation training in virtual space. AI on various combat platforms and cluster systems can autonomously and collaboratively execute tasks around operational objectives according to mission planning, and proactively adjust to changes that may occur at any time. By establishing a distributed, networked, intelligent, and multi-modal support system and pre-positioned deployment, rapid and precise logistics distribution, material supply, and intelligent maintenance can be implemented. In summary, through the widespread application of intelligent technologies and the proactive and evolving capabilities of various AI systems, the entire operational process—including planning, prediction, perception, decision-making, implementation, control, and support—can be re-engineered to achieve a “simple, fast, efficient, and controllable” operational workflow. This will gradually free humanity from the burdens of arduous combat tasks. Operational workflow re-engineering will accelerate the pace, compress time, and shorten processes on the future battlefield.
The winning mechanism dominated by AI is mainly manifested in combat capabilities, methods, strategies, and measures. It fully integrates human intelligence, approaches human intelligence, surpasses human limits, leverages the advantages of machines, and embodies advancement, disruption, and innovation. This advancement and innovation is not a simple extension or increase in quantity in previous wars, but a qualitative change and leap, a higher-level characteristic. This higher-level characteristic is reflected in intelligent warfare possessing “brain-like” functions and many “capabilities that surpass human limits” that traditional warfare lacks. As AI continues to optimize and iterate, it will one day surpass ordinary soldiers, staff officers, commanders, and even elite and expert groups, becoming a “super brain” and a “super brain group.” This is the core and key of intelligent warfare, a technological revolution in the fields of epistemology and methodology, and a high-level combat capability that humanity can currently foresee, achieve, and evolve.
The role of cyberspace is rising. With the progress of the times and the development of technology, the operational space has gradually expanded from physical space to virtual space. The role and importance of virtual space in the operational system are gradually rising and becoming increasingly important, and it is increasingly deeply integrated with physical space and other fields. Virtual space is an information space based on network electromagnetics constructed by humans. It can reflect human society and the material world from multiple perspectives, and can be utilized by transcending many limitations of the objective world. It is constructed by the information domain, connected by the physical domain, reflected by the social domain, and utilized by the cognitive domain. In a narrow sense, virtual space mainly refers to the civilian Internet; in a broad sense, virtual space mainly refers to cyberspace, including various Internet of Things, military networks, and dedicated networks. Cyberspace is characterized by being easy to attack but difficult to defend, using software to fight hard, integrating peacetime and wartime, and blurring the lines between military and civilian sectors. It has become an important battlefield for conducting military operations, strategic deterrence, and cognitive confrontation.
The importance of cyberspace is mainly reflected in three aspects: First, through network information systems, it connects dispersed combat forces and elements into a whole, forming a systematic and networked combat capability, which becomes the foundation of information warfare; second, it becomes the main battlefield and basic support for cognitive confrontation such as cyberspace, intelligence, public opinion, psychology, and consciousness; and third, it establishes virtual battlefields, conducts combat experiments, realizes virtual-real interaction, and forms the core and key to parallel operations and the ability to use the virtual to defeat the real.
In the future, with the accelerated upgrading of global interconnection and the Internet of Things, and with the establishment, improvement and widespread application of systems such as space-based networked reconnaissance, communication, navigation, mobile internet, Wi-Fi, high-precision global spatiotemporal reference platforms, digital maps, and industry big data, human society and global military activities will become increasingly “transparent,” increasingly networked, perceived, analyzed, correlated, and controlled (see Figure 6). This will have a profound, all-round, and ubiquitous impact on military construction and operations. The combat system in the intelligent era will gradually expand from closed to open, and from military-led to a “source-open and ubiquitous” direction that integrates military and civilian sectors.
In the era of intelligentization, information and data from the physical, informational, cognitive, social, and biological fields will gradually flow freely. Combat elements will achieve deep interconnection and the Internet of Things. Various combat systems will evolve from basic “capability combinations” to advanced “information fusion, data linking, and integrated behavioral interaction,” possessing powerful all-domain perception, multi-domain fusion, and cross-domain combat capabilities, and the ability to effectively control important targets, sensitive groups, and critical infrastructure anytime, anywhere. A report from the U.S. Army Joint Arms Center argues that the world is entering an era of “ubiquitous global surveillance.” Even if the world cannot track all activities, the proliferation of technology will undoubtedly cause the potential sources of information to grow exponentially.
Currently, network-based software attacks have acquired the capability to cause physical damage, and cyberattacks by militarily advanced countries possess operational capabilities such as intrusion, deception, interference, and sabotage. Cyberspace has become another important battlefield for military operations and strategic deterrence. The United States has already used cyberattacks in actual combat. Ben Ali of Tunisia, Gaddafi of Libya, and Saddam Hussein of Iraq were all influenced by US cyberattacks and WikiLeaks, causing shifts in public opinion, psychological breakdowns, and social unrest, leading to the rapid collapse of their regimes and having a disruptive impact on traditional warfare. Through the Snowden revelations, a list of 49 cyber reconnaissance projects across 11 categories used by the United States was gradually exposed. Incidents such as the Stuxnet virus’s sabotage of Iranian nuclear facilities, the Gauss virus’s mass intrusion into Middle Eastern countries, and the Cuban Twitter account’s control of public opinion demonstrate that the United States possesses powerful monitoring capabilities, as well as soft and hard attack and psychological warfare capabilities over the internet, closed networks, and mobile wireless networks.
The war began with virtual space experiments. The US military began exploring combat simulation, operational experiments, and simulation training in the 1980s. Later, the US military pioneered the use of virtual reality, wargaming, and digital twin technologies in virtual battlefields and combat experiments. Analysis shows that the US military conducted combat simulations in military operations such as the Gulf War, the Kosovo War, the Afghanistan War, and the Iraq War, striving to find the optimal operational and action plans. It has been reported that before Russia intervened militarily in Syria, it conducted pre-war exercises in its war labs. Based on the experimental simulations, it formulated the “Center-2015” strategic exercise plan, practicing “mobility and accessibility in unfamiliar areas” for combat in Syria. After the exercise, Russian Chief of the General Staff Gerasimov emphasized that the primary means would be political, economic, and psychological warfare, supplemented by long-range precision air strikes and special operations, ultimately achieving political and strategic objectives. Practice shows that the process of Russia’s intervention in Syria was largely consistent with these experiments and exercises.
In the future, with the application and development of virtual simulation, mixed reality, big data, and intelligent software, a parallel military artificial system can be established, allowing physical forces in the physical space to map and iterate with virtual forces in the virtual space. This will enable rapid, high-intensity adversarial training and supercomputing that are difficult to achieve in the physical space. It can also engage in combat and games against highly realistic “blue force systems,” continuously accumulating data, building models and algorithms, and ultimately using the optimal solutions to guide the construction and combat of physical forces, achieving the goal of virtual-real interaction, using the virtual to control the real, and winning with the virtual. On January 25, 2019, DeepMind, Google’s AI team, and Blizzard Entertainment, the developer of StarCraft, announced the results of the December 2018 match between AlphaSTAR and professional players TLO and MANA. In the best-of-five series, AlphaSTAR won both matches 5-0. AlphaSTAR completed the training workload that would take human players 200 years in just two weeks, demonstrating the enormous advantages and bright prospects of simulated adversarial training in virtual space.
The combat style is dominated by unmanned operations. In the era of intelligentization, unmanned warfare will become the basic form, and the integration and development of artificial intelligence and related technologies will gradually push this form to an advanced stage. Unmanned systems represent the full pre-positioning of human intelligence in the combat system and are a concentrated manifestation of the integrated development of intelligence, informatization, and mechanization. Unmanned equipment first appeared in the field of drones. In 1917, Britain built the world’s first drone, but it was not used in actual combat. With the development of technology, drones were gradually used in target drones, reconnaissance, and reconnaissance-strike integrated operations. Since the beginning of the 21st century, unmanned technologies and equipment have achieved tremendous leaps and major breakthroughs in exploration and application due to their advantages such as mission-centric design, no need to consider crew requirements, and high cost-effectiveness. They have shown a rapid and comprehensive development trend, and their application scope has expanded rapidly, covering various fields such as air, surface, underwater, ground, and space.
In recent years, technologies such as artificial intelligence, bionic intelligence, human-machine integrated intelligence, and swarm intelligence have developed rapidly. With the help of satellite communication and navigation, and autonomous navigation, unmanned combat platforms can effectively achieve remote control, formation flight, and swarm collaboration. Currently, unmanned combat aerial vehicles, underwater unmanned platforms, and space-based unmanned autonomous robots have emerged one after another. Bipedal, quadrupedal, multi-legged, and cloud-based intelligent robots are developing rapidly and have entered the fast lane of engineering and practical application, with military applications not far off.
Overall, unmanned warfare in the era of intelligentization will enter three stages of development. The first stage is the initial stage, characterized by manned dominance and unmanned support, where “unmanned warfare under manned leadership” means that combat behavior is completely controlled and dominated by humans before, during, and after the operation. The second stage is the intermediate stage, characterized by manned support and unmanned dominance, where “unmanned warfare under limited control” means that human control is limited, auxiliary, but crucial throughout the entire combat process, and in most cases, the autonomous action capabilities of the platform can be relied upon. The third stage is the advanced stage, characterized by manned rules and unmanned action, where “unmanned warfare with manned design and minimal control” means that humans conduct overall design in advance, clarifying autonomous behavior and rules of the game under various combat environments, and the execution phase is mainly entrusted to unmanned platforms and unmanned forces for autonomous execution.
Autonomous behavior or autonomy is the essence of unmanned warfare and a common and prominent feature of intelligent warfare, manifested in many aspects.
First, the autonomy of combat platforms, mainly including the autonomous capabilities and intelligence level of unmanned aerial vehicles, ground unmanned platforms, precision-guided weapons, underwater and space robots.
Second, the detection system is autonomous, which mainly includes automatic search, tracking, association, aiming, and intelligent recognition of information such as images, voice, video, and electronic signals.
Thirdly, there is autonomous decision-making, the core of which is AI-based autonomous decision-making within the combat system. This mainly includes automatic analysis of the battlefield situation, automatic planning of combat missions, automated command and control, and intelligent human-machine interaction.
Fourthly, autonomous coordination in combat operations, which initially includes autonomous coordination between manned and unmanned systems, and later includes autonomous unmanned swarms, such as various combat formations, bee swarms, ant swarms, fish swarms, and other combat behaviors.
Fifth, autonomous network attack and defense behaviors, including automatic identification, automatic tracing, automatic protection, and autonomous counterattack against various viruses and network attacks.
Sixth, cognitive electronic warfare, which automatically identifies the power, frequency band, and direction of electronic interference, automatically hops frequencies and autonomously forms networks, and engages in active and automatic electronic interference against adversaries.
Seventh, other autonomous behaviors, including intelligent diagnosis, automatic repair, and self-protection.
In the future, with the continuous upgrading of the integration and development of artificial intelligence and related technologies, unmanned operations will rapidly develop towards autonomy, biomimicry, swarming, and distributed collaboration, gradually pushing unmanned warfare to an advanced stage and significantly reducing direct confrontation between human forces on the battlefield. Although manned platforms will continue to exist in the future, biomimetic robots, humanoid robots, swarm weapons, robot armies, and unmanned system warfare will become the norm in the intelligent era. Since unmanned systems can replace human beings in many combat domains and can accomplish tasks autonomously, unmanned combat systems will always be there to protect humans before they suffer physical attacks or injuries. Therefore, unmanned combat systems in the intelligent era are humanity’s main protective barrier, its shield and shield.
All-domain operations and cross-domain offense and defense. In the era of intelligent warfare, all-domain operations and cross-domain offense and defense are also a fundamental style of combat, manifested in many combat scenarios and aspects. From land, sea, air, and space to multiple domains including physical, information, cognitive, social, and biological domains, as well as the integration and interaction of virtual and physical elements, from peacetime strategic deterrence to wartime high-confrontation, high-dynamic, and high-response operations, the time and space span is enormous. It involves not only physical space operations and cyberspace cyber offense and defense, information warfare, public opinion guidance, and psychological warfare, but also tasks such as global security governance, regional security cooperation, counter-terrorism, and rescue, and the control of critical infrastructure such as networks, communications, power, transportation, finance, and logistics.
Since 2010, supported by advancements in information and intelligent technologies, the U.S. military has proposed concepts such as operational cloud, distributed lethality, multi-domain warfare, algorithmic warfare, mosaic warfare, and joint all-domain operations. The aim is to maintain battlefield and military superiority by using system-wide systems against localized ones, multi-functional systems against simpler ones, multi-domain systems against single-domain ones, integrated systems against discrete ones, and intelligent systems against non-intelligent ones. The U.S. military proposed the concept of multi-domain warfare in 2016 and joint all-domain operations in 2020, aiming to develop cross-service and cross-domain joint operational capabilities, ensuring that each service’s operations are supported by all three services, and possessing all-domain capabilities against multi-domain and single-domain ones.
In the future, with breakthroughs in key technologies for the cross-disciplinary integration of artificial intelligence and multidisciplinary collaboration, multi-domain integration and cross-domain offense and defense based on AI and human-machine hybrid intelligence will become a distinctive feature of intelligent warfare. This will be achieved across functional domains such as physics, information, cognition, society, and biology, as well as geographical domains such as land, sea, air, and space.
In the intelligent era, multi-domain and cross-domain operations will expand from mission planning, physical collaboration, and loose coordination to heterogeneous integration, data linking, tactical interoperability, and cross-domain offensive and defensive integration.
First, multi-domain integration. Based on different battlefields and adversaries in a multi-domain environment, different combat styles, combat procedures and missions are planned in accordance with the requirements of joint operations, and unified as much as possible. This achieves the overall planning and integration of information, firepower, defense, support and command and control, and the integration of combat capabilities at the strategic, operational and tactical levels, forming the capability of one-domain operations and multi-domain joint rapid support.
Second, cross-domain offense and defense. Supported by a unified network information system, and through a unified battlefield situation and data information exchange based on unified standards, the information links for cross-domain joint operations reconnaissance, control, strike, and assessment are completely opened up, enabling seamless integration of operational elements and capabilities at the tactical and fire control levels, as well as collaborative actions between services, cross-domain command and interoperability.
Third, the entire process is interconnected. Multi-domain integration and cross-domain offense and defense are treated as a whole, with coordinated design and interconnectedness throughout. Before the war, intelligence gathering and analysis are conducted, along with public opinion warfare, psychological warfare, propaganda warfare, and necessary cyber and electronic warfare attacks. During the war, special operations and cross-domain actions are used to carry out decapitation strikes, key point raids, and precise and controllable strikes (see Figure 7). After the war, defense against cyberattacks on information systems, elimination of negative public opinion’s impact on the public, and prevention of enemy damage to infrastructure are addressed through post-war governance, public opinion control, and the restoration of social order across multiple areas.
