Category Archives: 中华人民共和国网络安全法

中國軍事史<2005>中華人民共和國的新軍事變革

Chinese Military History <2005> People’s Republic of China’s New Military Transformation

繁體中文:

迎接世界新軍事變革的挑戰,積極推動中國特色軍事變革,中央軍委所做的重大戰略決策,總部推出了一系列重大舉措。 最大的措施是決定2005年前軍隊再裁減員額20萬人。

 2002年,中央軍委會正式頒布《實施軍隊人才戰略工程規劃》;四總部相繼下發了《關於加強作戰部隊裝備技術保障幹部隊伍建設若干問題的規定》、《關於進一步做好幹部交流工作的意見》 和《關於提升參謀隊伍素質若干問題的意見》,全軍部隊人才培育的步伐明顯加快。 2002年10月,大軍區職領導幹部高科技知識訓練班開學,重點研究資訊化戰爭與軍隊資訊化建設的問題。 各總部機關也相繼開辦高科技知識培訓班。 抓資訊化建設從高級幹部和領率機關抓起,展現出一年來軍事變革的重點和特色。

 軍委會總部的重大舉措直接提升了戰鬥力。 總參謀部部署年度訓練任務時突出強調創新前瞻性作戰理論,以新的需求牽引訓練內容和訓練方法的改革。 總政治部直接組織了修訂新的《政治工作條例》,強調政治工作要為推進中國特色軍事變革服務,全軍政工幹部大規模地展開學習新《政治工作條例》。 總後勤部大力推動三軍聯勤和後勤資訊化建設,邊遠部隊遠距醫療、軍隊住房管理等資訊系統都有了新的飛躍。 裝備系統官兵抓住戰略機會期,加速推進軍隊武器裝備跨越式發展,努力使現有裝備特別是新裝備成建制、成系統形成作戰能力和保障能力。

 提高官兵素質,是推動中國特色軍事變革的重要內容。 適應建設資訊化軍隊、打贏資訊化戰爭,必須具備與之相適應的高素質。 至2003年,不管是基層官兵或師團主官,不管是低學歷幹部或高學歷幹部,都有強烈的危機感。 許多領導幹部率先垂範,下決心提升指揮資訊化戰爭的能力。 全軍各部隊狠抓人才工作的措施力度越來越大,為推動中國特色軍事變革提供了強而有力的人才和智力支持。

裁軍20萬

 2003年9月1日,中央軍委主席江澤民在出席國防科學技術大學50週年慶典活動時鄭重宣告:黨中央、中央軍委決定,將在“九五”期間裁減軍隊員額50萬的基礎上,2005年 前軍再裁減員額20萬。 這是新中國成立以來軍隊進行的第10次重大精簡整編,引起國際社會的高度關注,有輿論稱,「以大規模裁減軍隊員額為標誌,中國新軍事變革的大幕正式拉開」。


 推動中國特色的軍事變革,必須依照實現資訊化的要求,科學確立軍隊建設的戰略目標、發展思路和具體步驟。 然而,軍費供給不足,是新軍事變革中包括中國在內的各國軍隊普遍遇到的難題。 從世界範圍來看,世界各國國防費用佔GDP的比例一般都在2%—4%,而中國只佔1.5%左右。 以2002年為例,中國國防開支為1,694.44億元,約200億美元,只相當於美國的6%左右。 軍費大部分用於250萬人員的生活費、活動維持費,用於裝備和訓練的相對較少。

 軍事專家指出,高技術和資訊化武器裝備的購置費和維修費成幾何級數上升。 解決軍費供需矛盾,讓有限的軍費帶來最大的效益,其最佳想法是減少人員數量,提高軍隊品質。 新軍事變革對軍隊規模的要求是合理、適度、夠用,中國軍隊員額從250萬減少到230萬以後,將更可能使有限的戰略資源得到更有效的使用,發揮出更大效益。 大規模裁減員額並非僅僅“減人”,其實質是對軍隊現有體制編制的結構性調整,軍隊體制編制調整改革必須貫徹精兵、合成、高效的原則,只有深入研究高技術戰爭對軍隊體制編制 的影響,著重解決領導指揮和管理體制以及部隊編成中存在的矛盾和問題,才能建立起具有中國特色的軍事體制。

 軍事專家認為,減少數量,提高質量,優化軍隊內部結構,增大高科技含量,加強綜合集成建設,逐步建立符合現代戰爭要求的體制、編制,是加速人民解放軍現代化建設和更好地做好軍事 抗爭準備的必然選擇。 堅定不移地走中國特色的精兵之路,是軍隊建設的既定方針。 壓縮軍隊員額,是不斷適應世界新軍事變革發展趨勢,服從服務國家經濟建設大局的需要。 這次裁軍之後,中國軍事力量的規模雖然出現一定程度的壓縮,但戰鬥力必將得以提高,維護國家主權和領土完整的能力定能進一步增強!

 根據中央軍委會的統一部署,部隊的精簡整編工作將於2003年年底全面展開,精簡整編單位的編餘士兵多數要安排退出現役,其中包括未服滿服役期的編餘義務兵和士官。 解放軍總部已對此工作作出了具體安排:根據部隊調整精簡的需要,允許部分未服滿規定年限的義務兵和士官提前退出現役;精簡任務較重的單位的退役義務兵和復員士官,可安排提前 離隊;撤銷並改編為預備役部隊的單位的轉業士官,提前移交地方安置部門安置。 對因軍隊調整精簡提前退役士兵的安置,要與服役期滿的退役士兵同等對待,按時接收,納入2004年安置計劃。 其中,對服現役滿1年的城鎮退役義務兵,要按照服役期滿退伍義務兵的有關規定安置;對服現役滿9年的退役士官,要按照服滿現役10年以上退役士官的有關規定安排工作 。 對撤銷和改編為預備役部隊的單位的提前離隊的轉業士官,由各大單位派專人將檔案送地方有關安置部門審核,對符合條件的,簽發《接收安置通知書》,部隊即可組織轉業士官 離隊;本人要求復員的,經批准也可作復員安置。 對符合退休條件的士官,應依照國務院、中央軍委會頒發的《中國人民解放軍士官退出現役安置辦法》的規定,及時下達退休命令,並逐級上報列入移交安置計劃。 提前退役的士兵依實際服役年限和相應的標準發放退役費和物資,對該發放的經費和物資要及時足額地發放到退役士兵手中。 提前離隊的轉業士官按本年度正常時間離隊的轉業士官一樣對待,工資、福利、醫療待遇和服裝發放按有關規定辦理。

 軍隊體制編制調整改革後,中國軍隊將有司務長、俱樂部主任等數10種幹部職務、數萬個幹部職位改為士官擔任。 改由士官擔任的專業職位的人員,從2004年起納入軍院中專以上學歷訓練。 為確保這項工作的順利進行,實現人才等職位及2003年年底能接替的要求,士官任職前培訓擬採取中專學歷培訓與短期培訓相結合的方式進行。 其中,從經過院校2年以上學歷培訓的現有士官中選拔接替對象的專業崗位,進行3至5個月的短期培訓。 對現有士官學歷培訓規劃中無相同相近專業、選不到接替對象的專業崗位,組織中專學歷培訓,學制2年,在校學習1年,在崗位實習1年;每年一季度招生並開學 ,在校學習期間不休暑假,2003年底前回部隊實習。

附:前九次裁軍資料

 第一次精簡整編:新中國成立初期,解放軍總兵力達550萬人。 1950年6月,中國軍隊參謀會議精簡整編方案中規定軍隊精簡為400萬,當年即復員23.9萬餘人。 不久,抗美援朝戰爭爆發,精簡整編工作終止。 截止到1951年底,軍隊人員達627萬人,是中國軍隊史上兵力最多的時期。

 第二次精簡整編:1951年11月中央軍委召開整編會議,規定到1954年把軍隊總人員額控制在300萬人左右。 1952年1月,毛澤東批准《軍事整編計畫》,軍隊總定額縮減至300萬人左右。

 第三次精簡整編:截至1953年9月底,軍隊人數減少到420萬人左右。 當年12月,中國軍事系統黨的高級幹部會議決定,把軍隊簡編為350萬人。 到1954年6月軍隊已精簡47.2萬餘人,年底基本完成計畫。

 第四次精簡整編:1957年1月,中央軍委擴大會議,通過了《關於裁減軍隊數量加強質量的決定》,確定軍隊總人數再裁減三分之一,要求3年裁減130萬人,壓縮至 250萬人左右。

 第五次精簡整編:1975年6月24日至7月5日,中央軍委擴大會議決定3年內將軍隊減少60萬人。 到1976年,軍隊總人數比1975年減少13.6%。 後來由於「四人幫」的干擾破壞,精簡整編任務沒有完成就停了下來。

 第六、七、八次精簡整編:1980年3月,中央軍委決定軍隊再次進行精簡整編,大力精簡機關,壓縮非戰鬥人員和保障部隊,部分部隊實行簡編,將一部分部隊移交地方。 同年8月15日,中共中央批轉了中央軍委會《關於軍隊精簡整編的方案》。 1982年9月,中共中央和中央軍委決定軍隊進一步進行精簡整編。 1985年5月底6月初,中央軍委會決定裁減軍隊員額100萬人,精簡整編工作到1987年初基本結束。

 第九次精簡整編:1997年9月,江澤民同志在黨的十五大報告中宣布,在80年代裁減軍隊員額100萬人的基礎上,中國將在今後3年內再裁減軍隊員額50萬人。 到1999年底,裁軍50萬人的任務已經完成,20餘萬軍隊幹部退出現役轉業地方工作。 這是新中國歷次裁減軍員額中幹部精簡比例較高的一次。

科技練兵

 2003年,中國軍隊和武警部隊圓滿完成了年度訓練任務,在理論創新、實戰演練、反恐訓練、人才培養、從嚴治訓等5個方面取得新成果。

 一、用發展的軍事理論指導軍事訓練新實踐。 軍隊和武警部隊軍事訓練依照以資訊化帶動機械化、以機械化促進資訊化的要求,深入進行資訊作戰、非接觸作戰、聯合作戰等作戰樣式的理論研究,創新軍事理論和作戰思想,引導軍事訓練 改革的深化,推動科技練兵朝向資訊化方向發展。

 二、突出提升打贏能力,以軍事鬥爭準備為龍頭,部隊訓練貼近實戰。 南京、廣州軍區加大實兵實裝演練力度,圍繞戰術技術難點問題開展攻關,並取得了一批有價值的成果。 瀋陽、北京、濟南軍區在近似實戰的條件下練指揮、練戰法、練協同、練保障;海軍、空軍、第二砲兵注重強化諸軍兵種聯合作戰指揮演練;蘭州、成都軍區深化高寒山地作戰 演練,研究解決機動、生存、指揮、協同、保障等重點課題;武警部隊加強處突、反恐怖主義和防衛作戰演練。 全軍積極進行區域協作訓練創新實踐,對聯合戰術兵團作戰理論和區域協作訓練機制等關鍵性問題展開重點攻關。

 三、依據國家賦予軍隊反恐怖鬥爭新的軍事任務,擔負反恐怖任務的部隊紮實進行反恐怖軍事鬥爭研究和訓練實踐。

 四、人才培育有新的措施。 軍院校著眼培養高素質新型軍事人才,深化院校體制編制調整改革,推動了院校教學改革的深入發展。 各部隊進一步加大訓練機構建設與教學改革力度,為基層培養了大批優秀指揮士官。

 五、軍隊堅持依法治訓,嚴格依綱施訓,大力進行崗位練兵活動,契約戰術演練品質提高,部隊正規化訓練水準不斷提高。

部隊改革

 2003年6月10日,解放軍總政治部發出通知,要求全軍和武警部隊官兵認真學習貫徹《中共中央關於印發(「三個代表」重要思想學習綱要)的通知》精神,加深對「三個 代表」重要思想的理解,在全軍興起學習貫徹「三個代表」重要思想的新高潮。 總政治部組織出版部門迅速將《「三個代表」重要思想學習綱要》印發全軍,並特別發出通知,要求全軍團以上領導幹部和機關幹部要認真研讀江澤民同志一系列重要著作,以《綱要 》為線索,從整體深入系統地學習掌握「三個代表」重要思想。 基層要以《綱要》為主要輔導材料,選讀江澤民同志的若干重要著作,深入學習掌握「三個代表」重要思想的基本精神和基本觀點,把全軍官兵的思想和行動進一步統一到鄧小平理論和 「三個代表」重要思想上來,把智慧和力量進一步凝聚到實現黨的十六大確定的各項任務上來,堅決聽從黨中央、中央軍委和江主席的指揮,為實現全面建設小康社會的宏偉 目標,為軍隊的革命化、現代化、正規化建設努力奮鬥。

 6月18日,全軍學習貫徹「三個代表」重要思想理論研討會在北京舉行。 會議強調,必須更加牢固地確立「三個代表」重要思想在軍隊建設中的指導地位,把廣大官兵的意志和力量凝聚在「三個代表」重要思想的旗幟下,進一步打牢堅持黨對軍隊 絕對領導的思想理論根基,使全軍部隊始終保持與時俱進的精神狀態,肩負起神聖使命,積極推進中國特色軍事變革,實現軍隊現代化跨越式發展。

 6月中旬,經中央軍委批准,解放軍總政治部就認真貫徹中共中央通知精神,在全軍興起學習貫徹「三個代表」重要思想新高潮提出意見。

 經中央軍委批准,總政治部委託國防大學分別於8月下旬和9月中旬舉辦兩期全軍軍職以上領導幹部學習貫徹「三個代表」重要思想輪班班,來自全軍和武警部隊的近 百名軍以上領導幹部分別進行為期10天的學習。 輪班以胡錦濤同志「七一」重要講話精神為指導,按照中央《通知》和總政《意見》的要求,以《「三個代表」重要思想學習綱要》和《江澤民國防和軍事建設思想學習 綱要》為基本線索,組織學員學習了江澤民同志的著作和黨的十六大報告。 為了加深對所學內容的深刻理解和系統把握,了解掌握當前最新理論研究成果,輪班也分別邀請中央宣講團相關成員、中央文獻研究室、國家發展和改革委員會、北京大學以及軍隊思想理論戰線 的專家、學者,作了專題講座和輔導報告。 透過輪訓,學員們對「三個代表」重要思想的時代背景、實踐基礎、科學內涵、精神實質和歷史地位的認識有了新的提高,進一步加深了對江澤民國防和軍隊建設思想的理解,增強 了以「三個代表」重要思想指導部隊改革和建設,開創各項工作新局面的使命感和責任感。

     2003年,全軍和武警部隊廣泛深入學習學習實踐「三個代表」重要思想,為全面建構小康社會做貢獻教育活動。 透過教育,廣大官兵進一步堅定了對黨的創新理論的政治信仰,增強了自覺運用「三個代表」重要思想推進部隊改革建設、為全面建設小康社會做貢獻的責任感和使命感。

     根據解放軍總政治部相關部門負責人介紹,教育活動分成兩個階段實施,上半年重點學習了黨的十六大報告,集中進行專題教育;下半年貫徹胡錦濤總書記在省會級主要領導幹部 學習貫徹「三個代表」重要思想專題研討班上的重要演說和黨中央、中央軍委的部署,結合學習江澤民國防和軍隊建設思想,進一步把教育活動引向深入。 教育中,各大單位的主要領導深入部隊具體指導,近千名軍以上領導、萬餘名團以上幹部給部隊講課。 許多部隊請地方黨政領導介紹發展經濟、改善人民生活的舉措;組織觀看鄭培民、範匡夫等先進事蹟報告錄像;組織參觀抗擊非典圖片展,請抗非典英模作報告;舉辦形勢報告會,與專家學者 座談交流等。 官兵們說,在中國特色社會主義事業的偉大旅程中,一刻也離不開「三個代表」重要思想的指引,必須始終堅持,毫不動搖。

     各部隊引導官兵運用「三個代表」重要思想的立場觀點方法,深刻理解黨對國家經濟、社會、文化全面進步作出的重大戰略決策,激勵大家以實現中華民族偉大復興為己任,自覺服從服務於 全面建構小康社會的大局。 參加小湯山醫院對抗非典的軍隊醫護人員,奮戰50多個晝夜,為戰勝非典病魔做出突出功績。 黃河、淮河、渭河等流域發生洪水,新疆、雲南等地發生地震,大興安嶺等地區發生火災後,10多萬名官兵舍生忘死衝鋒在搶險救災第一線,協助地方政府轉移安置群眾100多 萬人,運送物資200多萬噸,用熱血和生命捍衛了「小康」建設成果。

     專注於把學習成果轉化為推動部隊建設,實現新發展、開創新局面的強大精神動力,是這次教育活動最鮮明的特色。 許多部隊引導官兵查找陳舊思維在訓練教學、教育管理、後勤保障、裝備建設等方面的表現,一項一項加以糾正,樹立起與全面建設小康社會、建設信息化軍隊相適應的訓練、管理和 人才觀念。 各單位積極組織官兵從實戰需要出發大膽改革創新,開發出了野戰指揮控制系統、戰時工作決策系統、模擬模擬訓練器材等一批新成果。 擔負緊急機動作戰任務的部隊,叫響了「練科技精兵,當打贏先鋒」的口號,練技術、強素質,圓滿完成了海訓野訓和實彈發射等任務。 2003年全軍12萬多名官兵踴躍報名參加各類函授學習和自學考試,數千名幹部攻讀軍事專業的碩士、博士學位,中央軍委關於實施人才戰略工程的決策正在變為廣大官兵的實際行動 。

     2003年7月底,經中央軍委會批准,由總政治部組織編寫的《江澤民國防與軍隊建設思想學習綱要》正式出版並印發全軍。 中央軍委發出通知,要求全軍官兵以江澤民《論國防和軍隊建設》和一系列重要講話為基本教材,以《綱要》為重要輔助材料,認真學習貫徹江澤民國防和軍隊建設思想,推動全軍學習 貫徹「三個代表」重要思想新高潮不斷深入發展。

     中央軍委會7月31日在北京召開《江澤民國防與軍隊建設思想學習綱要》出版座談會。 會議指出,江主席在領導國防和軍隊建設的偉大實踐中,形成了完整系統的國防和軍事建設思想。 江澤民國防與軍隊建設思想,同毛澤東軍事思想、鄧小平新時期軍隊建設思想是一脈相承而又與時俱進的軍事科學體系,是「三個代表」重要思想的重要組成部分,是馬克思主義軍事理論在 中國發展的最新成果,是新世紀新階段軍隊建設與發展的科學指南。 全軍部隊要毫不動搖地將江澤民國防和軍隊建設思想作為指導統領各項工作的根本指針和行動指南。 各級領導幹部要做學習貫徹江澤民國防與軍隊建設思想的模範,帶頭把這科學理論學習好、貫徹好、運用好。

後勤支援

     軍隊後勤工作堅持以「三個代表」重要想法統攬各項建設,按照積極推進中國特色軍事變革的要求,加大改革創新力度,加快發展步伐,後勤建設取得顯著成績。

     三軍聯勤體制運作良好,透過調整保障關係,多數部隊實現了就近就便保障;開展聯勤優質服務,保證了經費和物資及時足額供應;建立協調協作機制,為平時聯合訓練和戰時聯合 保障創造了條件。

     隨著新一輪後勤保障社會化全面啟動,2003年全軍有2179個食堂實施改革;1283個軍人服務社進行了撤、並、停、改;1851個非作戰部隊營區在營房維修、供水供電 、綠化清潔等項目上實施了社會化保障;採取整體移交、委託管理、自謀職業、解除勞動關係等多種方式,分流安置職工和臨時工31,000多人。

     2003年全軍招標採購突破70億元,比上年平均節省10%以上。 軍以下部隊採購制度改革普及推開,集中採購超過10億元,實現經濟、社會效益雙豐收。

     2003年首次推行總部事業部行政消耗性開支限額標準,戰備、訓練等重點項目得以有效保障。 2003年上半年,通過此制度壓縮總部事業經費中行政消耗性開支2000多萬元。

     全軍上下關注的住房制度改革穩步推進。 2003年總部推出了關於加強經濟適用住房管理、加速售房區現有住房出售和部分離休老幹部住房出售有關政策,現有住房政策基本完善配套。 2003年軍委投資9.5億元建設士官家屬臨時來隊住房,截至2003年,這項工作已取得階段性成果。

     擔負醫改試點任務的瀋陽、蘭州、濟南軍區實現了醫改試點的預期目標,在門診、住院經費的消耗上,比醫改前上升了10.5%,住院人均消耗比醫改前上升4.1%,用藥從數量品種 到檔次都有了較大提高;建立了大病醫療統籌補助標準,醫改工作初見成效。

     後勤資訊化建設穩步推進。 在已經建立20個全軍衛星遠距醫療系統站點的基礎上,2003年又為駐邊遠艱苦地區部隊新建60多個站點,在全軍基本形成了遠距醫療規模體系。 《軍隊住房建設與管理資訊系統》使全軍住房管理有了質的飛躍。 全軍規模最大的軍需自動化立體庫在總後軍需供應局正式投入使用,標誌著全軍軍需物資供應步入自動化。

住房制度日趨完善

     經過多年的探索和不斷深化,全軍住房制度改革取得了重大進展,住房制度日趨完善,住房保障新體系逐步形成。 全軍住房保障攤子大、出口不暢,軍人薪資中住房部分含量低、買不起房、買不到房等問題,逐漸解決。

     一、明確了各類人員的住房保障方式。 對在職幹部、離休幹部、退休幹部、轉業幹部及士官、職工等6類人員,分別實施不同的住房保障。 在職幹部主要住公寓房,有條件的可以購買自有住房;離休幹部主要購買乾休所現有住房,退休幹部主要購買專門為其建設的經濟適用住房,也可以自理住房;轉業、復員幹部和 士官由軍隊發給相應的住房補貼後購買社會提供的住房;職工按屬地原則實施房改。

     二、建立了住房補貼和公積金制度。 各類人員按月計算住房補貼,計入個人的帳戶,經批准購買住房或退休、轉業離開部隊時發給個人。 在工資總額中提取部分經費用於建立住房公積金,個人所有、統一存儲、專項使用。

     三、實施劃區售屋及發展經濟適用住宅。 部隊家屬生活區劃分為公寓區及售房區。 公寓區住房保障在職人員住用,離職遷出。 售房區住房向個人出售,產權歸己,維修自理。 軍事單位利用國家經濟適用住宅政策,在售屋區或徵用地方的土地建設經濟適用住宅向軍隊人員出售。

     四、住房管理實行社會化。 壓縮住房保障規模,減輕軍隊管房負擔,售房區出售的住房、新建的經濟適用住房全部實行物業管理,公寓區住房的管理逐步向社會化管理過渡。

基層幹部住宅建設明顯加快

     為了改善旅團作戰部隊、特別是駐鄉鎮和邊遠艱苦地區的旅團作戰部隊幹部的住房條件,軍委、總部多次撥出專項經費,著手安排住房建設和改造。 各級各部門依據總部製定的建設規劃,優先解決駐鄉鎮和邊遠艱苦地區旅團作戰部隊幹部住房問題,並針對幹部流動性大,能進能出,人走家搬等特點,因地制宜,通過缺 房屋新建、危險房屋完工、舊房整修和補缺配套等多種方式,加速進度,擴大受益面。 同時,加強以限額設計為主要內容的勘察設計管理,嚴格施工管理,確保新建、翻建和整修的房屋經濟實用,工程品質優良。 截至2003年底,全軍已累計投資17億多元,新建改造房屋300多萬平方米,使5萬多名旅團部隊的幹部住上了新房。 全軍士官家屬臨時來隊住房建設已完成投資3.5億元,建成士官家屬臨時來隊住房1.4萬套、56萬平方米,使10萬名士官家屬臨時來隊有房可住。

軍人配偶隨軍未就業期間可享有基本生活補貼

     新推出的《軍人配偶隨軍未就業期間社會保險暫行辦法》明確規定,軍人配偶隨軍未就業期間可享有基本生活補貼。 《辦法》規定,根據軍人駐地艱苦程度,軍人配偶隨軍未就業期間每月享有相應的基本生活補貼。 同時,為促進就業、再就業,實施領取基本生活補貼遞減制度。 駐國家確定的一、二類艱苦邊遠地區和軍隊確定的三類島嶼部隊的軍人,其配偶隨軍未就業期間領取基本生活補貼標準全額的期限最長為60個月;駐一般地區部隊的軍人 ,其配偶隨軍未就業期間領取基本生活補貼標準全額的期限最長為36個月。 未就業隨軍配偶領取基本生活補貼標準全額期滿後,以本人基本生活補貼標準8%的比例逐年遞減。 遞減後的最低基本生活補貼標準,由總後勤部參考省會城市失業保險金標準決定。 駐國家確定的三四類艱苦邊遠地區和軍隊確定的特、一、二類島嶼部隊的軍人,其配偶隨軍未就業期間基本生活補貼標準不實行遞減。

全軍99%以上的醫院實現資訊化管理

     根據解放軍總後勤部相關部門介紹,至2003年底,除駐西藏等偏遠地區的4所軍隊醫院外,全軍99%以上的醫院已實現資訊化管理,取得了顯著的效益。

     全軍醫院資訊系統擁有上網微電腦2.6萬台,已經建立了11個資訊化基地。 2003年部分大軍區已實現軍區機關到醫院的聯網,全軍將逐步實現醫院資訊系統的聯網,總部機關可透過廣域網路直接了解全軍醫院的醫療、教學、科研等情況,為宏觀決策提供科學依據 。 醫院資訊系統增強了醫院管理環節的調控力度,實現了全程管理;簡化了工作流程,方便了病患就醫;提高了醫療質量,減少了醫護差錯。 依托醫院資訊系統軍隊在瀋陽軍區、濟南軍區、蘭州軍區進行了醫療改革試點,130多萬官兵和家屬實現持「醫療卡」就醫,減少了就診、轉診程序。 明年4月1日,全軍將實施持卡就醫。 醫院資訊系統在合理用藥、電子醫療檔案和醫學影像應用方面也取得了顯著成效。 門診處方和住院病人用藥醫囑不合理,醫院資訊系統會自動顯示出來,並為病人提供最佳用藥選擇,避免了亂開大處方現象;電子醫療檔案規範了病程記錄的書寫;醫學影像資料的計算機 採集、存貯和調閱,為提高工作效率和醫療品質提供了方便。

首次派遣高級專家團赴駐邊遠艱苦地區部隊

     解放軍總後勤部高級專家團於8月11日抵達青海省西寧市,開始為駐邊遠艱苦地區的青藏兵站部基層部隊進行技術服務。 這是全軍首次組織面向駐邊遠艱苦地區基層部隊的智力服務活動。 參與這次智力服務活動的專家團成員由總後勤部所屬醫療單位、軍事院校、科研單位的中青年專家、教授組成,其中有1名院士、8名博士、2名碩士。 他們中既有在海外學成歸來的專家,又有全國、全軍先進典型和總後勤部「三星」人才。 專家團將根據部隊實際需要,深入青藏線沿線兵站、醫院、倉庫、輸油管部隊、汽車運輸部隊,透過舉辦學術講座、設備檢修、醫療服務、心理諮詢等方式對官兵們實行面對面服務,幫助解決部隊遇到的技術難題,指導開展新技術、新業務,傳授 基層所需的有關業務知識等。 專家團向部隊贈送了價值140多萬元的醫療設備。

武器裝備

     解放軍總裝備部領導同志在談到2003年部隊武器裝備現代化建設時強調,要切實把「三個代表」重要思想作為各項工作的科學指南,作為推動部隊裝備建設跨越式發展的根本動力。 深入研究面臨的新情況、新問題,積極推動適應武器裝備發展的理論創新;大力推進科技創新,在「生產一代、研發世代、預研一代」的基礎上,著力進行「探索一代」的研究; 穩步推進體制、機制創新。 要適應世界新軍事變革的大趨勢,努力尋求武器裝備建設的新突破新跨越。 要適應高新技術武器裝備發展的要求,確保重大科學研究試驗任務圓滿完成。 要服從並服務國家發展大局,為全面建立小康社會積極作貢獻。

     解放軍總裝備部把選拔培養高學歷優秀年輕幹部作為實施人才戰略工程的一項重要內容來抓,截至2003年底有400多名博士、碩士走上團以上領導崗位,其中150多人擔任軍師級領導 職務。 高學歷年輕幹部在總裝備部師團兩級已成為主體,團以上領導班子中具有大學本科以上學歷的約佔90%,基本形成了更替有序、人才輩出的良好局面,從而為部隊武器裝備 現代化建設的長遠發展提供了組織保證。

     總裝備部擔負部隊武器裝備建設和國防科研試驗重大任務。 為適應武器裝備建設長遠發展需要和進一步提高國防科研試驗能力,在總裝備部黨委的統一部署下,各級把選拔培養學歷高、素質好、發展潛力大的優秀年輕幹部作為一項長期而緊迫 的任務來抓,採取使用一批、培養一批、儲備一批的辦法,把高學歷優秀年輕幹部有序地充實到團以上領導崗位,逐步實現軍師級指揮軍官隊伍年輕化、知識化、專業 化。 至2003年,已培養了一批「博士司令」「博士老總」「博士校長」。 在選拔培養高學歷優秀年輕幹部過程中,總裝備部各級不搞論資排輩,而是強調“優先意識”和“超前意識”,把一批高學歷優秀年輕幹部提前安排到重要領導崗位上任職, 成為重點裝備研發、重大科學研究試驗任務和國防關鍵技術攻關的組織指揮者。 對特別優秀的高學歷年輕幹部,採取小步快走等超常措施破格提拔,近年來提拔的一批年輕軍職領導幹部中,博士和碩士佔一半以上。

     解放軍總裝備部認真依照國務院、中央軍委所授予的職能,加強對軍隊和國防科技工業部門國防科研經費的審計監督和管理,努力提高國防科研經費的使用效益,有效保證了新型裝備和重大國防科研試驗 任務的完成。

     根據總裝備部審計局負責人介紹,國防科研財務和審計部門採取多種措施,嚴格國防科研經費的管理和審計,使得國防科研經費的使用效益進一步提高;國防科研經費保障力度明顯加強,管理程序 更規範,經費流向更合理;國防科研合約制度進一步推廣和深化,大大促進和保障了重大科研試驗任務的順利完成;加大了國防科研經費的審計監督力度,嚴肅查處了一批違反國防科研經費 使用管理規定的單位和個人,有效確保了國防科研經費的專款專用。 經對26項國防重點工程和各軍工集團公司部分科研單位國防科研經費使用情況的審計表明,軍隊和國防科技工業部門國防科研經費使用情況良好,管理規範,財務核算體系完整,有效地保證了國防 科學研究的需要和新型裝備的研發。 一批新型武器裝備的研發工作取得重大進展,一批關鍵國防科技攻關計畫取得重要突破,國防研究與試驗產品的品質明顯提高,部分重點國防研究計畫的進度提前。

     2003年8月,解放軍總裝備部採用競爭性談判方式,分別與3家車輛製造廠簽訂了航太發射推進劑鐵路車輛的採購合約。 這標誌著軍隊裝備採購制度改革正逐步深入。

     航太發射推進劑鐵路車輛分罐車、機車、客車等不同類型,過去都是到指定廠商訂購,車輛造價不斷上漲,產品技術性能、可靠性和售後服務卻沒有明顯改善。 為貫徹落實《裝備採購條例》,深化裝備採購制度改革,總裝備部在車輛訂購中引入競爭機制,根據推進劑運輸車輛的技術特點和鐵路車輛製造業實際,首次採用競爭性談判方式選擇承製 廠商。 談判過程中,裝備部遵循「公平、公正、科學、擇優」的原則,從報價、品質、服務、資信等方面對參與競爭性談判的廠商進行了綜合評定。 最終,3個報價最低、方案最優的車輛廠成為預成交廠商。 這次採購比預算少支出了132萬元。

To meet the challenges of the world's new military transformation and actively promote military transformation with Chinese characteristics, the Central Military Commission has made major strategic decisions and the headquarters has launched a series of major measures. The biggest move is the decision to reduce the number of military personnel by another 200,000 before 2005.


    In 2002, the Central Military Commission officially promulgated the "Implementation of Military Talent Strategic Project Plan"; the four headquarters successively issued "Regulations on Several Issues on Strengthening the Construction of Cadre Teams for Equipment and Technical Support of Combat Forces" and "Opinions on Further Improving Cadre Exchanges" and the "Opinions on Several Issues Concerning Improving the Quality of Staff Teams", the pace of personnel training across the military has been significantly accelerated. In October 2002, a high-tech knowledge training class for senior military region leaders started, focusing on the study of information warfare and military information construction. Each headquarters agency has also successively launched high-tech knowledge training courses. The focus on informatization construction starts from senior cadres and leading agencies, demonstrating the focus and characteristics of military reforms over the past year.


    The major measures taken by the Central Military Commission Headquarters directly enhance combat effectiveness. When deploying annual training tasks, the General Staff Headquarters emphasizes innovative forward-looking combat theories and drives the reform of training content and training methods with new needs. The General Political Department directly organized the revision of the new "Political Work Regulations", emphasizing that political work should serve the promotion of military reform with Chinese characteristics, and all military political cadres began to study the new "Political Work Regulations" on a large scale. The General Logistics Department has vigorously promoted the construction of tri-service joint logistics and logistics informatization, and information systems such as telemedicine for remote troops and military housing management have made new leaps. Equipment system officers and soldiers seize the period of strategic opportunities, accelerate the leap-forward development of military weapons and equipment, and strive to make existing equipment, especially new equipment, into an organic system and into a system to form combat capabilities and support capabilities.

    Improving the quality of officers and soldiers is an important part of promoting military reform with Chinese characteristics. To adapt to building an information-based army and win information-based wars, we must have high qualities that are suitable for it. By 2003, both grassroots officers and soldiers, division chiefs, and low-educated cadres had a strong sense of crisis. Many leading cadres have taken the lead in setting an example and are determined to improve their ability to command information warfare. All units across the military have taken increasingly strong measures to focus on talent work, providing strong talent and intellectual support for promoting military reform with Chinese characteristics.

