Comparative Analysis of Military Command Structures : China. DPRK, Russia, US // 中,美,苏,俄罗斯,朝鲜武装力量指挥体系

Comparative Analysis of Military Command Structures :China. DPRK, Russia, US //



China ‘s Armed Forces Command System

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Overview of China ‘s Armed Forces

China, the United States, the Soviet Union, Russia, North Korea armed forces command system


China, the United States, the Soviet Union, Russia, North Korea armed forces command system


China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Description: blue font for the deputy military units. Xinjiang Military Region is the only deputy deputy military district, under the Lanzhou Military Region.

American military command system

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

US military command system description

The president of the United States is the commander in chief of the armed forces and the supreme commander of the armed forces. The president, through the Ministry of Defense leadership and command of the army, emergency can be leapfrog command. The strategic nuclear forces are controlled by the president at all times.

The National Security Council is the supreme defense decision-making advisory body. Its legal members include the President, Vice President, Secretary of State, Defense Minister. The Chairman of the Joint Chiefs of Staff is the statutory military adviser to the National Security Council. The Director of the CIA is the National Security Council’s statutory intelligence adviser. The daily work of the National Security Council is the responsibility of the President’s National Security Adviser (Consultant).

The Ministry of Defense is the supreme military organ that leads and directs the US Armed Forces, is responsible for the defense policy, the formulation and implementation of the plan, and the management of the defense affairs, and through the joint meeting of the Chief of Staff to carry out operational command. It consists of the Ministry of Defense headquarters system, the military system and operational command system composed of three parts.

Department of Defense Department of the system is mainly responsible for the policy, finance, military and other military affairs, as well as the coordination between the military. Under the policy, procurement and technical, personnel and combat readiness, auditing and finance, directing communication control and intelligence, legislation, logistics affairs, intelligence supervision, administration, public affairs, supervision, combat test and evaluation departments, respectively, by the Deputy Defense Minister , Assistant defense minister, director, director or department head and other supervisors.

The military system consists of the Ministry of War, the Air Force Department and the Department of the Navy three military (military department). The military departments are responsible for the administration of the service, education and training, weapons and equipment development and procurement and logistical support and other duties, and the responsibility to warfare to the joint operations headquarters to provide combat troops and the corresponding service and logistical support, but no combat Command. The military minister is a civilian officer, under which he is the chief of staff (Navy for the combat minister). The chief of staff (naval combat minister) is the highest military officer of the service.

The operational command system refers to the Joint Chiefs of Staff and the Joint Command and Special Command affiliated to it. The Joint Chiefs of Staff is both the President, the Minister of Defense, the Military Advisory Body of the National Security Council, and the Military Commander of the President and the Minister of Defense to issue operational orders to the Joint Command and Special Command. In a sense, the Department of Defense is the military and government departments of the President, and the Joint Chiefs of Staff is the President’s military order.

The former Soviet Union military command system

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Russian military command system

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

North Korea ‘s Military Command System

China, the United States, the Soviet Union, Russia, North Korea armed forces command system

Original Mandarin Chinese:

























Communist China Giving Priority to Development of Military Network Strategy // 中共優先發展網絡戰略力量

Communist China Giving Priority to Development of Military Network Strategy


Cyberspace has become the national comprehensive security of the door. Network warfare reality, the network battlefield globalization, network confrontation normalization, network attack heart white hot, the network to build the army of the general trend, no one can block. Give priority to the development of network strategy, and actively seize the commanding heights of network strategy, for my army building is of great significance.

  The main features of network strategy

Network strategic strength refers to the ability to achieve the desired results through cyberspace. From the current development and possible future trends, mainly with the following characteristics.

Composed of multiple. In recent years, the major network events in the world have shown that the strategic power of the military network is the main force of cyberspace competition. The strategic power of the government departments and the private sector is an important part of the cyberspace competition. The “cyber warrior” An important addition.

Strong professionalism. Network strategy strength has a strong latent and difficult to predict, and the speed of light, instantaneous effect, monitoring and early warning is difficult; once the action is effective, damage effect superimposed amplification or non-linear step, with a typical “butterfly effect.” In 2010, the “shock net” virus attacked the centrifuges of the Iranian Bushehr nuclear power plant and the Natanz uranium enrichment plant, resulting in nearly a thousand centrifuge scrapped, forcing Iran’s nuclear capacity building to delay 2 to 3 years, opened the network attack soft means Destroy the country’s hard facilities.

Destructive. The strategic power of the network is no less than the weapons of mass destruction. Russia and Georgia in 2008, “the five-day war”, the Russian military to Georgia’s television media, government websites and transportation systems as the goal, to carry out a comprehensive “bee group” type network paralysis attacks, leading to grid government agencies operating chaos, Logistics and communication system collapse, much-needed war materials can not be delivered in a timely manner, the potential of the war has been seriously weakened, a direct impact on the grid of social order, operational command and troop scheduling. The Russian military doctrine has identified cybercrime as a weapon of mass destruction and has retained the right to use weapons of mass destruction or nuclear weapons to counterattack.