Fourth, AI support. Through combat experiments, simulation training, and necessary test verification and real-world testing, we continuously accumulate data, optimize models, and establish AI combat models and algorithms for different combat styles and adversaries, forming an intelligent brain system to better support joint operations, multi-domain operations, and cross-domain offense and defense.
Human-AI hybrid decision-making. The continuous improvement, optimization, upgrading, and perfection of the AI brain system in intelligent battlefields will enable it to surpass humans in many aspects. The human-dominated command, control, and decision-making model of human warfare for thousands of years will be completely transformed. Humans commanding AI, AI commanding humans, and AI commanding AI are all possible scenarios in warfare.
Distributed, networked, flattened, and parallel structures are key characteristics of intelligent combat systems. The centralized, human-centric single-decision-making model is gradually being replaced by decentralized or weakly centralized models based on AI, such as unmanned systems, autonomous swarms, and manned-unmanned collaboration. Hybrid compatibility among these models is becoming a development trend. The lower the operational level and the simpler the mission, the more prominent the role of unmanned and decentralized systems; the higher the level and the more complex the mission, the more important human decision-making and centralized systems become. Pre-war decision-making is primarily human, supplemented by AI; during war, AI is primarily AI, supplemented by human; post-war, both are used, with hybrid decision-making becoming the dominant approach (see Table 3).
In the future battlefield, combat situations will be highly complex, rapidly changing, and exceptionally intense. The convergence of various information sources will generate massive amounts of data, which cannot be processed quickly and accurately by the human brain alone. Only by achieving a collaborative operation mode of “human brain + AI,” based on technologies such as combat cloud, databases, network communication, and the Internet of Things, can “commanders” cope with the ever-changing battlefield and complete command and control tasks. With the increasing autonomy of unmanned systems and the enhancement of swarm and system-wide AI functions, autonomous decision-making is gradually emerging. Once command and control achieve different levels of intelligence, the Out-of-Loop (OODA) loop time will be significantly reduced, and efficiency will be significantly improved. In particular, pattern recognition for network sensor image processing, “optimization” algorithms for combat decision-making, and particle swarm optimization and bee swarm optimization algorithms for autonomous swarms will endow command and control systems with more advanced and comprehensive decision-making capabilities, gradually realizing a combat cycle where “humans are outside the loop.”
Nonlinear amplification and rapid convergence. Future intelligent warfare will no longer be a gradual release of energy and a linear superposition of combat effects, but rather a rapid amplification of multiple effects such as nonlinearity, emergence, self-growth, and self-focusing, and a rapid convergence of results.
Emergence primarily refers to the process by which each individual within a complex system, following local rules and continuously interacting, generates a qualitative change in the overall system through self-organization. In the future, while battlefield information will be complex and ever-changing, intelligent recognition of images, voice, and video, along with processing by military cloud systems, will enable “one-point collection, multi-user sharing.” Through big data technology, it will be rapidly linked with relevant information and integrated with various weapon fire control systems to implement distributed strikes, swarm strikes, and cyber psychological warfare. This will allow for “detection and destruction,” “aggressive attacks at the first sign of trouble,” and “numerical superiority generating psychological panic”—these phenomena constitute the emergence effect.
The emergent effects of intelligent warfare are mainly reflected in three aspects: first, the acceleration of the kill chain caused by the speed of AI decision-making chain; second, the combat effect caused by the numerical advantage of manned and unmanned collaborative systems, especially swarm systems; and third, the rapid swarm emergence behavior based on network interconnection.
As military intelligence develops to a certain stage, the combined effects of advanced AI, quantum computing, IPv6, and hypersonic technologies will result in combat systems exhibiting nonlinear, asymmetric, self-growing, rapid-response, and uncontrollable amplification and operational effects. This is particularly evident in unmanned, swarm, cyber warfare, and cognitive confrontation. The emergence of intelligence from collective ignorance, increased efficiency through sheer numbers, nonlinear amplification, and other emergent effects will become increasingly prominent. AI-driven cognitive, informational, and energy confrontations will intertwine and rapidly converge around a target, with time becoming increasingly compressed and the speed of confrontation accelerating. This will manifest as a dramatic amplification of multiple effects and a rapid convergence of outcomes. Energy shockwaves, rapid-fire combat, AI terminators, public opinion reversals, social unrest, psychological breakdowns, and the chain reaction of the Internet of Things will become prominent characteristics of intelligent warfare.
In unmanned swarm attacks, assuming roughly the same platform performance, the Lanchester equation applies: combat effectiveness is proportional to the square of the number of units; quantity advantage translates to quality advantage. Network attack and defense, and psychological and public opinion effects, follow Metcalfe’s Law, being proportional to the square of the number of interconnected users, with nonlinear and emergent effects becoming more pronounced. The quantity and intelligence of battlefield AI determine the overall level of intelligence in the combat system, impacting battlefield intelligence control and influencing the outcome of war. In the era of intelligent warfare, how to manage the interrelationships between energy, information, cognition, quantity, quality, virtuality, and physicality, and how to skillfully design, control, utilize, and evaluate nonlinear effects, are major new challenges and requirements for future warfare.
In the future, whether it is a reversal of public opinion, psychological panic, swarm attacks, mass operations, or autonomous combat by humans outside the ring, their emergence effects and strike effects will become relatively common phenomena and easy-to-implement actions, forming a capability that is compatible with deterrence and actual combat. It is also a form of warfare that human society must strictly manage and control.
An organically symbiotic relationship between humans and equipment. In the era of intelligence, the relationship between humans and weapons will undergo fundamental changes, becoming increasingly distant physically but increasingly closer in thought. The form of equipment and its development and management models will be completely transformed. Human thought and wisdom will be deeply integrated with weaponry through AI, fully integrated in the early stages of equipment development, optimized and iterated during the use and training phase, and further upgraded and improved after combat verification, in a continuous cycle of progress.
First, with the rapid development of technologies such as network communication, mobile internet, cloud computing, big data, machine learning, and bionics, and their widespread application in the military field, the structure and form of traditional weapons and equipment will be completely changed, exhibiting diverse functions such as front-end and back-end division of labor and cooperation, efficient interaction, and adaptive adjustment. They will be complex entities integrating mechanics, information, networks, data, and cognition.
Secondly, while humans and weapons are gradually becoming physically detached, they are also becoming increasingly integrated into an organic symbiotic entity in terms of mindset. The gradual maturation of drones and robots is shifting their focus from assisting humans in combat to replacing them, with humans taking a more backseat. The integration of humans and weapons will take on entirely new forms. Human thought and wisdom will participate in the entire lifecycle of design, research and development, production, training, use, and support. Unmanned combat systems will perfectly combine human creativity and intellect with the precision, speed, reliability, and fatigue resistance of machines.
Third, profound changes are taking place in equipment development and management models. Mechanized equipment becomes increasingly outdated with use, while information technology software becomes increasingly new, and intelligent algorithms become increasingly sophisticated with use. Traditional mechanized equipment is delivered to the troops using a “pre-research—development—finalization” model, resulting in a decline in combat performance over time and vehicle hours. Information technology equipment is a product of the combined development of mechanization and informatization; the platform remains the same, but the information system is constantly iterated and updated with the development of computer CPUs and storage devices, exhibiting a step-by-step development characteristic of “information-led, software-driven hardware, rapid replacement, and spiral ascent.” Intelligent equipment, based on mechanization and informatization, continuously optimizes and improves training models and algorithms with the accumulation of data and experience, showing an upward curve of becoming stronger and better with use over time and frequency. Therefore, the development, construction, use, training, and support models for intelligent equipment will undergo fundamental changes.
Evolving through learning and confrontation. Evolution will undoubtedly be a defining characteristic of future intelligent warfare and combat systems, and a commanding height in future strategic competition. Combat systems in the intelligent era will gradually acquire adaptive, self-learning, self-confrontational, self-repairing, and self-evolving capabilities, becoming an evolvable ecosystem and game-theoretic system.
The most distinctive and unique feature of intelligent combat systems lies in the combination of human-like and human-like intelligence with the advantages of machines, achieving “superhuman” combat capabilities. The core of this capability is that numerous models and algorithms improve and refine with use, possessing an evolutionary function. If future combat systems resemble the human body, with the brain as the command and control center, the nervous system as the network, and the limbs as weapons and equipment controlled by the brain, like a living organism, possessing self-adaptive, self-learning, self-defense, self-repair, and self-evolutionary capabilities, then we believe it possesses the ability and function of evolution. Because intelligent combat systems are not entirely the same as living organisms, while a single intelligent system is similar to a living organism, a multi-system combat system is more like an “ecosystem + adversarial game system,” more complex than a single living organism, and more adversarial, social, collective, and emergent.
Preliminary analysis suggests that with the development and application of technologies such as combat simulation, virtual reality, digital twins, parallel training, intelligent software, brain-inspired chips, brain-like systems, bionic systems, natural energy harvesting, and novel machine learning, future combat systems can gradually evolve from single-function, partial-system evolution to multi-functional, multi-element, multi-domain, and multi-system evolution. Each system will be able to rapidly formulate response strategies and take action based on changes in the battlefield environment, different threats, different adversaries, and its own strengths and capabilities, drawing upon accumulated experience, extensive simulated adversarial training, and models and algorithms built through reinforcement learning. These strategies will then be continuously revised, optimized, and self-improved through practical warfare. Single-mission systems will possess characteristics and functions similar to living organisms, while multi-mission systems, like species in a forest, will have a cyclical function and evolutionary mechanism of mutual restraint and survival of the fittest, possessing the ability to engage in game-theoretic confrontation and competition under complex environmental conditions, forming an evolvable ecological and game-theoretic system.
The evolution of combat systems mainly manifests in four aspects: First, the evolution of AI. With the accumulation of data and experience, it will inevitably be continuously optimized, upgraded, and improved. This is relatively easy to understand. Second, the evolution of combat platforms and cluster systems, mainly moving from manned control to semi-autonomous and autonomous control. Because it involves not only the evolution of platform and cluster control AI, but also the optimization and improvement of related mechanical and information systems, it is relatively more complex. Third, the evolution of mission systems, such as detection systems, strike systems, defense systems, and support systems. Because it involves multiple platforms and multiple missions, the factors and elements involved in the evolution are much more complex, and some may evolve quickly, while others may evolve slowly. Fourth, the evolution of the combat system itself. Because it involves all elements, multiple missions, cross-domain operations, and confrontations at various levels, its evolutionary process is extremely complex. Whether a combat system can evolve cannot rely entirely on its own growth; it requires the proactive design of certain environments and conditions, and must follow the principles of biomimicry, survival of the fittest, mutual restraint, and full-system lifecycle management to possess the function and capability for continuous evolution.
Intelligent design and manufacturing. In the era of intelligentization, the defense industry will shift from a relatively closed, physical-based, and time-consuming research and manufacturing model to an open-source, intelligent design and manufacturing model that can rapidly meet military needs.
The defense industry is a strategic industry of the nation, a powerful pillar of national security and defense construction. In peacetime, it primarily provides the military with advanced, high-quality, and reasonably priced weaponry and equipment. In wartime, it is a crucial force for operational support and a core pillar for ensuring victory. The defense industry is a high-tech intensive sector. The research and development and manufacturing of modern weaponry and equipment are technology-intensive, knowledge-intensive, systemically complex, and highly integrated. The development of weapons and equipment such as large aircraft carriers, fighter jets, ballistic missiles, satellite systems, and main battle tanks typically takes ten, twenty, or even more years before finalization and delivery to the armed forces, involving large investments, long cycles, and high costs. From the post-World War II period to the end of the last century, the defense industrial system and capability structure were products of the mechanized era and warfare. Its research, testing, manufacturing, and support were primarily geared towards the needs of the military branches and industry systems, mainly including weaponry, shipbuilding, aviation, aerospace, nuclear, and electronics industries, as well as civilian supporting and basic industries. After the Cold War, the US defense industry underwent strategic adjustments and mergers and reorganizations, generally forming a defense industrial structure and layout adapted to the requirements of informationized warfare. The top six defense contractors in the United States can provide specialized combat platforms and systems for relevant branches of the armed forces, as well as overall solutions for joint operations, making them cross-service and cross-domain system integrators. Since the beginning of the 21st century, with the changing demands of system-of-systems and information-based warfare and the development of digital, networked, and intelligent manufacturing technologies, the traditional development model and research and production capabilities of weapons and equipment have begun to gradually change, urgently requiring reshaping and adjustment in accordance with the requirements of informationized warfare, especially intelligent warfare.
In the future, the defense science and technology industry will, in accordance with the requirements of joint operations, all-domain operations, and the integrated development of mechanization, informatization, and intelligence, shift from the traditional focus on service branches and platform construction to cross-service and cross-domain system integration. It will also shift from relatively closed, self-contained, independent, fragmented, physical-based, and long-cycle research, design, and manufacturing to open-source, democratic crowdsourcing, virtual design and integration verification, adaptive manufacturing, and rapid fulfillment of military needs (see Figure 8). This will gradually form a new innovation system and intelligent manufacturing system that combines hardware and software, virtual and real interaction, intelligent human-machine-object-environment interaction, effective vertical industrial chain connection, horizontal distributed collaboration, and military-civilian integration. Joint design and demonstration by multiple military and civilian parties, joint research and development by supply and demand sides for construction and use, iterative optimization based on parallel military systems in both virtual and real environments, and improvement through combat training and real-world verification—a model of simultaneous research, testing, use, and construction—is the basic mode for the development and construction of intelligent combat systems and the generation of combat power.
Wu Mingxi 8
The risk of spiraling out of control. Since intelligent warfare systems theoretically possess the ability to self-evolve and reach “superhuman” levels, if humans do not pre-design control programs, control nodes, and a “stop button,” the result could very well be destruction and disaster. A critical concern is that numerous hackers and malicious warmongers may exploit intelligent technology to design uncontrollable warfare programs and combat methods, allowing numerous machine brains (AIs) and swarms of robots to fight adaptively and self-evolving according to pre-set combat rules, becoming invincible and relentlessly advancing, ultimately leading to an uncontrollable situation and irreparable damage. This is a major challenge facing humanity in the process of intelligent warfare and a crucial issue requiring research and resolution. This problem needs to be recognized and prioritized from the perspective of a shared future for all humanity and the sustainable development of human civilization. It requires designing rules of war, formulating international conventions, and regulating these systems technically, procedurally, ethically, and legally, implementing mandatory constraints, checks, and management.
The above ten transformations and leaps constitute the main content of the new form of intelligent warfare. Of course, the development and maturity of intelligent warfare is not a castle in the air or a tree without roots, but is built upon mechanization and informatization. Without mechanization and informatization, there is no intelligence. Mechanization, informatization, and intelligence form an organic whole, interconnected and mutually reinforcing, iteratively optimizing and leapfrog developing. Currently, mechanization is the foundation, informatization is the guiding principle, and intelligence is the direction. Looking to the future, mechanization will remain the foundation, informatization will provide support, and intelligence will be the guiding principle.