Disarmament by 200,000

    On September 1, 2003, when attending the 50th anniversary celebration of the University of Defense Technology, Jiang Zemin, Chairman of the Central Military Commission, solemnly announced that the Party Central Committee and the Central Military Commission decided to reduce the number of military personnel by 500,000 during the "Ninth Five-Year Plan" period. The former army will cut another 200,000 positions. This is the 10th major reorganization of the military since the founding of the People's Republic of China, which has attracted great attention from the international community. Some public opinion said, "With the large-scale reduction of military personnel as a symbol, the curtain of China's new military reform has officially begun."

    To promote military reform with Chinese characteristics, we must scientifically establish strategic goals, development ideas and specific steps for military construction in accordance with the requirements for realizing informatization. However, insufficient supply of military expenditures is a common problem encountered by the militaries of various countries, including China, in the new military transformation. From a global perspective, the proportion of national defense expenditures in GDP in various countries is generally between 2% and 4%, while China only accounts for about 1.5%. Taking 2002 as an example, China's defense expenditure was 169.444 billion yuan, equivalent to approximately 20 billion U.S. dollars, which was only equivalent to about 6% of that of the United States. Most of the military expenditure is used for the living expenses and activity maintenance expenses of the 2.5 million personnel, and relatively little is used for equipment and training.

    Military experts pointed out that the purchase and maintenance costs of high-tech and information-based weapons and equipment have increased exponentially. To solve the contradiction between supply and demand of military expenditure and maximize benefits from limited military expenditure, the best idea is to reduce the number of personnel and improve the quality of the army. The new military reform requires that the size of the army be reasonable, moderate and sufficient. After the number of Chinese military personnel is reduced from 2.5 million to 2.3 million, it will be more likely that limited strategic resources can be used more effectively and achieve greater benefits. Large-scale reduction of posts is not just about "reducing personnel". Its essence is a structural adjustment of the existing military system and establishment. The adjustment and reform of the military system and establishment must implement the principles of elite troops, integration and efficiency. Only by in-depth study of the impact of high-tech warfare on the military system and establishment Only by focusing on solving the contradictions and problems existing in the leadership, command and management system and troop formation can we establish a military system with Chinese characteristics.

    Military experts believe that reducing quantity, improving quality, optimizing the internal structure of the army, increasing high-tech content, strengthening comprehensive integration construction, and gradually establishing systems and establishments that meet the requirements of modern warfare are the key to accelerating the modernization of the People's Liberation Army and better doing military work. The inevitable choice for struggle preparation. Unswervingly following the path of elite soldiers with Chinese characteristics is the established policy of military construction. The reduction of military personnel is to continuously adapt to the world's new military reform and development trends and to serve the needs of the overall national economic construction. After this disarmament, although the scale of China's military power has been reduced to a certain extent, its combat effectiveness will definitely be improved, and its ability to safeguard national sovereignty and territorial integrity will definitely be further enhanced!

    According to the unified deployment of the Central Military Commission, the work of streamlining and reorganizing the army will be fully launched by the end of 2003. Most of the remaining soldiers in the streamlined and reorganized units will be arranged to retire from active service, including remaining conscripts and non-commissioned officers who have not completed their service period. The People's Liberation Army Headquarters has made specific arrangements for this work: in accordance with the needs of troop adjustment and downsizing, some conscripts and non-commissioned officers who have not served for the required period of time are allowed to retire from active service early; retired conscripts and demobilized non-commissioned officers in units with heavier missions can be arranged to retire early. Demobilized non-commissioned officers who leave the unit; demobilized non-commissioned officers from units that have been abolished or reorganized into reserve units shall be transferred to local resettlement departments for placement in advance. The resettlement of soldiers who retire early due to the adjustment and streamlining of the army must be treated equally with retired soldiers who have completed their service, be received on time, and included in the 2004 resettlement plan. Among them, retired urban conscripts who have served in active service for more than one year must be placed in accordance with the relevant regulations for retired conscripts after completing their service; retired non-commissioned officers who have served in active service for more than 9 years must be arranged in accordance with the relevant regulations for retired non-commissioned officers who have served in active service for more than 10 years. . For demobilized non-commissioned officers who leave early from units that have been abolished or reorganized into reserve forces, each major unit will send dedicated personnel to submit the files to the relevant local resettlement departments for review. For those who meet the conditions, a "Notice of Acceptance and Placement" will be issued, and the army can organize demobilized non-commissioned officers. Leave the team; if you personally request demobilization, you can also undergo demobilization and resettlement with approval. For noncommissioned officers who meet the retirement conditions, retirement orders should be issued in a timely manner in accordance with the "Measures for the Resettlement of Noncommissioned Officers of the Chinese People's Liberation Army Retiring from Active Service" issued by the State Council and the Central Military Commission, and reported to each level for inclusion in the transfer and resettlement plan. Soldiers who retire early will be issued retirement fees and materials based on their actual service years and corresponding standards. The funds and materials issued must be distributed to retired soldiers in full and in a timely manner. Decommissioned non-commissioned officers who leave the team early will be treated the same as decommissioned non-commissioned officers who leave the team during the normal time of the year. Salaries, benefits, medical treatment and clothing will be paid in accordance with relevant regulations.

    After the adjustment and reform of the military's organizational structure, the Chinese military will have dozens of cadre positions, including chiefs of departments and club directors, and tens of thousands of cadre positions filled by non-commissioned officers. Personnel in professional positions changed to non-commissioned officers will be included in the training of technical secondary school or above in military academies starting from 2004. In order to ensure the smooth progress of this work and meet the requirements for talents and other positions to be replaced by the end of 2003, pre-service training for non-commissioned officers is planned to be conducted by combining technical secondary school education training with short-term training. Among them, short-term training of 3 to 5 months will be conducted for professional positions in which replacement candidates are selected from existing non-commissioned officers who have received more than 2 years of training in colleges and universities. For professional positions that do not have the same or similar majors in the existing non-commissioned officer education training plan and for which there are no candidates for replacement, we will organize technical secondary school education training, with a 2-year academic system, 1 year of study at school, and 1 year of on-the-job internship; enrollment will begin in the first quarter of each year , he continued his summer vacation while studying at school, and returned to the army for internship before the end of 2003.

Attached: Information on the first nine disarmaments

    The first streamlining and reorganization: In the early days of the founding of New China, the total strength of the People's Liberation Army reached 5.5 million. In June 1950, the Chinese Army Staff Conference's streamlining and reorganization plan stipulated that the army should be reduced to 4 million, and more than 239,000 people were demobilized that year. Soon, the War to Resist US Aggression and Aid Korea broke out, and the streamlining and reorganization work was terminated. By the end of 1951, the number of military personnel reached 6.27 million, the largest number in the history of the Chinese military.

    The second streamlining and reorganization: In November 1951, the Central Military Commission held a reorganization meeting and stipulated that the total number of military personnel should be controlled at about 3 million by 1954. In January 1952, Mao Zedong approved the "Military Reorganization Plan" and the total quota of the army was reduced to about 3 million.

    The third streamlining and reorganization: As of the end of September 1953, the number of troops was reduced to about 4.2 million. In December of that year, a meeting of senior party cadres in the Chinese military system decided to reduce the number of troops to 3.5 million. By June 1954, the army had been streamlined by more than 472,000 people, and the plan was basically completed by the end of the year.

    The fourth streamlining and reorganization: In January 1957, the enlarged meeting of the Central Military Commission passed the "Decision on Reducing the Quantity and Strengthening the Quality of the Army", which determined that the total number of the army would be reduced by another third, requiring a reduction of 1.3 million personnel in three years, reducing it to Around 2.5 million people.

    The fifth streamlining and reorganization: From June 24 to July 5, 1975, the enlarged meeting of the Central Military Commission decided to reduce the army by 600,000 people within three years. By 1976, the total number of troops was 13.6% lower than in 1975. Later, due to the interference and sabotage of the "Gang of Four", the streamlining and reorganization task was stopped before it was completed.

    The sixth, seventh, and eighth streamlining and reorganization: In March 1980, the Central Military Commission decided to streamline the army again, vigorously streamline agencies, reduce non-combatants and support troops, implement streamlined reorganization of some units, and transfer some units to local governments. On August 15 of the same year, the Central Committee of the Communist Party of China approved the Central Military Commission's "Plan on the Streamlining and Reorganization of the Army." In September 1982, the Central Committee of the Communist Party of China and the Central Military Commission decided to further streamline and reorganize the army. At the end of May and beginning of June 1985, the Central Military Commission decided to reduce the number of military personnel by 1 million, and the streamlining and reorganization work was basically completed by the beginning of 1987.

    The ninth streamlining and reorganization: In September 1997, Comrade Jiang Zemin announced in his report to the 15th National Congress of the Communist Party of China that, based on the reduction of 1 million military personnel in the 1980s, China will reduce the military personnel by another 500,000 personnel in the next three years. By the end of 1999, the task of disarmament of 500,000 troops had been completed, and more than 200,000 military cadres had retired from active service and transferred to local jobs. This is the highest proportion of cadre reduction among the previous reductions in military personnel in New China.

Technological training

    In 2003, the Chinese military and armed police forces successfully completed their annual training tasks and achieved new results in five aspects: theoretical innovation, actual combat drills, anti-terrorism training, talent training, and strict management training.

    1. Use developed military theories to guide new military training practices. In accordance with the requirements of using informatization to drive mechanization and mechanization to promote informatization, the military training of the army and armed police forces conducts in-depth theoretical research on information operations, non-contact operations, joint operations and other combat styles, innovates military theories and combat ideas, and guides military training. The deepening of reform has promoted the development of scientific and technological training in the direction of informatization.

    2. Focus on improving the ability to win, taking preparations for military struggles as the leader, and making troop training close to actual combat. The Nanjing and Guangzhou Military Regions have intensified their efforts in practical training with actual troops, carried out research on difficult tactical and technical issues, and achieved a number of valuable results. The Shenyang, Beijing, and Jinan Military Regions practice command, tactics, coordination, and support under conditions similar to actual combat; the Navy, Air Force, and Second Artillery Force focus on strengthening joint combat command drills of all services and arms; Lanzhou and Chengdu Military Regions deepen operations in alpine mountains Conduct drills to study and solve key issues such as mobility, survival, command, coordination, and support; the Armed Police Force strengthens emergency response, anti-terrorism, and defense operations drills. The entire military actively carries out innovative practices in regional collaborative training, and launches key research on key issues such as joint tactical corps operational theory and regional collaborative training mechanisms.

    3. In accordance with the new military tasks assigned to the army by the state in the fight against terrorism, the troops responsible for the task of counter-terrorism shall carry out solid research and training practices in the military fight against terrorism.

    4. There are new measures for talent cultivation. Military academies focus on cultivating high-quality new military talents, deepening the adjustment and reform of the institutional structure of institutions, and promoting the in-depth development of teaching reforms in institutions. All units have further intensified the construction of training institutions and teaching reform, and trained a large number of outstanding command non-commissioned officers at the grassroots level.

    5. The military insists on conducting training in accordance with the law, conducts training strictly according to the program, vigorously carries out on-the-job training activities, improves the quality of contract tactical drills, and continuously improves the level of formalized training of the troops.

Force reform

    On June 10, 2003, the General Political Department of the People's Liberation Army issued a notice requiring officers and soldiers of the entire army and the Armed Police Force to conscientiously study and implement the spirit of the "Notice of the Central Committee of the Communist Party of China on Issuing the (Study Outline of the Important Thought of the "Three Represents")" and deepen the understanding of the "Three Represents" The understanding of the important thought of "Three Represents" has led to a new upsurge in studying and implementing the important thought of "Three Represents" in the entire army. The General Political Department organized the publishing department to quickly print and distribute the "Outline for Studying the Important Thought of "Three Represents"" to the entire army, and issued a special notice requiring all leading cadres at the army corps level and above and cadres in government agencies to carefully study a series of important works by Comrade Jiang Zemin and learn from the "Outline" "As a clue, we can deeply and systematically study and master the important thinking of the "Three Represents" as a whole. The grassroots level should use the "Outline" as the main guidance material, read several important works of Comrade Jiang Zemin, deeply study and master the basic spirit and basic viewpoints of the important thought of "Three Represents", and further unify the thoughts and actions of all officers and soldiers with Deng Xiaoping Theory and uphold the important thought of "Three Represents", further condense wisdom and strength into realizing the tasks set by the 16th National Congress of the Communist Party of China, resolutely obey the commands of the Party Central Committee, the Central Military Commission and Chairman Jiang, and strive to achieve the grand goal of building a moderately prosperous society in an all-round way. Goal and strive for the revolutionization, modernization and regularization of the army.

    On June 18, a theoretical seminar for the whole army to study and implement the important thought of "Three Represents" was held in Beijing. The meeting emphasized that we must more firmly establish the guiding position of the important thought of "Three Represents" in military building, gather the will and strength of the officers and soldiers under the banner of the important thought of "Three Represents", and further lay a solid foundation for adhering to the Party's support for the military. The ideological and theoretical foundation of absolute leadership enables the entire military to always maintain a mental state of advancing with the times, shoulder the sacred mission, actively promote military reform with Chinese characteristics, and achieve leap-forward development of military modernization.

    In mid-June, with the approval of the Central Military Commission, the General Political Department of the People's Liberation Army put forward opinions on conscientiously implementing the spirit of the notice of the CPC Central Committee and setting off a new upsurge in studying and implementing the important thought of "Three Represents" throughout the army.

    With the approval of the Central Military Commission, the General Political Department entrusted the National Defense University to hold two rotational training courses for leading cadres above the military level in late August and mid-September to study and implement the important thinking of the "Three Represents". Recent students from the entire army and the Armed Police Force Hundreds of leading cadres above the military level each conducted a 10-day study. The rotation training class is guided by the spirit of Comrade Hu Jintao's "July 1st" important speech, in accordance with the requirements of the Central Committee's "Notice" and the General Administration's "Opinions", and based on the "Study Outline of the Important Thought of "Three Represents"" and "Jiang Zemin's Thought on National Defense and Army Construction" "Outline" as the basic clue, organized students to study Comrade Jiang Zemin's works and the report of the 16th National Congress of the Communist Party of China. In order to deepen the deep understanding and systematic grasp of the content learned, and to understand the latest theoretical research results, the rotation training class also invited relevant members of the Central Propaganda Group, the Central Literature Research Office, the National Development and Reform Commission, Peking University, and the Military Ideological and Theoretical Front. Experts and scholars gave special lectures and counseling reports. Through rotation training, the trainees have a new understanding of the historical background, practical basis, scientific connotation, spiritual essence and historical status of the important thought of "Three Represents", further deepened their understanding of Jiang Zemin's thoughts on national defense and army construction, and enhanced They have a sense of mission and responsibility to use the important thinking of "Three Represents" to guide the reform and construction of the army and create new situations in all work.

    In 2003, the entire army and armed police forces carried out extensive and in-depth educational activities to study and practice the important thought of "Three Represents" and contribute to the comprehensive construction of a well-off society. Through education, the majority of officers and soldiers have further strengthened their political belief in the party's innovative theory, and enhanced their sense of responsibility and mission to consciously apply the important thought of "Three Represents" to promote the reform and construction of the army and contribute to the comprehensive construction of a moderately prosperous society.

    According to the person in charge of the relevant department of the General Political Department of the People's Liberation Army, the educational activities are implemented in two stages. In the first half of the year, the focus is on studying the report of the 16th National Congress of the Communist Party of China and focusing on special education; in the second half of the year, the implementation of General Secretary Hu Jintao's instructions for leading cadres at the provincial and ministerial levels Study and implement the important speeches at the special seminar on the important thought of "Three Represents" and the deployment of the Party Central Committee and the Central Military Commission, combined with the study of Jiang Zemin's thoughts on national defense and army building, to further deepen educational activities. In education, the main leaders of major units went deep into the troops to provide specific guidance, and nearly a thousand leaders above the military level and more than 10,000 cadres above the regiment level gave lectures to the troops. Many troops invited local party and government leaders to introduce measures to develop the economy and improve people's lives; they organized viewings of video reports on the deeds of advanced people such as Zheng Peimin and Fan Kuangfu; they organized visits to anti-SARS photo exhibitions and invited anti-SARS heroes and models to give reports; and held situation report meetings with experts and scholars. Discussions and exchanges, etc. The officers and soldiers said that in the great journey of socialism with Chinese characteristics, we cannot do without the guidance of the important thought of "Three Represents" for a moment, and we must always persist and unswervingly.

    All units guide officers and soldiers to use the positions, viewpoints and methods of the important thought of "Three Represents" to deeply understand the party's major strategic decisions for the comprehensive progress of the country's economy, society and culture, and encourage everyone to take realizing the great rejuvenation of the Chinese nation as their own responsibility and consciously obey and serve The overall situation of building a moderately prosperous society in an all-round way. The military medical staff who participated in the fight against SARS at Xiaotangshan Hospital worked hard for more than 50 days and nights and made outstanding achievements in defeating the SARS disease. After floods occurred in the Yellow River, Huaihe, Weihe and other river basins, earthquakes occurred in Xinjiang, Yunnan and other places, and fires broke out in the Greater Khingan Mountains and other areas, more than 100,000 officers and soldiers risked their lives and rushed to the front line of rescue and disaster relief, assisting local governments to relocate and resettle more than 100 people. Thousands of people, transported more than 2 million tons of supplies, and defended the achievements of "moderately prosperous" construction with their blood and lives.

    The most distinctive feature of this educational activity is to focus on transforming learning results into powerful spiritual motivation to promote army building, achieve new development, and create new situations. Many troops guide officers and soldiers to find out the manifestations of outdated thinking in training and teaching, education management, logistics support, equipment construction, etc., correct them one by one, and establish training, management and management systems that are suitable for building a well-off society in an all-round way and building an information-based army. Talent concept. Each unit actively organized officers and soldiers to boldly reform and innovate based on actual combat needs, and developed a number of new achievements such as field command and control systems, wartime work decision-making systems, and simulation training equipment. The troops responsible for emergency mobile operations shouted the slogan of "training scientific and technological elite soldiers to serve as vanguards", practicing skills and improving quality, and successfully completed tasks such as sea training, field training and live ammunition launches. In 2003, more than 120,000 officers and soldiers in the army actively signed up to participate in various correspondence studies and self-study examinations. Thousands of cadres studied for master's and doctoral degrees in military majors. The Central Military Commission's decision on the implementation of the talent strategic project is becoming practical actions for the majority of officers and soldiers. .

    At the end of July 2003, with the approval of the Central Military Commission, the "Jiang Zemin Ideological Study Outline for National Defense and Army Construction" organized and compiled by the General Political Department was officially published and distributed to the entire army. The Central Military Commission issued a notice requiring all officers and soldiers to use Jiang Zemin's "On National Defense and Army Construction" and a series of important speeches as the basic teaching materials, and the "Outline" as important auxiliary materials, conscientiously study and implement Jiang Zemin's thoughts on national defense and army construction, and promote the study of the entire army The new upsurge in implementing the important thought of "Three Represents" continues to develop in depth.

    The Central Military Commission held a symposium on the publication of "Jiang Zemin's Ideological Study Outline for National Defense and Army Construction" in Beijing on July 31. The meeting pointed out that Chairman Jiang has formed a complete and systematic thought on national defense and army building in the great practice of leading national defense and army building. Jiang Zemin's thought on national defense and army building, together with Mao Zedong's military thought and Deng Xiaoping's thought on army building in the new era, is a military science system that is in the same vein and keeps pace with the times. It is an important part of the important thought of "Three Represents" and an important part of Marxist military theory. The latest achievements of China's development are scientific guides for military construction and development in the new century and new stage. The entire military must unswervingly regard Jiang Zemin's thoughts on national defense and army building as the fundamental guideline and guide to action in guiding all work. Leading cadres at all levels should set an example in learning and implementing Jiang Zemin's thoughts on national defense and army building, and take the lead in learning, implementing and applying this scientific theory well.

Logistics support

    The army's logistics work adheres to the important thinking of "Three Represents" to govern all constructions. In accordance with the requirements of actively promoting military reform with Chinese characteristics, it intensifies reform and innovation, accelerates the pace of development, and achieves remarkable results in logistics construction.

    The joint logistics system of the three armed forces is operating well. By adjusting the support relationship, most troops have achieved close-by support; high-quality joint logistics services have been carried out to ensure the timely and full supply of funds and materials; a coordination and cooperation mechanism has been established to provide joint training in peacetime and joint operations in wartime. Guarantee creates conditions.

    With the full launch of a new round of socialization of logistics support, 2,179 canteens in the army were reformed in 2003; 1,283 military service agencies were withdrawn, merged, suspended, or modified; and 1,851 non-combat military camps were undergoing barrack maintenance, water supply and power supply. , greening and cleaning projects, etc.; through various methods such as overall transfer, entrusted management, self-employment, and termination of labor relations, more than 31,000 employees and temporary workers were diverted and resettled.

    In 2003, the total military bidding and procurement exceeded 7 billion yuan, an average saving of more than 10% over the previous year. The reform of the procurement system for troops below the military level has been popularized and centralized procurement has exceeded 1 billion yuan, achieving both economic and social benefits.

    In 2003, the administrative consumable expenditure limit standards for headquarters business departments were implemented for the first time, and key projects such as combat readiness and training were effectively guaranteed. In the first half of 2003, more than 20 million yuan in administrative consumable expenses in the headquarters business funds were reduced through this system.

    The reform of the housing system, which the whole military is concerned about, is advancing steadily. In 2003, the headquarters issued relevant policies on strengthening the management of affordable housing, accelerating the sale of existing housing in the housing sales area and the housing sales of some retired veteran cadres. The existing housing policies have basically completed the supporting facilities. In 2003, the Military Commission invested 950 million yuan in building temporary housing for the families of non-commissioned officers. As of 2003, this work has achieved initial results.

    The Shenyang, Lanzhou, and Jinan Military Regions, which are responsible for the medical reform pilot tasks, have achieved the expected goals of the medical reform pilot. The consumption of outpatient and inpatient funds has increased by 10.5% compared with before the medical reform. The per capita consumption of inpatients has increased by 4.1% compared with before the medical reform. The number of drugs has increased from quantity to variety. The level of medical care has been greatly improved; the standards for collective subsidy for serious illness medical care have been established, and the medical reform work has initially achieved results.

    Logistics informatization construction is advancing steadily. On the basis of the 20 military-wide satellite telemedicine system sites that have been established, more than 60 new sites were built in 2003 for troops stationed in remote and difficult areas, basically forming a large-scale telemedicine system throughout the military. The "Military Housing Construction and Management Information System" has made a qualitative leap in the housing management of the entire military. The largest automated three-dimensional warehouse for military supplies in the entire army was officially put into use at the Military Supply Bureau of the General Logistics, marking the entry into automation of the military supply of military supplies.

The housing system is improving day by day

    After years of exploration and continuous deepening, the military's housing system reform has made significant progress. The housing system has been increasingly improved, and a new housing security system has gradually taken shape. The military's housing security market is large, exports are not smooth, and the housing component of soldiers' wages is low, so they cannot afford to buy a house. These problems are being gradually solved.

    1. Clarify the housing security methods for various types of personnel. Different housing guarantees are implemented for six categories of personnel, including serving cadres, retired cadres, retired cadres, transferred cadres, non-commissioned officers, and employees. Serving cadres mainly live in apartments, and they can buy their own houses if conditions permit; retired cadres mainly buy existing houses in cadres' residences, and retired cadres mainly buy affordable housing specially built for them, and they can also take care of their own houses; transferred and demobilized cadres and Non-commissioned officers purchase housing provided by society after receiving corresponding housing subsidies from the military; employees implement housing reform based on the territorial principle.

    2. Establish a housing subsidy and provident fund system. Housing subsidies for various types of personnel are calculated on a monthly basis and credited to their personal accounts. They will be paid to individuals upon approval to purchase a house or when they retire or change jobs and leave the military. Withdraw part of the funds from the total salary to establish a housing provident fund, which is owned by individuals, stored uniformly, and used exclusively.

    3. Implement zoning for housing sales and develop affordable housing. The living area for military family members is divided into apartment areas and sales areas. The housing in the apartment area ensures that employees can live in and move out after resigning. The houses in the sales area are sold to individuals, the property rights belong to them, and the maintenance is taken care of by themselves. Military units take advantage of the national affordable housing policy to build affordable housing on land in housing sales areas or requisitioned areas for sale to military personnel.

    4. Socialize housing management. The scale of housing security will be reduced to reduce the burden of housing management by the military. All housing sold in housing sales areas and newly built affordable housing will be subject to property management. The management of housing in apartment areas will gradually transition to socialized management.

Housing construction for grassroots cadres has been significantly accelerated

    In order to improve the housing conditions of brigade combat troops, especially those stationed in villages and towns and remote and difficult areas, the Military Commission and the headquarters have allocated special funds on many occasions to start arranging housing construction and renovation. Based on the construction plans formulated by the headquarters, departments at all levels give priority to solving the housing problem of cadres of brigade combat troops stationed in villages and towns and remote and difficult areas. In view of the characteristics of cadres, such as high mobility, being able to come in and out, and people moving around, measures are taken according to local conditions and through the lack of housing. New housing construction, renovation of dilapidated housing, renovation of old housing, and supporting facilities to fill gaps will speed up the progress and expand the scope of benefits. At the same time, we will strengthen survey and design management with quota design as the main content, and strictly implement construction management to ensure that newly built, renovated and renovated housing is economical and practical, and the project quality is excellent. By the end of 2003, the military had invested a total of more than 1.7 billion yuan in building and renovating more than 3 million square meters of housing, enabling more than 50,000 brigade and regiment cadres to live in new homes. An investment of 350 million yuan has been completed in the construction of temporary units for the families of non-commissioned officers in the entire army, and 14,000 temporary housing units covering 560,000 square meters have been built for the families of non-commissioned officers, providing housing for 100,000 temporary units for the families of non-commissioned officers.

Military spouses can enjoy basic living allowances while they are not employed in the military.

    The newly issued "Interim Measures for Social Security for Military Spouses While Not Employed in the Military" clearly stipulates that military spouses can enjoy basic living allowances while not employed in the military. The "Measures" stipulate that according to the hardship of the military station, military spouses shall enjoy corresponding basic living allowances every month while they are not employed in the military. At the same time, in order to promote employment and re-employment, a system of declining basic living allowances is implemented. For military personnel stationed in Category I and Category II difficult remote areas determined by the state and Category III island units determined by the military, their spouses can receive the full standard of basic living allowance for up to 60 months while they are not employed in the army; for soldiers stationed in general areas, the maximum period is 60 months. , the maximum period for which the spouse can receive the full standard of basic living allowance while serving in the military and not employed is 36 months. After the full period of the basic living subsidy standard for an unemployed military spouse expires, the rate of 8% of the basic living subsidy standard will be reduced year by year. The reduced minimum basic living allowance standard will be determined by the General Logistics Department with reference to the unemployment insurance standard in provincial capital cities. For servicemen stationed in the third and fourth categories of difficult remote areas determined by the state and the special, first and second category island units determined by the military, the basic living subsidy standards for their spouses will not be reduced during the period when they are not employed in the army.

More than 99% of hospitals across the military have implemented information management

    According to relevant departments of the General Logistics Department of the People's Liberation Army, by the end of 2003, with the exception of four military hospitals stationed in remote areas such as Tibet, more than 99% of hospitals in the army had implemented information management and achieved significant benefits.

    The military hospital information system has 26,000 Internet-connected computers, and 11 information bases have been established. In 2003, some major military regions have already implemented networking from military region agencies to hospitals. The entire military will gradually implement networking of hospital information systems. Headquarters agencies can directly understand the medical, teaching, scientific research, etc. conditions of all military hospitals through the wide area network, providing scientific basis for macro decision-making. . The hospital information system strengthens the control of hospital management links and realizes full-process management; it simplifies the work process and facilitates patients' medical treatment; it improves the quality of medical care and reduces medical errors. Relying on the hospital information system, the military has carried out medical reform pilots in the Shenyang Military Region, Jinan Military Region, and Lanzhou Military Region. More than 1.3 million officers, soldiers and their family members have been able to seek medical treatment with "medical cards", reducing medical treatment and referral procedures. On April 1 next year, the entire military will implement card-based medical treatment. Hospital information systems have also achieved remarkable results in rational drug use, electronic medical records and medical imaging applications. If outpatient prescriptions and inpatient medication orders are unreasonable, the hospital information system will automatically display them and provide patients with the best medication options, avoiding the phenomenon of random large prescriptions; electronic medical files standardize the writing of disease course records; computers of medical imaging data Collection, storage and retrieval provide convenience for improving work efficiency and medical quality.

For the first time, a high-level expert team was dispatched to troops stationed in remote and difficult areas.

    A senior expert team from the General Logistics Department of the People's Liberation Army arrived in Xining City, Qinghai Province on August 11 and began to provide technical services to the grassroots troops of the Qinghai-Tibet Military Station stationed in remote and difficult areas. This is the first time the army has organized an intellectual service activity for grassroots troops stationed in remote and difficult areas. The expert team members participating in this intellectual service activity are composed of young and middle-aged experts and professors from medical units, military academies, and scientific research units affiliated to the General Logistics Department, including 1 academician, 8 doctors, and 2 masters. Among them are experts who have returned from overseas studies, as well as advanced models across the country and the army and "three-star" talents from the General Logistics Department. According to the actual needs of the troops, the expert team will go deep into the military stations, hospitals, warehouses, oil pipeline troops, and automobile transportation troops along the Qinghai-Tibet Line, and provide face-to-face services to the officers and soldiers by holding academic lectures, equipment maintenance, medical services, psychological consultation, etc., to help the officers and soldiers. Solve technical problems encountered by the troops, guide the development of new technologies and new businesses, and impart relevant business knowledge needed by the grassroots. The expert team donated medical equipment worth more than 1.4 million yuan to the troops.

Weaponry

    When talking about the modernization of military weapons and equipment in 2003, leading comrades from the General Armament Department of the People's Liberation Army emphasized that the important thinking of "Three Represents" should be effectively used as a scientific guide for all work and as the fundamental driving force for the leap-forward development of military equipment construction. In-depth study of new situations and new problems faced, and actively promote theoretical innovation adapted to the development of weapons and equipment; vigorously promote scientific and technological innovation, on the basis of "production generation, development generation, pre-research generation", focus on "exploration generation" research; Steadily promote institutional and mechanism innovation. We must adapt to the general trend of new military changes in the world and strive to seek new breakthroughs and new leaps in the construction of weapons and equipment. It is necessary to adapt to the requirements of the development of high-tech weapons and equipment and ensure the successful completion of major scientific research and test tasks. We must obey and serve the overall development of the country and actively contribute to building a moderately prosperous society in an all-round way.

    The General Armament Department of the People's Liberation Army regards the selection and training of outstanding young cadres with high academic qualifications as an important part of the implementation of the talent strategy project. By the end of 2003, more than 400 doctors and masters had taken leadership positions at or above the regiment level, and more than 150 of them served as military division-level leaders. position. Highly educated young cadres have become the main body at the division and regiment levels of the General Armament Department. About 90% of the leadership teams above the regiment level have a bachelor's degree or above. This has basically formed a good situation of orderly replacement and the emergence of talents, thus providing a good foundation for the army's weapons and equipment. The long-term development of modernization provides organizational guarantee.

    The General Armament Department is responsible for the major tasks of military weapons and equipment construction and national defense scientific research and testing. In order to meet the long-term development needs of weapons and equipment construction and further improve national defense scientific research and testing capabilities, under the unified deployment of the Party Committee of the General Armament Department, all levels have regarded the selection and training of outstanding young cadres with high academic qualifications, good quality and great development potential as a long-term and urgent task. To grasp the tasks of the regiment and above, adopt the method of using a group, training a group, and reserving a group, and orderly enrich the outstanding young cadres with high academic qualifications into leadership positions above the regiment, and gradually realize the younger, more knowledgeable and professional team of commanding officers at the military division level. change. By 2003, a group of "Doctoral Commanders", "Doctoral Bosses" and "Doctoral Principals" had been trained. In the process of selecting and training outstanding young cadres with high academic qualifications, all levels of the General Armament Department do not engage in seniority ranking. Instead, they emphasize "priority awareness" and "advanced awareness" and arrange a group of outstanding young cadres with high academic qualifications to serve in important leadership positions in advance. Become the organizer and commander of key equipment development, major scientific research and test tasks, and key national defense technology research. For particularly outstanding young cadres with a high degree of education, extraordinary measures such as small steps and quick steps are taken to promote them. Among a group of young military leaders promoted in recent years, more than half have doctorates and master's degrees.

    The General Armaments Department of the People's Liberation Army conscientiously follows the functions assigned by the State Council and the Central Military Commission, strengthens the audit supervision and management of national defense scientific research funds of the military and national defense science and technology industry departments, strives to improve the efficiency of the use of national defense scientific research funds, and effectively ensures the safety of new equipment and major national defense scientific research experiments completion of the task.

    According to the person in charge of the Audit Bureau of the General Armaments Department, the national defense scientific research finance and audit department has taken various measures to strictly manage and audit national defense scientific research funds, which has further improved the efficiency of the use of national defense scientific research funds; the guarantee of national defense scientific research funds has been significantly strengthened, and management procedures have been strengthened. It is more standardized and the flow of funds is more reasonable; the national defense scientific research contract system has been further promoted and deepened, which has greatly promoted and guaranteed the smooth completion of major scientific research and test tasks; the audit and supervision of national defense scientific research funds has been strengthened, and a number of violations of national defense scientific research funds have been seriously investigated and punished The use of units and individuals specified in the management effectively ensures that national defense scientific research funds are earmarked for their exclusive use. An audit of the use of national defense scientific research funds for 26 key national defense projects and some scientific research units of various military industrial group companies shows that the use of national defense scientific research funds by the military and national defense science and technology industry departments is good, with standardized management and complete financial accounting systems, effectively ensuring the national defense The needs of scientific research and the development of new equipment. Significant progress has been made in the development of a number of new weapons and equipment, important breakthroughs have been made in a number of key national defense scientific and technological projects, the quality of national defense scientific research and test products has been significantly improved, and the progress of some key national defense scientific research projects has been advanced.