Advanced technology and phase. Network strategy strength development speed, replacement fast, technical materialization for the equipment cycle is short. At present, the speed of the microprocessor doubles every 18 months, the backbone bandwidth doubled every six months, a variety of new electronic information equipment after another, all kinds of application software dizzying. Cyber ​​space confrontation is the field of information in the field of offensive and defensive struggle, the use of network strategy forces in the confrontation of the phase with grams, constantly renovated. The development of the firewall and the information monitoring technology makes the software of the anti-wall software upgrade continuously. The development of the firewall and the information monitoring technology is the development of the firewall and the information monitoring technology. , Can be described as “a foot high, magic high ten feet.”

  The Developing Trend of Network Strategic

From the subordinate force to the development of key forces. In the past, the network strategic power is mainly for other forces to provide information security, in a subordinate position; with the development of network information technology, network system control of other rights, network strategic forces from the subordinate status to the dominant position to accelerate into the maintenance of national The key to safety. There is no network security there is no sovereign security, “no net” to become a new law of war, the world’s major countries around the network space development rights, dominance and control of a new round of competition, especially the United States and Russia adhere to the practice In the use and continue to develop.

From the maintenance of force to the development of specialized forces. In the past, the network strategy is mainly to maintain the network information system and all kinds of network transmission system, network attack and defense attributes are not clear. At present, all areas of the network space in depth, the world’s major countries are hard to build cyberspace offensive and defensive capabilities, the main military power of the network strategy has become a network of reconnaissance, network attacks, network defense and other clear division of labor, professional regular military forces. The United States has so far built the world’s most complete and powerful network of the army, and held a series of “network storm” series of exercises. The new “cyberspace strategy” in the United States, the first public to cyberspace combat as one of the tactical options for future military conflict, clearly proposed to improve the US military in the cyberspace of deterrence and offensive capability. In order to adapt to the new strategy, the US Department of Defense proposed 2018 to build a offensive and defensive, flexible form, with full combat capability of the network forces construction goals.

From the military to the integration of military and civilian development. The development of the strategic power of the military network started relatively late compared with the civil field, and because of the confidentiality of military confrontation and the specificity of the operational objectives, it is often developed independently. With the development of network technology, the military’s own network strategic strength is difficult to meet the needs of diversified tasks, we must learn from local folk technical means, integrate local network resources, realize the integration of military and civilian development. Network space capacity building on the talent, intelligence, experience and other software environment is extremely high, coupled with the local convergence of a wealth of network resources, military and civilian forces to promote the development of cyberspace capabilities become the strong tone of the times.

From a single model to the “network integration” development. At present, the network includes both the computer IP system network and the non-computer IP system network including a large number of complex early warning detection network, satellite communication network and tactical data link. The traditional single network confrontation model is difficult to meet the challenge of cyberspace. With the development of information technology, especially the Internet of Things technology, the relationship between the network and the power of the battlefield network more and more closely, which for the “network integration” in the technical means to provide the possibility. The use of electronic warfare and network warfare means, for different systems around the open bow, broken chain broken network, to achieve complementary advantages, system damage, as the latest guidance on the construction of network space. Data show that the US military typical network of integrated attack equipment “Shu special” system has been from the “Shu-1” to the current development of “Shu-5”. According to reports, “Shute” system through the enemy radar antenna, microwave relay station, network processing nodes to invade the enemy air defense network system, real-time monitoring of enemy radar detection results, even as a system administrator to take over the enemy network, Control of the sensor.

From non-state actors to state actors. At present, the network attack has developed from a single hacker behavior for the national, political, military confrontation, the attack object has been developed from the personal website to the country, the army’s important information system, attack “unit” has grown from stand-alone to tens of thousands Hundreds of thousands of terminals, and can instantly release the amazing attack energy. Although many of the intentions of malicious acts of non-State actors are non-state, the consequences are national, whether they are espionage, political opinions, or personal discontent, or terrorist activities , Have a direct impact on social stability, disrupt the economic order, endanger the stability of state power. Once the relevant reaction is made, the subject of the act must be the state and the army, and not the non-state actors themselves.

  The Construction of Network Strategic Strength

Strengthen strategic planning. Cyberspace competition is the first strategic battle of the contest. From the national level, the network strategy of the power of the main function is to reduce the risk of cyberspace, maintaining the normal operation of the country. We must understand the extreme importance and realistic urgency of cyberspace security from the perspective of national security, raise the focus of cyberspace capacity building to the strategic level, and try to solve the problem of how to make good use of cyberspace while trying to reduce the national cyberspace security Risk, so that cyberspace security has become an important support for national prosperity and security. From the military level, the network strategy is mainly to seize the system of network power. We must expand the military vision, the cyberspace as an important area of ​​action, to seize the system as the core, change the military ideas and ideas, adjust the structure and composition of armed forces, the development of weapons and equipment and take a new tactics.

