Category Archives: 國家網絡空間安全戰略

Chinese Military Focusing on Future Wars and Fighting the “Five Battles” of Cognition

中國軍隊聚焦未來戰爭打好認知“五場戰役”

外國現代英文音譯:

Most of the local wars and armed conflicts in recent years have been “hybrid” confrontations carried out in multiple dimensions and fields, emphasizing the use of military, political, economic and other means to implement systematic control in the dimension of comprehensive decision-making, creating all kinds of chaos in the dimension of international communication, and creating various chaos in the dimension of international communication. Conduct targeted strikes in the strategic focus dimension, actively shape the battlefield situation, and seek to seize the strategic initiative. In future wars, in order to successfully fight political and military battles and military and political battles, we should deeply grasp the characteristics and laws of offensive and defensive operations in the cognitive domain and improve our ability to fight the “five battles” well.

Be proactive in cognitive operations, shape the situation and control the situation, and fight proactively. Before the war begins, cognition comes first. With the continuous development and evolution of war forms, the status and role of cognitive domain operations continue to be highlighted. Aiming to win future wars, cognitive deployment should be carried out in advance. Through strategies, information, technology and other means and carriers, the physiological, psychological, values ​​and other cognitive factors of target objects should be affected, intervened and manipulated, and cognitive attack and defense should be used to cover military operations and accurately Efficiently dominate cognitive space. Fully understand the importance of being first, grasp the definition and interpretation power of “narrative” flexibly and autonomously, emphasize pre-emption to win the initiative in the cognitive narrative struggle dimension, create a favorable situation in which legal principles are in hand and morality is on our side, and occupy the moral commanding heights.

Cognitive operations focus on attacking the heart, and implement layered strategies to fight precise battles. “Those who are good at fighting will benefit others without killing them.” In future wars, the combat space will extend to the deep sea, deep space, deep network and other fields, and the battlefield space and time will present the characteristics of being extremely far, extremely small, extremely intelligent and uninhabited, invisible, and silent. We should keep a close eye on cognitive gaps to improve effectiveness, and use methods such as big data simulation, artificial intelligence matching, and psychological model evaluation to analyze and control the key information of cognitive subjects to achieve effective penetration and early deterrence of cognitive subject information. Closely focus on cognitive blind spots to enhance penetration, target the ideological consensus points, psychological connection points, and spiritual pillar points that maintain the unity of powerful enemy alliances to carry out effective strikes, and use their cognitive differences and interest conflicts to achieve differentiation and disintegration at all levels.

Based on cognitive combat strategies, we must penetrate the entire territory and fight for deterrence and control. In future wars, the strategic competition and tactical confrontation between the two warring parties will be extremely fierce. We should pay close attention to the decision-making process and make comprehensive efforts to increase the opponent’s decision-making dilemma and form our own decision-making advantages. On the one hand, we must pay more attention to key nodes such as the enemy’s decision-making center, command hub, reconnaissance and early warning system, and use advanced strike methods to physically destroy these nodes. On the other hand, we must pay more attention to the “soft kill” effects of cognitive shaping, cognitive induction, cognitive intervention and cognitive control, and embed cognitive domain operations into “hard destruction”, which not only creates a strong deterrent through precise strikes with high-tech weapons, but also integrates new qualities The combat power is expanded to the cognitive dimension, thus forming an asymmetric check and balance advantage.

Cognitive combat information is king, expand the field and fight for support. Future wars cannot be separated from strong information support, and system integration should be accelerated to gain data advantages. First of all, speed up the construction of cognitive offensive and defensive operations theory library, database, talent library, case library, and tactics library, dynamically collect and update the current status of the enemy’s cognitive offensive and defensive operations capabilities, and provide all-round support for cognitive offensive and defensive operations. Secondly, speed up the creation of the integrated media communication matrix, improve the self-owned platform system, speed up the deployment of network platforms, focus on system integration and collaboration, break down the “barriers” of information interconnection as soon as possible, and achieve cognitive integration and sharing, and comprehensive results. Thirdly, accelerate the coupling and linkage of information and cognitive domain operations, vigorously develop core technologies such as neural network systems, artificial intelligence applications, cognitive decision-making, psychological attack and defense, mine and analyze cross-domain and heterogeneous cognitive information, and improve the information fusion system of cognitive means to win the future. War provides “clairvoyance” and “early ears”.

Cognitive combat coordination is the key, and multi-dimensional efforts are used to fight the overall battle. Future wars are joint operations carried out in land, sea, air, space, network, electromagnetic and other fields. System thinking should be adhered to, the awareness of collaboration should be strengthened, and the compatibility and coordination of cognitive domain operations and other military operations should be improved. For example, it can integrate human intelligence, geographical intelligence, open source intelligence, etc., quickly collect and process massive data, remove falsehoods while retaining truth, seize cognitive space accurately and efficiently, achieve complementary advantages, and form cognitive advantages through full domain coverage. By networking dispersed multi-domain forces, we can establish an all-domain joint force with high connectivity, collective action, and overall attack to achieve the effect of “integrated deterrence.” By integrating national resources, strengthening strategic communication, using cognitive momentum to amplify the effects of political disruption, economic sanctions, and diplomatic offensives, and cooperating with military operations to put pressure on target targets in an all-round way, we strive to defeat the enemy without fighting.

(Author’s unit: University of Aerospace Engineering)

繁體中文國語:

近年來的局部戰爭和武裝衝突大多是多維度、多領域開展的「混合型」對抗,強調運用軍事、政治、經濟等手段在綜合決策維度實施系統控制,在國際交往的維度上製造各種混亂,在國際交往的維度上製造各種混亂。 戰略重點維度精準打擊,主動塑造戰場態勢,尋求奪取戰略主動權。 在未來戰爭中,要打好政治軍事鬥爭、軍事政治鬥爭,就必須深刻掌​​握認知域攻防作戰的特徵和規律,提升打好「五個戰役」的能力。

認知作戰主動出擊,塑造局勢、掌控局面,主動出擊。 在戰爭開始之前,認​​知是第一位的。 隨著戰爭形式的不斷發展與演變,認知域作戰的地位與角色不斷凸顯。 為了贏得未來戰爭,必須事先進行認知部署。 透過策略、資訊、技術等手段和載​​體,對目標對象的生理、心理、價值觀等認知因素進行影響、介入和操控,以認知攻防覆蓋軍事行動,精準高效主導認知空間。 充分認識先行的重要性,靈活自主地掌握「敘事」的定義和解釋權,強調先發制人,贏得認知敘事鬥爭維度的主動權,營造法理在手、道德在手的良好局面就在我們這邊,佔據道德高點。

認知作戰重在攻心,實施分層策略打精準戰。 “善戰者,利人而不害人。” 未來戰爭,作戰空間將延伸至深海、深空、深網等領域,戰場時空將呈現極遠、極小、極智、無人、隱形、無聲的特徵。 資訊. 緊緊圍繞認知盲點增強穿透力,針對維護強敵聯盟團結的思想共識點、心理連接點、精神支柱點進行有效打擊,利用其認知差異和利益衝突實現差異化和戰略性打擊。各個層面的瓦解。

基於認知作戰策略,我們必須滲透全境,爭取威懾和控制。 未來戰爭中,交戰雙方的戰略競爭和戰術對抗將會異常激烈。 要密切注意決策過程,綜合發力,增加對手決策困境,形成自己的決策優勢。 一方面,要更重視敵方決策中心、指揮樞紐、偵察預警系統等關鍵節點,採用先進打擊手段對這些節點進行物理摧毀。 另一方面,要更重視認知塑造、認知誘導、認知介入、認知控制的「軟殺傷」作用,將認知域作戰嵌入「硬殺傷」中,不僅透過精準打擊形成強大威懾。以高科技武器打擊的同時,也將新素質的戰鬥力擴展到認知維度,進而形成非對稱制衡優勢。

認知作戰資訊為王,拓展領域,爭取支援。 未來戰爭離不開強大的資訊支撐,應加快系統整合以獲得數據優勢。 首先,加速認知攻防作戰理論庫、資料庫、人才庫、案例庫、戰術庫建設,動態收集和更新敵方認知攻防作戰能力現狀,提供全方位對認知進攻和防禦行動的全面支持。 二是加快打造綜合媒體傳播矩陣,完善自有平台體系,加速網路平台部署,聚焦系統

各方融合協作,盡快打破資訊互聯互通的“壁壘”,實現認知融合共享、綜合成果。 第三是加速資訊與認知域運算耦合連結,大力發展神經網路系統、人工智慧應用、認知決策、心理攻防等核心技術,挖掘分析跨領域、異質認知訊息,完善認知手段資訊融合體系,贏得未來。 戰爭提供了「千里眼」和「早耳」。

認知作戰協同是關鍵,多維度發力打好整體戰。 未來戰爭是在陸、海、空、太空、網路、電磁等領域進行聯合作戰。 要堅持系統思維,強化協同意識,提高認知域作戰與其他軍事行動的兼容性和協調性。 例如,可以融合人類智慧、地理智慧、開源智慧等,快速擷取處理大量數據,去偽存真,精準高效搶佔認知空間,實現優勢互補,透過全域形成認知優勢覆蓋範圍。 透過將分散的多域力量聯網,建立高度連結、集體行動、整體出擊的全局聯合部隊,達到「一體化威懾」的效果。 透過整合國家資源,加強戰略溝通,利用認知動能放大政治擾亂、經濟制裁、外交攻勢的效果,配合軍事行動,全方位對目標對象施壓,力爭戰勝敵人不戰而屈人之兵。

(作者單位:航太工程大學)

來源:解放軍報 作者:楊龍喜 編輯:王峰 2022-10-08

中國軍隊做好戰爭準備,科學研究旨在實現戰場統治

Chinese Military Readies for War with Scientific Research Designed to Achieve Domination on the Battlefield

4月下旬,軍事科學院戰爭研究院順利完成上報兩項作戰重大問題研究工程的立項論證建議書。 這是研究院著眼履行核心職能,科研攻關始終瞄準備戰打仗的具體實踐。

戰爭研究院是全軍專門研究戰爭、設計戰爭的科學研究機構。 作為新組成單位,大項任務多、臨時任務多、論證申報任務多是他們科學研究工作的主要特徵。 年初,針對人少事急、科研任務壓茬推進的實際情況,該研究院黨委對照戰鬥力標準,把旨在強軍勝戰的科研工作擺在重要位置。 他們依據備戰急需、打仗急用、部隊急盼的標準,調整確立了戰爭與作戰問題研究、條令法規編排等方向的重點科研任務,壓減了10餘項偏離主責主業的課題,新增 了一批戰爭形態、作戰風格等聚焦備戰打仗的課題研究。 該研究院領導介紹,院黨委要求班子成員在重大科研任務中既掛帥又出征,做到主要精力向重點任務投放,力量配備、經費支持等向作戰研究傾斜。

同時,研究院持續深化「小核心、大外圍」協同攻關,不斷創新科學研究組織模式。 他們在研究院內部進行軍事理論人員和軍事科技人員「捆綁式」研究,打通科研壁壘;與軍事醫學研究院、國防工程研究院等兄弟單位互派專家參與重大專案研究,實現優勢互補;組織科研 人員參加各類重大演訓活動,找準科研需求;舉辦多邊軍事交流活動,使科研人員及時了解最新軍事科技動態。 此外,他們也積極與地方科研院所合作,將地方優質科研資源為己所用,形成研究戰爭、設計戰爭、運籌戰爭、驗證戰爭的閉合迴路。

去年以來,該研究院先後完成百餘項科研課題,在核心作戰概念開發、聯合作戰實驗等研究上取得重要突破,提交國家高端智庫研究報告、重要問題評估報告等60餘份,推出一批戰略 性強、原創性強、前瞻性強的創新成果。

Modern English:

In late April, the Institute of War Research of the Academy of Military Sciences successfully completed the submission of project demonstration proposals for two major combat issue research projects. This is a concrete practice of the institute focusing on fulfilling its core functions and always aiming at scientific research and preparation for war.

The War Research Institute is a scientific research institution specializing in the study and design of war in the entire military. As a newly established unit, the main characteristics of their scientific research work are many major tasks, many temporary tasks, and many demonstration and application tasks. At the beginning of the year, in response to the actual situation where there were few people and urgent tasks and scientific research tasks were being pushed forward, the party committee of the institute put the scientific research work aimed at strengthening the army and winning the war in an important position in accordance with the combat effectiveness standards. Based on the criteria of urgent need for war preparation, urgent need for war, and urgent need of troops, they adjusted and established key scientific research tasks in the research of war and combat issues, and the compilation of doctrines and regulations, etc., and reduced more than 10 topics that deviated from their main responsibilities and main business, and added new A batch of research on war forms, combat styles and other topics focusing on war preparation and combat were carried out. According to the leader of the institute, the party committee of the institute requires team members to both take command and go out on major scientific research tasks, so that the main energy should be devoted to key tasks, and force allocation and financial support should be tilted towards combat research.

At the same time, the institute continues to deepen the collaborative research of “small core and large periphery” and continuously innovates the scientific research organization model. They carry out “bundled” research by military theoretical personnel and military scientific and technological personnel within the institute to break down barriers to scientific research; they exchange experts with sister units such as the Military Medical Research Institute and the National Defense Engineering Research Institute to participate in major project research to achieve complementary advantages; organize scientific research Personnel participate in various major exercises and training activities to identify scientific research needs; multilateral military exchange activities are held to keep scientific researchers informed of the latest military science and technology trends. In addition, they also actively cooperate with local scientific research institutes to use local high-quality scientific research resources for their own use, forming a closed loop of researching war, designing war, operating war, and verifying war.

Since last year, the institute has completed more than 100 scientific research projects, made important breakthroughs in the development of core operational concepts and joint operational experiments, submitted more than 60 national high-end think tank research reports and important issue assessment reports, and launched a number of strategies. Innovative results that are highly innovative, original and forward-looking.

解放軍原文參考:http://military.people.com.cn/n1/2019/0514/c1888沒有湯給你.html

中國特色治網之道和網絡強國戰略思想

The Way of Internet Governance with Chinese Characteristics and the Strategic Thought of Network Power

網絡安全和信息化事關黨的長期執政,事關國家長治久安,事關經濟社會發展和人民群眾福祉。習近平同志站在我們黨“過不了互聯網這一關,就過不了長期執政這一關”的政治高度,準確把握信息化變革帶來的機遇和挑戰,明確提出要努力把我國建設成為網絡強國。中央黨史和文獻研究院編輯的《習近平關於網絡強國論述摘編》一書的第三部分,以“努力把我國建設成為網絡強國”為題,收入了習近平同志的相關論述。

縱觀世界文明史,人類先後經歷了農業革命、工業革命、信息革命。每一次產業技術革命,都給人類生產生活帶來巨大而深刻的影響。如今,以互聯網為代表的信息技術日新月異,引領了社會生產新變革,創造了人類生活新空間,拓展了國家治理新領域,極大提高了人類認識世界、改造世界的能力。互聯網讓世界變成了“雞犬之聲相聞”的地球村,相隔萬里的人們不再“老死不相往來”。世界因互聯網而更多彩,生活因互聯網而更豐富。

人類社會正在經歷偉大的信息革命,中國正處在信息化快速發展的歷史進程之中,信息革命時代潮流與中華民族偉大復興歷史進程發生了歷史性交匯,為我們全面建設社會主義現代化國家帶來新的機遇和挑戰。習近平同志指出,信息化為中華民族帶來了千載難逢的機遇。我們正逢其時,要順勢而為、乘勢而上、相向而行。

隨著網絡信息技術日新月異,全面融入社會生產生活,也深刻改變著全球經濟格局、利益格局、安全格局。世界主要國家都把互聯網作為經濟發展、技術創新的重點,把互聯網作為謀求競爭新優勢的戰略方向。能不能適應和引領互聯網發展,成為決定大國興衰的一個關鍵。誰掌握了互聯網,誰就把握住了時代主動權;誰輕視互聯網,誰就會被時代所拋棄。一定程度上可以說,得網絡者得天下。信息化為我國搶占新一輪發展制高點、構築國際競爭新優勢提供了有利契機。

中國高度重視互聯網發展,自接入國際互聯網以來,我們按照積極利用、科學發展、依法管理、確保安全的思路,加強信息基礎設施建設,發展網絡經濟,推進信息惠民。同時,我們依法開展網絡空間治理,網絡空間日漸清朗。儘管起步稍晚,但經過二十多年努力,迅速縮短了同發達國家的信息化差距,成為舉世矚目的網絡大國。同時也要看到,雖然我國網絡信息技術和網絡安全保障取得了不小成績,但同世界先進水平相比還有很大差距。我們在自主創新方面還相對落後,區域和城鄉差異比較明顯,國內互聯網發展瓶頸仍然較為突出。

黨的十八大以來,以習近平同志為核心的黨中央審時度勢、高瞻遠矚,順勢應時,吹響了向網絡強國進軍的號角。 2014年2月27日,在中央網絡安全和信息化領導小組第一次會議上,習近平同志提出,要從國際國內大勢出發,總體佈局,統籌各方,創新發展,努力把我國建設成為網絡強國。

建設網絡強國是黨中央從黨和國家事業發展全局出發作出的重大決策。黨的十八大以後,黨中央從進行具有許多新的歷史特點的偉大斗爭出發,重視互聯網、發展互聯網、治理互聯網,作出一系列重大決策、提出一系列重大舉措,推動網信事業取得了歷史性成就。

我們提出建設網絡強國戰略目標,網信工作頂層設計和總體架構基本確立,出台《關於加強網絡安全和信息化工作的意見》,基本理順互聯網管理領導體制機制,形成全國“一盤棋”工作格局;網絡意識形態安全得到切實維護,做大做強網上正面宣傳,在管網治網上出重拳、亮利劍,打贏網絡意識形態領域一系列重大斗爭,根本扭轉了過去網上亂象叢生、陣地淪陷、被動挨打的狀況,網絡空間正能量更加強勁、主旋律更加高昂;國家網絡安全屏障進一步鞏固,制定實施網絡安全法,加強網絡安全保障能力建設,關鍵信息基礎設施安全保護不斷強化,網絡違法犯罪活動得到有效遏制,全社會網絡安全意識和防護能力明顯增強;網信軍民融合取得階段性成效,網絡安全威懾反制能力不斷增強;注重發揮信息化對經濟社會發展的驅動引領作用,“互聯網+”行動計劃深入實施,數字經濟、共享經濟蓬勃發展;信息領域核心技術創新取得積極進展,新一代移動通信(5G)、高性能計算、量子通信等技術研究實現突破,一批網信企業躋身世界前列;網絡空間國際話語權和影響力顯著提升,高舉網絡主權大旗,推動構建網絡空間命運共同體,積極參與全球互聯網治理進程,創設並成功舉辦世界互聯網大會,中國理念、中國主張、中國方案贏得越來越多認同和支持;加快網絡基礎設施建設和信息化服務普及,網上交易、手機支付、共享出行等新技術新應用廣泛普及,電子政務加速發展,網絡扶貧紮實推進,社會治理和基本公共服務水平持續提升,人民群眾有了更多獲得感、幸福感、安全感。這些歷史性成就的取得,充分證明黨中央關於加強黨對網信工作集中統一領導的決策和對網信工作作出的一系列戰略部署是完全正確的。

新時代呼喚新思想,新實踐孕育新理論。在努力建設網絡強國的進程中,我們不斷推進理論創新和實踐創新,不僅走出一條中國特色治網之道,而且提出一系列新思想新觀點新論斷,形成了網絡強國戰略思想。概括起來,主要有以下幾個方面。

第一,明確網信工作在黨和國家事業全局中的重要地位。我們提出,沒有網絡安全就沒有國家安全,沒有信息化就沒有現代化,網絡安全和信息化事關黨的長期執政,事關國家長治久安,事關經濟社會發展和人民群眾福祉,過不了互聯網這一關,就過不了長期執政這一關,要把網信工作擺在黨和國家事業全局中來謀劃,切實加強黨的集中統一領導。

Network security and informatization are related to the long-term governance of the party, the long-term stability of the country, economic and social development and the well-being of the people. Comrade Xi Jinping stood at the political height of our party “If you can’t pass the hurdle of the Internet, you can’t pass the hurdle of long-term governance”, accurately grasped the opportunities and challenges brought about by the informatization revolution, and clearly stated that we should strive to build our country into a cyber power. The third part of the book “Excerpts of Xi Jinping’s Discussions on Internet Power” edited by the Central Academy of Party History and Documentation is titled “Strive to Build my country into a Cyber ​​Power” and includes relevant expositions by Comrade Xi Jinping.

Looking at the history of world civilizations, humanity has successively undergone agricultural revolution, industrial revolution and information revolution. Every revolution in industrial technology has had a huge and profound impact on human production and life. Today, information technology represented by the Internet is changing with each passing day, leading new changes in social production, creating a new space for human life, expanding new areas of national governance, and greatly improving human ability to understand and transform the world. The Internet has turned the world into a global village where “the voices of chickens and dogs hear each other”, and people separated by thousands of miles no longer “do not communicate with each other”. The world is more colorful because of the Internet, and life is richer because of the Internet.

Human society is undergoing a great information revolution, and China is in the historical process of rapid development of informatization. The trend of the era of information revolution and the historical process of the great rejuvenation of the Chinese nation have had a historic intersection, which has brought great benefits to us in building a modern socialist country in an all-round way. New opportunities and challenges. Comrade Xi Jinping pointed out that informatization has brought golden opportunities to the Chinese nation. We are at the right time, and we must follow the trend, ride on the trend, and meet each other halfway.

With the rapid development of network information technology and its comprehensive integration into social production and life, it has also profoundly changed the global economic pattern, interest pattern, and security pattern. Major countries in the world regard the Internet as the focus of economic development and technological innovation, and regard the Internet as a strategic direction for seeking new competitive advantages. Whether it can adapt to and lead the development of the Internet has become a key to determining the rise and fall of a big country. Whoever controls the Internet will grasp the initiative of the times; whoever despises the Internet will be abandoned by the times. To a certain extent, it can be said that those who win the Internet win the world. Informatization provides a favorable opportunity for my country to seize the commanding heights of a new round of development and build new advantages in international competition.