    In August 2003, the General Armament Department of the People's Liberation Army adopted a competitive negotiation method and signed purchase contracts for space launch propellant railway vehicles with three vehicle manufacturers. This marks that the reform of the military equipment procurement system is gradually deepening.

    Different types of space launch propellant railway vehicles, such as tank cars, maintenance cars, and passenger cars, used to be ordered from designated manufacturers. The cost of the vehicles continued to rise, but the technical performance, reliability, and after-sales service of the products did not improve significantly. In order to implement the "Equipment Procurement Regulations" and deepen the reform of the equipment procurement system, the General Equipment Department introduced a competition mechanism in vehicle ordering. Based on the technical characteristics of propellant transport vehicles and the actual conditions of the railway vehicle manufacturing industry, it used competitive negotiation for the first time to select contractors. factory. During the negotiation process, the Equipment Department followed the principles of "fairness, impartiality, science, and merit selection" and conducted a comprehensive evaluation of the manufacturers participating in the competitive negotiations from aspects such as quotation, quality, service, and credit standing. In the end, the three vehicle manufacturers with the lowest quotations and the best plans became the pre-transaction manufacturers. This purchase was 1.32 million yuan less than budgeted.

中國政府資料來源:https://www.gov.cn/test/2005-06/28/content_10531.htm

中國軍方智能通信任務:認知域作戰的重要領域

Chinese Military Mandate of Intelligent Communication: An Important Field of Cognitive Domain Operations

Original Mandarin Chinese:

要點提示

●智能傳播環境下,人不斷“吸收”信息成為媒介的延伸,媒介逐漸變成具有“主體能動性的人”。人機雙方實現了循環交替與即時交互,使認知攻防呈現出不間斷、常態化的特徵。

●智能傳播能夠全維全時全域塑造用戶與信息之間的關系,使輿論引導、觀念塑造和行為導控變得更加便捷,日益成為“控腦武器”,並逐步發展出一整套認知操縱的實踐手法。

隨著智能媒介和平台技術的快速發展,智能傳播逐漸實現了智能技術與傳播媒體的跨界融合應用,不僅極大改變了信息的生產樣式和傳播方式,也深刻影響著人類的思維邏輯和價值觀念。智能傳播為影響認知、主導認知、顛覆認知等提供了強力支撐和廣闊空間,正在引發認知域作戰的迭代升級和深刻變革。釐清智能傳播作用於認知攻防的機理手段,對於借助智能傳播創新認知域作戰戰法具有重要意義。

智能傳播作用認知域的特點

智能傳播是將大數據、雲計算、機器學習、虛擬現實等技術應用於信息生產與傳播的活動。智能傳播能夠持續塑造和深入誘導目標對象的價值取向與行為思辨,日益成為認知攻防的全新平台和重要場域。

萬物泛在互聯。隨著智能傳播的發展演進,人與人、人與物、物與物都將被連接起來,任何智能終端都可以成為用戶接收信息的工具和平台投放內容的渠道,並且推送能力更加強大,分發場景也更為廣泛。受此影響,傳播平台的作用不再是純粹的信息輸出,對傳播內容甚至對人的思維、行為以及各種關系的塑造能力也將越來越突出。智能傳播可以深度介入並促進人際交往、數據交互和信息交換,無形之中使得認知域作戰空間、參戰力量類型得到極大拓展,同時還實現了對公眾思維認知、生產交往的全方位操控。 “萬物泛在互聯”的持續演進,使一切物體都可能成為媒介實現信息傳播的工具,信息也不再受到維域的限制,認知對抗的主體無處不在、空間廣為擴展。

虛實雜糅互構。在智能技術賦能的多元傳播格局下,無論是文字、圖片,還是聲音、影像等產品形態,均可輕而易舉地被偽造並大肆擴散。隨著深度偽造技術的迭代演化,其生產內容能夠以無限接近真實的形式呈現給廣大受眾,極易影響公眾對某一議題、事件、對象的態度立場。同時,由代碼和算法驅動的社交機器人,可以通過提取關鍵信息、點贊轉發評論等進行“噴灌式”傳播,從而不斷擴散假情況、假信息以混淆輿論視聽,加劇公眾對信息的非理性、情緒化反應,進而操縱認知走向。信息傳播真中有偽、真偽混雜,這種真實與虛假雜糅互構的狀態,極易引發群體信任撕裂,使認知攻防的狀況愈加復雜難控。

人機雙向互動。智能媒介既不斷豐富著信息的輸入輸出方式,也日益模糊了人與媒介原本清晰的界限。其不僅可以簡單地執行用戶指令,還可以根據傳播效果給予更多回饋。長此以往,公眾便可能潛移默化地視其為外接“大腦”,無意識地受其影響。在技術的支撐下,智能媒介還可以獲得類似人的感知、運算甚至情感智能,借助人機交互反向影響用戶的思維方式,通過算法推薦塑造用戶的行為取向。智能傳播環境下,人不斷“吸收”信息成為媒介的延伸,媒介逐漸變成具有“主體能動性的人”。人機雙方實現了循環交替與即時交互,使認知攻防呈現出不間斷、常態化的特徵。

智能傳播作用認知域的機理

當前,智能傳播已經成為主導信息內容、控制輿論導向的有效手段,並借助全方位、多感官的媒介系統,由淺入深地調動目標受眾的沉浸體驗和主體意識,進而加深其感知程度、拓寬其認知範圍並影響其價值選擇,逐漸成為進行思想滲透、實施攻心奪志的重要方式。

借助情境浸染施加認知影響。心理學理論認為,受眾身體及其與環境的交互關系在認知活動中發揮著關鍵作用。媒介作為人體之外的人工感應系統,不斷進化的媒介技術能夠改變甚至重塑感知方式。智能媒介可以將不能同時出現在相同時空的復雜信息,進行疊加合並或仿真模擬,從而最大程度地還原信息的本來面貌,為公眾提供視覺、聽覺、觸覺等沉浸式的感官體驗。如此一來,傳播效果越來越呈現出沉浸式趨勢,智能傳播使信息以更具立體感、時空感和震撼感的方式,直擊目標受眾的感官通道,並由此催生“感官觸碰-心理觸動-情感共鳴”的一系列鏈式反應,藉以實現對其在生理層面的感知影響和操控。

通過虛擬映射影響認知走向。智能設備的發展與普及,提高了人的“可量化度”與“可跟蹤性”,這些設備有些存在於外部環境,但未來也會越來越多地與人的身體形成密不可分的關系。得益於此,可以將受眾的行為、活動、身體狀態等以多種維度映射在虛擬世界裡。一旦人們可以通過“虛擬實體”真實體驗認知的過程及其所在的環境,認知域與認知語境的關系,便不再割裂為虛擬和現實兩種維度。在此過程中,作為受眾,既被增強,即獲得新的感知覺體驗,實現認知活動的自由延展;同時也被約束,即被數字化映射的個體,更容易被他人洞察和操控。

運用人機融合強化認知幹預。當前,社交機器人可以通過捕捉用戶情感動態、分析信息內容及結構的方式,形塑一個類人的交流對象,推動傳播主體由“人”轉向“人機共生”。基於用戶身份和實時互動,社交機器人能在一定程度上影響公眾的思考習慣和行為模式,在傳播虛假信息、操縱公共輿論、進行社會動員、煽動公眾情緒等方面效果顯著。隨著技術的不斷完善,社交機器人的形象將會更加豐富、具有質感,甚至可以模仿人類的情緒。前段時間,基於生成式AI的ChatGPT,其生成的數據、信息等更容易被用戶信任和接納,對思維認知的影響更直接、更有效,可以在潛移默化中改變用戶的意識,隱秘而持續地建構用戶的認知框架。

智能傳播作用認知域的手段

智能傳播能夠全維全時全域塑造用戶與信息之間的關系,使輿論引導、觀念塑造和行為導控變得更加便捷,日益成為“控腦武器”,並逐步發展出一整套認知操縱的實踐手法。

製造信息迷霧,攻擊認知黑洞。智能傳播環境下,深度偽造信息混淆了存在與虛無、現實與虛擬以及記憶與遺忘的界限,能夠用以扭曲事實真相、左右輿論流向,進而達到影響認知走向、強化認知幹預的目的。特別是以社交機器人為代表的智能程序具備自動識別、智能應答甚至類腦思考的能力,並且不知疲憊、全時無休,能夠以大規模、多渠道、高速度、強頻率的方式對公眾進行信息轟炸,形成高強度思維認知壓迫。一旦虛假意見或者偽造事件形成輿論環境,將極大地壓縮個體的反應時間,受眾不僅難以進行深度思考,還容易在從眾心理的驅使之下,產生從不相信到相信、從不接受到接受、從不認同到認同的質變,進而營造出虛假的集體認同,將目標對象引入預設的議題陷阱。

實施靶向攻心,構建認知繭房。信息化智能化時代,公眾對事物的認知受到無處不在的各類推送信息的潛在影響。外軍認為,通過掌握目標對象的上網痕跡、購物記錄、社交狀態等情況,能夠迅速採集不同維度、不同層級、不同模態的認知數據,為高效掌握其價值觀念、輿論立場等提供支撐。在精準繪制認知圖景的基礎上,能夠發現目標對象認知體系的疑點、弱點和需求點,可以按其思維偏好設定內容主題、敘事方式和話語框架。繼而或選定具有相似理解語境、相同情感特質的群體,或選定易受影響、具有較大影響價值的特定個體,通過有選擇性地推薦和有針對性地過濾,差異化、分眾化投送相關信息。借助內容定向投送和渠道精準攻擊,能夠對目標對象進行靶向攻心和持續影響,有效固化其信息接受範圍,不斷削弱其獨立思考能力,致使其陷入認知繭房和思維定式,甚至強制地改變其決策意圖和行動部署。

滲透心理裂隙,擊潰情感堤防。不同於以往的傳播手段,智能傳播可以構建身臨其境式的虛擬環境,在使用戶感覺空間和感覺維度得以拓展的同時,也天然附帶強烈的感官刺激和感性認知偏向,磨損著用戶的理性認知水平與價值判斷能力。受眾在感知事件真相時將更加受制於感性的影響,要想撬動認知就特別需要倚重感性爭取。或是用絢爛的景觀吸引人,或是以娛樂的場景誘惑人,或是靠恐怖的場景震懾人,借助可觸可感可交互的智能傳播營造出極具欺騙性、迷惑性、煽動性的信息場景,強烈刺激用戶的心理感受,使其深陷其中而不自知。一旦陷入情感浸潤和場景浸染中,就可以利用共通情感、共同價值來進行情緒煽動或加以道德裹挾,摧毀其情感依賴,破壞其價值支撐,進而震撼、佔據甚至極化目標對象心智。

(作者單位:國防大學國家安全學院)

●Under the intelligent communication environment, people continue to “absorb” information and become the extension of the media, and the media gradually become “persons with the initiative”. Both man and machine have achieved cyclic alternation and real-time interaction, making cognitive attack and defense present uninterrupted and normalized features.

●Intelligent communication can shape the relationship between users and information in all dimensions, all time and all domains, making public opinion guidance, concept shaping, and behavior guidance more convenient. It has increasingly become a “brain control weapon” and gradually developed a set of cognitive manipulation methods Practical approach.

With the rapid development of intelligent media and platform technology, intelligent communication has gradually realized the cross-border integration and application of intelligent technology and communication media, which has not only greatly changed the production style and communication mode of information, but also profoundly affected human thinking logic and values. . Intelligent communication provides strong support and broad space for influencing cognition, dominating cognition, subverting cognition, etc., and is triggering iterative upgrades and profound changes in cognitive domain operations. Clarifying the mechanism and means of intelligent communication on cognitive attack and defense is of great significance for innovating combat tactics in the cognitive domain with the help of intelligent communication.

The Characteristics of the Cognitive Domain of Intelligent Communication

Intelligent communication is an activity that applies technologies such as big data, cloud computing, machine learning, and virtual reality to information production and dissemination. Intelligent communication can continuously shape and deeply induce the value orientation and behavioral speculation of the target audience, and has increasingly become a new platform and important field for cognitive attack and defense.

Everything is ubiquitously connected. With the development and evolution of intelligent communication, people and people, people and things, and things and things will all be connected. Any smart terminal can become a tool for users to receive information and a channel for the platform to deliver content, and the push capability is more powerful. The scene is also wider. Affected by this, the role of the communication platform is no longer pure information output, and its ability to shape the content of communication and even people’s thinking, behavior and various relationships will become more and more prominent. Intelligent communication can deeply intervene and promote interpersonal communication, data interaction and information exchange, which invisibly greatly expands the combat space in the cognitive domain and the types of forces participating in the war. The continuous evolution of “Ubiquitous Internet of Everything” makes it possible for all objects to become a tool for media to realize information dissemination, and information is no longer limited by dimensions. The subject of cognitive confrontation is ubiquitous and the space is widely expanded.

Mixture of fiction and reality. Under the multi-communication pattern empowered by intelligent technology, whether it is text, pictures, sound, video and other product forms, it can be easily forged and spread wantonly. With the iterative evolution of deep forgery technology, its production content can be presented to a wide audience in a form that is infinitely close to reality, which can easily affect the public’s attitude towards a certain issue, event, or object. At the same time, social robots driven by codes and algorithms can carry out “sprinkling” dissemination by extracting key information, liking and forwarding comments, etc., so as to continuously spread false information and false information to confuse public opinion and aggravate the public’s irrationality and dissatisfaction with information. Emotional responses, which in turn manipulate cognitive trends. Information dissemination is true and false, and the true and false are mixed. This state of mixed and interconstructed truth and falsehood can easily lead to a tear in group trust, making the situation of cognitive attack and defense more complicated and difficult to control.

Human-machine two-way interaction. Intelligent media not only continuously enriches the input and output methods of information, but also increasingly blurs the original clear boundary between people and media. It can not only simply execute user instructions, but also give more feedback according to the propagation effect. If things go on like this, the public may subtly regard it as an external “brain” and be influenced by it unconsciously. With the support of technology, intelligent media can also obtain human-like perception, computing, and even emotional intelligence. With the help of human-computer interaction, it can reversely affect the user’s way of thinking, and shape the user’s behavior orientation through algorithm recommendations. In the intelligent communication environment, people continue to “absorb” information and become the extension of the media, and the media gradually become “people with subjective initiative”. Both man and machine have achieved cyclic alternation and real-time interaction, making cognitive attack and defense present uninterrupted and normalized features.

The Mechanism of Intelligence Spreading in the Cognitive Domain

At present, intelligent communication has become an effective means to dominate information content and control the direction of public opinion. With the help of an all-round and multi-sensory media system, it can mobilize the immersive experience and subject consciousness of the target audience from the shallower to the deeper, thereby deepening their perception and broadening their horizons. Its scope of cognition and its influence on its value choices have gradually become an important way to infiltrate thoughts and implement mind-boggling.

Cognitive influence is exerted through situational immersion. According to psychological theory, the audience’s body and its interaction with the environment play a key role in cognitive activities. As an artificial sensory system outside the human body, media technology can change and even reshape the way of perception. Smart media can superimpose and merge or simulate complex information that cannot appear in the same time and space at the same time, so as to restore the original appearance of the information to the greatest extent, and provide the public with immersive sensory experiences such as vision, hearing, and touch. As a result, the communication effect is increasingly showing an immersive trend. Intelligent communication enables information to directly hit the sensory channels of the target audience in a more three-dimensional, time-space and shocking way, thus giving birth to the “sensory touch-psychological A series of chain reactions of “touch-emotional resonance” in order to realize the influence and control of its perception on the physiological level.

Influence cognitive orientation through virtual mapping. The development and popularization of smart devices have improved people’s “quantifiability” and “traceability”. Some of these devices exist in the external environment, but in the future they will increasingly form an inseparable relationship with the human body. Thanks to this, the behavior, activities, and physical status of the audience can be mapped in the virtual world in multiple dimensions. Once people can truly experience the process of cognition and its environment through the “virtual entity”, the relationship between the cognitive domain and the cognitive context will no longer be separated into two dimensions: virtual and real. In this process, as the audience, it is not only enhanced, that is, to obtain a new sensory experience, to realize the free extension of cognitive activities; but also constrained, that is, the individual who is digitally mapped is more likely to be observed and manipulated by others.

Using human-machine fusion to strengthen cognitive intervention. At present, social robots can shape a human-like communication object by capturing users’ emotional dynamics and analyzing information content and structure, and promote the main body of communication from “human” to “human-machine symbiosis”. Based on user identity and real-time interaction, social robots can affect the public’s thinking habits and behavior patterns to a certain extent, and have remarkable effects in spreading false information, manipulating public opinion, conducting social mobilization, and inciting public emotions. With the continuous improvement of technology, the image of social robots will be richer and more textured, and can even imitate human emotions. Some time ago, based on the generative AI ChatGPT, the data and information generated by it are easier to be trusted and accepted by users, and the impact on thinking and cognition is more direct and effective. It can change the user’s consciousness subtly and continuously construct The user’s cognitive framework.

The Means of Intellectual Diffusion in the Cognitive Domain

Intelligent communication can shape the relationship between users and information in all dimensions, time and space, making public opinion guidance, concept shaping, and behavior guidance more convenient. It has increasingly become a “brain control weapon” and gradually developed a set of cognitive manipulation practices. technique.

Create information fog and attack cognitive black holes. Under the environment of intelligent communication, deep fake information confuses the boundaries between existence and nothingness, reality and virtuality, memory and forgetting, and can be used to distort the truth, influence the flow of public opinion, and then achieve the purpose of influencing the direction of cognition and strengthening cognitive intervention. In particular, intelligent programs represented by social robots have the ability of automatic recognition, intelligent response and even brain-like thinking. Bombing forms high-intensity thinking and cognitive oppression. Once false opinions or falsified events form a public opinion environment, the individual reaction time will be greatly reduced, and it will be difficult for the audience to think deeply, and it is easy to be driven by the herd mentality, from disbelief to belief, from non-acceptance to acceptance, from The qualitative change from disapproval to identification creates a false collective identity and leads the target audience into the preset issue trap.

Implement targeted attacks and build a cognitive cocoon. In the era of informationization and intelligence, the public’s perception of things is potentially affected by all kinds of ubiquitous push information. The foreign army believes that by grasping the target’s online traces, shopping records, social status, etc., it can quickly collect cognitive data of different dimensions, levels, and modes, and provide support for efficiently grasping its values, public opinion positions, etc. On the basis of accurately drawing the cognitive landscape, it is possible to discover doubts, weaknesses, and needs of the target object’s cognitive system, and to set content themes, narrative methods, and discourse frameworks according to their thinking preferences. Then either select a group with a similar understanding context and the same emotional characteristics, or select a specific individual who is susceptible and has a greater influence value, and through selective recommendation and targeted filtering, differentiated and segmented delivery Related Information. With the help of targeted delivery of content and precise attacks on channels, it can carry out targeted attack and continuous influence on the target object, effectively solidify the scope of their information acceptance, continuously weaken their independent thinking ability, cause them to fall into a cognitive cocoon and mindset, and even forcibly change Its decision-making intention and action deployment.

Penetrate psychological fissures and break down emotional embankments. Different from the previous means of communication, intelligent communication can build an immersive virtual environment. While expanding the user’s sense of space and dimension, it also naturally comes with strong sensory stimulation and perceptual cognitive bias, which wears down the user’s rationality. Cognitive level and value judgment ability. When the audience perceives the truth of the event, they will be more subject to the influence of sensibility. If they want to leverage cognition, they need to rely more on sensibility. Either attract people with gorgeous landscapes, seduce people with entertaining scenes, or frighten people with scary scenes. With the help of tactile, sensible and interactive intelligent communication, it creates a very deceptive, confusing and provocative The information scene strongly stimulates the user’s psychological feelings, making them deeply immersed in it without knowing it. Once immersed in emotional infiltration and scene infiltration, you can use common emotions and common values ​​​​to incite emotions or impose moral coercion, destroy their emotional dependence, destroy their value support, and then shock, occupy, and even polarize the mind of the target object.

(Author unit: National Security College, National Defense University)

Source: http://www.mod.gov.cn/gfbw/jmsd/16217865.html

中國特色治網之道和網絡強國戰略思想

The Way of Internet Governance with Chinese Characteristics and the Strategic Thought of Network Power

網絡安全和信息化事關黨的長期執政,事關國家長治久安,事關經濟社會發展和人民群眾福祉。習近平同志站在我們黨“過不了互聯網這一關,就過不了長期執政這一關”的政治高度,準確把握信息化變革帶來的機遇和挑戰,明確提出要努力把我國建設成為網絡強國。中央黨史和文獻研究院編輯的《習近平關於網絡強國論述摘編》一書的第三部分,以“努力把我國建設成為網絡強國”為題,收入了習近平同志的相關論述。

縱觀世界文明史,人類先後經歷了農業革命、工業革命、信息革命。每一次產業技術革命,都給人類生產生活帶來巨大而深刻的影響。如今,以互聯網為代表的信息技術日新月異,引領了社會生產新變革,創造了人類生活新空間,拓展了國家治理新領域,極大提高了人類認識世界、改造世界的能力。互聯網讓世界變成了“雞犬之聲相聞”的地球村,相隔萬里的人們不再“老死不相往來”。世界因互聯網而更多彩,生活因互聯網而更豐富。

人類社會正在經歷偉大的信息革命,中國正處在信息化快速發展的歷史進程之中,信息革命時代潮流與中華民族偉大復興歷史進程發生了歷史性交匯,為我們全面建設社會主義現代化國家帶來新的機遇和挑戰。習近平同志指出,信息化為中華民族帶來了千載難逢的機遇。我們正逢其時,要順勢而為、乘勢而上、相向而行。

隨著網絡信息技術日新月異,全面融入社會生產生活,也深刻改變著全球經濟格局、利益格局、安全格局。世界主要國家都把互聯網作為經濟發展、技術創新的重點,把互聯網作為謀求競爭新優勢的戰略方向。能不能適應和引領互聯網發展,成為決定大國興衰的一個關鍵。誰掌握了互聯網,誰就把握住了時代主動權;誰輕視互聯網,誰就會被時代所拋棄。一定程度上可以說,得網絡者得天下。信息化為我國搶占新一輪發展制高點、構築國際競爭新優勢提供了有利契機。

中國高度重視互聯網發展,自接入國際互聯網以來,我們按照積極利用、科學發展、依法管理、確保安全的思路,加強信息基礎設施建設,發展網絡經濟,推進信息惠民。同時,我們依法開展網絡空間治理,網絡空間日漸清朗。儘管起步稍晚,但經過二十多年努力,迅速縮短了同發達國家的信息化差距,成為舉世矚目的網絡大國。同時也要看到,雖然我國網絡信息技術和網絡安全保障取得了不小成績,但同世界先進水平相比還有很大差距。我們在自主創新方面還相對落後,區域和城鄉差異比較明顯,國內互聯網發展瓶頸仍然較為突出。

黨的十八大以來,以習近平同志為核心的黨中央審時度勢、高瞻遠矚,順勢應時,吹響了向網絡強國進軍的號角。 2014年2月27日,在中央網絡安全和信息化領導小組第一次會議上,習近平同志提出,要從國際國內大勢出發,總體佈局,統籌各方,創新發展,努力把我國建設成為網絡強國。

建設網絡強國是黨中央從黨和國家事業發展全局出發作出的重大決策。黨的十八大以後,黨中央從進行具有許多新的歷史特點的偉大斗爭出發,重視互聯網、發展互聯網、治理互聯網,作出一系列重大決策、提出一系列重大舉措,推動網信事業取得了歷史性成就。

我們提出建設網絡強國戰略目標,網信工作頂層設計和總體架構基本確立,出台《關於加強網絡安全和信息化工作的意見》,基本理順互聯網管理領導體制機制,形成全國“一盤棋”工作格局;網絡意識形態安全得到切實維護,做大做強網上正面宣傳,在管網治網上出重拳、亮利劍,打贏網絡意識形態領域一系列重大斗爭,根本扭轉了過去網上亂象叢生、陣地淪陷、被動挨打的狀況,網絡空間正能量更加強勁、主旋律更加高昂;國家網絡安全屏障進一步鞏固,制定實施網絡安全法,加強網絡安全保障能力建設,關鍵信息基礎設施安全保護不斷強化,網絡違法犯罪活動得到有效遏制,全社會網絡安全意識和防護能力明顯增強;網信軍民融合取得階段性成效,網絡安全威懾反制能力不斷增強;注重發揮信息化對經濟社會發展的驅動引領作用,“互聯網+”行動計劃深入實施,數字經濟、共享經濟蓬勃發展;信息領域核心技術創新取得積極進展,新一代移動通信(5G)、高性能計算、量子通信等技術研究實現突破,一批網信企業躋身世界前列;網絡空間國際話語權和影響力顯著提升,高舉網絡主權大旗,推動構建網絡空間命運共同體,積極參與全球互聯網治理進程,創設並成功舉辦世界互聯網大會,中國理念、中國主張、中國方案贏得越來越多認同和支持;加快網絡基礎設施建設和信息化服務普及,網上交易、手機支付、共享出行等新技術新應用廣泛普及,電子政務加速發展,網絡扶貧紮實推進,社會治理和基本公共服務水平持續提升,人民群眾有了更多獲得感、幸福感、安全感。這些歷史性成就的取得,充分證明黨中央關於加強黨對網信工作集中統一領導的決策和對網信工作作出的一系列戰略部署是完全正確的。

新時代呼喚新思想,新實踐孕育新理論。在努力建設網絡強國的進程中,我們不斷推進理論創新和實踐創新,不僅走出一條中國特色治網之道,而且提出一系列新思想新觀點新論斷,形成了網絡強國戰略思想。概括起來,主要有以下幾個方面。

第一,明確網信工作在黨和國家事業全局中的重要地位。我們提出,沒有網絡安全就沒有國家安全,沒有信息化就沒有現代化,網絡安全和信息化事關黨的長期執政,事關國家長治久安,事關經濟社會發展和人民群眾福祉,過不了互聯網這一關,就過不了長期執政這一關,要把網信工作擺在黨和國家事業全局中來謀劃,切實加強黨的集中統一領導。

Network security and informatization are related to the long-term governance of the party, the long-term stability of the country, economic and social development and the well-being of the people. Comrade Xi Jinping stood at the political height of our party “If you can’t pass the hurdle of the Internet, you can’t pass the hurdle of long-term governance”, accurately grasped the opportunities and challenges brought about by the informatization revolution, and clearly stated that we should strive to build our country into a cyber power. The third part of the book “Excerpts of Xi Jinping’s Discussions on Internet Power” edited by the Central Academy of Party History and Documentation is titled “Strive to Build my country into a Cyber ​​Power” and includes relevant expositions by Comrade Xi Jinping.

Looking at the history of world civilizations, humanity has successively undergone agricultural revolution, industrial revolution and information revolution. Every revolution in industrial technology has had a huge and profound impact on human production and life. Today, information technology represented by the Internet is changing with each passing day, leading new changes in social production, creating a new space for human life, expanding new areas of national governance, and greatly improving human ability to understand and transform the world. The Internet has turned the world into a global village where “the voices of chickens and dogs hear each other”, and people separated by thousands of miles no longer “do not communicate with each other”. The world is more colorful because of the Internet, and life is richer because of the Internet.

Human society is undergoing a great information revolution, and China is in the historical process of rapid development of informatization. The trend of the era of information revolution and the historical process of the great rejuvenation of the Chinese nation have had a historic intersection, which has brought great benefits to us in building a modern socialist country in an all-round way. New opportunities and challenges. Comrade Xi Jinping pointed out that informatization has brought golden opportunities to the Chinese nation. We are at the right time, and we must follow the trend, ride on the trend, and meet each other halfway.

With the rapid development of network information technology and its comprehensive integration into social production and life, it has also profoundly changed the global economic pattern, interest pattern, and security pattern. Major countries in the world regard the Internet as the focus of economic development and technological innovation, and regard the Internet as a strategic direction for seeking new competitive advantages. Whether it can adapt to and lead the development of the Internet has become a key to determining the rise and fall of a big country. Whoever controls the Internet will grasp the initiative of the times; whoever despises the Internet will be abandoned by the times. To a certain extent, it can be said that those who win the Internet win the world. Informatization provides a favorable opportunity for my country to seize the commanding heights of a new round of development and build new advantages in international competition.

China attaches great importance to the development of the Internet. Since its access to the international Internet, we have strengthened the construction of information infrastructure, developed the network economy, and promoted information to benefit the people in accordance with the ideas of active utilization, scientific development, law-based management, and security assurance. At the same time, we have carried out cyberspace governance in accordance with the law, and cyberspace has become increasingly clear. Although it started relatively late, after more than 20 years of hard work, it quickly narrowed the informatization gap with developed countries and became a network powerhouse that has attracted worldwide attention. At the same time, we must also see that although my country’s network information technology and network security have made great achievements, there is still a big gap compared with the world’s advanced level. We are still relatively backward in terms of independent innovation, the differences between regions and urban and rural areas are relatively obvious, and the bottleneck of domestic Internet development is still relatively prominent.

Since the 18th National Congress of the Communist Party of China, the Party Central Committee with Comrade Xi Jinping at its core has judged the situation, looked far ahead, followed the trend, and sounded the clarion call to march towards a cyber power. On February 27, 2014, at the first meeting of the Central Network Security and Informatization Leading Group, Comrade Xi Jinping proposed that we should proceed from the international and domestic trends, make an overall layout, coordinate all parties, innovate and develop, and strive to build my country into a cyber power .

Building a cyber power is a major decision made by the Party Central Committee based on the overall development of the Party and the country. After the 18th National Congress of the Communist Party of China, the Party Central Committee proceeded from the great struggle with many new historical characteristics, attached importance to the Internet, developed the Internet, and governed the Internet. sexual achievement.

We put forward the strategic goal of building a strong network country, basically established the top-level design and overall structure of network information work, issued the “Opinions on Strengthening Network Security and Informatization Work”, basically straightened out the Internet management leadership system and mechanism, and formed a national “one game of chess” work pattern; The security of Internet ideology has been effectively safeguarded, positive online propaganda has been made bigger and stronger, and heavy blows and sharp swords have been used to manage and control the Internet. A series of major struggles in the field of Internet ideology have been won, which has fundamentally reversed the past. In the situation of being occupied and passively beaten, the positive energy of cyberspace is stronger and the main theme is more high-spirited; the national network security barrier is further consolidated, the network security law is formulated and implemented, the construction of network security guarantee capabilities is strengthened, and the security protection of key information infrastructure is continuously strengthened. Activities have been effectively curbed, and the awareness of network security and protection capabilities of the whole society have been significantly enhanced; the military-civilian integration of network information has achieved phased results, and the network security deterrence and countermeasure capabilities have been continuously enhanced; attention has been paid to the driving and leading role of informatization in economic and social development, “Internet + “The action plan has been implemented in depth, the digital economy and the sharing economy have flourished; positive progress has been made in core technology innovation in the information field, breakthroughs have been made in the research of new-generation mobile communication (5G), high-performance computing, quantum communication and other technologies, and a number of network information enterprises have entered the world In the forefront; the international discourse power and influence of cyberspace have been significantly improved, holding high the banner of cyber sovereignty, promoting the construction of a community of shared future in cyberspace, actively participating in the process of global Internet governance, creating and successfully hosting the World Internet Conference, and winning More and more recognition and support; speed up the construction of network infrastructure and the popularization of information services, the widespread popularization of new technologies and new applications such as online transactions, mobile payment, and shared travel; the accelerated development of e-government affairs; The service level continues to improve, and the people have a greater sense of gain, happiness, and security. The achievement of these historic achievements fully proves that the Party Central Committee’s decision on strengthening the party’s centralized and unified leadership over cybersecurity and informatization work and a series of strategic deployments for cybersecurity and informatization work are completely correct.

The new era calls for new ideas, and new practices breed new theories. In the process of striving to build a strong network country, we have continuously promoted theoretical innovation and practical innovation, not only blazing a way to govern the network with Chinese characteristics, but also put forward a series of new ideas, new viewpoints and new conclusions, forming the strategic thinking of a strong network country. To sum up, there are mainly the following aspects.

First, clarify the important position of cybersecurity and informatization work in the overall situation of the party and the country. We propose that there will be no national security without network security, and no modernization without informatization. If we do not pass the hurdle of being in power for a long time, we must place cybersecurity and informatization work in the overall planning of the party and the country, and earnestly strengthen the party’s centralized and unified leadership.

Second, clarify the strategic goal of building a cyber power. We propose that we must accelerate the construction of a cyber power from the height of realizing the “two centenary” goals and the Chinese dream of the great rejuvenation of the Chinese nation. In accordance with the requirements of strong technology, strong content, strong foundation, strong talents, and strong international discourse power, we must move towards the basic popularization of network infrastructure, significant enhancement of independent innovation capabilities, comprehensive development of the digital economy, strong network security guarantees, and balanced network offensive and defensive capabilities. Keep moving forward, and finally achieve the goal of advanced technology, developed industry, both offensive and defensive capabilities, full control of network control, and indestructible network security.

Third, clarify the principles and requirements for building a cyber power. We propose that we must adhere to the principles of innovative development, governing by law, ensuring security, promoting benefits and eliminating disadvantages, and benefiting the people, adhere to innovation-driven development, cultivate new kinetic energy with informatization, and use new kinetic energy to promote new development; adhere to the rule of law, so that the Internet will always be under the rule of law. We will continue to operate healthily on track; adhere to the correct concept of network security, and build a national network security barrier; adhere to the principle of equal emphasis on preventing risks and promoting healthy development, and grasp opportunities and challenges, so that the Internet can better benefit the society; The people have a greater sense of gain in sharing the fruits of Internet development.