Speed ​​up the construction of the power system. Maintain cyberspace security in the final analysis depends on the strength. We must base ourselves on the characteristics and laws of cyberspace capacity building, focus on the core elements of network capability system and the overall layout of network strategy strength, and systematically design the system structure which conforms to the law and characteristics of cyberspace confrontation in our country, and perfect the system of leadership and command Functional tasks, straighten out the relationship between command and management. We should take the network strategic power as an important new combat force, from the organization construction, personnel training, equipment development, elements of training and other aspects, to take extraordinary measures to give priority construction, focus on protection. To normalize the national network of offensive and defensive exercises, test theory, tactics, equipment and technology effectiveness, and comprehensively enhance the comprehensive prevention of cyberspace capabilities.

Promote technological innovation. The essence of cyberspace confrontation is the competition of core technology, and it is necessary to accelerate the independent innovation of network information technology. We should focus on improving the capability of independent innovation as a strategic basis, relying on the national innovation system as the basic support, concentrating on breaking the frontier technology of network development and the key core technology with international competitiveness, ahead of deployment and focusing on the development of information technology and information industry. To speed up the process of localization of key core technologies, strengthen the construction of safety testing and active early warning means, and gradually improve the equipment system of cyberspace in China, and comprehensively improve our network space capability. To follow the basic laws of cyberspace confrontation, in accordance with the “asymmetric checks and balances” strategy, increase the quantum technology, Internet of things and cloud computing and other new technology research and development efforts to create unique combat capability, master the initiative of cyberspace security development The

Promote the integration of military and civilian development. The integration of military and spatial ability of military and civilian development is not only the overall situation of national security and development strategy, but also the objective fact that cyberspace security can not be avoided by the overall planning of national defense and economic and social development. We must actively promote the deep integration of military and civilian development, to promote China’s network space capacity supporting the construction. It is necessary to formulate top-level planning in the form of policies and regulations, clarify the objectives and tasks, methods, organizational division and basic requirements of the deepening development of cyberspace in the form of policies and regulations, and make the integration of military and civilian development into law enforcement and organizational behavior; To establish a sound military coordination, demand docking, resource sharing mechanism, through a unified leadership management organization and coordination of military needs and major work, to achieve risk sharing, resource sharing, and common development of the new situation. We should pay attention to the distinction between the boundaries of military and civilian integration, clear the concept of development-oriented people and the main idea of ​​the army-based, and actively explore the military and the people, the advantages of complementary channels.


Original Communist Mandarin Chinese 🙂





專業性強。網絡戰略力量具有極強的潛伏性和難預測性,且以光速進行、瞬時產生效果,監測預警難度大;一旦行動奏效,損害效果疊加放大或非線性階躍,具有典型的“蝴蝶效應”。 2010年,“震網”病毒攻擊了伊朗布什爾核電站和納坦茲鈾濃縮廠的離心機,造成近千台離心機報廢,迫使伊朗核能力建設延遲2至3年,開啟了網絡攻擊軟手段摧毀國家硬設施的先河。

破壞性大。網絡戰略力量破壞力不亞於大規模殺傷性武器。 2008年俄國與格魯吉亞“五日戰爭”中,俄軍以格方的電視媒體、政府網站和交通系統等為目標,開展全面的“蜂群”式網絡阻癱攻擊,導致格政府機構運作混亂,物流和通信系統崩潰,急需的戰爭物資無法及時投送,戰爭潛力受到嚴重削弱,直接影響了格的社會秩序、作戰指揮和部隊調度。俄羅斯軍事學說已將網絡攻擊手段定性為大規模毀滅性武器,並保留了運用大規模毀滅性武器或核武器反擊的權利。













Referring URL:

Chinese Military Applications & Use of Bitcoin in Future Wars // 中國軍事應用與比特幣在未來戰爭中的應用

Chinese Military Applications & Use of Bitcoin in Future Wars //


Can you imagine that Bitcoin can show up in military applications? Recently, Estonia and NATO are trying to use block-chain technology to develop next-generation systems to modernize NATO’s network defense platform. In order to collect effective information against terrorists, the US military is trying to “reward” the bit as a reward for intelligence providers. Such as “brain hole open” block chain technology military applications, gradually “Starfire can start a prairie fire” trend. In the future, the block chain technology can not only be used for intelligence personnel performance performance incentives, but also for weapons and equipment life tracking, military human resources management, military supplies procurement, intelligent military logistics and many other aspects. Block chain of this future war “alternative dancers”, most likely quietly subvert the future war. Detailed explanation Please pay attention to today’s published “Liberation Army Daily”

How does the block chain create “currency” for the world?