China attaches great importance to the development of the Internet. Since its access to the international Internet, we have strengthened the construction of information infrastructure, developed the network economy, and promoted information to benefit the people in accordance with the ideas of active utilization, scientific development, law-based management, and security assurance. At the same time, we have carried out cyberspace governance in accordance with the law, and cyberspace has become increasingly clear. Although it started relatively late, after more than 20 years of hard work, it quickly narrowed the informatization gap with developed countries and became a network powerhouse that has attracted worldwide attention. At the same time, we must also see that although my country’s network information technology and network security have made great achievements, there is still a big gap compared with the world’s advanced level. We are still relatively backward in terms of independent innovation, the differences between regions and urban and rural areas are relatively obvious, and the bottleneck of domestic Internet development is still relatively prominent.

Since the 18th National Congress of the Communist Party of China, the Party Central Committee with Comrade Xi Jinping at its core has judged the situation, looked far ahead, followed the trend, and sounded the clarion call to march towards a cyber power. On February 27, 2014, at the first meeting of the Central Network Security and Informatization Leading Group, Comrade Xi Jinping proposed that we should proceed from the international and domestic trends, make an overall layout, coordinate all parties, innovate and develop, and strive to build my country into a cyber power .

Building a cyber power is a major decision made by the Party Central Committee based on the overall development of the Party and the country. After the 18th National Congress of the Communist Party of China, the Party Central Committee proceeded from the great struggle with many new historical characteristics, attached importance to the Internet, developed the Internet, and governed the Internet. sexual achievement.

We put forward the strategic goal of building a strong network country, basically established the top-level design and overall structure of network information work, issued the “Opinions on Strengthening Network Security and Informatization Work”, basically straightened out the Internet management leadership system and mechanism, and formed a national “one game of chess” work pattern; The security of Internet ideology has been effectively safeguarded, positive online propaganda has been made bigger and stronger, and heavy blows and sharp swords have been used to manage and control the Internet. A series of major struggles in the field of Internet ideology have been won, which has fundamentally reversed the past. In the situation of being occupied and passively beaten, the positive energy of cyberspace is stronger and the main theme is more high-spirited; the national network security barrier is further consolidated, the network security law is formulated and implemented, the construction of network security guarantee capabilities is strengthened, and the security protection of key information infrastructure is continuously strengthened. Activities have been effectively curbed, and the awareness of network security and protection capabilities of the whole society have been significantly enhanced; the military-civilian integration of network information has achieved phased results, and the network security deterrence and countermeasure capabilities have been continuously enhanced; attention has been paid to the driving and leading role of informatization in economic and social development, “Internet + “The action plan has been implemented in depth, the digital economy and the sharing economy have flourished; positive progress has been made in core technology innovation in the information field, breakthroughs have been made in the research of new-generation mobile communication (5G), high-performance computing, quantum communication and other technologies, and a number of network information enterprises have entered the world In the forefront; the international discourse power and influence of cyberspace have been significantly improved, holding high the banner of cyber sovereignty, promoting the construction of a community of shared future in cyberspace, actively participating in the process of global Internet governance, creating and successfully hosting the World Internet Conference, and winning More and more recognition and support; speed up the construction of network infrastructure and the popularization of information services, the widespread popularization of new technologies and new applications such as online transactions, mobile payment, and shared travel; the accelerated development of e-government affairs; The service level continues to improve, and the people have a greater sense of gain, happiness, and security. The achievement of these historic achievements fully proves that the Party Central Committee’s decision on strengthening the party’s centralized and unified leadership over cybersecurity and informatization work and a series of strategic deployments for cybersecurity and informatization work are completely correct.

The new era calls for new ideas, and new practices breed new theories. In the process of striving to build a strong network country, we have continuously promoted theoretical innovation and practical innovation, not only blazing a way to govern the network with Chinese characteristics, but also put forward a series of new ideas, new viewpoints and new conclusions, forming the strategic thinking of a strong network country. To sum up, there are mainly the following aspects.

First, clarify the important position of cybersecurity and informatization work in the overall situation of the party and the country. We propose that there will be no national security without network security, and no modernization without informatization. If we do not pass the hurdle of being in power for a long time, we must place cybersecurity and informatization work in the overall planning of the party and the country, and earnestly strengthen the party’s centralized and unified leadership.

Second, clarify the strategic goal of building a cyber power. We propose that we must accelerate the construction of a cyber power from the height of realizing the “two centenary” goals and the Chinese dream of the great rejuvenation of the Chinese nation. In accordance with the requirements of strong technology, strong content, strong foundation, strong talents, and strong international discourse power, we must move towards the basic popularization of network infrastructure, significant enhancement of independent innovation capabilities, comprehensive development of the digital economy, strong network security guarantees, and balanced network offensive and defensive capabilities. Keep moving forward, and finally achieve the goal of advanced technology, developed industry, both offensive and defensive capabilities, full control of network control, and indestructible network security.

Third, clarify the principles and requirements for building a cyber power. We propose that we must adhere to the principles of innovative development, governing by law, ensuring security, promoting benefits and eliminating disadvantages, and benefiting the people, adhere to innovation-driven development, cultivate new kinetic energy with informatization, and use new kinetic energy to promote new development; adhere to the rule of law, so that the Internet will always be under the rule of law. We will continue to operate healthily on track; adhere to the correct concept of network security, and build a national network security barrier; adhere to the principle of equal emphasis on preventing risks and promoting healthy development, and grasp opportunities and challenges, so that the Internet can better benefit the society; The people have a greater sense of gain in sharing the fruits of Internet development.

Fourth, clarify the international propositions for Internet development and governance. We propose to adhere to the four principles of global Internet governance: respecting Internet sovereignty, maintaining peace and security, promoting openness and cooperation, and building a good order. The five-point proposal for building a community of shared future in cyberspace, such as ensuring network security and building an Internet governance system, emphasizes joint advancement of development, joint maintenance of security, joint participation in governance, and joint sharing of achievements, and jointly build a peaceful, secure, open, and cooperative cyberspace.

Fifth, clarify the basic methods for doing a good job in cybersecurity and informatization work. We realize that cybersecurity and informatization work involves many fields, and it is necessary to strengthen overall planning and coordination, implement comprehensive management, and form a strong work force. It is necessary to grasp the dialectical relationship between security and development, freedom and order, openness and autonomy, management and service, and comprehensively promote various tasks such as network content construction, network security, informatization, and international governance of cyberspace.

General Secretary Xi Jinping’s important thoughts on the network power, adhere to the Marxist position, viewpoint and method, based on the new era background of human beings entering the information society, systematically summed up our party’s practical experience in network management and network governance, and profoundly answered why we should build a network power and how to build a network power. A series of major theoretical and practical issues such as building a powerful network country, with a high-level view, overall control, profound thinking, and rich connotations, have become the guide to action leading the development of my country’s Internet information industry, and are the fundamental principles for doing a good job in Internet information work. Continuously enrich and develop.

Focusing on the overall development of human society, Comrade Xi Jinping creatively put forward the concept of making the Internet better benefit the world and the people of all countries, and building a community with a shared future in cyberspace. He proposed a Chinese plan for global Internet development and governance, and contributed Chinese wisdom. The mind of a responsible big country and Comrade Xi Jinping’s broad mind of the leader of a big country to seek peace and development for the world and civilization and progress for mankind.

We must combine in-depth study of Comrade Xi Jinping’s important expositions on building a strong network country, strengthen the “four consciousnesses”, strengthen the “four self-confidence”, and achieve “two safeguards”, constantly explore new paths for building a strong network country, and open up a new realm of global network governance , Let the Internet become a powerful boost to realize the Chinese dream of the great rejuvenation of the Chinese nation.

(Author: Xu Shan, Director of the Second Division of the First Research Department of the Central Academy of Party History and Documentation, Deputy Editor)

普通話來源:http://www.cac.gov.cn/2021-03/08/c_161677810000.htm

People’s Republic of China’s Practice of Network Power // 中華人民共和國網絡權力實踐

People’s Republic of China’s Practice of Network Power //

中華人民共和國網絡權力實踐

People’s Daily (April 19, 2018 01 edition)

In today’s world, the information technology revolution is changing with each passing day.

  In contemporary China, the development of the network business has advanced by leaps and bounds.

  From mobile payment everywhere to new high-level online transaction volume; from the nationwide e-government system to the booming big data industry… General Secretary Xi Jinping’s important speech on network security and informationization work published two years ago, China’s online letter With the rapid and healthy development of the business, the Internet has increasingly become an important driving force for national development, and the digital field has continuously achieved leap-forward development.

  

        Under the guidance of the strategic blueprint for the “two hundred years” struggle goal, China, which is opening a new era, is striding towards a new journey of network power.

  Looking ahead and judging the situation, the Party Central Committee with Comrade Xi Jinping as the core points the way forward for building a network power

  In March 2018, the “Deepening the Party and State Institutional Reform Plan” issued by the Central Committee of the Communist Party of China opened a new chapter in the national network letter business – the Central Cyber ​​Security and Informatization Leading Group was changed to the Central Cyber ​​Security and Informatization Committee, responsible for Top-level design, overall layout, overall coordination, overall promotion, and supervision and implementation of major work in this field.

  This is the far-sightedness of the Party Central Committee with Comrade Xi Jinping as the core of the national network letter, and it is also the implementation of the important speech delivered by General Secretary Xi Jinping at the symposium on cybersecurity and informationization.

  Since the 18th National Congress of the Communist Party of China, General Secretary Xi Jinping has accurately grasped the general trend of the times, actively responded to the requirements of practice, deeply examined the major changes in the main social contradictions, and issued a series of important speeches on the development of the network business, clearly proposing the strategic thinking of the network power.

  ”To develop a network business, we must implement a people-centered development thinking.”

  ——According to the ups and downs of Internet technology changes, General Secretary Xi Jinping always puts the people at the highest position, clearly defining “to adapt to people’s expectations and needs, speed up the popularization of information services, reduce application costs, and provide them with affordable and affordable The well-used information service has enabled hundreds of millions of people to gain more sense of sharing Internet development results.”

  “Big data is a new stage in the development of information technology.”

  ——In the face of the information-based competitive environment that you chase after me, General Secretary Xi Jinping made a keen judgment to “understand the current status and trends of big data development and its impact on economic and social development, and analyze the achievements of China’s big data development and Problems exist to promote the implementation of the national big data strategy.”

  ”Building a community of cyberspace destiny.”

  ——Investigating the profound changes in the global Internet governance system, General Secretary Xi Jinping proposed “four principles” and “five points of proposition”, calling for “the Internet is invisible, but the people who use the Internet are tangible, and the Internet is the common home of mankind. It is the common responsibility of the international community to make this home more beautiful, cleaner and safer.

  ……

  New ideas lead new practices, and new strategies open up new journeys. Under the strong leadership of the Party Central Committee with Comrade Xi Jinping as the core, a colorful network of powerful powers is slowly unfolding.

  One-point deployment, nine-point implementation, a series of new policies and new measures for the reform and development of the network letter business are turning into new achievements and new changes

  ”Party committees and governments at all levels should strengthen Internet thinking, be good at using the advantages of the Internet, and focus on integrating, sharing, facilitating, and security, promoting scientific decision-making in government, refining social governance, and improving the efficiency of public services. Perceive the social situation, open communication channels, assist decision-making and governance, and facilitate the masses to do things.

  On April 13, 2018, General Secretary Xi Jinping made important instructions during the inspection of the Hainan Provincial Government Affairs Data Center, once again in order to speed up the development of big data and use information technology to point the way.

  Without informatization, there is no modernization.

  General Secretary Xi Jinping’s important speech on cybersecurity and informatization work has been published for two years. All localities and departments have kept pace with the times, pioneering and innovating, and introduced a series of new policies and new measures to promote the cause of major strategic opportunities in the network letter industry and usher in new Development, new leap.

  ——Continuously strengthen the top-level design, and the information development will add institutional guarantee.

  The Outline of the National Informatization Development Strategy was published, which depicts the development of digital China’s construction in the next 10 years, and clearly sets a clear timetable and roadmap for the construction of a network power. The “13th Five-Year National Informationization Plan” was released. It is proposed to achieve significant results in the construction of digital China as the overall goal of China’s informatization development.

  In the past two years, the informatization development strategy, the national big data strategy, and the “Internet +” action plan have been frequently deployed, and the foundation of the network is solid.

  ——The infrastructure is more perfect, and the digital development paves the way.

  In 2017, the length of new optical cable lines in China was 7.05 million kilometers. The total length of national optical cable lines reached 37.47 million kilometers, an increase of 23.2% over the previous year; the number of Internet broadband access ports reached 779 million, an increase of 9.3%.

  The Action Plan for Promoting the Scale Deployment of the Internet Protocol Version 6 (IPv6) was issued and implemented, and the scale of IPv6 deployment was comprehensively improved. As of December 31, 2017, the total number of IPv6 address allocations in China was 23,430 (/32).

  In the past two years, the quality and coverage of mobile network services have continued to improve, and the development of next-generation Internet has shown great prospects.

  – Internet innovative social governance tools, e-government work into the fast lane.

  At the Taxation Hall of the State Taxation Bureau of Jinjiang City, Fujian Province, the financial manager Shi Jinxing received dozens of special value-added tax invoices through the self-service terminal. He felt that “it took a half-day to become a few minutes, and the government service became more and more convenient. Efficient.”

  Innovative services to benefit the people. The data shows that the current total number of government websites in the country is nearly 32,000; the new government media has become a new channel for communication between the public and the public.

  In December 2017, the Central Network Information Office and other departments jointly launched a two-year national e-government comprehensive pilot project in eight provinces including Beijing, Shanghai and Jiangsu to explore the development of e-government development experience that can be used for promotion, and more convenient and efficient e-government experience. Just around the corner.

  Take the matter at any time, make meritorious deeds from the capital, and profit from the power of all things.

  The 19th National Congress of the Communist Party of China formulated a blueprint for the development of a new era, and proposed to build a network power, digital China, and a smart society, promote the deep integration of the Internet, big data, artificial intelligence and the real economy, develop the digital economy, share the economy, and foster new growth. Point, form new kinetic energy.

  In Zhejiang, the digital economy, which is dominated by software services, Internet of Things, cloud computing, and big data, has exceeded 10 trillion yuan for three consecutive years. In Guizhou, where poverty alleviation is the main battlefield, big data has become one of the three development strategies. Its economic growth rate has been in the forefront of the country for seven consecutive years.

  A series of data and an item of results reflect a series of historical achievements and historic changes in the digital development of China in recent years.

  Let hundreds of millions of people gain more sense of sharing the Internet development achievements, and build a strong power for building a network power.

  At the end of each course, Zhang Fan, an online training teacher, will carefully review the “Magic Mirror System” analysis of the students’ class status and adjust and optimize the teaching plan accordingly.

  Through this system, the camera captures the classroom state, such as raising hands, practicing, listening to classes, speaking, etc., and even facial expression changes at any time. Through multi-dimensional measurement of data, a unique learning report for each student is generated.

  With the help of digital technology, the goal of “there is no education, teaching students in accordance with their aptitudes”, which is the sage of the past dynasties, is now entering an ordinary life.

  No longer just online shopping, sharing bicycles, today, digital technology represented by big data, cloud computing, artificial intelligence is increasingly infiltrating into every aspect of Chinese life: the construction of cancer big data portraits makes health dreams clearer; The guardian platform gives the minors a clearer cyberspace; the 5G “super speed” makes the screen “flashing” words become history…

  New products from the Internet have emerged, and digital technology has turned people’s imagined new life into reality. From the introduction of the network security law to the new stage of legal governance, to the digital economy, the “big artery” is more smooth… The world of the people of the world is more colorful because of the Internet, and the lives of the people are more abundant because of the Internet.

  Promoting the development of the Internet and making good use of the power of the Internet are the basic projects that promote social progress and enhance people’s well-being.

  Liuyu Village is located in the selenium-rich area of ​​southern Meizhou, Guangdong Province, and has a long history of growing tea. However, due to the remote location, poor traffic and information, the sales of tea has not been opened.

  Since the staying tea has been stationed in the Guangdong mobile e-commerce informationization poverty alleviation platform to achieve online sales, the problem of slow sales of tea has been solved. In the past year, the tea sold by the “Lingnan Life” platform has reached 6,000 kilograms, and the single-day sales order has reached a maximum of 1423.

  Statistics show that in 2017, China’s digital economy reached 27.2 trillion yuan, accounting for 32.9% of GDP; e-commerce and online retail continued to grow, e-commerce promoted the steady expansion of rural consumption, and rural consumer infrastructure such as logistics, telecommunications, and transportation. further improvement.

  ”Adhere to the people as the center”, digital development is constantly satisfying people’s yearning for a better life, and the people have more sense of gaining in sharing the development of the Internet.

  “The way of benefit, and the time.”

  In just over 20 years, starting from a network cable with a network speed of only 64 kilobits per second, China now has 700 million netizens and more than 4 million websites. It has built the world’s largest 4G network, and the scale of online retail transactions has jumped. The world’s first… a series of “great”, witnessed a slap in the face of a network power to the network power.

  In just two years, from the speed increase and decrease of the network to the implementation of the Cyber ​​Security Law, from the continuous hosting of the four World Internet Conferences to the Alibaba Cloud Data Center, which covers the major Internet markets in the world, a series of “big-handed” highlights China’s move to a network powerhouse. Determination and confidence.

  In December 2017, General Secretary Xi Jinping emphasized in the second collective study of the Political Bureau of the 19th Central Committee that “the situation will be judged, carefully planned, advanced, and proactive” “accelerate the construction of digital China and better serve China’s economic and social development and people. Life improvement.”

  The construction of digital China is an important measure to implement the internship General Secretary General Ping Ping’s strategic thinking on network power. It is an effective way to adhere to the people-centered development thinking and continuously enhance the people’s sense of acquisition. It is an inevitable requirement for seizing development opportunities and accelerating the modernization process.

  This is an urgent call for the new era, and it is a firm declaration of China in the new era.

  Under the strong leadership of the Party Central Committee with Comrade Xi Jinping as the core, the development of China’s network information industry will surely take greater steps in the construction of a network powerhouse, and create a more awkward innovation for the Chinese dream of building a well-off society in an all-round way and realizing the great rejuvenation of the nation. power.

 

Original Mandarin Chinese:

當今世界,信息技術革命日新月異。

當代中國,網信事業發展突飛猛進。

從隨處可見的移動支付到屢創新高的網絡交易額;從覆蓋全國的電子政務系統到蓬勃發展的大數據產業……習近平總書記關於網絡安全和信息化工作重要講話發表兩年來,我國網信事業快速健康發展,互聯網日益成為國家發展重要驅動力,數字領域不斷實現跨越式發展。

在“兩個一百年”奮鬥目標的戰略藍圖指引下,開啟新時代的中國,正在闊步邁向網絡強國的新征程。

高瞻遠矚、審時度勢,以習近平同志為核心的黨中央為建設網絡強國指明前進方向

2018年3月,中共中央印發的《深化黨和國家機構改革方案》,揭開了國家網信事業的新篇章——中央網絡安全和信息化領導小組改為中央網絡安全和信息化委員會,負責這一領域重大工作的頂層設計、總體佈局、統籌協調、整體推進、督促落實。

這是以習近平同志為核心的黨中央對國家網信事業的深謀遠慮,也是對習近平總書記在網絡安全和信息化工作座談會上發表的重要講話的貫徹落實。

黨的十八大以來,習近平總書記準確把握時代大勢,積極回應實踐要求,深刻審視社會主要矛盾新變化,就網信事業發展發表一系列重要講話,鮮明提出了網絡強國的戰略思想。

“網信事業要發展,必須貫徹以人民為中心的發展思想。”

——順應風起雲湧的互聯網技術變革,習近平總書記始終把人民放在最高位置,明確“要適應人民期待和需求,加快信息化服務普及,降低應用成本,為老百姓提供用得上、用得起、用得好的信息服務,讓億萬人民在共享互聯網發展成果上有更多獲得感”。

“大數據是信息化發展的新階段。”

——面對你追我趕的信息化競爭環境,習近平總書記敏銳地作出判斷,要求“深入了解大數據發展現狀和趨勢及其對經濟社會發展的影響,分析我國大數據發展取得的成績和存在的問題,推動實施國家大數據戰略”。

“構建網絡空間命運共同體。”

——洞察全球互聯網治理體系的深刻變革,習近平總書記提出“四項原則”“五點主張”,呼籲“互聯網雖然是無形的,但運用互聯網的人們都是有形的,互聯網是人類的共同家園。讓這個家園更美麗、更乾淨、更安全,是國際社會的共同責任”。

……

新理念引領新實踐,新戰略開啟新征程。在以習近平同志為核心的黨中央堅強領導下,一幅五彩斑斕的網絡強國畫卷正在徐徐展開。

一分部署、九分落實,一系列網信事業改革發展的新政策新舉措正在化為舉世矚目的新成就新變革

“各級黨委和政府要強化互聯網思維,善於利用互聯網優勢,著力在融合、共享、便民、安全上下功夫,推進政府決策科學化、社會治理精細化、公共服務高效化,用信息化手段更好感知社會態勢、暢通溝通渠道、輔助決策施政、方便群眾辦事,做到心中有數。”

2018年4月13日,習近平總書記在考察海南省政務數據中心時作出的重要指示,再一次為加快大數據發展、用好信息化手段指明方向。

沒有信息化就沒有現代化。

習近平總書記關於網絡安全和信息化工作重要講話發表兩年來,各地各部門與時俱進、開拓創新,出台一系列新政策、新舉措,推動網信事業抓住重大戰略機遇期,迎來新發展、新飛躍。

——持續加強頂層設計,信息化發展更添制度保障。

《國家信息化發展戰略綱要》出台,描繪了未來10年數字中國建設的發展圖景,為網絡強國建設標識出清晰的時間表和路線圖;《“十三五”國家信息化規劃》發布,明確提出將數字中國建設取得顯著成效作為我國信息化發展的總目標。

兩年間,信息化發展戰略、國家大數據戰略、“互聯網+”行動計劃等頻密部署,網絡強國基礎夯實。

——基礎設施更加完善,數字化發展鋪就前進道路。

2017年,我國新建光纜線路長度705萬公里,全國光纜線路總長度達3747萬公里,比上年增長23.2%;互聯網寬帶接入端口數量達到7.79億個,增長9.3%。

《推進互聯網協議第六版(IPv6)規模部署行動計劃》印發實施,IPv6規模化部署全面提升。截至2017年12月31日,我國IPv6地址分配總數為23430塊(/32)。