Fourth, clarify the international propositions for Internet development and governance. We propose to adhere to the four principles of global Internet governance: respecting Internet sovereignty, maintaining peace and security, promoting openness and cooperation, and building a good order. The five-point proposal for building a community of shared future in cyberspace, such as ensuring network security and building an Internet governance system, emphasizes joint advancement of development, joint maintenance of security, joint participation in governance, and joint sharing of achievements, and jointly build a peaceful, secure, open, and cooperative cyberspace.

Fifth, clarify the basic methods for doing a good job in cybersecurity and informatization work. We realize that cybersecurity and informatization work involves many fields, and it is necessary to strengthen overall planning and coordination, implement comprehensive management, and form a strong work force. It is necessary to grasp the dialectical relationship between security and development, freedom and order, openness and autonomy, management and service, and comprehensively promote various tasks such as network content construction, network security, informatization, and international governance of cyberspace.

General Secretary Xi Jinping’s important thoughts on the network power, adhere to the Marxist position, viewpoint and method, based on the new era background of human beings entering the information society, systematically summed up our party’s practical experience in network management and network governance, and profoundly answered why we should build a network power and how to build a network power. A series of major theoretical and practical issues such as building a powerful network country, with a high-level view, overall control, profound thinking, and rich connotations, have become the guide to action leading the development of my country’s Internet information industry, and are the fundamental principles for doing a good job in Internet information work. Continuously enrich and develop.

Focusing on the overall development of human society, Comrade Xi Jinping creatively put forward the concept of making the Internet better benefit the world and the people of all countries, and building a community with a shared future in cyberspace. He proposed a Chinese plan for global Internet development and governance, and contributed Chinese wisdom. The mind of a responsible big country and Comrade Xi Jinping’s broad mind of the leader of a big country to seek peace and development for the world and civilization and progress for mankind.

We must combine in-depth study of Comrade Xi Jinping’s important expositions on building a strong network country, strengthen the “four consciousnesses”, strengthen the “four self-confidence”, and achieve “two safeguards”, constantly explore new paths for building a strong network country, and open up a new realm of global network governance , Let the Internet become a powerful boost to realize the Chinese dream of the great rejuvenation of the Chinese nation.

(Author: Xu Shan, Director of the Second Division of the First Research Department of the Central Academy of Party History and Documentation, Deputy Editor)

普通話來源:http://www.cac.gov.cn/2021-03/08/c_161677810000.htm

China’s New Military Strategy : An Analysis from Asia Cyber Warfare is a Force Multiplier // 中國的新軍事戰略:亞洲網絡戰的分析是力量倍增器

China’s New Military Strategy : An Analysis from Asia Cyber Warfare is a Force Multiplier //

中國的新軍事戰略:亞洲網絡戰的分析是力量倍增器

Author ; HongAn

View photo

The theory of war can last for a long time because the book is based on the two pillars of “research and observation” and “philosophy and experience”. They complement each other and make war theory in philosophical dialectic, logic, and theoretical reality and effectiveness. More contemporary. The primitive violence, political nature, and the interaction between the government, the people, and the military in the observation of the nature of the Krupp War are mainly oriented to examine China’s national defense strategy and its political influence and planning in the modern war.

Since Tsai Ing-wen came to power, he requested the Ministry of National Defense to propose the adjustment of the military strategy in the emergence stage. The author believes that it must be formulated from the overall thinking of the national security strategy. The preparations for the establishment of the national army are based on the “10-year military conception” as the basis for the reconstruction of the military. The author has led the plan to report on the national defense strategy (imaginary) of the Republic of China from 1995 to 104. At present, in the face of the development of the CCP’s military aircraft carrier and the military aircraft flying over the central line of the strait, the balance of power between the two sides of the strait has been broken. How to adjust the new military strategic view, facing the threat of war in a new situation, the strategic concept should also be adjusted.

20161231 - China's "Liaoning" aircraft carrier broke through the first island chain in the Pacific Ocean and conducted cross-sea area training missions. The Chinese Navy released photos on the official Weibo.  The picture shows the Liaoning and five destroyers.  (taken from the Chinese Navy to publish Weibo)

View photo

20161231 – China’s “Liaoning” aircraft carrier broke through the first island chain in the Pacific Ocean and conducted cross-sea area training missions. The Chinese Navy released photos on the official Weibo. The picture shows the Liaoning and five destroyers. (taken from the Chinese Navy to publish Weibo)

The author believes that the current development of the CCP’s military aircraft carrier and the military aircraft flying over the central line of the strait have broken the balance of power between the two sides of the strait, how to adjust the new military strategic view, face the threat of war in a new situation, and the strategic concept should also be adjusted. . The picture shows the Chinese “Liaoning” aircraft carrier. (taken from the Chinese Navy to publish Weibo)

Deterrence strategy for the purpose of war prevention

Defending and defending is a war act, and effective deterrence is the prevention of war behavior. In the case of the Taiwan defensive warfare, “deterring” the enemy’s military operations “war”, “prevention” means preventing the use of force by the enemy. If the defeat is defeated, the war will erupt. The use of military force in the deterrent strategy is to prevent the enemy from using military force. Therefore, the deterrent theory is skillful nonuse of military forces, so deterrence must go beyond military skills. It is “stunned”. The purpose of deterrence is not to destroy the enemy when the enemy invades, but to make the enemy realize that if he really takes action, he will be eliminated.

As far as China’s new military strategic changes are concerned, Taiwan’s defense operations are of a defensive nature. As far as the defense strategy is concerned, there are only two options: defense and active defense; as far as tactical level considerations are concerned, it is just like defensive operations, only position defense and mobile defense, or both.

The People’s Liberation Army’s force development and strategic deterrence

The Chinese People’s Liberation Army’s development of force has emphasized the “joint overall war.” It is familiar with the internal forces of the Communists and the people on the two sides of the strait. They are constantly launching strategic deterrence against the CCP. To some extent, the CCP has made military, economic, diplomatic, and political organizations. Comprehensive integration. The CCP’s overall national defense transformation has surpassed the scope of military strategy. It not only combines the strategic thinking of “winning local wars under the conditions of information” and “active defense”, but also enhances the “combined operations of the arms and services” and promotes the “harmonious world”. The diplomatic strategy of the “new security concept” continues to use the “three wars” and “anti-secession laws” to integrate into a new “joint overall warfare” strategy.

The People’s Liberation Army Navy’s South Navy, the missile destroyer “Hefei Ship” officers and men looking for targets (AP)

View photo

The People’s Liberation Army Navy’s South Navy, the missile destroyer “Hefei Ship” officers and men looking for targets (AP)

The CCP’s overall national defense transformation has surpassed the scope of military strategy. It not only combines the strategic thinking of “winning partial wars under information conditions” and “active defense”, but also enhances the ability of “combined operations of arms and services.” The picture shows the naval naval performance of the PLA Navy. (Information, Associated Press)

On November 25th and December 11th, 2016, the Communists twice rounded Taiwan for half a month. On December 11th, the mainland warplanes moved more than 10 fighters across the Miyako Strait and also bypassed the eastern Taiwanese waters! The People’s Liberation Army Air Force fighters flew out of the “first island chain” while crossing the bus strait and the Miyako Strait. After the CCP’s military aircraft detoured to Taiwan, the CCP’s Liaoning aircraft carrier formation also appeared in the outer seas of my east. According to the recent development of the situation, the CCP has been moving frequently, and the political meaning is greater than the military meaning. Especially after the call of Chuan Cai on December 2, 2016, Trump challenged Beijing’s “one China” policy. Of course, Beijing will not show weakness on core interests. Sending military aircraft to bypass Taiwan and dispatching aircraft carriers through the eastern waters of Taiwan is aimed at announcing that the Taiwan issue is a matter of internal affairs to the United States. It also declares that its armed forces can extinguish the Taiwan independence forces themselves, and never It will repeat the events of 1996.

In addition, the Chinese People’s Liberation Army’s iron boxing force can be said to be the rapid response force established by the People’s Liberation Army in response to the 21st century. The iron boxing force basically includes the People’s Liberation Army’s air force airborne 15th Army, the Military Commission, or the rapid reaction force directly under the military region. The special military battalion directly under the military region and the Chinese Marine Corps have four major fists. According to sources, the General Staff of the People’s Liberation Army, which was established in early 2016 and completed a large division of theaters, held a cross-strait military affairs report, confirming that Chinese national leader Xi Jinping has formally signed important instructions. This is internally called “No. 41″. The military order has authorized the PLA General Staff to add and complete the 16th Airborne Airborne Forces by the end of 2018. It has two fast airborne divisions, the 69th Division Airborne and the 71st Airborne Division. The newly established Airborne Sixteenth Army will assemble elite field divisions from the Nanjing Military Region and the Jinan Military Region, and will be equipped and trained to become part of the Air Force. It will be equipped with special military and missile units to become a professional force”.

In 2017, China's "two sessions" (National People's Congress, Political Consultative Conference) debuted in Beijing, the 5th meeting of the 12th National People's Congress, the People's Liberation Army Representative (AP)

View photo

In 2017, China’s “two sessions” (National People’s Congress, Political Consultative Conference) debuted in Beijing, the 5th meeting of the 12th National People’s Congress, the People’s Liberation Army Representative (AP)

The military commander inside the People’s Liberation Army called “Order No. 41” has authorized the PLA General Staff to add and complete the 16th Airborne Air Force before the end of 2018 and become a “professional force” against Taiwan. The picture shows the representatives of the People’s Congress and the People’s Liberation Army of the Political Consultative Conference. (Information, Associated Press)

If combined with the rapid reaction force that has been completed, that is, the Airborne 15th Army, it is based on the 3rd Airborne Infantry Divisions of the 43rd Division, 44th Division, and 45th Division, and is independent of the Air Force’s 13th Airlift and the 13th Airborne. The regiment has more than 90 large and small transport aircraft, as well as some independent helicopter regiments (Brigades) belonging to the Army Aviation. Together, they can maintain a 60% combat capability and are ready to go on-board to “can fly at any time, and can drop and drop at any time.” Hit the “iron bones” of the attack mission. The General Staff of the People’s Liberation Army has officially issued a formation order. This is also a major role played by the US military in the US-Iraq war, the powerful projection force of the US military and the visual field-distance force, which led to the reform of the traditional forces. It is also impossible for the CCP to surrender to the United States forever. At least, in the East Asian region, it is hoped that it will be equal to the United States and jointly handle the status of Asia-Pacific affairs.

How can a failing strategy and a hundred percent of combat power be played!

Definition of strategic concept: After the judgment of the strategic situation, the action plan adopted should generally consider five major factors: namely, purpose, strength, time, place and means. The so-called military strategy is built under the national (security) strategy and must follow and support the national defense policy. Military strategy is not only a rationale for thinking, but also a strategic concept. It also covers the overall consideration of force design and force building. In other words, military objectives and strategic ideas are the guidance of force planning (construction), and force building is a concrete practice, and the military design combines the above two parties into a complete strategic thinking.

The military strategic adjustment of China’s various stages is a transformation from the past offensive strategy, offensive and defensive integration, defense defense or offensive defensive strategy. The process is closely related to the US global strategy, the Asia-Pacific situation and cross-strait relations. Its purpose is to ensure Taiwan’s security and maintain national sovereignty and territorial integrity. At this stage, the author believes that “preventing war, maintaining the status quo, and safeguarding homeland security.” The Department also focused on the interception of the “defense and defense, deep suppression” to effectively curb the enemy.

Table I

View photo

Table I

Table I

Multi-task goal is means, heavy layer interception force is joint operation deployment

Purpose and means can not cooperate (multiple deterrence is passive defense, heavy deterrence is active defense)?

According to the “multiple deterrence” that the Secretary of Defense, Mr. Feng Shikuan, has recently proposed, the difference between the “repeated resistance” and the “definitely deterrent” is that the “multiple deterrence” tends to be passive defense, that is, the defense operation limited to Taiwan’s main island; It is an active defense. It is based on the island and pushes the defense network layer by layer. The two have passive and active differences. As far as the author has been engaged in strategic teaching experience for many years, there is no passive or active distinction between the so-called “multiple deterrence” and “repeated resistance”.

20170302 Legislative Yuan. Minister of National Defense Feng Shikuan attended the report of the Foreign Affairs and Defense Commission and answered questions (photo by Chen Mingren)

View photo

20170302 Legislative Yuan. Minister of National Defense Feng Shikuan attended the report of the Foreign Affairs and Defense Commission and answered questions (photo by Chen Mingren)

The difference between the “multiple deterrence” proposed by the Secretary of Defense Feng Shikuan and the “repeated resistance” of the final case is that “multiple deterrence” tends to passive defense. (Photo, photo by Chen Mingren)

The author believes that the reason why China has adjusted “defense and obstruction” to “effectively deterring, defending and defending” should be “effectively deterring, defending and defending”, that is, the spirit of offensive and defensive. The choice of multi-task targets is only a means, and the interception of multi-tasking is a joint strategy deployment. The strategic concept of failing to cooperate with the purpose and means is a strategy that fails. It is no longer a defensive, it is a layer. Eliminate, so there is no focus on the war of war, how much money we can play.

Has Taiwan been deterred and prepared? If the CCP attacks the national army will not be defensive again!

When the Defense Minister Feng Shikuan made a reply in the Legislative Yuan, he pointed out that the military strategy of the National Army will be adjusted to “repeated the obstacles” because the weapons developed now are more advanced than before. “Some missiles have developed well”, which can make Taiwan better. Defensive forces; if the CCP launches an attack against Taiwan, the national army will no longer be a defensive, and the “respective deterrence” will begin to turn into “active defense.” At the same time, the national army has multiple, multi-party, multi-capacity capabilities. Through the enemy’s half-crossing, beach battle, and position defense, the sea and air forces could not successfully reach the purpose of landing on the island of Taiwan (quoted from Wu Mingjie, March 13, 2017, Feng Media).

In reply to the question of the Democratic Progressive Party legislator Liu Shifang, he said that if the missile command headquarters moved to the Air Force, it would meet the requirements of the deterrent strategy. The four stages of the Flying Finger Division belonged to different units, and the combat strength continued to increase. Command unity and unity of affairs can be time-honored in the first place. The Air Force Operations Command has this power. And Feng Shikuan said that “some missiles have developed well” and “not a layer of defense, it is a layer of elimination, rejection”, which refers to the deployment and mass production of the male E E cruise missile, Wan Jian bomb, Xiong San missile and patriotic The missiles, such as missiles, intercepted and annihilated the missiles, warplanes, and warships that had come to the enemy, and then began to conduct defensive operations after the troops were projected onto Taiwan’s main island.

Table II

View photo

Table II

Table II

Constructing a multi-layer interception joint warfare missile defense capability is the focus

The National Army’s self-developed warplanes, Tianjian-1 and II missiles, and Tiangong’s first, second and third missiles have all been deployed or mass-produced, and preparatory energy and position deployment work has been prepared. Secondly, the R&D plan of high-resolution radar, electronic warfare equipment, multi-barrel rockets and other weapon systems will be carried out to effectively improve the overall combat strength of the national army. How to improve the defense warfare early warning capability, radar performance and coverage, and strengthen the development and deployment of radar signal processing, electronic defense technology, and mobile radar. We will continue to establish an early warning control mechanism and information link construction, integrate the three-armed referral system, and accurately control the relationship between the military and the various stations.

20160811 - Hualien Air Force Base was opened to local residents and the media on the 11th. The picture shows the IDF through the national warplane.  (photo by Yan Linyu)

View photo

20160811 – Hualien Air Force Base was opened to local residents and the media on the 11th. The picture shows the IDF through the national warplane. (photo by Yan Linyu)

The National Army’s self-developed warplanes have been deployed or entered into mass production, and preparatory energy and position deployment work has been prepared. (Photo, photo by Yan Linyu)

The author believes that the missile defense capability is the key to the joint strategic deployment of constructing heavy-layer interception, especially the ability to recover from war damage is the key to the battle; the CCP’s flight vehicles (missile, patrol missiles and unmanned vehicles, etc.) have a precise impact, and their After the first strike, the national army’s war damage and resilience were the key factors affecting my combat schedule and the CCP’s follow-up battle plan. The national army should consider the ability of independent control after the destruction of the management system and strengthen the ability of attracting, electric warfare and defensive counter-measures; only effective source anti-production warfare can reduce the enemy’s attack firepower.

The concept of “fighting how to fight” – “defense, deep defense”

What kind of war the National Army wants to fight, the National Defense Construction Army wants to build a plan based on “playing, loading, editing, and training,” and secondly, it is a comprehensive national strength to build a deterrent. The strategic concept of “defending and defending” is based on the policy guidance of “training for war, unity of war and training”, and planning the “national military annual major training flow path” for the concept of “how to fight”. The military exercises are divided into four categories: “combat, mobilization, nuclearization, and training.” In order to strengthen the ability of “outside islands and ship joints to attack targets at sea” and “three-armed joint air defense training”, the number of training should be increased to enhance The combined military training capability of the three armed forces.

As a national security indicator, comprehensive national strength has two meanings. Internally, national defense construction needs to be balanced with economic development. Externally, understanding what the enemy cares most is helpful for the formation of the “deep deterrence” program. The “deep deterrence method” can be interpreted as: “The emphasis is on an unbearable revenge for the enemy, rather than the ability to emphasize actual combat and win the war.” For example, in the “Exceeding the Limits”, the war mark is no longer limited to military It is a new trend of war type and military thinking.

According to Wu Mingjie, the wind media, from the perspective of the distance, the future defense circle of the National Army usually includes the island, the east line of the Taiwan Strait, and the ADIZ air defense identification zone. However, during the war, it will be extrapolated to the coastal air and sea bases on the mainland, and even more. Inland missile bases and combat command centers, and the eastern defense range will be extrapolated to areas outside ADIZ. In addition, after the establishment of the fourth service in the future, there is no distance limit for network information warfare. These are the future threats of the national army. The scope of defense. (Wu Mingjie, March 13, 2017, Wind Media). However, this study proposes that “depth suppression” is the distance between non-linear lines. The so-called deep combat, in short, includes the depth of the three-dimensional space warfare. As the PLA calls “land, sea, air, sky, electricity”, the “National Army Defense Operations Guide” edited by the author has divided the defense operations into five. Space, namely space, air, ground, water, underwater combat guidance. At present, what we lack most is the search for space and underwater power. It must rely on international cooperation and exchange of interests.

20170118-The second day of the National Army's Spring Festival to strengthen the war preparations tour, came to the naval left camp base.  The picture shows the Navy's classmate seal submarine on display.  (photo by Su Zhongying)

View photo

20170118-The second day of the National Army’s Spring Festival to strengthen the war preparations tour, came to the naval left camp base. The picture shows the Navy’s classmate seal submarine on display. (photo by Su Zhongying)

The future defense circle of the National Army usually includes the island and the east line of the Taiwan Strait and the ADIZ air defense identification zone. However, during the war, it will be extrapolated to the coastal air and sea bases on the mainland, and even more inland missile bases and operational command centers. The eastern defense range will also be extrapolated to areas outside the ADIZ. The picture shows the Navy’s classmate seal submarine. (Photo, photo by Su Zhongzhen)

Integration of forces in a network-centric overall operation

The idea of ​​joint military operations of the three armed forces of the Chinese army has gradually entered the hearts of the people and adapted to the development of high-tech warfare with the main form of joint operations of the three armed forces. In the construction of military power, it will avoid Taiwan’s C4ISR capability to enter the arms race with the CCP and establish a parasitic and symbiotic relationship, and participate extensively in multinational military R&D and cooperation. Pursuing a reasonable defense space in national defense security, the force is integrated into a network-centric overall operation. In short: “To turn your own army into a company, and to pull the enemy from the mountains and waters into my vision.” Therefore, in light of the above viewpoints, the author suggests that the current military strategy should be better. The better strategic concept is to “defend and defend, deepen the deterrence”, and adhere to the policy of “preventing war”, “maintaining the status quo”, and “defending homeland security”. The combination of strategic and strategic deployment, combined with multi-layer defense guidance, combined with the national defense mobilization force, strive for “strategic lasting” time, create opportunities, destroy enemy and ensure national security.

Conclusion: National security is the common responsibility of all people

In fact, the author observes the 12 national defense blueprints published before the Democratic Progressive Party elections, and the new government-driven national defense policies, such as research and development of military strategy, national shipbuilding, national machine building, improved military recruitment, weekend warriors, and military uniforms. Can not be too demanding, the new government’s national defense policy concept, in the blue book can find clues. In the face of the CCP’s asymmetric military development, and gradually locking into the “safety dilemma” dilemma, it is necessary to maintain a calm observation and thinking plan, the most favorable security strategy for survival and development, national defense policy, and military preparation. I can’t have the mind of being big and small, then I should play the depth of being small and wise.

The state-made T75-20 cannon was drilled on the "Ilan Ship" of the Sea Guard.  (photo by Yan Linyu)

View photo

The state-made T75-20 cannon was drilled on the “Ilan Ship” of the Sea Guard. (photo by Yan Linyu)

The defense policy promoted by the new government, such as the national shipbuilding and other national propaganda, the new government’s national defense policy concept can be found in the blue book. The picture shows the state-built T75-20 cannon exercise on the “Ilan Ship” of the Sea Guard. (Photo, photo by Yan Linyu)

Defence is too negative, and lack of nuclear weapons is effective in deterring and incapable. There is no cheap national defense in the world, and national security is the common responsibility of the whole people. There is no distinction between political parties and blue and green. The key issue in the preparation of the army is the cultivation of talents. As for the new government’s annuity reform plan, there are no reasons for the military to be included in the reform, and the difficulties in the recruitment system are even more difficult. How can Taiwan implement the reforms under the quality of grassroots personnel and the lack of cadres? Deterring the fighting power.

Original Mandarin Chinese:

檢視相片

戰爭論所以能歷久彌新,是因該著作是建立「研究與觀察」、「哲學與經驗」兩個支柱上相輔相成、互為保證,使戰爭論在哲學辯證、邏輯、及理論現實和有效性更具時代性。將克氏戰爭本質觀察中的原始暴力、政治性、以及政府、人民、軍隊間三位一體相互作用等面向為主,來檢視我國國防戰略其於現代戰爭中政治、戰略發展時代性影響與規劃。

自蔡英文上台後即要求國防部提出現階段的建軍戰略調整,筆者認為必須從國家安全戰略整體思維來擬定。國軍建軍備戰是以「十年建軍構想」作為兵力整建之基礎。筆者曾主導規劃提報民國95年至104年之國防建軍戰略(假想)構想。當前面對中共軍力航母之發展及軍機飛越海峽中線,已經打破兩岸之間戰力平衡,如何調整新軍事戰略觀,面對一場新情勢的戰爭威脅,戰略構想也應有所調整。

20161231-中國「遼寧號」航母突破太平洋第一島鏈,進行跨海區訓練任務,中國海軍在官方微博發布照片。圖為遼寧號與5艘驅逐艦。(取自中國海軍發布微博)

檢視相片

20161231-中國「遼寧號」航母突破太平洋第一島鏈,進行跨海區訓練任務,中國海軍在官方微博發布照片。圖為遼寧號與5艘驅逐艦。(取自中國海軍發布微博)

作者認為,當前面對中共軍力航母之發展及軍機飛越海峽中線,已經打破兩岸之間戰力平衡,如何調整新軍事戰略觀,面對一場新情勢的戰爭威脅,戰略構想也應有所調整。圖為中國「遼寧號」航母。(取自中國海軍發布微博)

嚇阻戰略以預防戰爭( war prevention )為目的

防衛固守是戰爭行為,有效嚇阻是戰爭行為的預防。就台澎防衛作戰言,「嚇阻」敵國軍事行動「戰爭」,「預防」即在防止敵國使用武力的行為,若嚇阻失敗,戰爭便爆發。嚇阻戰略中軍事武力的運用,就是阻止敵人使用軍事武力。因此嚇阻理論,就是技巧性的不使用軍事武力(skillful nonuse of military forces),因此嚇阻必須超越了軍事上的技巧。就被「嚇阻」,嚇阻的目的並非是在敵人入侵時消滅敵人,而是使敵人確實認知到假如他真的採取行動,則一定會被消滅掉。

就我國新軍事戰略變革而言,台澎防衛作戰屬守勢作戰性質。就國防戰略層面考量,只有防衛固守與積極防衛兩種選則;就戰術層級考量,正如同防禦作戰,只有陣地防禦與機動防禦,或兩者交相運用。

人民解放軍武力發展及戰略威懾

中共人民解放軍武力發展,強調「聯合總體戰」,據熟悉共軍內部部分人士對兩岸情勢憂心,對於中共不斷發動戰略威懾;某種程度上,中共已將軍事、經濟、外交與政治組織間做全面性整合。中共整體的國防轉型,已超脫軍事戰略範疇,不僅結合「打贏信息條件下的局部戰爭」與「主動防禦」的戰略思維,並提升「軍兵種一體化聯合作戰」能力,全面推動「和諧世界」、「新安全觀」的外交策略,持續運用「三戰」、「反分裂國家法」等作為,整合成為全新的「聯合總體戰」策略。

中國人民解放軍海軍南海軍演,飛彈驅逐艦「合肥艦」官兵尋找目標(美聯社)

檢視相片

中國人民解放軍海軍南海軍演,飛彈驅逐艦「合肥艦」官兵尋找目標(美聯社)

中共整體的國防轉型,已超脫軍事戰略範疇,不僅結合「打贏信息條件下的局部戰爭」與「主動防禦」的戰略思維,並提升「軍兵種一體化聯合作戰」能力。圖為解放軍海軍南海軍演。(資料照,美聯社)

2016年11月25日及12月11日,共軍半個月來二度繞行台灣,大陸戰機隊12月11日出動10多架戰機穿越宮古海峽,還繞行了台灣東部海域!解放軍空軍戰機,飛出「第一島鏈」,同時穿越巴士海峽與宮古海峽。繼中共軍機繞行台灣後,中共遼寧號航母編隊也出現在我東部外海,我國防安全已經出現警訊。根據近來的情勢發展,中共動作頻頻,政治意涵大於軍事意涵。特別是在2016年12月2日川蔡通話後,川普放話挑戰北京的「一個中國」政策。北京當然不會在核心利益議題上示弱,派軍機繞行台灣與派遣航母經過台灣東部海域,目的在向美國宣示台灣問題是其內政問題,同時也宣告其武力已經可以自行撲滅台獨勢力,絕不會讓1996年的事件重演。

此外,中國人民解放軍鐵拳部隊,可說是解放軍為因應21世紀所建立的快速應變武力,鐵拳部隊,基本上包括了中國人民解放軍的空軍空降第15軍、軍委會或軍區直屬的快速反應部隊、軍區直屬之特戰兵營、中共海軍陸戰隊等共四大拳頭。另據消息人士透露,於2016年初成立並完成大幅度戰區劃分的解放軍總參謀部,於召開兩岸軍事情勢會報,證實中國國家領導人習近平已正式簽署重要指示,這個被內部稱為「第41號令」的軍令,已授權解放軍總參謀部需在2018年底前,增編完成編組空降第16軍,下轄2個快速空降師,分別為空降第69師與空降第71師。新成立的空降十六軍,將會從南京軍區和濟南軍區中抽調精銳野戰師組建,並進行裝備和訓練,成為空軍的一部分,將配屬專用軍機和導彈部隊,成為對台作戰的「專業部隊」。

2017年中國「兩會」(全國人民代表大會、政治協商會議)在北京登場,全國人大第12屆第5次會議,解放軍代表(AP)

檢視相片

2017年中國「兩會」(全國人民代表大會、政治協商會議)在北京登場,全國人大第12屆第5次會議,解放軍代表(AP)

解放軍內部稱為「第41號令」的軍令,已授權解放軍總參謀部需在2018年底前,增編完成編組空降第16軍,成為對台作戰的「專業部隊」。圖為全國人民代表大會、政治協商會議解放軍代表。(資料照,美聯社)

若結合已經完成組建的快速反應部隊,即空降第15軍,是由第43師、第44師及第45師等3個空降步兵師為基幹,並與空軍第13空運師、第13空降獨立團共90餘架大小運輸機,以及部份陸軍航空兵所屬的獨立直升機團(大隊),共同組成一支能保持60%作戰力且隨時可上機進行「隨時能飛、隨時能降、降之能打」等攻擊任務的「鐵骨頭」。解放軍總參謀部且已正式下達組建令,這也是有監於美伊戰爭中,美軍強大的投射兵力及視距外戰力,對戰局的重大作用,而導致解放軍對傳統戰力進行的改革。中共亦不可能永遠甘於臣服美國之下,至少希望在東亞區域中,被承認具有與美國平起平坐、共同處理亞太事務的地位。

不及格的戰略與一百分的戰力如何能打!

戰略構想之定義:為經戰略狀況判斷後,所採取之行動方案,通常應考量五大要素:即目的、兵力、時間、地點、手段。所謂軍事戰略是建構在國家(安全)戰略之下,必須遵循和支持國家的國防政策。軍事戰略不僅只是思維理則,也包含戰略構想,更涵蓋了兵力設計與兵力整建的整體考量。換言之,軍事目標與戰略構想是兵力規劃(整建)的指導,兵力整建則是具體實踐,而其中的兵力設計又將上述兩方結合成為一個完整的戰略思維。

我國各階段的軍事戰略調,由過去攻勢戰略、攻守一體、防衛守勢或是攻勢守勢各時期戰略的轉變,其過程都與美國全球戰略、亞太情勢及兩岸關係有著密切關係。其目的在確保台灣安全,維持國家主權與領土完整。而現階段筆者以為以「預防戰爭、維持現狀、保衛國土安全」。並署重點於「防衛固守、縱深遏阻」之攔截兵力整建,以有效遏阻制敵於境外。

表一

檢視相片

表一

表一

多重任務目標是手段、重層攔截戰力是聯合作戰部署

目的與手段不能配合(多重嚇阻是被動防禦,重層嚇阻是主動防禦)?

據國防部長馮世寬日前曾提出的「多重嚇阻」,和最後定案的「重層嚇阻」差異,在於「多重嚇阻」傾向被動防禦,也就是侷限在台灣本島的防衛作戰;「重層嚇阻」則屬主動防禦,是以本島為中心,再一層層向外推建構防禦網,兩者有被動和主動的差異性。就筆者曾任多年戰略教學經驗來談,所謂「多重嚇阻」與「重層嚇阻」並無被動、主動之分;

20170302立法院.國防部長馮世寬出席外交及國防委員會報告及答詢(陳明仁攝)

檢視相片

20170302立法院.國防部長馮世寬出席外交及國防委員會報告及答詢(陳明仁攝)

國防部長馮世寬日前曾提出的「多重嚇阻」,和最後定案的「重層嚇阻」差異,在於「多重嚇阻」傾向被動防禦。(資料照,陳明仁攝)

筆者認為當初我國之所以將「防衛固守、有效嚇阻」調整為「有效嚇阻、防衛固守」,應「有效嚇阻、防衛固守」即包含攻勢與守勢的精神。而多重任務目標選擇只是手段、重層攔截戰力則是聯合作戰部署一環,將目的與手段不能配合配合的戰略構想,是不及格的戰略;試問「重層嚇阻」不再是守勢,是一層層消滅,如此沒有重點打消耗戰持久戰,我們有多少本錢可以打。

台灣有嚇阻戰力整備?假如中共攻擊國軍不會再是守勢!