If you want to read the block chain in the future battlefield on the “unique dance”, have to start from the bit currency. The name of the bit as much as the earliest in 2009, once launched quickly set off the Internet platform investment and trading boom, and thus become the most typical block block technology applications.

Despite the fact that people are mixed, but the block chain technology behind it has shown great interest. Block-chain technology is a decentralized digital book system that contains a complete transaction record for Bitcoin since the start-up of the bitcoin system. It is based on the new de-centricization of the block chain. People can safely store or trade bitmaps. The relevant information can not be forged or tampered with. It can automatically execute smart contracts without any central agency.

The birth of block chain technology, derived from the name of “Byzantine General” computer science problem solving. In layman’s terms, it is a question of how to achieve a credible consensus in a network of nodes that lack trust. By introducing the dynamic cycle of “competition-verification-synchronization-competition” to solve the problem, the block chain technology eventually becomes a new technology platform that allows individuals to carry out effective and credible cooperation without third party certification.

In the Bitcoin system, the generation and trading of “money” is closely related to the block chain. The dynamic process of the block chain is the process of generating and circulating the new currency, which is the basis for the safe, orderly and credible operation of the whole bitcover system. Need to constantly update and maintain the block chain, such as “Mint”, you can package the latest transaction records loaded into the end of the chain, and then the formation of new blocks.

Block chain technology is the technical support behind Bitcoin, which itself consists of multiple connected blocks, each of which is like a page in the book, records the relevant transactions for a period of time, and through different areas Block before and after the point of the relationship between all the blocks are connected in order to form a block chain. At present, the block chain technology uses P2P technology, such as P2P data transmission, file sharing, asymmetric encryption and distributed storage technology, which is accelerating the development of technology bottlenecks and application popularization.









Of course, the block-chain technology, which has long been implemented on the algorithm, is somewhat difficult to understand because of its abstraction. In fact, the block chain is similar to a “trust manufacturing machine”, it is the emergence of mutual understanding for both sides to create trust. Block-chain technology can generate a set of record time, can not be tampered with a trusted database, through this technology, even if there is no neutral third-party institutions, between the nodes can also achieve cooperation. At present, the block chain technology has been from a single digital currency, and gradually extended to the intelligent contract, Internet of things, authentication, e-commerce, social communications, file storage and other fields.

Among them, the international financial giants have begun to try to use the block chain technology to deal with complex accounting business, IBM and other companies claim that the block chain is to solve the Internet of things information security, data storage, interactive processing of the core technology. Block chain technology is designed to achieve cross-network distribution, which makes it an ideal choice for cross-organizational business networks. Block chain to trust the characteristics of its bring scalability, data encryption standards to ensure that the content can not be tampered with the decentralization of data processing to further enhance the security of the data. In addition, the block chain can also encourage people to get out of the firewall protection circle, sharing data. It is the block chain technology “maverick” characteristics, it makes it seem so different.

The successful use of Bitcoin, fully demonstrated the block chain technology open and transparent, safe and trustworthy, distributed sharing and other excellent features. Inspired by the fact that dozens of international technology giants are jointly developing the “super books” project, trying to create a transparent, open, decentralized distributed books, so that more applications can be more easily built in the block Chain technology. In the future, “trust manufacturing machine” will also bring us, including basic applications, upgrade applications and extended applications and many other “surprise.”

The basic application mainly relies on the existing bit coin system, with the exchange of money for the intermediary, as the value of the carrier between the users to pass. Including shopping, payment, transfer, liquidation and other network transactions can take the block chain technology “ride” to further enhance the safety of financial life. The upgrade application is the transplantation, upgrading and transformation of the block chain technology, and then fully exploits the technical advantages of the block chain to realize the secure storage of the data. The future, personal electronic file management, charitable donation registration, data permanent curing and disaster recovery can see the block chain technology figure. Expanded application is the innovation, generalization and popularization of the block chain technology. The “trust manufacturing machine” will reconstruct the existing network rules, establish a perfect network credit system, and then in the future world of things to show their talents.

Of course, the block chain technology, although the prospects are broad, but still need to address information security and confidentiality, network construction and regulatory control and many other issues. Although you can use asymmetric encryption technology to obtain a strong information security, but does not mean that the security of the block chain technology on the “impregnable”. How to build a decentralized peer-to-peer network, how to achieve effective monitoring of user information is an urgent need to solve the problem.








In the field of military applications, “natural” with information integrity and many other features of the block chain technology, from the beginning to achieve the data storage and data encryption of the organic combination, will be in the military field flex its muscles.