兩年間,移動網絡服務質量和覆蓋範圍持續提升,下一代互聯網發展展現美好前景。

——互聯網創新社會治理手段,電子政務工作駛入快車道。

在福建晉江市國稅局辦稅大廳,財務經理施金星通過自助終端機領取了數十份增值稅專用發票後,深感“原先要花半天的時間變成了幾分鐘,政府服務越來越便捷高效”。

創新服務,利企便民。數據顯示,目前全國政府網站運行總數近3.2萬家;政務新媒體成為溝通社情民意的新渠道。

2017年12月,中央網信辦等部門聯合在北京、上海、江蘇等8省份開展為期2年的國家電子政務綜合試點,探索形成可藉鑑推廣的電子政務發展經驗,更加方便高效的電子政務體驗指日可待。

隨時以舉事,因資而立功,用萬物之能而獲利其上。

黨的十九大製定了面向新時代的發展藍圖,提出要建設網絡強國、數字中國、智慧社會,推動互聯網、大數據、人工智能和實體經濟深度融合,發展數字經濟、共享經濟,培育新增長點、形成新動能。

在浙江,以軟件服務業、物聯網、雲計算、大數據等為主體的數字經濟規模連續3年超萬億元;在脫貧攻堅主戰場的貴州,大數據成為三大發展戰略支撐之一,其經濟增速已連續7年位居全國前列。

一串串數據、一項項成果,折射出近年來我國數字化發展的一系列歷史性成就、歷史性變革。

讓億萬人民在共享互聯網發展成果中有更多獲得感,為建設網絡強國凝聚磅礴力量

每次課程結束,在線培訓教師張帆都會仔細查看“魔鏡系統”對學生上課狀態的分析,並據此調整優化教學方案。

通過這一系統,攝像頭隨時捕捉學生上課時的舉手、練習、聽課、發言等課堂狀態,甚至面部表情的變化,通過多維度量化數據,生成專屬每一個學生的學習報告。

借助數字技術,“有教無類、因材施教”這一歷代先賢嚮往的目​​標如今正在走入尋常生活。

不再僅僅是網上購物、共享單車,如今,以大數據、雲計算、人工智能為代表的數字技術正日益滲透進中國人生活的方方面面:癌症大數據畫像的構建讓健康夢想更加清晰;“成長守護平台”給未成年人一片更為清朗的網絡空間;5G“超級網速”使屏幕閃現的“加載中”字樣成為歷史……

從互聯網催生的新產品新業態競相湧現,到數字技術將人們想像中的智能新生活變為現實;從出台網絡安全法開啟依法治網新階段,到數字經濟的“大動脈”更加通暢……億萬國人的世界因互聯網而更多彩,百姓的生活因互聯網而更豐富。

推動互聯網發展,用好互聯網的力量,是促進社會進步、增進人民福祉的基礎性工程。

留畬村位於廣東梅州南部的富硒地帶,種茶歷史悠久。但由於地理位置偏僻,交通和信息不暢,留畬茶的銷路一直沒有打開。

自從留畬茶進駐廣東移動電商信息化扶貧平台,實現在線銷售,茶葉滯銷難題迎刃而解。一年來,經“嶺南生活”平台售出的留畬茶多達6000餘斤,單日銷售訂單最高達1423單。

統計顯示,2017年,中國數字經濟規模達27.2萬億元,佔GDP比重達32.9%;電子商務、網絡零售持續增長,電商推動農村消費規模穩步擴大,物流、電信、交通等農村消費基礎設施進一步完善。

“堅持以人民為中心”,數字化發展正不斷滿足人民對美好生活的嚮往,百姓在共享互聯網發展成果上擁有了更多獲得感。

“凡益之道,與時偕行。”

短短20多年時間,從一條網速僅有64千比特每秒的網線出發,如今我國已經擁有7億網民、400多萬家網站,建成了全球最大的4G網絡,網絡零售交易額規模躍居世界第一……一連串的“了不起”,見證了一個網絡大國向網絡強國邁進的鏗鏘足音。

短短兩年間,從網絡提速降費到網絡安全法啟動實施,從連續主辦四屆世界互聯網大會到阿里雲數據中心基本覆蓋全球主要互聯網市場,一系列的“大手筆”,彰顯中國邁向網絡強國的決心與信心。

2017年12月,習近平總書記在十九屆中央政治局第二次集體學習時強調,“審時度勢、精心謀劃、超前佈局、力爭主動”“加快建設數字中國,更好服務我國經濟社會發展和人民生活改善”。

建設數字中國是貫徹落實習近平總書記關於網絡強國戰略思想的重要舉措,是堅持以人民為中心的發展思想、不斷增強人民獲得感的有效途徑,是搶抓發展機遇、加快現代化進程的必然要求。

這是新時代的迫切呼喚,更是新時代中國的堅定宣示。

在以習近平同志為核心的黨中央堅強領導下,我國網信事業發展必將在網絡強國的建設中邁出更大步伐,為全面建成小康社會,實現民族偉大復興的中國夢凝聚更加澎湃的創新動力。

Referring URL: http://paper.people.com.cn/rmrb/html/2018-04/

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar // 中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar //

中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Author: Source: Netease military

DTG: 2016-01-04 08:XX:XX

Strategic support forces are not logistical support or more powerful than the Rockets. Three tears on, how effective has China’s SSF become in the realm of cyber warfare?

Abstract: On December 31, 2015, the PLA Army Leadership, Rocket Army, and Strategic Support Forces were established. Xi Jinping, General Secretary of the CPC Central Committee, President of the State Council, and Chairman of the Central Military Commission, awarded the newly established three major units. The major steps marking the reform of the PLA’s army are beginning to be gradually implemented. Among the three new units, the strategic support force is definitely a brand new name, which naturally raises many questions. What kind of force is this?

The strategic support force should be called Skynet Army: it will change the war.

Strategic support is not logistical support

The newly established three units, the Army’s leading body is also the Army’s headquarters. The former PLA has always been the army’s boss. The mainland’s thinking is deeply rooted. Therefore, only the navy and air force headquarters, and no army command, the top leaders of the army are all from The army, the head of the navy and air force ranks among the members of the Central Military Commission, and it is more symbolic. The establishment of the Army Headquarters now means that the status of the Army will gradually be lowered and will be consistent with other services. This will lay the foundation for the model of the highest military leadership in the rotation of the heads of the Western military in the future, and further strengthen the synergy for the various services. The conditions.

The Rockets are no strangers to military fans. They are the former Second Artillery Corps, which is essentially a strategic missile force. The strategic missile unit of the former Soviet Union was called the Strategic Rocket Army. When the PLA established the strategic missile force, the international situation was surging. For the sake of low-key restraint, Zhou Enlai proposed the name of the Second Artillery. Now renamed the Rocket Army, the name is more prestige, more directly strengthen the significance of strategic deterrence.

Relative to the above two units, for those concerned about national defense construction, the strategic support force will be much more strange. When many people hear this name, the first reaction is the logistics support force, which is a big mistake! The strategic support force is actually a genuine combat force. It is nominally supportive. In many cases, it is the first open-minded pioneer to fight, even to enter the battlefield earlier than the land, sea, air force and rocket forces. According to the spokesman of the Ministry of National Defense, the strategic support force is a new type of combat force for safeguarding national security and an important growth point for our military’s new combat capability. It is mainly a strategic, basic, and supportive type. The support force is formed after the functional integration.

The strategic support force should be called Skynet Army: it will change the war.

Specifically, the strategic support force will include five parts: intelligence reconnaissance, satellite management, electronic countermeasures, cyber offense and defense, and psychological warfare. It is a combination of the most advanced corps, the net army, and other battlefields on the battlefield. More specifically, it is a combat force dedicated to the soft kill mission.

This is also the adjustment of the military reform at the military level. The PLA is divided into the traditional land, sea and air force, the strategic deterrent and the attacking rocket army and the most modern “sky-net” army. The three levels of division of labor are clear, and they can strengthen each other. The synergy between the two, to maximize the advantages of the overall war, is undoubtedly the highlight of this military reform.

Five major parts highlight high-tech content

Let’s take a closer look at the five major components of the Strategic Support Army. First, intelligence reconnaissance. This is not a spy war in the traditional sense. It is not like the old movie “The Crossing River Scout”, which disguise itself as a deep enemy. More is technical reconnaissance. With the increasing popularity of modern equipment, the leakage of various technical information is difficult to avoid, such as radio signals, electromagnetic signals, infrared signals, etc., through the collection and analysis of these signals, a large amount of valuable information can be obtained, strategic support forces The reconnaissance is mainly the technical reconnaissance in this respect, which can be carried out through modern equipment such as reconnaissance satellites, reconnaissance planes, drones, and sensors.

The strategic support force should be called Skynet Army: it will change the war.

Satellite management is the so-called “Heavenly Army”. This is a new type of force that has emerged with the rapid development of space technology, especially satellite information reconnaissance, tracking and surveillance, guided navigation and aerospace weapons. The United States established the National Space Command in 1985, marking the birth of the world’s first heavenly army. Russia subsequently separated the military space force and the space missile defense force from the strategic rocket army and established a space force with a total strength of about 90,000 people. Then with the military reform of the People’s Liberation Army, the “Heavenly Army” under the strategic support force was formally formed and became a force dedicated to space operations in the future. The significance is significant.

The history of electronic confrontation is much longer than that of the Tianjun. As early as in the First World War, both sides have had the information of the other party and the communication of the other party. To the Second World War, the means of electronic confrontation. Both the scale and the scale have been greatly developed. In July 1943, the British army used metal foil strips to interfere with the German radar in the bombing of Hamburg, Germany, which was considered the beginning of modern electronic confrontation. During the Middle East War in the 1960s, electronic confrontation played a decisive role. Under today’s technical conditions, there is no need to spend more on electronic countermeasures.

Network attack and defense is also called cyber warfare. It is the rise of the network, exploiting the loopholes and security flaws of the network to attack and destroy the data in the hardware, software and systems of the network system. In 2001, there was a large-scale civil hacking incident between China and the United States, which stimulated the United States to a certain extent. By 2009, the world’s first cyber command was established. Through the opportunity of military reform, China has set up a specialized cyber warfare force and began systematically investing and developing in the fields of information construction and network attack and defense. This is a milestone for the future war, which is bound to spread to the network. meaningful.

003

In the end, it is psychological warfare, that is, by applying the principle principle of psychology, taking human psychology as the battlefield, and systematically adopting various means, including the means of communication, such as the Internet, television, and broadcasting, which cannot be separated from modern life. Cognitive, emotional, and will exert influence, mentally disintegrating enemy military and civilian fighting spirits or eliminating the influence of enemy propaganda, thus combating the enemy’s mind, in exchange for the greatest victory and benefits at the least cost. Psychological warfare sounds very mysterious. In fact, as mentioned in “Sun Tzu’s Art of War·The Tactics”: “It is the victorious battle, the good ones who are not good, the soldiers who do not fight and the good, and the good ones.” The “war without a war” is the ultimate goal of today’s psychological war. In the Battle of Normandy in the Second World War, the Allies used a large number of psychological warfare methods, which seriously affected the judgment of the German commander-in-chief and made great contributions to the victory of the battle. Since then, from the Korean War, the Vietnam War, to today’s Iraq War and the Afghan War, the US military has had professional psychological warfare troops to participate in the war. Therefore, this is the most easily overlooked military means, but it is a high level of military struggle, and even more efficient and effective than advanced aircraft cannons.

Therefore, it can be said that the strategic support force is the highest in the five major services after the reform of the PLA’s army. It can even be said to be completely different from the traditional war style of the past, and it is more characterized by ultra-modern flow.

004

Soft killing

According to the strategy disclosed on the network, the armbands are supported on the network. The above is the eight-and-five-pointed star. Below is the triangular arrow and the electronic cloud orbit. Surrounded by the surrounding wheat ears, it can be seen from this pattern that the strategic support force is not a traditional one. In the sense of steel contest, you can’t see the scene of the smoke, and there is no such thing as a nuclear weapon to destroy the horror of the sea, but the soft kill of the soldiers. In a sense, soft killing is no less inferior than hard killing, and even playing a role is more important than hard killing.

In contrast, until today, the US military has only independent scattered Tianjun, Net Army and psychological warfare units, but the PLA Strategic Support Forces have integrated these units directly in the preparation, and they are able to cooperate and play the greatest combat effectiveness. . It can be said that this major reform of the military, especially the establishment of the strategic support force, is definitely a major improvement in the system.

Imagine that without the strategic support force’s satellites accurately positioned and navigated, without the electronic escaping forces and cyber warfare forces escorting, the Rocket’s strategic missiles will be difficult to function; if there is no strategic support for the technical reconnaissance intelligence support, Satellite communication links, then the land, sea and air forces on the vast battlefield are blind and deaf, and the combat effectiveness is greatly reduced. Therefore, the strategic support forces will play a major role in the invisible four-dimensional and five-dimensional battlefield space.

Original Mandarin Chinese:

战略支援部队可不是后勤支援,或比火箭军更厉害

摘要:2015年12月31日,解放军陆军领导机构、火箭军、战略支援部队成立,中共中央总书记、国家主席、中央军委主席习近平给新成立的这三大单位授旗。标志着此轮解放军军队改革重大步骤正开始逐步落实,在这三个新单位中,战略支援部队绝对是个全新的名称,自然会引起不少的疑问,这到底是支怎样的部队呢?

战略支援部队就应该叫天网军:将改变战争

战略支援可不是后勤支援

这次新成立的三个单位,陆军领导机构也就是陆军总部,原来解放军历来就是陆军老大,大陆军的思想根深蒂固,所以只有海军、空军司令部,而不设陆军司令部,军队最高领导全都出自陆军,海空军首长位列中央军委委员,也更多是象征意义。现在设立陆军总部,也就意味着陆军的地位逐渐下调,将和其他军种相一致,这为今后仿效西方各军种首长轮流担任军队最高领导的模式打下了基础,同时也对各军种进一步加强协同创造了条件。

火箭军对于军迷来说也是并不陌生,就是以前的第二炮兵,实质就是战略导弹部队。前苏联的战略导弹部队就叫战略火箭军,解放军成立战略导弹部队时,国际形势风起云涌,出于低调克制的考虑,由周恩来提议采用了第二炮兵的名称。现在改称火箭军,在名称上就威风多了,更直接地强化了战略威慑的意义。

相对上述两个单位,对于关心国防建设的人来说,战略支援部队就要陌生多了。很多人一听到这个名称,第一反应就是后勤支援部队,那就大错特错了!战略支援部队其实一样是货真价实的作战部队,名义上是支援,很多时候反而是第一个冲锋陷阵的开路先锋,甚至要比陆海空军和火箭军更早地投入战场。按照国防部发言人的话来说,战略支援部队是维护国家安全的新型作战力量,是我军新质作战能力的重要增长点,主要是将战略性、基础性、支撑性都很强的各类保障力量进行功能整合后组建而成。

战略支援部队就应该叫天网军:将改变战争

具体来说,战略支援部队将包括情报侦察、卫星管理、电子对抗、网络攻防、心理战等五大部分,是综合了这个时代最先进的天军、网军等看不见硝烟的战场上的作战部队,更确切地说是专门担负软杀伤使命的作战力量。

这也是此次军队改革在军种层面的调整,将解放军分为传统的陆海空军、战略威慑和打击的火箭军和最现代化的“天-网”军,三个层次分工明确,又能强化相互之间的协同配合,最大限度地发挥出整体战的优势,无疑是本次军队改革的重头戏。

五大部分凸现高科技含量

再来细看战略支援军的五大组成部分,先是情报侦察,这可不是传统意义上打入敌人内部的谍战无间道,也不是像老电影《渡江侦察记》那样乔装改扮深入敌后,而更多的是技术侦察。随着现代化装备越来越普遍,各种技术信息的泄漏很难避免,比如无线电信号、电磁信号、红外信号等等,通过对这些信号的搜集和分析就可以获取大量宝贵的情报,战略支援部队的侦察主要就是这方面的技术侦察,可以通过侦察卫星、侦察机、无人机、感应器等现代化装备来进行。

战略支援部队就应该叫天网军:将改变战争

卫星管理就是所谓的“天军”,这是随着航天技术的飞速发展,特别是卫星信息侦察、跟踪监视、制导导航及航天兵器的广泛应用,应运而生的新型部队。美国在1985年成立了全美航天司令部,标志着世界上第一支天军的诞生。俄罗斯随后也将军事航天部队和太空导弹防御部队从战略火箭军中分离出来,成立了一支总兵力约9万人的航天部队。那么随着解放军这次军事改革,隶属于战略支援部队的“天军”也正式组建,成为今后专门承担航天作战的部队,意义可谓重大。

电子对抗的历史就要比天军更为悠久,早在第一次世界大战中交战双方就都曾有过侦收对方的信息和干扰对方通信联络,到第二次世界大战,电子对抗的手段和规模都有了很大发展,1943年7月英军在对德国汉堡的轰炸中大规模使用金属箔条干扰德军雷达,被认为是现代电子对抗的开始。到60年代中东战争期间,电子对抗更是发挥了决定性的作用。在今天的技术条件下,电子对抗就不用再多费口舌了。

网络攻防也叫网络战,是随着网络的兴起,利用网络存在的漏洞和安全缺陷对网络系统的硬件、软件及其系统中的数据进行攻击和破坏。2001年中美之间就曾发生过大规模的民间黑客攻击事件,这在一定程度上刺激了美国,到2009年成立了世界上第一个网络司令部。中国此次借着军队改革的契机,组建了专业化的网络战部队,开始系统地在信息化建设和网络攻防领域进行投入和发展,这对于未来战争势必波及到网络的大趋势,是具有里程碑意义的。

003

最后则是心理战,也就是通过运用心理学的原理原则,以人类的心理为战场,有计划地采用各种手段,包括现代生活须臾不能脱离的网络、电视、广播等传播手段,对人的认知、情感和意志施加影响,从精神上瓦解敌方军民斗志或消除敌方宣传所造成的影响的对抗活动,从而打击敌方的心志,以最小的代价换取最大胜利和利益。心理战听起来很是玄乎,其实《孙子兵法·谋攻篇》中所提到的:“是故百战百胜,非善之善者也;不战而屈人之兵,善之善者也。” 这里的“不战而屈人之兵”就是今天心理战所要达到的终极目标。在第二次世界大战中的诺曼底登陆战役,盟军就曾运用了大量的心理战手段,严重影响干扰了德军统帅部的判断,为战役的胜利做出了巨大贡献。此后,从朝鲜战争、越南战争,直到今天的伊拉克战争和阿富汗战争,美军都曾有专业的心理战部队参战。因此,这是最容易被忽视的军事手段,但却是军事斗争的高级层次,甚至要比先进的飞机大炮更有效率和作用。

因此,可以说战略支援部队是解放军军队改革之后五大军种中,高科技含量最高的,甚至可以说是完全不同于过去传统战争的样式,更多地带有超现代流的特色。

004

不容小觑的软杀伤

根据网络上披露的战略支援部队臂章图案,上面是八一五角星,下面是三角箭头和电子云轨道,周围是环绕的麦穗,从这个图案中就可以看出,战略支援部队并不是传统意义上钢铁的较量,看不到硝烟滚滚的场景,更没有核武器那样毁山灭海的恐怖威力,而是兵不血刃的软杀伤。从某种意义上来说,软杀伤丝毫并不比硬杀伤逊色,甚至所发挥的作用更要比硬杀伤重要。

相比之下,直到今天美军才只有独立分散的天军、网军和心理战部队,但解放军战略支援部队则将这些部队直接在编制上整合在一起,更能协同配合,发挥出最大的战斗力。可以说是这次军队的大改革,特别是战略支援部队的成立,在体制上绝对是一大进步。

试想一下,如果没有战略支援部队的卫星准确地定位和导航,没有电子干扰部队、网络战部队的保驾护航,那么火箭军的战略导弹就难以发挥作用;如果没有战略支援部队技术侦察的情报保障、卫星的通讯联系,那么分布在广阔战场上的陆海空军部队就是眼盲耳聋,战斗力也要大打折扣。因此,在看不到的四维、五维战场空间,战略支援部队必将发挥出重大的作用。

Original Referring URL:  http://war.163.com/16/0104/08/

Chinese Military Information Warfare: The First Game of Modern Warfare // 中國軍事信息戰:現代戰爭的第一場戰爭

Chinese Military Information Warfare: The First Game of Modern Warfare //

中國軍事信息戰:現代戰爭的第一場戰爭

  The transformation of the characteristics of war is always motivated by the advancement of science and technology. If “information-led” is the characteristic of the era of today’s war, then the essence of this feature is “the dominance of information technology.” Information warfare is a new combat force that is fostered and fueled by information technology innovation.

Information warfare is the new quality of combat power

三、衛星在現代戰爭中扮演的角色為何? 四、資訊戰有哪兩種主要模式?