A Bright Future
In the time tunnel of the new century, we see the train of intelligent warfare speeding along. Will humanity’s greed and technological might lead us into a more brutal darkness, or will it propel us towards a more civilized and enlightened future? This is a major philosophical question that humanity needs to ponder. Intelligentization is the future, but it is not everything. Intelligentization can handle diverse military tasks, but it is not omnipotent. Faced with sharp contradictions between civilizations, religions, nations, and social classes, and with extreme events such as thugs wielding knives, suicide bombings, and mass riots, the role of intelligentization remains limited. Without resolving global political imbalances, unequal rights, unfair trade, and social contradictions, war and conflict will be inevitable. Ultimately, the world is determined by strength, and technological, economic, and military strength are extremely important. While military strength cannot determine politics, it can influence it; it cannot determine the economy, but it can bring security for economic development. The stronger the intelligent warfare capabilities, the stronger its deterrent and war-preventing function, and the greater the hope for peace. Like nuclear deterrence, it plays a crucial role in preventing large-scale wars to avoid terrible consequences and uncontrolled disasters.
The level of intelligence in warfare, in a sense, reflects the progress of civilization in warfare. The history of human warfare, initially a struggle between groups for food and habitation, has evolved into land occupation, resource plunder, expansion of political power, and domination of the spiritual world—all fraught with bloodshed, violence, and repression. As the ultimate solution to irreconcilable contradictions in human society, war’s ideal goal is civilization: subjugation without fighting, minimal resource input, minimal casualties, and minimal damage to society… However, past wars have often failed to achieve this due to political struggles, ethnic conflicts, competition for economic interests, and the brutality of technological destructive methods, frequently resulting in the utter destruction of nations, cities, and homes. Past wars have failed to achieve these ideals, but future intelligent warfare, due to technological breakthroughs, increased transparency, and deeper mutual sharing of economic benefits, especially as the confrontation of human forces gradually gives way to confrontation between robots and AI, will see decreasing casualties, material consumption, and collateral damage. This presents a significant possibility of achieving civilization, offering humanity hope. We envision future warfare gradually transitioning from the mutual slaughter of human societies and the immense destruction of the material world to wars between unmanned systems and robots. This will evolve into deterrence and checks and balances limited to combat capabilities and overall strength, AI confrontations in the virtual world, and highly realistic war games… The energy expenditure of human warfare will be limited to a certain scale of unmanned systems, simulated confrontations and experiments, or even merely the energy needed to wage a war game. Humanity will transform from the planners, designers, participants, leaders, and victims of war into rational thinkers, organizers, controllers, observers, and adjudicators. Human bodies will no longer suffer trauma, minds will no longer be frightened, wealth will no longer be destroyed, and homes will no longer be devastated. Although this beautiful ideal and aspiration may always fall short of harsh reality, we sincerely hope that this day will arrive, and arrive as soon as possible. This is the highest stage of intelligent warfare development, the author’s greatest wish, and humanity’s beautiful vision!
(Thanks to my colleague, Researcher Zhou Xumang, for his support and assistance in writing this paper. He has unique thoughts and insights into the development and construction of intelligent systems.)
Notes
[1] Robert O. Walker et al., 20YY: War in the Age of Robots, translated by Zou Hui et al., Beijing: National Defense Industry Press, 2016, p. 148.
The Era of Intelligent War Is Coming Rapidly
Wu Mingxi
Abstract: Since the entry into the new century, the rapid development of intelligent technology with artificial intelligence (AI) at the core has accelerated the process of a new round of military revolution. The competition in the military field is going rapidly to the era of intelligent power. The operational elements represented by “AI, cloud, network, group and end” and their diverse combinations constitute a new battlefield ecosystem, and the winning mechanism of war has changed completely. multiplier, transcendence and active role. The platform has AI control, the cluster has AI guidance, and the system has AI decision-making. The traditional human-based combat method is replaced by AI models and algorithms, and intelligent dominance becomes the core of future war. The stronger the intelligent combat capability, the more hopeful the soldiers may win the war without firing a shot.
Abstract: Since the entry into the new century, the rapid development of intelligent technology with artificial intelligence (AI) at the core has accelerated the process of a new round of military revolution. The competition in the military field is going rapidly to the era of intelligent power. The operational elements represented by “AI, cloud, network, group and end” and their diverse combinations constitute a new battlefield ecosystem, and the winning mechanism of war has changed completely. The AI system based on models and algorithms will be the core combat capability, running through all aspects and links and playing a multiplier, transcendence and active role. The platform has AI control, the cluster has AI guidance, and the system has AI decision-making. The traditional human-based combat method is replaced by AI models and algorithms, and intelligent dominance becomes the core of future war. The stronger the intelligent combat capability, the more hopeful the soldiers may win the war without firing a shot.
An Analysis of the New Changes in the Ways to Win in Intelligent Warfare
■Wang Ronghui
President Xi Jinping pointed out that the core of studying warfare is to understand the characteristics, laws, and winning mechanisms of modern warfare. From the clash of bronze swords to the roar of tank engines and the saturation attacks of unmanned “swarms,” each leap in the form of warfare has profoundly changed the way wars are won. In the long era of cold weapons, firearms, and mechanized warfare, attrition warfare used the offsetting of national wealth and resources to exhaust the opponent’s will to resist. However, the new military revolution, led by the information technology revolution and accelerating towards the intelligent era, is pushing the way wars are won to a completely new dimension—dissipation warfare, which transforms the traditional method of war, which is mainly based on the consumption of materials and energy, into a comprehensive method of war that integrates the offsetting of materials, the offsetting of energy, and the confrontation of information.
The war of attrition is an iron law of traditional warfare.
In the long years before and during the Industrial Age, wars were primarily based on the struggle for material and energy resources, and the balance of power often tipped in favor of the side that could withstand greater material and energy losses.
The war of attrition is a major winning tactic in traditional warfare. In cold weapon warfare, the focus of confrontation lies in the number of soldiers, their physical endurance, and the competition of metal weapons and food reserves. The outcome of the war often depends on the size of the army and the strength of the logistical chain. For example, the siege warfare that was common in ancient times was essentially a war of attrition between the defender’s supplies and the attacker’s manpower and equipment. In firearms warfare, the use of gunpowder did not reduce the attrition of war; on the contrary, it pushed it to a new level. The dense charges of line infantry in the Napoleonic Wars, and the brutal trench warfare of Verdun and the Somme in World War I, all exemplified the nature of attrition warfare—trading space for steel and flesh. Mechanized warfare, with the advent of tanks, airplanes, and aircraft carriers, pushed the scale of material and energy consumption to its peak. In World War II, the Battle of Kursk on the Soviet-German front and the brutal Battle of Iwo Jima in the Pacific were the ultimate clashes between a nation’s industrial capacity and its military’s ability to withstand casualties.
The war of attrition is essentially a contest of material and energy resources. It’s a contest of size and reserves—static or slowly accumulating factors such as population size, resource reserves, industrial capacity, and troop strength. Its primary objective is to destroy the enemy’s manpower, war materials, and seize their territory and resources; essentially, it’s a contest of material and energy resources between the opposing sides. Klausewitz’s assertion that “war is a violent act that forces the enemy to submit to our will” is fundamentally based on the logic of violent attrition. The winning mechanism of a war of attrition is that victory belongs to the side that can more sustainably convert material resources into battlefield lethality and can withstand greater losses.
The war of attrition has revealed significant historical limitations in practice. From the long-term experience of traditional warfare, the fundamental limitations of the war of attrition manifest in the enormous loss of life and material wealth, the unbearable high costs to society, and the waste of vast amounts of energy and resources on non-critical targets, indiscriminate bombardment, and large-scale but inefficient charges. When both sides are evenly matched in strength and determined, the outcome is difficult to predict, leading to repeated back-and-forth battles and easily resulting in a protracted quagmire of attrition, as seen on the Western Front of World War I. Faced with increasingly networked and information-based modern warfare systems, the attrition model relying on large-scale firepower coverage is insufficient for accurately targeting the opponent’s key nodes and functional connections, resulting in diminishing returns.
The information technology revolution gave rise to the prototype of dissipative warfare
The information technology revolution in the second half of the 20th century injected a disruptive variable into the form of warfare. Information began to surpass matter and energy, becoming the core element of victory, and information warfare took center stage in history.
The focus of information warfare has shifted. The Gulf War is considered a milestone in information warfare, where multinational forces, relying on reconnaissance aircraft, early warning aircraft, electronic warfare systems, precision-guided weapons, and C4ISR systems, achieved overwhelming information superiority, realizing “one-way transparency” on the battlefield. The focus of this war was no longer on the complete annihilation of the opponent’s massive ground forces, but rather on the systematic destruction of its command and control systems, air defense systems, communication hubs, and logistical supply lines, leading to the rapid collapse of the opponent’s overall combat capability and plunging them into a chaotic state of fragmented operations and command failure. This marks a shift in the focus of warfare from “hard destruction” in the physical domain to “system disruption” and functional paralysis in the information domain.
The methods of winning in informationized warfare have changed. Informationized warfare alters the way and objectives of material and energy utilization through information superiority. The winning strategy is no longer simply about “consuming” the opponent’s materials and energy, but rather about guiding the flow of materials and energy through efficient information flow, precisely targeting the “key links” of the enemy’s operational system. This aims to achieve maximum chaos, disorder, functional collapse, and overall effectiveness reduction in the enemy system with minimal material and energy input. Therefore, informationized warfare is beginning to pursue “entropy increase,” or increased disorder, in the enemy’s operational system, causing it to move from order to disorder. This indicates that dissipative warfare, reflecting the complex system confrontation of intelligent warfare, is beginning to emerge.
Dissipation warfare is a typical form of intelligent warfare.
With the rapid development of intelligent technology and its widespread application in the military, intelligent warfare is becoming a new form of warfare after information warfare, and dissipation warfare is becoming a typical mode of intelligent warfare.
Dissipation warfare has adapted to the demands of the modern world security landscape. In the era of intelligence, the rapid development and application of intelligent technologies such as broadband networks, big data, cloud computing, brain-computer interfaces, intelligent chips, and deep learning have broadened connections between countries and nations. Non-traditional security threats have emerged and intertwined with traditional security threats, leading to a continuous expansion of the subject and scope of intelligent warfare. The time and space of warfare are constantly extending, and the warfare system is shifting from relatively closed to more open, forming a higher-level and broader-ranging confrontation. Dissipation warfare, as a winning strategy in the intelligent era, is becoming increasingly prominent.
Dissipation warfare reflects the historical development of methods for winning wars. Dissipation warfare has always existed, but before the advent of intelligent warfare, due to technological constraints, it remained in a relatively rudimentary and simple form, where the confrontation could only be manifested as a confrontation between one of the elements of matter, energy, or information. Cold weapon warfare was primarily a confrontation centered on the human body and dominated by material elements; firearms and mechanized warfare was primarily a confrontation centered on platforms and dominated by energy elements; and information warfare is primarily a confrontation centered on network information systems and dominated by information elements. Entering the intelligent era, intelligent technology highly unifies the cognitive, decision-making, and action advantages in the confrontation between enemies and ourselves. In essence, it highly unifies matter, energy, and information. By empowering, gathering, driving, and releasing energy with intelligence, it forms an intelligent warfare form dominated by intelligent elements and centered on intelligent algorithms. Its typical form is dissipation warfare, which reflects the complex system confrontation of intelligent warfare.
Dissipation warfare embodies the resilience of complex warfare systems. From the perspective of the winning mechanism, to gain a competitive advantage, it is necessary to construct a closed loop of dissipation warfare that enables rapid “perception, decision-making, action, and evaluation” based on the fundamental principles of “negative entropy infusion, threshold determination, phase transition triggering, and victory control.” This continuously increases the enemy’s entropy value in a dynamic hybrid game, causing the enemy to lose its overall combat capability. From the perspective of the path to victory, dissipation warfare emphasizes the comprehensive use of material attrition, energy confrontation, and information confrontation. Internally, it “establishes order” to achieve logical concentration, immediate accumulation, complementary advantages, and integrated strengths to form comprehensive combat power. Externally, it “increases entropy” by continuously exerting its effects through military, political, economic, technological, cultural, and diplomatic components until the effectiveness accumulates to a certain level, resulting in “rise and fall” and achieving a sudden change in combat power and the emergence of systemic effectiveness. In terms of its basic characteristics, dissipative warfare is characterized by comprehensive confrontation and competition, multiple subjects across domains, complex and diverse forms, integrated and concentrated forces, and the emergence of accumulated effectiveness. The core of the confrontation has evolved from the destruction of the physical domain and the control of the information domain to a game of disrupting and maintaining the “orderliness” inherent in the complex system of intelligent warfare.
Dissipation warfare encompasses various forms of intelligent warfare. Beyond the traditional attrition warfare across land, sea, air, space, cyberspace, and electronic domains, dissipation warfare also includes various forms of conflict employed by one or more countries against their adversaries in multiple social spheres. These include political isolation and encirclement, economic and financial blockades, disruption of technological supply chains, cultural strategic export, authoritative media campaigns to seize the initiative in discourse, manipulation of public opinion through trending events, AI-assisted social media information warfare, and the use of proxies to establish multilateral battlefields. The diverse forms of dissipation warfare allow it to be conducted in both war and peacetime. Sun Tzu’s Art of War principle, “Victorious armies first secure victory and then seek battle,” takes on new meaning in the context of war preparation in the intelligent age.
The shift in winning strategies from war of attrition to war of dissipation
Dissipative warfare manifests itself in the comprehensive confrontation across multiple domains, including the physical and information domains, in the intelligent era. It embodies a high degree of unity among political contests, economic competition, military offense and defense, cultural conflicts, and diplomatic checks and balances, reflecting the openness, complexity, and emergence of intelligent warfare systems.
The evolution from a war of attrition to a war of dissipation represents a comprehensive and profound transformation. The basis for victory has shifted from relying on the stock of resources such as population, mineral deposits, and industrial base to relying on information superiority, intelligent algorithm superiority, network structure superiority, and the ability to dynamically control the flow of energy and information. The target of action has shifted from focusing on destroying physical entities such as soldiers, tanks, and factories to focusing on dismantling the “function” and “order” of the war system. The pursuit of effectiveness has shifted from the absolute destruction and annihilation of manpower to the pursuit of highly efficient “asymmetric paralysis,” that is, inducing the greatest chaos and incompetence of the enemy’s combat system at the lowest cost on one’s own side, pursuing “paralysis” rather than “destruction.” The focus of war has shifted from confrontation mainly in the physical domains such as land, sea, and air to a comprehensive game in multiple domains such as the physical domain and the information domain. While the physical domain still exists, it is often determined by the advantages of higher-dimensional domains.