國防部長馮世寬日前在立院答詢時曾指出,國軍軍事戰略會調整為「重層嚇阻」,是因為現在研發的武器較之前進步,「有些飛彈發展得不錯」,可以讓台灣有更好防衛力量;假如中共對台攻擊發起,國軍就不會再是守勢,「重層嚇阻」將會開始轉為「積極防禦」;同時國軍已具備多重、多方、多能力戰力,將可經由擊敵半渡、灘岸決戰、陣地防禦,讓海空兵力無法順利達成登陸台灣本島目的(引自吳明杰, 2017年03月13日,風傳媒)。

他在答覆民進黨立委劉世芳質詢時說,像是飛彈指揮部移到空軍轄下,就符合重層嚇阻戰略要求,飛指部4個階段隸屬不同單位,戰力不斷增強,現在是指揮統一、事權統一,可在第一時間爭取時效,空軍作戰指揮部有這權責。而馮世寬所指「有些飛彈發展得不錯」、「不是一層層的防衛,是一層層的消滅、拒止」,就是指已經部署及量產的雄二E巡弋飛彈、萬劍彈、雄三飛彈和愛國者飛彈等武器,把來犯敵軍的飛彈、戰機、軍艦,分別先從陸海空各空間向外一層層攔截和殲滅,而非等到兵力投射到台灣本島後才開始進行防衛作戰。

表二

檢視相片

表二

表二

構建重層攔截的聯戰戰力飛彈防禦能力是重點

國軍自力研製之經國號戰機、天劍一、二型飛彈、天弓一、二、三型飛彈,均已成軍部署或進入量產,並籌建後續能量及陣地部署工作。其次進行高解析度雷達、電子戰裝備、多管火箭等武器系統之研發計畫,有效提升國軍整體戰力。如何提升防衛作戰預警能力、雷達性能與涵蓋範圍,強化雷達信號處理、電子防禦技術、機動雷達之研發與部署。賡續建立早期預警管制機制與資訊鏈路構建,整合三軍指管通情系統,精確戰管與各觀通站台情資聯繫等。

20160811-花蓮空軍基地11日搶先開放給當地居民及媒體參訪,圖為現場展示IDF經國號戰機。(顏麟宇攝)

檢視相片

20160811-花蓮空軍基地11日搶先開放給當地居民及媒體參訪,圖為現場展示IDF經國號戰機。(顏麟宇攝)

國軍自力研製之經國號戰機,已成軍部署或進入量產,並籌建後續能量及陣地部署工作。(資料照,顏麟宇攝)

筆者認為飛彈防禦能力,是構建重層攔截的聯合戰略部署是重點,特別是戰損復元能力為續戰關鍵;中共飛行載具(導彈、巡弋飛彈與無人載具等)精準打擊力,以及其第一擊後國軍戰損與復原能力,為影響我作戰期程與中共後續作戰計畫遂行之關鍵因素。國軍應考量指、管體系損毀後獨立作戰能力及強化誘標、電戰、防禦性反制能力;唯有效源頭反制作戰,方能降低敵攻擊火力。

針對「如何打」的用兵理念-「防衛固守、縱深遏阻」

國軍想打怎樣的戰爭,國防建軍構想要依據「打、裝、編、訓」,策定兵力整建計畫,其次是綜合國力組建嚇阻戰力。「防衛固守」的戰略構想,依據「為戰而訓、戰訓合一」的政策指導,針對「如何打」的用兵理念,規劃「國軍年度重大演訓流路」。部隊演訓區分為「作戰、動員、核化、訓練」等四大類;為加強「外島艦岸砲聯合對海上目標攻擊」與「三軍聯合防空作戰訓練」能力,尤應增加訓練次數,以增進三軍聯合作戰演訓能力。

綜合國力做為國家安全指標,有兩層意義;對內而言,國防建設需要與經濟發展兼顧;對外而言,瞭解敵人最在意的是什麼,有助「縱深嚇阻」方案的形成。對「縱深嚇阻方式」可以詮釋為:「強調的是一個令敵人難以忍受的報復,而非強調實戰及贏得戰爭的能力」,如《超限戰》中也提出戰爭標的不再僅限於軍事,是戰爭型態與建軍思維的新趨向。

據風傳媒吳明杰報導,從距離來看,國軍未來的防衛圈,平時包括本島、台海中線以東、ADIZ防空識別區,但戰時則將外推到大陸當面沿岸海空基地,甚至更內陸的飛彈基地和作戰指揮中心,而東部防禦範圍也會外推到ADIZ以外區域,加上未來第四軍種成立後,網路資訊戰更沒有距離限制,這些都是國軍未來「重層嚇阻」的防禦範圍。(吳明杰, 2017年03月13日,風傳媒)。但本研究所提「縱深遏阻」非直線間之距離。所謂縱深作戰,簡言之包含立體空間作戰之縱深,正如解放軍所稱「陸、海、空、天、電」,就筆者所主編之《國軍防衛作戰教則》,已將防衛作戰區分為五度空間,即太空、空中、地面、水面、水下作戰指導。目前我們最缺乏的是太空與水下之戰力情蒐,必須有賴國際合作及情資交換。

20170118-國軍春節加強戰備巡弋第二日,來到海軍左營基地。圖為現場展示的海軍茄比級海豹潛艦。(蘇仲泓攝)

檢視相片

20170118-國軍春節加強戰備巡弋第二日,來到海軍左營基地。圖為現場展示的海軍茄比級海豹潛艦。(蘇仲泓攝)

國軍未來的防衛圈,平時包括本島、台海中線以東、ADIZ防空識別區,但戰時則將外推到大陸當面沿岸海空基地,甚至更內陸的飛彈基地和作戰指揮中心,而東部防禦範圍也會外推到ADIZ以外區域。圖為海軍茄比級海豹潛艦。(資料照,蘇仲泓攝)

兵力整合在以網路為中心的整體作戰

國軍三軍聯合作戰思想漸入人心,適應三軍聯合作戰為主要型態的高科技戰爭發展需要。軍力建構上,避免與中共進入軍備競賽,建立寄生與共生關係的台灣C4ISR能力,廣泛參與多國軍事研發與合作。在國防安全上追求合理的防衛空間,兵力整合在以網路為中心的整體作戰。簡言之:「把自己千軍萬馬變成一個連,把敵人從千山萬水拉到我我方視野之內」。因此,綜合上述觀點,筆者建議當前軍事戰略的走向,較佳的戰略構想為「防衛固守、縱深遏阻」,秉持「預防戰爭」、「維持現狀」、「保衛國土安全」的政策,構建「重層攔擊」聯合戰略部署戰力,依多層防衛指導,結合全民防衛動員力量,爭取「戰略持久」時間,創機造勢,殲滅犯敵,確保國家安全。

結論:國家安全是全民共同的責任

事實上,筆者觀察民進黨選前出版的12本國防藍皮書,新政府推動的國防政策,諸如研訂軍事戰略、國艦國造、國機國造、改良式募兵制、周末戰士、軍中連坐不能過當等主張,新政府的國防政策構想,在藍皮書中都可找出蛛絲馬跡。我國在面對中共不對稱軍備發展升溫,而且逐漸鎖入「安全兩難」困境之際,實有必要保持冷靜觀察思考規劃,對生存發展最有利的安全戰略、國防政策,以及軍事準備,其如不能有以大事小以仁的胸懷,則我應發揮以小事大以智的深度。

海巡署「宜蘭艦」上之國造T75-20機砲操演。(顏麟宇攝)

檢視相片

海巡署「宜蘭艦」上之國造T75-20機砲操演。(顏麟宇攝)

新政府推動的國防政策,諸如國艦國造等主張,新政府的國防政策構想,在藍皮書中都可找出蛛絲馬跡。圖為海巡署「宜蘭艦」上之國造T75-20機砲操演。(資料照,顏麟宇攝)

防衛固守過於消極,欠缺核武戰力有效嚇阻沒有能力。天下沒有亷價的國防,國家安全是全民共同的責任,沒有政黨之分、藍綠之別。建軍備戰關鍵問題還是人才的培育,就目前新政府的年金改革方案,也將軍人沒有理由納入改革對象,更導致募兵制的困難重重,試問如此基層人員素質及幹部缺乏下,台灣如何能執行重層嚇阻戰力。

Original URL: https://goo.gl/mZV3tX

Chinese Military: Cyber security is a matter of war. In the information war, cyberspace has become a new dimension of battlefield space // 中國軍隊:網絡安全是戰爭問題。 在信息戰中,網絡空間已成為戰場空間的新維度

Chinese Military: Cyber security is a matter of war. In the information war, cyberspace has become a new dimension of battlefield space //

中國軍隊:網絡安全是戰爭問題。 在信息戰中,網絡空間已成為戰場空間的新維度

 

Author:   來源: 解放軍報 作者: 周鴻禕 張春雨

DTG: 2018年05月22日 16:XX:XX

 ● Promote network security. The integration of military and civilian needs to integrate and optimize the allocation at the national level, and promote the two-way flow of technology, talents and resources.

  ● Whether it is network security analysis, situation research, emergency response, or network protection hardware and software development, a large number of information technology talents are needed.

  

        President Xi profoundly pointed out that there is no national security without cyber security. In the digital age, cyberspace has penetrated into various fields such as politics, economy, military, culture, etc. It has the natural attributes of military and civilian integration, and is an important aspect of the integration and development of military and civilians in the new era. At present, China is marching toward a network power and building a network great wall combining military and civilian integration. It is not only the basic system design for building a network power and information army, but also an important driving force for promoting the deep development of military and civilian integration. Under the new situation, we will actively promote the in-depth development of cyber security, military and civilian integration, and urgently need to break down institutional barriers, structural contradictions, and policy issues, and constantly improve the level of integration and enhance joint protection capabilities.

Cybersecurity is related to the overall security of the country, and it is necessary for the military to walk away from the road of comprehensive integration.

  In the information age, cyberspace security has become a new commanding height of the national strategy. Last year, the “Eternal Blue” ransomware that broke out in the world, the Ukrainian power grid attacked, and the US election “mail door” and other events showed that cyber security concerns national security, social stability and war victory or defeat. The cyber security contest has risen to the national level of confrontation, beyond the scope of the military’s respective management and control, and it is necessary to rely on the integration of the military and the local forces to manage and manage well.

  Cybersecurity is a national interest. As the network’s tentacles extend to economic, social, cultural and other fields, its security will affect economic security, social security, cultural security, and information security. In May 2017, the “Eternal Blue” ransom virus swept through more than 150 countries and regions, including government, banks, communications companies, energy companies and other important departments, and the infrastructure was paralyzed, causing an uproar in the world. Earlier, Saudi Arabia’s infrastructure was attacked by cyber attacks. In just a few minutes, the computer hard drive was destroyed, all data was emptied, and the attacker tried to cause an explosion. If it succeeded, it would undoubtedly have serious consequences.

  Cybersecurity is a matter of war. In the information war, cyberspace has become a new dimension of battlefield space. At present, the United States, the United Kingdom, and Japan have established cyber warfare forces and vigorously developed various cyber weapons. In the Iraq war, the US military first destroyed the five key command and radar facilities of the Iraqi army, and used electronic interference to firmly grasp the information superiority, making the Iraqi army blind and paralyzed, and the defense system quickly paralyzed. With the accelerated evolution of war forms, the competition for information superiority has increasingly become the core content of war wins and losses. As the “main battlefield” of information control, cyberspace has increasingly become the commanding height of war games.

  Cybersecurity is a common practice in the world. At present, many countries in the world regard military and civilian integration as an important way to improve the security of cyberspace. For example, the United States has made cybersecurity the focus of national security. The White House and the Pentagon have designated Boeing and Lockheed Martin as the national network security team, and designated information technology giants such as Microsoft, Intel, Cisco, Apple, and Google for network security. Professional team, designated Symantec, McAfee and other network security protection companies for the network security special team. In Israel, after the retiring of many Israeli cyber security forces, they became the elite of local high-tech enterprises and founded several network security companies. These companies have come back to cooperate with the Israeli army in the field of network security to enhance the security of the military network and promote the development of the entire network space security.

Network security resources are diversified and diverse, requiring military to strengthen top-level design coordination

  Promoting the integration of military and civilian development is a systematic project. It is necessary to use system science, system thinking, and systematic methods to solve problems. At present, China’s various information network systems are developing at a high speed, and network functions of different functions and types are being put into use one after another. The overall framework of the network security protection system is basically established. However, network security resources are widely distributed in the military and local areas. Promoting network security and military-civilian integration, improving synergy protection needs to strengthen top-level design coordination, break down institutional barriers and departmental interests, unify integration and optimize allocation at the national level, and promote technology, talents, resources, etc. Two-way flow conversion of features.

  Establish and improve the leadership system of the network security organization. It is necessary to speed up the establishment of a leading agency for cybersecurity work organizations with Chinese characteristics in order to ensure a clear hierarchy and division of labor. The national cybersecurity leadership agency’s work focuses on strengthening the top-level design and macro-management of cybersecurity military-civilian integration, formulating development strategies and planning plans, fulfilling the overall coordination function in military-civilian integration, and being responsible for domestic cybersecurity defense and emergency response, and combating cybercrime. And cyber terrorism; military cyber security authorities focus on the overall planning and construction of military cybersecurity, integrating the areas of military and civilian integration into the overall development of national cybersecurity, and doing a good job of connecting with national cybersecurity development plans, We will clarify the relevant processes and management methods for military-land coordination, improve the work system for regular military conferences, important situation notifications, and major operational coordination, and form joint prevention, joint management, and joint control of cyberspace security.

  Coordinate the planning standards for military network security construction. With the goal of effectively responding to the current and future cyber offensive and defensive measures, the overall framework of military and civilian cybersecurity construction will be scientifically formulated, the construction model will be classified, the short-term and long-term construction goals will be defined, and the supporting measures for completing the tasks will be determined. The first is to adhere to the standard. Actively promote the unification of technical standards for network security basic products such as autonomously controllable secure operating systems and secure database systems, and achieve full integration of systems at key moments to create a solid and reliable network security defense line. The second is to insist on a unified assessment. Strengthen the assessment of network security construction and technical risk assessment of network security products, clarify the evaluation procedures and links, and adopt scientific and effective evaluation methods to ensure that the network is secure and controllable after it is built.

  Establish a network security military resource sharing mechanism. To realize the sharing of military network security resources, the key is to establish a mechanism for military land demand. The information on military and civilian technical achievements should be released in a timely manner. The real-time table of “the battlefield needs to be lacking” and “market ownership” should be fully shared with the military and land needs, technologies, standards, products and other information resources; accelerate the construction of military information integration and sharing platform, Expand Unicom channels, standardize interoperability standards, and achieve full complementarity and sharing of military and territorial information resources; establish a network security access system, clearly define the scope of confidentiality levels, and the military business authorities and the “Ministry of the Army” enterprises regularly meet, information, and demand docking Collaborate with research and development to prevent civil network security forces from developing technology and losing targets, reducing targets, protecting tactics from losing rivals, and lacking direction; establishing a network threat information exchange mechanism, timely interoperating with domestic and international network security updates and major event notifications, encouraging private Enterprises and governments, the military share real-time network security threat information, improve the professional and real-time response capabilities of research and analysis.

The essence of cybersecurity is the contest of talents.

  The essence of cybersecurity is cyber confrontation, which is essentially the competition of talents. Whether it is network security analysis, planning, situation research, response and disposal, or network protection hardware and software development, a large number of information technology talents are needed. In order to meet the huge demand of military network security talents, it is necessary to firmly establish a joint thinking.

  Jointly train talents. In recent years, important progress has been made in the training of national cyber security personnel. Cyberspace security has been added to the first-level discipline by the Academic Degrees Committee and the Ministry of Education, and nearly 10,000 graduates in the field of cyberspace security each year. However, compared with the demand for building a network strong country and strengthening the army, there is still a big gap, such as a large gap in the talent team, a need to improve the training system, and insufficient reserve of practical talents. We should actively explore the military, local colleges, research institutes and network security enterprises to carry out joint training channels for talents, build a team of teachers, jointly set up experimental sites, and set up a practice base to realize the organic combination of classroom teaching and practical practice, through network security training. Camp, safety operation and maintenance personnel training, etc., to enhance the professional capabilities of network security practitioners, improve the rapid, large-scale, actual combat security operation and maintenance, analysis and response, attack and defense penetration and other network security personnel joint training mechanism.

  Joint use of strength. We should coordinate the use of various forces in the military, strengthen operational coordination, and establish a relatively comprehensive network security joint prevention and control mechanism. On the one hand, give full play to the role of local network security talents, open up the military network security top-level design, core technology research and development, and network security overall construction to meet the needs of military network security for talents; on the other hand, give full play to the military network security needs The role of the booster is to use the military’s advanced network technology to test the security of national critical infrastructure networks such as nuclear power, communications, transportation, and finance, and to verify the effectiveness of the emergency response system.

  Joint research and development technology. Military and civilian collaborative innovation is an important way to achieve breakthroughs in network protection technology innovation. We should focus on the use of military demand for cutting-edge innovation, and focus on breaking key network technologies, promoting the sharing of military and civilians on the basic platform, and vigorously promoting the mutual transformation of military and civilian technologies; encouraging universities, research institutes, military enterprises, and superior private enterprises to strengthen alliances. Focus on military, human, material and financial resources, and focus on key chips, core devices, operating systems, etc.; explore military and civilian integration network security equipment technology innovation model, develop a new generation of firewalls, intrusion detection, information encryption, information hiding, anti-eavesdropping And other protection technologies to jointly foster an ecological chain of autonomous network security industry.

  In addition, due to the comprehensive complexity of network security, military and regional forces are needed to strengthen regulatory and policy guarantees. Formulate a legal system for network security and military-civilian integration, relevant policies to support the integration of cyber security and civil-military, and relevant documents in the field of cybersecurity military-civilian integration key protection, ensure that the measures for network security and military-civilian integration take root, and form a joint support system for military and land.

Original Mandarin Chinese:

要點提示

●推動網絡安全軍民融合,需要在國家層面統一整合、優化配置,促進技術、人才、資源等要素雙向流動轉化。

●無論是網絡安全分析、態勢研判、應急處置,還是網絡防護硬件、軟件的研發,都需要大量的信息科技人才。

習主席深刻指出,沒有網絡安全就沒有國家安全。數字化時代,網絡空間已滲透到政治、經濟、軍事、文化等各個領域,具備軍民一體的天然屬性,是新時代軍民融合發展的重要方面。當前,我國正向網絡強國邁進,打造軍民融合的網絡長城,既是建設網絡強國和信息化軍隊的基本製度設計,也是推動軍民融合深度發展的重要驅動力量。新形勢下,積極推動網絡安全軍民融合深度發展,亟須破解體制性障礙、結構性矛盾、政策性問題,不斷提高融合水平、提升聯合防護能力。

網絡安全事關國家整體安全,需軍地走開全面融合之路

信息化時代,網絡空間安全已經成為國家戰略新的製高點。去年全球爆發的“永恆之藍”勒索病毒、烏克蘭電網遭攻擊、美國大選“郵件門”等事件表明,網絡安全事關國家安全、社會穩定和戰爭勝敗。網絡安全的較量已上升為國家層面的對抗,超出軍地各自管理控制的範疇,需要依靠軍地一體合力集中統管才有可能管得住、管得好。

網絡安全事關國家利益。由於網絡觸角延伸到經濟、社會、文化等各個領域,其安全必將影響到經濟安全、社會安全、文化安全、信息安全等。 2017年5月,“永恆之藍”勒索病毒席捲150多個國家和地區,包括政府、銀行、通信公司、能源企業等重要部門機構基礎設施陷入癱瘓,在全球引起軒然大波。早前,沙特的基礎設施遭網絡攻擊,僅僅數分鐘內,計算機硬盤就被破壞,所有數據被清空,攻擊者還試圖引發爆炸,如果得逞無疑會造成十分嚴重的後果。

網絡安全事關戰爭勝負。信息化戰爭中,網絡空間已成為新維戰場空間。當前,美國、英國、日本等都已建立網絡作戰部隊,並大力研發各種網絡武器。伊拉克戰爭中,美軍首先摧毀了伊軍非常關鍵的5個指揮與雷達設施,並使用電子乾擾等方式牢牢掌握信息優勢,使伊軍又盲又聾,防禦體系迅速癱瘓。隨著戰爭形態的加速演變,信息優勢爭奪日益成為戰爭勝負的核心內容,網絡空間作為信息控制的“主戰場”,日益成為戰爭博弈的製高點。

網絡安全軍民一體是世界普遍做法。當前,世界很多國家都將軍民一體看作是提升網絡空間安全的重要途徑。例如,美國就將網絡安全作為國家安全的重點,白宮和五角大樓指定波音、洛克希德·馬丁等公司為網絡安全國家隊,指定微軟、英特爾、思科、蘋果、谷歌等信息技術巨頭為網絡安全的專業隊,指定賽門鐵克、邁克菲等網絡安全防護企業為網絡安全的特種隊。在以色列,許多以軍網絡安全部隊的軍人退役後,成為地方高科技企業的精英,並創辦多家網絡安全公司。這些公司回過頭來與以軍在網絡安全領域展開全方位合作,提升以軍網絡防護能力的同時,推動整個網絡空間安全的發展。

網絡安全資源分散多元,需軍地強化頂層設計統籌

推動軍民融合發展是一個系統工程,要善於運用系統科學、系統思維、系統方法研究解決問題。目前,我國各類信息網絡系統高速發展,不同功能、類型的網絡安全設施陸續配套投入使用,網絡安全防護系統的總體框架基本建立。但網絡安全資源廣泛分佈於軍隊和地方,推動網絡安全軍民融合,提高協同防護能力需要強化頂層設計統籌,打破體制壁壘和部門利益,在國家層面統一整合、優化配置,促進技術、人才、資源等要素雙向流動轉化。

構建完善網絡安全組織領導體制。應加快建立軍地一體具有中國特色的網絡安全工作組織領導機構,確保層級清晰、分工協作。國家網絡安全領導機構的工作重點是加強網絡安全軍民融合的頂層設計和宏觀管控,制定發展戰略和規劃計劃,履行軍民融合中的統籌協調職能,負責國內網絡安全的防禦與應急反應,打擊網絡犯罪和網絡恐怖主義等;軍隊網絡安全主管機構側重於擬制軍隊網絡安全的整體規劃和建設,將可以實施軍民融合的領域納入國家網絡安全發展全局,做好與國家網絡安全發展規劃的相互銜接,明確軍地協調的相關流程和管理辦法,健全軍地定期會商、重要情況通報、重大行動協同等工作制度,形成網絡空間安全的聯防、聯管、聯控。

統籌軍地網絡安全建設規劃標準。以有效應對當前和未來一段時期網絡攻防手段為目標,科學制定軍民網絡安全建設總體框架,分類確立建設模式,明確近期和長遠建設目標,確定完成任務的配套措施。一是堅持統一標準。積極推動自主可控的安全操作系統、安全數據庫系統等網絡安全基礎產品的技術標準統一,關鍵時刻能實現各系統的全面融合,打造堅固可靠的網絡安全防線。二是堅持統一評估。加強網絡安全建設評估和網絡安全產品的技術風險評估,明確評估程序和環節,採取科學有效的評估方法,確保網絡建成后防得牢、控得住。

建立網絡安全軍地資源共享機制。實現軍地網絡安全資源共享,關鍵是建立軍地需求共提機制。應及時發布軍民兩用技術成果信息,實時對錶“戰場需缺”與“市場所有”,實現軍地雙方需求、技術、標準、產品等信息資源充分共享;加快構建軍地信息融合共享平台,拓展聯通渠道,規範互通標準,實現軍地信息資源充分互補共用;建立網絡安全准入制度,明確劃定保密等級範圍,軍隊業務主管部門與“民參軍”企業定期會商、信息通報、需求對接和協作攻研,防止民用網絡安全力量技術研發丟了目標、少了靶子,防護戰術失去對手、缺乏指向;建立網絡威脅信息互通機制,及時互通國內外網絡安全最新動態和重大事件通報,鼓勵民營企業與政府、軍隊實時共享網絡安全威脅信息,提高研究分析的專業性和實時響應能力。

網絡安全實質是人才的較量,需軍地樹牢聯合思想

網絡安全的本質是網絡對抗,實質是人才的競爭較量。無論是網絡安全分析、規劃、態勢研判、響應和處置,還是網絡防護硬件、軟件的研發,都需要大量的信息科技人才。為滿足軍地網絡安全人才巨大需求,需要牢固樹立聯合思想。

聯合培養人才。近年來,國家網絡安全人才培養取得重要進展,網絡空間安全被國務院學位委員會和教育部增設為一級學科,每年網絡空間安全領域畢業生近萬名。但與打造網絡強國和強軍興軍需求相比還存在較大差距,存在人才隊伍缺口較大、培養體係有待完善、實踐型人才儲備不足等問題。應積極探索軍隊、地方高校、科研院所和網絡安全企業開展人才聯合培養渠道,共建師資隊伍、共搭實驗場所、共設實習基地,實現課堂教學、實習實踐的有機結合,通過網絡安全訓練營、安全運維人才培養等,提升網絡安全從業人員的專業能力,完善快速化、規模化、實戰化的安全運維、分析響應、攻防滲透等網絡安全人才聯合培養機制。

聯合運用力量。應統籌軍地各種力量的運用,加強行動協同,建立較為完善的網絡安全聯防聯控機制。一方面,充分發揮地方網絡安全人才的作用,開放軍隊網絡安全頂層設計、核心技術研發、網絡安全整體建設等領域,以滿足軍隊網絡安全對人才的需求;另一方面,充分發揮軍隊網絡安全需求的助推器作用,利用軍方先進的網絡技術,測試核能、通信、交通、金融等國家關鍵基礎設施網絡的安全性,檢驗應急響應體系的有效性。

聯合研發技術。軍民協同創新是實現網絡防護技術創新突破的重要途徑。應圍繞發揮軍事需求對前沿創新的牽引帶動作用,聚力突破關鍵網絡技術,促進基礎平台軍民共享,大力推動軍民技術相互轉化;鼓勵高校、科研院所、軍工企業和優勢民營企業強強聯合,集中軍地人力、物力和財力,對關鍵芯片、核心器件、操作系統等領域集智攻關;探索軍民融合網絡安全裝備技術創新模式,研發新一代防火牆、入侵檢測、信息加密、信息隱藏、反竊聽等防護技術,共同培育自主化網絡安全產業生態鏈。

此外,由於網絡安全具有綜合性複雜性,還需軍地合力來強化法規政策保障。制定網絡安全軍民融合的法規體系、支撐網絡安全軍民融合的相關政策,以及網絡安全軍民融合重點保障領域的相關文件,確保網絡安全軍民融合的措施落地生根,形成軍地聯合支撐體系。

Chinese Military Information Warfare: The First Game of Modern Warfare // 中國軍事信息戰:現代戰爭的第一場戰爭

Chinese Military Information Warfare: The First Game of Modern Warfare //

中國軍事信息戰:現代戰爭的第一場戰爭

  The transformation of the characteristics of war is always motivated by the advancement of science and technology. If “information-led” is the characteristic of the era of today’s war, then the essence of this feature is “the dominance of information technology.” Information warfare is a new combat force that is fostered and fueled by information technology innovation.

Information warfare is the new quality of combat power

三、衛星在現代戰爭中扮演的角色為何? 四、資訊戰有哪兩種主要模式?

“knowing one’s own confidant, no wars, no war” has always been the only rule of war victory, it actually embodies the important role of “information” in the war. Since ancient times, the military has always been pursuing the dispelling of “the fog of war”, reducing the probabilistic nature of the war, and taking the lead. At the same time, it hopes to quickly gather the fighting energy with accurate and timely information to make the enemy win the enemy. Nowadays, the heroic pace of human innovation in information technology has driven the rapid development of society. The myth of “thousands of eyes and ears” has long been a reality. While the results of information technology innovation and development are fully utilized for war, they are also constantly promoting the transformation of the combat capability generation model.
The germination of information warfare can be traced back to the beginning of the last century. Shortly after the advent of the radio telegraph, Russian scientist Popov proposed the idea of ​​radio communication struggle in 1903. In the Japanese-Russian War that broke out in 1904, the two sides used radio communication for the first time. One day in April of that year, the Russian military operator subconsciously used the radio station to interfere with the shooting and guiding communication of the Japanese fleet, forcing the Japanese to return without success. The original sprout of this technical idea gave birth to a new way of warfare, and the information war began to enter the stage of war. The highly developed information technology has made “systems based on information systems” a feature of today’s war. It should be said that systemic confrontation is not a form of engagement that exists today. Both sides of the war have sought to form a strong operational system. In different historical periods, the system has different manifestations. Today’s combat system is an unprecedentedly powerful combat system that relies on networked information systems. An important manifestation of information technology playing a leading role in modern warfare is to promote the rapid development of information warfare. At the same time that “information-led” became the identifier of modern warfare, information warfare began to leap into a new kind of combat power.
Having a strong information power makes an army savvy and responsive, and the integration of information power into the strike force increases the military’s operational effectiveness into a geometric progression. Information warfare is the first sword to break the efficient integration of information firepower.
Information power is the ability to acquire, transmit, process, and use information. The enhancement of information means that information is acquired more and more comprehensively, information transmission is faster and more accurate, information processing is automated, and information usage tends to be intelligent. This makes the military’s command efficient, precise control, quick action, and powerful. From the perspective of operational mechanism, the effectiveness of information power in the combat system is manifested in the synergy of the strike force and the transformation of combat effectiveness. Although the information itself cannot directly kill the enemy, the information is used to realize the intelligent control of the combat weapon. Produced a powerful and powerful strike and non-contact strike.
Information deterrence is an important information warfare action, which can reduce the intensity of confrontation, and even force the opponent to give up resistance. It may produce a satisfactory combat effect and achieve the highest pursuit of “no war and defeated soldiers”. The principle is that the opponent It is a huge blow to the coming, and it is limited to the ability to stop the information. The achievement of the deterrent effect is the fusion effect of the multiple elements of strength, ability and determination. As a result of the high degree of integration of information and firepower, information multiplies the effectiveness of firepower, and firepower transforms information energy. The goal of information warfare is the opponent’s information system, which plays the role of “covering ears, obstructing, chaos”, so that the information power of the opponent is weakened and even lost, and the fusion of information firepower cannot be discussed. During the Gulf War, when the multinational forces scraped the “Desert Storm”, they first used a variety of electronic interference methods in the air and on the ground. At the same time, they used firepower to prioritize the communication and radar systems of the Iraqi army, making the Iraqi defense system still not in use. The powerful information power is completely lost, so it is stable. In the Kosovo war, the US military used a mistake in information warfare to provide a good opportunity for the Yugoslav army to make its air defense units cleverly use the less advanced information system to achieve effective integration of information firepower and shoot down the US military stealth fighters. Practice has proved that under the conditions of informationization, information warfare has become the first sword to break the efficient integration of opponents’ information firepower.
Information warfare is the primary action of transforming the enemy and the enemy
. The competition between the spear and the shield will never stop and escalate. When “information-led” shows great advantages, it will inevitably lead to “information counter-measure”. The containment of information will immediately reverse the original advantage. Information warfare is the primary action to transform the enemy and the enemy.
The basic types of combat are offense and defense, and the material means used for combat can also be divided into two types of weapons and equipment: spear and shield. Today, when combat weapons have unprecedented lethality, no one will use concentrated forces to concentrate their advantages. Synchronous strikes in different places can be an effective way to “eliminate the enemy and save oneself”, that is, the strike forces scattered in different locations simultaneously target the same target. Attacks are initiated, but only if there is precise time coordination.
Keeping time synchronized, it is obviously impossible to rely on the past manual pairing. Advanced techniques such as navigation satellite timing must be used, and once the timing synchronization information is destroyed by the opponent, the action will be completely disrupted. A force with high engine power and strike force, if attacked by the opponent’s information, causes information to be ineffective and information blocked, will not be able to figure out the direction of the action, can not find the target of the attack, become sluggish and weak. . Although the precision strike power is large, once the accurate guidance information is lost, the advantage is immediately lost. Command and control If the information is subject to control, it will lead to chaos, which will inevitably lead to chaos in the overall situation of the war.
Attacking the enemy’s information system is the focus and effort to break the battle system. The acquisition and use of information, counter-acquisition, and counter-utilization have become the focus of the battle between the two armies on the informationized battlefield. Information warfare is the preferred style for competing for battlefield control and even for war initiative.
While greatly improving the effectiveness of the combat system, the information system naturally becomes the target of the opponent’s attack, and it is the key target. Information warfare is to blinden the enemy battlefield perception system, weaken its information acquisition ability, interfere with its analysis and judgment; to block the enemy information transmission system, disrupt its coordination and destroy its actions; to deter the enemy accusation system by deception, reduce its command efficiency, Lead to mistakes in their decision-making. The more the information technology is developed and the more highly dependent on the information system, the more serious the consequences of its information system attack. Quaker, former chairman of the American “Old Ravens” Association, once wrote: “Advanced technology makes us highly dependent on the electromagnetic spectrum, but at the same time, we are not well invested in building electronic protection capabilities.” “The enemy uses cheap commercial technology. It can reduce or even destroy the performance of our expensive ISR equipment and weapon platforms, thereby limiting or even seriously weakening our technological advantages.” Because military electronic information systems are being widely used worldwide, in fact, the degree of dependence of national military on information systems It is constantly deepening. Therefore, all military powers are competing to develop information warfare. Some small countries are not willing to lag behind and follow suit. In modern warfare, it is of vital importance to seize the comprehensive control of the battlefield. The right to make information has become an indispensable commanding height, and it is the primary means of controlling the battlefield and mastering the initiative of war.
The information war has stood at the forefront of the contemporary military game. The
war is usually based on crossfire. The information war is invisible, the threshold is low, and the controllability is good. In peacetime, it is possible to start a dark battle and quietly extend the border of war. Information warfare has stood at the forefront of contemporary military games.
In today’s world, the use of military means is becoming more complex. War is not only a continuation of politics, but also a close integration of politics and military, subject to the overall strategy of political strategy. The use of force will also interact with politics, economy, diplomacy, and public opinion in a multi-dimensional, organically connected and closely coordinated. Information warfare is active on an invisible front, spanning peacetime and wartime. For example, the confrontation between information warfare reconnaissance and counter-reconnaissance between major powers is now almost every day. Although it is widely believed that the engagement of fire is a watershed between war and peace, the boundaries of war are changing due to the particularity of the use of new military struggle styles such as information warfare. According to reports, the US government recently publicly stated that the law of war applies to cyberattacks. It believes that certain cyber attacks are equivalent to the “use of force” legal concept as defined in the UN Charter. The attacked countries can use conventional military forces or cyber weapons. Counterattack. At the same time, we also see that the arrival of the information age has made the shadow of information warfare often appear in the struggle in the ideological field. The construction and development of information warfare capabilities have received increasing attention from all countries. In December 2011, Iran comprehensively used information warfare methods such as interference suppression, data deception, and link control to successfully deceive and capture a US military RQ-170 “sentinel” unmanned reconnaissance aircraft, which shocked the US military.

Original Mandarin Chinese:

戰爭特徵的嬗變總是由科學技術進步來激發,如果說“信息主導”是當今戰爭的時代特徵,那麼這一特徵的實質則是“信息技術的主導”。信息戰是信息技術創新孕育和助長的新質戰鬥力。

信息戰是新質戰鬥力

三、衛星在現代戰爭中扮演的角色為何? 四、資訊戰有哪兩種主要模式?