“knowing one’s own confidant, no wars, no war” has always been the only rule of war victory, it actually embodies the important role of “information” in the war. Since ancient times, the military has always been pursuing the dispelling of “the fog of war”, reducing the probabilistic nature of the war, and taking the lead. At the same time, it hopes to quickly gather the fighting energy with accurate and timely information to make the enemy win the enemy. Nowadays, the heroic pace of human innovation in information technology has driven the rapid development of society. The myth of “thousands of eyes and ears” has long been a reality. While the results of information technology innovation and development are fully utilized for war, they are also constantly promoting the transformation of the combat capability generation model.
The germination of information warfare can be traced back to the beginning of the last century. Shortly after the advent of the radio telegraph, Russian scientist Popov proposed the idea of ​​radio communication struggle in 1903. In the Japanese-Russian War that broke out in 1904, the two sides used radio communication for the first time. One day in April of that year, the Russian military operator subconsciously used the radio station to interfere with the shooting and guiding communication of the Japanese fleet, forcing the Japanese to return without success. The original sprout of this technical idea gave birth to a new way of warfare, and the information war began to enter the stage of war. The highly developed information technology has made “systems based on information systems” a feature of today’s war. It should be said that systemic confrontation is not a form of engagement that exists today. Both sides of the war have sought to form a strong operational system. In different historical periods, the system has different manifestations. Today’s combat system is an unprecedentedly powerful combat system that relies on networked information systems. An important manifestation of information technology playing a leading role in modern warfare is to promote the rapid development of information warfare. At the same time that “information-led” became the identifier of modern warfare, information warfare began to leap into a new kind of combat power.
Having a strong information power makes an army savvy and responsive, and the integration of information power into the strike force increases the military’s operational effectiveness into a geometric progression. Information warfare is the first sword to break the efficient integration of information firepower.
Information power is the ability to acquire, transmit, process, and use information. The enhancement of information means that information is acquired more and more comprehensively, information transmission is faster and more accurate, information processing is automated, and information usage tends to be intelligent. This makes the military’s command efficient, precise control, quick action, and powerful. From the perspective of operational mechanism, the effectiveness of information power in the combat system is manifested in the synergy of the strike force and the transformation of combat effectiveness. Although the information itself cannot directly kill the enemy, the information is used to realize the intelligent control of the combat weapon. Produced a powerful and powerful strike and non-contact strike.
Information deterrence is an important information warfare action, which can reduce the intensity of confrontation, and even force the opponent to give up resistance. It may produce a satisfactory combat effect and achieve the highest pursuit of “no war and defeated soldiers”. The principle is that the opponent It is a huge blow to the coming, and it is limited to the ability to stop the information. The achievement of the deterrent effect is the fusion effect of the multiple elements of strength, ability and determination. As a result of the high degree of integration of information and firepower, information multiplies the effectiveness of firepower, and firepower transforms information energy. The goal of information warfare is the opponent’s information system, which plays the role of “covering ears, obstructing, chaos”, so that the information power of the opponent is weakened and even lost, and the fusion of information firepower cannot be discussed. During the Gulf War, when the multinational forces scraped the “Desert Storm”, they first used a variety of electronic interference methods in the air and on the ground. At the same time, they used firepower to prioritize the communication and radar systems of the Iraqi army, making the Iraqi defense system still not in use. The powerful information power is completely lost, so it is stable. In the Kosovo war, the US military used a mistake in information warfare to provide a good opportunity for the Yugoslav army to make its air defense units cleverly use the less advanced information system to achieve effective integration of information firepower and shoot down the US military stealth fighters. Practice has proved that under the conditions of informationization, information warfare has become the first sword to break the efficient integration of opponents’ information firepower.
Information warfare is the primary action of transforming the enemy and the enemy
. The competition between the spear and the shield will never stop and escalate. When “information-led” shows great advantages, it will inevitably lead to “information counter-measure”. The containment of information will immediately reverse the original advantage. Information warfare is the primary action to transform the enemy and the enemy.
The basic types of combat are offense and defense, and the material means used for combat can also be divided into two types of weapons and equipment: spear and shield. Today, when combat weapons have unprecedented lethality, no one will use concentrated forces to concentrate their advantages. Synchronous strikes in different places can be an effective way to “eliminate the enemy and save oneself”, that is, the strike forces scattered in different locations simultaneously target the same target. Attacks are initiated, but only if there is precise time coordination.
Keeping time synchronized, it is obviously impossible to rely on the past manual pairing. Advanced techniques such as navigation satellite timing must be used, and once the timing synchronization information is destroyed by the opponent, the action will be completely disrupted. A force with high engine power and strike force, if attacked by the opponent’s information, causes information to be ineffective and information blocked, will not be able to figure out the direction of the action, can not find the target of the attack, become sluggish and weak. . Although the precision strike power is large, once the accurate guidance information is lost, the advantage is immediately lost. Command and control If the information is subject to control, it will lead to chaos, which will inevitably lead to chaos in the overall situation of the war.
Attacking the enemy’s information system is the focus and effort to break the battle system. The acquisition and use of information, counter-acquisition, and counter-utilization have become the focus of the battle between the two armies on the informationized battlefield. Information warfare is the preferred style for competing for battlefield control and even for war initiative.
While greatly improving the effectiveness of the combat system, the information system naturally becomes the target of the opponent’s attack, and it is the key target. Information warfare is to blinden the enemy battlefield perception system, weaken its information acquisition ability, interfere with its analysis and judgment; to block the enemy information transmission system, disrupt its coordination and destroy its actions; to deter the enemy accusation system by deception, reduce its command efficiency, Lead to mistakes in their decision-making. The more the information technology is developed and the more highly dependent on the information system, the more serious the consequences of its information system attack. Quaker, former chairman of the American “Old Ravens” Association, once wrote: “Advanced technology makes us highly dependent on the electromagnetic spectrum, but at the same time, we are not well invested in building electronic protection capabilities.” “The enemy uses cheap commercial technology. It can reduce or even destroy the performance of our expensive ISR equipment and weapon platforms, thereby limiting or even seriously weakening our technological advantages.” Because military electronic information systems are being widely used worldwide, in fact, the degree of dependence of national military on information systems It is constantly deepening. Therefore, all military powers are competing to develop information warfare. Some small countries are not willing to lag behind and follow suit. In modern warfare, it is of vital importance to seize the comprehensive control of the battlefield. The right to make information has become an indispensable commanding height, and it is the primary means of controlling the battlefield and mastering the initiative of war.
The information war has stood at the forefront of the contemporary military game. The
war is usually based on crossfire. The information war is invisible, the threshold is low, and the controllability is good. In peacetime, it is possible to start a dark battle and quietly extend the border of war. Information warfare has stood at the forefront of contemporary military games.
In today’s world, the use of military means is becoming more complex. War is not only a continuation of politics, but also a close integration of politics and military, subject to the overall strategy of political strategy. The use of force will also interact with politics, economy, diplomacy, and public opinion in a multi-dimensional, organically connected and closely coordinated. Information warfare is active on an invisible front, spanning peacetime and wartime. For example, the confrontation between information warfare reconnaissance and counter-reconnaissance between major powers is now almost every day. Although it is widely believed that the engagement of fire is a watershed between war and peace, the boundaries of war are changing due to the particularity of the use of new military struggle styles such as information warfare. According to reports, the US government recently publicly stated that the law of war applies to cyberattacks. It believes that certain cyber attacks are equivalent to the “use of force” legal concept as defined in the UN Charter. The attacked countries can use conventional military forces or cyber weapons. Counterattack. At the same time, we also see that the arrival of the information age has made the shadow of information warfare often appear in the struggle in the ideological field. The construction and development of information warfare capabilities have received increasing attention from all countries. In December 2011, Iran comprehensively used information warfare methods such as interference suppression, data deception, and link control to successfully deceive and capture a US military RQ-170 “sentinel” unmanned reconnaissance aircraft, which shocked the US military.

Original Mandarin Chinese:

戰爭特徵的嬗變總是由科學技術進步來激發,如果說“信息主導”是當今戰爭的時代特徵,那麼這一特徵的實質則是“信息技術的主導”。信息戰是信息技術創新孕育和助長的新質戰鬥力。

信息戰是新質戰鬥力

三、衛星在現代戰爭中扮演的角色為何? 四、資訊戰有哪兩種主要模式?

“知彼知己,百戰不殆”一直是戰爭制勝的不二法則,它實際上體現了“信息”在戰爭中的重要作用。自古以來,兵家總是在不斷追求驅散“戰爭迷霧”,降低戰爭的蓋然性,搶占先機;同時希望能夠以準確及時的信息迅速聚集戰鬥能量,制敵勝敵。如今,人類創新信息技術的豪邁步伐,驅動了社會的迅猛發展,“千里眼、順風耳”的神話早已成為現實。信息技術創新發展成果在立即為戰爭所充分利用的同時,也在不斷推動戰鬥力生成模式的轉變。
信息戰的萌芽可以上溯到上個世紀初。當時無線電報問世不久,俄國科學家波波夫就於1903年提出了無線電通信鬥爭的思想。 1904年爆發的日俄戰爭中,作戰雙方首次運用了無線電通信,當年4月的一天,俄軍報務員下意識地利用無線電台干擾了日軍艦隊的射擊引導通信,迫使日軍無功而返。這種技術思想的原始萌動孕育了一種新的作戰方式,信息戰開始登上戰爭的舞台。信息技術的高度發達,使得“基於信息系統的體係作戰”成為當今戰爭的時代特徵。應該說,體係對抗並不是今天才有的交戰形式,戰爭中交戰雙方都力求形成一個強大的作戰體系,在不同歷史時期,體係有著不同的表現形態。今天的作戰體係是依靠網絡化的信息系統聯成的一個威力空前強大的作戰體系,信息技術在現代戰爭中發揮主導作用的一個重要表現,就是助長了信息戰的快速發展。在“信息主導”成為現代戰爭的標識符的同時,信息戰開始躍變為一種新質戰鬥力。
擁有強大的信息力使一支軍隊耳聰目明、反應敏捷,信息力融入打擊力則使軍隊的作戰效能成幾何級數增加。信息戰是打破信息火力高效融合的第一把利劍。
信息力是獲取、傳輸、處理、使用信息的能力。信息力的增強意味著信息的獲取更多、更全,信息的傳輸更快、更準,信息的處理具備自動化,信息的使用趨於智能化。這就使得軍隊的指揮高效,控制精準,行動迅捷,打擊有力。從作戰機理上看,信息力在作戰系統中的效能發揮,體現的是對打擊力的增效和向戰鬥力的轉化,信息本身雖不能直接殺傷敵人,但使用信息實現打擊兵器的智能化控制就產生了威力巨大的精確打擊和非接觸打擊。
信息威懾是一種重要的信息戰行動,可以降低對抗強度,甚至迫使對手放棄抵抗,可能產生令人滿意的戰鬥力效應,實現“不戰而屈人之兵”的最高追求,而其原理是對手懾於隨之會來的巨大打擊力,懾於能力而止於信息,威懾效果的達成是實力、能力、決心多元要素的融合效應。信息與火力的高度融合的結果就是,信息使火力效能倍增,火力讓信息能量轉化。信息戰的目標是對手的信息系統,起到的作用是“掩耳、障目、亂心”,使對手的信息力受到削弱以至喪失,信息火力的融合也就無從談起。海灣戰爭中,多國部隊刮起“沙漠風暴”之時,首先動用的就是空中和地面的多種電子乾擾手段,同時運用火力優先打擊伊軍的通信和雷達系統,使得伊軍防禦體系中尚不強大的信息力完全喪失,因而穩操勝券。而科索沃戰爭中,美軍使用信息戰的一次失誤,為南聯盟軍隊提供了良機,使其防空部隊巧妙運用不夠先進的信息系統,實現信息火力的有效融合,擊落了美軍隱形戰機。實踐證明,信息化條件下,信息戰已成為打破對手信息火力高效融合的第一把利劍。
信息戰是轉變敵我優劣對比的首要行動
矛與盾的較量永不停息、不斷升級。當“信息主導”顯現出巨大優勢時,就必然引發“信息反制”。信息的受制,會使原有的優勢立即逆轉。信息戰是轉變敵我優劣對比的首要行動。
作戰的基本類型就是進攻和防禦,用以作戰的物質手段也可以區分為矛和盾兩大類型的武器裝備。在打擊兵器具有空前殺傷力的今天,誰都不會再用集中兵力來集中優勢,而異地同步打擊不失為“消滅敵人、保存自己”的有效方式,即分散於不同地點的打擊力量同時對同一目標發起攻擊,但條件是必須有精確的時間協同。
保持時間同步,靠過去的人工對錶顯然已不可能,必須利用如導航衛星授時等先進技術,而授時同步信息一旦被對手破壞,行動就會被徹底打亂。一支具有高機動力和打擊力的部隊,如果受到對手的信息攻擊,導致信息不靈、信息受阻,將會搞不清行動的方向,找不到攻擊的目標,​​變得行動呆滯、打擊無力。精確打擊威力雖大,但一旦丟失精確制導信息而打不准,優勢即刻盡失。指揮控制如果信息受制,就會陣腳大亂,勢必造成作戰全局陷於混亂。
攻擊敵方的信息系統是打破其作戰體系的著力點和發力點。信息的獲取與反獲取、利用與反利用,已成為信息化戰場上兩軍爭鬥的焦點。信息戰是爭奪戰場控制權乃至戰爭主動權的首選樣式。
信息系統在極大地提升作戰體系效能的同時,也自然成為對手的攻擊目標,而且是要害目標。信息戰就是通過迷盲敵戰場感知系統,削弱其信息獲取能力、干擾其分析判斷;通過阻斷敵信息傳輸系統,擾亂其協同、破壞其行動;通過欺騙擾亂敵指控系統,降低其指揮效率、導致其決策失誤。愈是信息技術發達、愈是高度依賴信息系統的軍隊,其信息系統受到攻擊的後果愈嚴重。美國“老烏鴉”協會前主席奎克曾經撰文指出:“先進的技術使我們高度依賴電磁頻譜,但與此同時,我們沒有很好地投資建設電子防護能力。”“敵人利用廉價的商用技術就可以降低甚至破壞我們昂貴的ISR設備以及武器平台的效能,從而限制甚至嚴重削弱我們的技術優勢。”由於軍事電子信息系統正在世界範圍內得到廣泛運用,事實上各國軍隊對信息系統的依賴程度都在不斷加深,因此,各軍事大國競相發展信息戰,一些小國也不甘落後,紛紛效仿。現代戰爭中,奪取戰場綜合控制權至關重要,制信息權成為其中不可或缺的製高點,是控制戰場和掌握戰爭主動的首要。
信息戰已站在當代軍事博弈的前沿
戰爭通常是以交火為基本標誌。信息戰隱於無形,使用門檻低,可控性好,在平時就可能展開暗戰,悄然延伸了戰爭的邊界。信息戰已站在當代軍事博弈的前沿。
當今世界,軍事手段的使用愈加複雜。戰爭不僅是政治的繼續,而且政治軍事緊密結合,服從於政略戰略大局。武力使用也將與政治、經濟、外交、輿論鬥爭多維互動,有機銜接,密切配合。信息戰跨越平時與戰時,活躍在一條看不見的戰線上。比如,各大國相互之間的信息戰偵察與反偵察的對抗,現在幾乎每天都在進行暗中角力。雖然人們普遍認為開火交戰是戰爭與和平的分水嶺,但是,由於信息戰等新的軍事鬥爭樣式運用的特殊性,戰爭的邊界正在發生改變。據報導,美國政府最近公開表明戰爭法適用於網絡攻擊,認為某些網絡攻擊等同於《聯合國憲章》所定義的“使用武力”法律概念,受到攻擊的國家,可以使用常規軍事力量或網絡武器實施反擊。同時,我們還看到,信息時代的到來,使得意識形態領域的鬥爭中也常常閃現出信息戰的影子。信息戰能力的建設發展,已經愈來愈得到各國的重視。 2011年12月,伊朗綜合運用乾擾壓制、數據欺騙、鏈路控制等信息戰手段,成功誘騙並俘獲了美軍一架RQ-170“哨兵”無人偵察機,令美軍大為震驚。

Original Referring url: http://theory.people.com.cn/n/2012/1218/

Maintaining Chinese Cyber & Network Security Launching the People’s Fifth Space War //维护中國网络安全,打响第五空间人民战争

Maintaining Chinese Cyber & Network Security Launching the People’s Fifth Space War

//维护中國网络安全,打响第五空间人民战争

President Xi clearly pointed out at the symposium on cybersecurity and informatization: “Network security is for the people, network security depends on the people, and maintaining network security is the common responsibility of the whole society. It requires the government, enterprises, social organizations, and the majority of netizens to participate together. Network security defense. ” 
Maintening China’s network security is an important measure to coordinate and promote the comprehensive construction of a well-off society, comprehensively deepen reforms, comprehensively govern the country according to law, and comprehensively and strictly manage the party’s strategic layout. It is to achieve the goal of “two hundred years” and achieve The important guarantee for the great rejuvenation of the Chinese dream of the Chinese nation.Please pay attention to the report of the “Liberation Army Daily” today –

 

Breaking through the online and offline boundaries, the security situation is severe and complicated

An inconspicuous “worm” has caused an uproar in the world – in May this year, cyberattacks initiated by criminals through tampering with the “eternal blue” program in the National Security Agency arsenal made most of Europe Countries and regions have successively recruited and affected important infrastructures including government, banks, power systems, communication systems, energy companies, airports, and other computer systems in many hospitals in the United Kingdom, resulting in some patients not being able to undergo surgery in time.

Behind this ransomware incident is the escalating confrontational conflict in cyberspace. Zhao Zhiguo, director of the Network Security Administration of the Ministry of Industry and Information Technology, said that only this year, the Ministry of Industry and Information Technology organized the industry forces and coordinated the handling of many attacks against the network and important systems, covering viruses, Trojans, vulnerabilities, traffic attacks and other types, involving network infrastructure public. Systems, important information systems and terminals. “It can be said that cyberattacks are still in a high-risk situation, showing that the threshold is constantly decreasing, the objects are more extensive, and the means are more diverse.”

The data shows that as of the first half of this year, the number of Internet users in China reached 751 million, and the Internet penetration rate reached 54.3%. “When the scale of the Internet is getting bigger and bigger, the challenges facing network security are becoming more and more serious.” In the view of Wu Jianping, an academician of the Chinese Academy of Engineering and a professor at Tsinghua University, the field of network security is constantly expanding. From a global perspective, the threat of cyberattacks is infiltrating into the industrial Internet sector, and industrial Internet security incidents are frequent. In December 2015, a large-scale organized and premeditated directed cyber attack in Ukraine caused a continuous power outage in nearly one-third of the territory. At present, the key infrastructure of various countries has become the target of cyber attacks. Once attacked, it will cause immeasurable damage to national security and social stability.

“The tentacles of cyber attacks extend to all aspects of society, and they are highly integrated online and offline. Network security is becoming the core issue of global security.” Zhou Hongyi, chairman of Qihoo 360, believes that after more than 20 years of development, the Internet is no longer An industry that is increasingly integrated with society as a whole. Coupled with the development of the Internet of Things, the Internet of Vehicles, and the Industrial Internet, the boundaries between the real physical world and the virtual world of the Internet are broken, and the online and offline are integrated. In this context, the attacks in the online world begin to spread to our real world. .

To be sure, the forms of cyber attacks are diverse and complex, and the cyber security situation is still grim. Global cybersecurity has gradually entered a era of security involving national security, national defense security, social security, industrial security, infrastructure security and even personal security.

There is no battlefield for smoke, and cyber war has never died.

There is a term in the software development industry called “Thousand Line Code Defect Rate”, which means the vulnerability rate in a thousand lines of code. There is probably a vulnerability in every thousand lines of code in most software companies. According to calculations, the code size of the most commonly used Windows operating system is about 50 million lines, and the Android system is about 12 million lines. The loopholes can be imagined.

“There are only two systems in the world, one is a system that has been known to be broken, and the other is a system that has been broken but not yet known.” The first US Army commander Alexander at the 2015 China Internet Security Conference The speech was impressive, and his point was that there was no safe system in front of the attackers.

“Any network system in the real world, even if the design is more sophisticated, the structure is more complicated, there will be loopholes without exception.” Zhou Hongyi pointed out that the 360 ​​community patching vulnerability response platform discovered more than 80,000 holes a year. These vulnerabilities may become the soft underbelly of the system suffering from cyber attacks.

The 360 ​​Threat Intelligence Center found that among the many advanced sustainable threats they monitored, the attackers had mostly infiltrated or lurked for a long time and concealed themselves through various means.

There are examples to prove. The Bushehr nuclear power plant, located 100 kilometers south of the Iranian capital Tehran, was a secret target guarded by the National Defence Force. In July 2010, it was attacked by a new type of network virus called “Seismic Network”. The 8000 centrifuges working in the nuclear power plant suddenly In the event of a failure, computer data was lost in a large area, and thousands of units were physically damaged. In 2014, internal documents of two nuclear power plants in South Korea were leaked, including personal information of nearly 10,000 employees of nuclear power plants, operating instructions for nuclear power plants, air conditioning and cooling systems. Design drawings, valve design drawings, etc. A US government report said that since May this year, hackers have been infiltrating the computer networks of US nuclear power plants and other energy equipment companies.

Unlike traditional warfare, which has a clear beginning and end, cyber warfare is constantly being declared. In this sense, the world has entered the era of cyber warfare. On the battlefield where there is no smoke, the planes and artillery that people paid attention to in the past have disappeared, and the new network virus has already appeared on the scene.

“The cyberattacks on critical infrastructure can even surpass the war in the traditional sense. It is almost impossible for nuclear states to use nuclear weapons, but cyber attacks are currently close to being unconstrained.” Cyberspace Security and Security Liu Weijun, a professor at the Center for Rule of Law, said that even worse than the destruction of the Ukrainian power system, nuclear power plants were attacked, directly threatening national security.

Relying on the people is the key path to building a network power

In September this year, with the theme of “Network Security for the People, Network Security Relying on the People”, a feature film “Fifth Space” became popular.

“People are always the most important factor. Network security is not a matter of purchasing and deploying a batch of network security equipment and stacking some products. It also requires a large number of professionals to analyze, judge, respond and dispose of.” Zhou Hongyi said It is necessary to play every network user so that everyone can actively play their role.

It is understood that since 2014, China has continuously held national network security publicity activities, popularized network security knowledge, strengthened network security education, and promoted a good atmosphere in which the whole society attaches importance to network security. “National cybersecurity propaganda should enhance the awareness of cyber security among all people, pay attention to the improvement of cyber security prevention capabilities, and let the broad masses of people have the awareness and ability to maintain their own network security. They can use the network like water, electricity, and fire. Qin An, director of the China Cyberspace Strategy Institute and director of the Internet Policy and Law Research Center of Tianjin University, said that cybersecurity depends on the people. Only relying on the people is the key path to building a network power.

“To maintain network sovereignty, it is necessary to strengthen the construction of defense forces in cyberspace and enhance the self-defense capabilities of cyberspace.” Qin An pointed out that the “Network Security Law” was officially implemented on June 1 this year, and one of its core objectives is to maintain cyber sovereignty. At the same time, the “International Cooperation Strategy for Cyberspace” promulgated on March 1 this year, in the third chapter of the strategic objectives to maintain sovereignty and security, for the first time to define the national definition of defensive forces in cyberspace, the construction of cyberspace defense forces as China’s national defense and military modernization Important content of construction.

The national defense white paper “China’s Military Strategy” clearly states that it is necessary to speed up the construction of cyberspace forces, improve the cyberspace situational awareness, cyber defense, support national cyberspace struggles and participate in international cooperation, curb major cyberspace crisis, and safeguard national networks and Information security, safeguarding national security and social stability.

Safety is the premise of development, and development is the guarantee of security. Building a network power, the nation’s awareness of improving network security is the foundation. At present, China is accelerating its march from a big network country to a network power. More than 1.3 billion Chinese people really enjoy the new achievements brought about by the development of the Internet. For the realization of the goal of “two hundred years”, the strategy of network power will play a role. More and more important support.

Construct an unbreakable security line

■ Li Yang

In the report of the 19th National Congress of the Communist Party of China, President Xi proposed to strengthen the application of basic research, expand the implementation of major national science and technology projects, highlight key common technologies, leading-edge technologies, modern engineering techniques, and subversiveness. Technological innovation provides strong support for building a strong country in science and technology, a country with strong quality, a strong country in space, a network power, a powerhouse, a digital China, and a smart society. Among them, the strategy of network power is once again mentioned, exciting and inspiring. In line with the development trend of the times, comprehensive maintenance of cyberspace security is the only way to build a network power.