Battlefield information protection. No matter how the war form changes, information integrity and confidential information protection are the key to determine the outcome of the war. Although the modern military system has established a number of verification, separate preservation, multiplayer operation and a series of security initiatives, but directly break the existing system issued a fake command is not impossible. With the block chain technology, to a certain extent, to enhance the security of battlefield information protection. At present, the US Department of Defense Advanced Research Projects Agency is through the block chain technology to create a secure information platform to study the block chain can protect the highly sensitive data to help and study its military satellites, nuclear weapons and other scenes Of the potential of the application, the future is likely to be used to support the forces of combat.

Weapon and Equipment Management. Weapons and equipment from the project demonstration, development and production, delivery service to retirement retirement, the need for the entire life cycle, including design, test results, technical status and other large data records for the record. The current use of paper and electronic media security is difficult to protect, transfer transfer difficulties, the lack of effective supervision and other security risks. Through the introduction of block chain technology, can form a party can participate in the preservation of the distributed, supervised file registration network, to further improve the safety of weapons and equipment management, convenience and credibility. Similarly, in the process of military human resources management, but also through the block chain records of each soldier’s resume, the formation of electronic files can not be tampered with, technically completely solve the problem of archives management system.

Intelligent military logistics. Modern military logistics is moving towards the intelligent era, intelligent warehousing, intelligent packaging, intelligent transportation and intelligent distribution and other intelligent network will cover the whole process of military logistics. The use of block chain technology can effectively solve the intelligent military logistics network communication, data preservation and system maintenance and other problems, to further improve the viability of the logistics system to achieve free exchange of information to ensure the orderly and efficient operation of the system. With the block chain technology, it will realize the qualitative change from free transmission to free notarization, which is very likely to become the “subversive” technology of the future network infrastructure agreement and credit paradigm.

Information hidden incentive. In recent years, the US military fully excavated the block chain in the record of the anonymous characteristics of the transaction, and its application to the field of intelligence gathering, to achieve information to provide incentives for the incentive to pay gold. As we all know, intelligence providers or “informants” need a secret identity and whereabouts, the traditional transfer, cash and other payment methods can easily be tracked locked. Through Bitcoin as a payment intermediary, you can cleverly break the payment channel, so that information flow is difficult to trace, and thus effectively protect the security of intelligence personnel. Among them, the bit currency trading platform in the entire payment process plays a “black box” role, to achieve the hidden information between the two sides of the transaction hidden.







The concept of Bitcoin was originally proposed by Nakamoto in 2009, according to the idea of ​​the open source of the open source software and the construction of its P2P network. Bitcoin is a digital currency in the form of P2P. Point-to-point transmission means a decentralized payment system.

Unlike most currencies, Bitcoin does not rely on a specific currency institution, which is generated by a large number of calculations based on a particular algorithm. The bit currency economy uses a distributed database of many nodes in the entire P2P network to confirm and record all transactions, And the use of cryptographic design to ensure that all aspects of currency circulation security. P2P de-centricity and the algorithm itself can ensure that the currency can not be manipulated by a large number of manufacturing bits. A cryptographic-based design allows a bit currency to be transferred or paid only by the real owner. This also ensures that the ownership of money and the anonymity of circulation transactions. Bitcoin is the biggest difference from other virtual currencies, and its total quantity is very limited and has a strong scarcity. The monetary system has had no more than 10.5 million in four years, and the total number will be permanently limited to 21 million.

Bitcoin can be used to cash, can be converted into the currency of most countries. Users can use some coins to buy some virtual items, such as online games among the clothes, hats, equipment, etc., as long as someone accepts, you can also use the bitcover to buy real life items.




Block chain technology, also known as distributed book technology, is an Internet database technology, which is characterized by decentralized, open and transparent, so that everyone can participate in database records.


The earliest is the basic technology of Bitcoin, the world is in the study, can be widely used in various fields such as finance.


The basic principles of block chains are not difficult to understand. The basic concepts include:

A transaction that causes a change in the state of the book, such as the addition of a record;

Block: record a period of time transactions and status of the results of the current state of the book is a consensus;

Chain: by a block in the order of occurrence in series, is the state changes in the log records.

If the block chain is used as a state machine, each transaction is an attempt to change the state once, and each time the consensus is generated, the participant confirms the result of the change in the status of all the transactions in the block.










Original referring URL:

China’s Military Taking Action to Defend Nation’s Network // 中國軍事行動維護國家網絡

China’s Military Taking Action to Defend Nation’s Network //



Original title: from the guard “network camp” to guard the “network country”

Original: “National Defense Reference” 2017 No. 3

Cyber ​​space was born in the military field, such as the first computer, Apache and GPS navigation systems are all derived from the military, today, cyberspace security has been closely related with national security, the military has once again become the maintenance of national cyberspace security , Whether it is the face of normalized network penetration, or large-scale network attacks, are an urgent need for the military from the guard “network camp” to guard the “network country”, breaking the traditional mission of the military mission, breaking the traditional battle preparation mode, To a new network of national defense thinking, casting the network era of the firm.