The evolution from war of attrition to war of dissipation reflects a change in the decisive advantage. In the era of intelligent warfare, victory will no longer simply belong to the side with the largest steel torrent, but will inevitably belong to the side that can more efficiently “establish order” and “induce entropy”—that is, the side that can maintain a highly ordered and efficient operation of its own war system, while precisely and intelligently dismantling the order of the enemy’s system, forcing it into irreversible “entropy increase” and chaos. To gain a decisive advantage in war, we must adapt to the openness, complexity, and emergence of intelligent warfare systems, shifting from the extensive consumption and utilization of single materials, energy, and information to a war system where intelligent advantages dominate dissipation, and striving to gain the initiative and advantage in comprehensive multi-domain games.
The evolution from war of attrition to war of dissipation is an inevitable trend driven by the tide of technological revolution. Technology is the core combat capability and the most active and revolutionary factor in military development. Currently, intelligent technology is developing rapidly. Only by proactively embracing the wave of intelligence and firmly grasping the key to victory in the accurate understanding, intelligent control, and efficient dissipation of the complex system of warfare can we remain invincible in the ever-changing landscape of future global competition and the profound transformation of warfare.
Joint operations are the basic form of combat in modern warfare. They emphasize the strength of more than two services and arms and other participating forces, and jointly implement operations in multi-domain space under unified command. “Single domain” and “multidomain” interdependence and interaction in joint operations are a pair of important military categories. Grasping the relationship between single domain and multi-domain is the core content and key to solving the “internal interface” problem in the construction and application of joint combat forces. The relationship between the two should be viewed dialectically and correctly handled, and the winning mechanism of joint operations should be continuously enriched to promote joint operations. Really achieve cross-domain integration, energy gathering and efficiency improvement.
“Single domain” is the constituent element and development basis of “multi-domain”
Joint operations emphasize the formation of advantageous multi-domains based on advantageous single domains, and place higher demands on the coupling relationship between each single domain that makes up the multi-domain. The development of a single domain can provide a solid foundation for the development of multiple domains and create prerequisites for achieving cross-domain integration.
In terms of historical process, single domain to multi-domain is the process of domain expansion. Throughout human history, the wars of each era have applied the techniques of their own era, imprinted the imprint of their own era, and developed with the time and space of the war. War in the agricultural era, with cold weapons as the main military equipment, battlefield fighting is mainly limited to land and offshore waters. It is a lower-level “full contact” war, and the combat domain is relatively single, making early operations “loose” Joint characteristics.
Entering the industrial era, with the invention and use of steam engines and internal combustion engines, air combat weapons represented by combat aircraft appeared on the battlefield. The combat space broke through the limitations of land and sea areas, forming a three-dimensional battlefield between land, sea and air. The war turned “semi-contact”, making joint operations take on “cooperative” joint characteristics. Entering the information age, the combat space breaks through the three-dimensional geographical space and forms a multi-domain integration of land, sea, air, space, electricity, network, and cognitive fields, making joint operations present multi-domain “integrated” characteristics. With the development of single domain to multi-domain, single-domain control rights such as land control, sea control, air control, heaven control, and information control have continued to appear, and the subsequent importance of single-domain control has continued to increase, promoting the connotation of multi-domain control. Expanding and changing, the competition for comprehensive control has become the first priority in the confrontation between ourselves and the enemy.
In terms of development form, single domain to multi-domain is a process of clustering into a network. Restricted by technical conditions and other constraints, combat activities before the information age, whether in terms of battlefield time, battlefield space, or the deployment and use of combat forces, have clear sections between single domains and clear levels of action at all levels, showing a strong Sequential and progressive, showing a single-domain chain development form.
Entering the information age, under the full “adhesion” of the network system, the multi-domain force formation develops from “combination” to “convergence”, forming an elastic structure with spatial dispersion and deployment, time coordination, and multi-dimensional energy release. According to the battlefield situation and changes in the situation, combat activities use the network information system as a “link” to connect the “links” of the combat single domain into a “network” shape, forming the focus of similar strong points and complementary advantages, and realizing each single domain “shape and spirit gathering” and “gathering fingers into fists”, The transition from single-domain chain to multi-domain network was achieved.
In terms of performance index, single domain to multi-domain is a process of energy aggregation and efficiency. Both opposing sides in the war tried to exert their overall combat power in order to achieve combat victory. However, due to the clear boundaries and loose connections of each single domain in the past, improving the overall combat power can only be achieved through the linearity “superposition” of each combat domain. With the development of information technology and intelligent technology, especially the widespread application of information systems in the military, the network information system realizes the command and control of each single domain force and can seamlessly link each combat domain. Each combat force maximizes The advantages of spatial multidimensionality and power diversity have been realized, and the strength and strength of each single domain and each level have been realized The high degree of integration, multi-dimensional cohesion, overall linkage and integrated energy release in terms of means and actions has achieved the effect of complementary advantages, synergy and cohesion, which is conducive to achieving a comprehensive advantage or local overwhelming advantage over the enemy.
“Multi-domain” is the direction-dominant and powerful dominance of “single-domain”
The essence of the winning mechanism of joint operations lies in cross-domain integration to achieve excellence and efficiency, which requires that single domain and multi-domain must be functionally “unified in the same direction”. “Multi-domain” stipulates the status and role of each single domain in combat. Each single domain must start from the overall functional needs of joint operations, focus on providing the ultimate contribution rate to the combat system, and achieve synchronous cross-domain maneuvering, cross-domain coordination, and cross-domain strike, to achieve system advantages in overall confrontation. Currently, the multi-domain dominates and dominates the single-domain in the direction of forming a resultant force with the system mainly from the following aspects.
Transition of multidomain operational requirements to hybrid war threats. At present, conventional threats are expanding and unconventional threats are becoming new and present threats, with the boundaries between regular and irregular battlefields tending to be blurred, between combatants and non-combatants and between physical and virtual dimensions. Joint operations are still the basic form of operations, but specific combat styles show a trend towards combining multiple styles. Various threats from traditional or non-traditional, formal or informal, high-intensity or low-intensity exist on land, sea, air, space, electricity, network, cognition and other multi-domains. These threats add a new dimension to the concept of war. Therefore, it is necessary not only to do a good job in the fight against a single threat, but also to develop the ability to integrate into multi-domain operations to deal with hybrid warfare.
The focus of multi-domain operations shifts to the network information system. Several informatization local wars that have broken out in recent years have shown that no war, no alliance, no alliance, no victory, the network information system that condenses various single-domain combat elements has become the focus of operations, and the combat command information system that gathers the combat power of the network information system has become the main basis for military operations “nerve center” and has become the key point for opponents to attack. The degree of integration of command and information systems is getting higher and higher, and the command systems of each single domain must converge and move closer to the overall command system, so as to achieve system integration of various services and combat units and deep coupling of various combat elements. In line with this, the information domain, the cognitive domain, and the electromagnetic domain, as emerging fields of warfare, have increased in their core status and importance, and have increasingly become the core operational domains for opposing sides to compete for control, becoming capable of causing enemy “blind, incapacitated, and mentally retarded” key operational domains. Therefore, each single domain must strengthen its ability to organically integrate into the network information system within the framework of a unified standard system and achieve interconnection and interoperability between each single domain, so as to ensure that it provides basic support in multi-domain precision warfare and thus wins overall advantages.
Transformation of multi-domain combat forces into joint combat units. Integrated joint operations have the characteristics of platform operations, system support and tactical operations, and strategic support. Strategic-level planning, campaign-level command, and tactical-level operations will become the norm in future wars. Large-scale corps operations may become increasingly rare and will be replaced by joint battles more often on multi-domain battlefields. The joint combat unit will bring together various single-domain combat forces and cover various combat elements. The level of the joint is reflected in the tactical level, presenting an independent combat capability that includes early warning and reconnaissance, information support, combat command, multi-domain attack and defense, combat support and other elements. Joint tactical unit form. Each “single-domain combat force” has a closer coupling relationship, and its own characteristics and advantages will become more prominent.
Accelerate the expansion of “single-domain advantages” to “multi-domain advantages”
For the dialectical unity of a single domain and a multi-domain, we must not only see the unity of a multi-domain, but also respect the independence of a single domain; we must neither completely oppose the two, nor erase the connection between them. In view of the actual situation of combat opponents, combat environment, own strength, etc., and taking into account various political, economic, technological, cultural and other factors, we should accelerate the expansion of “single-domain advantage” to “multi-domain advantage”, so as to form an information advantage, decision-making advantage and operational advantage against the enemy.
First, we must consolidate and expand the advantages of single domain.“ Metcalfe’s law ” tells us that increasing a network entity is capable of producing nonlinear exponential convergence of the combat power of the system. Multi-domain operations are deeply integrated system operations. As the basic element of multi-domain existence, the strength of each single domain’s construction will definitely affect the effectiveness of multi-domain integration. The essence of forming a multi-domain advantage is to deeply aggregate the advantages of each single domain. It is necessary to continuously strengthen the construction of single domain capabilities to form a single domain advantage and limit the opponent’s strength advantage to the limit. In fact, consolidating and expanding the advantages of single domains is not only to enhance single domain performance, but also to serve the purpose of multi-domain convergence. Single-domain construction requires strengthening top-level design, formulating standards and specifications, and striving to overcome conflicts caused by different combat construction concepts formed by the unique combat styles and combat culture of different services. At the same time, it is necessary to coordinate all military construction resources and focus on the development of multi-domain combat weapon platforms to meet the overall needs of joint operations, rather than just the needs of each single domain itself.
Second, we must promote the achievement of cross-domain synergy. Cross-domain synergy emphasizes breaking the boundaries between services and arms and integrating combat forces across services, arms and institutions. Based on the network information system, the combat forces in each domain are distributed in a wide area, and the multiple domains are linked as a whole to complement each other’s advantages and increase efficiency, and quickly gather energy step by step, promoting the expansion of single-domain advantages into multi-domain integration advantages and system advantages, and forming a concentrated energy strike against important enemy targets. In “joint operations”, combat forces in various fields must not only have the ability to independently perform a variety of combat missions, but also need to use their own cross-domain perception, target recognition and strike capabilities to support or even directly participate in other combat domain operations.
3. “Flexible mobile combat application is required!”. The winning mechanism of joint operations lies in the rapid and continuous integration of multi-domain combat forces to form multiple advantages and immediate advantages in specific time windows, forcing the enemy into passivity, disadvantage and dilemma. For the use of single-domain and multi-domain forces, such as the use of fingers and fists, whether it is “pointing points with hands” or “clenching fingers into fists”, or even the mutual transformation and use in combat, we must adhere to seeking truth from facts and comprehensively consider the efficiency of combat effects. Scientifically make decisions based on factors such as efficiency and contribution to the victory of war, and effectively use troops according to circumstances, location, and situation. If the single-domain combat force can solve the problem well, it is no longer necessary to use multi-domain combat forces, thereby improving operational effectiveness.
Theory is the precursor of action. Strengthening innovation in combat concepts and promoting innovation in combat guidance have always been important ways for militaries around the world to develop military advantages. In recent years, the U.S. military has successively proposed cutting-edge combat theories such as “cyber warfare”“ and mosaic warfare”, in order to realize that the combat model “production relationship” can be more adapted to the development of combat capabilities “productivity”. Through comparative analysis of these two combat theories, the world can get a glimpse of the changes in the thinking of building the US military’s combat capabilities, especially the understanding of the winning mechanism “mosaic warfare”, so as to find targeted and effective checks and balances.
● From threat response to war design——
Active shaping and improvement of traction combat capability
“Threat-based ”or “capability-based” are two basic ways to build military combat capabilities.“ Threat-based ”reflecting demand traction and focusing on solving real-life problems in the near and medium term are the basic rules that the military should follow in building combat capabilities; “based on capabilities” embodying goal traction, aiming at future strategic missions, and supporting strategic concepts with new combat theories are the key to military combat capabilities. The only way to innovate and surpass. The development from “cyber warfare” to “mosaic warfare” reflects the differences and evolution of the internal laws of the above two approaches, and also reflects the changes in the thinking and concepts of the US military in promoting combat capability construction in recent years.
New changes in concept origin. Cyberspace was originally born to solve human communication needs. Later, it gradually evolved into a new combat domain independent of land, sea, air, and space. From this, a “cyber war” with the struggle for cyberspace control as the core was derived. In comparison, “mosaic warfare” is a new combat concept actively developed and designed by the US military in order to continue to maintain its strategic advantage and directly target competitors. Its formation process reflects the integration of demand traction and capability traction, and its strategy, initiative, and traction Sex is more prominent.
New ideas for the use of technology.“ Cyber warfare ”emphasis on supporting the transformation and implementation of combat concepts through the development of new generation technologies.“ Mosaic Warfare” breaks out of this model and does not place too much emphasis on the development of a new generation of equipment technology. It pays more attention to the rapid transformation of general military and civilian technologies and the incremental iteration of mature technologies. The basic idea is to build on existing equipment and follow the application concepts of service platforms such as online ride-hailing and crowdfunding development. Through module upgrades and intelligent transformation, various combat system units “mosaicization” will be transformed into single-function, flexible Assemble and replaceable “building blocks” or “pixels” to build a dynamically coordinated, highly autonomous, and seamlessly integrated combat system Embodied new technology-driven ideas.
Path Development New Design.“ Cyber warfare ”as a companion concept to the network space, wherever the network space develops, “cyber warfare” will follow suit. Generally speaking, “objective” material conditions will be considered first, and then “subjective” conceptual design will be carried out. It has strong dependence on path development.“ Mosaic warfare ”first from “subjective” to “objective”, by developing a force design model that can dynamically adjust the functional structure, it can adapt to different combat needs and changes in the battlefield environment.
It can be seen that “mosaic warfare” has clearer goals, more mature technology, and more reliable paths than previous combat concepts such as “cyber warfare”, reflecting the change in thinking actively shaped by the US military.
● From network center to decision center——
Group intelligence to achieve optimal system energy release
AI technology is a key variable in the information age and a core increment in the development of the “mosaic warfare” system.“ Cyber warfare ”emphasis on “network center”, “mosaic warfare” closely focuses on the core of artificial intelligence technology, adjusts the key to victory from “network center” to “decision-making center”, and changes the combat system structure from system level and platform level Joint transformation to functional level and factor level integration, seeking to fully gather energy in the network The “group intelligence technology” realizes the optimal release of the system and gives new connotation to the war winning mechanism in the intelligent era.
Use “fast” to control “slow” to seize the cognitive lead. In future wars, the battlefield situation will change rapidly, and the weight of time factors will continue to increase. “Fast” versus “Slow” can form a combat strike effect that is approximately dimensionally reduced.“ Mosaic War ” By using data information technology and artificial intelligence technology, we can improve the single-ring decision-making speed of our own “OODA” ring, expand the breadth of parallel decision-making, reduce the granularity of group decision-making, accelerate the progress of system operations, and create an overall one-step faster “First move” situation, aiming to firmly control the dominance of cognitive decision-making on the battlefield.