“知彼知己,百戰不殆”一直是戰爭制勝的不二法則,它實際上體現了“信息”在戰爭中的重要作用。自古以來,兵家總是在不斷追求驅散“戰爭迷霧”,降低戰爭的蓋然性,搶占先機;同時希望能夠以準確及時的信息迅速聚集戰鬥能量,制敵勝敵。如今,人類創新信息技術的豪邁步伐,驅動了社會的迅猛發展,“千里眼、順風耳”的神話早已成為現實。信息技術創新發展成果在立即為戰爭所充分利用的同時,也在不斷推動戰鬥力生成模式的轉變。
信息戰的萌芽可以上溯到上個世紀初。當時無線電報問世不久,俄國科學家波波夫就於1903年提出了無線電通信鬥爭的思想。 1904年爆發的日俄戰爭中,作戰雙方首次運用了無線電通信,當年4月的一天,俄軍報務員下意識地利用無線電台干擾了日軍艦隊的射擊引導通信,迫使日軍無功而返。這種技術思想的原始萌動孕育了一種新的作戰方式,信息戰開始登上戰爭的舞台。信息技術的高度發達,使得“基於信息系統的體係作戰”成為當今戰爭的時代特徵。應該說,體係對抗並不是今天才有的交戰形式,戰爭中交戰雙方都力求形成一個強大的作戰體系,在不同歷史時期,體係有著不同的表現形態。今天的作戰體係是依靠網絡化的信息系統聯成的一個威力空前強大的作戰體系,信息技術在現代戰爭中發揮主導作用的一個重要表現,就是助長了信息戰的快速發展。在“信息主導”成為現代戰爭的標識符的同時,信息戰開始躍變為一種新質戰鬥力。
擁有強大的信息力使一支軍隊耳聰目明、反應敏捷,信息力融入打擊力則使軍隊的作戰效能成幾何級數增加。信息戰是打破信息火力高效融合的第一把利劍。
信息力是獲取、傳輸、處理、使用信息的能力。信息力的增強意味著信息的獲取更多、更全,信息的傳輸更快、更準,信息的處理具備自動化,信息的使用趨於智能化。這就使得軍隊的指揮高效,控制精準,行動迅捷,打擊有力。從作戰機理上看,信息力在作戰系統中的效能發揮,體現的是對打擊力的增效和向戰鬥力的轉化,信息本身雖不能直接殺傷敵人,但使用信息實現打擊兵器的智能化控制就產生了威力巨大的精確打擊和非接觸打擊。
信息威懾是一種重要的信息戰行動,可以降低對抗強度,甚至迫使對手放棄抵抗,可能產生令人滿意的戰鬥力效應,實現“不戰而屈人之兵”的最高追求,而其原理是對手懾於隨之會來的巨大打擊力,懾於能力而止於信息,威懾效果的達成是實力、能力、決心多元要素的融合效應。信息與火力的高度融合的結果就是,信息使火力效能倍增,火力讓信息能量轉化。信息戰的目標是對手的信息系統,起到的作用是“掩耳、障目、亂心”,使對手的信息力受到削弱以至喪失,信息火力的融合也就無從談起。海灣戰爭中,多國部隊刮起“沙漠風暴”之時,首先動用的就是空中和地面的多種電子乾擾手段,同時運用火力優先打擊伊軍的通信和雷達系統,使得伊軍防禦體系中尚不強大的信息力完全喪失,因而穩操勝券。而科索沃戰爭中,美軍使用信息戰的一次失誤,為南聯盟軍隊提供了良機,使其防空部隊巧妙運用不夠先進的信息系統,實現信息火力的有效融合,擊落了美軍隱形戰機。實踐證明,信息化條件下,信息戰已成為打破對手信息火力高效融合的第一把利劍。
信息戰是轉變敵我優劣對比的首要行動
矛與盾的較量永不停息、不斷升級。當“信息主導”顯現出巨大優勢時,就必然引發“信息反制”。信息的受制,會使原有的優勢立即逆轉。信息戰是轉變敵我優劣對比的首要行動。
作戰的基本類型就是進攻和防禦,用以作戰的物質手段也可以區分為矛和盾兩大類型的武器裝備。在打擊兵器具有空前殺傷力的今天,誰都不會再用集中兵力來集中優勢,而異地同步打擊不失為“消滅敵人、保存自己”的有效方式,即分散於不同地點的打擊力量同時對同一目標發起攻擊,但條件是必須有精確的時間協同。
保持時間同步,靠過去的人工對錶顯然已不可能,必須利用如導航衛星授時等先進技術,而授時同步信息一旦被對手破壞,行動就會被徹底打亂。一支具有高機動力和打擊力的部隊,如果受到對手的信息攻擊,導致信息不靈、信息受阻,將會搞不清行動的方向,找不到攻擊的目標,​​變得行動呆滯、打擊無力。精確打擊威力雖大,但一旦丟失精確制導信息而打不准,優勢即刻盡失。指揮控制如果信息受制,就會陣腳大亂,勢必造成作戰全局陷於混亂。
攻擊敵方的信息系統是打破其作戰體系的著力點和發力點。信息的獲取與反獲取、利用與反利用,已成為信息化戰場上兩軍爭鬥的焦點。信息戰是爭奪戰場控制權乃至戰爭主動權的首選樣式。
信息系統在極大地提升作戰體系效能的同時,也自然成為對手的攻擊目標,而且是要害目標。信息戰就是通過迷盲敵戰場感知系統,削弱其信息獲取能力、干擾其分析判斷;通過阻斷敵信息傳輸系統,擾亂其協同、破壞其行動;通過欺騙擾亂敵指控系統,降低其指揮效率、導致其決策失誤。愈是信息技術發達、愈是高度依賴信息系統的軍隊,其信息系統受到攻擊的後果愈嚴重。美國“老烏鴉”協會前主席奎克曾經撰文指出:“先進的技術使我們高度依賴電磁頻譜,但與此同時,我們沒有很好地投資建設電子防護能力。”“敵人利用廉價的商用技術就可以降低甚至破壞我們昂貴的ISR設備以及武器平台的效能,從而限制甚至嚴重削弱我們的技術優勢。”由於軍事電子信息系統正在世界範圍內得到廣泛運用,事實上各國軍隊對信息系統的依賴程度都在不斷加深,因此,各軍事大國競相發展信息戰,一些小國也不甘落後,紛紛效仿。現代戰爭中,奪取戰場綜合控制權至關重要,制信息權成為其中不可或缺的製高點,是控制戰場和掌握戰爭主動的首要。
信息戰已站在當代軍事博弈的前沿
戰爭通常是以交火為基本標誌。信息戰隱於無形,使用門檻低,可控性好,在平時就可能展開暗戰,悄然延伸了戰爭的邊界。信息戰已站在當代軍事博弈的前沿。
當今世界,軍事手段的使用愈加複雜。戰爭不僅是政治的繼續,而且政治軍事緊密結合,服從於政略戰略大局。武力使用也將與政治、經濟、外交、輿論鬥爭多維互動,有機銜接,密切配合。信息戰跨越平時與戰時,活躍在一條看不見的戰線上。比如,各大國相互之間的信息戰偵察與反偵察的對抗,現在幾乎每天都在進行暗中角力。雖然人們普遍認為開火交戰是戰爭與和平的分水嶺,但是,由於信息戰等新的軍事鬥爭樣式運用的特殊性,戰爭的邊界正在發生改變。據報導,美國政府最近公開表明戰爭法適用於網絡攻擊,認為某些網絡攻擊等同於《聯合國憲章》所定義的“使用武力”法律概念,受到攻擊的國家,可以使用常規軍事力量或網絡武器實施反擊。同時,我們還看到,信息時代的到來,使得意識形態領域的鬥爭中也常常閃現出信息戰的影子。信息戰能力的建設發展,已經愈來愈得到各國的重視。 2011年12月,伊朗綜合運用乾擾壓制、數據欺騙、鏈路控制等信息戰手段,成功誘騙並俘獲了美軍一架RQ-170“哨兵”無人偵察機,令美軍大為震驚。

Original Referring url: http://theory.people.com.cn/n/2012/1218/

How Chinese Cyber Warfare Rejects Foreign Intruders Focuses on National Security // 中國網絡戰如何拒絕外國入侵者關注國家安全

How Chinese Cyber Warfare Rejects Foreign Intruders Focuses on National Security //

中國網絡戰如何拒絕外國入侵者關注國家安全

In the information age, cybersecurity has taken the lead in national security. The Outline of the National Informatization Development Strategy emphasizes that it should actively adapt to the new changes in the national security situation, new trends in information technology development, and new requirements for strong military objectives, build an information security defense system, and comprehensively improve the ability to win localized information warfare. Cyberspace has become a new field that affects national security, social stability, economic development and cultural communication. Cyberspace security has become an important topic of increasing concern to the international community.

The United States has clearly declared that cyberspace is a new field of operations, and has significantly expanded its network command and combat forces to continue to focus on cyberspace weapons development. Since entering the summer, the US military network exercises have been one after another, and the invisible wars are filled with smoke. At the beginning of March, “Network Storm 5” took the lead in kicking off the drill; in April, “Network Aegis 2016” completed the fifth-generation upgrade; in June, “Network Defense” and “Network Capture” as the core re-installation of the annual joint exercise Debut.

The essence of network security lies in the ability to attack and defend both ends. Currently, static, isolated, passive defenses such as firewalls, intrusion detection technologies, and anti-virus software are difficult to effectively deal with organized high-intensity network attacks. To build a cyberspace security defense line, we need to get rid of the idea of ​​falling behind and win the counterattack on the defensive concept.

New “Thirty-six” mobile target defense

Increase the difficulty of attack by building a dynamic network

Network attacks require a certain amount of time to scan and research the target network, detect and utilize system “vulnerabilities” to achieve intrusion control purposes. In theory, the attacker has unlimited time to start the scanning and detecting work, and always find the weak point of defense, and finally achieve the purpose of the invasion. To this end, the network pioneer USA is committed to planning and deploying security defense transformation work, striving to break through the traditional defense concept and develop revolutionary technology that can “change the rules of the game”. Mobile target defense is one of them.

Mobile target defense is called the new paradigm of cyberspace security defense. The technical strategy is to construct a dynamic network through the processing and control of the protection target itself, increasing randomness and reducing predictability to improve the difficulty of attack. If the static cyberspace is likened to a constant “city defense deployment”, it is difficult to stick to it; and the dynamic network configuration can be called the ever-changing “eight squad”, which is difficult to crack. At present, mobile target defense technology has priority in various US government and military research, covering dynamic platform technology, dynamic operating environment technology, dynamic software and data technology. In August 2012, the US Army awarded Raytheon’s “Deformation Network Facility” project to study the dynamic adjustment and configuration of networks, hosts and applications in case the enemy could not detect and predict, thus preventing, delaying or blocking the network. attack.

As a new idea in the field of cyberspace security, mobile target defense reflects the technological development trend of future network defenses to turn “dead” networks into “live” networks.

The new “Thirty-six” honey cans deceive defense

Reduce cyberattack threats by consuming attacker resources

Conventional network security protection is mainly to defend against cyber attacks from the front. Although the defensive measures have made great progress, they have not changed the basic situation of cyberspace “easy to attack and defend”. In recent years, the development of “Honeypot Deception Defense” has proposed a new concept of “bypass guidance”, which is to reduce the threat of cyber attacks to the real protection target by absorbing network intrusion and consuming the resources of attackers, thereby winning time. Strengthen protection measures to make up for the shortcomings of the traditional cyberspace defense system.

Similar to the intentional setting of false positions on the battlefield, honeypot deception defense is to actively use the computer network with lower security defense level to lure all kinds of network attacks, monitor its attack means and attributes, and set corresponding defenses on the target system that needs to be protected. System to stop similar attacks. Honeypots can be divided into two types, product-type honeypots and research-type honeypots. The main purpose of the former is to “attract firepower” and reduce the pressure of defense. The latter is designed for research and acquisition of attack information. It is an intelligence gathering system that not only needs network attack resistance but also strives to monitor powerfully to capture the attack behavior data to the maximum extent.

In addition to the establishment of a virtual network environment attack and defense laboratory consisting of four sub-networks of gray, yellow, black and green, the US military has also carefully deployed a honeypot decoy system on the Internet. What is certain is that the network defense idea based on deception will be further emphasized, and the technical means to achieve deception will be more and more.

New “Thirty-six Meters” linkage synergy defense

Integrate multiple defense technologies to “reject enemy from outside the country”

At present, most of the security protection devices and defense technologies are “individually fighting”. The data between network protection nodes is difficult to share, and the protection technologies are not related. As a result, the current defense system is isolated and static, which cannot meet the increasingly complex network security situation. need. The original motivation of the US “Einstein Plan” was that all federal agencies had exclusive access to the Internet, making overall security difficult to guarantee. Through the collaborative linkage mechanism, the relatively independent security protection devices and technologies in the network are organically combined to complement each other and cooperate with each other to defend against various attacks. It has become an inevitable choice for the future development of cyberspace security defense.

Collaborative collaborative defense refers to the use of existing security technologies, measures and equipment to organically organize multiple security systems that are separated in time, spatially distributed, and work and interdependent, so that the entire security system can maximize its effectiveness. Vertically, it is the coordinated defense of multiple security technologies, that is, one security technology directly includes or links to another security technology through some communication method. For example, the “deep defense” mechanism adopted by the US Navy network defense system targets the core deployment layer protection measures, including flag-based attack detection, WAN security audit, vulnerability alert, etc., and the attacker must break through multiple defense layers to enter the system. Thereby reducing its attack success rate. When a node in the system is threatened, it can forward the threat information to other nodes in time and take corresponding protective measures to adjust and deploy the protection strategy.

In the past, individual combat operations have been unable to meet the needs of today’s network security defenses, and coordinated collaborative defense will leap into the mainstream of network security. Integrate a variety of defense technologies, establish an organized defense system, and “reject the enemy outside the country” to effectively prevent problems before they occur.

The optimal strategy defense of the new “Thirty-six”

Seeking a balance between cybersecurity risks and investments

The attacks in cyberspace are more and more complicated. The ideal network security protection is to protect all the weak or attack behaviors. However, from the perspective of defense resources limitation, it is obviously unrealistic to pursue absolute security defense. Based on the concept of “moderate security”, the optimal strategy defense is on the horizon.

Optimal policy defense can be understood as seeking a balance between cyber security risks and inputs, and using limited resources to make the most reasonable decision defense. As far as investment is concerned, even the strong United States is trying to build a collective defense system for cyberspace. The United States and Australia cyberspace defense alliance agreement, as well as the Japan-US network defense cooperation joint statement, its “share of results” behind the “cost sharing” shadow. From the perspective of risk, the pursuit of absolute security will adhere to the principle of safety supremacy. When formulating relevant strategic objectives and responding to threats, it is easy to ignore the limited and legitimacy of the resources and means available, and it is difficult to grasp the advance and retreat.

The optimal strategy defense is mainly focused on the “optimal” strategy of game theory, focusing on the research direction of cyberspace security assessment, cost analysis, security defense model construction and evolution. Applying the idea of ​​game theory to cyber attacks and defenses provides a new way to solve the problem of optimal defense decision-making.

The new “Thirty-six” intrusion tolerance defense

Create a “last line of defense” for cyberspace security

The threats to cyberspace are unpredictable, irresistible, and unpredictable. Protection can’t completely avoid system failure or even collapse. Traditional reliability theory and fault-tolerant computing technology are difficult to meet the actual needs, which has to consider more comprehensive and deeper problems than pure protection. In this context, a new generation of intrusion-tolerance defenses has received increasing attention.

Intrusion tolerance is the third-generation network security technology, which belongs to the category of information survival technology and is called the “last line of defense” for cyberspace security defense. Unlike traditional cybersecurity defenses, intrusion-tolerant defenses recognize the existence of vulnerabilities and assume that some of them may be exploited by attackers to attack the system. When the target of protection is attacked or even some parts have been destroyed or manipulated, the target system can “kill the tail” like a gecko to complete the healing and regeneration of the target system.

Intrusion-tolerance technology is no longer based on “defense”, but on how to reduce losses and recover as soon as the system has been damaged. However, intrusion tolerance is an emerging research field. Its cost, cost and benefit will be the next research direction.

Original Mandarin Chinese:

新聞緣由

信息時代,網絡安全對國家安全牽一發而動全身。 《國家信息化發展戰略綱要》強調,積極適應國家安全形勢新變化、信息技術發展新趨勢和強軍目標新要求,構建信息安全防禦體系,全面提高打贏信息化局部戰爭能力。網絡空間已經成為影響國家安全、社會穩定、經濟發展和文化傳播的全新領域,網絡空間安全隨之成為國際社會日益關注的重要議題。

美國明確宣稱網絡空間為新的作戰領域,大幅擴編網絡司令部和作戰部隊,持續聚力網絡空間武器研發。進入夏季以來,美軍網絡演習接二連三,隱形戰火硝煙瀰漫。 3月初,“網絡風暴5”率先拉開演練戰幕;4月,“網絡神盾2016”完成第五代升級;6月,“網絡防衛”“網絡奪旗”作為年度聯合演習的核心重裝登場。

網絡安全的本質在於攻防兩端能力較量,目前依賴防火牆、入侵檢測技術和反病毒軟件等靜態的、孤立的、被動式防禦難以有效應對有組織的高強度網絡攻擊。構築網絡空間安全防線,需要革除落伍思想,打贏防禦理念上的反擊戰。

新“三十六計”之移動目標防禦

通過構建動態網絡增加攻擊難度

網絡攻擊行動均需要一定的時間用於掃描和研究目標網絡,探測並利用系統“漏洞”,達到入侵控制目的。從理論上說,攻擊者有無限的時間展開掃描探測工作,總能找到防禦薄弱點,最終達成入侵目的。為此,網絡先行者美國致力於籌劃和部署安全防禦轉型工作,力求突破傳統防禦理念,發展能“改變遊戲規則”的革命性技術,移動目標防禦即是其中之一。

移動目標防禦被稱為網絡空間安全防禦新範式,技術策略上通過對防護目標本身的處理和控制,致力於構建一種動態的網絡,增加隨機性、減少可預見性,以提高攻擊難度。若將靜態的網絡空間比喻為一成不變的“城防部署”,勢難固守;而動態的網絡配置堪稱變幻無窮的“八卦陣”,難以破解。目前,移動目標防禦技術在美國政府和軍方各類研究中均享有優先權,涵蓋動態平台技術、動態運行環境技術、動態軟件和數據技術等方面。 2012年8月,美陸軍授予雷神公司“變形網絡設施”項目,主要研究在敵方無法探測和預知的情況下,對網絡、主機和應用程序進行動態調整和配置,從而預防、遲滯或阻止網絡攻擊。

作為網絡空間安全領域的新思路,移動目標防禦反映了未來網絡防禦將“死”網絡變成“活”網絡的技術發展趨勢。

新“三十六計”之蜜罐誘騙防禦

通過消耗攻擊者的資源減少網絡攻擊威脅

常規的網絡安全防護主要是從正面抵禦網絡攻擊,雖然防禦措施取得了長足進步,但仍未能改變網絡空間“易攻難守”的基本局面。近年來發展的“蜜罐誘騙防禦”則提出了一個“旁路引導”的新理念,即通過吸納網絡入侵和消耗攻擊者的資源來減少網絡攻擊對真正要防護目標的威脅,進而贏得時間以增強防護措施,彌補傳統網絡空間防禦體系的不足。

與戰場上有意設置假陣地相仿,蜜罐誘騙防禦是主動利用安全防禦層級較低的計算機網絡,引誘各類網絡攻擊,監測其攻擊手段和屬性,在真正需要做防護的目標系統上設置相應防禦體系,以阻止類似攻擊。蜜罐可分為兩種類型,即產品型蜜罐和研究型蜜罐。前者主要目的是“吸引火力”,減輕防禦壓力,後者則為研究和獲取攻擊信息而設計,堪稱情報蒐集系統,不僅需要網絡耐攻擊而且力求監視能力強大,以最大限度捕獲攻擊行為數據。

美軍除了建立由灰網、黃網、黑網、綠網4個子網絡組成的虛擬網絡環境攻防實驗室外,還在國際互聯網上精心部署有蜜罐誘騙系統。可以肯定的是,基於誘騙的網絡防禦思想將被進一步重視,實現誘騙的技術途徑也將會越來越多。

新“三十六計”之聯動協同防禦

整合多種防禦技術“拒敵於國門之外”

目前的安全防護設備和防禦技術大都是“各自為戰”,網絡防護節點間的數據難共享,防護技術不關聯,導致目前的防禦體係是孤立和靜態的,已不能滿足日趨複雜的網絡安全形勢需要。美國“愛因斯坦計劃”最初的動因就在於各聯邦機構獨享互聯網出口,使得整體安全性難以保障。通過協同聯動機制把網絡中相對獨立的安全防護設備和技術有機組合起來,取長補短,互相配合,共同抵禦各種攻擊,已成為未來網絡空間安全防禦發展的必然選擇。

聯動協同防禦是指利用現有安全技術、措施和設備,將時間上分離、空間上分佈而工作上又相互依賴的多個安全系統有機組織起來,從而使整個安全系統能夠最大程度地發揮效能。縱向上,是多個安全技術的聯動協同防禦,即一種安全技術直接包含或是通過某種通信方式鏈接另一種安全技術。如美國海軍網絡防禦體係採用的“縱深防禦”機制,針對核心部署層層防護措施,包括基於標誌的攻擊檢測、廣域網安全審計、脆弱性警報等,攻擊方須突破多個防禦層才能進入系統,從而降低其攻擊成功率。當系統中某節點受到威脅時,能夠及時將威脅信息轉發給其他節點並採取相應防護措施,進行一體化調整和部署防護策略。

昔日的單兵作戰已不能適應當今網絡安全防禦的需要,聯動協同防禦將躍升為網絡安全領域的主流。整合多種防禦技術,建立有組織性的防禦體系,“拒敵於國門之外”才能有效防患於未然。

新“三十六計”之最優策略防禦

在網絡安全風險和投入之間尋求一種均衡

網絡空間的攻擊越來越複雜,理想的網絡安全防護當然是對所有的弱項或攻擊行為都做出對應的防護,但是從防禦資源限制等情況考慮,追求絕對安全的防禦顯然是不現實的。基於“適度安全”的理念,最優策略防禦呼之欲出。

最優策略防禦可以理解為在網絡安全風險和投入之間尋求一種均衡,利用有限的資源做出最合理決策的防禦。就投入而言,即便是實力雄厚的美國,也是盡量打造網絡空間集體防禦體系。美國與澳大利亞網絡空間防禦同盟協定,以及日美網絡防禦合作聯合聲明,其“成果共享”背後亦有“成本分攤”的影子。從風險角度看,對絕對安全的追求將會秉持安全至上原則,在製定相關戰略目標和對威脅作出反應時,易忽視所擁有資源和手段的有限性、合法性,難以掌握進退。

最優策略防禦主要圍繞博弈論的策略“最優”而展開,集中在網絡空間安全測評、代價分析、安全防禦模型構建與演化等研究方向上。將博弈論的思想應用到網絡攻擊和防禦中,為解決最優防禦決策等難題研究提供了一種新思路。

新“三十六計”之入侵容忍防禦

打造網絡空間安全 “最後一道防線”

網絡空間面臨的威脅很多是不可預見、無法抗拒和防不勝防的,防護再好也不能完全避免系統失效甚至崩潰的發生。傳統的可靠性理論和容錯計算技術難以滿足實際需要,這就不得不思考比單純防護更全面、更深層次的問題。在此背景下,新一代入侵容忍防禦愈發受到重視。

入侵容忍是第三代網絡安全技術,隸屬於信息生存技術的範疇,被稱作是網絡空間安全防禦“最後一道防線”。與傳統網絡安全防禦思路不同,入侵容忍防禦承認脆弱點的存在,並假定其中某些脆弱點可能會被攻擊者利用而使系統遭到攻擊。防護目標在受到攻擊甚至某些部分已被破壞或被操控時,防護目標系統可以像壁虎一樣“斷尾求生”,完成目標系統的癒合和再生。

入侵容忍技術不再以“防”為主,而是重在系統已遭破壞的情況下如何減少損失,盡快恢復。但入侵容忍畢竟是一個新興研究領域,其成本、代價、效益等將是下一步的研究方向。

Original Referring URL:  http://www.81.cn/jskj/2016-08/11/

Maintaining Chinese Cyber & Network Security Launching the People’s Fifth Space War //维护中國网络安全,打响第五空间人民战争

Maintaining Chinese Cyber & Network Security Launching the People’s Fifth Space War

//维护中國网络安全,打响第五空间人民战争

President Xi clearly pointed out at the symposium on cybersecurity and informatization: “Network security is for the people, network security depends on the people, and maintaining network security is the common responsibility of the whole society. It requires the government, enterprises, social organizations, and the majority of netizens to participate together. Network security defense. ” 
Maintening China’s network security is an important measure to coordinate and promote the comprehensive construction of a well-off society, comprehensively deepen reforms, comprehensively govern the country according to law, and comprehensively and strictly manage the party’s strategic layout. It is to achieve the goal of “two hundred years” and achieve The important guarantee for the great rejuvenation of the Chinese dream of the Chinese nation.Please pay attention to the report of the “Liberation Army Daily” today –

 

Breaking through the online and offline boundaries, the security situation is severe and complicated

An inconspicuous “worm” has caused an uproar in the world – in May this year, cyberattacks initiated by criminals through tampering with the “eternal blue” program in the National Security Agency arsenal made most of Europe Countries and regions have successively recruited and affected important infrastructures including government, banks, power systems, communication systems, energy companies, airports, and other computer systems in many hospitals in the United Kingdom, resulting in some patients not being able to undergo surgery in time.

Behind this ransomware incident is the escalating confrontational conflict in cyberspace. Zhao Zhiguo, director of the Network Security Administration of the Ministry of Industry and Information Technology, said that only this year, the Ministry of Industry and Information Technology organized the industry forces and coordinated the handling of many attacks against the network and important systems, covering viruses, Trojans, vulnerabilities, traffic attacks and other types, involving network infrastructure public. Systems, important information systems and terminals. “It can be said that cyberattacks are still in a high-risk situation, showing that the threshold is constantly decreasing, the objects are more extensive, and the means are more diverse.”

The data shows that as of the first half of this year, the number of Internet users in China reached 751 million, and the Internet penetration rate reached 54.3%. “When the scale of the Internet is getting bigger and bigger, the challenges facing network security are becoming more and more serious.” In the view of Wu Jianping, an academician of the Chinese Academy of Engineering and a professor at Tsinghua University, the field of network security is constantly expanding. From a global perspective, the threat of cyberattacks is infiltrating into the industrial Internet sector, and industrial Internet security incidents are frequent. In December 2015, a large-scale organized and premeditated directed cyber attack in Ukraine caused a continuous power outage in nearly one-third of the territory. At present, the key infrastructure of various countries has become the target of cyber attacks. Once attacked, it will cause immeasurable damage to national security and social stability.

“The tentacles of cyber attacks extend to all aspects of society, and they are highly integrated online and offline. Network security is becoming the core issue of global security.” Zhou Hongyi, chairman of Qihoo 360, believes that after more than 20 years of development, the Internet is no longer An industry that is increasingly integrated with society as a whole. Coupled with the development of the Internet of Things, the Internet of Vehicles, and the Industrial Internet, the boundaries between the real physical world and the virtual world of the Internet are broken, and the online and offline are integrated. In this context, the attacks in the online world begin to spread to our real world. .

To be sure, the forms of cyber attacks are diverse and complex, and the cyber security situation is still grim. Global cybersecurity has gradually entered a era of security involving national security, national defense security, social security, industrial security, infrastructure security and even personal security.

There is no battlefield for smoke, and cyber war has never died.

There is a term in the software development industry called “Thousand Line Code Defect Rate”, which means the vulnerability rate in a thousand lines of code. There is probably a vulnerability in every thousand lines of code in most software companies. According to calculations, the code size of the most commonly used Windows operating system is about 50 million lines, and the Android system is about 12 million lines. The loopholes can be imagined.

“There are only two systems in the world, one is a system that has been known to be broken, and the other is a system that has been broken but not yet known.” The first US Army commander Alexander at the 2015 China Internet Security Conference The speech was impressive, and his point was that there was no safe system in front of the attackers.

“Any network system in the real world, even if the design is more sophisticated, the structure is more complicated, there will be loopholes without exception.” Zhou Hongyi pointed out that the 360 ​​community patching vulnerability response platform discovered more than 80,000 holes a year. These vulnerabilities may become the soft underbelly of the system suffering from cyber attacks.

The 360 ​​Threat Intelligence Center found that among the many advanced sustainable threats they monitored, the attackers had mostly infiltrated or lurked for a long time and concealed themselves through various means.

There are examples to prove. The Bushehr nuclear power plant, located 100 kilometers south of the Iranian capital Tehran, was a secret target guarded by the National Defence Force. In July 2010, it was attacked by a new type of network virus called “Seismic Network”. The 8000 centrifuges working in the nuclear power plant suddenly In the event of a failure, computer data was lost in a large area, and thousands of units were physically damaged. In 2014, internal documents of two nuclear power plants in South Korea were leaked, including personal information of nearly 10,000 employees of nuclear power plants, operating instructions for nuclear power plants, air conditioning and cooling systems. Design drawings, valve design drawings, etc. A US government report said that since May this year, hackers have been infiltrating the computer networks of US nuclear power plants and other energy equipment companies.

Unlike traditional warfare, which has a clear beginning and end, cyber warfare is constantly being declared. In this sense, the world has entered the era of cyber warfare. On the battlefield where there is no smoke, the planes and artillery that people paid attention to in the past have disappeared, and the new network virus has already appeared on the scene.

“The cyberattacks on critical infrastructure can even surpass the war in the traditional sense. It is almost impossible for nuclear states to use nuclear weapons, but cyber attacks are currently close to being unconstrained.” Cyberspace Security and Security Liu Weijun, a professor at the Center for Rule of Law, said that even worse than the destruction of the Ukrainian power system, nuclear power plants were attacked, directly threatening national security.

Relying on the people is the key path to building a network power

In September this year, with the theme of “Network Security for the People, Network Security Relying on the People”, a feature film “Fifth Space” became popular.

“People are always the most important factor. Network security is not a matter of purchasing and deploying a batch of network security equipment and stacking some products. It also requires a large number of professionals to analyze, judge, respond and dispose of.” Zhou Hongyi said It is necessary to play every network user so that everyone can actively play their role.

It is understood that since 2014, China has continuously held national network security publicity activities, popularized network security knowledge, strengthened network security education, and promoted a good atmosphere in which the whole society attaches importance to network security. “National cybersecurity propaganda should enhance the awareness of cyber security among all people, pay attention to the improvement of cyber security prevention capabilities, and let the broad masses of people have the awareness and ability to maintain their own network security. They can use the network like water, electricity, and fire. Qin An, director of the China Cyberspace Strategy Institute and director of the Internet Policy and Law Research Center of Tianjin University, said that cybersecurity depends on the people. Only relying on the people is the key path to building a network power.

“To maintain network sovereignty, it is necessary to strengthen the construction of defense forces in cyberspace and enhance the self-defense capabilities of cyberspace.” Qin An pointed out that the “Network Security Law” was officially implemented on June 1 this year, and one of its core objectives is to maintain cyber sovereignty. At the same time, the “International Cooperation Strategy for Cyberspace” promulgated on March 1 this year, in the third chapter of the strategic objectives to maintain sovereignty and security, for the first time to define the national definition of defensive forces in cyberspace, the construction of cyberspace defense forces as China’s national defense and military modernization Important content of construction.

The national defense white paper “China’s Military Strategy” clearly states that it is necessary to speed up the construction of cyberspace forces, improve the cyberspace situational awareness, cyber defense, support national cyberspace struggles and participate in international cooperation, curb major cyberspace crisis, and safeguard national networks and Information security, safeguarding national security and social stability.

Safety is the premise of development, and development is the guarantee of security. Building a network power, the nation’s awareness of improving network security is the foundation. At present, China is accelerating its march from a big network country to a network power. More than 1.3 billion Chinese people really enjoy the new achievements brought about by the development of the Internet. For the realization of the goal of “two hundred years”, the strategy of network power will play a role. More and more important support.

Construct an unbreakable security line

■ Li Yang

In the report of the 19th National Congress of the Communist Party of China, President Xi proposed to strengthen the application of basic research, expand the implementation of major national science and technology projects, highlight key common technologies, leading-edge technologies, modern engineering techniques, and subversiveness. Technological innovation provides strong support for building a strong country in science and technology, a country with strong quality, a strong country in space, a network power, a powerhouse, a digital China, and a smart society. Among them, the strategy of network power is once again mentioned, exciting and inspiring. In line with the development trend of the times, comprehensive maintenance of cyberspace security is the only way to build a network power.

The Cong listened to the silence, and the Ming was seen in the shape. With the rapid development of the information revolution, the network space consisting of the Internet, communication networks, computer systems, automation control systems, digital devices and their applications, services and data has profoundly affected the historical development of human society and comprehensively changed people’s production. lifestyle. Especially in the current global economic integration and internationalization of professional division of labor, cyberspace security is characterized by soft activity, border flexibility, diversification of means, domain widening and diversification of power, and is increasingly expanding to The mixed complex confrontation between the state, the military, and various purpose-oriented organizations and individuals implies a mixed risk of defamation of productivity, culture, and combat effectiveness.

The person in charge of the relevant department of the Central Network Office said that the five years since the 18th National Congress of the Communist Party of China was the fastest five years of cyberspace security development and five years of brilliant achievements in the field of cyberspace security. The “China Internet Station Development Status and Safety Report (2017)” shows that the tampering websites and government websites in China fell by 31.7% and 47.9% respectively last year. The overall level of government website security protection has been greatly improved; DDoS attacks of more than 1G have dropped by 60%.

The results are gratifying, but they should also be soberly aware that there are still many problems in the actual work that cannot keep up with the ideological concepts, and that there are consensuses that are difficult to implement. The implementation of cyberspace security measures is not in place or even “hanging the gap”. Cyberspace security is a holistic security. If a link is broken, it may lead to the collapse of the entire network. We can’t be lucky and slack, we must start from the various aspects of technology, equipment, personnel, management, etc., and build and deploy according to the road map of “laying up positions, deploying capabilities, and forming systems”. Practice, actively discover vulnerabilities, eliminate potential threats, continuously improve the security of cyberspace, and achieve new developments at a new starting point.

The construction of cyberspace security is a long-term, complex system engineering, which is not easy to beat and drum. To achieve this goal, there is not only a slap in the face, but also the tenacity of “do not relax”. It must be step by step, gradually promoted and implemented. Only in this way can we build an unbreakable security line.