The Cong listened to the silence, and the Ming was seen in the shape. With the rapid development of the information revolution, the network space consisting of the Internet, communication networks, computer systems, automation control systems, digital devices and their applications, services and data has profoundly affected the historical development of human society and comprehensively changed people’s production. lifestyle. Especially in the current global economic integration and internationalization of professional division of labor, cyberspace security is characterized by soft activity, border flexibility, diversification of means, domain widening and diversification of power, and is increasingly expanding to The mixed complex confrontation between the state, the military, and various purpose-oriented organizations and individuals implies a mixed risk of defamation of productivity, culture, and combat effectiveness.

The person in charge of the relevant department of the Central Network Office said that the five years since the 18th National Congress of the Communist Party of China was the fastest five years of cyberspace security development and five years of brilliant achievements in the field of cyberspace security. The “China Internet Station Development Status and Safety Report (2017)” shows that the tampering websites and government websites in China fell by 31.7% and 47.9% respectively last year. The overall level of government website security protection has been greatly improved; DDoS attacks of more than 1G have dropped by 60%.

The results are gratifying, but they should also be soberly aware that there are still many problems in the actual work that cannot keep up with the ideological concepts, and that there are consensuses that are difficult to implement. The implementation of cyberspace security measures is not in place or even “hanging the gap”. Cyberspace security is a holistic security. If a link is broken, it may lead to the collapse of the entire network. We can’t be lucky and slack, we must start from the various aspects of technology, equipment, personnel, management, etc., and build and deploy according to the road map of “laying up positions, deploying capabilities, and forming systems”. Practice, actively discover vulnerabilities, eliminate potential threats, continuously improve the security of cyberspace, and achieve new developments at a new starting point.

The construction of cyberspace security is a long-term, complex system engineering, which is not easy to beat and drum. To achieve this goal, there is not only a slap in the face, but also the tenacity of “do not relax”. It must be step by step, gradually promoted and implemented. Only in this way can we build an unbreakable security line.

Original Mandarin Chinese:

习主席在网络安全和信息化工作座谈会上明确指出:“网络安全为人民,网络安全靠人民,维护网络安全是全社会共同责任,需要政府、企业、社会组织、广大网民共同参与,共筑网络安全防线。”
维护我国网络安全,是协调推进全面建成小康社会、全面深化改革、全面依法治国、全面从严治党战略布局的重要举措,是实现“两个一百年”奋斗目标、实现中华民族伟大复兴中国梦的重要保障。请关注今日《解放军报》的报道——

维护网络安全,打响第五空间人民战争

■何楚洋

突破线上线下界限,安全形势严峻复杂

一只不起眼的“蠕虫”,竟然在全球引起了轩然大波——今年5月,由不法分子通过篡改美国国家安全局武器库中的“永恒之蓝”程序而发起的网络攻击,使大多数欧洲国家和地区相继中招,波及到包括政府、银行、电力系统、通信系统、能源企业、机场等重要基础设施,如英国多家医院的电脑系统瘫痪,导致部分病人无法及时接受手术。

这起勒索病毒事件的背后,是网络空间日益升级的对抗冲突。工信部网络安全管理局局长赵志国表示,仅今年工信部就组织行业力量,相继协调处置多起针对网络和重要系统的攻击事件,涵盖病毒、木马、漏洞、流量攻击等多种类型,涉及网络基础设施公共系统、重要信息系统和终端。“可以说网络攻击仍处于高发态势,呈现出门槛不断降低,对象更加广泛,手段更加多样。”

数据显示,截至今年上半年,我国网民规模达7.51亿,互联网普及率达54.3%。“当互联网的规模越来越大,网络安全面临的挑战也是日趋严峻的。”在中国工程院院士、清华大学教授吴建平看来,网络安全的领域正在不断延伸。从全球角度来看,网络攻击威胁正向工业互联网领域渗透,工业互联网安全事件频发。2015年12月,乌克兰发生了一次影响巨大的有组织、有预谋的定向网络攻击,致使乌境内近三分之一的地区持续断电。目前各国的关键基础设施已成为网络攻击的对象,一旦被攻击导致瘫痪,将给国家安全、社会稳定造成不可估量的伤害。

“网络攻击的触手延伸到社会各个方面,线上与线下高度融合,网络安全正在成为全球安全的核心问题。”奇虎360公司董事长周鸿祎认为,经过20多年的发展,互联网已经不再是一个行业,它与整个社会的结合越来越紧密。加上现在物联网、车联网、工业互联网的发展,真实物理世界和网络虚拟世界的界限被打破,线上线下连成一体,在这样的背景下,网络世界的攻击开始蔓延到我们的真实世界。

可以肯定的是,网络攻击形式多样复杂,网络安全形势依然严峻,全球网络安全逐渐进入到涉及国家安全、国防安全、社会安全、产业安全、基础设施安全甚至人身安全的大安全时代。

没有硝烟的战场,网络战从未偃旗息鼓

软件开发行业里有个名词,叫“千行代码缺陷率”,意思是一千行代码中的漏洞率。绝大部分软件公司的每一千行代码就有可能存在一个漏洞。据计算,最常使用的Windows操作系统的代码量是5000万行左右,安卓系统大概是1200万行,其中的漏洞可想而知。

“世界上只有两种系统,一种是已知被攻破的系统,一种是已经被攻破但自己还不知道的系统。”美国首任网军司令亚历山大在2015年的中国互联网安全大会上的发言让人印象深刻,他的观点是,在攻击者面前,没有任何安全的系统。

“现实世界中的任何网络系统,即使设计再精巧,结构再复杂,无一例外都会有漏洞。”周鸿祎指出,360社区补天漏洞响应平台一年发现的漏洞数就超过了8万个。这些漏洞,都有可能成为系统遭受网络攻击的软肋。

360威胁情报中心发现,他们监测到的多个高级可持续威胁事件中,攻击者大都已经渗透或者潜伏了很长时间,并且通过各种手段隐匿自己。

有例为证。位于伊朗首都德黑兰以南100公里的布什尔核电站是由国防军守卫的机密目标,在2010年7月被一种名为“震网”的新型网络病毒侵害,核电站里正在工作的8000台离心机突然出现故障,电脑数据大面积丢失,上千台被物理性损毁;2014年,韩国2座核电站的内部文件遭到泄露,包括核电站近万名员工的个人信息、核电站程序运行说明、空调和冷却系统设计图、阀门设计图等。美国政府的一份报告称,自今年5月以来,黑客一直在渗透美国核电站和其他能源设备公司的计算机网络。

不同于传统战争有明显的开始和结束,网络战时时刻刻都在不宣而战。从这层意义上说,全世界已经进入网络战时代。而在这片不见硝烟的战场上,过去人们关注的飞机、大炮不见踪影,新型的网络病毒就已经粉墨登场了。

“对关键基础设施的网络攻击,其破坏效果甚至能超越传统意义上的战争。有核国家几乎不可能动用核武器,但是网络攻击在目前却接近于不受任何约束。”公安大学网络空间安全与法治协创中心教授刘为军表示,与乌克兰的电力系统遭到破坏相比,更可怕的是核电站遭到攻击,直接威胁着国家安全。

依靠人民,才是建设网络强国关键路径

今年9月,以“网络安全为人民,网络安全靠人民”为主题的第四届网络安全周上,一部专题片《第五空间》迅速走红成为人们热议的焦点。

“人永远是最重要的因素,网络安全不是购买并部署一批网络安全设备、堆砌一些产品就能防得住的,还需要大量的专业人员来做分析、研判、响应和处置。”周鸿祎说,要把每一个网络用户发挥起来,让每一个人都能积极发挥自己的作用。

据了解,我国自2014年起,开始连续举办国家网络安全宣传活动,普及网络安全知识,加强网络安全教育,推动形成全社会重视网络安全的良好氛围。“国家网络安全宣传要在提升全民网络安全意识的同时,重视网络安全防范能力的提升,让广大人民群众既有意识又有能力维护自身网络安全,能够像用水、用电、用火一样用好网络。”中国网络空间战略研究所所长、天津大学互联网政策与法律研究中心主任秦安表示,网络安全依靠人民,只有依靠人民,才是建设网络强国关键路径。

“维护网络主权,就要加强网络空间国防力量建设,提升网络空间的自卫能力。”秦安指出,《网络安全法》于今年6月1日起正式实施,其核心目标之一就是维护网络主权。同时,今年3月1日颁布的《网络空间国际合作战略》在第三章战略目标维护主权与安全部分,首次明确网络空间国防力量的国家定义,将网络空间国防力量建设作为我国国防和军队现代化建设的重要内容。

国防白皮书《中国的军事战略》明确提出,要加快网络空间力量建设,提高网络空间态势感知、网络防御、支援国家网络空间斗争和参与国际合作的能力,遏控网络空间重大危机,保障国家网络与信息安全,维护国家安全和社会稳定。

安全是发展的前提,发展是安全的保障。建设网络强国,全民提升网络安全意识是基础。当前,我国正在加速从网络大国向网络强国迈进,13多亿中国人民实实在在享受到互联网发展带来的新成果,为着“两个一百年”奋斗目标的实现,网络强国战略将发挥着越来越重要的支撑作用。

构筑牢不可破的安全防线

“善其谋而后动,成道也。”习主席在党的十九大报告中提出,加强应用基础研究,拓展实施国家重大科技项目,突出关键共性技术、前沿引领技术、现代工程技术、颠覆性技术创新,为建设科技强国、质量强国、航天强国、网络强国、交通强国、数字中国、智慧社会提供有力支撑。其中,网络强国战略再次被提及,令人振奋,鼓舞人心。顺应时代发展趋势,全面维护网络空间安全,就是建设网络强国的必由之路。

聪者听于无声,明者见于未形。伴随信息革命的飞速发展,由互联网、通信网、计算机系统、自动化控制系统、数字设备及其承载的应用、服务和数据等组成的网络空间,深刻影响人类社会历史发展进程,全面改变人们的生产生活方式。尤其是在当前全球经济一体化、专业分工国际化的大环境下,网络空间安全呈现出活动软性化、边境弹性化、手段多样化、范畴全域化和力量多元化的特征,并且日益扩展为国家、军队及各种目的性组织和个人之间的混合复杂对抗,蕴含着毁瘫生产力、文化力、战斗力的混合风险。

中央网信办相关处室负责人表示,党的十八大以来的五年,是网络空间安全发展最快的五年,也是网络空间安全领域取得辉煌成绩的五年。《中国互联网站发展状况及其安全报告(2017)》显示,去年我国境内被篡改网站与政府网站分别下降31.7%和47.9%。政府网站安全防护水平整体得到了很大提高;1G以上DDoS攻击事件下降60%。

成绩固然喜人,但也应当清醒地看到,实际工作中还存在着思想观念跟不上、有共识难落实等诸多问题,网络空间安全措施执行不到位甚至“挂空挡”情况依然存在。网络空间安全,是整体性安全,一个环节被攻破,就可能导致全网的崩溃。我们不能心存侥幸和懈怠,必须扎扎实实地从技术、装备、人员、管理等各个环节入手,按“布设阵地、配置能力、形成体系”的路线图进行建设和部署,真刀真枪地开展演练,主动发现漏洞,消除潜在威胁,不断提升网络空间安全保障能力,在新的起点上实现新发展。

网络空间安全的构建是一项长期、复杂的系统工程,绝非敲锣打鼓、轻轻松松实现的。实现这一目标,既少不了一鸣惊人的霹雳手段,更需要有“咬定青山不放松”的韧劲,必须一步一个脚印,逐步推进,落地落实。惟有如此,才能构筑牢不可破的安全防线。

Original referring URL:  http://www.81.cn/jskj/2017-11/29/

Chinese Military Analysis of Cyber Space Deterrence – Important Strategic Points // 淺析網絡空間威懾的特徵、類型和運用要點

Chinese Analysis of Cyber Space Deterrence – Important Strategic Points

淺析網絡空間威懾的特徵、類型和運用要點

Chinese People’s Liberation Army Academy of Military Sciences Yuan Yi

January 04, 2016    

Editor’s note: When both opposing parties have the ability to ensure intrusion and damage to the other party’s network, they can bring about two-way network containment, making the two parties obliged to comply with the game rules that do not attack each other’s network under certain conditions, forming an invisible safety valve. Even international conventions or conventions that do not attack each other’s networks will be formed. The cyberspace has thus become a strategic area that can produce a huge deterrent effect. After the deterrence of cyberspace followed by nuclear deterrence, it began to enter the strategic vision of big country politicians and military strategists. Studying the characteristics, types, and points of use of cyberspace deterrence must be taken into consideration and necessary action by the Internet powers and the cyber force.

With the increasing dependence of human society on cyberspace, cyberspace has become the “second type of living space” for human production and life and the “fifth-dimensional combat space” for military confrontation. Countries around the world have fiercely competed for the dominant rights, control rights, and discourse power of cyberspace. The competition in the cyberspace has reached the level of human survival, national destiny, and success or failure of military struggles. Thinking about cyberspace deterrence capacity building has great practical and theoretical value.

First, analysis of the advantages and disadvantages of cyberspace deterrence

Cyberspace deterrence refers to the actions and actions taken in the cyberspace to demonstrate and control enemy cyberspace, and to control the enemy’s physical space through cross-domain cyberspace, so as to achieve the goal of destroying enemy forces, stopping the enemy, blocking the enemy, and preventing deterrence. A form of strategic deterrence for the enemy’s purpose. Compared with the physical space, the “virtual and real duality” of network space and the uniqueness of network warfare compared with traditional combat styles have determined that the advantages and disadvantages of cyberspace deterrence are very obvious.

(A) The advantages of cyberspace deterrence

The advantages of cyberspace deterrence are mainly reflected in the following: First, the deterrence approach has become more civilized and humane. Compared with nuclear, chemical, and chemical weapons based on physical, biological, and chemical killing mechanisms, the direct killing and destructive effects of cyber warfare weapons are much smaller than the former. Normally, they will not cause permanent damage and pollution to the natural environment, nor will they cause large numbers of people. Casualties and humanitarian disasters. Second, deterrence costs are inefficient. The network warfare weapons are dominated by viruses, Trojans and other software. The costs are relatively low, and the technical threshold is low. The destructive effects are rather alarming. The network defense points are multi-faceted, and they are hard to prevent. To increase the level of network security by one level, the input cost will increase exponentially. The contrast between the low cost of cyber offense and the high cost of cyber defense makes the offensive and defensive performance of the network a feature of “spirit shield”, and the cyber warfare weapon is thus called “the atomic bomb of the poor country”. The third is that deterrence methods are diverse and practical. The variety of cyber warfare weapons and the multiple goals of cyber attacks have determined that there are diversified cyberspace deterrent methods to choose from. The effects of cyberattacks are recoverable to a certain extent. As long as the application is properly implemented, the risk of causing war and escalating the war is relatively small. In a sense, the deterrence value of nuclear weapons is far greater than the value of actual combat, and cyber warfare weapons are both practical values ​​and deterrence values. Fourth, the use of repeatability and deterrence is strong. Once the “nuclear threshold” crosses, a full-scale nuclear war will erupt, and the two sides at the nuclear balance will fall into a state of mutual destruction. The easy implementation of nuclear deterrence, especially nuclear deterrence against non-nuclear countries, will also be condemned by international public opinion. These factors are all The use of nuclear deterrence is greatly limited. The deterrence of software and hardware and the controllable characteristics of cyberspace deter- mine the flexibility and control of deterrence in light of the changes and needs of the military struggle. It can be used in advance, used throughout, and used repeatedly. It has strong flexibility.

(B) Defects in cyberspace deterrence

The deterrence of cyberspace is mainly reflected in: First, the credibility of the deterrence effect has not been fully verified. The credibility of nuclear deterrence has been verified in actual combat. However, as of now, the real network war has not really exploded. People’s astonishing destructive power over cyber warfare is more of a speculation and worry. The real power of cyber warfare can only be convincing after being tested by actual combat. Second, the reliability of deterrence measures is not very high. Network warfare is a dynamic process of continuous offensive and defensive interaction between the two sides of the enemy and me. The characteristics of network confrontation and technicality determine that the network warfare attack has greater uncertainty and may not achieve the desired operational objectives, which will greatly reduce the effectiveness of deterrence. . For example, when the enemy performs cyberspace deterrence, if the enemy takes various effective defense measures in a timely manner, it will increase the difficulty of its own cyber attack and reduce the damage, and even lead to the failure of the attack. Third, the controllability of deterrence scope needs further improvement. As one of the important weapons of cyber warfare, viral weapons have strong dissemination, poor controllability, and a wide range of influence. It is difficult to launch targeted and targeted attacks on enemy computers and networks. If it can’t control its effective scope, it will spread to third-party neutral countries and even make itself a victim. As a result, the use of virus weapons suffers from the use of “imposed rats.” The fourth is the selective limitation of deterrence objects. Nuclear deterrence is clear and effective for any country, and the effectiveness of cyberspace deterrence has a lot to do with the level of informatization of enemy countries. Cyberspace deterrence is extremely effective for countries with a high degree of informatization, and for those underdeveloped countries with weak information infrastructure and weak network dependence, it is difficult for them to exert results, or even completely ineffective. Fifth, the organization of deterrence is relatively complicated. All nuclear powers in the world implement centralized and unified management of strategic nuclear forces. Command and control powers are highly centralized. When organizations implement nuclear deterrence operations, they can accurately control each combat unit, and the organization is well-executed. The implementation of the deterrence of cyberspace involves many forces such as investigation, control, defense, and control. It has many personnel and large scales and is scattered among different departments and units in the military and the military. It is very complicated to organize and it is difficult to form a synergy.

Second, the main types of cyberspace deterrence

The cyberspace deterrence includes four types: cyberspace technology test deterrence, cyberspace equipment demonstration deterrence, cyberspace operational deterrence deterrence, and cyberspace operational deterrence. Among them, the first three are demonstrative deterrence, and the latter is actual deterrence.

(A) Cyberspace Technology Test Deterrence

The cyberspace technology test deterrence is a field in the field of cyber warfare. It constantly conducts preliminary exploratory experiments on new concepts of warfare, new experiments on the effectiveness of attack mechanisms and tactics, and practical experiments on the weaponization of new technologies. The outside world is disclosed to demonstrate its strong strength in the basic research of information technology and its enormous potential for transforming it into a cyber warfare capability to achieve deterrence. At present, network offensive and defensive technology is still developing rapidly. A breakthrough in a key technology will often have a significant impact on cyberspace security and operations, and even lead to revolutionary changes. Whoever preempts the strategic commanding heights of the network offensive and defensive technology, who will be able to achieve a clear advantage in the future of network warfare.

(B) Cyberspace Equipment Demonstration

The demonstration of cyberspace equipment deterrence is the development of network warfare equipment development planning, technology development, target testing, stereotyped production and other development stages. According to the needs of the appropriate disclosure of network warfare equipment models, performance, characteristics, parameters and development schedule, etc. Reach the purpose of deterring opponents. There are two main ways: one is through public disclosure in official media such as national defense white papers, diplomatic bulletins, and newspapers, periodicals, and large-scale websites; and the other is through online social media or other unofficial. The channel has deliberately leaked equipment-related information and implemented hidden deterrence. The cyber space equipment demonstrates deterrence. On the one hand, it can invent new cyber-warfare equipment with new mechanisms and new concepts and render its unique combat capabilities. On the other hand, it can deliberately exaggerate the operational effectiveness of existing cyber warfare equipment. There are facts in the virtual reality, there is something in the real, and the implementation of fuzzy policies, so that the other party can not understand their true situation and strength, resulting in fear and jealousy. For example, the U.S. military’s “Shuute” on-board network power system has been put into practical use several times and poses a serious threat to the air defense systems of its hostile countries. However, its basic principles, working mechanisms, and combat technical indicators have not been publicly disclosed. It has not been completely mastered by other countries and has remained in a state of secrecy. It is difficult to distinguish between reality and reality and has played a very good deterrent effect.

(3) Deterrence in cyberspace operations exercises

The deterrence of cyberspace operations exercises is to conduct drills in cyberspace through virtual or virtual methods, and use various media channels to show potential war opponents their own cyber warfighting capabilities, strengths and determinations in order to achieve deterrence. Cyberspace operations can be divided into two kinds: actual drills and virtual exercises. The former is usually carried out nationwide or in alliance with allies, and is generally based on the joint exercise of military space and space defense operations. In recent years, the United States and its allies have held “Network Storm” series of cyber warfare exercises and “Shriver” series of space-network space exercises, which have demonstrated the mobilization strength, overall defense level, and the implementation of cyber warfare. Determination. The latter is usually held at the national large-scale network integrated shooting range, and is generally based on the offensive actions of the military professional cyber warfare forces.

(D) Deterrence in cyberspace operations

The deterrence of cyberspace operations is the actual deterrence of attacking specific opponents by deterring opponents with certain attacks. There are two opportunities for its use: First, when one’s own side is aware that the enemy is about to wage a war on one’s own side, one’s own choice of the key cyber targets of the enemy’s key defenses will be targeted to combat them, and preventive and deterrent deterrence will be implemented; When the Party initiates a tentative cyber attack on its own side and implements cyberspace deterrence, it must immediately conduct effective retaliatory and disciplinary deterrence. There are many types of cyber warfare operations that have deterrent effects. For example, infiltrate the enemy’s telecommunications network, send a large number of anti-war messages to the enemy’s citizens, and attack the enemy’s power grid, resulting in a short-term blackout of major cities in the enemy’s power; attacking the enemy’s broadcast television networks and inserting their own broadcasts during prime time. Special video programs; etc.

Third, the use of cyberspace deterrence points

The general requirements for the use of cyberspace deterrence are: combination of wartime and warfare, with strength, actual display capability, and determination, strive to demonstrate deterrence with small battles, ensure deterrence with strikes, and achieve deterrence with a small price. Specifically, the following points should be achieved.