With “low” system “high”, we accumulate cost advantages. Different from the traditional combat concept of pursuing high-end weapon platforms, “mosaic warfare” focuses on using artificial intelligence technology to tap the potential and increase efficiency of existing weapon platforms and combat resources. By loading and operating intelligent algorithms and specific functional modules on many mid-to-low-end weapon platforms, it can achieve combat performance comparable to high-end weapon platforms, overall improving the cost-effectiveness ratio of the input and output of the weapon platform, thereby accumulating cost advantages.
To “disperse” control “gather” and seek sustainable survival. “ Mosaic Warfare ” emphasizes the adoption of decentralized ideas and asymmetric checks and balances, using an open system architecture, and decentralized configuration of various functions such as reconnaissance, positioning, communication, and strike on various manned/unmanned platforms to achieve power. Distributed deployment. At the same time, relying on intelligent algorithms to improve the self-organization, self-coordination, and independent attack capabilities of each platform to achieve dispersion and concentration of firepower. When some combat platforms are eliminated, interfered with or stripped away, the entire combat system can still operate normally, thereby enhancing the continued viability of the battlefield of the force cluster.
Use “movement” to control “stillness” to improve system flexibility. “ Mosaic warfare ” emphasizes further breaking through the barriers of various combat areas. By turning the fixed “kill chain” in different combat domains into a dynamically reconfigurable “kill net”, the “OODA” large ring is disassembled into small rings, and the single ring is differentiated into multiple rings. According to changes in combat processes and combat requirements, intelligent networking is relied on to realize the split-in-movement, call-in-movement and combination of combat forces. In this way, on the one hand, it can enhance the flexibility and adaptability of the combat system; on the other hand, it can also hedge and offset the node aggregation effect of complex networks, making it difficult for opponents to find key nodes to defeat their own systems.
“Mosaic warfare” provides a reference prototype for intelligent operations. But at the same time, as an idealized force design and application framework, “mosaic warfare” still needs closely related technical, doctrinal, policy and other supporting support. There is still a long way to go before it is fully realized, and it is consistent with traditional combat systems. The coexistence situation will exist for a long time.
● From factor integration to system restructuring——
Dynamic structure to enhance combat system flexibility
Structure and relationships often determine function and nature.“ Cyber warfare ”and “mosaic warfare” are built on the common material foundation of the information age and follow the same evolutionary paradigm, but the principles and effects of system construction are different.“ The system structure formed by cyber warfare” is statically deconstructable, while “mosaic warfare” dynamically combines functional units according to certain construction rules to form a flexible system structure with self-organizing and adaptive characteristics, similar to a “dynamic black box”, which is difficult to follow with conventional means. predict. And this flexible structure often “emerges” new capabilities to empower and increase effectiveness in the combat system.
The integrated development of network and cloud makes combat time and space more dynamic and malleable. The Internet and the cloud are the basic environment for the operation of the information combat system. They reshape the process elements of intelligence, accusation, strike, and support in traditional operations, and at the same time derive new combat time and space.“ Cyber warfare ”mainly focusing on network space, its combat time and space are relatively static.“ Mosaic warfare ” is not limited to a single combat space. Under the development trend of information infrastructure network following cloud movement and cloud network integration, tangible and intangible spaces can be further deep-linked. The boundaries between combat time and space are more flexible, and the allocation of combat resources is more flexible, the combat system structure is more dynamic.
Data flows across domains, making operational control more seamlessly coordinated. In the “Command and Control” link, “cyber warfare” focuses on the command and control of combat units by joint combat command agencies. Cross-domain exchange and flow of data is mainly concentrated on the theater battlefield.“ Mosaic warfare ”further sinks the level of joint operations to the tactical end. Through the autonomous cross-domain exchange and seamless flow of data at the tactical level, various data islands can be clustered into data clusters on demand, thereby producing a significant “spillover” effect, making the dynamic, discrete, agile, and parallel characteristics of the combat command control loop more obvious, and more conducive to achieving agile connection of each combat unit on demand Efficiently act in concert.
Algorithm full-dimensional penetration makes system operation more autonomous and efficient. Algorithms are the mapping of human consciousness in cyberspace, forming two basic forms: compilation codes transformed by intention and neural networks transformed by knowledge. In “cyber warfare”, compiled code is widely used, and neural networks are only used locally. In “Mosaic Warfare”, the algorithm expands the two key functions of shaping rules and providing engines, and the breadth and depth of application are more prominent. Shaping rules is mainly based on compilation code, supplemented by neural networks, to construct the process framework and operating logic of the “mosaic warfare” system, laying a structural foundation for its uncertainty, adaptability and ability “emergence”; the provision engine mainly integrates intelligent algorithms The model is distributed to the edge elements to operate, forming a knowledge diffusion effect, thereby comprehensively improving the intelligent autonomous combat capabilities of the “mosaic warfare” system.
The side end releases energy independently, making the combat style more flexible and polymorphic. The edge is an abstract model of various manned/unmanned combat functional units and a direct source of systemic capabilities “emergence”.“ Cyber warfare ”in a system where edge elements are closely coupled with superior and subordinate accusation processes and are in a state of precise control.“ In the mosaic warfare” system, the perception, interaction, reasoning, and decision-making capabilities of edge-end elements are greatly improved. Its “OODA” ring does not need to be linked back to the superior command structure, which is conducive to supporting the formation of a decentralized combat cluster with high and low matching and manned/unmanned combination. form, which can give edge-end elements more self-organizing authority and significantly enhance the battlefield confrontation advantage.
It can be seen that if “cyber warfare” is called a sophisticated war machine, “mosaic warfare” can be regarded as a complex “ecology” that can stimulate the dynamic growth of combat capabilities. New changes in network clouds, data, algorithms, and edges have contributed to The formation of a dynamically complex “system structure”. This structure in turn reversely regulates elements, platforms and systems, and new capabilities continue to emerge, playing an important role in enhancing and evolving the combat system.
● From “system breaking to compound confrontation——”
To analyse the advantages and disadvantages and seek effective checks and balances
“Mosaic warfare” represents to a certain extent the possible direction of the future development of joint operations. It is necessary to fully analyze and grasp the winning mechanism of “mosaic warfare”, shape the field of information and communication as a new quality and new domain that breaks the traditional boundaries of war time and space, create a new concept of network cloud-enabled combat, build and strengthen the support and support capabilities of national defense information infrastructure, and highlight military information network security defense capabilities, enhance the minimum support capabilities for the operation of strategic campaign command organizations, and continuously improve the network information system.
On the other hand, the emergence of the “mosaic warfare” theory makes it difficult for traditional combat methods to attack target nodes with limited capture and control to achieve the system-breaking effect of breaking points and breaking chains. But it should be noted that any system has its inherent contradictions, and the seemingly “impeccable” decentralized structure of “mosaic warfare” can still find ways to effectively crack it. For example, grasp its system complexity characteristics, use its correlation dependence, highlight the functional suppression of communication networks, construct network-electrical composite attack paths, and achieve disassembly and isolation of various units of the combat system; grasp its structural dissipation characteristics, and use Its external information dependence highlights the disguise and misleading of information data, prompting the combat system to transform into abnormal states such as information closure and information overload; Grasp its group autonomy characteristics, use its key technology dependence, highlight the confrontation and efficiency reduction of intelligent algorithms, and suppress the intelligent internal drive of each combat unit; grasp its functional non-linear characteristics, use its unknown vulnerabilities, and highlight battlefield differentiation Strike assessment, test and discover operational system imbalances with higher efficiency and faster speed, and find key weaknesses in system attack.
The report of the 19th National Congress of the Communist Party of China pointed out that it is necessary to “accelerate the development of military intelligence and improve joint combat capabilities and all-region combat capabilities based on network information systems”. Today’s “Liberation Army Daily” published an article pointing out that military intelligence is a new trend and new direction in the development of the military field after mechanization and informatization. We must develop intelligence on the basis of existing mechanization and informatization, and at the same time use intelligence to Traction mechanization and informatization to develop to a higher level and at a higher level. As a new combat field, cyberspace is a new field with high technological content and the most innovative vitality. Driven by military intelligence, it is ushering in a period of rapid development opportunities.
Military intelligence leads to accelerated development of cyberspace operations
■Respect the soldiers Zhou Dewang and Huang Anwei
Three major technologies support the intelligence of cyberspace weapons
Intelligence is a kind of wisdom and ability. It is the induction, cognition and application of laws by all systems with a life cycle. Intelligence is to solidify this wisdom and ability and become a state. A cyberspace weapon is a weapon used in cyberspace to carry out combat missions. Its form is dominated by software and code, and it is essentially a piece of data. The intelligence of cyberspace weapons is mainly reflected in the following three aspects:
First, intelligent vulnerability mining. Vulnerabilities are the basis for the design of cyber weapons. The ransomware that spread around the world in May this year took advantage of vulnerabilities in Microsoft’s operating system and caused a huge shock to the cybersecurity community. Vulnerabilities are expensive, ranging from tens to hundreds of thousands of dollars for a zero-day. The discovery of previous vulnerabilities mainly relied on experienced hackers, who used software tools to check and analyze the code. In the finals of the International Cybersecurity Technology Competition League held during this year’s China Internet Security Conference, participants demonstrated that intelligent robots conduct vulnerability mining on site, and then write network code through vulnerabilities to form cyber weapons, break through target systems, and seize flags. This change means that vulnerability mining has entered an era of intelligence.
Second, intelligent signal analysis and password deciphering. Signals are the carrier of network data transmission, and passwords are the last barrier to network data security. Signal analysis and password deciphering are core technologies for cyberspace operations. Breaking through signals and passwords is the basic path into cyberspace and the primary target of cyber weapon attacks. Intelligent signal analysis solves problems such as protocol analysis, modulation recognition, and individual recognition of signals through big data, cloud computing, deep learning and other technologies. Code-breaking is computational science “the crown jewel”. Through the accumulation of password data samples, intelligent code-breaking can continuously learn and find patterns, and can find the key to deciphering, thereby opening the last door of network data “safe” and solving network problems. Key links of intrusion and access.
Third, the design of an intelligent weapons platform. The U.S. military proposed the “Cyber Aircraft” project in 2009 to provide platforms such as tanks, ships, and aircraft for cyberspace operations. It can realize automatic reconnaissance, loading of cyber weapons, autonomous coordination, and autonomous attacks in cyberspace. When threatened, Self-destruction and removal of traces have certain intelligent characteristics. The weapons loaded by future “cyber aircraft” are not code compiled by software personnel, but directly based on the reconnaissance results to design intelligent cyber weapons on site in real time and achieve “ordered” development, thus greatly improving cyberspace operations. Targeted.
The intelligent trend of network-controlled weapons has become increasingly prominent
Weapons controlled by cyberspace are referred to as cyber-controlled weapons. They are weapons that connect through the network, accept cyberspace instructions, perform cross-domain tasks, and achieve combat effects in physical space. Most of the various combat weapons platforms in the future will be networked weapons platforms. In this way, the military information network is essentially the Internet of Things. Network entities such as uplink satellites, radars, and drones can detect, track, locate, and strike through the Internet. Space control, the intelligence of network-controlled weapons has flourished in battlefields such as land, sea, air, space and electricity.
In 2015, Syria used the Russian Robot Corps to defeat militants. The operation used 6 tracked robots, 4 wheeled robots, 1 automated artillery group, several drones and 1 command system. The commander dispatches drone reconnaissance through the chain of command to spot the militants, and the robots charge the militants, while accompanied by artillery and drone attack force support, delivering a fatal blow to the militants. It was only a small-scale battle, but it set the precedent for robot “group” operations.
Network-controlled intelligent weapons for sea and air battlefields are being developed and verified in large quantities. In 2014, the U.S. Navy used 13 unmanned surface boats to demonstrate and verify that unmanned boat groups intercepted enemy ships and achieved good results mainly by exchanging sensor data. When it was tested again in 2016, functions such as collaborative task allocation and tactical coordination were added, and “swarm awareness” became a distinctive feature of its intelligence.
Swarms of small and micro UAVs for aerial combat are also growing rapidly. In recent years, the U.S. Department of Defense has repeatedly tested the “Quail” micro-drone, which can drop dozens or even hundreds at a time. By improving its coordination capabilities when performing reconnaissance missions, it has made great progress in drone formation, command, control, and intelligence. Progress has been made in management and other aspects.
Space-based cyber-controlled weapons are becoming more and more “smart”. The air and space field mainly contains two types of network-controlled weapons: reconnaissance and strike. Satellites with various functions mainly perform reconnaissance missions and are typical reconnaissance sensors. With the emergence of various small and microsatellite groups, satellites have been made to exhibit new characteristics: small size, fast launch, large number, and greater intelligence. Small and microsatellite groups have greater flexibility and reliability when performing reconnaissance and communication missions, and currently the world’s satellite powers are actively developing plans for small and microsatellite groups with wider coverage.
Hypersonic strike weapons of all kinds cruised in the air and space, as if sharp swords were hanging over people’s heads. The U.S. Air Force Research Office stated that “high-speed strike weapons” will launch flight tests around 2018, and other countries are also actively developing similar weapons. The biggest features of this type of weapon are their high speed, long range, and high intelligence.
Intelligent command information system changes traditional combat command methods
Cyberspace weapons and weapons controlled by cyberspace are the “fist” of intelligent warfare, and the command information system that directs the use of these weapons is the “brain” of intelligent warfare. Cyberspace combat command information systems must keep up with intelligence simultaneously. process. At present, almost all command information systems in the world are facing the difficult problem of “intelligent lag”. In future wars, rapid decision-making and autonomous decision-making are required, which places higher requirements on intelligent auxiliary systems.
In 2007, the U.S. Department of Defense’s Advanced Research Projects Agency launched a research and development program on command and control systems ——“Project Dark Green” in order to enable computer-aided commanders to make rapid decisions and win opportunities. This is a campaign tactical-level command information system. Its research and development purpose is to embed the system into the U.S. Army brigade-level C4ISR wartime command information system to achieve intelligent command of commanders. To this day, the U.S. military has not relaxed its development of intelligent command information systems.
In cyberspace operations, the network target appears as an IP address connected to the network. The large number makes it difficult for manual operations to operate efficiently, and operations require the auxiliary support of intelligent command information systems. Currently, intelligent command information systems need to realize functions such as intelligent intelligence analysis, intelligent perception, intelligent navigation and positioning, intelligent assisted decision-making, intelligent collaboration, intelligent evaluation, and intelligent unmanned combat, especially to realize cluster combat control of unmanned network control systems, which has put forward urgent needs for intelligent command information systems and requires accelerating the research and development and application of corresponding key technologies.