From the “network camp” to “network country”, a new era of military mission to bring new trends

Internet space is not only related to the maintenance of national strategic interests, a direct impact on political, economic, cultural security and social development, has become a modern battlefield joint war blood and ties. The Chinese army can not be limited to maintaining the internal security of the barracks, but also take the initiative to adapt to the trend of the times, the courage to take the “network of countries,” the country to play. Network strength is an important part of the network power construction, from the “network gate” to “network country” is the information age situation at home and abroad the inevitable trend of development.

Guarding the “network country” is the cyberspace security situation forced. China as the first network power, the security situation is not optimistic, the strategic opponent has never stopped preparing for my network operations. The United States, Britain, France and other countries actively preparing for cyberspace, through the cyberspace security legislation to give the military functions, the development of network warfare forces, research and development of network warfare weapons equipment, the war will advance to the human “fifth space”, especially in China increasingly strong In the process of rising history, the western countries under the auspices of the Cold War mentality and containment subversion strategy, the use of network technology and means of communication to implement uninterrupted harassment, subversion and cyber attacks, seriously affecting my country’s security and social development, China has become Network security threats to the hardest hit, the virus attack the test field, the penetration of awareness of the destination, the national security is facing a huge risk.

In the coming period, China, as a big emerging country, will intensify its conflicts of interest, strengthen the network defense strategy and strengthen the cyberspace war preparation. It is an inevitable way to actively strive for the dominance and discourse of cyberspace. The only way to go. As the main force of national security and stability, the army must meet the requirements of cyberspace characteristics and become the backbone and main force against cyber invasion, network subversion and safeguard national security and social stability.

Winning the network war is the new military change in the information age. As one of the most advanced productive forces in the information age, network technology has made cyber space combat become the dominant factor to guide the evolution of modern warfare, which affects the whole situation of war. In recent years, from the Iranian “earthquake network” attack, Russia and Georgia conflict network warfare, the Ukrainian power grid was a large number of paralysis and the US military on the IS network attacks, cyberspace in combat show a huge role in the emergence of a sign that the network Has become an important model for future joint operations.

The US military attaches great importance to the construction of cyberspace armaments, the establishment of cyberspace headquarters, the introduction of cyberspace joint operations, a substantial expansion of network warfare forces, and strive to maintain its cyberspace hegemony, the control of cyberspace as a “third offset strategy “Absolute advantage of the most important content of competition.

The world has followed up the country, the military space militarization trend is obvious. Severe cyberspace The situation of military struggle requires the Chinese army to focus on the network battlefield space changes, to meet the requirements of the era of information warfare, to achieve in the cyberspace can fight, win the battle of the strong military goals.

Effective network of deterrence is to speed up the construction of the network power inherent. In China by the network power to the network power development process, can not do without a strong network space military power as a guarantee. The international competition of cyberspace is a comprehensive game of national comprehensive strength. Among them, the network military capability construction is directly related to the national security and stability, and the whole body is the core factor of the whole national security field.

At present, the interests of the world in the cyberspace mutual penetration, there “you have me, I have you, mutual cooperation and common development” situation. But this common development is not equal, the United States and Western powers to use cyberspace dominance, has made a certain degree of network deterrence, so that my network development and interests subject to others. How the army in the construction of the network to complete the mission of reorganization of the mission, the premise is to be able to contain the crisis, deter opponents of the network offensive and defensive ability to ensure the peaceful development of the network environment.

Therefore, the army needs to establish a deterrent strategic goal of effective deterrence, form a strategic balance with the enemy “destroy each other”, so as to enhance the strategic competitiveness, deter cyber space aggression and ensure the smooth development of the network power strategy.

From the “defensive responsibility” to “protect the network defenders”, the new situation requires the army to undertake new tasks

The army is to defend the national security of the main and pillars, cyberspace is no exception. The National Security Act of July 1, 2015 stipulates that “citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and other organizations and other social organizations have the responsibility to safeguard national security And obligations. “The Network Security Act promulgated in November 2016 emphasized the need to maintain cyberspace sovereignty and national security.

On the basis of the laws of the two countries, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was formally introduced on December 27, 2016, providing overall guidance for creating a new model of network power at a new starting point. Basically follow, clearly put forward nine strategic tasks, and further reflects the army in the process of building a network of power in the mission task.