(A) Combination of peacetime and long-term preparation

“Frozen feet, not a cold day.” Successful implementation of cyberspace deterrence requires a combination of peacetime and warfare, and we must fully and carefully prepare for peacetime. The first is to conduct comprehensive and thorough network reconnaissance. Requires the combination of spying, reconnaissance and technical reconnaissance, wireless reconnaissance, and cable reconnaissance. Conduct long-term and continuous network reconnaissance of enemy network targets, gradually understand the basic conditions of the enemy’s network, draw a picture of its network topology, and in particular analyze and find all kinds of soft enemies. Hardware system vulnerabilities. The second is to conduct a large number of effective strategic presets. Using hacking methods, secretive infiltrate all types of networks through the use of system vulnerabilities or password cracking, leaving the back door, setting up a springboard machine, and laying down logic bombs and Trojans to set a breakthrough for launching cyber attacks in the future. The third is to conduct pre-prepared cyber defenses. When deterring cyberspace deterrence against the enemy, one must adjust the deployment of network defenses in advance, make the enemy’s pre-designed attack path, anticipate the use of system loopholes, and plan to implement an attack plan that is difficult to implement, or the effect of implementation is greatly reduced to minimize the enemy’s Losses caused by cyber retaliation.

(B) careful decision-making, control strength

Sun Tzu said: “The Lord must not anger and raise a teacher. Cyberspace deterrence is a strategic game behavior between countries, especially with deterrence and sensitivity. It must be rational, beneficial, and tangible. It must not be abused because of the low threshold of deterrence. Otherwise, its effect may be counter-productive. . Cyberspace deterrence has a high requirement for combat intensity control. On the one hand, if the intensity is too small, the enemy’s government and people will not have fear and will not achieve the deterrent effect they deserve. The other party may also use the same methods to implement anti-deterrence, eventually leading to confrontational escalation and deterring one’s own deterrence. On the other hand, if it is too strong, it will cause huge economic losses and casualties to the enemy countries. This will cause the condemnation of the international community and the hatred of the enemy governments and people. It may trigger the enemy’s use of conventional forces to carry out large-scale revenge. Nuclear countries may even Nuclear power may be used. This will not only stop the war but will also play a role in warfare.

(III) Unified command and careful organization

The implementation of the deterrence of cyberspace requires centralized command, unified planning, and good coordination. The first is meticulous organization of strength. Uniformly organize the four forces of military investigation, attack, defense, and control, and actively coordinate the strength of the cyber warfare forces of all parties to form a joint force. In particular, it is necessary to organize and coordinate the strength of civil non-professional cyber warfare, especially patriotic hacking, so that there can be no phenomenon of “blindness” so as to avoid triggering friction, escalating fire, causing an escalation of cyber warfare, or prematurely exposing attack intentions and giving people a handle. , leading to uncontrollable situations or failure of operations. The second is to select the target. Should choose a wide range of influence, easy to produce a clear deterrent effect of the goal. For example, broadcast television channels with the highest ratings, portals with a large number of visitors, and wireless communication networks with numerous users. It is not possible to choose attacks that are irrelevant, insignificant, and indifferent to the target. They can easily be mistaken for cybersecurity incidents created by ordinary hackers and do not achieve the desired deterrent effect. In addition, we must also consider the constraints of international law and war laws. We must not choose targets that are easy to cause humanitarian disasters. We should try our best not to select the network goals of railways, aviation, finance, and medical departments so as not to arouse condemnation and resentment from the international community and the people of the other side. The third is the precise control of the process. Prior to the deterrent strikes in cyberspace, it is necessary to publicize the momentum through extensive public opinion, issue warnings to the enemy countries, and declare the justice of their actions to the world in order to gain the understanding and support of international public opinion. In order to highlight the deterrent effect, one can highly announce the target of the enemy’s network to be attacked, break through the enemy’s layered network defenses, and implement a resolute and effective cyber attack. If necessary, the network attack effect can be resumed regularly to show its superiority. The cyber attack technology and means make the enemy’s decision makers and the public have a sense of frustration that is hard to defend and difficult to parry, thus forming a strong shock effect.

(4) Combining actual situation with actual situation, focusing on strategy

The grandson said that “it is not possible to show and not to use it,” and it is used to deter online space. Its main points are summarized as “showing without propaganda, advocating without showing.” “Indicating nothing” means that it is difficult to track and locate using cyber attacks and conduct cyber attacks on specific targets. However, it is not done for others to announce that they are doing their own thing. It not only demonstrates their own capabilities, but also makes the enemy’s suspicion of doing their own thing. However, there is no evidence and it cannot be pursued. “Proclaiming but not showing” is the publicity or inadvertent disclosure of the type, performance, and characteristics of the advanced cyber warfare equipment developed or fabricated by the company, deliberately exaggerating its combat effectiveness, falsifying facts, and integrating facts and facts, so that the enemy can’t understand its true strength. , resulting in a deterrent effect. The cyber warfare operations have the characteristics of difficulty in tracking and traceability and complexity in forensics. The initiating party can either admit or deny it, or push the responsibility to civil hacker organizations. (Source: China Information Security).

Original Communist Mandarin Chinese:

編者按:當敵對雙方都具有確保侵入破壞對方網絡的能力時,就可以帶來雙向網絡遏制,使得雙方不得不在一定條件下,遵守互不攻擊對方網絡的遊戲規則,形成一個無形的安全閥,甚至國際上也會形成互不攻擊對方網絡的慣例協議或公約,網絡空間由此成為可以產生巨大威懾效應的戰略領域。網絡空間威懾繼核威懾之後,開始進入大國政治家和軍事家的戰略視野。研究網絡空間威懾的特徵、類型和運用要點,成為網絡強國、網絡強軍的必須考量和必要行動。

隨著人類社會對網絡空間依賴程度的不斷加深,網絡空間成為人類生產生活的“第二類生存空間”和軍事對抗的“第五維作戰空間”。世界各國圍繞網絡空間的主導權、控制權、話語權展開了激烈的爭奪,網絡空間的競爭已達到與人類生存、國家命運和軍事鬥爭成敗休戚相關的程度。思考網絡空間威懾能力建設,具有重大現實和理論價值。

一、網絡空間威懾的優劣分析

網絡空間威懾,是指在網絡空間採取各種行動,展示癱瘓控制敵方網絡空間,並通過網絡空間跨域控制敵方實體空間的決心和實力,從而達到懾敵、止敵、阻敵、遏敵目的的一種戰略威懾形式。網絡空間與實體空間相比所具有的“虛實二相性”,網絡戰與傳統作戰樣式相比所具有的獨特性,決定了網絡空間威懾的優缺點都非常明顯。

(一)網絡空間威懾的優點

網絡空間威懾的優點,主要體現在:一是威懾方式更趨文明和人道。與基於物理、生物、化學殺傷機理的核生化武器相比,網絡戰武器的直接殺傷和破壞效應要遠小於前者,通常不會對自然環境造成永久性破壞和污染,也不會造成大量的人員傷亡,並引發人道主義災難。二是威懾成本低效費比高。網絡戰武器以病毒、木馬等軟件為主,成本相對低廉,技術門檻較低,而造成的破壞效果卻相當驚人。網絡防禦點多面廣,防不勝防,要網絡安全程度每提高一個等級,投入成本會呈指數級增加。網絡進攻的低成本與網絡防禦的高成本對比鮮明,使得網絡攻防呈現“矛尖盾薄”的特點,網絡戰武器因而被稱為“窮國的原子彈”。三是威懾手段多樣實用性強。網絡戰武器多種多樣,網絡攻擊目標多元,決定了有多樣化的網絡空間威懾手段可供選擇。網絡攻擊效果在一定程度上是可恢復的,只要運用實施得當,引發戰爭和促使戰爭升級的風險相對較小。從某種意義上講,核武器的威懾價值遠大於實戰價值,而網絡戰武器則是實戰價值與威懾價值兼具。四是威懾運用可重複靈活性強。 “核門檻”一旦跨過就會爆發全面核戰爭,處於核均勢的雙方將陷入相互摧毀狀態,輕易實施核威懾特別是對無核國家進行核威懾,還會招致國際輿論的譴責,這些因素都極大地限制了核威懾手段的使用。而網絡空間威懾軟硬結合、威力可控的特點,決定了其可根據軍事鬥爭形勢的變化和需要,適時調控威懾強度,先期使用、全程使用、反複使用,具有很強的靈活性。

(二)網絡空間威懾的不足

網絡空間威懾的不足,主要體現在:一是威懾效果的可信性未得到充分驗證。核威懾的可信度已在實戰中得到了驗證。然而,截止目前,真正意義上的網絡大戰還沒有真正爆發過。人們對網絡戰驚人的破壞力,更多的只是一種猜測和擔憂,網絡戰的真實威力只有經過實戰檢驗後,才能真正令人信服。二是威懾手段的可靠性不太高。網絡戰是敵我雙方網絡攻防持續互動的動態過程,網絡對抗複雜、技術性強的特點,決定了網絡戰攻擊效果具有較大的不確定性,有可能達不到預期作戰目的,使威懾效果大打折扣。例如,對敵實施網絡空間實戰威懾時,敵方若及時採取各種有效防御手段,就會增加己方網絡攻擊的難度和降低破壞效果,甚至導致攻擊行動的失敗。三是威懾範圍的可控性需進一步改善。病毒武器作為網絡戰的重要武器之一,其傳播性強、可控性較差、影響範圍比較廣,很難針對敵國計算機和網絡發動專門性、針對性極強的攻擊。如果不能控制其有效作用範圍,就會波及第三方中立國家,甚至使自身也成為受害者,因而病毒武器的使用有“投鼠忌器”之患。四是威懾對象的可選擇性受限。核威懾對任何國家都是明確而有效的,而網絡空間威懾的效果與敵國的信息化程度有很大關係。網絡空間威懾對信息化程度高的國家極為有效,而對那些信息基礎設施薄弱,網絡依賴性不強的不發達國家,則很難發揮效果,甚至完全不起作用。五是威懾實施的組織相對複雜。世界各個核國家無不對戰略核力量實施集中統管,指揮控制權高度集中,組織實施核威懾行動時可以準確控製到每一個作戰單元,組織實施十分周密。而網絡空間威懾的組織實施,要涉及偵、控、防、控等多支力量,人員多、規模大,且分散在軍地不同部門和單位,組織起來非常複雜,形成合力不易。

二、網絡空間威懾的主要類型

網絡空間威懾主要有網絡空間技術試驗威懾、網絡空間裝備展示威懾、網絡空間作戰演習威懾和網絡空間作戰行動威懾四種類型。其中,前三種是示形威懾,後一種是實戰威懾。

(一)網絡空間技術試驗威懾

網絡空間技術試驗威懾,是在網絡戰領域,經常性地進行新作戰概念的先期探索性試驗、新攻擊機理和戰術的效果印證性試驗、新技術的實用化武器化試驗等,並通過媒體向外界披露,以展現本國雄厚的信息技術基礎研究實力,以及轉化為網絡戰能力的巨大潛力,以達到威懾對手的目的。當前,網絡攻防技術仍在快速發展,一項關鍵性技術的突破,往往會對網絡空間安全和作戰產生重大影響,甚至引發革命性變化。誰搶先佔領了網絡攻防技術的戰略制高點,誰就能在未來網絡戰中取得明顯優勢。

(二)網絡空間裝備展示威懾

網絡空間裝備展示威懾,是在網絡戰裝備發展規劃制定、技術開發、打靶試驗、定型生產等各個發展階段,根據需要適當披露網絡戰裝備的型號、性能、特點、參數以及研製進度等情況,以達到威懾對手的目的。其方式主要有兩種:一種是通過在國防白皮書、外交公報以及報紙、期刊、大型網站等權威媒體從官方渠道公開披露,實施顯性威懾;另一種是通過網絡社交媒體或其他非官方渠道,刻意洩露裝備相關情況,實施隱性威懾。網絡空間裝備展示威懾,一方面可以虛構新機理、新概念的新型網絡戰裝備,並渲染其獨特的作戰能力;另一方面可以刻意誇大已有網絡戰裝備的作戰效能。虛中有實、實中有虛,實施模糊政策,使對方摸不清己方真實情況和實力,產生恐懼和忌憚心理。例如,美軍的“舒特”機載網電一體攻擊系統已多次投入實戰使用,對其敵對國家的防空體系構成了嚴重威脅,但其基本原理、工作機制、戰技指標既沒有公開披露,也沒有被他國完全掌握破解,一直處於保密狀態,令人虛實難辨,起到了很好的威懾作用。

(三)網絡空間作戰演習威懾

網絡空間作戰演習威懾,是以實兵或虛擬的方式在網絡空間展開演習活動,並藉助各種媒體渠道,向潛在作戰對手展現本國網絡戰能力、實力與決心,以達到威懾對手的目的。網絡空間作戰演習可分為實兵演習和虛擬演習兩種。前者通常在全國范圍內或與盟國聯合進行,一般以演練軍地聯合網絡空間防禦行動為主。近幾年來,美國及盟國多次舉行“網絡風暴”系列網絡戰演習,以及“施里弗”系列太空-網絡空間演習,很好展現了網絡戰的動員實力、整體防禦水平,以及實施網絡戰的決心。後者通常在國家大型網絡綜合靶場舉行,一般以演練軍隊專業網絡戰力量的進攻行動為主。

(四)網絡空間作戰行動威懾

網絡空間作戰行動威懾,是指對特定的網絡目標實施攻擊,以確信的攻擊效果來威懾作戰對手的一種實戰性威懾。其運用的時機有兩個:一是當己方覺察敵方即將對己方發動戰爭時,己方選擇敵方重點防禦的關鍵性網絡目標進行針對性打擊,進行預防性、遏制性威懾;二是當敵方通過對己方發起試探性網絡攻擊,實施網絡空間威懾時,己方應立即進行有效的報復性、懲戒性威懾。具有威懾效果的網絡戰行動有多種。例如,對敵電信網滲透破壞,向敵國民眾手機大量發送宣傳反戰短信;對敵電力網進行攻擊,造成敵重要城市短時間的大面積停電;對敵廣播電視網進行攻擊,在黃金時段插播己方特製的視頻節目;等等。

三、網絡空間威懾的運用要點

網絡空間威懾總的運用要求是:懾戰結合,以實力、實戰展示能力和決心,力求以小戰體現威懾、以精打確保威懾,以較小的代價實現威懾目的。具體說來,應做到以下幾點。

(一)平戰結合,長期準備

“冰凍三尺,非一日之寒”。成功實施網絡空間威懾,需要平戰結合,在平時就要進行充分細緻的準備。一是要進行全面周密的網絡偵察。要求諜報偵察與技術偵察、無線偵察與有線偵察相結合,對敵網絡目標進行長期持續的網絡偵察,逐步摸清敵網絡基本情況,繪製其網絡拓撲結構圖,尤其是分析查找出敵各種軟硬件系統的漏洞。二是要進行大量有效的戰略預置。採用黑客手段,通過利用系統漏洞或口令破譯等辦法,秘密滲透進入敵各類網絡,留下後門,設置跳板機,埋設邏輯炸彈和木馬,為未來發動網絡攻擊預留突破口。三是進行預有準備的網絡防禦。在對敵實施網絡空間威懾時,己方應提前調整網絡防禦部署,使敵預先設計的攻擊路徑,預期利用的系統漏洞,預定執行的攻擊方案難以實施,或實施效果大打折扣,最大限度地降低敵網絡報復造成的損失。

(二)慎重決策,控制強度

孫子曰:“主不可以怒而興師,將不可以慍而致戰”。網絡空間威懾是國家之間的戰略博弈行為,尤其是實戰威懾,敏感性強,必須做到有理、有利、有節,決不能因為威懾“門檻”較低而濫用亂用,否則其效果可能會適得其反。網絡空間實戰威懾對作戰強度控制的要求很高。一方面,若強度太小,敵國政府和民眾不會產生畏懼心理,起不到應有的威懾效果,對方還可能採取同樣的手段實施反威懾,最終導致對抗升級,使己方威懾失效。另一方面,若強度過大,給敵國造成巨大的經濟損失和人員傷亡,引起國際社會的譴責和敵國政府、民眾的仇恨心理,就可能引發敵國運用常規力量進行大規模報復,有核國家甚至可能會動用核力量,這樣不但不能懾止戰爭,反而會起到戰爭導火索的作用。

(三)統一指揮,周密組織

網絡空間威懾的組織實施,要集中指揮,統一籌劃,搞好協同。一是精心組織力量。統一組織軍隊偵、攻、防、控四支力量,積極協調軍地各方網絡戰力量形成合力。尤其是要組織和協調好民間非專業網絡戰力量特別是愛國黑客,不能出現“盲動”現象,以免引發磨擦,擦槍走火,引起網絡戰的升級,或過早暴露攻擊意圖,授人以柄,導致局勢不可控或行動失敗。二是精當選擇目標。應選擇影響面廣,易產生明顯威懾效果的目標。例如,收視率排名靠前的廣播電視頻道、訪問量巨大的門戶網站、用戶眾多的無線通信網絡等。不能選擇無關痛癢、影響面小、民眾漠不關心的目標進行攻擊,易被誤認為是普通黑客製造的網絡安全事件,起不到應有的威懾效果。此外,還要考慮國際法和戰爭法約束,不能選擇易造成人道主義災難的目標,盡量不選取鐵路、航空、金融、醫療等部門的網絡目標,以免激起國際社會和對方民眾的譴責和反感。三是精確控制進程。實施網絡空間威懾性打擊之前,要通過廣泛的輿論宣傳造勢,向敵國發出打擊警告,並向全世界宣告己方行動的正義性,以爭取國際輿論的理解和支持。為突出威懾效果,己方可以高調宣布要攻擊的敵國網絡目標,再突破敵方層層網絡防禦,實施堅決有效的網絡攻擊,必要時最後還可對網絡攻擊效果進行定時恢復,以展現己方高超的網絡攻擊技術和手段,讓敵方決策者和民眾產生防不勝防、難以招架的心理挫折感,從而形成強烈的震懾效果。

(四)虛實結合,注重謀略

孫子所說的“能而示之不能,用而示之不用”,運用到網絡空間威懾,其要點概括起來就是“示而不宣、宣而不示”。 “示而不宣”,就是利用網絡攻擊難以追踪定位這一點,對特定目標實施網絡攻擊,但不對外宣布是己方所為,既展示了己方能力,又使得敵方雖然懷疑是己方所為,但沒有證據,無法追究。 “宣而不示”,就是公開宣傳或不經意透露己方研製或虛構的先進網絡戰裝備的型號、性能、特點,刻意誇大其作戰效能,虛虛實實,虛實結合,使敵摸不清己方真實實力,從而產生威懾效果。網絡戰行動具有追踪溯源困難、取證複雜的特點,發起方既可以承認,也可以矢口否認,或把責任推給民間黑客組織。 (來源:中國信息安全)

Original URL:

美軍方憂慮中國信息戰 稱之為毛式網絡人民戰 // US Military Anxious & Worried About China’s Information Warfare – Mao-Style Network War is the People’s Warfare

美軍方憂慮中國信息戰 稱之為毛式網絡人民戰 //

US Military Anxious & Worried About China’s Information Warfare – Mao-Style Network War is the People’s Warfare

This article was originally published in the US Army “Military Intelligence” magazine July 7-9 months. The author Timothy Thomas is the US Army Lieutenant Colonel, now an analyst at the US Foreign Military Research Office (FMSO). The author graduated from the famous West Point military academy, served as the US military 82th Airborne Division unit commander, the information warfare, psychological warfare, low-intensity conflict in-depth study. This paper reflects the American military’s worries and alertness in the theory and construction of China’s information warfare. This article is specially translated for reference only.

In the past few years, the Chinese military and civil experts set off a wave of information warfare. After reading their works, it is not difficult to find that China’s theory of information warfare has several obvious characteristics: First, China is eager to develop its own theory of information warfare, which is related to its own security threats; secondly, China’s information War theory is influenced by its traditional military command art. Whether it is the ancient “Art of War” and “thirty-six”, or Mao Zedong’s people’s war thinking in the theory of information war laid a deep imprint; Third, China’s information warfare awareness and classification, obviously different In the beginning of the information warfare originator – the United States, although similar to the Russian information war theory, but only the shape and God is not.

Wai Wei save Zhao

The advent of the information age prompted people to rethink the way in which war was conducted. China is aware of its conventional armed forces and the superpower compared to the strength of disparity, in the near future, whether conventional or nuclear weapons, China can not constitute a strong deterrent to the United States. However, the ambitious Oriental dragon that: with the advent of the information age, the war form, the military structure, combat methods and command means will have a new change, the information will replace people full of future battlefield. As long as the focus of strategic research into the information warfare war form, grasp the trend of development of the times, it is not difficult to shorten the distance, and further lead.

Ancient China has a military order called “thirty-six dollars”, one of which “Wai Wei save Zhao” pointed out that if the enemy is too strong front power, should avoid the virtual, hit its weakness. For example, if you can not launch a direct attack (nuclear strike), then the information warfare, the weak financial, power, etc., to the West, and so on.

Network system to start. Although the conventional armed forces can not compete with the United States, however, China’s information warfare forces in theory is a real threat to the US political and economic security, the Americans can not afford the New York Stock Exchange and the Nasdaq Stock Exchange in an instant collapse. The global accessibility of information warfare, the speed of light transmission is not a feature of nuclear war, the Chinese people want is the speed of information warfare, accuracy and continuity to beat the opponent.

Information warfare can make up for the lack of conventional armed forces. The establishment of various battlefield information networks can not only improve the management level of traditional warfare, enhance the overall combat effectiveness of the troops, but also to a certain extent make up for the lack of conventional forces. In the eyes of the Chinese people, information warfare is even more powerful, is the power of conventional armed forces multiplier.

Information warfare

In 1996, China’s earliest information warfare expert Shen Weiguang to the information war under the definition is: “warring parties through the control of information and intelligence resources to compete for battlefield initiative of the war.” With the United States “to protect friendly information system, attack enemy information System “compared to the definition of Shen Weiguang more emphasis on” control “the enemy.

In 1998, the Chinese military information warfare Wei Wang Wang save major general classification of information warfare: according to time is divided into normal, crisis, wartime; by nature is divided into attack, defense; by level into the country, strategy, theater, tactics ; Divided by the scale of the battlefield, theater, local war. The characteristics of information warfare include directive and control warfare, intelligence warfare, electronic warfare, psychological warfare, space control war, hacker warfare, virtual warfare, economic warfare and so on. Information warfare in principle to take cut, blinded, transparent, fast and improve the viability and other measures. General Wang’s understanding of the information war is closer to the West, with emphasis on the confrontation of advanced technology.