To sum up, intelligent cyber weapons and cyber-controlled weapons, through intelligent information system scheduling, will form huge combat capabilities and can basically carry out all actions in the current combat style. In future wars, from the formation of command forces, to target selection, mode of action, use of tactics, etc., will all be carried out in an intelligent context. The characteristics of war “gamification” will be more significant, and the combat command method will also undergo major changes.
In the future battlefield, fighting courage requires more fighting “wisdom”
■Yang Jian and Zhao Lu
At present, the development of artificial intelligence has entered a new stage, and its penetration into various fields has begun to accelerate. As a result of this process, military competition among nations around intelligence has begun. Our army has always been a heroic and tenacious people’s army that dares to fight and win. In the future, we should continue to carry forward the glorious tradition on the battlefield. At the same time, we must more extensively master and utilize the latest scientific and technological achievements, develop more intelligent weapons and equipment, and develop more intelligent weapons and equipment. Take advantage of the opportunity to win on the battlefield.
Intelligence is a trend in the development of human society, and the war on intelligence is accelerating. It is thanks to successful innovations that go beyond the original architectural computing models, the gradual popularization of nanofabrication technologies, and breakthrough advances in the study of human brain mechanisms that the development of military intelligence has acquired a solid foundation. As a result, intelligent weapons and equipment have become increasingly prominent and are beginning to surpass and replace humans in intelligence analysis, combat response, and more. In addition, in terms of manpower requirements, comprehensive support and operating costs, intelligent weapons and equipment also have obvious advantages and are increasingly becoming the dominant force in warfare.
It has been proven that the development and application of intelligent weapons and equipment has expanded the scope of capabilities for military operations and greatly improved the combat effectiveness of the troops. On the battlefields of Afghanistan and Iraq, UAVs have taken on most of the operational support tasks of reconnaissance, intelligence, surveillance, and about one-third of the air strike tasks. In the past two years, Russia has also repeatedly used unmanned reconnaissance aircraft, combat robots and other equipment with a high degree of intelligence on the Syrian battlefield. Intelligent weapons and equipment are increasingly demonstrating important values that go beyond traditional weapons.
In future wars, the competition for intelligent combat systems will be the key to victory in master battles and peak duels. With the increasing imbalance in the development of military means supported by science and technology, whoever has the ability to implement intelligent operations first will be better able to take the initiative on the battlefield. The strong with the advantage of technological generation will try their best to The cost of war is minimized, while the weak will inevitably suffer huge losses and pay heavy prices. We must not only step up core technological innovation and weapons and equipment development, but also study and explore organizational structures, command methods and application models that adapt to the intelligent development of the military. We must also cultivate a team that can take on the responsibility of promoting the intelligent development of the military and forging intelligent combat capabilities. Talent team, give full play to the overall effectiveness of our military’s combat system, and compete with our opponents Win wars in a more “intelligent” way.
Cognition is the basis for operational decisions and operations. Cognitive warfare is a confrontation activity carried out in the cognitive domain. The purpose is to attack the enemy’s knowledge system, social consciousness, people’s morale, etc., disrupt its judgment and decision-making, and cause it to lose its decision-making advantage and action advantage. To deepen the research on cognitive warfare and decipher the cognitive warfare code, the key is to embed the combat decision-making chain and explore how to influence and interfere with the cognitive activities of the enemy’s decision-making chain, causing the enemy to form false observations, wrong judgments and poor decisions, so as to fully control Cognitive initiative.
Seeing is false, changing the facts
Observation is the starting point of cognition. No matter what kind of war, when facing any opponent, the first step is observation. The observation here is a broad concept and is about all activities to obtain all relevant information about the hostile party. Just as people perceive external things through sensory organs, observation relies on the battlefield perception system to obtain relevant data and information from the battlefield environment according to the needs of the subject, providing “ source material ” for judgment and decision-making. Observation uses intelligence, reconnaissance, surveillance and other activities to obtain as much factual information and materials from all aspects of the enemy as possible and convert them into text, images, audio, video and sensor signals.
The history of war at home and abroad in ancient and modern times shows that the essence of command is the endless pursuit of certainty, including the status and intentions of enemy troops, various factors affecting the combat environment such as weather and terrain, as well as the status and actions of one’s own troops. Therefore, efficient command consists in clarifying each element and then coordinating it as a whole to achieve the best combat effect. Human judgment and decision-making are easily disturbed by information uncertainty. In the observation stage, the key to cognitive warfare is to make the enemy unable to clearly observe, incompletely observe, and distort the information of their own combat elements, and lack real information or accurate understanding, thereby weakening the enemy’s decision-making on combat at the source. The pursuit of certainty.
Measures for observing cognitive warfare, in addition to common information warfare methods, such as disguise, interference, deception, silence, etc., should also pay attention to the following aspects: First, create complex situations. War is inherently full of complexity. By creating complexity, it increases the fog and resistance on the battlefield, making it impossible for the enemy to observe the real specific situation. For example, by creating various events and operations in multi-dimensional combat areas such as land, sea, air, sky, and network, and making irregular changes, it can effectively increase the difficulty of enemy observation. The second is to interfere with observation and cognition. Observation is not aimless. It is carried out based on a certain cognition. Cognition determines what information needs to be observed, what kind of reconnaissance activities need to be carried out, etc. For example, during observation activities, by interfering with operations, the enemy’s attention in observation activities is affected, causing it to lose the ability to focus on essential issues and key issues, thereby making it unable to obtain key information. The third is to shape the factual narrative. Shaping factual narratives is to reformulate, combine, arrange, and reconstruct facts according to the needs of cognitive warfare. These facts are either created out of nothing, highlight certain details in the facts, or are difficult to verify and test, making their observation materials Mixed with fictional facts, the observed facts are far from objective facts. The fourth is to protect specific knowledge. Knowledge protection is an important aspect of cognitive warfare. The main contents include: commander’s decision-making style, combat theory reasoning process, premises and assumptions, key tactical ideas and combat principles, key decision-making procedures, mechanisms and methods, information analysis methods, especially some algorithms, passwords, etc.
Targeting the judgment, misleading the judgment
On the battlefield, simple observation and data collection do not make much sense. Only by analyzing these data “ by looking at the essence of the phenomenon, and then drawing various judgments, will we promote the formation of operational decisions. For example, during the Battle of Moscow in World War II, the Soviet Union had a lot of and messy information about the Japanese Kwantung Army. Finally, after careful analysis, it was concluded that “ the Soviet Union could be considered safe in the Far East, and the threat from Japan had been ruled out ” After the judgment, it was decided to transfer troops from the Far East to Moscow to participate in the Battle of Moscow. Judgment is the corresponding conclusion reached by analyzing and reasoning the observation results, which mainly includes: first, factual judgment, usually expressed in descriptive language, such as the current situation, enemy battlefield deployment, battlefield posture, etc.; second, value and relationship judgment, usually Expressed in evaluative language, such as threat assessment, correlation analysis, trend prediction, etc.
Judgment cognitive warfare is actually a game surrounding judgment. Normally, judgments arise on the basis of a judgment, without which there would be no conclusion of judgment. Whether a person has high blood pressure or diabetes is often based on some medical indicators, and these indicators are the criteria. The premises and assumptions of reasoning are actually based on judgments. “ Persian cat story ” circulated in World War I. Judging from the location of the command post from a Persian cat, it contains a series of judgments: there is no village around, and it cannot be a cat raised by ordinary civilians; the sound of artillery on the battlefield is rumbling, and it cannot be It is a wild cat that is cautious and avoids people; Persian cats are a valuable breed, and the position of cat owners is not low; cats appear at fixed times every day, and the command post should be near cats. Therefore, interfering with judgment is to target the judgment to design and produce information products so that the facts obtained do not match the judgment, or to minimize the leakage of information related to the judgment, so that the enemy cannot judge or make wrong judgments.
The main contents of the interference criterion are: First, the interference is based on experience. Based on enemy experience, create “ virtual facts ” to make errors in judgment. For example, in the Battle of Maling, Sun Bin halved the stove to lure Pang Juan, which is a typical example. Because according to experience, the number of stoves is directly proportional to the number of troops. Halving the number of stoves every day means that the number of people is decreasing. The possibility of reduction is that the soldiers have suffered greater casualties, which leads to the judgment of weakening combat power. The second is to interfere with the judgment based on the knowledge system. Such knowledge includes the enemy’s common sense, concepts, principles and some assumptions. For example, in the Fourth Middle East War that broke out in October 1973, Israel’s initial defeat was a misjudgment of the war situation. It believed that as long as its air force was still in an advantageous position, the other side would never dare to attack. However, Egypt began to adopt new military technology and used mobile surface-to-air missiles to support an air defense network, partially offsetting Israel’s air superiority. The third is to interfere with judgments based on universal culture. That is, design corresponding information and actions based on the enemy’s cultural characteristics so that they can be misjudged due to cultural differences. According to foreign information, during the Cold War, the United States studied the root causes of “ Soviet behavior, so it started from culture and behavior to induce the Soviet Union to make strategic misjudgments. The fourth is to interfere with methodological-based judgments. Generalizations, analogies, etc. are the basic methods of judgment. Cognitive interference based on methodology makes it difficult for the other party to understand facts and cannot be compared with known facts; complicating the causal relationship and confusing factual cause and effect, psychological cause and effect, conditional cause and effect, social cause and effect, etc., making it impossible to implement causal judgment; reducing possible signs and phenomena, making it impossible to see through the essence and make accurate judgments.
Focus on the process and influence decision-making
Operational decision-making is based on combat purposes and intentions. After observation and judgment, various factors are combined to derive the optimal solution to the problem. War or conflict behavior has game, competition and confrontation attributes, so decision-making is a game. Decisions address key issues such as whether to do it, how to do it, what purpose to achieve, or the state of termination. In information-based local wars, action-centeredness gradually replaces planning-centeredness, requiring an increase from data center warfare, information center warfare, and knowledge center warfare to decision-making center warfare. Combat decision-making has become one of the main areas of competition between the enemy and ourselves.
Decision-making cognitive warfare is to target enemy cognition and interfere with the decision-making process to affect the quality and efficiency of decision-making. Decision-making is affected by the knowledge structure of the decision-maker himself. If cognition is paranoid or the knowledge reserve is outdated, even if the judgment is correct, good decisions will still not be made. The decision-making process includes the application and change process of knowledge structure, which mainly involves procedural knowledge and conceptual principled knowledge. The former includes decision-making procedures and methods, decision-making mechanisms and evaluation methods, etc., while the latter includes understanding of battlefield posture, winning mechanism, combat concepts, combat rules, and weapons and equipment performance. Therefore, cognitive attacks on the decision-making process will greatly affect its decision-making speed and quality.
The main ways to influence cognitive warfare in decision-making are: First, squeezing the cognitive decision-making space. When watching tennis matches, commentary on non-forced errors and forced mistakes are often heard, with forced mistakes being those caused by putting pressure on the opponent. Interfering with the cognitive decision-making environment is to put pressure on the enemy’s cognitive decisions, thereby squeezing the cognitive space and weakening cognition to force the enemy to make mistakes in decision-making. For example, through virtual and real decision-making activities and actions, the opponent is trapped in decision-making difficulties, which increases the probability of low-level decision-making. The second is to attack rational cognition. Including: First, interfering with the understanding of threats and opportunities. Many examples of failures in military history are caused by misjudgment of threats and opportunities on the battlefield. Whether you despise the enemy or overestimate the enemy, you will form decision-making expectations that are different from objective reality, leading to adverse action results. Second, attack combat theory and doctrine. For example, by proposing the theory of mutual restraint, deliberately exaggerating the loopholes in the enemy’s doctrine, and amplifying the adverse effects of the enemy’s combat operations, the enemy can arouse doubts about its own theory and doctrine. Third, for procedural knowledge. Including decision-making mechanisms, procedures and methods, plan evaluation and combat evaluation methods, auxiliary decision-making systems, algorithms, thinking, etc. Attacking the weaknesses present will also cause decision-making errors. The third is to interfere with irrational factors. The use of irrational factors often creates decision-making traps, such as groupthink traps, conceit traps, etc., which have a significant impact on decision-making. The strategic deception successfully implemented by the Allied forces many times during World War II was to use the enemy’s ambiguous and misleading analysis to increase the probability that the wrong decision would win.
System “Gathering Excellent War” It is “systematic warfare in information warfare. It does not necessarily refer to a certain combat style, but is composed of multiple combat styles and tactics” “combination boxing”, or combat style group . Emphasizes that, depending on the combat mission, combat opponent and the changing battlefield situation, any appropriate means and style of combat can be used flexibly to form combat advantages as long as it is conducive to forming comparative advantages and achieving system victory. In the specific implementation process of “system-based superior warfare”, these specific combat styles and operational tactics can not only be organized and implemented separately as part of joint all-domain operations, but also emphasize fighting “combination boxing”, using multiple strategies simultaneously, and winning as a whole.
In order to better understand its core connotation, this article lists Nine typical combat styles including overall deterrence warfare, electromagnetic disturbance warfare, network penetration warfare, and cognitive control disturbance warfare And analyze . System “Juyouzhan” ――combination boxing that flexibly uses multiple combat styles“ 1. Overall deterrence war: Emphasis on multi-domain joint deterrence; Three elements should be present in the implementation of an overall deterrent war ; Strong overall strength is central to achieving effective deterrence 2. Electromagnetic Disturbance Warfare : The key to competing for information advantage; On the combined means approach, information empowerment is achieved through “connection + sharing” ; Crack down on effective tactics for unmanned cluster operations 3. Cyber-sabotage: Soft “kill” is the main focus, combining soft and hard, focusing on breaking the net and reducing energy failure 4. Cognitive scrambling: Control the cognitive power of situational awareness and compete for information advantage; control the decision-making power of command and compete for decision-making advantage; control “brain” power and seize the advantage of brain control 5. Agile mobile warfare: High-efficiency and rapid decision-making; high-efficiency formation of a favorable combat situation; high-efficiency and instant gathering of combat forces; agile mobile warfare is an innovative development of traditional mobile warfare 6. Swarm autonomous warfare: It is conducive to forming a system advantage to suppress the enemy; it is conducive to enhancing the combat effect; it is conducive to falling into the enemy’s combat dilemma 7. Point-and-kill War: Achieving an efficient cost ratio for operations; targeting key nodes is an important option; large-scale system support is a basic condition; it is inseparable from precise intelligence support 8. Supply-breaking: The supply guarantee chain has a huge impact on the overall combat situation; the center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain; the focus is on choosing the right time and making full use of tactics 9. System “paralysis battle:” The objectives of the operation are to make the enemy combat system run out of order; to strike the key nodes of the combat system with heavy blows; and to carry out soft strikes against the enemy combat system For learning reference only, welcome to communicate and correct! Article views do not represent the position of this body The concept of combat was first proposed as a new combat style. Innovative combat styles are a core element in the development of combat concepts. It can be said that system-gathering battle is a general term for a series of specific tactics. The following nine typical combat styles constitute the tactical system of system-gathering and superior warfare. They are: One is Overall deterrence warfare, actively organize static power display and deterrence actions in system excellence battles, and strive to defeat others without fighting or small battles; Two is Electromagnetic disturbance warfare uses various combat methods and action styles such as electronic detection, attack and defense to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize the right to control information, and then win the initiative in combat; Three is In cyber attack warfare, various means such as soft strikes and hard destruction are used to defeat the enemy’s command network, intelligence network, communication network, logistics supply network, and disrupt the enemy’s command and support; Four is Cognitively Controlled Disturbance. Form a controlling advantage in the cognitive space through information attacks, public opinion attacks, and brain attacks; Five is Agile mobile warfare. Quickly adjust the deployment of troops and weapons, quickly gather capabilities on the battlefield, and seize combat opportunities; Six is Swarm autonomous warfare. Extensively use unmanned combat methods such as “bee swarms”, “wolf swarms”, and “fish swarms” to independently organize actions and distributed attacks to achieve joint human-machine victory; Seven is Pointkill. Accurately obtain intelligence, carry out multi-domain precision strikes, strive to shake the overall situation with one point, and maximize combat benefits; Eight is Supply-breaking. Organize an elite force to attack enemy logistics supplies and equipment supply supply chains, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle; Nine is System “paralysis battle”. A variety of means, such as breaking the net, exercising, and hitting nodes, are used to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken its functions.