Full of network of national mission, the army to defend the sovereignty of cyberspace strong pillars. “Strategy” listed in the nine strategic task is the first “firmly defend cyberspace sovereignty,” made it clear that “including economic, administrative, scientific and technological, legal, diplomatic, military and all other measures, unswervingly maintain our network Space sovereignty “. It can be seen that the military must assume the national mission of using the physical means of the physical space to defend the sovereign security and interests of the virtual cyberspace.

Internet space sovereignty is the core interests of the country, is an important component of national sovereignty, that the state in the cyberspace owned by the independent, equal rights, self-defense and management rights. Once the hostile forces have violated my cyberspace sovereignty, it is equivalent to violating the sovereignty of the landspace and other physical space, China will have the right to take all measures, including military means to give a strong fight back.

At the international level, the United States has long proposed a cyberspace deterrence strategy, declared the attack on the US network information facilities is equivalent to the war, the United States will take military strike measures to retaliate. Military means is the fundamental means of safeguarding national sovereignty, and plays a vital role in safeguarding national cyberspace security. Therefore, the historical forces of land, sea and air, should be given the historical mission of protecting the sovereignty of cyberspace, must rely on the powerful physical space to defend the national interests of cyberspace, a powerful deterrent to the hostile forces of the network destruction attempt.

According to the era of network security to play, the army to do to defend the national security of the ballast. The second focus of the “strategy” task emphasizes the need to resolutely safeguard national security, prevent, stop and punish any act of using the Internet for treason, secession, incitement to rebellion, subversion or incitement to subvert the people’s democratic dictatorship.

In the era of information network, the world’s military has become an important participant in cyberspace. The level of cyberspace capability has become one of the main indexes to evaluate the modernization degree of a country’s army. It is one of the main responsibilities of the information security army to carry out the task of network space mission.

From the historical process of China’s development, it is necessary to be highly vigilant about the national security strategy needs of the successful completion of the well-off society. It is necessary to be highly vigilant about the risk of being invaded, subversive and divided by cyberspace. The development of the overall situation of the danger of being destroyed, a high degree of vigilance of the development process of socialism with Chinese characteristics is disturbed, the risk of destruction.

Take preventive measures, requiring the state must have the means to deal with and deal with these dangerous measures, with the prevention, suppression and punishment of cyberspace according to the law of the powerful forces of destruction. The defense of the country has always been an unshirkable historical responsibility of the army. The inherent mission task determines that the Chinese army must take on the various measures taken in cyberspace to maintain national politics, economy, cultural security and social stability.

Offensive and defensive both strategic tasks, the army to enhance the ability to enhance the network space strong backing. The third and eighth of the nine major tasks in the Strategy make it clear that all necessary measures should be taken to protect critical information infrastructures and their important data from attack and destruction, and that both technology and management should be adhered to both protection and deterrence. Construction and international status commensurate with the network power to adapt to the network space protection, and vigorously develop the network security and defense means to detect and resist the network invasion, casting and maintenance of national network security strong backing. In all the state’s political, diplomatic, military, scientific and technological capacity to maintain security, military power has always been the foundation and support of all abilities. It is the fundamental guarantee of all ability and the ultimate guarantee of national security.

Therefore, the army must assume the strategic task of strengthening the national network space protection ability strong backing. In the real world, the army is the reassurance of safeguarding national security. In cyberspace, it should also become the safe dependency and guarantee of the people. As an important part of the national network space protection ability, the army must be both offensive and defensive, and have the ability to firmly safeguard the interests and security of the country and the people in the cyberspace, and can effectively eliminate the various crises and ideological turbulence caused by the network security threat So that people can truly feel the production and life to be effectively protected, as the people of the country’s network protection capacity of confidence in the emboldened.

The global responsibility of the joint defense, the military to do to maintain the important support of global network security. The final mandate of the Strategy explicitly proposes to strengthen international cooperation in cyberspace and to support the United Nations in its leading role in promoting the development of international rules for cyberspace, international cyberspace international counter-terrorism conventions that are universally accepted, and a sound mechanism for combating cybercrime Policy and law, technological innovation, standards, emergency response, key information infrastructure protection and other areas of international cooperation.

Cybercrime and cybercrime are the new forms of global threat catalyzed by information network fermentation, posing a great threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of government and civil society. And other Western countries have given the military the responsibility to protect the network security and the right to combat cyber terrorism. Maintaining global cyberspace security and stability is in line with the fundamental interests of China and the rest of the world. The army should be an important defender of cyberspace security and become an important force in combating global cybercrime and cybercrime.

The globalization and unboundedness of the network determines the international demand for combating cyber-terrorism and transnational cybercrime. The army should promote inter-State network governance and military cooperation within the framework of the UN Security Council, and use the strategy and technology of the Internet age to establish a joint defense Mechanism, and effectively safeguard the national and world cyberspace security.