In 1999, Chinese experts discussed the information warfare. Shen Weiguang at this time to expand the scope of information warfare, he believes that “information war, broadly refers to the confrontation of the military (including political, economic, science and technology and all areas of society) to seize the information space and information resources for the war, narrowly refers to the war Which is one of the essential characteristics of modern warfare.The essence of information war lies in the fact that by acquiring the right to information to achieve ‘no war and subdue the soldiers’. ”

The military another information warfare expert general general Wang Pufeng information warfare have a very deep understanding, in 2000, he information warfare and information warfare distinction. According to his explanation, the information war refers to a form of war, which contains information warfare, and information warfare refers to a combat activity. He believes that “information warfare includes all combat activities, including a series of intrusion and computer virus attacks on the theft, tampering, deception, deception, disruption, obstruction, interference, paralysis of information and information systems, and finally the enemy computer Network does not work. “He advocated China’s information warfare theory in drawing on foreign advanced combat ideas at the same time, should have China’s own characteristics.

“Mao-style network people’s war”

China’s knowledge of information warfare is very traditional. Many military theorists believe that the information age has given Mao Zedong a new connotation of the people’s war thinking, therefore, advocates rely on and mobilize the broad masses of people to carry out online war. It is conceivable that no matter which same family, with 1.3 billion people playing network warfare is daunting.

Mao Zedong’s network The most important feature of the people’s war theory is that it breaks the boundaries between the army and the people. Blurred the traditional boundaries of military installations and civilian facilities, military technology and civilian technology. The sharing of information technology in military and civilian use has created the conditions for the widespread use of civil technology for military purposes. For example, the use of civil electronic information equipment for information interception and transmission can use the civilian communication network for war mobilization; can use the private computer network attack and defense. Second, the difference between military personnel and non-military personnel is gradually disappearing. With the development of network technology and the expansion of application areas, a large number of network technology talent come to the fore. These have the special ability of the network elite will become the future network of people in the war of Gladiator. At the same time, communication, transportation, financial systems and other information networks and international networking, for China to carry out the people’s war provides the necessary conditions.

Nowadays, the idea of ​​people’s war has been established as the fundamental guiding principle of China’s network information warfare. A Chinese military writer wrote: “The flexible tactical and tactical principle is still the soul of the network information warfare.The broad masses of people actively participate in the war, especially technical support and online warfare, is to win the network information war victory of the masses and strength Source. ”

The power of the people’s war is so terrible, perhaps, we can understand why the Chinese are willing to cut the size of their armed forces – imagine that once the war broke out, China could launch a large number of people involved in war, information engineers and civilians will be organized through the home Computer attack on the US network information system, then why should we maintain a large combat force?

Information warfare

Over the past few years, China has held several major information warfare military exercises to test the theory of information warfare. The first “special war” (information warfare) exercise took place in October 1997. A military army of a military army was designed to paralyze its system of virus attacks, the group of military anti-virus software for defense. The exercise is called “invasion and anti-intrusion exercise”. The exercise also used ground logistics, medical and air forces.

In October 1998, China held a high-tech comprehensive exercise jointly conducted by the three military regions. The first use of the “military information superhighway” was used in the joint defense operations. The information network system in the command automation system is composed of digital, dialing, command network and secret channel. The other parts of the command automation system are subsystems such as command warfare, audio and graphics processing, control and data encryption.

In October 1999, the People’s Liberation Army for the first time between the two groups of war-level computer online confrontation exercises. Conducted reconnaissance and anti-reconnaissance, interference and anti-interference, blockade and anti-blockade, air strikes and anti-air raid and other subjects. In the software environment, resource sharing, combat command, situation display, auxiliary evaluation, signal transmission and intelligence warfare and other six types of operations. The computer evaluation system conducts data and quality analysis of the performance of both parties.

In July 2000, a military area also conducted an online confrontation exercise. The three training tasks related to the exercise are: organizing and planning the campaign, seizing air power and making information, implementing breakthroughs and breaking down. There are more than 100 terminal networking involved in the exercise.

Militia unit

China’s people’s war has a complete system, its overall development direction is “elite standing army and powerful reserve forces combined”, this defense system is conducive to play the overall effectiveness of the people’s war and “network tactics” advantage.

China 1.5 million reserve forces are very keen to play the network of people’s war. In some areas, the PLA has prepared the reserve forces into small information warfare forces. For example, in Yichang City, Hubei Province, the military division organized 20 municipal departments (electricity, finance, television, medical, etc.) technical staff set up a reserve information warfare. The Department has a network of war camps, electronic war camps, intelligence war camps and 35 technical units. The department has also established the first training base in China to accommodate 500 people.

Yichang is not the only area where the organization’s reserve and militia are engaged in information warfare training. December 1999 in Xiamen, Fujian held a reserve and militia meeting. During the subsequent exercise, the militia units with high-tech equipment carried out electronic countermeasures, cyber attacks and protection, radar reconnaissance performances. The goal of the fake attack is an encircled island, so it is easy for outsiders to think about being against Taiwan. Xiamen is a special economic zone, bringing together a large number of high-tech talent, so there are advantages of the implementation of information warfare.

In an exercise conducted by the Jinan Military Region, the Xi’an People’s Armed Forces Information Warfare team played the blue side of the attack, and they developed 10 kinds of information warfare measures, including information mine, information reconnaissance, change of network information, release of information bombs, dumping Network spam, distribute web leaflets, information spoofing, spread false information, organize information defense, and establish web spy stations. From these network information warfare can be seen that their research on the network information war has been quite specific and in-depth.

China’s military experts also suggested that all levels of militia organizations should set up network technology professional units, in order to facilitate the coordination of command, militia network technology professional units should be provincial or regional units for the implementation of the group, vertical management. Reserve forces to participate in the future war in the “network attack and defense” and “network technology security”, its actions should be organized by the military organization and unified coordination.

Training base

The Chinese People’s Liberation Army has developed its own set of information warfare education methods, the steps are: first to teach the basic knowledge of network information warfare; secondly through the military’s advanced military thinking to improve the level of information warfare knowledge; and then improve the use of information technology skills, Electronic technology, psychological warfare technology and information attack and defense technology; Finally, through the exercise of knowledge into practical ability. In China, mainly by the People’s Liberation Army institutions to foster information warfare high-tech talent responsibility:

People ‘s Liberation Army Communications Command College, located in Wuhan. In 1998, the hospital published two books, namely, “information combat command and control” and “information combat technology”, these two books is China’s information warfare education the most important teaching materials. The college has a high reputation for its excellent information warfare tutorials, which analyze the information, operational requirements of strategic, operational, and tactical levels.

People’s Liberation Army Information Engineering University, located in Zhengzhou, by the original PLA Information Engineering Institute, Institute of Electronic Technology and Surveying Institute merged. The main research areas of the school are information security, modern communication technology and space technology, and in some cutting-edge disciplines to explore, such as remote sensing information technology, satellite navigation and positioning technology, geographic information database technology.

People’s Liberation Army Polytechnic University, located in Nanjing, by the former People’s Liberation Army Communications Engineering College, Engineering Engineering College, Air Force Meteorological Institute and the General Association of 63 Institute merged. The school is responsible for training information warfare, commanding automation and other new disciplines of military talent. There are nearly 400 experts and professors in the university engaged in information war theory and technology research.

People’s Liberation Army National Defense Science and Technology University, located in Changsha, the school directly under the Central Military Commission. Has developed the famous “Galaxy” series of supercomputers. During the Kosovo war in April-June 1999, nearly 60 senior officers gathered in this study of high-tech wars.

People’s Liberation Army Naval Engineering University, located in Wuhan, is the only naval study of information warfare institutions. The purpose of the school’s information warfare is to apply information technology to naval equipment so that the Chinese navy can adapt to the information war.

in conclusion

What conclusions can we get from the study of information warfare in China? What can the American army get from it?

First of all, China’s military theorists have found a cheap and effective information warfare method, which makes China in the strategic military and international status to obtain the same position with the West, so that China in Asia to play a more important strategic role.

Secondly, China’s attention to the new information warfare forces is extraordinary. It may be possible to develop various forms of information warfare forces, such as: network forces (independent arms), “cyber warriors” raid units, information protection forces, information corps, electronic police and joint networks of people’s war institutions. It is interesting to note that Western countries, not China, have the ability to put these ideas into practice at this stage.

Thirdly, China’s information warfare theory reflects the combination of Western and Chinese ideas, and the influence of the former is getting weaker. Due to some common origins of military command art (Marxist dialectical thinking), China’s information warfare thought is more similar to that of Russia. However, in terms of its essence, China’s information war theory and Russia and the West are different. China’s information war theory emphasizes control, computerized warfare, cyber warfare, intellectual warfare and system of information rights.

Fourth, in the field of information warfare, China has spanned a number of technological developments and has used the Quartet’s technology to save time and save money. However, China does not fully follow the foreign, but the use of creative information war strategy. But no matter what, China is worthy of attention is different from other countries, the power of information.

For the US military, the study of China’s information war theory is not just to give the military a few opinions. “Art of War” called “know that know, victorious”. From the perspective of foreign information warfare theory to analyze the ability of the US information warfare in order to find the fatal flaws of the US information warfare system.

As the Chinese say, the losers of the information warfare are not necessarily behind the technology, and those who lack the art of command and strategic ability are the most likely to be losers. The United States to the reflection of their own information war thinking, and to study the information war strategy and tactical time. (Fan Shengqiu compilation) (“International Outlook”)

China and the latitude and longitude network February 11, 2004

 

Original Mandarin Chinese:

本文原載於美國陸軍《軍事情報》雜誌2003年7-9月號。作者蒂莫西·托馬斯是美國陸軍中校,現為美國外國軍事研究辦公室(FMSO)分析員。作者畢業於著名的西點軍校,曾任美軍第82空降師分隊指揮官,對信息戰、心理戰、低強度衝突有深入的研究。本文反映了美國軍方對中國信息戰理論和建設的憂慮與戒備心理。本刊特編譯此文,僅供讀者參考。
在過去幾年裡,中國軍方與民間專家們掀起了研究信息戰的熱潮。閱讀他們的作品後不難發現,中國的信息戰理論研究具有幾個明顯的特徵:首先,中國正迫不及待地發展自己的信息戰理論,這與其對自身安全威脅的判斷有關;其次,中國的信息戰理論受其傳統軍事指揮藝術影響頗深。無論是古代的《孫子兵法》和《三十六計》,還是毛澤東的人民戰爭思想都在信息戰理論中打下了深深的烙印;第三,中國對信息戰的認知與分類,顯然不同於信息戰的開山鼻祖——美國,雖近似於俄國的信息戰理論,卻也只是形似而神不是。

圍魏救趙
信息時代的到來促使人們對戰爭的進行方式重新進行思索。中國意識到其常規武裝力量與超級大國相比實力懸殊,近期內無論是常規力量還是核武器,中國都無法對美國構成強大威懾。但是,雄心勃勃的東方巨龍認為:隨著信息時代的來臨,戰爭形態、軍隊結構、作戰方式和指揮手段都會有嶄新的變化,信息將取代人充斥於未來戰場。只要把戰略研究的著眼點放到信息戰這一戰爭形態上,把握時代發展潮流,就不難縮短距離,並進一步取得領先地位。
中國古代有部兵書叫《三十六計》,其中的一計“圍魏救趙”就指出,如果敵人正面力量過於強大,應當避實就虛,擊其薄弱之處。中國人古為今用,把這個計謀應用到當前國家間鬥爭——如果你不能發動直接攻擊(核打擊),那就打信息戰,向西方薄弱的金融、電力等

網絡系統下手。常規武裝力量雖然無法與美國抗衡,然而,中國的信息戰部隊在理論上卻實實在在威脅到美國的政治及經濟安全,美國人無法承受紐約股票交易所和納斯達克股票交易所在瞬間崩潰。信息戰的全球可及性、光速傳播性是核戰爭所不具有的特性,中國人要的就是以信息戰的速度、準確性和持續性擊敗對手。
信息戰力量可彌補常規武裝力量的不足。各種戰場信息網絡的建立,不僅可以提高對傳統戰爭的管理水平,增強部隊的整體戰鬥力,還可以在一定程度上彌補常規力量的不足。在中國人眼中,信息戰好似如虎添翼,是常規武裝部隊的力量倍增器。
信息戰智囊
1996年,中國最早提出信息戰的專家沈偉光給信息戰下的定義是:“交戰雙方通過控制信息與情報資源來爭奪戰場主動權的戰爭。”與美國“保護友方信息系統,攻擊敵方信息系統”的定義相比,沈偉光更強調“控制”敵人。
1998年,中國軍方信息戰權威王保存少將對信息戰進行了分類:按時間分為平時、危機時、戰時;按性質分為進攻、防禦;按層次分為國家、戰略、戰區、戰術;按規模分為戰場、戰區、局部戰爭。信息戰表現的特徵包括指揮與控制戰、情報戰、電子戰、心理戰、空間控制戰、黑客戰、虛擬戰、經濟戰等方面的較量。信息戰原則上採取切斷、蒙蔽、透明、快速和提高生存力等措施。王將軍對信息戰的認識與西方較為接近,都把重點放在先進技術的對抗上。
1999年,中國專家對信息戰展開了大討論。沈偉光此時把信息戰的範圍擴大,他認為“信息戰,廣義地指對壘的軍事(也包括政治、經濟、科技及社會一切領域)集團搶占信息空間和爭奪信息資源的戰爭,狹義地指戰爭中交戰雙方在信息領域的對抗。它是現代戰爭的本質特徵之一。信息戰的本質在於通過奪取制信息權達到’不戰而屈人之兵’。”
軍方另一位信息戰專家王普豐少將對信息戰有很深入的理解,2000年,他把信息戰和信息戰爭區別開。根據他的解釋,信息戰爭指的是一種戰爭形態,它包含了信息戰,而信息戰指的是一種作戰活動。他認為“信息戰包括所有作戰活動,其中有對敵信息及信息系統實施信息竊取、篡改、刪除、欺騙、擾亂、阻塞、干擾、癱瘓等一系列的入侵活動和計算機病毒攻擊,最終使敵計算機網絡無法正常工作。”他主張中國的信息戰理論在藉鑒國外先進作戰思想的同時,應具有中國自己的特色。
“毛式網絡人民戰爭”
中國對信息戰的認知非常具有傳統特色。許多軍事理論家認為信息時代賦予了毛澤東人民戰爭思想新的內涵,因此,主張依靠和發動廣大人民群眾進行網上戰爭。可以想像,無論是哪個同家,與13億人打網絡戰都是令人生畏的。
毛澤東式網絡人民戰爭理論的最重要特徵是它打破了軍與民的界限。模糊了軍用設施與民用設施、軍用技術與民用技術的傳統分界線。信息技術在軍用和民用上的共享,為廣泛利用民間技術達成軍事目的創造了條件。例如,可以利用民間的電子信息設備進行情報截獲和傳輸可以利用民間的通信網絡進行戰爭動員;可以利用民間的計算機進行網絡進攻和防禦等。其次,軍事人員與非軍事人員的區別也在逐漸消失。隨著網絡技術的發展和應用領域的擴大,大批的網絡技術人才脫穎而出。這些具備特殊能力的網絡精英將成為未來網絡人民戰爭中的角斗士。與此同時,通信、交通、金融系統等信息網絡與國際聯網,為中國開展人民戰爭提供了必要條件。
如今,人民戰爭思想已經被確立為中國網絡信息戰的根本指導原則。一個中國軍方作者寫道:“靈活機動的戰略戰術原則,仍然是網絡信息戰的靈魂。廣大人民群眾積極參戰,特別是技術支援和網上參戰,則是奪取網絡信息戰勝利的群眾基礎和力量源泉。”
網絡人民戰爭的威力是如此可怕,或許,我們可以明白為何中國人願意削減其武裝部隊規模了——設想一旦戰爭爆發,中國可以發動大量民眾參戰,信息工程師和平民將被組織起來,通過家中的電腦攻擊美國的網絡信息系統,那又何必要維持規模龐大的作戰部隊呢?
信息戰演練
過去幾年裡,中國舉行過數次重大信息戰軍事演習對信息戰理論進行檢驗。首次“特種戰”(信息戰)演練於1997年10月進行。某軍區的一個集團軍遭到旨在癱瘓其係統的病毒攻擊,該集團軍用殺毒軟件進行了防衛。該演練被稱為“入侵與反入侵演練”。演習時還動用了地面後勤、醫療和空軍部隊。
1998年10月,中國舉行了一場由三大軍區聯合進行的高科技綜合演練。聯合防禦作戰演練中首次使用了“軍事信息高速公路”。指揮自動化系統中的信息網絡系統由數字、撥號、指揮網和保密信道組成。指揮自動化系統的其他部分是指揮作戰、音頻和圖形處理、控制和數據加密等子系統。
1999年10月,解放軍首次進行了兩個集團軍之間的戰役級計算機網上對抗演習。演練了偵察與反偵察、干擾與反干擾、封鎖與反封鎖、空襲與反空襲等科目。在軟件環境下進行了資源共享、作戰指揮、態勢顯示、輔助評估、信號傳輸和情報戰等6類作業。計算機評估系統對演習雙方的表現進行數據與質量分析。
2000年7月,某軍區也進行了網上對抗演練。與此次演練有關的3項訓練任務是:組織和計劃戰役、奪取制空權和製信息權、實施突破和反突破。有100多台終端聯網參與了演練。
民兵分隊
中國的人民戰爭有一套完備的體制,其總體發展方向是“精幹的常備軍與強大的後備力量相結合”,這種國防體制有利於發揮人民戰爭的整體效能和“網海戰術”優勢。
中國150萬預備役部隊十分熱衷於打網絡人民戰爭。在一些地區,解放軍已經把預備役部隊編成小型信息戰部隊。例如,在湖北省宜昌市,軍分區組織了20個市政部門(電力、財政、電視、醫療等)的技術人員成立了預備役信息戰團。該部擁有網絡戰營、電子戰營、情報心理戰營及35個技術分隊。該部還建立了中國第一個能容納500人的預備役信息戰訓練基地。
宜昌並不是組織預備役和民兵進行信息戰訓練的唯一地區。 1999年12月在福建廈門召開了預備役和民兵會議。在隨後進行的演習中,擁有高技術裝備的民兵分隊進行了電子對抗、網絡攻擊和防護、雷達偵察表演。山於假想攻擊的目標是一座被包圍的島嶼,因此很容易讓外人聯想到是針對台灣。廈門是經濟特區,匯集了大量高科技人才,因此有實施信息戰的優越條件。
在一次由濟南軍區舉行的演習中,西安人武部信息戰分隊扮演負責攻擊的藍方,他們制定了10種信息戰措施,其中有安放信息地雷、信息偵察、改動網絡資料、釋放信息炸彈、傾倒網絡垃圾、分發網絡傳單、信息欺騙、散佈虛假信息、組織信息防禦、建立網絡間諜站。從這些網絡信息戰法可以看出,他們對網絡信息戰的研究已相當具體、深入。
中國的軍事專家還建議,各級民兵組織都應成立網絡技術專業分隊,為便於指揮協調,民兵網絡技術專業分隊應以省或者地區為單位實行條條編組,垂直管理。後備力量參與未來戰爭中的“網絡攻防”和“網絡技術保障”,其行動要由軍隊組織實施和統一協調。
培養基地
中國人民解放軍發展出自己的一套信息戰教育方法,其步驟是:首先傳授網絡信息戰基礎知識;其次通過講述外軍的先進軍事思想提高信息戰知識水平;然後提高信息戰使用技能,特別是電子技術、心理戰技術和信息攻防技術;最後,通過演習把知識轉化為實際操作能力。在中國,主要由解放軍院校擔負培養信息戰高技術人才的責任:
解放軍通信指揮學院,位於武漢。 1998年,該院出版了兩部書籍,分別是《信息作戰指揮控制學》和《信息作戰技術學》,這兩部書籍是中國信息戰教育最重要的教材。該學院以其優良的信息戰教程設置而享有很高的聲譽,這些教程分析了戰略、戰役、戰術層次的信息作戰要求。
解放軍信息工程大學,位於鄭州,由原解放軍信息工程學院、電子技術學院和測繪學院合併而成。該校目前主要研究領域是信息安全,現代通信技術和空間技術,並且在一些尖端學科領域進行探索,如遙感信息技術、衛星導航與定位技術、地理信息數據庫技術。
解放軍理工大學,位於南京,由原解放軍通信工程學院、工程兵工程學院、空軍氣象學院和總參第63研究所合併而成。該校專門負責訓練信息戰、指揮自動化和其它新學科的軍事人才。有近400名專家教授在該大學從事信息戰理論與技術研究。
解放軍國防科技大學,位於長沙,該校直接隸屬於中央軍委。曾開發了著名的“銀河”系列超級計算機。 1999年4月到6月科索沃戰爭期間,近60名高級軍官匯集在此研究高科技戰爭。
解放軍海軍工程大學,位於武漢,是海軍唯一研究信息戰的院校。該校研究信息戰的目的是把信息技術應用到海軍裝備,使中國海軍能適應信息化戰爭。
結論
我們從中國的信息戰研究中能得到什麼結論呢?美國軍隊又能從中得到什麼啟示呢?
首先,中國的軍事理論家找到了一廉價而有效的信息戰方法,它使中國在戰略軍事和國際地位上取得與西方相等的位置,從而使中國在亞人地區發揮更重要的戰略角色。
其次,中國對新型信息戰部隊的重視非同尋常。因此可能會發展形式各樣的信息戰部隊,例如:網絡部隊(獨立兵種)、“網絡勇士”突襲分隊、信息保護部隊、信息兵團,電子警察和聯合網絡人民戰爭機構。有意思的是,就現階段的能力而言,西方國家,而不是中國,更具有把這些設想付諸實施的能力。
第三,中國的信息戰理論反映了西方和中國思想的結合,而且前者的影響力越來越弱。由於軍事指揮藝術的一些共同淵源(馬克思主義辯證思想),中國的信息戰思想更類似於俄國。但是,就其本質而言,中國的信息戰理論與俄國和西方都不同。中國的信息戰理論強調控制、電腦化戰爭、網絡戰、知識戰和製信息權。
第四,在信息戰領域,中國跨越了若干技術發展階段,利用四方的技術,不僅節省了時間而且還節省了金錢。不過,中國沒有完全仿效外國,而是採用創造性的信息戰策略。但不管怎麼樣,中國都是值得關注的一支不同於其他國家的信息戰力量。
對美軍而言,研究中國的信息戰理論絕非僅僅為了給軍方提供幾條意見。 《孫子兵法》稱“知彼知已,百戰百勝”。從外國信息戰理論的角度來分析美國的信息戰能力,才能發現美國信息戰系統的致命缺陷。
正如中國人所言,信息戰的失敗者不一定是技術落後方,那些缺乏指揮藝術和戰略能力的人才最可能是失敗者。美國到了該反省自己的信息戰思想,並研究信息戰戰略和戰術的時候了。 (範胜球編譯)(《國際展望》)
華夏經緯網 2004年02月11日

 

國外軍事家看中國特色的信息戰 // Chinese Characteristics of Information Warfare: Foreign Military Observations

國外軍事家看中國特色的信息戰 //

Chinese Characteristics of Information Warfare: Foreign Military Observations

In recent years, information warfare has become a hot spot all over the world.China’s military strategists have not neglected their importance as a tool of war, and are accelerating the development of information warfare theory. They are not only exploring theoretical issues, but also training troops.