1. Overall deterrence Overall deterrence warfare refers to actively organizing static power display and deterrence actions in the system’s battle for excellence, and striving to defeat others without fighting or small battles. Sun Tzu said: “Subduing one’s troops without fighting is a good thing.” Deterrence and war are the two main forms of military activity. And “deterrence” is mainly the act of showing determination and will to potential opponents by showing strength or threatening to use strong strength to deter opponents from action. It can be said that the overall deterrence war in the system-based battle of excellence is an important means or tactic to achieve the goal of “stopping” human troops without fighting. Clausewitz emphasized that the first rule of strategy is to be as strong as possible, first in general, and then in key locations. Modern warfare is system-to-system confrontation. The overall deterrence war under informationized local warfare requires not only traditional deterrence methods and capabilities on land, sea, air and space, but also new deterrence methods and capabilities such as space deterrence, electromagnetic deterrence, and network deterrence. It also requires an overall deterrence that shows the overall strength of the country. Especially with the rapid development of advanced technologies such as information technology, the technological revolution, industrial revolution, and military revolution have accelerated their integration, and strategic competitiveness, social productivity, and military combat effectiveness have become more closely coupled. Winning the information war is to a greater extent a contest between the will of the country and the overall strength of the country. To contain the war, we must first act as a deterrent to our opponents in terms of overall strength.
1.1 Emphasis on multi-domain joint deterrence Means of deterrence typically include both nuclear and conventional deterrence. In the “system-based battle for excellence”, the overall deterrence war is implemented, aiming to comprehensively use conventional deterrence methods across the land, sea, air and space power grids to achieve the purpose of deterrence. Especially with the application of information network technology and space and directed energy technology in the military, space, networks, electromagnetic weapons, etc. have become new means of deterrence. Space deterrence, It mainly uses equipment such as rapid response electromagnetic orbit weapons, space-to-ground networked anti-navigation and positioning service systems, large elliptical orbit laser weapons, and high-power microwave weapons to threaten and attack the opponent’s space targets and form a deterrent against enemy space information “interference blocking”. Cyber deterrence mainly uses cyberspace situational awareness and attack equipment to threaten and attack the opponent’s military network and other critical information infrastructure to achieve deterrence against the enemy. Electromagnetic deterrence mainly uses electromagnetic spectrum combat systems to threaten and attack enemy detection, navigation, communications and other information weapons and equipment systems to achieve deafening and blinding deterrence against the enemy.
1.2 The implementation of overall deterrence should have three major elements Implementing an overall deterrent war and achieving the desired effect of deterrence usually requires three main elements: One is strength. The deterrent must have the reliable ability or strength to frighten and fear the opponent; the second is determination and will. The deterrent party must dare to use this capability when necessary; third, to transmit information clearly. The deterring party must make the ability to act and the determination clearly known to the other party accurately and effectively.
Historically, the criteria for judging deterrent strength have varied in three main ways: First, the active military force; second, the combined national strength or war potential; and third, the total number of main battle weapons and equipment. For quite a long period of history, the number of troops was deterrence, and the strength of military strength depended directly on the size of the active military, the amount of vital weapons and equipment, and non-material factors such as the morale of the army’s training organization. After the twentieth century, with the expansion of the scale of warfare, deterrence power has become less limited to the strength of the military and the quantity of vital weapons and equipment, but is determined by the nation’s war potential, which includes economic power, scientific and technological power, energy resources, and even population size, among others. The overall deterrence war in the system’s “gathering and excellence war”, the formation of its deterrence strength is mainly based on the network information system, as well as the joint global deterrence capability formed under the integration of the system.
1.3 Strong overall strength is the core of achieving effective deterrence The development of information technology and its widespread penetration and application in the military sector provide favourable conditions for building overall strength and achieving overall deterrence. System “Juyouzhan” is supported by the network information system, making full use of the permeability and connectivity of information technology, not only integrating various combat forces, combat elements, and combat units into an organic whole, realizing the military system combat advantages, but also integrating Various fields related to war and national mobilization, such as national politics, economy, diplomacy, finance, transportation, and energy, are connected and integrated into the national war mobilization system Gather all forces and resources to form an overall synergy, realize the emergence effect of system capabilities, show the overall strength advantage, and form a powerful invisible deterrent of united efforts and sharing the same hatred Create a situation that makes the enemy “powerful but unable to act ”“able to act but ineffective”, and play a role in containing and winning the war. In the “overall deterrence war”, the scope of national war mobilization will be wider, not limited to a certain direction or region, but throughout the country and even the relevant regions of the world; mobilization time will be faster, and using networks and information systems, mobilization and action information can be quickly transmitted to everyone and every node at the first time; action coordination and synergy will be more consistent, and all forces distributed in various regions can be based on the same situation Under the same order, the operation is unified at almost the same time, which greatly improves the efficiency of operational synergy; resources are more fully utilized, and various war resources based on the Internet can quickly realize the conversion between peacetime and wartime, military-civilian conversion, and achieve integrated front and rear guarantees and precise guarantees.
2. Electromagnetic Disturbance Warfare Electromagnetic disturbance warfare refers to the flexible use of electronic detection, attack and defense and other combat methods and action styles to disrupt, prevent and destroy the enemy’s electromagnetic capabilities, actively compete for the advantages of the electromagnetic spectrum, seize information control rights, and then win operational initiative.
2.1 The key to competing for information advantage Informatization local warfare is highly dependent on the electromagnetic spectrum, the Control and counter-control of electromagnetic space have become the focus of competition for information rights. Organize and carry out electromagnetic obstruction warfare, mainly to destroy the enemy’s electromagnetic spectrum and protect one’s own side from destruction. The electromagnetic spectrum is the main carrier for transmitting information. The use of electromagnetic means to disrupt the enemy’s electromagnetic spectrum will effectively reduce the enemy’s information combat capabilities and enable our own side to ensure the rapid and effective flow of information in the scenario of ownership of information rights, driving command flow, action flow, and material flow through information flow, energy flow, and then have the dominance and initiative in combat.
2.2 The basic focus is to implement electromagnetic disturbance warfare in the battle to deactivate the enemy’s combat system. It is mainly aimed at the enemy’s dependence on electromagnetic space. At the same time, in order to ensure its own effective use of electromagnetic space, it organizes various electronic reconnaissance and interference, attack, defense and support forces to attack enemy communication networks, radar networks, computer networks and command centers, communication hubs, radar stations, etc Computer network nodes, global navigation and positioning systems, space link systems such as the “Heaven and Earth Integrated Internet”, and various other frequency-using weapons and equipment carry out interference and attacks, block and destroy their communication and data transmission, and destroy the enemy’s combat system. “Connection” and “sharing” structural center of gravity provide support for seizing information control and electromagnetic control from the root, thereby weakening the enemy’s command and control capabilities Deactivating and disabling the enemy’s entire combat system.
2.3 Crack effective tactics for unmanned cluster operations “Unmanned autonomous group operations such as swarms ”“wolves ”“fishes” are important features of information-based local warfare with intelligent characteristics. The various unmanned autonomous clusters are large in number, diverse in type, and complex in characteristics, and each individual can complement each other and play a role in replacing each other. It will be very difficult to intercept and damage the entire unmanned cluster. However, from a technical point of view, for unmanned combat clusters to achieve effective synergy, each individual must share and interact with each other. Once the communication coordination between unmanned clusters is interfered with, it will be impossible to share battlefield posture and information, and will not be able to coordinate actions with each other, making it difficult to achieve the combat effectiveness it deserves. This gives the other party an opportunity to implement interception of communications and electromagnetic interference. Therefore, the implementation of electromagnetic spectrum warfare, interference and attacks on the information and communication networks of unmanned clusters, and the destruction of their information sharing and interaction will make it impossible for each individual in the unmanned cluster to achieve effective synergy and thus lose its operational capabilities.
3. Cyber-sabotage Cyber-blowout, It refers to military confrontation operations that comprehensively use technologies such as networks and computers and other effective means to control information and information networks. It is a major combat style of cyberspace operations and competition for network control. Its main combat operations are both soft-kill and hard-destroy, focusing on soft and combining soft and hard. Among them, soft kill is mainly a cyber attack, that is, it comprehensively uses blocking attacks, virus attacks and other means to block and attack enemy information networks, command systems, weapon platforms, etc., making it difficult for enemy networks, command information systems, etc. to operate effectively or even paralyze; hard destruction mainly uses precision fire strikes, high-energy microwaves, electromagnetic pulses, and anti-radiation attacks to paralyze and destroy enemy information network physical facilities Destroy enemy combat and weapons and equipment entities. The important thing is to “break the net and reduce energy failure”. Organizing a cyber attack in a “system-based battle of excellence” is to target the weaknesses of the combat opponent’s military information network, use the advantages of the system to organize various cyber attack forces, and conduct combat command networks, reconnaissance intelligence networks, communication networks and even logistics throughout the entire operation. Supply networks, etc., continue to carry out soft killing and hard destruction operations to destroy the enemy’s network system The overall function of the enemy’s combat system is reduced or even disabled. It mainly targets core targets such as the enemy’s basic information network, intelligence network, command network, and support network, and implements a series of combat operations such as network-to-electronics coordinated attacks, deception and confusion, link blocking, and takeover control, so that the enemy’s intelligent combat network system becomes incapacitated and ineffective, achieving a critical victory that paralyzes the enemy system.
4. Cognitively Controlled Disturbance Warfare Cognitive interference control war refers to interfering with, destroying or controlling the enemy’s thinking and cognition through information attacks, public opinion attacks, and brain attacks in the system optimization war, so that the enemy cannot make correct judgments and decisions, thereby controlling the enemy in cognitive space. form a controlling advantage. Cognitive domains, That is, “human thinking space and consciousness space are areas that have a critical impact on combat decision-making and judgment”. The development of information technology, especially artificial intelligence technology, and its widespread application in the military field have expanded the battle of war from physical space and information space to cognitive space, making cognitive space a completely new combat domain. With the development of information and intelligent technology and its widespread and in-depth application in the military field, the Human-machine intelligence tends to converge This has made the status of cognition in intelligent warfare more prominent, and the cognitive field has gradually become an important battlefield. The right to control cognition has become a key element of future battlefield control. Fighting for cognitive control has become an important combat style for winning information-based local warfare operations with intelligent characteristics.
4.1 Control the cognitive rights of situational awareness and compete for information advantages In the system’s “excellence battle”, information flow drives the flow of matter and energy, and information advantage determines decision-making advantage. Rapid and accurate knowledge of intelligence information and battlefield situations has an important impact on seizing command and decision-making advantages. Therefore, when organizing and implementing system-based battle gathering, we must make full use of intelligent technology and big data technology to conduct comprehensive analysis and judgment on massive intelligence information data, mine and extract the required intelligence information, and achieve more accurate and faster understanding of battlefield situations and combat environments. Cognition ensures that the enemy is discovered first and the enemy is recognized first from the source. While removing one’s own side “the fog of war”, create “the fog” for the opponent. Therefore, in order to compete for cognitive rights, we must not only control and process information before the enemy, but also take measures such as online public opinion attacks and high virtual reality chaos to actively create and spread false information, disrupt and disrupt the perception and cognition of hostile battlefield situations, maximize confusion and increase uncertainty, interfere with the opponent’s combat decisions, and delay its combat operations.
4.2 Control and command decision-making power and compete for decision-making advantages Decision strengths determine action strengths. Quick decision-making by the commander is the key to shortening “the command cycle” and achieving quick wins. The organizational system focuses on excellent combat, and the success or failure of combat operations depends largely on the speed of the commander’s decision-making. It is necessary to “use intelligent auxiliary decision-making systems, select the best combat plans, scientifically and rationally allocate combat resources, and maximize combat effectiveness; use ubiquitous intelligent networks to access required combat nodes and combat platforms at any time to build and form an integrated combat system.” Achieve decentralized deployment of power, information, and capabilities, cross-domain linkage, form advantages at locations and times required for operations, gather energy to release energy, and gather advantages to win; Implementation “core attack”, Errors or deviations in the enemy’s command decisions are caused by hacking into the other party “chip”, tampering with its programs, and command and decision system algorithms.
4.3 Control “brain” power and seize the advantage of brain control Cognitive interference control warfare in the system’s “gathering excellence war” emphasizes “attacking the heart and seizing the will”, that is, using network warfare, electromagnetic warfare and other methods to control the enemy’s human brain and consciousness cognition as well as the control system of the unmanned autonomous platform “attacking the heart Cognitive control warfare to control the brain and seize ambitions” Replace “destroy” with “control”, To achieve the goal of stopping and winning the war at the minimum cost. Attacking the heart and controlling the brain is different from traditional strategic deterrence. It places more emphasis on active attack. It is an active attack operation that mainly uses advanced information combat technology, brain control technology, etc. to attack the enemy’s decision-making leader, as well as intelligent unmanned autonomous combat platforms, auxiliary decision-making systems, etc., carry out controlled “brain” attacks, directly control and disrupt the opponent “brain”, influence and control the enemy’s decision-making, or disable it Enable stealth control of enemy combat operations. For example, “Targeting human cognitive thinking, using brain reading and brain control technology, and using mental guidance and control methods to directly carry out “inject ”“invasive” attacks on the brains of enemy personnel, interfering with, controlling or destroying the cognitive system of enemy commanders.”, deeply control it from the perspective of consciousness, thinking and psychology, seize “control intellectual power”, disrupt the enemy’s decision-making, destroy the enemy’s morale, and force the enemy to disarm.