Original Mandarin Chinese:

习主席在网络安全和信息化工作座谈会上明确指出:“网络安全为人民,网络安全靠人民,维护网络安全是全社会共同责任,需要政府、企业、社会组织、广大网民共同参与,共筑网络安全防线。”
维护我国网络安全,是协调推进全面建成小康社会、全面深化改革、全面依法治国、全面从严治党战略布局的重要举措,是实现“两个一百年”奋斗目标、实现中华民族伟大复兴中国梦的重要保障。请关注今日《解放军报》的报道——

维护网络安全,打响第五空间人民战争

■何楚洋

突破线上线下界限,安全形势严峻复杂

一只不起眼的“蠕虫”,竟然在全球引起了轩然大波——今年5月,由不法分子通过篡改美国国家安全局武器库中的“永恒之蓝”程序而发起的网络攻击,使大多数欧洲国家和地区相继中招,波及到包括政府、银行、电力系统、通信系统、能源企业、机场等重要基础设施,如英国多家医院的电脑系统瘫痪,导致部分病人无法及时接受手术。

这起勒索病毒事件的背后,是网络空间日益升级的对抗冲突。工信部网络安全管理局局长赵志国表示,仅今年工信部就组织行业力量,相继协调处置多起针对网络和重要系统的攻击事件,涵盖病毒、木马、漏洞、流量攻击等多种类型,涉及网络基础设施公共系统、重要信息系统和终端。“可以说网络攻击仍处于高发态势,呈现出门槛不断降低,对象更加广泛,手段更加多样。”

数据显示,截至今年上半年,我国网民规模达7.51亿,互联网普及率达54.3%。“当互联网的规模越来越大,网络安全面临的挑战也是日趋严峻的。”在中国工程院院士、清华大学教授吴建平看来,网络安全的领域正在不断延伸。从全球角度来看,网络攻击威胁正向工业互联网领域渗透,工业互联网安全事件频发。2015年12月,乌克兰发生了一次影响巨大的有组织、有预谋的定向网络攻击,致使乌境内近三分之一的地区持续断电。目前各国的关键基础设施已成为网络攻击的对象,一旦被攻击导致瘫痪,将给国家安全、社会稳定造成不可估量的伤害。

“网络攻击的触手延伸到社会各个方面,线上与线下高度融合,网络安全正在成为全球安全的核心问题。”奇虎360公司董事长周鸿祎认为,经过20多年的发展,互联网已经不再是一个行业,它与整个社会的结合越来越紧密。加上现在物联网、车联网、工业互联网的发展,真实物理世界和网络虚拟世界的界限被打破,线上线下连成一体,在这样的背景下,网络世界的攻击开始蔓延到我们的真实世界。

可以肯定的是,网络攻击形式多样复杂,网络安全形势依然严峻,全球网络安全逐渐进入到涉及国家安全、国防安全、社会安全、产业安全、基础设施安全甚至人身安全的大安全时代。

没有硝烟的战场,网络战从未偃旗息鼓

软件开发行业里有个名词,叫“千行代码缺陷率”,意思是一千行代码中的漏洞率。绝大部分软件公司的每一千行代码就有可能存在一个漏洞。据计算,最常使用的Windows操作系统的代码量是5000万行左右,安卓系统大概是1200万行,其中的漏洞可想而知。

“世界上只有两种系统,一种是已知被攻破的系统,一种是已经被攻破但自己还不知道的系统。”美国首任网军司令亚历山大在2015年的中国互联网安全大会上的发言让人印象深刻,他的观点是,在攻击者面前,没有任何安全的系统。

“现实世界中的任何网络系统,即使设计再精巧,结构再复杂,无一例外都会有漏洞。”周鸿祎指出,360社区补天漏洞响应平台一年发现的漏洞数就超过了8万个。这些漏洞,都有可能成为系统遭受网络攻击的软肋。

360威胁情报中心发现,他们监测到的多个高级可持续威胁事件中,攻击者大都已经渗透或者潜伏了很长时间,并且通过各种手段隐匿自己。

有例为证。位于伊朗首都德黑兰以南100公里的布什尔核电站是由国防军守卫的机密目标,在2010年7月被一种名为“震网”的新型网络病毒侵害,核电站里正在工作的8000台离心机突然出现故障,电脑数据大面积丢失,上千台被物理性损毁;2014年,韩国2座核电站的内部文件遭到泄露,包括核电站近万名员工的个人信息、核电站程序运行说明、空调和冷却系统设计图、阀门设计图等。美国政府的一份报告称,自今年5月以来,黑客一直在渗透美国核电站和其他能源设备公司的计算机网络。

不同于传统战争有明显的开始和结束,网络战时时刻刻都在不宣而战。从这层意义上说,全世界已经进入网络战时代。而在这片不见硝烟的战场上,过去人们关注的飞机、大炮不见踪影,新型的网络病毒就已经粉墨登场了。

“对关键基础设施的网络攻击,其破坏效果甚至能超越传统意义上的战争。有核国家几乎不可能动用核武器,但是网络攻击在目前却接近于不受任何约束。”公安大学网络空间安全与法治协创中心教授刘为军表示,与乌克兰的电力系统遭到破坏相比,更可怕的是核电站遭到攻击,直接威胁着国家安全。

依靠人民,才是建设网络强国关键路径

今年9月,以“网络安全为人民,网络安全靠人民”为主题的第四届网络安全周上,一部专题片《第五空间》迅速走红成为人们热议的焦点。

“人永远是最重要的因素,网络安全不是购买并部署一批网络安全设备、堆砌一些产品就能防得住的,还需要大量的专业人员来做分析、研判、响应和处置。”周鸿祎说,要把每一个网络用户发挥起来,让每一个人都能积极发挥自己的作用。

据了解,我国自2014年起,开始连续举办国家网络安全宣传活动,普及网络安全知识,加强网络安全教育,推动形成全社会重视网络安全的良好氛围。“国家网络安全宣传要在提升全民网络安全意识的同时,重视网络安全防范能力的提升,让广大人民群众既有意识又有能力维护自身网络安全,能够像用水、用电、用火一样用好网络。”中国网络空间战略研究所所长、天津大学互联网政策与法律研究中心主任秦安表示,网络安全依靠人民,只有依靠人民,才是建设网络强国关键路径。

“维护网络主权,就要加强网络空间国防力量建设,提升网络空间的自卫能力。”秦安指出,《网络安全法》于今年6月1日起正式实施,其核心目标之一就是维护网络主权。同时,今年3月1日颁布的《网络空间国际合作战略》在第三章战略目标维护主权与安全部分,首次明确网络空间国防力量的国家定义,将网络空间国防力量建设作为我国国防和军队现代化建设的重要内容。

国防白皮书《中国的军事战略》明确提出,要加快网络空间力量建设,提高网络空间态势感知、网络防御、支援国家网络空间斗争和参与国际合作的能力,遏控网络空间重大危机,保障国家网络与信息安全,维护国家安全和社会稳定。

安全是发展的前提,发展是安全的保障。建设网络强国,全民提升网络安全意识是基础。当前,我国正在加速从网络大国向网络强国迈进,13多亿中国人民实实在在享受到互联网发展带来的新成果,为着“两个一百年”奋斗目标的实现,网络强国战略将发挥着越来越重要的支撑作用。

构筑牢不可破的安全防线

“善其谋而后动,成道也。”习主席在党的十九大报告中提出,加强应用基础研究,拓展实施国家重大科技项目,突出关键共性技术、前沿引领技术、现代工程技术、颠覆性技术创新,为建设科技强国、质量强国、航天强国、网络强国、交通强国、数字中国、智慧社会提供有力支撑。其中,网络强国战略再次被提及,令人振奋,鼓舞人心。顺应时代发展趋势,全面维护网络空间安全,就是建设网络强国的必由之路。

聪者听于无声,明者见于未形。伴随信息革命的飞速发展,由互联网、通信网、计算机系统、自动化控制系统、数字设备及其承载的应用、服务和数据等组成的网络空间,深刻影响人类社会历史发展进程,全面改变人们的生产生活方式。尤其是在当前全球经济一体化、专业分工国际化的大环境下,网络空间安全呈现出活动软性化、边境弹性化、手段多样化、范畴全域化和力量多元化的特征,并且日益扩展为国家、军队及各种目的性组织和个人之间的混合复杂对抗,蕴含着毁瘫生产力、文化力、战斗力的混合风险。

中央网信办相关处室负责人表示,党的十八大以来的五年,是网络空间安全发展最快的五年,也是网络空间安全领域取得辉煌成绩的五年。《中国互联网站发展状况及其安全报告(2017)》显示,去年我国境内被篡改网站与政府网站分别下降31.7%和47.9%。政府网站安全防护水平整体得到了很大提高;1G以上DDoS攻击事件下降60%。

成绩固然喜人,但也应当清醒地看到,实际工作中还存在着思想观念跟不上、有共识难落实等诸多问题,网络空间安全措施执行不到位甚至“挂空挡”情况依然存在。网络空间安全,是整体性安全,一个环节被攻破,就可能导致全网的崩溃。我们不能心存侥幸和懈怠,必须扎扎实实地从技术、装备、人员、管理等各个环节入手,按“布设阵地、配置能力、形成体系”的路线图进行建设和部署,真刀真枪地开展演练,主动发现漏洞,消除潜在威胁,不断提升网络空间安全保障能力,在新的起点上实现新发展。

网络空间安全的构建是一项长期、复杂的系统工程,绝非敲锣打鼓、轻轻松松实现的。实现这一目标,既少不了一鸣惊人的霹雳手段,更需要有“咬定青山不放松”的韧劲,必须一步一个脚印,逐步推进,落地落实。惟有如此,才能构筑牢不可破的安全防线。

Original referring URL:  http://www.81.cn/jskj/2017-11/29/

Chinese Military Analysis of Cyber Space Deterrence – Important Strategic Points // 淺析網絡空間威懾的特徵、類型和運用要點

Chinese Analysis of Cyber Space Deterrence – Important Strategic Points

淺析網絡空間威懾的特徵、類型和運用要點

Chinese People’s Liberation Army Academy of Military Sciences Yuan Yi

January 04, 2016    

Editor’s note: When both opposing parties have the ability to ensure intrusion and damage to the other party’s network, they can bring about two-way network containment, making the two parties obliged to comply with the game rules that do not attack each other’s network under certain conditions, forming an invisible safety valve. Even international conventions or conventions that do not attack each other’s networks will be formed. The cyberspace has thus become a strategic area that can produce a huge deterrent effect. After the deterrence of cyberspace followed by nuclear deterrence, it began to enter the strategic vision of big country politicians and military strategists. Studying the characteristics, types, and points of use of cyberspace deterrence must be taken into consideration and necessary action by the Internet powers and the cyber force.

With the increasing dependence of human society on cyberspace, cyberspace has become the “second type of living space” for human production and life and the “fifth-dimensional combat space” for military confrontation. Countries around the world have fiercely competed for the dominant rights, control rights, and discourse power of cyberspace. The competition in the cyberspace has reached the level of human survival, national destiny, and success or failure of military struggles. Thinking about cyberspace deterrence capacity building has great practical and theoretical value.

First, analysis of the advantages and disadvantages of cyberspace deterrence

Cyberspace deterrence refers to the actions and actions taken in the cyberspace to demonstrate and control enemy cyberspace, and to control the enemy’s physical space through cross-domain cyberspace, so as to achieve the goal of destroying enemy forces, stopping the enemy, blocking the enemy, and preventing deterrence. A form of strategic deterrence for the enemy’s purpose. Compared with the physical space, the “virtual and real duality” of network space and the uniqueness of network warfare compared with traditional combat styles have determined that the advantages and disadvantages of cyberspace deterrence are very obvious.

(A) The advantages of cyberspace deterrence

The advantages of cyberspace deterrence are mainly reflected in the following: First, the deterrence approach has become more civilized and humane. Compared with nuclear, chemical, and chemical weapons based on physical, biological, and chemical killing mechanisms, the direct killing and destructive effects of cyber warfare weapons are much smaller than the former. Normally, they will not cause permanent damage and pollution to the natural environment, nor will they cause large numbers of people. Casualties and humanitarian disasters. Second, deterrence costs are inefficient. The network warfare weapons are dominated by viruses, Trojans and other software. The costs are relatively low, and the technical threshold is low. The destructive effects are rather alarming. The network defense points are multi-faceted, and they are hard to prevent. To increase the level of network security by one level, the input cost will increase exponentially. The contrast between the low cost of cyber offense and the high cost of cyber defense makes the offensive and defensive performance of the network a feature of “spirit shield”, and the cyber warfare weapon is thus called “the atomic bomb of the poor country”. The third is that deterrence methods are diverse and practical. The variety of cyber warfare weapons and the multiple goals of cyber attacks have determined that there are diversified cyberspace deterrent methods to choose from. The effects of cyberattacks are recoverable to a certain extent. As long as the application is properly implemented, the risk of causing war and escalating the war is relatively small. In a sense, the deterrence value of nuclear weapons is far greater than the value of actual combat, and cyber warfare weapons are both practical values ​​and deterrence values. Fourth, the use of repeatability and deterrence is strong. Once the “nuclear threshold” crosses, a full-scale nuclear war will erupt, and the two sides at the nuclear balance will fall into a state of mutual destruction. The easy implementation of nuclear deterrence, especially nuclear deterrence against non-nuclear countries, will also be condemned by international public opinion. These factors are all The use of nuclear deterrence is greatly limited. The deterrence of software and hardware and the controllable characteristics of cyberspace deter- mine the flexibility and control of deterrence in light of the changes and needs of the military struggle. It can be used in advance, used throughout, and used repeatedly. It has strong flexibility.

(B) Defects in cyberspace deterrence

The deterrence of cyberspace is mainly reflected in: First, the credibility of the deterrence effect has not been fully verified. The credibility of nuclear deterrence has been verified in actual combat. However, as of now, the real network war has not really exploded. People’s astonishing destructive power over cyber warfare is more of a speculation and worry. The real power of cyber warfare can only be convincing after being tested by actual combat. Second, the reliability of deterrence measures is not very high. Network warfare is a dynamic process of continuous offensive and defensive interaction between the two sides of the enemy and me. The characteristics of network confrontation and technicality determine that the network warfare attack has greater uncertainty and may not achieve the desired operational objectives, which will greatly reduce the effectiveness of deterrence. . For example, when the enemy performs cyberspace deterrence, if the enemy takes various effective defense measures in a timely manner, it will increase the difficulty of its own cyber attack and reduce the damage, and even lead to the failure of the attack. Third, the controllability of deterrence scope needs further improvement. As one of the important weapons of cyber warfare, viral weapons have strong dissemination, poor controllability, and a wide range of influence. It is difficult to launch targeted and targeted attacks on enemy computers and networks. If it can’t control its effective scope, it will spread to third-party neutral countries and even make itself a victim. As a result, the use of virus weapons suffers from the use of “imposed rats.” The fourth is the selective limitation of deterrence objects. Nuclear deterrence is clear and effective for any country, and the effectiveness of cyberspace deterrence has a lot to do with the level of informatization of enemy countries. Cyberspace deterrence is extremely effective for countries with a high degree of informatization, and for those underdeveloped countries with weak information infrastructure and weak network dependence, it is difficult for them to exert results, or even completely ineffective. Fifth, the organization of deterrence is relatively complicated. All nuclear powers in the world implement centralized and unified management of strategic nuclear forces. Command and control powers are highly centralized. When organizations implement nuclear deterrence operations, they can accurately control each combat unit, and the organization is well-executed. The implementation of the deterrence of cyberspace involves many forces such as investigation, control, defense, and control. It has many personnel and large scales and is scattered among different departments and units in the military and the military. It is very complicated to organize and it is difficult to form a synergy.

Second, the main types of cyberspace deterrence

The cyberspace deterrence includes four types: cyberspace technology test deterrence, cyberspace equipment demonstration deterrence, cyberspace operational deterrence deterrence, and cyberspace operational deterrence. Among them, the first three are demonstrative deterrence, and the latter is actual deterrence.

(A) Cyberspace Technology Test Deterrence

The cyberspace technology test deterrence is a field in the field of cyber warfare. It constantly conducts preliminary exploratory experiments on new concepts of warfare, new experiments on the effectiveness of attack mechanisms and tactics, and practical experiments on the weaponization of new technologies. The outside world is disclosed to demonstrate its strong strength in the basic research of information technology and its enormous potential for transforming it into a cyber warfare capability to achieve deterrence. At present, network offensive and defensive technology is still developing rapidly. A breakthrough in a key technology will often have a significant impact on cyberspace security and operations, and even lead to revolutionary changes. Whoever preempts the strategic commanding heights of the network offensive and defensive technology, who will be able to achieve a clear advantage in the future of network warfare.

(B) Cyberspace Equipment Demonstration

The demonstration of cyberspace equipment deterrence is the development of network warfare equipment development planning, technology development, target testing, stereotyped production and other development stages. According to the needs of the appropriate disclosure of network warfare equipment models, performance, characteristics, parameters and development schedule, etc. Reach the purpose of deterring opponents. There are two main ways: one is through public disclosure in official media such as national defense white papers, diplomatic bulletins, and newspapers, periodicals, and large-scale websites; and the other is through online social media or other unofficial. The channel has deliberately leaked equipment-related information and implemented hidden deterrence. The cyber space equipment demonstrates deterrence. On the one hand, it can invent new cyber-warfare equipment with new mechanisms and new concepts and render its unique combat capabilities. On the other hand, it can deliberately exaggerate the operational effectiveness of existing cyber warfare equipment. There are facts in the virtual reality, there is something in the real, and the implementation of fuzzy policies, so that the other party can not understand their true situation and strength, resulting in fear and jealousy. For example, the U.S. military’s “Shuute” on-board network power system has been put into practical use several times and poses a serious threat to the air defense systems of its hostile countries. However, its basic principles, working mechanisms, and combat technical indicators have not been publicly disclosed. It has not been completely mastered by other countries and has remained in a state of secrecy. It is difficult to distinguish between reality and reality and has played a very good deterrent effect.

(3) Deterrence in cyberspace operations exercises

The deterrence of cyberspace operations exercises is to conduct drills in cyberspace through virtual or virtual methods, and use various media channels to show potential war opponents their own cyber warfighting capabilities, strengths and determinations in order to achieve deterrence. Cyberspace operations can be divided into two kinds: actual drills and virtual exercises. The former is usually carried out nationwide or in alliance with allies, and is generally based on the joint exercise of military space and space defense operations. In recent years, the United States and its allies have held “Network Storm” series of cyber warfare exercises and “Shriver” series of space-network space exercises, which have demonstrated the mobilization strength, overall defense level, and the implementation of cyber warfare. Determination. The latter is usually held at the national large-scale network integrated shooting range, and is generally based on the offensive actions of the military professional cyber warfare forces.

(D) Deterrence in cyberspace operations

The deterrence of cyberspace operations is the actual deterrence of attacking specific opponents by deterring opponents with certain attacks. There are two opportunities for its use: First, when one’s own side is aware that the enemy is about to wage a war on one’s own side, one’s own choice of the key cyber targets of the enemy’s key defenses will be targeted to combat them, and preventive and deterrent deterrence will be implemented; When the Party initiates a tentative cyber attack on its own side and implements cyberspace deterrence, it must immediately conduct effective retaliatory and disciplinary deterrence. There are many types of cyber warfare operations that have deterrent effects. For example, infiltrate the enemy’s telecommunications network, send a large number of anti-war messages to the enemy’s citizens, and attack the enemy’s power grid, resulting in a short-term blackout of major cities in the enemy’s power; attacking the enemy’s broadcast television networks and inserting their own broadcasts during prime time. Special video programs; etc.

Third, the use of cyberspace deterrence points

The general requirements for the use of cyberspace deterrence are: combination of wartime and warfare, with strength, actual display capability, and determination, strive to demonstrate deterrence with small battles, ensure deterrence with strikes, and achieve deterrence with a small price. Specifically, the following points should be achieved.

(A) Combination of peacetime and long-term preparation

“Frozen feet, not a cold day.” Successful implementation of cyberspace deterrence requires a combination of peacetime and warfare, and we must fully and carefully prepare for peacetime. The first is to conduct comprehensive and thorough network reconnaissance. Requires the combination of spying, reconnaissance and technical reconnaissance, wireless reconnaissance, and cable reconnaissance. Conduct long-term and continuous network reconnaissance of enemy network targets, gradually understand the basic conditions of the enemy’s network, draw a picture of its network topology, and in particular analyze and find all kinds of soft enemies. Hardware system vulnerabilities. The second is to conduct a large number of effective strategic presets. Using hacking methods, secretive infiltrate all types of networks through the use of system vulnerabilities or password cracking, leaving the back door, setting up a springboard machine, and laying down logic bombs and Trojans to set a breakthrough for launching cyber attacks in the future. The third is to conduct pre-prepared cyber defenses. When deterring cyberspace deterrence against the enemy, one must adjust the deployment of network defenses in advance, make the enemy’s pre-designed attack path, anticipate the use of system loopholes, and plan to implement an attack plan that is difficult to implement, or the effect of implementation is greatly reduced to minimize the enemy’s Losses caused by cyber retaliation.

(B) careful decision-making, control strength

Sun Tzu said: “The Lord must not anger and raise a teacher. Cyberspace deterrence is a strategic game behavior between countries, especially with deterrence and sensitivity. It must be rational, beneficial, and tangible. It must not be abused because of the low threshold of deterrence. Otherwise, its effect may be counter-productive. . Cyberspace deterrence has a high requirement for combat intensity control. On the one hand, if the intensity is too small, the enemy’s government and people will not have fear and will not achieve the deterrent effect they deserve. The other party may also use the same methods to implement anti-deterrence, eventually leading to confrontational escalation and deterring one’s own deterrence. On the other hand, if it is too strong, it will cause huge economic losses and casualties to the enemy countries. This will cause the condemnation of the international community and the hatred of the enemy governments and people. It may trigger the enemy’s use of conventional forces to carry out large-scale revenge. Nuclear countries may even Nuclear power may be used. This will not only stop the war but will also play a role in warfare.

(III) Unified command and careful organization

The implementation of the deterrence of cyberspace requires centralized command, unified planning, and good coordination. The first is meticulous organization of strength. Uniformly organize the four forces of military investigation, attack, defense, and control, and actively coordinate the strength of the cyber warfare forces of all parties to form a joint force. In particular, it is necessary to organize and coordinate the strength of civil non-professional cyber warfare, especially patriotic hacking, so that there can be no phenomenon of “blindness” so as to avoid triggering friction, escalating fire, causing an escalation of cyber warfare, or prematurely exposing attack intentions and giving people a handle. , leading to uncontrollable situations or failure of operations. The second is to select the target. Should choose a wide range of influence, easy to produce a clear deterrent effect of the goal. For example, broadcast television channels with the highest ratings, portals with a large number of visitors, and wireless communication networks with numerous users. It is not possible to choose attacks that are irrelevant, insignificant, and indifferent to the target. They can easily be mistaken for cybersecurity incidents created by ordinary hackers and do not achieve the desired deterrent effect. In addition, we must also consider the constraints of international law and war laws. We must not choose targets that are easy to cause humanitarian disasters. We should try our best not to select the network goals of railways, aviation, finance, and medical departments so as not to arouse condemnation and resentment from the international community and the people of the other side. The third is the precise control of the process. Prior to the deterrent strikes in cyberspace, it is necessary to publicize the momentum through extensive public opinion, issue warnings to the enemy countries, and declare the justice of their actions to the world in order to gain the understanding and support of international public opinion. In order to highlight the deterrent effect, one can highly announce the target of the enemy’s network to be attacked, break through the enemy’s layered network defenses, and implement a resolute and effective cyber attack. If necessary, the network attack effect can be resumed regularly to show its superiority. The cyber attack technology and means make the enemy’s decision makers and the public have a sense of frustration that is hard to defend and difficult to parry, thus forming a strong shock effect.

(4) Combining actual situation with actual situation, focusing on strategy

The grandson said that “it is not possible to show and not to use it,” and it is used to deter online space. Its main points are summarized as “showing without propaganda, advocating without showing.” “Indicating nothing” means that it is difficult to track and locate using cyber attacks and conduct cyber attacks on specific targets. However, it is not done for others to announce that they are doing their own thing. It not only demonstrates their own capabilities, but also makes the enemy’s suspicion of doing their own thing. However, there is no evidence and it cannot be pursued. “Proclaiming but not showing” is the publicity or inadvertent disclosure of the type, performance, and characteristics of the advanced cyber warfare equipment developed or fabricated by the company, deliberately exaggerating its combat effectiveness, falsifying facts, and integrating facts and facts, so that the enemy can’t understand its true strength. , resulting in a deterrent effect. The cyber warfare operations have the characteristics of difficulty in tracking and traceability and complexity in forensics. The initiating party can either admit or deny it, or push the responsibility to civil hacker organizations. (Source: China Information Security).

Original Communist Mandarin Chinese:

編者按:當敵對雙方都具有確保侵入破壞對方網絡的能力時,就可以帶來雙向網絡遏制,使得雙方不得不在一定條件下,遵守互不攻擊對方網絡的遊戲規則,形成一個無形的安全閥,甚至國際上也會形成互不攻擊對方網絡的慣例協議或公約,網絡空間由此成為可以產生巨大威懾效應的戰略領域。網絡空間威懾繼核威懾之後,開始進入大國政治家和軍事家的戰略視野。研究網絡空間威懾的特徵、類型和運用要點,成為網絡強國、網絡強軍的必須考量和必要行動。

隨著人類社會對網絡空間依賴程度的不斷加深,網絡空間成為人類生產生活的“第二類生存空間”和軍事對抗的“第五維作戰空間”。世界各國圍繞網絡空間的主導權、控制權、話語權展開了激烈的爭奪,網絡空間的競爭已達到與人類生存、國家命運和軍事鬥爭成敗休戚相關的程度。思考網絡空間威懾能力建設,具有重大現實和理論價值。

一、網絡空間威懾的優劣分析

網絡空間威懾,是指在網絡空間採取各種行動,展示癱瘓控制敵方網絡空間,並通過網絡空間跨域控制敵方實體空間的決心和實力,從而達到懾敵、止敵、阻敵、遏敵目的的一種戰略威懾形式。網絡空間與實體空間相比所具有的“虛實二相性”,網絡戰與傳統作戰樣式相比所具有的獨特性,決定了網絡空間威懾的優缺點都非常明顯。

(一)網絡空間威懾的優點

網絡空間威懾的優點,主要體現在:一是威懾方式更趨文明和人道。與基於物理、生物、化學殺傷機理的核生化武器相比,網絡戰武器的直接殺傷和破壞效應要遠小於前者,通常不會對自然環境造成永久性破壞和污染,也不會造成大量的人員傷亡,並引發人道主義災難。二是威懾成本低效費比高。網絡戰武器以病毒、木馬等軟件為主,成本相對低廉,技術門檻較低,而造成的破壞效果卻相當驚人。網絡防禦點多面廣,防不勝防,要網絡安全程度每提高一個等級,投入成本會呈指數級增加。網絡進攻的低成本與網絡防禦的高成本對比鮮明,使得網絡攻防呈現“矛尖盾薄”的特點,網絡戰武器因而被稱為“窮國的原子彈”。三是威懾手段多樣實用性強。網絡戰武器多種多樣,網絡攻擊目標多元,決定了有多樣化的網絡空間威懾手段可供選擇。網絡攻擊效果在一定程度上是可恢復的,只要運用實施得當,引發戰爭和促使戰爭升級的風險相對較小。從某種意義上講,核武器的威懾價值遠大於實戰價值,而網絡戰武器則是實戰價值與威懾價值兼具。四是威懾運用可重複靈活性強。 “核門檻”一旦跨過就會爆發全面核戰爭,處於核均勢的雙方將陷入相互摧毀狀態,輕易實施核威懾特別是對無核國家進行核威懾,還會招致國際輿論的譴責,這些因素都極大地限制了核威懾手段的使用。而網絡空間威懾軟硬結合、威力可控的特點,決定了其可根據軍事鬥爭形勢的變化和需要,適時調控威懾強度,先期使用、全程使用、反複使用,具有很強的靈活性。

(二)網絡空間威懾的不足

網絡空間威懾的不足,主要體現在:一是威懾效果的可信性未得到充分驗證。核威懾的可信度已在實戰中得到了驗證。然而,截止目前,真正意義上的網絡大戰還沒有真正爆發過。人們對網絡戰驚人的破壞力,更多的只是一種猜測和擔憂,網絡戰的真實威力只有經過實戰檢驗後,才能真正令人信服。二是威懾手段的可靠性不太高。網絡戰是敵我雙方網絡攻防持續互動的動態過程,網絡對抗複雜、技術性強的特點,決定了網絡戰攻擊效果具有較大的不確定性,有可能達不到預期作戰目的,使威懾效果大打折扣。例如,對敵實施網絡空間實戰威懾時,敵方若及時採取各種有效防御手段,就會增加己方網絡攻擊的難度和降低破壞效果,甚至導致攻擊行動的失敗。三是威懾範圍的可控性需進一步改善。病毒武器作為網絡戰的重要武器之一,其傳播性強、可控性較差、影響範圍比較廣,很難針對敵國計算機和網絡發動專門性、針對性極強的攻擊。如果不能控制其有效作用範圍,就會波及第三方中立國家,甚至使自身也成為受害者,因而病毒武器的使用有“投鼠忌器”之患。四是威懾對象的可選擇性受限。核威懾對任何國家都是明確而有效的,而網絡空間威懾的效果與敵國的信息化程度有很大關係。網絡空間威懾對信息化程度高的國家極為有效,而對那些信息基礎設施薄弱,網絡依賴性不強的不發達國家,則很難發揮效果,甚至完全不起作用。五是威懾實施的組織相對複雜。世界各個核國家無不對戰略核力量實施集中統管,指揮控制權高度集中,組織實施核威懾行動時可以準確控製到每一個作戰單元,組織實施十分周密。而網絡空間威懾的組織實施,要涉及偵、控、防、控等多支力量,人員多、規模大,且分散在軍地不同部門和單位,組織起來非常複雜,形成合力不易。

二、網絡空間威懾的主要類型

網絡空間威懾主要有網絡空間技術試驗威懾、網絡空間裝備展示威懾、網絡空間作戰演習威懾和網絡空間作戰行動威懾四種類型。其中,前三種是示形威懾,後一種是實戰威懾。

(一)網絡空間技術試驗威懾

網絡空間技術試驗威懾,是在網絡戰領域,經常性地進行新作戰概念的先期探索性試驗、新攻擊機理和戰術的效果印證性試驗、新技術的實用化武器化試驗等,並通過媒體向外界披露,以展現本國雄厚的信息技術基礎研究實力,以及轉化為網絡戰能力的巨大潛力,以達到威懾對手的目的。當前,網絡攻防技術仍在快速發展,一項關鍵性技術的突破,往往會對網絡空間安全和作戰產生重大影響,甚至引發革命性變化。誰搶先佔領了網絡攻防技術的戰略制高點,誰就能在未來網絡戰中取得明顯優勢。

(二)網絡空間裝備展示威懾

網絡空間裝備展示威懾,是在網絡戰裝備發展規劃制定、技術開發、打靶試驗、定型生產等各個發展階段,根據需要適當披露網絡戰裝備的型號、性能、特點、參數以及研製進度等情況,以達到威懾對手的目的。其方式主要有兩種:一種是通過在國防白皮書、外交公報以及報紙、期刊、大型網站等權威媒體從官方渠道公開披露,實施顯性威懾;另一種是通過網絡社交媒體或其他非官方渠道,刻意洩露裝備相關情況,實施隱性威懾。網絡空間裝備展示威懾,一方面可以虛構新機理、新概念的新型網絡戰裝備,並渲染其獨特的作戰能力;另一方面可以刻意誇大已有網絡戰裝備的作戰效能。虛中有實、實中有虛,實施模糊政策,使對方摸不清己方真實情況和實力,產生恐懼和忌憚心理。例如,美軍的“舒特”機載網電一體攻擊系統已多次投入實戰使用,對其敵對國家的防空體系構成了嚴重威脅,但其基本原理、工作機制、戰技指標既沒有公開披露,也沒有被他國完全掌握破解,一直處於保密狀態,令人虛實難辨,起到了很好的威懾作用。

(三)網絡空間作戰演習威懾

網絡空間作戰演習威懾,是以實兵或虛擬的方式在網絡空間展開演習活動,並藉助各種媒體渠道,向潛在作戰對手展現本國網絡戰能力、實力與決心,以達到威懾對手的目的。網絡空間作戰演習可分為實兵演習和虛擬演習兩種。前者通常在全國范圍內或與盟國聯合進行,一般以演練軍地聯合網絡空間防禦行動為主。近幾年來,美國及盟國多次舉行“網絡風暴”系列網絡戰演習,以及“施里弗”系列太空-網絡空間演習,很好展現了網絡戰的動員實力、整體防禦水平,以及實施網絡戰的決心。後者通常在國家大型網絡綜合靶場舉行,一般以演練軍隊專業網絡戰力量的進攻行動為主。

(四)網絡空間作戰行動威懾

網絡空間作戰行動威懾,是指對特定的網絡目標實施攻擊,以確信的攻擊效果來威懾作戰對手的一種實戰性威懾。其運用的時機有兩個:一是當己方覺察敵方即將對己方發動戰爭時,己方選擇敵方重點防禦的關鍵性網絡目標進行針對性打擊,進行預防性、遏制性威懾;二是當敵方通過對己方發起試探性網絡攻擊,實施網絡空間威懾時,己方應立即進行有效的報復性、懲戒性威懾。具有威懾效果的網絡戰行動有多種。例如,對敵電信網滲透破壞,向敵國民眾手機大量發送宣傳反戰短信;對敵電力網進行攻擊,造成敵重要城市短時間的大面積停電;對敵廣播電視網進行攻擊,在黃金時段插播己方特製的視頻節目;等等。