Information warfare with Chinese characteristics

Chinese military theorists believe that information warfare can give Mao Zedong’s people’s war ideas into the omission. This view by the Chinese information warfare expert Wang Pufeng (transliteration) generals in 1995 for the first time. Some people think that electronics, computer and information engineering experts, like the past soldiers on the battlefield, can become the main force in the new people’s war. Obviously they want to use the people’s war ideas to fight the information war – a war with a home computer, when necessary to mobilize thousands of people, attack foreign computer systems. China has a number of outstanding software experts, in the field of information war has great potential. The question is how to seek greater information space and equipment for the huge population.

“The whole society will replace the traditional battlefield,” said Shen Weiguang, an information warfare expert. “Different classes and social groups will participate in political activities in their own country or other countries.” He advocates the establishment of a scientist, police, Other experts to form the information protection forces to defend the security of the national information field, to counter the invasion of information launched by other countries.

The idea of ​​combining the people’s war with the information war is being carried out in China’s 1.5 million strong reserve army. The People’s Liberation Army is turning the reserve forces of certain military sub-divisions into small-scale information warfare. In Hubei, a military division, the People’s Armed Forces Department has 20 towns of the armed forces to form a reserve / militia information warfare. The Department has a network of war camps, electronic war camps, intelligence and psychological camps, and 35 technical units (classes to camp). The department has also established the first training base for information services that can accommodate 500 people.

The above-mentioned military division is not the only military division of the organization’s reserve and militia for information warfare. “Liberation Army Daily” has reported that in December 1999 a city along the southeast coast held a meeting of the reserve and militia forces, during the electronic interference, network attack and defense and radar reconnaissance and other red. There are also reports of information warfare activities organized by the People’s Armed Forces and the Armed Forces in other regions.

In the information war era, China is also affected by another important tactics, that is, China’s “thirty-six dollars.” About 300 years ago, an unnamed scholar collected 36 Chinese tactics, and compiled a book, named “thirty-six dollars.” The book focuses on deception as a military art that achieves military goals. In the information age, due to the unknown uncertainty of the attacker’s origin (the program’s listening to the source of the virus and the presence of the back door increases the vulnerability of the system), some tactics may be reusable, thirty-six may find new Meaning and new use.

Some critics argue that in today’s high-tech era, these ancient strategies are hard to do. However, just look at a few of them, then it is another situation: the first plan “deceive”, meaning by resorting to deceit and camouflage means to hide their true intentions, in order to achieve the purpose of loosening the enemy vigilance. Applying to information wartime is the use of regular e-mail and commercial lines on the Internet to cover the purpose of sending dangerous code and viruses. The fourth meter “to wait and see”. Meaning that when fighting their own recharge your batteries, until the enemy fatigue chaos, take the opportunity to win. Application to the information wartime is the use of people’s war theory, extensive mobilization of the masses to attack, until all the Western computer to meet the difficulty of self-propelled when the implementation of large-scale attack.

At present, China is considering the establishment of future high-tech operations of the “network army.” It will protect the network sovereignty, network warfare and technology and knowledge-intensive operations. Network technology will include: can decipher the password, steal data and restore data browsing technology; can attack on the network and attack counterattack technology; can fake fake identity from the network to steal the license of camouflage technology; to avoid attacks, Prevent internal leaks, and defensive techniques that prevent random action like electronic police.

Definition of information warfare

China’s famous author of the issue of information warfare at home and abroad is Dr. Shen Weiguang, Major General Wang Pufeng, Wang Baoji University and Yuan Bangji General (both sound Ze). In 1996, Dr. Shen first proposed the definition of information warfare: information war is a two sides through the control of information and intelligence to try to master the battlefield initiative of the war. As the United States defined, Dr. Shen stressed that “save yourself, fight against the enemy” into “to protect themselves, control the enemy.” Wang generals also believe that the key to information warfare is to control the information.
In 1997, Wang Baoji University from the perspective of China’s military science and Marxism-Leninism to elaborate on the word information warfare. This article covers the form, nature, hierarchy, characteristics, characteristics and principles of information warfare. He believes that the form of information warfare is divided into normal, crisis and wartime three; nature is attack and defense of the contest; level is divided into national, strategic, theater and tactical four; features include command and control warfare, intelligence war Such as electronic warfare, psychological warfare, space control warfare, hacking warfare, virtual warfare, economic warfare, strategic and precise contest, etc .; features complex, transparent, limited target, short duration, small damage, large combat space, Comprehensive, strong command capability, etc .; in principle, to take cut, blinded, transparent, fast melon and improve the viability and other measures. His office and analysis of information warfare help people gain a deeper understanding of China’s information warfare.

Another author of China’s definition of information war is the General Staff of the PLA General Staff, he wrote in the 1999 book that: “Information war is a capture and maintain the control of information and struggle between the hostile parties Compete for access to control and use of information initiative, they use and protect their own information and resources and information systems at the same time, will use and destroy the enemy’s information resources, information systems and information-based weapons systems.

In 2000, General Wang Pufeng made a more thorough and thorough explanation of the “information warfare” than he used to be “information war”. Wang believes that the information war refers to a war and a war mode; information warfare refers to a kind of combat and a combat mode. The new mode of action refers to the action that is carried out in the computer network. Information warfare includes information detection systems, information transmission systems, information and weapons attack systems, and information processing and application systems. Information warfare contains information warfare, which combines information and ability to use information networks based on the battlefield as their place of activity.

Information warfare training

In February 1999, an interesting article on information warfare training defined information warfare as a knowledge war, a special contest for the power of high intelligence. The definition stems from the fact that high-tech warfare requires commanders and operators to have a high level of knowledge, strong mental, command and operational skills.
Chinese military leaders, after recognizing the gap between the above and the more developed countries, decided to carry out training activities at all levels. The staff will be divided into three categories by age:

The first category for the support of talent, the main goal is more than 40 years of age at all levels of leading cadres. The aim is to eliminate their blind spots by training (from mechanization concepts to simulated computer fights) to change their minds and apply them to future wars. Training content includes: information technology foundation, information warfare theory, information warfare weapons universal knowledge. Training methods of color training courses and other auxiliary methods.

The second category is a transitional talent, training goal is 30-40 year old cadres. As the future leaders of the Chinese army, they must focus on improving the commanding ability in the information warfare environment.

The third category for the regeneration of talent, training for the 30-year-old cadres. These people have long been adapted to the information society, with a good foundation of modern information technology theory, focusing on improving their commanding ability and skills.

The training of various age groups includes: basic theory (computer foundation and application, communication network technology, information highway, digital force); electronic warfare; radar technology; information war rules and rules; information strategy and tactics; theater and strategic information warfare Information systems (including the collection of letters, processing, information and use of information warfare); monitoring, decision-making and control systems; information weapons (soft and hard destruction of the concept and principles, how to use information weapons, analog information warfare); information system protection; Computer virus attack and defense, as well as communication network interference and anti-interference.

The article shows that China is preparing a first-class information warfare course. However, subsequent reports indicate that this is not the case. In July 1999, a “Liberation Army Daily” pointed out: “training content, system and structure of the rationality of the information warfare training can not really become the mainstream of our military training.Currently, information warfare training in a state of arbitrary. System, operation is not standardized, the lack of assessment standards and management regulations.

Information warfare

Over the past three years, China has held several major information warfare military exercises, every time it is important, because it is a test of information war theory. The first “special war” (information warfare) exercise was conducted in October 1997; a military army in a military area was subjected to a computer attack aimed at paralyzing its system, and the group’s military antivirus software was defended. The exercise is called “invasion and anti-intrusion exercise”. The exercise used ground logistics, medical and air forces.

In October 1998, China held a high-tech comprehensive exercise with several national military zones. The first use of the “military information superhighway” was used for joint defense operations. The information network subsystem in the command automation system is composed of digital, dialing, command network and secret channel. The other parts of the command automation system are subsystems such as command warfare, audio and graphics processing, control and data encryption. Military information highway in addition to the trend map, but also send graphics, characters and audio data.

In October 1999, the People’s Liberation Army for the first time between the two groups of war-level computer online confrontation exercise. Conducted reconnaissance and anti-reconnaissance, interference and anti-interference, blockade and anti-blockade, air strikes and anti-air raid and other subjects. In the software environment, resource sharing, combat command, situation display, auxiliary evaluation, signal transmission and intelligence warfare and other six types of operations. The computer evaluation system conducts mathematical and qualitative analysis of the performance of the participant.
In July 2000, a military area in southwest China also conducted an online confrontation exercise. The three training tasks related to the exercise are: organizing and planning the campaign, seizing air power and making information, implementing breakthroughs and breaking down. There are more than 100 terminal networking involved in the exercise. Three weeks later, another military area also opened a high-tech exercise curtain, and issued to the subordinate units began to control the communication line command.

China ‘s Information Warfare Ability

Chinese military theorists have found a voluntary, very economical and obedient partner in information warfare. This partner will enable China to catch up with the West in strategic, military and international status. Which will enable China to play an important strategic role in the future Asia-Pacific region. China may gradually pay close attention to economic competitors.

China attaches great importance to the role played by the new information warfare forces, including the network forces (independent arms), the network warriors commando, the information protection forces, the information corps, the electronic police and the joint people’s war network. The latter is particularly concerned by foreign analysts because of its unique nature and potential. Chinese military theorists believe that the victory of information warfare will belong to the one who can mobilize the most computer experts to participate in the “information family war”, they will use such as cyber war strategy, trying to cut off important information nodes and contacts.

At present, China’s information warfare combines Western, Russian and Chinese ideas. However, information wars with Chinese characteristics, which are different from Russia and the West, are gradually forming. China’s information warfare should look for answers to the questions from today’s military history, such as the nature and characteristics of information warfare.

However, there are still many shortcomings in China’s information warfare methods, not just quantitative aspects. The core of the information warfare theory also involves maintaining the integrity and stability of the infrastructure. In the information age, infrastructure stability is as important as troop survivability. China’s biggest weakness is just in terms of infrastructure. At present, China is accelerating the development of electronic information industry, its purpose is nothing more than for the military and civilian information base for the use of infrastructure.

China is good at drawing lessons from others, may soon be able to set up a compelling information warfare force. Information war has forced China to cross a number of technological development stages, the use of Western technology, not only save time but also save money. However, China may not fully follow the example of others, but will take a creative or indirect information war strategy. But no matter what, China is worthy of attention is different from other countries, the power of information.

Original Mandarin Chinese:

近些年來,信息戰已經成為全世界的熱點。中國的軍事家們也沒有忽視其作為戰爭工具的重要意義,正在加速發展信息戰理論。他們不僅正在探索理論方面的課題,而且也在據此訓練部隊。

中國特色的信息戰

中國軍事理論家認為,信息戰可以給毛澤東的人民戰爭思想注入省略。此觀點由中國信息戰專家王普峰(音譯)將軍於1995年首次提出。有人認為,電子、計算機和信息工程專家如同過去戰場上的將士一樣,可以成為新人民戰爭中的主力軍。顯然他們是希望用人民戰爭思想打信息戰--一種用家用微機即可進行的戰爭,需要時動員成千上萬人,攻擊外國計算機系統。中國擁有一批傑出的軟件專家,在信息戰領域有巨大潛力。問題是如何為龐大的人口尋求更大的信息空間和設備。

信息戰專家沈偉光在文章中寫道:“整個社會將取代傳統戰場。不同階層和社會團體將參與本國或其他國家的政治活動。”他主張建立一支由精通信息戰的科學家、警察、士兵和其他專家組成的信息保護部隊,以捍衛國家信息領域的安全,反擊其他國家發動的信息入侵。

將人民戰爭和信息戰相結合的思想正在貫徹到中國150萬強大後備軍中。人民解放軍正將某些軍分區的後備役部隊變成小型信息戰團。在湖北某軍分區,人民武裝部已將20個城鎮的武裝部組成一個後備役/民兵信息戰團。該部擁有網絡戰營、電子戰營、情報和心理戰營,以及35支技術分隊(班到營)。該部還建立了第一個可容納500人的後備役信息戰訓練基地。

上述軍分區並非是組織後備役和民兵進行信息戰訓練的唯一軍分區。 《解放軍報》曾報導說,1999年12月東南沿海某城市舉行了一次運用後備役和民兵部隊的會議,期間進行了電子乾擾,網絡攻防和雷達偵察等演紅。同樣還有其他地區人武部和軍分區組織信息戰活動的報導。

在信息戰時代,中國還受到另一個重要戰法的影響,即中國的“三十六計”。大約300年前,一位無名學者蒐集到中國的36個計謀,並彙編成書,取名為《三十六計》。該書著重將欺騙作為達成軍事目標的軍事藝術。在信息時代,因攻擊者來歷不明的情況不確定性(程序聽病毒源和存在的後門增大了系統的易損性),有些計謀可能會重新有用武之地,三十六計可能會找到新含義和新用途。

一些評論家認為,在當今的高技術時代,這些古代計策難有作為。然而,只需看看其中的幾計,則又是另一番情況:第一計“瞞天過海”,意思是通過採取欺騙和偽裝的手段隱藏自己的真實意圖,以達到鬆懈敵人警惕性的目的。應用到信息戰時就是使用互聯網上的正規電子郵件和商業線路來掩蓋發送危險代碼和病毒的目的。第四計“以逸待勞”。意思是作戰時自己養精蓄銳,待敵疲勞混亂時,乘機出擊取勝。應用到信息戰時就是利用人民戰爭理論,廣泛發動群眾進行攻擊,待所有西方計算機應爭反應小級難以自拔時再實施大規模進攻。

目前中國正考慮建立未來高科技作戰的“網絡軍”。它將保護網絡主權,進行網絡戰以及技術和知識密集型作戰。網絡技術將包括:能破譯密碼、偷取數據和恢復數據的瀏覽技術;能在網絡上發起攻擊和乾擾的反擊技術;能通過偽造假身份從網絡竊取許可權的偽裝技術;能避開攻擊、防止內部洩密以及像電子警察那樣阻止隨意行動的防禦技術。

信息戰的定義

中國探討國內外信息戰問題的著名作者是沈偉光博士、王普鋒少將、王保存大校和袁邦概將軍(均為音澤)。 1996年,沈博士首次提出信息戰定義:信息戰是一場雙方通過控制信息和情報輿來設法掌握戰場主動權的戰爭。正如美國界定的那樣,沈博士強調把“保存自己,打擊敵人”變為“保護自己,控制敵人”。王將軍也認為信息戰取勝的關鍵是控制信息。
1997年,王保存大校從中國軍事科學和馬列主義的角度精闢地闡述字信息戰問題。該文涵蓋信息戰的形式、性質、層次、特徵、特點和原則。他認為:形式上信息戰分為平時、危機時和戰時三種;性質上是攻與防的較量;層次分為國家、戰略、戰區和戰術四級;特徵包括指揮與控制戰、情報戰、電子戰、心理戰、空間控制戰、黑客戰、虛擬戰、經濟戰、戰略和精確的較量等;特點有復雜、透明、目標有限、持續時間短、毀傷小、戰鬥空間大、部隊疏散、綜合性強、指揮能力要求強等;原則上採取切斷、蒙蔽、透明、快速瓜和提高生存力等措施。他對信息戰的辦公室和分析有助於人們更深入了解中國的信息戰。

中國另一位界定信息戰的作者是解放軍總參謀部的袁將軍,他在1999年撰寫的書中認為:“信息戰是一場奪取和保持信息控制權而進行的鬥爭,是敵對雙方之間爭奪獲取控制和使用信息主動權的鬥爭,他們在使用和保護己方各種信息戰資源和信息系統的同時,會利用和破壞敵方的信息資源、信息系統和基於信息的武器系統。

2000年,王普鋒將軍對“信息戰爭”作了比以往更深入透徹的解釋,以別於“信息戰”。王將軍認為,信息戰爭指的是一種戰爭和一種戰爭模式;信息戰指的是一種作戰和一種作戰模式。之種新作戰模式指的是在計算機網絡窨進行的行動。信息戰包括信息探測系統、信息傳輸系統、信息和武器攻擊系統以及信息處理和應用系統。信息戰爭包含信息戰,兩者將信息和能力融為一體,使用以信息網絡為基礎的戰場作為他們的活動場所。

信息戰訓練

1999年2月,一篇關於信息戰訓練的有趣文章將信息戰界定為知識型戰爭,是高智能人才之間力量的特殊較量。該定義源於這樣一個事實:高技術戰爭需要指揮員和操作員有很高的知識、很強的心理素質、指揮能力和作戰技術。
中國軍方領導人在認識到上述幾方面與較發達國家存在的差距後,決定在各級開展訓練活動。將人員按年齡分為3類:

第一類為支撐型人才,主要目標是40多歲以上的各級領導幹部。目的是通過訓練(從機械化概念到模擬計算機戰鬥)消除他們的信息盲區,轉變他們的觀念,使其將新思維應用到未來戰爭中去。訓練內容包括:信息技術基礎、信息戰理論、信息戰武器普及知識。訓練方法彩短訓班和其他輔助方法。

第二類為過渡型人才,培養目標是30-40歲的干部。作為中國軍隊的未來領導者,他們必須著重提高信息戰環境下的指揮能力。

第三類為再生型人才,培養對象為30歲以下的干部。這些人早已適應信息社會,擁有現代信息技術理論的良好根基,重點是提高他們的指揮能力和技藝。

各個年齡組的訓練包括:基礎理論(計算機基礎和應用、通信網絡技術、信息高速公路、數字化部隊);電子對抗;雷達技術;信息戰規律與規則;信息戰略與戰術;戰區與戰略信息戰的信息系統(包括收信紙、處理、輿和使用信息戰指令);監測、決策和控制系統;信息武器(軟、硬破壞的概念和原則、如何應用信息武器、模擬信息戰);信息系統保護;計算機病毒攻與防,以及通信網絡的干擾與反干擾。

該文章表明中國正在編制第一流的信息戰課程。然而,後來的報導表明情況並非如此。 1999年7月的一份《解放軍報》指出:“訓練內容、體制和結構的無理性使信息戰訓練不能真正成為我軍訓練的主流。目前,信息戰訓練處於一種隨心所欲的狀態。內容不系統,運作不規範,缺乏評估標準和管理規章”。

信息戰演練

過去3年,中國舉行過數次重大信息戰軍事演習,每次都很重要,因為那是對信息戰理論的一次檢驗。首次“特種戰”(信息戰)演練於1997年10月進行;某軍區的一個集團軍遭到旨在癱瘓其係統的計算機攻擊,該集團軍用殺毒軟件進行了防衛。該演練被稱為“入侵與反入侵演練”。演習時運用了地面後勤、醫療和空軍部隊。

1998年10月,中國舉行了一場有全國數個軍區聯合進行的高科技綜合演練。聯合防禦作戰演練時首次使用了“軍事信息高速公路”。指揮自動化系統中的信息網絡子系統由數字、撥號、指揮網和保密信道組成。指揮自動化系統的其他部分是指揮作戰、音頻和圖形處理、控制和數據加密等子系統。軍事信息高速公路除傳勢圖外,還發發送圖形、字符和音頻數據。

1999年10月,解放軍首次進行了兩個集團軍之間的戰役級計算機網上對抗演練。演練了偵察與反偵察、干擾與反干擾、封鎖與反封鎖、空襲與反空襲等科目。在軟件環境下進行了資源共享、作戰指揮、態勢顯示、輔助評估、信號傳輸和情報戰等6類作業。計算機評估系統對參演者的表現進行數理與質量分析。
2000年7月,西南某軍區也進行了網上對抗演練。與此次演練有關的3項訓練任務是:組織和計劃戰役、奪取制空權和製信息權、實施突破和反突破。有100多台終端聯網參與了演練。三週後,另一個軍區也拉開了高技術演練的帷幕,並向下屬部隊下達開始控制通信線路的命令。

中國的信息戰能力

中國軍事理論家已在信息戰方面找到一個自願、非常經濟和順從的伙伴。這個夥伴將使中國在戰略、軍事和國際地位上趕上西方。這將使中國在未來亞太地區發揮重要的戰略作用。中國可能會逐步引起經濟競爭者的密切關注。

中國異常重視新信息戰部隊所表現出的作用,這方面的各種組織包括:網絡部隊(獨立兵種)、網絡勇士突擊隊、信息保護部隊、信息兵團、電子警察和聯合的人民戰爭網絡機構。後者因其獨特的性質和潛力引起外國分析家格外關注。中國軍事理論家認為,信息戰的勝利將屬於能夠動員最多的計算機專家參加“信息家庭戰”的那一方,他們將採用諸如網點戰那樣的戰略,設法切斷重要的信息節點和接點。

目前,中國的信息戰融合了西方、俄羅斯和中國的思想,然而,有別於俄羅斯和西方的具有中國特色的信息戰詞彙正在逐步形成。中國信息戰應從中國軍事歷史中尋找解決當今問題的答案,如36計、信息戰的性質和特點看來非常適合這些計策。

但是,中國的信息戰方法還存在許多不足,還不僅僅是數量方面的問題。信息戰作戰理論的核心還涉及到保持基礎設施的完整性和穩定性。在信息時代,基礎設施穩定性與部隊生存能力同等重要。中國的最大弱點恰恰就在基礎設施方面。目前中國正在加速發展電子信息產業,其目的不外乎是為軍民聯用的信息基礎設施打基礎。

中國善於吸取別人的前車之鑑,可能很快就可以組建一支令人刮目相看的信息戰力量。信息戰已迫使中國跨越了若干技術發展階段,利用西方的技術,不僅節省了時間而且還節省了金錢。然而,中國可能不會完全仿效別人,而將採取創造性的或間接的信息戰策略。但不管怎麼樣,中國都是值得關注的一支不同於其他國家的信息戰力量.

Original Date: 新華網 ( 2003-06-12 16:0x:xx )

Original Source:

http://news.xinhuanet.com/mil/2003-06/12/content_916888.htm