5. Agile Mobile Warfare Agile mobile warfare refers to the efficient decision-making, efficient adjustment of troop deployment and high-efficiency real-time gathering of combat forces in systematic battle, efficient gathering of capabilities on the existing battlefield, and seizing combat opportunities. Agility is the ability to respond quickly and timely to changes in the battlefield environment. It has the characteristics of responsiveness, robustness, flexibility, elasticity, innovation and adaptability.
Table 1 Connotation of the concept of agile warfare
5.1 Efficient and fast decision-making To implement agile and mobile warfare, we must first make efficient and rapid decisions to win operational opportunities. Therefore, it is necessary to comprehensively use various means of reconnaissance, detection, perception and surveillance to obtain battlefield posture and target information in a timely manner, especially characteristic information, activity trajectories and real-time position information of time-sensitive targets, so as to ensure precise intelligence support for rapid decision-making. Efficient decision-making is also reflected in the speed of intelligence processing. It takes less time to screen effective intelligence information, formulate action plans at a faster speed according to changes in circumstances, and seize the initiative and seize the opportunity with one step ahead. High-efficiency decision-making focuses on shortening the decision-making cycle, taking the target time window as the central point, and integrating decision-making command with combat units and weapon platforms, rapid response, and overall linkage to improve combat efficiency.
5.2 High efficiency forms a favorable combat situation It is necessary to “keep abreast of changes in the battlefield situation at any time, rely on the support of information networks, and achieve dynamic reorganization of combat forces and integration during movement through cross-domain, cross-dimensional, and diversified three-dimensional maneuvers. Combat resources flow efficiently throughout the region and gather during movement to achieve mobility and excellence.”, forming a favorable battlefield situation. Agile mobile warfare relies on data fusion processing, intelligent assisted decision-making and other means to quickly form combat plans, quickly project combat forces at a high frequency according to the case, organize troops to quickly form favorable combat deployments, and realize enemy discovery, enemy decision-making, and enemy fire, first enemy assessment, change the balance of power in the shortest time and fastest speed, form combat advantages, and improve the efficiency of combat operations.
5.3 Efficient and instant gathering of combat power To organize agile mobile warfare, the key is to select the right combat force within a limited time, coordinate the entire battle situation, and form an overall synergy to ensure a fatal blow. Therefore, in response to changes in battlefield posture, especially target situations, it is necessary to draw up groups to form a joint mobile combat system formed by multi-domain combat forces, gather combat forces in real time, deploy quickly and mobilely to a favorable battlefield, and carry out real-time strikes against the enemy. For deep space, deep sea, etc. to become a new combat space, an intelligent unmanned autonomous combat platform can be organized Rapid mobility is deployed to lurk near key targets or important passages that are difficult for humans to reach due to physiological limitations, and ambush operations are carried out on standby, creating new cross-domain checks and balances.
5.4 Agile mobile warfare is an innovative development of traditional mobile warfare In the history of both ancient and modern warfare at home and abroad, there have been numerous examples of successful battles that relied on rapid covert maneuvers to achieve combat objectives. However, the combat process of information-based local warfare has been greatly compressed, the combat rhythm has accelerated rapidly, and fighter aircraft are fleeting. It has put forward higher requirements for fast mobile capture fighters. It is difficult to meet the requirements of joint operations and all-area operations under information conditions alone “fast pace, high speed”. requirements, so agile mobility must be implemented.
6. Unmanned cluster autonomous warfare Unmanned cluster autonomous warfare refers to the widespread use of unmanned combat methods such as “bees”“ wolves ”“fishes” in system optimization warfare to independently organize actions and distributed attacks to achieve joint human-machine victory. With unmanned autonomous equipment becoming the main combat force on the battlefield, defeating the enemy with unmanned autonomous equipment clusters and numerical superiority has become an important combat style in information warfare.
6.1 It is conducive to forming a system advantage to suppress the enemy Unmanned cluster independent warfare gives full play to the special advantages of unmanned combat weapons such as all-weather, unlimited, difficult to defend, and low consumption, and builds and forms large-scale unmanned combat clusters or formations such as unmanned “bee swarms”“ wolves ”“fish swarms”, and organizes independently, mutual coordination, can implement close-range and full-coverage reconnaissance, or act as bait to interfere or deceive, or cooperate with main battle weapons to implement distributed coordinated attacks Enable overall mobility and joint control of the enemy.
6.2 Conducive to enhancing combat effectiveness In “unmanned cluster autonomous operations”, different combat units within the unmanned cluster organization are responsible for different functions and different tasks, including those responsible for reconnaissance, those carrying out electromagnetic interference and fire strikes, and those playing “decoy” roles. Clusters transmit and share battlefield information through inter-group networks, perform their respective duties according to the division of labor, and collaborate in real-time, independently, and dynamically according to battlefield changes. They not only give full play to their advantages in quantity and scale, but also use information networks and intelligent integration technology to achieve integration effects, using cluster advantages to consume enemy defense detection, tracking and interception capabilities, rapidly saturating and paralyzing the enemy’s defense system.
6.3 Conducive to getting into enemy combat difficulties Unmanned cluster autonomous warfare uses a large number of autonomous unmanned combat platforms with different functions to form an unmanned combat cluster integrating reconnaissance and detection, electronic interference, cyber attacks, and fire strikes. It can carry out multi-directional and multi-directional operations against the same target or target group. Multiple, continuous attacks will make it difficult for the enemy to make effective counterattacks.
7. Pointkill Battle “Precise point-killing warfare” refers to accurately obtaining intelligence in system-based battles, implementing multi-domain precision strikes, striving to shake the overall situation with one point, and maximizing combat benefits. Informationized local warfare is an overall confrontation between systems. Implementing precise point-killing warfare and precise strikes on important nodes and key links of the enemy’s combat system will destroy the enemy’s combat system and reduce enemy combat capabilities, which will achieve twice the result with half the effort. Combat effect.
7.1 Achieve efficient combat cost ratio Achieving maximum combat effectiveness at the minimum cost is a goal pursued by both sides of the war. With the widespread application of information technology in the military field and the advent of information warfare, precision-guided weapons, intelligent kinetic energy weapons, integrated surveillance and attack drones, and laser weapons are widely equipped with troops; through the use of big data, artificial intelligence and other technologies, it has become possible to accurately calculate the required troops and weapons. These all provide material and technical conditions for achieving precision point kill warfare, achieving operational objectives at a lesser cost, and achieving operationally efficient fee ratios.
7.2 Targeting key nodes is an important option The key to precise point-killing battles is to hit the key points and nodes. If you don’t hit, it will be enough. If you hit, it will be painful. If you hit, you will win. If you hit a point, you will break the enemy’s system and shake the overall situation. The target of the strike is not limited to the enemy’s dispersed deployment of ships and aircraft, but should also be targeted at local, dynamic, time-sensitive targets or independent targets such as enemy command centers, important hubs, and even major generals and commanders, in pursuit of deterrence, shock and enemy-breaking system effects. It will also be an effective countermeasure to use precision strike fire to carry out “point-kill” strikes in response to the distributed tactic of decomposing expensive large-scale equipment functions into a large number of small platforms and implementing decentralized deployment of forces.
7.3 Large-scale system support is the basic condition The implementation of precise point-kill warfare cannot be separated from the support of a large-scale system. Focusing on achieving combat goals, the required troops and weapons are transferred from each operational domain that is dispersed and deployed. With the support of the network information system, they are dynamically integrated to form a precision strike system to achieve overall linkage and system energy gathering. Through reasonable and sufficient firepower, the target is concentrated. Strike to achieve precise use of troops and precise release of energy. To implement precise point-and-kill operations to be precise, all links within the entire combat system need to be closely connected without any mistakes. The U.S. military’s killing of bin Laden in 2011 can be said to be a typical strategic precision killing operation supported by the strategic system.
7.4 It is inseparable from precise intelligence support In precision point kill warfare, precise intelligence support is always the key to achieving operational goals. Therefore, before the war, various means should be used to collect various enemy intelligence information, especially accurate analysis and judgment of enemy targets. During combat operations, various sensors and intelligence reconnaissance methods should be used to accurately grasp enemy target changes and dynamic target situations in a timely manner, so as to provide powerful and effective intelligence support for the implementation of precise point-kill warfare. The U.S. military’s targeted killing operation against Soleimani was a typical precise point-killing battle supported by an efficient intelligence system.
8. Supply-breaking Supply chain-breaking warfare refers to organizing elite forces in a system-gathering battle to attack the enemy’s logistics supplies and equipment supply supply chain, supply lines and supply bases, defeat the enemy and lose supplies and withdraw from the battle. In response to weaknesses such as the enemy’s long logistics supply line and large equipment support stalls, the organization of elite forces to build “chain-breaking warfare” combat systems, and to carry out sustained, precise and devastating strikes against enemy logistics supplies and equipment supply chains, supply lines and supply bases, will make it unsustainable due to the loss of supplies and will have to withdraw from the battle.
8.1 The supply guarantee chain has a huge impact on the overall combat situation Logistics equipment support is an important basis for operations. The constant supply of logistical supplies and weapons and equipment ultimately determines the size of an army’s combat troops, whether they can fight, in what season, where they can fight, how far they can leave their rear bases, how long they can fight, how fast they can maneuver, and so on. In information warfare, the consumption of battlefield materials has increased exponentially. Not only has the dependence on logistics equipment support for operations not decreased, but it has become larger and larger. Moreover, the requirements for the specialization of support have also become higher and higher In particular, modern combat equipment is available in a wide variety of models and specifications, with huge volumes of mixed transport, more dispersed troop deployment and very high requirements for transport capacity, which makes bases, communication lines and transport more important than ever. The stable and efficient operation of the supply guarantee chain and continuous and uninterrupted supply guarantee are the key to operational victory and have a huge impact on the overall operational situation.
8.2 The center of gravity of the attack is a key node in cutting off the enemy’s supply guarantee chain The operational center of gravity of supply chain-breaking warfare is a key link in attacking the enemy’s supply support chain, and its continuous support capability is lost through chain-breaking. Therefore, the organization of supply chain-breaking warfare should mainly target enemy ground railway and road transport lines, maritime supply convoys, military requisitioned merchant ships and combat support ships, large and medium-sized air transport aircraft, and rear supply bases. For example, striking the enemy’s maritime supply support chain and cutting off the enemy’s fuel, ammunition, fresh water, and food supplies will make the enemy aircraft carrier battle group lose its ability to continue fighting, which in turn will even affect the outcome of a battle.
8.3 The key is to choose the right time and make full use of tactics It is crucial to organize the implementation of supply chain-breaking warfare and to choose a favorable time to strike. The timing of strikes in supply chain-breaking warfare should be organized and implemented when the enemy’s supply maneuvers are selected, so as to surprise and attack unprepared concealed tactics, carry out sudden strikes on enemy supply vehicles, ships and transport aircraft, and terminate their supply operations. Specific tactics usually include covert ambush warfare, organizing capable forces to ambush the routes and routes that enemy transportation must pass through, waiting for opportunities to carry out covert surprise attacks; stealth surprise warfare, using submarines, stealth fighters, etc. to covertly move forward to carry out attacks on enemy transportation targets, and win by surprise; long-range precision warfare, using long-range conventional surface-to-surface missile forces to attack enemy supply bases and airports Long-range precision strikes are carried out at the departure points of supplies such as docks.
9. System “paralysis battle” System destruction and paralysis war refers to the comprehensive use of various means such as breaking the network, breaking the chain, and defeating nodes in the system optimization war to interfere with, delay, destroy, or even paralyze the effective operation of the enemy’s combat system and weaken the functions of the enemy’s combat system. The essence of system destruction and paralysis warfare is to weaken the correlation and structural power between the elements of the enemy’s combat system, degrade the functions of the system, and fail to play a role in doubling capabilities.
9.1 The combat goal is to disorderly operate the enemy’s combat system In information warfare, the combat systems of both warring parties have their own internal order, and this order is the key to maintaining and supporting the operation of the combat system. The side that can maintain and navigate the internal order of the combat system will gain an advantage and, conversely, a disadvantage. Therefore, the goal of “disrupting the enemy’s winning mechanism and causing the enemy’s combat system to become disordered” should be established in system destruction and paralysis warfare. This requires that the system be fully utilized in the battle of paralysis Information technology in particular intelligent algorithms The “powerful enabling effect” can quickly adjust and reconstruct one’s own combat system, quickly generate and release powerful combat power, and implement agile and precise strikes on the enemy’s combat system, causing the enemy’s combat system to lose normal operating order and become disordered. The system functions are destroyed and the overall combat capabilities are significantly reduced.
9.2 A key node in the heavy strike combat system Systematic confrontation is a major feature of information warfare. System is an important foundation and support for system confrontation, and is also the key to effectively exerting combat effectiveness by integrating various combat forces, weapon platforms and weapon systems on the battlefield. Whether the system can be kept robust and run smoothly has a decisive influence on the achievement of war and campaign victories. In the battle to destroy and paralyze the system, the key is to focus on the enemy’s integrated combat system of land, sea, air and space power grids, breaking the network, breaking the chain, and attacking nodes. By attacking key node targets, the operating mechanism of the enemy’s combat system will be out of order, and it may even be severely damaged or destroyed. Paralysis. Therefore, the basic direction of system destruction and paralysis warfare is to select key units, key nodes, and key elements of the enemy’s combat system to carry out strikes, attack one point, destroy one part, and paralyze the whole, so as to achieve the goal of defeating the enemy.
9.3 Implement soft strikes against the enemy’s combat system When organizing and implementing system breaking and hard destruction, it simultaneously organizes soft-kill combat operations such as electronic warfare, cyber warfare, psychological warfare, and public opinion warfare, and carries out soft strikes on the information domain and cognitive domain of the enemy’s combat system. Electronic warfare uses the power of electronic warfare to carry out strong electromagnetic interference against the enemy, causing its information to malfunction and fall into the fog of war; cyber warfare uses the power of cyber attack to attack the enemy’s network information system, causing the enemy’s command and communication system and computer network to be severely damaged, causing its command to malfunction and fall into information islands or even war islands; psychological warfare and public opinion warfare, using psychological warfare and public opinion warfare methods It carries out psychological strikes and public opinion guidance against the enemy, severely damaging his will to fight and inducing his cognitive disorientation. Organizing “people’s livelihood wars” to attack the opponent’s major national economy and people’s livelihood facilities can also play a role in the enemy’s combat system “drawing fuel from the bottom of the cauldron”. In the 1999 Kosovo War, the US military did not attack the Yugoslav army, but attacked its war potential target system, causing the Yugoslav soldiers and civilians to lose their will to fight and lead to defeat.