三、網絡空間威懾的運用要點

網絡空間威懾總的運用要求是:懾戰結合,以實力、實戰展示能力和決心,力求以小戰體現威懾、以精打確保威懾,以較小的代價實現威懾目的。具體說來,應做到以下幾點。

(一)平戰結合,長期準備

“冰凍三尺,非一日之寒”。成功實施網絡空間威懾,需要平戰結合,在平時就要進行充分細緻的準備。一是要進行全面周密的網絡偵察。要求諜報偵察與技術偵察、無線偵察與有線偵察相結合,對敵網絡目標進行長期持續的網絡偵察,逐步摸清敵網絡基本情況,繪製其網絡拓撲結構圖,尤其是分析查找出敵各種軟硬件系統的漏洞。二是要進行大量有效的戰略預置。採用黑客手段,通過利用系統漏洞或口令破譯等辦法,秘密滲透進入敵各類網絡,留下後門,設置跳板機,埋設邏輯炸彈和木馬,為未來發動網絡攻擊預留突破口。三是進行預有準備的網絡防禦。在對敵實施網絡空間威懾時,己方應提前調整網絡防禦部署,使敵預先設計的攻擊路徑,預期利用的系統漏洞,預定執行的攻擊方案難以實施,或實施效果大打折扣,最大限度地降低敵網絡報復造成的損失。

(二)慎重決策,控制強度

孫子曰:“主不可以怒而興師,將不可以慍而致戰”。網絡空間威懾是國家之間的戰略博弈行為,尤其是實戰威懾,敏感性強,必須做到有理、有利、有節,決不能因為威懾“門檻”較低而濫用亂用,否則其效果可能會適得其反。網絡空間實戰威懾對作戰強度控制的要求很高。一方面,若強度太小,敵國政府和民眾不會產生畏懼心理,起不到應有的威懾效果,對方還可能採取同樣的手段實施反威懾,最終導致對抗升級,使己方威懾失效。另一方面,若強度過大,給敵國造成巨大的經濟損失和人員傷亡,引起國際社會的譴責和敵國政府、民眾的仇恨心理,就可能引發敵國運用常規力量進行大規模報復,有核國家甚至可能會動用核力量,這樣不但不能懾止戰爭,反而會起到戰爭導火索的作用。

(三)統一指揮,周密組織

網絡空間威懾的組織實施,要集中指揮,統一籌劃,搞好協同。一是精心組織力量。統一組織軍隊偵、攻、防、控四支力量,積極協調軍地各方網絡戰力量形成合力。尤其是要組織和協調好民間非專業網絡戰力量特別是愛國黑客,不能出現“盲動”現象,以免引發磨擦,擦槍走火,引起網絡戰的升級,或過早暴露攻擊意圖,授人以柄,導致局勢不可控或行動失敗。二是精當選擇目標。應選擇影響面廣,易產生明顯威懾效果的目標。例如,收視率排名靠前的廣播電視頻道、訪問量巨大的門戶網站、用戶眾多的無線通信網絡等。不能選擇無關痛癢、影響面小、民眾漠不關心的目標進行攻擊,易被誤認為是普通黑客製造的網絡安全事件,起不到應有的威懾效果。此外,還要考慮國際法和戰爭法約束,不能選擇易造成人道主義災難的目標,盡量不選取鐵路、航空、金融、醫療等部門的網絡目標,以免激起國際社會和對方民眾的譴責和反感。三是精確控制進程。實施網絡空間威懾性打擊之前,要通過廣泛的輿論宣傳造勢,向敵國發出打擊警告,並向全世界宣告己方行動的正義性,以爭取國際輿論的理解和支持。為突出威懾效果,己方可以高調宣布要攻擊的敵國網絡目標,再突破敵方層層網絡防禦,實施堅決有效的網絡攻擊,必要時最後還可對網絡攻擊效果進行定時恢復,以展現己方高超的網絡攻擊技術和手段,讓敵方決策者和民眾產生防不勝防、難以招架的心理挫折感,從而形成強烈的震懾效果。

(四)虛實結合,注重謀略

孫子所說的“能而示之不能,用而示之不用”,運用到網絡空間威懾,其要點概括起來就是“示而不宣、宣而不示”。 “示而不宣”,就是利用網絡攻擊難以追踪定位這一點,對特定目標實施網絡攻擊,但不對外宣布是己方所為,既展示了己方能力,又使得敵方雖然懷疑是己方所為,但沒有證據,無法追究。 “宣而不示”,就是公開宣傳或不經意透露己方研製或虛構的先進網絡戰裝備的型號、性能、特點,刻意誇大其作戰效能,虛虛實實,虛實結合,使敵摸不清己方真實實力,從而產生威懾效果。網絡戰行動具有追踪溯源困難、取證複雜的特點,發起方既可以承認,也可以矢口否認,或把責任推給民間黑客組織。 (來源:中國信息安全)

Original URL:

China’s Military Taking Action to Defend Nation’s Network // 中國軍事行動維護國家網絡

China’s Military Taking Action to Defend Nation’s Network //

中國軍事行動維護國家網絡

網絡營門”走向守衛“網絡國門

Original title: from the guard “network camp” to guard the “network country”

Original: “National Defense Reference” 2017 No. 3

Cyber ​​space was born in the military field, such as the first computer, Apache and GPS navigation systems are all derived from the military, today, cyberspace security has been closely related with national security, the military has once again become the maintenance of national cyberspace security , Whether it is the face of normalized network penetration, or large-scale network attacks, are an urgent need for the military from the guard “network camp” to guard the “network country”, breaking the traditional mission of the military mission, breaking the traditional battle preparation mode, To a new network of national defense thinking, casting the network era of the firm.

From the “network camp” to “network country”, a new era of military mission to bring new trends

Internet space is not only related to the maintenance of national strategic interests, a direct impact on political, economic, cultural security and social development, has become a modern battlefield joint war blood and ties. The Chinese army can not be limited to maintaining the internal security of the barracks, but also take the initiative to adapt to the trend of the times, the courage to take the “network of countries,” the country to play. Network strength is an important part of the network power construction, from the “network gate” to “network country” is the information age situation at home and abroad the inevitable trend of development.

Guarding the “network country” is the cyberspace security situation forced. China as the first network power, the security situation is not optimistic, the strategic opponent has never stopped preparing for my network operations. The United States, Britain, France and other countries actively preparing for cyberspace, through the cyberspace security legislation to give the military functions, the development of network warfare forces, research and development of network warfare weapons equipment, the war will advance to the human “fifth space”, especially in China increasingly strong In the process of rising history, the western countries under the auspices of the Cold War mentality and containment subversion strategy, the use of network technology and means of communication to implement uninterrupted harassment, subversion and cyber attacks, seriously affecting my country’s security and social development, China has become Network security threats to the hardest hit, the virus attack the test field, the penetration of awareness of the destination, the national security is facing a huge risk.

In the coming period, China, as a big emerging country, will intensify its conflicts of interest, strengthen the network defense strategy and strengthen the cyberspace war preparation. It is an inevitable way to actively strive for the dominance and discourse of cyberspace. The only way to go. As the main force of national security and stability, the army must meet the requirements of cyberspace characteristics and become the backbone and main force against cyber invasion, network subversion and safeguard national security and social stability.

Winning the network war is the new military change in the information age. As one of the most advanced productive forces in the information age, network technology has made cyber space combat become the dominant factor to guide the evolution of modern warfare, which affects the whole situation of war. In recent years, from the Iranian “earthquake network” attack, Russia and Georgia conflict network warfare, the Ukrainian power grid was a large number of paralysis and the US military on the IS network attacks, cyberspace in combat show a huge role in the emergence of a sign that the network Has become an important model for future joint operations.

The US military attaches great importance to the construction of cyberspace armaments, the establishment of cyberspace headquarters, the introduction of cyberspace joint operations, a substantial expansion of network warfare forces, and strive to maintain its cyberspace hegemony, the control of cyberspace as a “third offset strategy “Absolute advantage of the most important content of competition.

The world has followed up the country, the military space militarization trend is obvious. Severe cyberspace The situation of military struggle requires the Chinese army to focus on the network battlefield space changes, to meet the requirements of the era of information warfare, to achieve in the cyberspace can fight, win the battle of the strong military goals.

Effective network of deterrence is to speed up the construction of the network power inherent. In China by the network power to the network power development process, can not do without a strong network space military power as a guarantee. The international competition of cyberspace is a comprehensive game of national comprehensive strength. Among them, the network military capability construction is directly related to the national security and stability, and the whole body is the core factor of the whole national security field.

At present, the interests of the world in the cyberspace mutual penetration, there “you have me, I have you, mutual cooperation and common development” situation. But this common development is not equal, the United States and Western powers to use cyberspace dominance, has made a certain degree of network deterrence, so that my network development and interests subject to others. How the army in the construction of the network to complete the mission of reorganization of the mission, the premise is to be able to contain the crisis, deter opponents of the network offensive and defensive ability to ensure the peaceful development of the network environment.

Therefore, the army needs to establish a deterrent strategic goal of effective deterrence, form a strategic balance with the enemy “destroy each other”, so as to enhance the strategic competitiveness, deter cyber space aggression and ensure the smooth development of the network power strategy.

From the “defensive responsibility” to “protect the network defenders”, the new situation requires the army to undertake new tasks

The army is to defend the national security of the main and pillars, cyberspace is no exception. The National Security Act of July 1, 2015 stipulates that “citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and other organizations and other social organizations have the responsibility to safeguard national security And obligations. “The Network Security Act promulgated in November 2016 emphasized the need to maintain cyberspace sovereignty and national security.

On the basis of the laws of the two countries, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was formally introduced on December 27, 2016, providing overall guidance for creating a new model of network power at a new starting point. Basically follow, clearly put forward nine strategic tasks, and further reflects the army in the process of building a network of power in the mission task.

Full of network of national mission, the army to defend the sovereignty of cyberspace strong pillars. “Strategy” listed in the nine strategic task is the first “firmly defend cyberspace sovereignty,” made it clear that “including economic, administrative, scientific and technological, legal, diplomatic, military and all other measures, unswervingly maintain our network Space sovereignty “. It can be seen that the military must assume the national mission of using the physical means of the physical space to defend the sovereign security and interests of the virtual cyberspace.

Internet space sovereignty is the core interests of the country, is an important component of national sovereignty, that the state in the cyberspace owned by the independent, equal rights, self-defense and management rights. Once the hostile forces have violated my cyberspace sovereignty, it is equivalent to violating the sovereignty of the landspace and other physical space, China will have the right to take all measures, including military means to give a strong fight back.

At the international level, the United States has long proposed a cyberspace deterrence strategy, declared the attack on the US network information facilities is equivalent to the war, the United States will take military strike measures to retaliate. Military means is the fundamental means of safeguarding national sovereignty, and plays a vital role in safeguarding national cyberspace security. Therefore, the historical forces of land, sea and air, should be given the historical mission of protecting the sovereignty of cyberspace, must rely on the powerful physical space to defend the national interests of cyberspace, a powerful deterrent to the hostile forces of the network destruction attempt.

According to the era of network security to play, the army to do to defend the national security of the ballast. The second focus of the “strategy” task emphasizes the need to resolutely safeguard national security, prevent, stop and punish any act of using the Internet for treason, secession, incitement to rebellion, subversion or incitement to subvert the people’s democratic dictatorship.

In the era of information network, the world’s military has become an important participant in cyberspace. The level of cyberspace capability has become one of the main indexes to evaluate the modernization degree of a country’s army. It is one of the main responsibilities of the information security army to carry out the task of network space mission.

From the historical process of China’s development, it is necessary to be highly vigilant about the national security strategy needs of the successful completion of the well-off society. It is necessary to be highly vigilant about the risk of being invaded, subversive and divided by cyberspace. The development of the overall situation of the danger of being destroyed, a high degree of vigilance of the development process of socialism with Chinese characteristics is disturbed, the risk of destruction.

Take preventive measures, requiring the state must have the means to deal with and deal with these dangerous measures, with the prevention, suppression and punishment of cyberspace according to the law of the powerful forces of destruction. The defense of the country has always been an unshirkable historical responsibility of the army. The inherent mission task determines that the Chinese army must take on the various measures taken in cyberspace to maintain national politics, economy, cultural security and social stability.

Offensive and defensive both strategic tasks, the army to enhance the ability to enhance the network space strong backing. The third and eighth of the nine major tasks in the Strategy make it clear that all necessary measures should be taken to protect critical information infrastructures and their important data from attack and destruction, and that both technology and management should be adhered to both protection and deterrence. Construction and international status commensurate with the network power to adapt to the network space protection, and vigorously develop the network security and defense means to detect and resist the network invasion, casting and maintenance of national network security strong backing. In all the state’s political, diplomatic, military, scientific and technological capacity to maintain security, military power has always been the foundation and support of all abilities. It is the fundamental guarantee of all ability and the ultimate guarantee of national security.

Therefore, the army must assume the strategic task of strengthening the national network space protection ability strong backing. In the real world, the army is the reassurance of safeguarding national security. In cyberspace, it should also become the safe dependency and guarantee of the people. As an important part of the national network space protection ability, the army must be both offensive and defensive, and have the ability to firmly safeguard the interests and security of the country and the people in the cyberspace, and can effectively eliminate the various crises and ideological turbulence caused by the network security threat So that people can truly feel the production and life to be effectively protected, as the people of the country’s network protection capacity of confidence in the emboldened.

The global responsibility of the joint defense, the military to do to maintain the important support of global network security. The final mandate of the Strategy explicitly proposes to strengthen international cooperation in cyberspace and to support the United Nations in its leading role in promoting the development of international rules for cyberspace, international cyberspace international counter-terrorism conventions that are universally accepted, and a sound mechanism for combating cybercrime Policy and law, technological innovation, standards, emergency response, key information infrastructure protection and other areas of international cooperation.

Cybercrime and cybercrime are the new forms of global threat catalyzed by information network fermentation, posing a great threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of government and civil society. And other Western countries have given the military the responsibility to protect the network security and the right to combat cyber terrorism. Maintaining global cyberspace security and stability is in line with the fundamental interests of China and the rest of the world. The army should be an important defender of cyberspace security and become an important force in combating global cybercrime and cybercrime.

The globalization and unboundedness of the network determines the international demand for combating cyber-terrorism and transnational cybercrime. The army should promote inter-State network governance and military cooperation within the framework of the UN Security Council, and use the strategy and technology of the Internet age to establish a joint defense Mechanism, and effectively safeguard the national and world cyberspace security.

From the “battlefield training” to “network preparation”, the new areas need to prepare for the military new initiatives

In the new historical situation, the cyberspace put forward new requirements to the military training mode, should adapt to the new features of the cyberspace and the new mission of the army to innovate and reform the traditional model, aim at the goal of strengthening the country and strengthening the macro- Focus on cyberspace military action legal needs, closely linked to cyberspace “military and civilian one” of the natural properties, the construction of “peace and war” network security attack and defense system, to create “military dual-use” network defense force.

Legislative empowerment, for the military to carry out functional mission to provide legal basis. Countries in the world, especially the Western developed countries in the network security legislation attaches great importance to network defense issues. The United States has promulgated the “National Security No. 16 Presidential Decree” “cyberspace action strategy” and a series of policies and regulations on how to protect the national network security in the field of national network security has been deepening norms.

At present, it is necessary to clarify the duties of the cyberspace army from the legal level. It should be based on the “National Security Law” and “Network Security Law”, and introduce the network defense law and relevant cyberspace military warfare regulations for network defense construction and military Action to provide regulatory support and action programs, so that the military in cyberspace responsibilities and mission more specific and specific.

First, through the network of national defense legislation to further define the network sovereignty and network frontier, clear the scope of the military duties.

Second, through the construction of network operations laws and regulations, clear the military to defend the national network space security action authority, to distinguish between network intrusion, network damage and other military means of behavior. Third, through the international cooperation policy of cyberspace, clear military cooperation with other countries, civil forces and other international networks to combat terrorism, cybercrime function tasks.

Military and civilian integration, for the construction of network power to provide innovative power. The integration of military and civilian integration is the main practice of enhancing the competitiveness of cyberspace in the world. For the construction of China’s network power, it is necessary to construct military and civilian defense and defense system, and to develop military and national defense information infrastructure. Source.

First, the co-ordination of national, military and all levels of government and other military and civilian integration functional departments, set up a special command and coordination agencies, mobilize all national network power, building “military and civilian” “peace and war” network security attack and defense system.

Second, as soon as possible the introduction of network security integration of civil and military development of the guiding ideology, and gradually expand the integration of basic legal research and demonstration, to guide the long-term integration of military and civilian development.

Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and the people to build a nationwide information infrastructure, to achieve military and civilian unity, in charge of sharing.

The fourth is to establish a joint emergency response mechanism for military and civilian personnel, to increase the capacity of the training departments to control the situation, to strengthen the expertise of experts and emergency professionals to enhance the ability to quickly restore damaged networks or information systems.

Military and civilian training, for the cyberspace military capabilities to provide a realistic environment. The common characteristics of military and civilian space in the network space make the military and civilian training become an important way of military military training in cyberspace all over the world. The United States and NATO and other countries of the network space military and civilian joint exercises have been a series of “network storm” “network guards” and other training activities to attract the government, enterprises, research institutions and even private hackers extensive participation. Our military cyberspace military strength training also requires extensive participation in civil forces.

First, do a good job of military and political cooperation, the establishment of military and civilian joint attack and defense exercise mechanism, learn from the United States and other developed countries in the network warfare exercises in the red and blue confrontation training methods, and actively build the “national network shooting range”, planning the government, civil society series of joint exercises to enhance military and civilian , Officials and one network of offensive and defensive level.

Second, do a good job in military and military cooperation, relying on the Internet to set up a network of enterprises to improve the training area, to promote military and civilian ability to run between the offensive and defensive, and jointly improve the ability to prevent unknown risks.

Third, the organization of civil network security companies and hackers talent, to carry out network security competition and other activities, mutual confirmation, and jointly improve the level of network security technology and tactics.

Network reserve, to build a strong network of troops to provide the source of strength. Reserve as a reserve force of national defense, both military and civilian dual characteristics, is to achieve cyberspace economic development and national defense construction of organic unity of the powerful initiatives.

First, the national security sector as the leading, according to the national interests of the overall planning, the introduction of the network defense reserve is conducive to the construction of a series of laws and regulations, from the top to solve the network defense reserve construction in the construction of the main division of labor, promotion strategy, problem.

Second, innovative reserve organization and leadership system and comprehensive coordination mechanism, there are plans to reserve construction into the national network of information development at all levels and various fields.

Third, focus on the military and local management reform of the two models to the provincial and municipal governments, military and local enterprises and institutions under the management mechanism to establish a network of national defense reserve personnel to jointly use the mechanism, improve the national emergency mobilization mechanism, the establishment of national network defense professionals Database, the network militia and reserve forces into the scope of the people’s armed mobilization, usually in accordance with the provisions of the militia emergency unit into the training, the urgent selection of elite personnel with the team to participate in the task of non-war military operations, wartime, So that the national defense potential into national defense strength. (An Weiping, deputy chief of staff of the northern theater)

Original Mandarin Chinese:

原題:從守衛“網絡營門”走向守衛“網絡國門”

原載:《國防參考》2017年第3期

網絡空間誕生於軍事領域,如首台計算機、阿帕網和GPS導航系統等都源於軍方,時至今日,網絡空間安全已與國家安全息息相關,軍隊又再次成為維護國家網絡空間安全的主角,無論是面對常態化的網絡滲透,還是大規模的網絡攻擊,都迫切需要軍隊從守衛“網絡營門”走向守衛“網絡國門”,突破傳統的軍隊使命任務,突破傳統的應戰備戰模式,以全新的網絡國防思維,鑄造網絡時代國之堅盾。

從“網絡營門”到“網絡國門”,新時代帶來軍隊使命新趨勢

網絡空間不僅事關國家戰略利益維護,直接影響政治、經濟、文化安全和社會發展,也成為現代戰場聯合作戰的血脈和紐帶。中國軍隊不能局限於維護軍營內部網絡安全,更要主動適應時代趨勢,勇於承擔把守“網絡國門”的國家擔當。網絡強軍是網絡強國建設的重要一環,從“網絡營門”走向“網絡國門”是信息時代國內外形勢發展的必然趨勢。

守衛“網絡國門”是網絡空間安全形勢所迫。中國作為第一網絡大國,安全狀況不容樂觀,戰略對手從未停止對我網絡作戰准備。美、英、法等國積極備戰網絡空間,通過網絡空間安全立法賦予軍隊職能,發展網絡戰部隊,研發網絡戰武器裝備,將戰爭推進到了人類的“第五空間”,特別是在中國日益強大崛起的歷史進程中,西方國家在冷戰思維和遏制顛覆戰略的主導下,利用網絡技術手段和傳播方式實施不間斷的騷擾、顛覆和網絡攻擊行動,嚴重影響我國家安全與社會發展,中國逐漸成為網絡安全威脅的重災區、病毒攻擊的試驗場、意識滲透的目的地,國家安全面臨著巨大風險。

未來一段時期內,中國作為新興大國,與各方利益沖突還將加劇,堅定推進網絡國防戰略,加強網絡空間的作戰准備,是積極爭取網絡空間的主導權和話語權的必然途徑,也是中國崛起的必由之路。軍隊作為國家安全穩定的主要力量,必須適應網絡空間特點要求,成為抗擊網絡入侵、網絡顛覆的中堅和主力,維護國家安全和社會穩定。

打贏網絡戰爭是信息時代新軍事變革所趨。網絡技術作為信息時代最先進生產力之一,使得網絡空間作戰成為引導現代戰爭形態演變的主導因素,影響著戰爭全局。近年來,從伊朗“震網”攻擊、俄格沖突網絡戰、烏克蘭電網遭大規模阻癱以及美軍對IS的網絡攻擊,網絡空間在實戰中所展現出的巨大作用逐漸顯現,預示著網絡作戰已成為未來聯合作戰重要樣式。

美軍高度重視網絡空間軍備建設,成立網絡空間司令部,推出網絡空間聯合作戰條令,大幅度擴編網絡戰部隊,極力維護其在網絡空間霸權,把對網絡空間控制能力作為形成“第三次抵消戰略”絕對優勢最重要的競爭內容。

世界多國紛紛跟進,網絡空間軍事化趨勢明顯。嚴峻的網絡空間軍事斗爭形勢要求中國軍隊著眼網絡戰場空間變化,適應信息化戰爭時代要求,實現在網絡空間能打仗、打勝仗的強軍目標。

有效網絡懾戰是加速網絡強國建設內在所需。在中國由網絡大國向網絡強國發展過程中,離不開強大的網絡空間軍事力量作為保障。網絡空間國際競爭表現為國家綜合實力的全面博弈,其中,網絡軍事能力建設的好壞,直接關系到國家安全與穩定,牽一發而動全身,是整個國家安全領域的核心要素。

當前,世界各國在網絡空間的利益互相滲透,出現“你中有我、我中有你,互相合作,共同發展”的局面。但是這種共同發展是不對等的,美國及西方強國利用網絡空間主導權,已經取得了一定的網絡懾戰優勢,使我網絡發展及利益受制於人。軍隊如何在網絡強國建設中完成守土有責的使命重托,前提就是要形成能夠遏制危機、懾控對手的網絡攻防能力,確保和平發展的網絡環境。

因此,軍隊需要確立有效懾戰的威懾戰略目標,形成能與敵“相互摧毀”的戰略制衡能力,從而增強戰略競爭力,懾止網絡空間侵略,保障網絡強國戰略順利推進。

從“守土有責”到“護網衛國”,新形勢要求軍隊承擔新任務

軍隊是保衛國家安全的主力和柱石,網絡空間也不例外。2015年7月1日施行的《國家安全法》規定:“中華人民共和國公民、一切國家機關和武裝力量、各政黨和各人民團體、企業事業組織和其他社會組織,都有維護國家安全的責任和義務。”2016年11月頒布的《網絡安全法》強調了要維護網絡空間主權和國家安全。

在這兩個國家法律的基礎上,2016年12月27日,《國家網絡空間安全戰略》(下文簡稱《戰略》)正式出台,為在新的起點上開創網絡強國新格局提供了總體指導和基本遵循,明確提出了九大戰略任務,進一步體現了軍隊在建設網絡強國進程中的使命任務。

全力護網的國家使命,軍隊要做捍衛網絡空間主權的堅強柱石。《戰略》中列出的九大戰略任務首項就是“堅定捍衛網絡空間主權”,明確提出要“採取包括經濟、行政、科技、法律、外交、軍事等一切措施,堅定不移地維護我國網絡空間主權”。可見,軍隊須承擔起運用實體空間的軍事手段,保衛虛擬網絡空間主權安全和利益的國家使命。

網絡空間主權是國家的核心利益,是國家主權的重要組成,表明國家在網絡空間所擁有的獨立權、平等權、自衛權和管理權。一旦敵對勢力侵犯了我網絡空間主權,就等同於侵犯了我陸海空等實體空間的國家主權,中國將有權利採取包括軍事手段在內的一切措施給予堅決回擊。

在國際上,美國早就提出網絡空間威懾戰略,宣告對美國網絡信息設施的攻擊等同於戰爭行為,美國會採取軍事打擊措施進行報復。軍事手段是維護國家主權的保底手段,在維護國家網絡空間安全中發揮著至關重要的作用。因此,陸海空天軍事力量理所應當地被賦予了保護網絡空間主權的歷史使命,必須憑借強大的實體空間武力保衛網絡空間的國家利益,有力震懾敵對勢力的網絡破壞企圖。

依網衛國的時代擔當,軍隊要做保衛國家安全的壓艙石。《戰略》任務的第二項著力強調要堅決維護國家安全,防范、制止和依法懲治任何利用網絡進行叛國、分裂國家、煽動叛亂、顛覆或者煽動顛覆人民民主專政政權的行為。

信息網絡時代,世界各國軍隊都已經成為網絡空間重要參與者,網絡空間能力水平成為評估一個國家軍隊現代化程度的主要指標,遂行網絡空間使命任務、維護國家安全成為信息化軍隊的主要職責之一。

從中國發展所處的歷史進程來看,要適應全面建成小康社會決勝階段的國家安全戰略需求,必須高度警惕國家在網絡空間被侵略、被顛覆、被分裂的危險,高度警惕由網絡空間引發改革發展大局被破壞的危險,高度警惕中國特色社會主義發展進程被干擾、破壞的危險。

防患於未然,要求國家必須具有應對和處置這些危險的手段措施,具有防范、制止和依法懲治網絡空間違法破壞行為的強大力量。保衛國家歷來是軍隊不可推卸的歷史責任,固有的使命任務決定了中國軍隊必須承擔起在網絡空間採取各種措施,維護國家政治、經濟、文化安全和社會穩定的時代擔當。

攻防兼備的戰略任務,軍隊要做提升網絡空間防護能力的堅強后盾。《戰略》中九大任務的第三項和第八項明確提出,要採取一切必要措施保護關鍵信息基礎設施及其重要數據不受攻擊破壞,要堅持技術和管理並重、保護和震懾並舉;要建設與我國國際地位相稱、與網絡強國相適應的網絡空間防護力量,大力發展網絡安全防御手段,及時發現和抵御網絡入侵,鑄造維護國家網絡安全的堅強后盾。在國家所有維護安全的政治、外交、軍事、科技能力中,軍事力量歷來是所有能力的基礎和支撐,是所有能力的根本保障,是國家安全的最終依托。

因此,軍隊必須承擔起提升國家網絡空間防護能力堅強后盾的戰略任務。現實社會中,軍隊是維護國家安全的定心丸,在網絡空間也同樣應成為人民群眾的安全依賴和保障。軍隊作為國家網絡空間防護能力生成的重要一環,必須做到攻防兼備、懾戰一體,有能力堅決維護國家和人民在網絡空間的利益和安全,能夠有效消除網絡安全威脅造成的各種危機和思想動蕩,使人民能夠切實感受到生產生活得到有效保護,成為全國人民對國家網絡防護能力充滿信心的底氣所在。

聯防聯治的全球責任,軍隊要做維護全球網絡安全的重要支撐。《戰略》任務最后一項明確提出要強化網絡空間國際合作,支持聯合國發揮主導作用,推動制定各方普遍接受的網絡空間國際規則、網絡空間國際反恐公約,健全打擊網絡犯罪司法協助機制,深化在政策法律、技術創新、標准規范、應急響應、關鍵信息基礎設施保護等領域的國際合作。

網絡恐怖主義和網絡犯罪是經過信息網絡發酵催化出的全球威脅新形態,對世界上所有國家的政治、經濟、軍事、文化安全都構成巨大威脅,僅僅依靠政府和民間的力量是不夠的,美國等西方國家紛紛賦予軍隊保護網絡安全的職責和打擊網絡恐怖主義的權限。維護全球網絡空間安全與穩定符合中國以及世界各國的根本利益,軍隊應成為全球網絡空間安全的重要維護者,成為打擊全球網絡恐怖主義和網絡犯罪的重要力量。

網絡的全球化、無界性決定了打擊網絡恐怖主義和跨國網絡犯罪的國際需求,軍隊應在聯合國安理會的框架下,推進國家間網絡治理軍事合作,利用網絡時代的戰略和技術,建立聯防聯治機制,切實維護國家和世界網絡空間安全。

從“沙場練兵”到“網絡備戰”,新領域需要軍隊備戰新舉措

在新的歷史形勢下,網絡空間對軍隊練兵備戰模式提出了全新的要求,應適應網絡空間新特點和軍隊新使命對傳統模式進行創新改革,以強國強軍目標為統攬,加強宏觀統籌,著眼網絡空間軍事行動的法理需求,緊扣網絡空間“軍民一體”的天然屬性,建設“平戰結合”的網絡安全攻防體系,打造“軍地兩用”的網絡國防力量。

立法賦權,為軍隊遂行職能使命提供法理依據。世界各國尤其是西方發達國家在網絡安全立法上高度重視網絡國防問題。美國先后出台了《國家安全第16號總統令》《網絡空間行動戰略》等一系列政策法規,對如何在網絡國防領域保護國家網絡安全進行了不斷的深化規范。

當前,從法律層面厘清網絡空間軍隊的職責任務非常必要,應以《國家安全法》《網絡安全法》為依據,出台網絡國防法和有關網絡空間軍事作戰條令法規,為網絡國防領域建設和軍事行動提供法規支撐和行動綱領,使軍隊在網絡空間的職責和使命更加明確具體。

一是通過網絡國防立法進一步界定網絡主權和網絡邊疆,清晰軍隊的職責范圍。

二是通過網絡作戰法規建設,明確軍隊遂行保衛國家網絡空間安全的行動權限,區分應對網絡入侵、網絡破壞等行為的軍事手段。三是通過網絡空間國際合作政策,明確軍隊協同他國、民間力量等打擊國際網絡恐怖主義、網絡犯罪的職能任務。

軍民融合,為網絡強國建設提供創新動力。軍民融合是世界強國提升網絡空間競爭力的主要做法,對於中國網絡強國建設來說,構建軍民融合網絡安全攻防體系,開發軍地兩用的國防信息基礎設施,是激發軍隊網絡空間作戰能力創新的源泉。

一是統籌國家、軍隊和各級政府等軍民融合職能部門,設置專門的指揮協調機構,調動一切國家網絡力量,建設“軍民一體”“平戰結合”的網絡安全攻防體系。

二是盡快出台網絡安全軍民融合深度發展指導性意見,逐步展開軍民融合基本法律研究論証,指導中長期軍民融合發展。

三是依托國家現有公共移動通信網、光纖通信網及衛星系統,軍民共建覆蓋全國全軍的信息基礎設施,實現軍民統建、分管共享。

四是建立軍民聯合的應急響應機制,加大培訓軍地主管部門控制事態的能力,加強專家和應急專業力量,提升快速恢復受損網絡或信息系統的能力。

軍民聯訓,為網絡空間軍事能力生成提供實戰化環境。網絡空間的軍民共用特性使得軍民聯訓成為世界各國網絡空間軍事演訓的重要方式。美國及北約等國家的網絡空間軍民聯合演習已經形成系列化,“網絡風暴”“網絡衛士”等演練活動吸引了政府、企業、研究機構甚至民間黑客的廣泛參與。我軍網絡空間軍事力量訓練也需要廣泛吸引民間力量參與。

一是搞好軍政合作,建立軍民聯合攻防演練機制,借鑒美國等發達國家網絡戰演練中的紅藍對抗訓練方法,積極建設“國家網絡靶場”,策劃政府、民間機構系列聯合演習,提升軍民一體、官民一體的網絡攻防水平。

二是搞好軍企協作,在互聯網上依靠網信企業設置演練場區,促進軍民之間攻防能力磨合,共同提高防范未知風險能力。

三是組織民間網絡安全公司和黑客人才,開展網絡安全競賽等活動,互相印証,共同提高網絡安全防護技戰術水平。

網絡預備役,為建設強大網軍提供力量源泉。預備役作為國防力量的后備補充,兼有軍事和民用雙重特點,是實現網絡空間經濟發展與國防建設有機統一的有力舉措。

一是以國家安全部門為主導,依據國家利益進行統籌規劃,出台有利於網絡國防預備役建設的系列法規政策,從頂層上解決網絡國防預備役建設中軍民共建的主體分工、推進策略、利益協調等問題。

二是創新預備役組織領導體制和綜合協調機制,有計劃地把預備役建設融入國家網絡信息化發展的各個層面和各個領域。

三是著眼軍隊和地方兩頭管理模式改革,以各省市政府、軍隊和地方企事業單位的管理機制為依托,建立網絡國防預備役人才聯合培養使用機制,完善國家應急動員機制,建立國家網絡防御專用人才數據庫,將網絡民兵和預備役部隊建設納入人民武裝動員的范圍,平時按規定編入民兵應急分隊進行訓練,急時挑選精干人員隨隊參加遂行非戰爭軍事行動任務,戰時按需要成建制征召使用,使國防潛力轉變為國防實力。

 

Referring URL:

http://military.people.com.cn/BIG5/n1/2017/0417/c1011-29215670.html