From the “battlefield training” to “network preparation”, the new areas need to prepare for the military new initiatives

In the new historical situation, the cyberspace put forward new requirements to the military training mode, should adapt to the new features of the cyberspace and the new mission of the army to innovate and reform the traditional model, aim at the goal of strengthening the country and strengthening the macro- Focus on cyberspace military action legal needs, closely linked to cyberspace “military and civilian one” of the natural properties, the construction of “peace and war” network security attack and defense system, to create “military dual-use” network defense force.

Legislative empowerment, for the military to carry out functional mission to provide legal basis. Countries in the world, especially the Western developed countries in the network security legislation attaches great importance to network defense issues. The United States has promulgated the “National Security No. 16 Presidential Decree” “cyberspace action strategy” and a series of policies and regulations on how to protect the national network security in the field of national network security has been deepening norms.

At present, it is necessary to clarify the duties of the cyberspace army from the legal level. It should be based on the “National Security Law” and “Network Security Law”, and introduce the network defense law and relevant cyberspace military warfare regulations for network defense construction and military Action to provide regulatory support and action programs, so that the military in cyberspace responsibilities and mission more specific and specific.

First, through the network of national defense legislation to further define the network sovereignty and network frontier, clear the scope of the military duties.

Second, through the construction of network operations laws and regulations, clear the military to defend the national network space security action authority, to distinguish between network intrusion, network damage and other military means of behavior. Third, through the international cooperation policy of cyberspace, clear military cooperation with other countries, civil forces and other international networks to combat terrorism, cybercrime function tasks.

Military and civilian integration, for the construction of network power to provide innovative power. The integration of military and civilian integration is the main practice of enhancing the competitiveness of cyberspace in the world. For the construction of China’s network power, it is necessary to construct military and civilian defense and defense system, and to develop military and national defense information infrastructure. Source.

First, the co-ordination of national, military and all levels of government and other military and civilian integration functional departments, set up a special command and coordination agencies, mobilize all national network power, building “military and civilian” “peace and war” network security attack and defense system.

Second, as soon as possible the introduction of network security integration of civil and military development of the guiding ideology, and gradually expand the integration of basic legal research and demonstration, to guide the long-term integration of military and civilian development.

Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and the people to build a nationwide information infrastructure, to achieve military and civilian unity, in charge of sharing.

The fourth is to establish a joint emergency response mechanism for military and civilian personnel, to increase the capacity of the training departments to control the situation, to strengthen the expertise of experts and emergency professionals to enhance the ability to quickly restore damaged networks or information systems.

Military and civilian training, for the cyberspace military capabilities to provide a realistic environment. The common characteristics of military and civilian space in the network space make the military and civilian training become an important way of military military training in cyberspace all over the world. The United States and NATO and other countries of the network space military and civilian joint exercises have been a series of “network storm” “network guards” and other training activities to attract the government, enterprises, research institutions and even private hackers extensive participation. Our military cyberspace military strength training also requires extensive participation in civil forces.

First, do a good job of military and political cooperation, the establishment of military and civilian joint attack and defense exercise mechanism, learn from the United States and other developed countries in the network warfare exercises in the red and blue confrontation training methods, and actively build the “national network shooting range”, planning the government, civil society series of joint exercises to enhance military and civilian , Officials and one network of offensive and defensive level.

Second, do a good job in military and military cooperation, relying on the Internet to set up a network of enterprises to improve the training area, to promote military and civilian ability to run between the offensive and defensive, and jointly improve the ability to prevent unknown risks.

Third, the organization of civil network security companies and hackers talent, to carry out network security competition and other activities, mutual confirmation, and jointly improve the level of network security technology and tactics.

Network reserve, to build a strong network of troops to provide the source of strength. Reserve as a reserve force of national defense, both military and civilian dual characteristics, is to achieve cyberspace economic development and national defense construction of organic unity of the powerful initiatives.

First, the national security sector as the leading, according to the national interests of the overall planning, the introduction of the network defense reserve is conducive to the construction of a series of laws and regulations, from the top to solve the network defense reserve construction in the construction of the main division of labor, promotion strategy, problem.

Second, innovative reserve organization and leadership system and comprehensive coordination mechanism, there are plans to reserve construction into the national network of information development at all levels and various fields.

Third, focus on the military and local management reform of the two models to the provincial and municipal governments, military and local enterprises and institutions under the management mechanism to establish a network of national defense reserve personnel to jointly use the mechanism, improve the national emergency mobilization mechanism, the establishment of national network defense professionals Database, the network militia and reserve forces into the scope of the people’s armed mobilization, usually in accordance with the provisions of the militia emergency unit into the training, the urgent selection of elite personnel with the team to participate in the task of non-war military operations, wartime, So that the national defense potential into national defense strength. (An Weiping, deputy chief of staff of the northern theater)

Original Mandarin Chinese:

















































Referring URL: