Category Archives: China’s Military Organization – Intelligence

中國軍隊聚焦認知域戰是主攻戰場對抗的新著力點

Chinese Military Focus on Cognitive Domain Warfare is the New Focus of Main Effort for Battlefield Confrontation

來源:人民網
認知域作戰是指運用輿論、心理、法律等多域手段,運用現代網絡、媒體、文字、圖片、視頻、數字等多維技術開展輿論宣傳。 、心理攻防,以及爭奪人心、顛覆信心、影響信仰、爭奪思想、意識形態鬥爭等重要形式,旨在爭奪人們在思想、信仰、價值觀、個人態度、情感、認同、 和判斷傾向。 認知領域戰是傳統輿論戰、心理戰、法律戰、貿易戰、外交戰、科技戰、意識形態戰等多領域戰的複雜集合。

目前,認知域作戰已經成為國家間軍事鬥爭和其他領域鬥爭的重要基礎,認知域目標驅動的語言對抗成為認知域作戰的重要形式,值得高度重視。 .

影響作戰對象的語言對策新前沿

認知領域作戰是當代認知科學研究和發展的伴隨成果。 它是人們積極探索大腦的認知活動,以期對大腦有更複雜、更抽象、更透徹的認識而產生的新戰場。 高級深度隱蔽活動是對行動對象影響的高端形式。 無論是信息行動的對象、信息的生產者、信息的內容本身,還是信息的傳播渠道,認知域中的操作都貫穿著認知的特徵,從一開始就突出認知層面的行動 結束。

從信息接收者的角度來看,這種認知是針對對手受眾的深度認知,包括其人民、軍隊、軍方指揮官或重要領導人、政商界重要人物,甚至直接包括 對方國家或軍隊的領導人。 具體的重要將領等,也可以是具體的人群或人群。 它可以涉及個人或群體的認知偏好、認知缺陷、認知習慣、認知偏見、認知誤解; 它還可以是個人和群體的信仰、價值觀、政治認同、族裔認同、社會和文化認同以及情感態度。

從信息提供者和內容的角度來看,應該融入信息生產者的認知設計和安排,包括對文本的獨特認知,如文本的話語方式、文本的敘述方式、 觀察事物的視角、敘述的認知重點和深度、句子的組織形式、句子的價值觀念傾向、句子概念的可接受性等。

在信息發布和傳播的渠道上,文本形式更接近多媒體多模態形式,更接近網絡空間的需要,更接近當代智能手機的優勢,更接近當前新興媒體時代的特徵,即 是,更符合受眾接受的認知特徵,即認知習慣和認知傾向。 文本的傳播形式充分考慮了國際傳播中的認知效應,尤其是跨文化、跨語言、跨媒體、跨群體的認知傳播。 這樣,文本會更好地從認知層面影響受眾。

語言對抗應對戰鬥風格的變化並產生新的戰術

縱觀人類歷史,不難發現,軍事鬥爭的風格一直在不斷變化。 從最初借助冷兵器的肉搏戰,發展到機械力與熱兵器的較量,也發展到高科技戰爭條件下信息能力的製衡。 每一次變化都帶來戰術上的深刻變化。 在當前機械化、信息化、智能化並存的過渡階段,人們不僅關注戰場物理域和信息域的主導權爭奪,更關注對戰場主體的控制。 戰爭-人類認知領域,即思維方式、認知模式和風格、價值觀、情感態度、文化模式、溝通模式、心理優勢和劣勢、認知偏好、文化和知識圖譜以及意識形態認同。 後者涉及基本情況

對社會人事和社會存在的影響,即認知領域運作的新興領域,其策略具有很強的特殊性。

話題靈活性和機動性:認知域作戰可以在認知域中選擇多個話題進行靈活機動的作戰行動。 根據現狀和需要,選題可以選擇涉及比較宏觀的戰略層面(比如對方整個社會的意識形態和製度等),或者中等層面的運動層面(比如社會問題) 在對方社會的局部或方向:社會福利政策或環保政策等),也可以選擇涉及社會中非常微觀的戰術問題(比如社會不公平、不公正、不美好的一面) 由某個人或特定事件反映)。 宏觀、中觀和微觀認知領域相互聯繫、相互轉化。 很可能一個微觀問題也會成為一個宏觀的戰略問題。 要根據與整個軍事行動的關係提出問題,認知域作戰要服從整體作戰行動,服務於宏觀政治外交形勢的需要。 更重要的是平時要準備好選題,平時要收集各種選題的數據,尤其要關注現實社會中的各種重要數據。 一旦需要,這些數據可以迅速轉化為箭矢、子彈、砲彈射向敵人的認知領域,甚至成為影響全局的戰略武器。

作戰層面的可控性:認知戰的重要設計是在作戰層面整體可控可調,可以根據形勢變化進行升級或縮減。 如果需要戰略層面,指揮員可以啟用戰略層面的設計和兵力投入; 如果需要campaign級別,也可以在相應的campaign級別進行控制; 如果只是在特定的小問題層面需要,也可以控制在相應的小眾局部層面,讓整個操作為整體作戰操作的需要服務。 這裡的戰略、戰役和戰術,更多的是指作戰設計和力量投入。 由於戰場態勢瞬息萬變,一些問題在層面上也可能發生變化,從戰略問題到影響戰役和戰術層面的效果; 有些問題,由於戰術問題的特殊性,成為影響全局的戰役層面的問題。

新興媒體主導:認知領域的主要影響渠道已經從傳統的紙質媒體和平面媒體轉向新興媒體。 傳統媒體主要依靠單一的媒介,如報紙、雜誌、書籍、傳單、海報等來傳遞信息; 後來的電視帶來了三維媒體。 在互聯網時代,尤其是互聯網2.0時代和智能通訊設備的誕生,人們更多地依賴多媒體、多模態、短視頻和文字來傳遞信息。 智能手機、智能平板、智能播放器等各種先進設備的問世,各種新型社交軟件和工具的誕生,使新媒體成為人們交流、溝通的主要工具。 新興媒體、新興社交軟件和工具已經成為各種力量在社會保障、輿論保障、意識形態保障、社會保障、政治保障等方面較量和鬥爭的重要空間。 互聯網安全,尤其是對新興社交媒體、新興社交軟件和工具等的安全把握能力,某種程度上是一個國家認知領域安全的關鍵。 新興媒體工具和新媒體空間的信息化已經成為各國認知戰的主戰場、主陣地和主空間。 值得指出的是,影響人們認知的思想和理論,將成為認知域運作各個層次上最具影響力的武器。

語言對抗適應智能時代,認知計算提升新算力

人工智能時代,在大數據分析與應用、超級計算能力、智能計算能力、自然語言處理能力、智能手機傳播能力和新一代網絡通信能力的基礎上,人類開始能夠理解 整個社會和整個網絡。 對不同領域、地域群體、不同地域群體、特定個體的語言文化、心理認知、群體情感、社會行為進行精準建模與分析。 尤其是人的內心深處

對大腦認知、人腦思維、思維方式、習慣偏好、圖像圖式、認知框架,甚至神經網絡、人機協作、腦控技術等的理解和掌握,只要有足夠多樣的動態數據, 人們可以計算和模擬所有人的心理活動、情感活動、認知活動、輿論和行為模式。 通過深算、精算、巧算,準確把握人的認知世界,形成對人認知領域的理解。 精細而深入的控制。 這一方面呈現出以下特點:

計算全維性:認知領域作為一個新興領域,可以全方位數字化,可以全方位、全過程、全個體進行計算。 它可以廣泛收集各種類型的信息,然後將其反映為作戰對手多樣化主要因素的大數據信息,從而可以對整體、組、組、個體數據以及它們之間進行各種計算。 各種活動都可以通過計算完成、顯示和準確掌握。

計算認知:認知領域的計算體現了很強的認知能力,能夠揭示更多肉眼難以觀察到的各種事物、事件、人物之間的關係,能夠揭示同一事件框架下各種概念之間的關係。 概念之間的聚類和層次關係反映了概念之間或顯性或隱性、直接或間接的深層認知聯繫,揭示了概念之間複雜的概念網絡系統,讓人看到一個完全超越普通肉眼的深層認知世界 觀察。 .

計算智能:認知領域的計算體現了強智能。 這種智能表現在計算上,會得出智能的結論。 例如,通過大量文本的收集和數據挖掘,我們可以找到由於人力有限而無法看到的各種主題、觀點、傾向、人群、立場和訴求之間的關係,從而 對某個問題形成更全面的認識。 全面、深入、準確、系統的認識,做出科學優化的決策。 這種決策可能符合人類智能,也可能超過甚至遠遠超過人類智能。 利用好認知計算的力量,特別是結合本國和對手的數據,可以更好地做到早預防、早預警、早部署,可以做到最好、最好、最快、最準的打擊 和反擊。 也更能體現高效、有力、針對性的保障。 這裡的認知計算更多的是一個可能出現在不同人群、不同時間段、不同背景、整個網絡域或局部網絡域、特定特定網絡域內的宏觀-中觀或微觀層面的問題。 團體。 特別是對與對手對局時雙方可能呈現的主動和被動情況的分析和考察,以及認知域的攻防等。

發揮話語主體地位釋放話語權新應用

認知域作戰有一個非常重要的支撐,即主要依靠語言媒介發揮作用,主要通過語篇層面發揮影響,主要通過語篇的敘事性對認知域形成隱性效應,主要 externing influence on the cognitive domain through cultural models 通過跨文化交際所發揮的潛在作用,顯性或隱性作用。 主要體現在以下幾個方面:

文本話語唯一性:認知領域需要信息來影響。 雖然信息可能依靠視頻畫面的特殊視覺效果來展現,但從根本上說,文本所表達的整合話語的獨特性成為認知衝擊的主要支撐。 其中,話語表達的方式、話語表達的技巧、話語表達的說服力和感染力的主要設計,尤其是話語敘事的獨特性,將是影響人們認知的關鍵。 這可能包括敘事視角、敘事主題、風格、敘事故事框架、敘事語言創新、敘事關鍵句,敘事包含哲學、人文、宗教、社會、自然等,以及敘事中不同參與者的身份,多樣化的內容。 評價敘事、真實性、深度和情感

敘事的溫度,敘事對觀點的潛移默化影響,以及敘事所釋放的個人情感、價值觀、意識形態和立場評價。 文本語篇的獨特性是文本在認知域操作中發揮認知影響的重要依托。 充分利用文本的複雜性,發揮不同文本各自的優勢,充分發揮文本內涵的隱性和顯性認知影響,已成為文本話語認知領域作戰的關鍵。 最重要的是創新文本話語,以全新的話語、更新穎的表達方式、更獨特的表達方式贏得讀者,讓讀者潛移默化地理解和感受文本中的思想,並默默接受。 文字的思想。

文化模式的潛能:要在認知領域作戰,必須深入把握不同國家、民族文化的特點和模式。 不同的國家、不同的民族有著不同的文化模式、哲學思維、傳統文化、宗教信仰、風俗習慣、思維方式等明顯不同; 不同文化的公民也有不同的民族心理和民族認知模式,也應該有屬於自己民族和文化的典型認知偏好,以及相應的缺點和弱點,其中一些明顯與其他民族在本民族中存在巨大差異 國,甚至產生誤解和敵意。 因此,在文化層面,認知領域的作戰,就是把握不同國家的整體文化模式,為不同國家的不同群體建立文化模式,為不同國家的不同事物建立不同的認知模式,全面掌握某一國家的文化模式。 一系列事物中的文化模式。 對問題和問題的整體態度和做事方式,特別是對一些典型案例、文化禁忌、宗教要求、精神追求、一般觀念等,需要利用已有的理論和發現,綜合建構不同的基本表現 對一些典型的、敏感的、重要的問題進行認知領域的群體研究,從而為下一步的認知操作提供重要的參考和指導。 加強對敵不同人員特別是軍人、要職人員文化模式的研究,包括將軍、官兵等基本文化特徵和模型的研究與構建,如心理認知行為 人物和文化模型畫像,已經成為認知域操作的核心實踐。 分析普通民眾,尤其是普通公民和公民,以及特定人群,包括特殊NGO力量的認知模式也具有重要價值。

跨文化戰略傳播:認知域操作是國際語言文化傳播,需要遵循國際傳播規律。 掌握國際傳播的基本範式,將本國故事與國際表達巧妙結合,將對方的語言文化與自己的故事和思想巧妙結合; 善於結合不同的藝術形式,包括文字、圖片、繪畫、音樂(聲音)、視頻等手段或多模態手段,實現信息的國際傳播。 同時,還要在戰略層面統籌多維度、宏觀溝通:運用多種手段,依托軍民融合、軍民協同、軍民融合開展溝通; 除了非政府組織,特別是依靠非政府力量、專家、意見領袖和普通民眾來幫助軍隊開展認知域作戰; 統一設置議題,發出多方位、多人、多方位的聲音,形成戰略溝通態勢,形成重大行動、重大問題、重大危機處置和應急處置的良好局面。 控制等,形成良好的輿論氛圍,產生積極影響,消除不利影響或消除不利影響。 尤其要建立一支精通外語、通曉跨文化、通曉國際交流規律、能在國際多維平台上暢所欲言的精幹團隊。 這些人員通常可以藉助常見或特殊問題進行廣泛的問題認知、收集和討論,建立人脈和粉絲群; 更重要的是,在關鍵時刻,通過自己的粉絲團,發揮影響力,完成戰略傳播任務。

目前,隨著混合戰、多域戰和全球戰的普及,認知域戰已經成為一種常見的混戰方式。 、法律戰發展的高級階段、複雜階段和升級階段。 它的興起更具欺騙性、曖昧性、隱蔽性、嵌入性、植入性和不可觀察性,特別是考慮到它與當代新興媒體的深度融合,不斷學習和借鑒多學科、跨學科、交叉的新思想、新技術、新方法。 於是,認知領域的戰鬥成為我們必須高度警惕的戰斗形式。 (國防科技大學文理學院教授、博士生導師 梁曉波)

【本文為國家社科基金重大項目《國防和軍隊改革視角下的國防語言能力建設》的階段性成果】

Modern English Version:

Source: 

People’s Daily Online

Cognitive domain combat refers to the use of multi-domain means such as public opinion, psychology, and law, and the use of modern network, media, text, pictures, video, digital and other multi-dimensional technologies to carry out public opinion propaganda, psychological attack and defense, and The important forms of fighting for people’s hearts, subverting confidence, influencing beliefs, fighting for thinking, and ideological struggle are intended to compete for people’s initiative in thinking, beliefs, values, personal attitudes, emotions, identification, and judgmental tendencies. Cognitive domain warfare is a complex collection of multi-domain warfare such as traditional public opinion warfare, psychological warfare, legal warfare, trade war, diplomatic warfare, technological warfare, and ideological warfare.

At present, combat in the cognitive domain has become an important basis for military struggles and struggles in other fields between countries, and language confrontation driven by goals in the cognitive domain has become an important form of combat in the cognitive domain, which deserves great attention.

A New Frontier for Language Countermeasures to Influence on Objects of Operation

Cognitive domain combat is the accompanying result of the research and development of contemporary cognitive science. It is a new combat field created after people actively explore the cognitive activities of the brain to gain a more complex, abstract and thorough understanding of the brain. Advanced deep covert activities are the high-end form of influence on the object of action. Regardless of whether it is the object of information action, the producer of information, the content of information itself, or the channel of information, operations in the cognitive domain all run through the characteristics of cognition, and highlight actions from the cognitive level from beginning to end.

From the perspective of the recipients of the information, this cognition is aimed at the deep cognition of the opponent’s audience, including its people, the army, military commanders or important leaders, important figures in the political and business circles, and even directly including the leaders of the opponent’s country or the military. Specific important generals, etc., can also be specific groups of people or people. It can involve the cognitive preferences, cognitive shortcomings, cognitive habits, cognitive biases, cognitive misunderstandings of individuals or groups; it can also be the beliefs, values, political identity, ethnic identity, social and cultural identity and emotional attitudes of individuals and groups.

From the perspective of the information provider and content, it should be infused with the cognitive design and arrangement of the information producer, which includes the unique cognition of the text, such as the discourse mode of the text, the narrative mode of the text, the perspective of observation of things, the narrative Cognitive focus and depth, organizational form of sentences, tendencies such as value concepts of sentences, acceptability of concepts of sentences, etc.

In terms of channels for information distribution and dissemination, the form of text is closer to the multimedia multimodal form, closer to the needs of cyberspace, closer to the advantages of contemporary smartphones, and closer to the characteristics of the current emerging media era, that is, more in line with the audience The cognitive characteristics of acceptance are cognitive habits and cognitive tendencies. The form of dissemination of the text fully considers the cognitive effect in international communication, especially the cognitive communication across cultures, languages, media, and groups. In this way, the text will better influence the audience from the cognitive level.

Language confrontation responds to changes in combat styles and generates new tactics

Throughout human history, it is not difficult to find that the style of military struggle has been constantly changing. From the initial physical fight with the help of cold weapons, it has developed into a contest of mechanical power with hot weapons, and has also developed into a check and balance of information capabilities under the conditions of high-tech warfare. Every change brings about profound changes in tactics. In the current transitional stage of co-existence of mechanization, informationization and intelligence, people not only pay attention to the struggle for dominance in the physical domain and information domain of the battlefield, but also pay more attention to the control of the main body of war-human cognitive domain, that is, the way of thinking, Cognitive models and styles, values, emotional attitudes, cultural models, communication models, psychological strengths and weaknesses, cognitive preferences, cultural and knowledge maps, and ideological identity. The latter involves the basic situation of social personnel and social existence, that is, the emerging field of cognitive domain operations exerting influence, and its tactics have strong particularities.

Topic flexibility and mobility: Cognitive domain operations can select many topics in the cognitive domain to carry out flexible and mobile combat operations. According to the current situation and needs, the topic can be chosen to involve a relatively macro strategic level (such as the ideology and system of the other party’s entire society, etc.), or a medium-level campaign level (such as social issues in a local area or direction of the other party’s society: Social welfare policies or environmental protection policies, etc.), you can also choose to involve very microscopic tactical issues in society (such as the unfair, unjust, and not beautiful side of society reflected by a certain person or a specific event). The macro, meso, and micro cognitive domains are interconnected and transform into each other. It is very likely that a micro issue will also become a macro strategic issue. The question should be raised according to the relationship with the entire military operation, and the cognitive domain operation must be subordinated to the overall combat operation and serve the needs of the macro political and diplomatic situation. More importantly, the topics should be prepared in normal times, and the data of various topics should be collected in normal times, especially paying attention to various important data in the real society. Once needed, these data can be quickly transformed into arrows, bullets, and shells fired at the enemy’s cognitive domain, and even become strategic weapons that affect the overall situation.

Controllability at the combat level: The important design of cognitive warfare is that at the combat level, it is controllable and adjustable as a whole, and can be upgraded or reduced according to changes in the situation. If the strategic level is needed, the commander can enable the design and force input at the strategic level; if the campaign level is needed, it can also be controlled at the corresponding campaign level; if it is only needed at the specific small problem level, it can also be controlled at the corresponding The niche local level makes the whole operation serve the needs of the overall combat operation. The strategy, campaign and tactics here refer more to combat design and power input. Since the battlefield situation may change rapidly, some issues may also change at the level, from strategic issues to affect the effects of campaign and tactical levels; some issues, due to the particularity of tactical issues, become campaign-level issues that affect the overall situation.

Emerging media dominance: The main influence channel of the cognitive domain has shifted from traditional paper media and print media to emerging media. Traditional media mainly rely on a single medium, such as newspapers, magazines, books, leaflets, posters, etc. to convey information; the later generation of television brought three-dimensional media. In the Internet era, especially the Internet 2.0 era and the birth of smart communication devices, people rely more on multimedia, multi-modality, and short videos and texts to transmit information. The introduction of various advanced devices such as smart phones, smart tablets, and smart players, and the birth of various new social software and tools have made new media the main tool for people to communicate and communicate. Emerging media, emerging social software and tools have become an important space for various forces to compete and struggle in social security, public opinion security, ideological security, social security, and political security. Internet security, especially the ability to grasp the security of new social media, emerging social software and tools, etc., is to some extent the key to the security of a country’s cognitive domain. The information of emerging media tools and new media spaces has become the main battlefield, main position and main space for cognitive warfare in various countries. It is worth pointing out that the thoughts and theories that influence people’s cognition will become the most influential weapons at all levels of cognitive domain operations.

Language confrontation adapts to the age of intelligence, cognitive computing enhances new computing power

In the era of artificial intelligence, on the basis of big data analysis and application, supercomputing ability, intelligent computing ability, natural language processing ability, smart phone dissemination ability and new generation network communication ability, human beings have begun to be able to understand the whole society and the whole network. Carry out precise modeling and analysis of language culture, psychological cognition, group emotion, and social behavior in different domains, local groups, different local groups, and specific individuals. Especially people’s deep understanding and grasp of brain cognition, human brain thinking, thinking mode, habit preference, image schema, cognitive framework, and even neural network, human-computer collaboration, brain control technology, etc., as long as there are enough diverse dynamic data , people can calculate and simulate all people’s psychological activities, emotional activities, cognitive activities, public opinion, and behavioral patterns. Through deep calculations, actuarial calculations, and clever calculations, people can accurately grasp people’s cognitive world and form an understanding of people’s cognitive domain. fine and deep control. This aspect presents the following characteristics:

Computational all-dimensionality: As an emerging field, the cognitive domain can be digitized in all aspects and can be calculated in all directions, the whole process and the whole individual. It can collect various types of information extensively, and then can be reflected as information about Big data with diversified main factors of combat opponents, so that various calculations can be carried out for the whole, groups, groups, and individual data and between them. All kinds of activities can be completed, displayed and accurately grasped through calculation.

Computational cognition: Computation in the cognitive domain embodies strong cognition, and it can reveal more relationships between various things, events, and characters that are difficult to observe with the naked eye, and can reveal the relationship between various concepts in the same event frame. The clustering and hierarchical relationship between concepts reflects the deep cognitive connection between concepts, whether explicit or implicit, direct or indirect, and reveals the complex concept network system between concepts, allowing people to see a deep cognitive world that is completely beyond the ordinary naked eye observation. .

Computing intelligence: Computing in the cognitive domain embodies strong intelligence. This kind of intelligence is manifested in the calculation, and it will draw intelligent conclusions. For example, through the collection of a large amount of text and data mining, we can find the relationship between various themes, viewpoints, tendencies, groups of people, positions, and appeals that cannot be seen due to limited human power, so as to form a more comprehensive understanding of a certain issue. Comprehensive, in-depth, accurate and systematic understanding to make scientific and optimized decisions. This kind of decision-making may be in line with human intelligence, or it may exceed or even far exceed human intelligence. By making good use of the power of cognitive computing, especially by combining the data of the country and the opponent, we can better achieve early prevention, early warning, and early deployment, and can achieve the best, best, fastest and most accurate strikes and counterattacks. It can also better reflect efficient, powerful and targeted protection. Cognitive computing here is more about a possible macro-meso or micro-level issue that may arise in different groups of people, in different time periods, in different backgrounds, in the entire network domain or in a local network domain, or within a specific group. In particular, the analysis and inspection of the active and passive situations that may be presented by both parties when playing games with opponents, and the attack and defense of the cognitive domain, etc.

Give full play to the status of discourse subject and release the new application of discourse power

Cognitive domain combat has a very important support, that is, it mainly relies on the language medium to play its role, exerting influence mainly through the discourse level, forming a hidden effect on the cognitive domain mainly through the narrative nature of discourse, and mainly exerting influence on the cognitive domain through cultural models Potential role, overt or implicit role exerted through cross-cultural communication. It is mainly reflected in the following aspects:

Text Discourse Uniqueness: Cognitive Domains Need Information to Influence. Although the information may be displayed by relying on the special visual effects of video pictures, fundamentally speaking, the uniqueness of the integrated discourse expressed by the text becomes the main support for the cognitive impact. Among them, the mode of discourse expression, the skill of discourse expression, the main design of persuasion and appeal of discourse expression, especially the uniqueness of discourse narrative will be the key to affect people’s cognition. This may include narrative perspectives, narrative themes, styles, narrative story frameworks, narrative language innovations, narrative key sentences, narratives contain philosophy, humanities, religion, society, nature, etc., and the identities of different participants in the narrative , the diversified evaluation of narrative, the authenticity, depth and emotional temperature of narrative, the subtle influence of narrative on viewpoints, and the personal emotions, values, ideology, and position evaluation released by narrative. The uniqueness of text discourse is an important reliance on cognitive influence exerted by text in cognitive domain operations. Making full use of the complexity of texts, giving full play to the respective advantages of diverse texts, and giving full play to the implicit and explicit cognitive influences of text connotations have become the key to combat in the cognitive domain of text discourse. The most important thing is to innovate text discourse, to win readers with brand-new discourse, more novel expressions, and more unique expressions, so that readers can understand and feel the thoughts in the text subtly, and accept them silently. The thought of the text.

Potential of cultural models: To fight in the cognitive domain, we must deeply grasp the characteristics and models of different countries and national cultures. Different countries and different nationalities have different cultural models, philosophical thinking, traditional culture, religious beliefs, customs, and ways of thinking are obviously different; citizens of different cultures also have different national psychology and national cognition Models should also have typical cognitive preferences belonging to their own nation and culture, as well as corresponding shortcomings and weaknesses, and some of them obviously have a huge difference from other nationalities in their own country, and even have misunderstandings and hostility. Therefore, at the cultural level, combat in the cognitive domain is to grasp the overall cultural models of different countries, build cultural models for different groups in different countries, build different cognitive models for different things in different countries, and fully grasp a certain country’s cultural models in a series of things. The overall attitude and way of doing things on issues and issues, especially for some typical cases, cultural taboos, religious requirements, spiritual pursuits, general concepts, etc. It is necessary to use existing theories and findings to comprehensively construct the basic performance of different groups of people in the cognitive field on some typical, sensitive, and important issues, so as to provide important reference and guidance for the next step of cognitive operations. Strengthen the research on the cultural patterns of different personnel of the enemy, especially military personnel, personnel in key positions, including the research and construction of basic cultural characteristics and models of generals, officers, soldiers, etc., such as the psychological cognitive behavior of characters and cultural model portraits, It has become the core practice of cognitive domain operations. It is also of great value to analyze the cognitive patterns of ordinary people, especially ordinary citizens and citizens, as well as specific groups of people, including special NGO forces.

Cross-cultural strategic communication: Cognitive domain operations are international language and cultural communication, which need to follow the laws of international communication. To grasp the basic paradigm of international communication, to skillfully combine national stories with international expressions, to skillfully combine the other party’s language and culture with their own stories and ideas; to be good at combining different art forms, including words, pictures, paintings, music (Sound), video and other means or multi-modal means to achieve the international dissemination of information. At the same time, it is also necessary to coordinate multi-dimensional and macroscopic communication at the strategic level: use various means, rely on military-civilian integration, military-civilian coordination, and military-civilian integration to carry out communication; in addition to non-governmental organizations, especially rely on non-governmental forces, experts, opinion leaders, and ordinary people To help the military carry out cognitive domain operations; to set up issues in a unified way, to make multi-point, multi-person and multi-dimensional voices, to form a strategic communication situation, to form a good situation for emergency solutions for major actions, major issues, major crisis management and control, etc., to form a good atmosphere of public opinion, and to create Positive effects, eliminating adverse effects or extinguishing adverse effects. In particular, it is necessary to establish a capable team that is proficient in foreign languages, understands cross-cultural skills, understands the laws of international communication, and can skillfully speak out on international multi-dimensional platforms. These personnel can usually carry out extensive issue awareness, collection and discussion, establish personal connections and fan groups with the help of common or special issues; more importantly, at critical moments, through their fan groups, exert influence and complete strategic communication tasks .

At present, with the popularity of hybrid warfare, multi-domain warfare and global warfare, cognitive domain warfare has become a common method of hybridization and mixing. , The advanced stage of the development of legal warfare, the complex stage and the escalation stage. Its rise is more deceptive, ambiguous, concealed, embedded, implanted and unobservable, especially considering its deep integration with contemporary emerging media, and continuous learning and reference into multidisciplinary, Interdisciplinary and interdisciplinary new ideas, new technologies, and new methods. As a result, combat in the cognitive domain has become a form of combat that we must be highly vigilant against. (Liang Xiaobo, professor and doctoral supervisor of the College of Arts and Sciences, National University of Defense Technology)

[This article is a phased achievement of the National Social Science Fund’s major project “National Defense Language Capacity Building from the Perspective of National Defense and Military Reform”]

Original Chinese Military Source: http://military.people.com.cn/BIG5/n1/2022/0517/c1011-32423539.html

中國軍方看外軍網絡戰發展新動向

Chinese Military Perspective on the New Development Trends in Foreign Military Network Warfare

After decades of development, cyberspace has become an important field of production and life in human society, and has become the fifth-dimensional battlefield after “land, sea, air, and sky.” In recent years, the United States and other developed countries have rushed to introduce cyberspace strategies, build (expand) cyber warfare forces, and implement cyber offensive and defensive operations. The moves in the construction, development, and application of cyber warfare deserve the attention of the world.

Pay attention to cyberspace security, and accelerate the establishment of supporting strategies and regulations

Since cyberspace security is a security issue in an emerging field, most countries lack supporting strategies and systems of laws and regulations. In recent years, major countries in the world have positioned it as a major security field, and the pace of promulgating network security strategies and regulations has been significantly accelerated. For example, since the first national network security strategy was proposed in 2000, the United States has continuously formulated, expanded, and updated various policies, strategies, regulations, and regulations in the field of network security. The network strategy alone includes the “National Network Strategy”, “International Cyberspace Strategy”, ” The Cyber ​​Strategy of the Ministry of National Defense and the cyber strategy of the military services, etc., are used to standardize and guide the development and application of cyber warfare. In October 2014, the U.S. military also issued the world’s first joint doctrine “Cyberspace Operations”, which elaborated and standardized the concepts, actions, and tasks of cyberspace operations. In response to cyber attacks by the United States and NATO, Russia announced the “Russian Federation Cyber ​​Security Strategic Concept” in 2014, and promulgated a new version of the “Information Security Doctrine” in 2016, proposing to ensure network information security. In order to strengthen the overall guidance of network security affairs, India issued the “National Cyber ​​Security Policy” in 2013 and plans to issue a “National Cyber ​​Security Strategy”; the Indian military has formulated policies such as the “Army Cyber ​​Security Policy” and “Navy Information Security Policy” regulations.

Strengthen the professional construction of cyber warfare forces, and pay attention to the use of non-governmental network forces

In recent years, the establishment, integration, and expansion of specialized cyber warfare forces have become a trend among foreign militaries. The United States was the first country to propose the concept of cyber warfare, and it was also the first country to form a professional cyber warfare force. The U.S. military established the Cyber ​​Command in 2010, and upgraded it to a first-level joint operations command in 2018. The number of cyber task forces under its jurisdiction has reached 133, with about 6,200 personnel. Russia established a professional information warfare unit in 2013, and cyber warfare is an important function of it. The Japanese Self-Defense Force established the Cyber ​​Defense Team in 2014, initially with more than 100 members, and has now increased to nearly 300, and plans to expand to a thousand in the future. The United Kingdom also announced in 2020 that it will soon create a national cyber force. On this basis, foreign militaries have generally carried out systematic design and layout of cyber warfare forces. In the field of cyber warfare, forces such as network attack, network defense, and network operation and maintenance are inseparable; externally, network warfare forces are integrated and integrated with information warfare forces such as signal reconnaissance and electronic warfare. For example, the commander of the U.S. Cyber ​​Command also serves as the director of the National Security Agency, and the network attack and defense are integrated with signal intelligence and reconnaissance. The Japanese Self-Defense Force has set up a special first-level command to oversee space, network, and electronic warfare affairs.

It is worth noting that foreign military forces constitute the “regular army” of cyber warfare forces, and private cybersecurity companies, technology companies, hacker organizations, etc. have also become important cyber offensive and defensive forces and have attracted much attention. The notorious “Eye of Sauron” and “Equation Group” and other hacker organizations are inextricably linked to the US military. In recent years, Iran, Russia, and Venezuela have encountered cyber attacks, all of which have the shadow of “Equation Group”. The Indian Army is also considering absorbing its rich IT talents to form a cyber warfare reserve force to further strengthen its cyber warfare capabilities.

Actively develop and build a network arsenal, and intelligent weapon systems are beginning to emerge

Cyber ​​weapons are special weapons used for network attack and defense. They can be viruses, loopholes, denial of service attacks, phishing attacks and other offensive and defensive technologies, or network attack and defense system platforms. Anatoly Smirnov, chairman of the International Information Security Association of the Russian Federation, disclosed in 2019 that many Western countries were developing cyber weapons; the United States, the United Kingdom, Germany, and Japan also made no secret of possessing cyber weapons. According to the disclosures of Snowden and WikiLeaks, U.S. intelligence agencies and the U.S. military have built a systematic offensive cyber arsenal, some of which can be called “weapons of mass destruction” in cyberspace. In 2020, Patrick Saunders, commander of the British Strategic Command, took the initiative to declare that the UK has developed a “destructive” cyber weapon, which can effectively kill the enemy’s power grid and other facilities and equipment.

In terms of network system platforms, the U.S. military has built the most complete network warfare system platform in the world, including accusation management systems such as joint network command and control and unified platform, basic systems for network warfare planning and execution such as the IKE project, and network warfare and network warfare systems such as “Shute”. A weapon system with integrated firepower. In terms of network monitoring and defense, India has developed and built system platforms such as a central monitoring system, network traffic analysis system, and network security monitoring and evaluation system.

Cyber ​​weapons have a natural “kinship” with smart technology. At present, weapon systems in the fields of network situation monitoring, network attack and defense, and password deciphering have already taken shape in intelligentized countries in cyberspace dominant countries. With the development of artificial intelligence technology, the trend of intelligent network weapons will become more and more obvious.

Focus on enhancing the actual combat capabilities of network attack and defense, and innovate network training methods

In view of the reality and destructiveness of cyber threats, foreign militaries attach great importance to testing the security of information network systems and improving the cyber offensive and defensive capabilities of military and government agencies through cyber exercises and training activities in the context of actual combat.

In terms of participating forces, it covers the military, government agencies, reserves and civilian cyber forces. In the method mode, opponents are generally set to ensure the confrontation of the exercise. Some also innovatively use the method of offering rewards to attract hackers to “legally” attack specific target networks and help find network system defense loopholes. In terms of the training environment, actively build a network shooting range to simulate the information network environment of one’s own side and the opponent’s. The United States, Britain, Japan, Canada and NATO have all established professional cyber ranges. As the world’s largest multinational cyber exercise, NATO’s “Lock Shield” exercise simulated a country’s information network environment in 2019. The content of the drill includes responsiveness testing, defense vulnerability inspection, and election interference analysis. India regularly holds “Cyber ​​Fortress” exercises. It is said that in the “Cyber ​​Fortress-8” exercise organized in 2015, the Indian Army’s cyber brigade used remote penetration and other means to successfully obtain the administrator authority of a certain network system of the Indian Army, and found that 13 major categories of security vulnerabilities were identified. In addition, the U.S. military has begun to practice the integration of cyber warfare and operations in other fields. In the U.S. military’s “Schriever” exercise, the integration of space operations and cyber warfare is one of the important contents.

At present, some countries have regarded some serious cyber attacks as acts of war. As the international rules of conduct in cyberspace restrict and deter cyber attacks more and more, cyber exercises may replace real network operations and become foreign military training and upgrading. The primary path to network offensive and defensive capabilities.

Emphasis on pre-emptive offensive operations, actual combat tends to integrate deterrence and multi-domain integration

The hugeness, complexity, and fragility of the network system make network defense difficult and costly. For this reason, the United States and other countries have gradually changed their network security policy and operational thinking from the initial comprehensive defense to preemptive offensive operations, emphasizing Conduct pre-emptive offensive operations in hostile networks to eliminate potential or actual threats.

Driven by offensive thinking, cyber warfare is common in international conflicts, and the targets of attacks are no longer limited to military targets. The United States is the first country to apply cyber warfare to actual combat. In 2009, the U.S. military used the “Stuxnet” virus to carry out cyber attacks on Iran’s nuclear facilities, causing more than 1,500 centrifuges to be scrapped and the Iranian nuclear process to be paused. In 2020, after the assassination of Soleimani, the U.S. military launched cyber attacks on the command and control of the Iranian Revolutionary Guard Corps, missiles, and air defense systems to deter and prevent Iran from carrying out military retaliation. Of course, the idea of ​​offensive cyber warfare does not require absolute cyber superiority. Some non-cyber powers have also proposed the idea of ​​using asymmetric cyber capabilities to carry out preemptive attacks on the enemy’s weaknesses, and then achieve the goal of using the small to gain the big and the weak in the network game. Mandatory.

It is worth noting that in recent international conflicts, the trend of multi-domain integration in the fields of cyber warfare and firepower warfare, electromagnetic spectrum warfare, and cognitive domain warfare has become very obvious. For example, when armed conflicts broke out between Azerbaijan and Armenia in the Naka region in 2020, the two sides launched cyber offenses and defenses in cyberspace on the one hand, and on the other hand launched fierce confrontations in the cognitive domain around international and domestic public opinion, military morale, legal principles and morals.

At present, the low-intensity and ambiguous nature of cyber warfare attracts some international actors to frequently carry out cyberspace operations regardless of the consequences, and the risk of conflict escalation out of control is constantly accumulating. To this end, all countries in the world should start consultations and negotiations on international rules of conduct in cyberspace and cyber arms control as soon as possible, jointly restrict military activities in cyberspace, create a new pattern of cybersecurity, and build a community of shared future in cyberspace.

Original Mandarin Chinese:

經過幾十年的發展,網絡空間已經成為人類社會生產生活的重要領域,成為繼“陸、海、空、天”之後的第五維戰場。 近年來,美國等發達國家紛紛出台網絡空間戰略,建設(壯大)網絡戰力量,實施網絡攻防作戰。 網絡戰建設、發展和應用的動向值得世人關注。

關注網絡空間安全,加快建立配套戰略法規

由於網絡空間安全是一個新興領域的安全問題,大多數國家缺乏配套的戰略和法律法規體系。 近年來,世界主要國家將其定位為重大安全領域,出台網絡安全戰略和法規的步伐明顯加快。 例如,自2000年第一個國家網絡安全戰略提出以來,美國不斷制定、擴充和更新網絡安全領域的各種政策、戰略、規章制度。 僅網絡戰略就有《國家網絡戰略》、《國際網絡空間戰略》、《國防部網絡戰略》和《軍種網絡戰略》等,用於規範和指導發展 2014年10月,美軍還發布了世界上第一個聯合條令“網絡空間作戰”,對網絡空間作戰的概念、行動和任務進行了闡述和規範。 北約、俄羅斯2014年公佈《俄羅斯聯邦網絡安全戰略構想》,2016年頒布新版《信息安全條令》,提出保障網絡信息安全。為加強網絡安全統籌指導 事務方面,印度2013年出台《國家網絡安全政策》,併計劃出台《國家網絡安全戰略》;印度軍方制定了《陸軍網絡安全政策》、《海軍信息安全政策》等政策 安全策略”的規定。

加強網絡戰力量專業化建設,重視利用民間網絡力量

近年來,網絡戰專業化力量的建立、整合和壯大成為外軍發展趨勢。 美國是最早提出網絡戰概念的國家,也是最早組建專業網絡戰部隊的國家。 美軍於2010年成立網絡司令部,2018年升格為一級聯合作戰司令部,下轄的網絡特遣部隊已達133個,人員約6200人。 俄羅斯於2013年成立專業信息戰部隊,網絡戰是其重要職能。 日本自衛隊在2014年成立了網絡防衛隊,最初有100多名成員,現在已經增加到近300人,未來還計劃擴大到千人。 英國也在2020年宣布將很快創建一支國家網絡部隊。 在此基礎上,外軍普遍進行了網絡戰力量的系統化設計和佈局。 在網絡戰領域,網絡攻擊、網絡防禦、網絡運維等力量密不可分; 對外,網絡戰力量與信號偵察、電子戰等信息戰力量融合融合。 比如美國網絡司令部司令兼任國家安全局局長,網絡攻防與信號情報偵察相結合。 日本自衛隊設立了專門的一級司令部,負責監管太空、網絡和電子戰事務。

值得注意的是,外國軍隊構成了網絡戰力量的“正規軍”,民間網絡安全公司、科技公司、黑客組織等也成為重要的網絡攻防力量,備受關注。 臭名昭著的“索倫之眼”和“方程組”等黑客組織都與美軍有著千絲萬縷的聯繫。 近年來,伊朗、俄羅斯、委內瑞拉等國都遭遇過網絡攻擊,都有“方程組”的影子。 印度陸軍也在考慮吸納其豐富的IT人才,組建網絡戰後備力量,進一步加強網絡戰能力。

積極發展建設網絡化武庫,智能武器系統初現端倪

網絡武器是用於網絡的特殊武器

攻防。 它們可以是病毒、漏洞、拒絕服務攻擊、釣魚攻擊等攻防技術,也可以是網絡攻防系統平台。 俄羅斯聯邦國際信息安全協會主席阿納托利·斯米爾諾夫在2019年透露,許多西方國家正在研發網絡武器; 美國、英國、德國和日本也毫不掩飾擁有網絡武器。 根據斯諾登和維基解密的披露,美國情報機構和美國軍方已經建立了一個系統的進攻性網絡武器庫,其中一些武器堪稱網絡空間的“大規模殺傷性武器”。 2020年,英國戰略司令部司令帕特里克桑德斯主動宣稱,英國已經研製出“破壞性”網絡武器,可以有效殺傷敵方電網等設施設備。

在網絡系統平台方面,美軍建成了世界上最完備的網絡戰系統平台,包括聯合網絡指揮控制、統一平台等指控管理系統,IKE等網絡戰規劃與執行基礎系統。 項目,以及“樹特”等網絡戰和網絡戰系統。 具有綜合火力的武器系統。 在網絡監控防禦方面,印度開發建設了中央監控系統、網絡流量分析系統、網絡安全監控評估系統等系統平台。

網絡武器與智能技術有著天然的“親緣關係”。 目前,網絡態勢監測、網絡攻防、密碼破譯等領域的武器系統在網絡空間主導國家的智能化國家已經形成。 隨著人工智能技術的發展,網絡化武器的智能化趨勢將越來越明顯。

著力提升網絡攻防實戰能力,創新網絡訓練方式

鑑於網絡威脅的真實性和破壞性,外軍十分重視通過實戰背景下的網絡演習和訓練活動,檢驗信息網絡系統的安全性,提高軍政機構的網絡攻防能力。

在參與力量方面,它涵蓋了軍隊、政府機構、預備役和民間網絡力量。 在方法模式中,一般都會設置對手,以保證練習的對抗性。 有的還創新性地採用懸賞的方式,吸引黑客“合法”攻擊特定目標網絡,幫助尋找網絡系統防禦漏洞。 在訓練環境方面,積極建設網絡靶場,模擬己方和對方的信息網絡環境。 美國、英國、日本、加拿大和北約都建立了專業的網絡靶場。 作為全球規模最大的多國網絡演習,北約“鎖盾”演習模擬了2019年一個國家的信息網絡環境,演練內容包括響應能力測試、防禦漏洞檢查、選舉干擾分析等。 印度定期舉行“網絡堡壘”演習。 據稱,在2015年組織的“網絡堡壘-8”演習中,印陸軍網絡旅利用遠程滲透等手段,成功獲取了印軍某網絡系統的管理員權限,並發現13 確定了主要類別的安全漏洞。 此外,美軍也開始實踐網絡戰與其他領域作戰的融合。 在美軍的“施里弗”演習中,太空作戰與網絡戰的融合是重要內容之一。

目前,一些國家已將一些嚴重的網絡攻擊行為視為戰爭行為。 隨著網絡空間國際行為準則對網絡攻擊的約束和威懾越來越強,網絡演習有可能取代真正的網絡作戰,成為外國軍事訓練和升級。 網絡攻防能力的主要途徑。

強調先發製人的進攻作戰,實戰趨向綜合威懾和多域融合

網絡系統的龐大性、複雜性和脆弱性使得網絡防禦難度大、成本高。 為此,美國等國逐漸將網絡安全政策和作戰思路從最初的全面防禦轉變為先發製人的進攻作戰,強調在敵對網絡中進行先發製人的進攻作戰,以消除潛在或實際的威脅。

在進攻性思維的驅使下,網絡戰在國際衝突中屢見不鮮,

攻擊目標不再局限於軍事目標。 美國是第一個將網絡戰應用到實戰中的國家。 2009年,美軍利用“震網”病毒對伊朗核設施進行網絡攻擊,導致1500多台離心機報廢,伊朗核進程暫停。 2020年,蘇萊曼尼遇刺後,美軍對伊朗革命衛隊的指揮控制、導彈、防空系統等發起網絡攻擊,以威懾和阻止伊朗進行軍事報復。 當然,進攻性網絡戰的思路並不需要絕對的網絡優勢。 一些非網絡大國也提出了利用非對稱網絡能力對敵方弱點進行先發製人攻擊的想法,進而在網絡博弈中達到以小博大、以弱勝強的目的。 強制的。

值得注意的是,在近期的國際衝突中,網絡戰與火力戰、電磁頻譜戰、認知域戰等領域的多域融合趨勢十分明顯。 例如,2020年阿塞拜疆與亞美尼亞在納卡地區爆發武裝衝突,雙方一方面在網絡空間展開網絡攻防,另一方面圍繞國際國內展開認知領域的激烈交鋒。 民意、軍隊士氣、法理和道德。

當前,網絡戰的低烈度和模糊性,吸引了一些國際行為體不顧後果地頻繁開展網絡空間作戰,衝突失控升級的風險不斷累積。 為此,世界各國應盡快啟動網絡空間國際行為規則和網絡軍控磋商談判,共同製約網絡空間軍事活動,打造網絡安全新格局,構建網絡空間共享共同體。 網絡空間的未來。

Chinese Military Source: http://www.81.cn/jfjbmap/content/2021-04/08/content_XXXXX.htm

中國人民解放軍積極應對智能化作戰挑戰

Chinese People’s Liberation Army Actively Responding to the Challenge of Intelligent Warfare

In recent years, the wave of intelligence has surged and has been widely used in the military field. Major countries in the world attach great importance to the construction and application of military intelligence, and various unmanned combat platforms and intelligent weapons and equipment continue to appear, and they are installed in troops and put into actual combat. In the face of the accelerated evolution of intelligent warfare, only by seizing development opportunities, actively responding to challenges, accelerating the development of military intelligence, and accelerating the forging of intelligent combat capabilities can we seize the strategic initiative of intelligent warfare and win future intelligent warfare.

Focusing on designing wars to create intelligent theory

Military theory comes from combat practice and is used to guide combat practice. Restricted by various conditions in the past, military theory research was mostly “looking backwards”, that is, summarizing battle examples to form combat guidance. With the rapid development of modern technology, especially big data, cloud computing and other disruptive technologies, the research on combat theory has got rid of the traditional follow-up and inductive reasoning mode, and has entered a new era of experimental warfare and design warfare. New disruptive technologies in the field of intelligence have opened up new space for military theory innovation. To this end, we should create a basic theory of intelligent warfare in accordance with the idea of ​​”proposing concepts-needs analysis-innovating theories”, and conduct in-depth research on the concept connotation, essential characteristics, war guidance, combat styles, offensive and defensive actions, winning mechanisms, etc. of intelligent warfare. Features and laws, etc.; innovate intelligent combat methods and methods, give full play to the overall effectiveness of the intelligent combat system, strengthen research on new intelligent combat methods and methods such as man-machine collaborative intelligent combat, intelligent robot combat, and intelligent unmanned swarm combat, as well as intelligent Combat command, the process and methods of intelligent combat support, etc.; focus on effectively responding to the threat of intelligent combat, and research strategies to defeat the enemy, such as intelligent interdiction warfare and intelligent disruption warfare. These theories are the cornerstone of the theoretical system of intelligent warfare. In the future, the theory of war centered on strengthening “controlling intellectual power” and competing for “algorithm-centric warfare” will most likely replace the theory of warfare centered on “network-centric warfare.”

Focus on cross-domain interconnection and explore intelligent forms

The military organization is the link connecting military technology and combat theory, and the lever to exert the overall combat effectiveness of the military. Modern combat places more emphasis on “elite combat under the support of a large system”, that is, supported by the joint combat system, “fine front and strong back”, according to the idea of ​​”integrated design, modular formation, and combined application”, the formation is more precise and more accurate. The powerful combat module enables the maximum release of combat energy. The organization of the future intelligent warfare system will be based on strategies, campaigns, and tactics at different levels and different arms and arms, and will form different types and purposes of small, multi-functional and intelligent new joint combat forces. According to the requirements of reconfigurability, scalability and self-adaptation, the intelligentized combat network can seamlessly link and flexibly organize individual weapon platforms according to changes in the enemy situation and battlefield environment, and then aggregate them to form System advantages, forming a combat module integrating offense and defense. The intelligent new combat force system is a comprehensive product of the development of artificial intelligence technology, the formation of new combat capabilities, and the evolution of war forms. new growth point.

Focus on the integration of man and machine to develop intelligent weapons With the development of information technology and intelligent technology, whoever can win in the field of artificial intelligence is expected to have the initiative in future military confrontation. We should focus on the dual needs of intelligent warfare system operations and intelligent weapon equipment system construction, do a good job in top-level design and overall planning, compile a road map for the development of intelligent weapon equipment systems, and develop high, medium, low-end, low-end, and Large, medium and small, long-range and short-range, covering space fields such as land, sea, air, space, electricity, and networks, and an intelligent unmanned combat equipment system that matches combat and support, and establishes a “human-led, machine-assisted, mixed formation, joint “Operation” manned-unmanned cooperation system, enhance the system integration of various military arms and various intelligent weapons and equipment such as operations and support. Intelligent unmanned combat system is a new trend in the development of future war equipment. Its core is to aim at the requirements of “zero casualties”, “full coverage” and “fast response” in future wars, and make full use of new theories, new materials, new processes, new energy, and new technology development achievements in two aspects: man-machine collaboration and autonomous action. Continuously make breakthroughs, build a three-level unmanned equipment sys

tem of strategy, campaign, and tactics, build a new type of intelligent unmanned division on a large scale, and realize the systematic and coordinated operations of unmanned combat systems. At the same time, we should focus on the needs of unmanned and anti-unmanned, intelligent and anti-intelligent operations, and focus on the development of anti-enemy intelligent unmanned combat weaponry systems to ensure effective intelligent unmanned offensive and defensive confrontation with the enemy.

Focus on ability compound innovation intelligent training

The professional division of labor in modern warfare is becoming more and more detailed, and the entire combat system is becoming more and more complex, which promotes the transition from manpower-intensive to technology-intensive operations, requiring combatants not only to have good physical fitness, but also to have good technical literacy and intellectual advantages , to meet the needs of different combat missions, combat environments, and combat opponents. Military intelligence puts forward higher requirements on the quality of people. Correspondingly, intelligent military talents should have the characteristics of group talents, sophisticated skills, complex knowledge, innovative thinking, and intelligent decision-making. Intelligent warfare will be a war carried out by the combination of man and machine, and the combat force with the intelligent unmanned combat system as the main body will play an increasingly important role. The effective combination of high-quality personnel and intelligent weapons can maximize combat effectiveness. It is necessary to adapt to the new characteristics of the intelligent warfare force system, innovate and develop the concept of intelligent training, and explore a new model for the generation of intelligent warfare combat power. At present, artificial intelligence technology can create a more “real” weapon operation experience and battlefield environment, and can realistically interpret the combat process, assist decision-making and command, and evaluate combat concepts. To this end, adapt to the new characteristics of the intelligent warfare force system, focus on the improvement of the self-command, self-control, and self-combat capabilities of the intelligent combat system, and make full use of the characteristics of the intelligent system that can self-game and self-growth, forming a special strategy for intelligent warfare. Combat system training system, training environment and training mechanism, strengthen “human” control of intelligent system training, and explore a new training mode with “machine” as the main object. In this way, the intelligent combat system can obtain a leap in combat capability after short-term self-intensive training, so as to cope with the test of disorder, complexity and uncertainty in the future combat environment.

Focusing on Accurate and Efficient Improvement of Guarantee Mode

Intelligent battlefields and the degree of realization of comprehensive support for joint operations are important factors that directly affect the generation of combat effectiveness of troops. The development of intelligent technology will surely trigger a revolutionary change in the construction of the joint combat support system and realize intelligent comprehensive support. Comprehensive support is the foundation of combat effectiveness and a bridge that transforms national economic strength into military combat capability. With the continuous maturity of the Internet of Things technology, intelligent warfare puts more emphasis on integrated guarantee, precise guarantee, and distribution guarantee, that is, the required amount is delivered to the required place at the required time. Relying on the integrated support system, the dispersedly deployed support forces and resources are grouped according to functional modules such as supplies, supplies, maintenance, ammunition, and management, so that they cover all areas of combat service support. Relying on visualization technology, the entire process of combat supply is tracked and mastered According to the current situation, according to the real-time development of the battle situation, information control, reception and distribution of personnel flow and material flow are carried out to achieve point-to-point direct support. Through the use of technologies such as the Internet of Things, drones, smart cars, remote surgery, and 3D printing, upgrade and build an intelligent after-installation support system covering intelligent warehousing, intelligent delivery, intelligent maintenance, and intelligent medical treatment, so as to realize automatic, fast and accurate supply of after-load materials on the battlefield , Rapid diagnosis and maintenance of equipment failures, timely rescue of battlefield personnel, changing passive support into active service, and improving the overall support efficiency and effectiveness of aftermarket.

Focus on both military and

civilian use and deepen intelligent integration

Breakthroughs in the core and key technologies of artificial intelligence are the “country’s most important weapon” to deal with the threats and challenges of intelligent warfare. The rapid development of intelligent technology has become an accelerator of military intelligence. In the information age, the boundary between military technology and civilian technology is becoming more and more blurred, and the transferability is becoming stronger and stronger. Actively establish a military-civilian collaborative innovation mechanism, continuously strengthen the driving force for the innovation and development of intelligent core technologies, build an open industry-university-research collaborative innovation system for the whole society, plan forward and support investment in core cutting-edge technologies such as artificial intelligence, and give full play to the innovation power of the entire society. Promote the rapid and sustainable development of military intelligence. Accelerate technological breakthroughs in key areas. It is necessary to focus on relevant key technical fields and break the technical bottleneck that restricts the development of military intelligence. Strengthen research on the basic support fields of military intelligence, such as military big data, military Internet of Things, etc.; start from combat requirements, strengthen research on intelligent application technologies in various operational elements, especially intelligent command and decision-making, intelligent weapon platforms, Research on intelligent battlefield perception and intelligent countermeasure technology. The research and development of the core key technology of military intelligence not only requires interdisciplinary and cross-field collaborative innovation, but also integrates the development of social intelligence and military intelligence. Intelligent technology is quickly embedded in operational elements and operational processes. To accelerate the development of military intelligence, we should explore the rules of cultivating relevant talents, make full use of military and local education resources, increase the intensity of training relevant talents, and provide solid intellectual support and talent guarantee for promoting the construction of military intelligence.

近年來,智能化浪潮席捲而來,並在軍事領域得到廣泛應用。 世界主要國家高度重視軍事智能化建設和應用,各種無人作戰平台和智能化武器裝備不斷湧現,並列裝部隊,投入實戰。 面對智能化戰爭加速演進,只有抓住發展機遇,積極應對挑戰,加快軍事智能化發展,加快鍛造智能化作戰能力,才能搶占智能化戰爭的戰略主動權,贏得智能化未來。 戰爭。

專注於設計戰爭創造智能理論

軍事理論來源於作戰實踐,用於指導作戰實踐。 過去受制於各種條件,軍事理論研究多是“回頭看”,即總結戰例形成作戰指導。 隨著現代科技尤其是大數據、雲計算等顛覆性技術的迅猛發展,作戰理論研究擺脫了傳統的跟風和歸納推理模式,進入了實驗戰和設計戰的新時代 . 情報領域的顛覆性新技術為軍事理論創新開闢了新空間。 為此,應按照“提出概念——需求分析——創新理論”的思路,打造智能戰爭基礎理論,對概念內涵、本質特徵、戰爭指導、作戰方式等進行深入研究。 智能戰的風格、攻防動作、制勝機制等。 特徵和規律等; 創新智能作戰方式方法,充分發揮智能作戰系統整體效能,加強人機協同智能作戰、智能機器人作戰、智能無人蜂群作戰等新型智能作戰方式方法研究, 如智能作戰指揮、智能作戰保障的流程和方法等; 重點有效應對智能化作戰威脅,研究智能化攔截戰、智能化干擾戰等克敵制勝策略。 這些理論是智能戰理論體系的基石。 未來,以加強“控制智力”和爭奪“算法中心戰”為中心的戰爭理論,極有可能取代以“網絡中心戰”為中心的戰爭理論。

聚焦跨域互聯,探索智能形態

軍事編制是連接軍事技術和作戰理論的紐帶,是發揮軍隊整體戰鬥力的槓桿。 現代作戰更強調“大體系支撐下的精銳作戰”,即以聯合作戰體係為支撐,“前精後強”,按照“一體化設計、模塊化編隊、 和組合應用”,編隊更精準、更精準。 強大的戰鬥模塊,最大限度釋放戰鬥能量。 未來智能化作戰體系的編組,將基於不同層次、不同兵種的戰略、戰役、戰術,形成不同類型、不同用途的小型化、多功能化、智能化的新型聯合作戰力量。 智能化作戰網絡根據可重構性、可擴展性和自適應性的要求,可以根據敵情和戰場環境的變化,無縫鏈接和靈活組織單個武器平台,進而聚合形成系統優勢,形成作戰模塊 攻防一體。 智能化新型作戰力量體係是人工智能技術發展、新型作戰能力形成、戰爭形態演進的綜合產物。 新的增長點。

專注於人機融合發展智能武器

隨著信息技術和智能技術的發展,誰能在人工智能領域取得勝利,誰就有望掌握未來軍事對抗的主動權。 圍繞智能作戰體系運行和智能武器裝備體系建設雙重需求,做好頂層設計和統籌規劃,編制智能武器裝備體係發展路線圖,發展高、中 、低端、低端、大、中、小型、遠程、近程,涵蓋陸、海、空、天、電、網等空間領域,以及智能化無人作戰裝備系統, 作戰與保障相匹配,建立“人主導、機助、混合編隊、聯合作戰”的有人無人協同體系,增強各軍兵種和作戰保障等各類智能化武器裝備的系統集成。 智能無人作戰系統是未來戰爭裝備發展的新趨勢,其核心是針對未來戰爭“零傷亡”、“全覆蓋”和“快速反應”的要求,使 充分利用新理論、新材料、新工藝、新能源、新技術的開發成果,在人機協作和自主行動兩個方面。 不斷突破,打造三級無人裝備體系

戰略、戰役、戰術三位一體,大規模建設新型智能化無人師,實現無人作戰系統系統化、協同化作戰。 同時,圍繞無人與反無人、智能與反智能作戰需求,重點發展對敵智能無人作戰武器裝備系統,確保智能無人攻防有效對抗。 敵人。

專注能力複合創新智能培養

現代戰爭職業分工越來越細,整個作戰體系越來越複雜,促使作戰從人力密集型向技術密集型轉變,要求作戰人員不僅要有良好的身體素質 ,還要具備良好的技術素養和智力優勢,以滿足不同作戰任務、作戰環境、作戰對手的需要。 軍事情報對人的素質提出了更高的要求。 相應地,智能軍事人才應具有人才群體性、技能精良、知識複雜、思維創新、決策智能等特點。 智能化戰爭將是一場人機結合的戰爭,以智能化無人作戰系統為主體的作戰力量將發揮越來越重要的作用。 高素質人才與智能化武器的有效結合,才能最大限度地發揮戰鬥力。 要適應智能戰力體系新特點,創新發展智能化訓練理念,探索智能戰力生成新模式。 目前,人工智能技術可以創造出更加“真實”的武器操作體驗和戰場環境,能夠逼真地解讀作戰過程、輔助決策指揮、評估作戰理念。 為此,適應智能作戰力量體系的新特點,著力提升智能作戰體系的自主指揮、自主控制、自主作戰能力, 能夠自我博弈、自我成長的智能係統,形成智能作戰的特殊策略。 作戰系統訓練體系、訓練環境和訓練機制,強化智能係統訓練的“人”把控,探索以“機”為主要對象的新型訓練模式。 這樣,智能作戰系統在經過短期的自我強化訓練後,就能獲得作戰能力的飛躍,以應對未來作戰環境無序、複雜、不確定的考驗。

聚焦精準高效 完善擔保模式

智能戰場和聯合作戰綜合保障的實現程度,是直接影響部隊戰鬥力生成的重要因素。 智能技術的發展必將引發聯戰保障體系建設的革命性變革,實現智能化綜合保障。 綜合保障是戰鬥力的基礎,是國民經濟實力轉化為軍事作戰能力的橋樑。 隨著物聯網技術的不斷成熟,智能化作戰更加註重綜合保障、精准保障和配送保障,即按需按時將所需數量送達所需地點。 依託一體化保障體系,將分散部署的保障力量和資源按照補給、補給、維修、彈藥、管理等功能模塊進行編組,覆蓋戰勤保障各個領域。 依托可視化技術,全程跟踪掌握戰時補給,根據戰況實時發展,對人員流、物資流進行信息管控、接收和分配,實現 點對點直接支持。 通過利用物聯網、無人機、智能汽車、遠程手術、3D打印等技術,升級構建涵蓋智能倉儲、智能配送、智能維修、智能醫療等的智能後裝支撐體系,使 實現戰場後裝物資的自動、快速、準確供應,設備故障快速診斷和維修,戰場人員及時救援,變被動保障為主動服務,提高後市場整體保障效率和效果。

兼顧軍事和

民用與深化智能融合

突破人工智能核心關鍵技術,是應對智能化戰爭威脅和挑戰的“國之重器”。 智能技術的快速發展成為軍事智能化的加速器。 信息時代,軍事技術與民用技術的界限越來越模糊,可移植性越來越強。 積極建立軍民協同創新機制,不斷增強智能化核心技術創新發展的驅動力,構建面向全社會開放的產學研協同創新體系,統籌支持核心切削領域的投入—— 人工智能等前沿技術,充分發揮全社會創新力量。 推動軍事情報快速可持續發展。 加快重點領域技術攻關。 要聚焦相關關鍵技術領域,破解制約軍事情報發展的技術瓶頸。 加強軍事情報基礎支撐領域研究,如軍事大數據、軍事物聯網等; 從作戰需求出發,加強各作戰要素的智能化應用技術研究,特別是智能指揮決策、智能武器平台、智能戰場感知和智能對抗技術研究。 軍事情報核心關鍵技術的研發,不僅需要跨學科、跨領域的協同創新,還要融合社會情報和軍事情報的發展。 智能技術快速嵌入到運營要素和運營流程中。 加快軍隊智能化發展,探索相關人才培養規律,充分利用軍隊和地方教育資源,加大相關人才培養力度,為推進軍隊建設提供堅實的智力支持和人才保障 智力。

Source: http://www.81.cn/jpdbfy20xx/j0o0o0o.html

智能作戰時代的中國軍事高等教育

Chinese Military Higher Education in the Age of Intelligent Warfare

“Military academies are born for war and built for war.” At the opening ceremony of the 2019 military academy principal training, Chairman Xi proposed the military education policy for the new era, pointing out the direction for the military academies to cultivate high-quality, professional new military talents. At present, the form of war is accelerating towards informationization and intelligence. What kind of soldiers are needed to win future intelligent wars, and how military higher education can cultivate talents suitable for intelligent warfare are major issues before us.

The form of war is accelerating towards intelligent development

The form of war is the expression form and state of war history staged mainly marked by the technical attributes of the main battle weapon. So far, after experiencing cold weapon wars, hot weapon wars, and mechanized warfare, the form of warfare is accelerating its development towards informationized and intelligentized warfare. The increasingly widespread application of advanced technologies such as big data, the Internet of Things, artificial intelligence, biotechnology, and brain science in the military field is becoming an important driver of the new military revolution, giving rise to new forms of unmanned, autonomous, and intelligent warfare, changing the Traditional war winning mechanism. In 2014, a foreign military think tank released a research report titled “20YY: War in the Robot Era”, arguing that a storm of military transformation marked by intelligent armies, autonomous equipment, and unmanned warfare is approaching. Platforms, information systems and decision support systems, as well as new weapons such as directed energy, hypersonics, bionics, genes, and nanometers, will initially establish an intelligent combat system by 2035, and will develop to an advanced stage by 2050, fully realizing combat platforms, information Systems, command and control are intelligentized and even unmanned, new weapons such as bionics, genes, and nanometers are on the battlefield, and the combat space is further expanded to biological space, nanospace, and intelligent space.

In recent years, with the continuous deepening of research on the human brain, the brain-computer interface technology is becoming more and more mature. In the future, the information exchange between human beings and the outside world will no longer be limited to the senses, and the direct information exchange between the brain and the outside world can also be realized through chips. People and people, people and things are fully interconnected, and human beings may surpass the Internet and the Internet of Things and enter the era of intelligence supported by the Internet of Brains. In the era of the Internet of Brains, soldiers’ brains are directly connected to combat platforms, information systems, and decision-making support systems, and decisions are made with the assistance of technologies such as quantum computing and cloud platforms. Information and mind merge. Some domestic experts believe that under the influence of artificial intelligence technology, the winning mechanism of future wars will change from “information dominance, system confrontation, precise strikes, and joint victory” in information warfare to “intelligence dominance, independent confrontation, and traceability” in intelligent warfare. Following the transformation of “strike, cloud and brain winning”, following matter, energy, and information, cloud intelligence that integrates man and machine has become the key to determining the outcome of a war. This transformation of the form of intelligent warfare is accelerating, and any hesitation may bring unimaginable consequences.

But it should be noted that no matter how the war develops, people are always the most fundamental element. The form of intelligent warfare will lead to changes in the functions and roles of soldiers, and will put forward higher requirements for the ability and quality of soldiers. Cognitive ability may surpass knowledge and skills and become the core ability of soldiers.

Intelligent warfare requires the upgrading and reconstruction of the comprehensive quality of soldiers.

Chinese Military Mandarin Chinese:

“軍校為戰而生,為戰而建”。 在2019年軍事院校校長培訓開班儀式上,習主席提出新時代軍事教育方針,為軍隊院校培養高素質、專業化的新型軍事人才指明了方向。 當前,戰爭形態正在加速向信息化、智能化方向發展。 打贏未來智能戰爭需要什麼樣的士兵,軍事高等教育如何培養適合智能戰爭的人才,是擺在我們面前的重大課題。

戰爭形態加速向智能化發展

戰爭形態是以主戰武器的技術屬性為主要標誌的戰爭歷史上演的表現形式和狀態。 目前,戰爭形態在經歷了冷兵器戰爭、熱武器戰爭、機械化戰爭之後,正在加速向信息化、智能化戰爭發展。 大數據、物聯網、人工智能、生物技術、腦科學等先進技術在軍事領域的日益廣泛應用,正在成為新軍事革命的重要驅動力,催生了無人、自主、 智能化戰爭,改變傳統戰爭制勝機制。 2014年,國外某軍事智庫發布了一份題為《20YY:機器人時代的戰爭》的研究報告,認為一場以軍隊智能化、裝備自主化、無人化戰爭為標誌的軍事變革風暴正在逼近。 平台、信息系統和決策支持系統,以及定向能、高超音速、仿生、基因、納米等新型武器,到2035年初步建立智能化作戰體系,到2050年發展到高級階段,全面實現 作戰平台、信息系統、指揮控制智能化甚至無人化,仿生、基因、納米等新型武器投入戰場,作戰空間進一步向生物空間、納米空間、智能空間拓展。

近年來,隨著對人腦研究的不斷深入,腦機接口技術日趨成熟。 未來,人類與外界的信息交流將不再局限於感官,大腦與外界的直接信息交流也可以通過芯片實現。 人與人、人與物充分互聯,人類有可能超越互聯網、物聯網,進入以腦聯網為支撐的智能時代。 腦聯網時代,士兵的大腦直接與作戰平台、信息系統、決策支持系統相連,並藉助量子計算、雲平台等技術進行決策。 信息和思想融合在一起。 國內有專家認為,在人工智能技術的影響下,未來戰爭的製勝機制將從信息戰的“信息主導、系統對抗、精準打擊、共同製勝”轉變為“情報主導、自主對抗、追溯”。 在智能戰爭中。 隨著“打、雲、腦制勝”的轉變,繼物質、能量、信息之後,人機合一的雲智能成為決定戰爭勝負的關鍵。 這種智能化戰爭形態的轉變正在加速,任何猶豫都可能帶來不堪設想的後果。

但需要看到的是,無論戰爭如何發展,人永遠是最根本的要素。 智能化戰爭形態將導致士兵職能和作用發生變化,對士兵的能力和素質提出更高要求。 認知能力有可能超越知識和技能,成為軍人的核心能力。

智能化戰爭需要軍人綜合素質的升級改造

According to the talent growth cycle, soldiers who are currently receiving higher education will become the main force of combat training in more than 10 years, and will also become the first main force to meet the challenges of intelligent warfare. At present, there are still some deficiencies in the design of personnel training goals in our military’s higher education, and insufficient attention is paid to the ability to adapt to the ever-changing intelligent battlefield in the future. There is still a certain gap between the personnel training objectives and the needs of intelligent warfare. On July 23, 2020, when Chairman Xi inspected the Air Force Aviation University, he emphasized that we must persist in cultivating people with morality, educating people for war, strengthening m

ilitary spirit education, strengthening fighting spirit, and comprehensively strengthening the ideological and political, military, scientific and cultural aspects of pilot students. , Physical and psychological quality foundation. To implement President Xi’s important instructions and meet the needs of future intelligent warfare, it is urgent to build a higher-level military talent training goal with thinking as the core, and accelerate the upgrading and reconstruction of military personnel’s comprehensive quality.

Intelligent warfare is a complex giant system integrating multiple fields. Its intelligence-based characteristics and iterative and changeable development trend are changing the role of soldiers in warfare. Soldiers may gradually move from the foreground of the war to behind the scenes, from direct face-to-face combat to man-machine collaborative combat, from front-line charging to back-end planning and design of war. In order to be competent in man-machine coordination, planning and designing wars and other functional roles, in addition to ideological, political, physical and psychological requirements, in terms of military profession and scientific culture, soldiers should focus on improving the following five aspects of knowledge, ability and quality: First, multidisciplinary integration Master the core principles of multiple disciplines related to intelligent warfare, such as nature, military, cognitive psychology, and network intelligence, and be able to integrate knowledge across disciplines to guide military practice; the second is strong cognitive ability, with logical thinking, judgment Thinking and system thinking ability, able to use scientific methods to analyze and reason to solve combat problems; the third is human-machine collaboration ability, deeply grasp the characteristics and laws of intelligent warfare, skillfully use combat platforms, command and control systems, and decision support systems, and be able to control diversified intelligent weapons The fourth is the ability to innovate, with a keen sense of technology and strong creativity, able to grasp the frontiers of science and technology, innovate combat styles, and grasp the laws of war development; the fifth is the ability to self-growth, to be able to accurately recognize oneself , rationally plan military careers, freely use information means to acquire new knowledge, new technologies, and new methods, constantly improve the knowledge structure, enhance cognitive ability, and better adapt to the complex and changeable military revolution development.

Identifying the Emphasis Points of Military Higher Education Reform

At present, the superposition of informatization and intelligentization has brought greater complexity to the personnel training work of military academies. It is necessary to meet the actual needs of informatization operations and at the same time lay the foundation for adapting to intelligent warfare. We should focus on The following work.

Restructure the curriculum system. The curriculum system supports the formation of talent knowledge structure. In order to cultivate military talents that meet the needs of intelligent warfare and achieve the training goals of military majors, science and culture, it is necessary to break the practice of designing a curriculum system with a single major as the background and establish a curriculum system of “general education + direction”. The general education course is based on the existing natural science and public courses, adding courses such as mathematical logic, mathematical modeling, critical thinking, network foundation, artificial intelligence, cognitive neuroscience, system engineering, etc., to establish cross-field and interdisciplinary courses System, expand the knowledge of students, build a knowledge structure urgently needed for intelligent warfare, and lay a broad knowledge foundation for their lifelong growth. Orientation courses are to establish a discipline and professional direction, set up a vertical curriculum system of mathematical science, professional foundation, and professional positions, build a solid professional background, and cultivate students’ ability to use professional theories to solve complex combat training problems. The curriculum system of “General Education + Orientation” helps build a “T”-shaped knowledge structure and meets the needs of military personnel to adapt to diverse and intelligent warfare.

按照人才成長周期,目前正在接受高等教育的士兵將在10年以上成為作戰訓練的主力軍,也將成為迎接智能化戰爭挑戰的第一主力軍。 目前,我軍高等教育在人才培養目標設計上還存在一些不足,對適應未來瞬息萬變的智能戰場的能力重視不夠。 人才培養目標與智能化作戰需求還存在一定差距。 2020年7月23日,習主席視察空軍航空大學時強調,要堅持立德樹人、以戰育人、強軍

加強軍人精神教育,強化戰鬥精神,全面加強飛行員思想政治、軍事、科學、文化等方面的素質。 、身心素質基礎。 為貫徹落實習總書記重要指示精神,面向未來智能化戰爭需求,迫切需要構建以思維為核心的更高層次軍事人才培養目標,加快推進軍隊人才綜合素質升級再造。

智能戰爭是一個融合多領域的複雜巨系統。 其智能化特徵和迭代多變的發展趨勢正在改變士兵在戰爭中的角色。 士兵可能會逐漸從戰爭的前台走向幕後,從直接的面對面作戰走向人機協同作戰,從前線衝鋒走向戰爭的後端規劃設計。 為勝任人機協同、戰爭策劃設計等職能作用,除思想政治、生理心理等方面的要求外,在軍事職業和科學文化方面,士兵應著重提高以下五個方面 知識、能力和素質:一是多學科融合 掌握自然、軍事、認知心理學、網絡智能等與智能戰爭相關的多學科核心原理,能夠跨學科整合知識指導軍事實踐; 二是認知能力強,具有邏輯思維、判斷思維和系統思維能力,能夠運用科學的方法分析推理解決作戰問題; 三是人機協同能力,深刻把握智能作戰的特點和規律,熟練運用作戰平台、指揮控制系統、決策支持系統,駕馭多樣化智能武器。 具有敏銳的科技觸覺和極強的創造力,能夠把握科技前沿,創新作戰方式,把握戰爭發展規律; 五是自我成長能力,能夠準確認識自己,合理規劃軍旅生涯,自由運用信息手段獲取新知識、新技術、新方法,不斷完善知識結構,增強認知能力, 更好地適應複雜多變的軍事革命發展。

找准軍隊高等教育改革重點

當前,信息化與智能化的疊加,給軍隊院校的人才培養工作帶來了更大的複雜性。 既要滿足信息化作戰的實際需要,又要為適應智能化作戰打下基礎。 重點抓好以下工作。

重構課程體系。 課程體系支撐人才知識結構的形成。 為培養適應智能化作戰需求的軍事人才,實現軍事專業、科學文化的培養目標,必須打破以單一專業為背景設計課程體系的做法,建立課程體系 “通識教育+方向”。 通識教育課程在現有自然科學和公共課程的基礎上,增加數理邏輯、數學建模、批判性思維、網絡基礎、人工智能、認知神經科學、系統工程等課程,建立跨領域、跨學科的課程 課程體系,拓展學生知識面,構建智能化戰爭急需的知識結構,為學生終身成長奠定廣闊的知識基礎。 定向課程是確立學科專業方向,建立數學科學、專業基礎、專業崗位垂直課程體系,構建紮實的專業背景,培養學生運用專業理論解決複雜實戰訓練問題的能力。 “通識教育+迎新”課程體系構建“T”型知識結構,滿足軍隊人才適應多樣化、智能化戰爭的需求。

Deepen classroom reform. Educational neuroscience believes that education is the reshaping of students’ brains, and the classroom is the main position for reshaping students’ neural networks, especially for the formation of high-level cognitive abilities required for intelligent warfare. Continuously deepening classroom reform is the key to military Critical tasks for higher education today. It should be seen that a classroom with only knowledge and understanding is far from a good classroom. All human behaviors, though

ts and emotions are all controlled by the brain, and every knowledge, thought and emotion corresponds to a specific neural network of the brain. Therefore, classroom reform should center on students’ learning, follow the cognitive laws of the human brain, and Attract and maintain attention as the starting point, establish a scientific thinking framework, and mobilize students to think proactively. Usually, teaching methods aimed at higher-level abilities have a general model—problem-driven heuristic teaching, and the commonly used problem-based teaching methods, project-based teaching methods, and inquiry-based teaching methods all belong to this model. Therefore, the main path to promote classroom reform is to develop unknown, novel, and interesting questions and stories for students, design a thinking framework that points to logical reasoning, critical thinking, reflection, creativity, and learning ability, and inspire students under the guidance of the framework. Active thinking, supplemented by the output process of speaking and writing, finally achieves the goal of internalizing knowledge understanding and forming high-level abilities.

Promote comprehensive education. Modern educational theory not only regards the classroom as an important position of education, but also regards all time and space outside the classroom as an important resource for cultivating students. The time and space outside the classroom not only support classroom teaching and promote the formation of knowledge and ability, but also an important place to cultivate non-intellectual ability. Colleges and universities should make full use of these time and space, clarify specific training objectives, focus on going deep into the army, close to actual combat, highlighting practicality and creativity, and scientifically design education and training programs. Focus on giving full play to the advantages of military academies in management and education, explore the establishment of a student management model, and promote the cultivation of students’ leadership and management capabilities; continue to enrich the second classroom, build an innovative platform, create more opportunities for independent practice, and improve students’ innovation capabilities; make full use of various Large-scale activities to cultivate students’ competition awareness and teamwork ability; strengthen the construction of management cadres, improve scientific management and training capabilities, and effectively guide students to carry out time management, goal management, emotional management, psychological adjustment, habit formation, etc., to help students improve self-management and self-learning ability.

All in all, education is a systematic project. The above are only three aspects to break through the shortcomings of talent training in the era of intelligence. To truly solve the problem, military academies need to carry out systematic reforms, such as strategic planning, quality management, personnel quality, teaching conditions, etc. All aspects can effectively support the achievement of the goal of personnel training, and this requires us to continuously explore and innovate, continuously improve the level of running schools and educating people, and strive to create a new situation in the construction and development of military academies.

深化課堂改革。 教育神經科學認為,教育是對學生大腦的重塑,而課堂是重塑學生神經網絡的主要陣地,尤其是智能戰爭所需的高級認知能力的形成。 不斷深化課堂改革是當今軍事高等教育的關鍵任務。 應該看到,只有知識和理解力的課堂,遠談不上好課堂。 所有的人類行為,雖然

和情緒都是由大腦控制的,每一種知識、思想和情緒都對應著大腦特定的神經網絡。 因此,課堂改革應以學生的學習為中心,遵循人腦的認知規律,以吸引和保持注意力為出發點,建立科學的思維框架,調動學生主動思考。 通常,針對更高層次能力的教學方法有一個通用的模式——問題驅動啟發式教學,常用的問題導向教學法、項目導向教學法、探究式教學法都屬於這種模式。 因此,推動課堂改革的主要路徑是為學生開發未知的、新穎的、有趣的問題和故事,設計指向邏輯推理、批判性思維、反思、創造力和學習能力的思維框架,激發學生在 框架的指導。 思維活躍,輔之以說、寫的輸出過程,最終達到知識理解內化,形成高層次能力的目的。

推進綜合教育。 現代教育理論不僅把課堂視為教育的重要陣地,而且把課堂以外的一切時間和空間都視為培養學生的重要資源。 課堂外的時間和空間不僅支持課堂教學,促進知識和能力的形成,也是培養非智力能力的重要場所。 高校要充分利用這些時間和空間,明確具體培養目標,著眼於深入軍隊、貼近實戰、突出實踐性和創造性,科學設計教育培養方案。 著力發揮軍隊院校管理教育優勢,探索建立學生管理模式,促進學生領導力和管理能力培養; 繼續豐富第二課堂,搭建創新平台,創造更多自主實踐機會,提升學生創新能力; 充分利用各種大型活動,培養學生的競爭意識和團隊協作能力; 加強管理幹部隊伍建設,提高科學管理和培養能力,有效引導學生進行時間管理、目標管理、情緒管理、心理調適、習慣養成等,幫助學生提高自我管理和自主學習能力 能力。

總而言之,教育是一項系統工程。 以上只是要突破智能時代人才培養短板的三個方面。 要真正解決問題,軍隊院校需要進行系統性的改革,如戰略規劃、質量管理、人才素質、教學條件等,方方面面都能有效支撐人才培養目標的實現,這就需要我們 不斷探索創新,不斷提高辦學育人水平,努力開創軍隊院校建設發展新局面。

Source: PLA Military

http://www.mod.gov.cn/gfbw/gfjy_index/jsyxgfs/000000.html?big=fan

中國軍方看智能戰制勝機制的演變

Chinese Military Perspective on the Evolution of the Winning Mechanisms of Intelligent Warfare

Military theorists have often said that victory tends to smile to those who can foresee changes in the character of warfare, rather than to those who wait for changes to occur before adapting. In recent years, disruptive technologies represented by artificial intelligence have developed rapidly and are widely used in the military field, accelerating the evolution of warfare to intelligence, and correspondingly, the concept of warfare is also undergoing changes. Only by discovering changes in time, actively responding to changes, and actively adapting to changes can we be invincible in future wars.

From “fighting the weak with the strong” to “controlling the clumsy with wisdom”

“The strong win the weak and the weak lose” is a law of victory in war with certain universality. Even those battles in which the weak defeated the strong often had to form a strength advantage against the enemy at a local and specific period of time in order to truly win. In the era of intelligent warfare, the contribution rate of intelligence superiority to combat effectiveness is much higher than that of other factors.

In the confrontation of intelligent warfare, human intelligence widely penetrates into the combat field and is transplanted into weapon systems. Global multi-dimensional and various types of intelligent combat platforms can quickly couple combat forces, build a combat system according to mission requirements, and independently implement coordinated operations. After the end, it quickly returned to the standby state, showing the trend of intelligence and autonomy. The side with a higher and stronger level of intelligence can better develop and use the mechanism of “controlling stupidity with wisdom”, and even design wars based on this, dominate the development of the battle situation, and win the final victory. It should also be noted that in the era of intelligent warfare, there are likely to be multiple stages of development from low to high. Try to keep yourself at an advanced stage, and attack your opponent so that it is at a low-dimensional stage. use.

From “destroying power” to “destroying cognition”

With the accelerated evolution of warfare to intelligence, the combat space has gradually expanded from the physical domain and the information domain to the cognitive domain, from the tangible battlefield to the invisible battlefield. The cognitive space composed of people’s spiritual and psychological activities has become a new combat space. Different from the main purpose of destroying the enemy’s vital forces in traditional warfare, intelligent warfare will pay more attention to weakening the enemy’s morale, disintegrating the enemy’s will, and destroying the enemy’s cognition.

Through the intelligent analysis of the opponent’s personality preferences, psychological characteristics, and decision-making habits, deterrent information can be “tailored” in a targeted manner, and the advantages of cutting-edge technologies such as intelligence can be used to show the opponent’s powerful strength in a vivid way, so that anxiety, suspicion, etc. , panic and other emotions continue to ferment inside it, which eventually leads to its self-defeating. Known as the “new oil”, big data not only enriches intelligence sources, but also becomes an important “weapon” that acts on the opponent’s cognition. By processing big data and deliberately “leaking” it to the opponent, it will create a new “fog of war” for it, and make it fall into a situation of cognitive confusion. In an intelligent war, the game of struggle will be more intense, and the party with a cognitive advantage will be ahead of the opponent, and it will be easier to grasp the initiative and opportunities.

From “people-oriented” to “human-machine collaboration”

In traditional warfare, the organization and use of military power are dominated by people. With the widespread application of intelligent technology, the proportion of unmanned equipment continues to increase. In intelligent warfare, combat tasks will be completed by man-machine collaboration, and the two will achieve organic integration and complement each other’s advantages. The third “offset strategy” proposed by the foreign military regards human-machine cooperation as a key technology for key development, and its successively proposed concepts such as “loyal wingman” are also aimed at exploring the realization of manned/unmanned coordinated operations. It is foreseeable that human-machine collaboration will play an important role in future warfare.

Using unmanned reconnaissance forces to carry out three-dimensional and multi-dimensional battlefield situational awareness can provide real-time intelligence support for manned combat forces; use unmanned platforms to carry relay loads to continuously provide communication relay support for manned combat forces; use

Modern Military Mandarin Chinese:

軍事理論家常說,勝利往往會向那些能夠預見戰爭性質變化的人微笑,而不是向那些等待變化發生再適應的人微笑。 近年來,以人工智能為代表的顛覆性技術發展迅速,廣泛應用於軍事領域,加速戰爭向智能化演進,相應地,戰爭理念也在發生變化。 只有及時發現變化,積極應對變化,積極適應變化,才能在未來的戰爭中立於不敗之地。

從“以強抗弱”到“以智治拙”

“強勝弱勝”是戰爭的製勝法則,具有一定的普遍性。 即便是那些以弱勝強的戰鬥,往往也需要在局部的、特定的時間段對敵形成實力優勢,才能真正取勝。 在智能化戰爭時代,情報優勢對戰鬥力的貢獻率遠高於其他因素。

在智能戰爭的對抗中,人類智能廣泛滲透到作戰領域,並被移植到武器系統中。 全球多維度、多類型智能作戰平台,可快速耦合作戰力量,按任務需求構建作戰體系,獨立實施協同作戰。 結束後迅速回到待機狀態,呈現出智能化、自主化的趨勢。 智力水平更高更強的一方,才能更好地開發和運用“以智治愚”機制,甚至以此為基礎設計戰爭,主導戰局發展,取得最終勝利。 還需要看到的是,在智能化戰爭時代,很可能存在從低到高的多個發展階段。 盡量讓自己保持在高級階段,攻擊對手使其處於低維階段。 使用。

從“毀滅權力”到“毀滅認知”

隨著戰爭向智能化加速演進,作戰空間逐漸從物理域、信息域擴展到認知域,從有形戰場擴展到無形戰場。 由人的精神心理活動構成的認知空間成為新的作戰空間。 與傳統戰爭以消滅敵人有生力量為主要目的不同,智能化戰爭將更加註重削弱敵人的士氣、瓦解敵人的意志、摧毀敵人的認知。

通過對對手的性格偏好、心理特徵、決策習慣等進行智能分析,有針對性地“量身定做”威懾信息,利用情報等前沿技術的優勢,展現對手的強大實力 以生動的方式表現力量,使焦慮、懷疑等、恐慌等情緒在其內部不斷發酵,最終導致其弄巧成拙。 被譽為“新石油”的大數據不僅豐富了情報來源,更成為作用於對手認知的重要“武器”。 通過處理大數據,故意“洩露”給對手,為其製造新的“戰爭迷霧”,使其陷入認知混亂的境地。 在智慧戰爭中,博弈博弈會更加激烈,擁有認知優勢的一方會先於對手,更容易掌握主動權和先機。

從“以人為本”到“人機協作”

在傳統戰爭中,軍事力量的組織和運用都是由人主導的。 隨著智能化技術的廣泛應用,無人化裝備比例不斷提高。 在智能戰爭中,作戰任務將由人機協同完成,兩者將實現有機結合,優勢互補。 外軍提出的第三次“抵消戰略”將人機協作作為重點發展的關鍵技術,其先後提出的“忠誠僚機”等概念也旨在探索實現有人/無人協同作戰。 可以預見,人機協作將在未來戰爭中發揮重要作用。

利用無人偵察力量進行三維、多維戰場態勢感知,可為有人作戰力量提供實時情報支持; 利用無人平台搭載中繼載荷,持續為有人作戰部隊提供通信中繼保障; 使用

unmanned combat forces to go deep into the front battlefield, It can attract the enemy to attack, force the enemy to expose its position, and provide target guidance and fire support for manned combat forces; use unmanned transport equipment to provide supplies for the front line, which can improve the efficiency of logistics support, reduce transportation costs, and reduce unnecessary casualties. With the assistance of artificial intelligence, manned combat forces and unmanned combat forces will realize scientific division of labor and reasonable collocation in terms of quantity, scale and function, so as to maximize the overall effectiveness.

From “eat the small with the big” to “eat the slow with the fast”

In traditional warfare, it is often necessary to make up for shortcomings in equipment performance and other aspects by increasing the number of troops. The rapid development of military intelligence has greatly improved the speed of information transmission and the accuracy of weapon strikes, greatly reduced the time for reconnaissance and early warning, intelligence processing, command decision-making, firepower strikes, and damage assessment, and accelerated the OODA kill chain cycle. , making “find and destroy” possible.

Hypersonic missiles, laser weapons, microwave weapons, electromagnetic pulse weapons and other new rapid-kill weapons have further pushed the rhythm of war to “second kill”. In the Gulf War, the loop time of the OODA loop required 3 days; in the Iraq War, the loop time has been shortened to less than 10 minutes; and in the Syrian War, the loop has almost achieved near real-time. In intelligent warfare, the use of an unmanned platform for surveillance and attack to quickly target high-value targets such as the enemy’s core command post and high-level commanders will cause the opponent to suffer heavy losses before they can react, and even face the danger of paralysis. It can be seen that victory does not necessarily favor the side with a large military force, and the side that moves quickly and accurately will be more likely to win the battlefield. According to statistics, the reaction time required by artificial intelligence to respond to changes in the battlefield is more than 400 times faster than that of humans. In the face of the rapidly changing battlefield situation, people will be more inclined to use artificial intelligence technology to realize the adaptive planning and autonomous decision-making of the command and control system, so that the command and control mode will be changed from “people on the loop” to “people outside the loop”, so as to reduce the While shouldering the burden of commanding personnel, it can improve combat efficiency and the success rate of mission execution.

From “Integrated Winning” to “Cluster Winning”

The traditional concept of equipment development is to invest a lot of money in the research and development of highly integrated high-precision weapon platforms, in order to achieve dimensionality reduction strikes on the enemy by virtue of intergenerational advantages and performance advantages in war. However, developing and deploying a multi-functional high-end platform not only takes a lot of time and money, but when multiple software and hardware modules are integrated into a single weapon platform, there may be incompatibility among them. Once the platform is destroyed, it will cause heavy losses. The military application of disruptive technologies such as artificial intelligence has led to the rapid development of unmanned swarms. Unmanned swarms have the advantages of large scale, low comprehensive cost, and decentralization. Unmanned platforms coordinate with each other, divide labor and cooperate, and can make independent decisions and carry out combat tasks in an organized manner. Even if some unmanned platforms are destroyed, it will not affect the overall operation. efficacy. Combat concepts such as “decision-making center warfare” and “mosaic warfare” proposed by foreign militaries focus on the use of unmanned swarms to complete combat tasks. In intelligent warfare, by dispersing functions such as reconnaissance and surveillance, information communication, command and control, and fire strikes into a large number of single-function unmanned combat units, a highly robust and highly elastic “kill net” is constructed, and then Adjusting the combination method will make it emerge a powerful group intelligence, creating great uncertainty for the opponent, and then trap the opponent in the judgment link of the OODA loop, unable to make effective decisions. In addition, due to the large number of unmanned swarms, the opponent’s detection, tracking, and interception capabilities can be quickly saturated, and the opponent has to face the dilemma of fortification failure because it cannot destroy all unmanned platforms in the swarm.

From “Military Dominance” to “Multiple Mixture”

Traditional warfare mainly relies on violent means to make the enemy submit to one’s own will, and usually has a strong war intensity, with clear boundaries between peacetime and wartime. With the continuous expansion of the field of military struggle to new fields such as space, network, and intelligence, and the increasingly prominent role of economic, cultural, diplomatic, and legal means in warfare, intelligent warfare will be carried out in many fields represented by the “grey zone”. Developed in the form of “multi-pronged approach”. The intensity of war may be weakened, and the boundary between peace and war will become more blurred. Whether in 2019, half of Saudi Arabia’s oil fields were attacked by drones and half of its oil production was shut down, or in 2021, the largest oil pipeline in the United States was hit by cyber attacks and caused a large-scale oil shortage. The far-reaching impact of various new attack methods cannot be ignored underestimate.

無人作戰部隊深入前線戰場,可以吸引敵人進攻,迫使敵人暴露位置,為有人作戰部隊提供目標引導和火力支援; 使用無人運輸設備為前線提供補給,可以提高後勤保障效率,降低運輸成本,減少不必要的人員傷亡。 在人工智能的輔助下,有人作戰力量和無人作戰力量將在數量、規模和功能上實現科學分工和合理搭配,實現整體效能最大化。

從“大吃小”到“快吃慢”

在傳統戰爭中,往往需要通過增加兵力數量來彌補裝備性能等方面的短板。 軍事情報的快速發展極大地提高了信息傳輸速度和武器打擊的準確性,大大縮短了偵察預警、情報處理、指揮決策、火力打擊、毀傷評估的時間,加速了OODA 殺傷鏈循環。 ,使“發現並摧毀”成為可能。

高超音速導彈、激光武器、微波武器、電磁脈衝武器等新型速殺武器進一步將戰爭節奏推向“秒殺”。 在海灣戰爭中,OODA循環的循環時間需要3天; 在伊拉克戰爭中,循環時間縮短到不到10分鐘; 而在敘利亞戰爭中,環路幾乎做到了近乎實時。 在智能化戰爭中,利用無人監視攻擊平台快速瞄準敵方核心指揮所、高級指揮員等高價值目標,使對方來不及反應就損失慘重,甚至面臨 癱瘓的危險。 由此可見,勝利並不一定偏向兵力多的一方,行動迅速準確的一方更容易贏得戰場。 據統計,人工智能應對戰場變化所需的反應時間比人類快400多倍。 面對瞬息萬變的戰場態勢,人們將更傾向於利用人工智能技術實現指揮控制系統的自適應規劃和自主決策,使指揮控制模式從“人”轉變為“人”。 環上”轉變為“環外人”,從而在減輕指揮人員負擔的同時,提高作戰效率和任務執行的成功率。

從“綜合製勝”到“集群制勝”

傳統的裝備研製理念是投入大量資金研發高度集成的高精度武器平台,以期憑藉代際優勢和戰爭性能優勢實現對敵降維打擊。 然而,開發和部署一個多功能的高端平台不僅需要花費大量的時間和金錢,而且當多個軟硬件模塊集成到一個武器平台時,它們之間可能會出現不兼容的情況。 一旦平台被破壞,將造成重大損失。 人工智能等顛覆性技術的軍事應用,催生了無人蜂群的快速發展。 無人蜂群具有規模大、綜合成本低、分散化等優點。 無人平台相互協調、分工協作,能夠自主決策、有組織地執行作戰任務。 即使部分無人平台被毀,也不會影響整體運作。 功效。 外軍提出的“決策中心戰”、“馬賽克戰”等作戰概念,著眼於利用無人蜂群完成作戰任務。 在智能化戰爭中,通過將偵察監視、信息通信、指揮控制、火力打擊等功能分散到大量功能單一的無人作戰單元中,構建高魯棒性、高彈性的“殺傷網”,進而 調整組合方式會使其湧現出強大的群體智能,給對手製造很大的不確定性,進而將對手困在OODA循環的判斷環節,無法做出有效的決策。 此外,由於無人蜂群數量眾多,對方的探測、跟踪、攔截能力會很快飽和,對方不得不面臨無法摧毀蜂群中所有無人平台的設防失敗的困境。

從“軍事獨霸”到“多元混合”

傳統戰爭主要依靠暴力手段使敵人屈服於自己的意志,通常具有強烈的戰爭強度,和平與戰時界限分明。 隨著軍事鬥爭領域不斷向太空、網絡、情報等新領域拓展,經濟、文化、外交、法律等手段在戰爭中的作用日益凸顯,智能化戰爭將在眾多領域展開 由“灰色地帶”。 以“多管齊下”的形式開展。 戰爭的激烈程度可能會減弱,和平與戰爭的界限將變得更加模糊。 無論是2019年,沙特半數油田遭到無人機襲擊、一半石油生產停產,還是2021年,美國最大的輸油管道遭到網絡攻擊,造成大規模石油短缺。 各種新型攻擊手段的深遠影響不容忽視低估。

With the development and maturity of intelligent technology, the comprehensive use of various means to attack opponents’ industrial, transportation, financial, communication, energy, medical and other facilities and networks will become more common. The threshold of intelligent warfare will show a downward trend, and the warring parties may adopt the method of undeclared war to launch a hybrid war that integrates economic warfare, diplomatic warfare, cyber warfare, public opinion warfare, psychological warfare, legal warfare, etc., so that the opponent is exhausted. Handle.

From “actual combat inspection” to “experimental exercise”

Under traditional conditions, due to the lack of scientific simulation and evaluation tools, the true capabilities of the army can only be tested in actual combat. Under intelligent conditions, using virtual reality technology can create a virtual scene with a strong sense of three-dimensional and realism based on the actual battlefield environment and task background. This scene can not only restore objective things such as weapons and equipment from multiple dimensions such as sound, appearance, and performance, but also simulate various severe weather such as heavy fog, heavy rain, and snowstorm, and display the terrain, meteorology, hydrology, etc. of the battlefield in a visualized form. Electromagnetic, nuclear and other information, close to the real situation of the battlefield.

Set the imaginary enemy in the virtual environment according to the characteristics of the enemy in reality, and carry out intelligent simulation of the possible trend of the battle situation, so that officers and soldiers can “experience” the war in virtual reality several times before the official war, so as to improve the equipment performance, The rhythm of the war and the situation of the enemy and the enemy are all clear, and it will be easier to perform realistic tasks. Before the outbreak of the Iraq War, the U.S. military secretly developed a computer game that simulated the combat environment in Baghdad. Among the personnel dispatched to Iraq to perform missions, the survival rate of those trained in the game was as high as 90%. With the continuous enrichment and improvement of data collected in reality, the construction of virtual battlefields will be more realistic, the prediction of the battlefield situation will be more accurate, and the comprehensive evaluation of exercises will be more credible. If the outcome of the war is known in advance, there may be a situation where “surrender the enemy” without a fight or a small fight.

隨著智能技術的發展和成熟,綜合運用各種手段攻擊對手的工業、交通、金融、通信、能源、醫療等設施和網絡將變得更加普遍。 智能戰的門檻將呈下降趨勢,交戰各方可能會採取不宣戰的方式,發動集經濟戰、外交戰、網絡戰、輿論戰、心理戰、法律戰等為一體的混合戰爭。 ,使對手筋疲力盡。 處理。

從“實戰考察”到“實驗演練”

在傳統條件下,由於缺乏科學的模擬和評估工具,軍隊的真實能力只能在實戰中檢驗。 在智能化條件下,利用虛擬現實技術,可以根據實際戰場環境和任務背景,營造立體感強、真實感強的虛擬場景。 該場景不僅可以從聲音、外觀、性能等多個維度還原武器裝備等客觀事物,還可以模擬大霧、暴雨、暴風雪等各種惡劣天氣,展示地形、氣象、水文等 等戰場的可視化形式。 電磁、核等信息,貼近戰場真實情況。

根據現實中敵人的特點,在虛擬環境中設置假想敵,對可能的戰局走向進行智能模擬,讓官兵在臨戰前數次在虛擬現實中“體驗”戰爭 正式戰爭,從而提升裝備性能,戰爭的節奏和敵我雙方的情況都一目了然,更容易執行逼真的任務。 伊拉克戰爭爆發前,美軍秘密研發了一款模擬巴格達作戰環境的電腦遊戲。 在派往伊拉克執行任務的人員中,在遊戲中受訓人員的存活率高達90%。 隨著現實採集數據的不斷豐富和完善,虛擬戰場的構建將更加真實,戰場態勢的預測將更加準確,演習的綜合評價將更加可信。 如果事先知道戰爭的結果,可能會出現不戰不戰、不戰不戰“投敵”的情況。

Source: http://www.mod.gov.cn/gfbw/XXXX

中國軍隊著力推進機械化、信息化、智能化融合發展

Chinese Military to focus on the integration and development of mechanization, informationization and intelligence

Adhere to the integration and development of mechanization, informationization and intelligence

——Conscientiously study, publicize and implement the spirit of the 20th National Congress of the Communist Party of China

■Chinese People’s Liberation Army Unit 66011

The report of the 20th National Congress of the Communist Party of China emphasized that we should adhere to the integrated development of mechanization, informationization and intelligence. This important exposition endows the modernization of national defense and the armed forces with new connotations of the times, and further points out the development direction and path for accelerating the modernization of national defense and the armed forces. We must seize the opportunity, based on the status quo, insist on promoting the integrated development of mechanization, informationization and intelligence with systematic thinking, coordinate the development of various fields, especially key areas, realize the positive interaction of the three, and promote the overall improvement of national defense and military modernization.

Engels pointed out: “Human beings fight in the same way as they produce.” At present, the new military revolution in the world is developing rapidly, the degree of informatization in modern warfare is constantly improving, and the characteristics of intelligence are becoming increasingly apparent. Especially under the influence of the new round of scientific and technological revolution, the concepts, elements and methods of winning war are undergoing major changes. Judging from the recent local wars and armed conflicts in the world, a large number of high-tech weapons and equipment have been used in actual combat, and intelligent technology, unmanned equipment, and data information have become new growth points for combat effectiveness. In the face of increasingly fierce military competition, only by standing at the forefront of war and technology, and adhering to the integration of mechanization, information, and intelligence, can we seize the opportunity and win the initiative in military strategic competition.

“Everything must come, and it is a matter of course.” Mechanization, informatization, and intelligence are superimposed, interpenetrated, and mutually supported. Among them, mechanization is the material basis and carrier for the development of informatization and intelligence; informatization plays a connecting role between mechanization and intelligence; intelligence represents advanced combat effectiveness and is the development direction of future military construction. Without the previous “transformation” as the premise and foundation, there would be no emergence and development of the latter “transformation”.

Adhering to the integration and development of mechanization, informationization and intelligence is in line with the reality of our military construction and development, and is the only way for the modernization of national defense and the military in the future. Our army has basically achieved mechanization, and the construction of informatization has made significant progress but has not yet been completed. If the intelligentization is carried out after completing the informatization step by step, it will open up a new generation gap with the armed forces of developed countries; if the construction focus is fully shifted to intelligentization, it is unrealistic to expect to be in place in one step.

Science and technology are the core combat capability and the most active and revolutionary factor in military development. The key to adhering to the integrated development of mechanization, informationization and intelligence lies in promoting technological innovation. We should vigorously implement the strategy of strengthening the army through science and technology, actively promote self-reliance and self-improvement in high-level science and technology, accelerate the breakthrough of key core technologies, accelerate the development of strategic, cutting-edge, and disruptive technologies, and realize the transformation from following and running to leading and running as soon as possible. Persist in seeking combat effectiveness from scientific and technological innovation, improve scientific and technological cognition, innovation, and application capabilities, speed up the resolution of “stuck neck” problems, and firmly grasp the lifeline of our army’s development in our own hands.

Wars change with the times, and preparations for wars should not be conservative or rigid. To promote war preparations in the new era, we must focus on winning the new requirements of information-based and intelligent warfare. The construction of our army’s combat effectiveness has accelerated transformation, overall reshaping, and leapfrog development to ensure that it can attack and defend freely and win opportunities in future wars.

(Author unit: Unit 66011)

Original Mandarin Chinese:

堅持機械化、信息化、智能化融合發展

——認真學習宣傳貫徹黨的二十大精神

■ 中國人民解放軍66011部隊

黨的二十大報告強調,要堅持機械化、信息化、智能化融合發展。 這一重要論述賦予了國防和軍隊現代化建設新的時代內涵,進一步為加快推進國防和軍隊現代化建設指明了發展方向和路徑。 我們要抓住機遇,立足現狀,堅持以系統思維推進機械化、信息化、智能化融合發展,統籌各領域特別是重點領域發展,實現三者良性互動,促進 國防和軍隊現代化建設全面加強。

恩格斯指出:“人類以生產的方式進行鬥爭”。 當前,世界新軍事革命快速發展,現代戰爭信息化程度不斷提高,智能化特徵日益明顯。 特別是在新一輪科技革命的影響下,打贏戰爭的觀念、要素和方式正在發生重大變化。 從近期全球發生的局部戰爭和武裝衝突來看,大量高科技武器裝備投入實戰,智能技術、無人裝備、數據信息等成為戰鬥力新的增長點。 面對日益激烈的軍事競爭,只有站在戰爭和科技的前沿,堅持機械化、信息化、智能化融合,才能搶占先機,贏得軍事戰略競爭的主動權。

“凡事必來,順理成章。” 機械化、信息化、智能化相互疊加、相互滲透、相互支撐。 其中,機械化是信息化、智能化發展的物質基礎和載體; 信息化在機械化和智能化之間起著承上啟下的作用; 智能化代表著先進的戰鬥力,是未來軍隊建設的發展方向。 沒有前一個“轉化”作為前提和基礎,就沒有後一個“轉化”的產生和發展。

堅持機械化、信息化、智能化融合發展,符合我軍建設發展實際,是未來國防和軍隊現代化建設的必由之路。 我軍基本實現機械化,信息化建設取得重大進展但尚未完成。 如果在逐步完成信息化後進行智能化,將與發達國家軍隊拉開新的代溝; 如果建設重心全面轉向智能化,指望一步到位是不現實的。

科技是核心作戰能力,是軍隊發展中最活躍、最具革命性的因素。 堅持機械化、信息化、智能化融合發展,關鍵在於推進科技創新。 大力實施科技強軍戰略,積極推進高水平科技自立自強,加快突破關鍵核心技術,加快發展戰略性、前沿性、 和顛覆性技術,盡快實現從跟隨跑向引領跑的轉變。 堅持從科技創新中求戰鬥力,提昇科技認知、創新和應用能力,加快化解“卡脖子”問題,把我軍發展的生命線牢牢掌握在自己手中。

戰爭隨著時代的變化而變化,戰爭準備不能保守僵化。 推進新時代備戰,必須圍繞打贏信息化、智能化戰爭新要求。 我軍戰鬥力建設加快轉型、全面重塑、跨越發展,確保攻守自如,在未來戰爭中贏得先機。

(作者單位:66011部隊)

Source: http://www.mod.gov.cn/gfbw/jmsd/4926673.html

中國風諜戰遊戲

Chinese Spying Operations – Games Chinese Spooks Play

From 國家安全部 ‘Guójiā ānquán bù’ to 新華社 ‘Xinhua’, how China’s espionage network operates in shadows.

China has systemically set up one of the quietest but most lethal espionage networks across the world.

As the world continues to debate over the spy balloons allegedly sent by China for espionage in the United States, probably it is missing the big picture. The real threat to global security comes from China’s spy network which is a complex web of many agencies, most of whom have successfully remained in the shadows. This multipart series would unravel the lesser known as well the unknown details about the Chinese espionage network.

The Chinese spy network has successfully remained in the shadows for decades. The Chinese Communist Party had built its spy network much before it came to power in China in 1949 turning a republic into a communist dictatorship. Since then, China has systematically set up one of the quietest but one of the most lethal espionage networks across the world.

The information regarding the Chinese spy network is scant and so scattered that it makes it difficult for even keen China watchers to paint the big and the real picture.

Ministry of State for Security

Ministry of State for Security (MSS) is China’s premier intelligence agency. It is also known as 國家安全部 ‘Guójiā ānquán bù’. MSS is largely responsible for operations outside China. The domestic intelligence and surveillance is looked after by the Ministry of Public Security (MPS). In addition, Chinese defence forces have their own intelligence agencies which conduct operations all over the globe.

Peter Mattis, one of the foremost authorities on Chinese intelligence operations, explains the Chinese military intelligence network (A Guide to Chinese Intelligence Operations, August 18, 2015), “Within the People’s Liberation Army (PLA), intelligence organizations fall under the General Staff Department (the Second and Third Departments, or, respectively, China’s DIA and NSA equivalents); the General Political Department for intelligence and covert influence operations; the PLA Navy, Air Force, and Second Artillery headquarters; and technical reconnaissance bureaus in the military regions. Much of the military intelligence infrastructure is based in China, but defence attachés and clandestine collectors do operate abroad, including from the service intelligence elements.”

New China News Agency (Xinhua)

Founded in 1931 by the Chinese Communist Party, Xinhua is the official news agency of China and a major facilitator for China’s intelligence gathering. According to an investigative report in Greek media outlet Pentapostagma published in April 2021, “Xinhua is primarily the eyes, ears, and voice of China. It is one of the important arms of the Chinese Intelligence agency in gathering information. Its prime objective is to promote positive news/narrative about CCP leadership/Chinese government and to marginalize, demonize, or entirely suppress anti-CCP voices, incisive political commentary and exposes that present the Chinese Government/CCP leadership in a negative light. It owns more than 20 newspapers and a dozen magazines and prints in eight languages: Chinese, English, Spanish, French, Russian, Portuguese, Arabic and Japanese It has established 107 bureaus in foreign countries including eight sub offices or editorial offices in Hong Kong, New York, Mexico, Nairobi, Cairo, Paris, Moscow, and Rio de Janeiro and currently employs more than 10,000 people.”

The report explained the standard operating procedure of gathering intelligence by this Chinese agency which has been operating in India also for several years, “Xinhua covers all news and developments/events in foreign countries which have meaning, or which could be of any significance for China. It then forwards reports/articles to China’s Ministry of State Security which directly handles the information inflow from Xinhua. The reports/articles are uploaded in a secured web system. Those that contain intelligence value are treated as classified and forwarded to CCP leadership for their consumption. Xinhua journalists are trained to be able to identify news/articles that are suitable for the CCP leaders and not for the public.” 

According to this investigative report, “The agency (Xinhua) maintains a huge database of experts across the world and contacts favorable pro-Chinese contacts/assets in foreign countries and forwards their articles/reports to concerned departments back in Beijing.”

United Front Work Department (UFWD)

Set up in 1942, UFWD is the blue-eyed boy of the Communist Party Chinese (CPC). President Xi Jinping has further strengthened it ever since he came to power in 2012 and now it plays a significant role in China’s overall espionage network as well foreign policy framework. According to a research report published in August 2018 by the US-China Economic and Security Review Commission, “The United Front strategy uses a range of methods to influence overseas Chinese communities, foreign governments, and other actors to take actions or adopt positions supportive of Beijing’s preferred policies.”

‘Several official and quasi-official entities conduct overseas activities guided or funded by the United Front including Chinese government and military organizations, cultural and “friendship” associations, and overseas academic groups such as Chinese Students and Scholars Associations (CSSAs) and Confucius Institutes.  The UFWD also oversees influence operations targeting Taiwan, Hong Kong, and Macau that aim to suppress independence movements, undermine local identity, and promote support for Beijing’s political system.

In all these cases, United Front work serves to promote Beijing’s preferred global narrative, pressure individuals living in free and open societies to self-censor and avoid discussing issues unfavorable to the CPC and harass or undermine groups critical of Beijing’s policies.’

Ryan Fedasiuk, a research Analyst at Georgetown University’s Center for Security and Emerging Technology (CSET) meticulously calculated the budget for UFWD in his essay ‘How China Mobilizes Funding for United Front Work (China Brief Volume: 20 Issue: 16). This indicates the priority given to this agency by the Chinese government and the CCP.

There is no direct budget for UFWD but there are several government and quasi-government bodies which fund it. That include Chinese People’s Political Consultative Conference, State Ethnic Affairs Commission, State Administration of Religious Affairs, Overseas Chinese Affairs Office of the State Council and All-China Federation of Industry and Commerce. The current annual budget for UFWD allocated through these bodies stands at not less than $1.4 billion.

“Chinese officials maintain that the United Front system is a benign network of administrative organizations, and that the PRC’s foreign policy is based on “mutual respect and non-interference in each other’s internal affairs” (PRC Embassy in Sweden, August 2019; ABC, June 2020). If this really were the case, regional governments probably would not classify their united front spending as secret 秘密資助 (Mìmì zīzhù) or refuse to disclose the structure of government offices ostensibly reserved for public diplomacy,” says Fedasiuk.

He further adds, “That regional governments in China budget nearly as much for united front work ($1.3 billion annually) as they do for CPC propaganda indicates how highly the Party values the united front as a tool for both domestic and foreign influence’.”

Overseas Chinese Affairs Office (OCAO)

This department /office is a front for keeping tabs on the Chinese communities abroad. It works closely with the Chinese Ministry of Education. According to Mattis, “The Overseas Chinese Affairs Office and the Ministry of Education… keep tabs on Chinese who live outside of China. The former office maintains ties to overseas Chinese communities and sponsors a variety of Chinese professional associations. The Ministry of Education keeps tabs on Chinese students abroad and helps support students’ and scholars’ associations. Both assist in mobilizing Chinese expats and émigrés for visible displays of support when Beijing wants, such as during the 2008 Olympic torch relay.”

According to the official website of ‘Overseas Chinese Office’, its major responsibilities include, “To study and formulate the guidelines, policies and regulations concerning overseas Chinese affairs, as well as to supervise and check their implementation; and to conduct research and study on the development of overseas Chinese affairs both domestically and abroad, to provide the information to the Central Committee of the CPC and the State Council.

Institute of Scientific and Technical Information of China (ISTIC)

Established in 1956, the ISTIC is officially a premier scientific research institute of China. But that is a façade. Its real task is to collect technologies and related information from all over the world in whichever manner it is possible. If one can read between the lines, the official website of ISTIC gives ample indications about the real work it does. The website says, “ISTIC has established long-term and stable business cooperation relations with relevant research institutions in the United States, Canada, Japan and other countries and regions, and has become an important platform for international cooperation and exchange in the field of science and technology information in China.”

George Soros and Chinese spy agency worked together as comrades.

George Soros’ history with the Chinese reveals his hypocrisy as he presents himself as a champion of democracy.

George Soros, the US-based controversial billionaire, and the Chinese premier spy agency Ministry of State Security (MSS) have worked hand in glove in the 1980s where Soros provided substantial funding to MSS through Economic System Reform Institute (ESRI) and China International Culture Exchange Center (CICEC).

It appears that Soros was playing a ‘double game’ by pursuing the Western interests to infiltrate China while also forging a close partnership with Chinese intelligence network and top bosses of the Chinese Communist Party. The apparent reason was an opportunity that he must have seen to benefit from China’s economic growth in the 1980s.

But this partnership fell apart with the change in the Chinese regime after 1989. Several representatives of Soros’ entity ‘China Fund’ were arrested by the Chinese authorities post- Tiananmen square massacre in 1989. The Chinese authorities accused them of working for the US’ Central Intelligence Agency (CIA).

Soros’ China Fund and the Ministry of State Security

Soros started making overtures to China in the 1980s. He first identified and handpicked Liang Heng, a bestselling author in 1984 to set up his shop in China. Heng had become famous after publishing his memoir Son of the Revolution’ that was a personal account of how China was opening to the West and the purges carried out at regular intervals by the Communist Party China (CPC).

Liang connected Soros with important people in the Chinese establishment. The façade kept for this whole initiative was that Soros wanted to help China to carry out reforms.

By that time, he had already set up ‘Open Society Foundations’, a funding arm known for instigating coups, political upheavals, and chaos in various countries through a web of well-funded non-Governmental organizations (NGOs). But given the fact that bets were very high in China, Soros decided to set up a separate entity which would work only in China.

In 1986, Soros set up ‘China Fund’ with a $1 million endowment. Through Liang’s network, the China Fund initially partnered with a Chinese think tank Economic System Reform Institute (ESRI).

In October 1986, Soros opened the China Fund formally in a signing ceremony at Beijing’s Diaoyutai State Guesthouse. This was his first trip to China.

Soros struck gold by roping ESRI as it was close to the premier Zhao Ziyang, who became the Party’s general secretary the next year. Zhao’s personal secretary, Bao Tong, was also known for helping the China Fund-ESRI joint venture whenever they needed to get through the Chinese bureaucracy.

Behind the façade of helping China to shape reformist economic policies, the China Fund started spreading its tentacles very fast. Within a year of its establishment, it set up an artists’ club in Beijing and an academic unit at Nankai University in Tianjin. Within the first two years of arriving in China, Soros’ China Fund gave hefty grants for at least 200 proposals. However, as the Fund started pushing the envelope too far by funding research on sensitive topics like the notorious ‘Cultural Revolution’ that had resulted in torture and deaths of millions of Chinese in 1960s, alarm bells started ringing in Chinese official circles and Zhao Ziyang had to step in despite his support for Soros and China Fund.

Alex Joske says in Spies and Lies: How China’s Greatest Covert Operations Fooled the World, “In the face of complaints from Party elders about the China Fund, Zhao Ziyang ceded its control to new management. It wasn’t a fight he wanted to pick, nor one he could dare to. Zhao agreed to sever ties between the ESRI and the China Fund, bringing in the China International Culture Exchange Center (CICEC), a group under the Ministry of Culture, as its new partner institution.

Things weren’t all bad, or so it seemed. CICEC had the backing of senior Party leaders, including (present Chinese president) Xi Jinping’s father, and served as one of the only official channels for cultural exchanges with the outside world. Its strong ties to officialdom could insulate Zhao and the China Fund.”

Soros travelled to China in February 1988 to sign a revised agreement with Yu Enguang, a Chinese spy master who was a high-ranking official of the MSS. CICEC itself was a front for the MSS. It would be too naïve to accept that Soros didn’t know about this ‘open secret’ though he tried to defend himself later by pleading ignorance about this fact.

Soros got along well with Yu Enguang at a personal level. The latter secured Soros a rare meeting with the top leadership of CCP in Beijing. Soros, reconfirmed his commitment to bankroll joint operations of China Fund and CICEC. The new Chinese co-chair of this project Yu Enguang.

According to Joske, Yu Enguang was the pseudonym of the Chinese spy master Yu Fang. ‘Among his comrades in the MSS, Yu Fang was just as respected as ‘Yu Enguang’ was by the targets he cultivated. At some point in his career, he headed the agency’s important central administrative office, and in the early nineties helped secure the passage of China’s first National Security Law, which expanded and codified MSS powers. The authors of several MSS publications, marked for internal distribution only, thank him for advising on and improving their drafts. He also oversaw MSS production and censorship of histories, TV dramas and movies about spies, which were designed to build public awareness and support for the MSS’s mission.’

Joske adds, “Ironically for a man who helped bring Chinese intelligence history into the public sphere, Yu’s true legacy is an official secret. Official references to his achievements are brief and elliptical. The authoritative People’s Daily eulogized him in 2013, an honor only a handful of intelligence officers receive: ‘In his sixty years of life in the revolution, Comrade Yu Fang was loyal to the Party, scrupulously carried out his duties and selflessly offered himself to the Party’s endeavors, making important contributions to the Party’s state security endeavor.’ The article also noted that he’d been a member of the National People’s Congress, China’s national legislature.”

Thus, Soros was dealing with a top-ranking Chinese intelligence official. Initially, this partnership was going off well. In fact, MSS was using Soros’ money to fund its operations under the garb of cultural exchange programs carried out by CICEC.

Incidentally, the official website of the CICEC, when accessed currently, doesn’t show any link it had in the past with Soros and the China Fund. It talks about its focus on ‘cultural exchange programs, which is a common phrase used frequently by the Chinese intelligence agencies to give legitimacy to their spy operations. The CICEC holds cultural festivals across the world and officially claims to be working to create support for China’s ‘One belt, one road’ initiative. Incidentally, CICEC was set up in 1984, a year after MSS came into existence and it was just a couple of years old when Soros’ China Fund forged a partnership with it. It was well-known to China watchers right since its inception that CICEC was a front for the MSS. It is difficult to apprehend that Soros didn’t know about this!

Post-Tiananmen Square

Everything was going well for Soros’ China Fund till Tiananmen square happened in 1989. Chinese authorities suspected that the China Fund played an active role in fueling demonstrations at Tiananmen square that ended in a massacre of thousands of people by Chinese authorities. Meanwhile the Tiananmen square massacre also led to a purge within the party as CCP’s general secretary Zhao Ziyang was not only replaced but was also put under house arrest.

With the arrest of Zhao as well as his secretary Bao Tong, both of whom backed Soros and his China Fund, the Chinese authorities began their crackdown. Soros immediately shut the shop leaving many of his Chinese associates in the lurch and at the mercy of Chinese authorities.

MSS, in its updates to the top party bosses, days before the Tiananmen massacre happened gave details about the role of China Fund as a CIA front in fueling these demonstrations.

According to The Tiananmen Papers, a huge cache of internal CCP reports related to the massacre, that was leaked later, the MSS told the party bosses, “Our investigations have revealed that Liang Heng, the personal representative of the (China Fund) chairman George Soros, was a suspected US spy. Moreover, four American members of the foundation’s advisory committee had CIA connections.”

“According to the MSS’s narrative, Soros showed his ‘true colors’ by asking Yu to close the fund in May 1989 once he realized that supporters of reform were being purged,” observed Joske.

Soros co-chaired the China Fund-CICEC partnership with a top-level Chinese spy master Yu Enguang (also known as Yu Fang). The MSS used the funds provided by Soros’ China Fund to finance many of its operations. Had there not been an internal turmoil in the Chinese Communist Party throwing Soros’ supporters in the Chinese establishment out of power, Soros would have been working closely with an authoritarian Chinese government and continued to play the ‘double game’ ultimately benefiting his business interests from both sides. This history of Soros with the Chinese also exposes his double speak as he claims to be the champion of democracy!

What a Chinese spy agency the Ministry of State Security disrupts the world

MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.

國家安全部 ‘Guójiā ānquán bù’ MSS facilities

國家安全部 ‘Guójiā ānquán bù’ MSS facilities in Xiyuan, Haidian District, Beijing. Image courtesy: Wikimedia commons

China’s premier spy agency Ministry for State Security (MSS) has been on the forefront of setting up and running a ruthless global espionage and counter-espionage network.

MSS was set up in 1983 to bring together multiple agencies which were already functional so that Chinese spy networks could work more cohesively as well as ruthlessly.

Officially the proposal to set up this agency was brought by Zhao Ziyang at the first session of the sixth National People’s Congress (NPC) on June 20, 1983. The NPC can be broadly termed as the Parliament of China.

Ziyang proposed the establishment of a state security ministry “to protect the security of the state and strengthen China’s counterespionage work.” The NPC approved it and voted to appoint Ling Yun as the first minister.

The inaugural meeting of the MSS was held on 1 July 1983 to announce the formal establishment of the. The opening speech was delivered by chairman Chen Pixian of the ‘Central Political-Legal Commission’ one of the key bodies of CCP. He categorically said, “Doing state security work well will effectively promote socialist modernization and the cause of realizing the unification of the motherland opposing hegemonism and defending world peace.” The Chinese intent was clear: MSS would be its ace espionage and counter-intelligence agency.

Since President Xi Jinping took over the reins of the Communist Party of China (CCP) and the Chinese establishment in 2012, MSS has been endowed with even greater authority and its sphere of influence has increased significantly. In Xi Jinping’s scheme of things, Chinese espionage agencies, especially MSS, lead from the front to change the existing world order.

Since the remit of China’s intelligence agencies is much broader than those of Western nations, they need more resources, and Xi Jinping has made sure they receive them, say Clive Hamilton and Mareike Ohlberg in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World.

Roger Faligot (Chinese Spies: From Chairman Mao to Xi Jinping) has written, there has been a “formidable increase in the authority of the Chinese intelligence apparatus, specifically since 2017”.

The MSS indulges in all kinds of dubious clandestine activities including sabotage, industrial espionage, theft of technology. It has created several fronts in the form of think tanks and trade and cultural bodies to carry out such activities. The prominent among them are China Institute of Contemporary International Relations, China Reform Forum and Chinese Association for the Promotion of Cultural Exchange and Cooperation.

Structure of MSS

Last known, MSS has 18 bureaus spread over at least four compounds in Beijing serving as their headquarters and then they have provincial and other local networks within China as well as a global network. The functions of many of them are not yet known. China Institute of Contemporary International Relations is the public façade of 11th bureau of MSS. Peter Mattis and Matthew Brazil have painstakingly gathered some details about these bureaus in ‘Chinese Communist Espionage: A Primer’ such as:

“     • First Bureau: “secret line” operations by MSS officers not under covers associated with Chinese government organizations.

  • Second Bureau: “open line” operations by MSS officers using diplomatic, journalistic, or other government-related covers.
  • Fourth Bureau: Taiwan, Hong Kong, and Macau.
  • Fifth Bureau: Report Analysis and Dissemination.
  • Seventh Bureau: Counterespionage Intelligence Bureau, gathers information and develops intelligence on hostile intelligence services inside and outside China.
  • Eighth Bureau: Counterespionage Investigation, runs investigations to detect and apprehend foreign spies in China.
  • Ninth Bureau: Internal Protection and Reconnaissance Bureau, supervises and monitors foreign entities and reactionary organizations in China to prevent espionage.
  • Tenth Bureau: Foreign Security and Reconnaissance Bureau, manages Chinese student organizations and other entities overseas and investigates the activities of reactionary organizations abroad.
  • Eleventh Bureau: China Institutes of Contemporary International Relations, performs open-source research, translation, and analysis. Its analysts also meet regularly with foreign delegations and spend time abroad as visiting fellows.
  • Twelfth Bureau: Social Affairs or Social Investigation Bureau, handles MSS contributions to the CCP’s united front work System (also known as United Front Works Department-UFWD, which is another major espionage network of Chinese government and CPC).
  • Thirteenth Bureau: Network Security and Exploitation (also known as the China Information Technology Evaluation Center, manages the research and development of other investigative equipment.
  • Fourteenth Bureau: Technical Reconnaissance Bureau, conducts mail inspection and telecommunications inspection and control.
  • Fifteenth Bureau: Taiwan operations linked to the broader Taiwan Affairs work system. Its public face is the Institute of Taiwan Studies at the China Academy of Social Sciences.
  • Eighteenth Bureau: US Operations Bureau for conducting and managing clandestine intelligence operations against the United States.”

There is hardly any information about the real work done by the third, sixth, sixteenth and seventeenth bureau of the MSS.

According to an online report by China Digital published in 2015, the MSS had a strength of 100,000 ‘spies’. Around 60,000 of them worked within China while 40,000 of them were working in other countries for China.

Explaining this mammoth size and the massive expansion of MSS, Mattis and Brazil elaborated, “The expansion occurred in four waves. The original departments (or those created within the first year) appeared to be the municipal bureaus or provincial departments of state security for Beijing, Fujian, Guangdong, Guangxi, Heilongjiang, Jiangsu, Liaoning, and Shanghai. A second wave appeared shortly thereafter between 1985 and 1988, including Chongqing, Gansu, Hainan, Henan, Shaanxi, Tianjin, and Zhejiang. The third wave from 1990 to 1995 completed the expansion of the ministry across the country at provincial levels, bringing in Anhui, Hunan, Qinghai, and Sichuan provinces.161 The fourth wave of MSS expansion was vertical. The provincial-level departments either took over local public security bureaus or established subordinate municipal or county bureaus. For many local PSB officers, they were police one day and state security the next. When MSS minister Jia left in 1998 for the MPS, the MSS was a nationwide organization at every level.”

“From the national level to the local levels, the MSS and its subordinate departments and bureaus report to a system of leading small groups, coordinating offices, and commissions to guide security work while lessening the risk of politicization on behalf of CCP leaders. At present, the two most important of these are the Political-Legal Commission and the Central State Security Commission.”

Clive Hamilton and Mareike Ohlberg have mentioned in Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World, “It was reported in 2005 that the FBI believed the MSS had set up around 3000 front companies to conceal its activities. The MSS has various arms engaged in economic espionage and it has ‘embedded itself deep in major financial and commercial organizations, particularly in Shanghai and Hong Kong’. Not all economic espionage is state directed. Chinese nationals are known to set up firms that take orders from companies in China to obtain and supply specific pieces of intellectual property from their competitors in the West, usually by identifying an employee willing to provide such secrets.”

Bloody Purge within MSS

While MSS has successfully infiltrated many spy agencies of other countries, it also suffered a major setback when in 2010, it was revealed that there are several Central Intelligence Agency (CIA) moles working in China and MSS for the American agency.

This led to a bloody purge within MSS. The CIA assets were exposed because of a botched-up communication system of the US spy agency. It reportedly used the same equipment in China which it was using to communicate with its operatives in the middle east. But the Chinese spy agency was much more efficient than the middle east and the CIA underestimated its tech capability. MSS was able to crack this communication network. According to various reports, anywhere between one dozen to two dozen operatives of the CIA were rounded up and executed over a period of two years by the MSS. The CIA did manage to take out many of its ‘assets’ but it had to suffer a major loss.

According to a report published in the journal Foreign Policy in 2018, “It was considered one of the CIA’s worst failures in decades: Over a two-year period starting in late 2010, Chinese authorities systematically dismantled the agency’s network of agents across the country, executing dozens of suspected US spies.”

Recruitment and working pattern.

One of the key methods deployed by MSS is to use the Chinese diaspora to create assets in other countries. Its first bureau plays a significant role in this regard. A survey done by the US-based Centre for Strategic Studies gives an indication about MSS’ approach towards espionage. This survey listed 160 publicly reported instances of Chinese espionage directed at the United States since 2000. According to the survey report:

  • 42% of actors were Chinese military or government employees.
  • 32% were private Chinese citizens.
  • 26% were non-Chinese actors (usually U.S. persons recruited by Chinese officials)
  • 34% of incidents sought to acquire military technology.
  • 51% of incidents sought to acquire commercial technologies.
  • 16% of incidents sought to acquire information on U.S. civilian agencies or politicians.
  • 41% of incidents involved cyber espionage, usually by State-affiliated actors.

According to Hamilton and Ohlberg, “Ego, sex, ideology, patriotism, and especially money is all exploited by China’s intelligence services to recruit spies. In 2017 an FBI employee, Kun Shan Chun (Joey Chun), was convicted of supplying information about the bureau’s organization and operations to Chinese agents, in exchange for free international travel and visits to prostitutes. Among those who spy for China, ideology is a factor mainly for people of Chinese heritage (unlike during the Cold War, when Westerners spied for the USSR for ideological reasons). Beijing also deploys the threat of punishment of family members in China if a target refuses to cooperate.

UFWD: ‘Magic weapon’ in China’s espionage arsenal

The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones

Chinese President Xi Jinping

One of the key constituents of the global Chinese Spy Network is the United Front Work Department (UFWD). It is entrusted with coordination and operational aspects of ‘united front’ activities. The Chinese initially defined ‘united front’ more as a concept. Later it set up UFWD to carry out these activities as the nodal agency.

Background

The UFWD’s work is inspired by the Leninist theory of uniting with lesser enemies to defeat greater ones. Since its founding, this has been a key element of the Chinese Communist Party’s (CCP) strategy to consolidate its hold on power, both domestically and internationally.

The UFWD’s first deployment was to join and subvert the then ruling Nationalist government, the Kuomintang, in the early 1920s. A 2018 research report by US-China Economic and Security Review Commission explained it further, “The CCP then formed an alliance of convenience with the Kuomintang to discourage it from trying to wipe out the fledgling CCP while uniting their efforts against Japan.”

According to Gerry Groot, senior lecturer at the University of Adelaide and renowned expert on the United Front, this campaign evolved into a systematic effort to recruit “fellow travelers,” mostly “famous intellectuals, writers, teachers, students, publishers, and businesspeople who were not necessarily Communists.”

Modus Operandi

The modus operandi of the UFWD is one of the least discussed issues in the public domain when it comes to Chinese covert operations. It is not surprising as UFWD operates through a complex web of organizations which act as a front for united front work.

There are thousands of organizations which work for UFWD under the garb of cultural, educational, commercial, and philanthropic organizations. Alex Joske explains the philosophy behind UFWD in his groundbreaking expose of Chinese intelligence operations Spies and Lies, “Party leaders since Mao Zedong have referred to the united front as one of their three ‘magic weapons’. Together with armed struggle and efforts to strengthen Party organization, the two other magic weapons, the CCP credits the united front work with major contributions to its victory in 1949, China’s modernization and subsequent economic development.”

The key task of UFWD is to build a global network of influencers and ‘operators’ who manipulate the global narrative by hook or crook.  The UFWD specifically brings into its spy net intellectuals, local community leaders, religious and ethnic figures, journalists, academia, and business magnates.

According to Joske, recent cases from around the world have shown, the (Chinese Communist) Party seeks to insert itself into segments of diaspora communities and then mobilize them as political influence. Co-optees can be used to suppress dissidents, make political donations, mentor political candidates and staffers, and otherwise apply pressure in support of Beijing’s interests.

In a 2020 research paper on UFWD, ASPI said, “There’s no clear distinction between domestic and overseas united front work: all bureaus of the UFWD and all areas of united front work involve overseas activities. This is because the key distinction underlying the United Front is not between domestic and overseas groups, but between the CCP and everyone else. For example, the UFWD’s Xinjiang Bureau plays a central role in policy on Xinjiang but is also involved in worldwide efforts to whitewash the CCP’s internment of an estimated 1.5 million people in Xinjiang, primarily ethnic Uyghur Muslims, as an anti-terrorism and vocational training effort.”

Structure

The UFWD follows the directions given by an important CCP body known as the Chinese People’s Political Consultative Conference (CPPCC). The latter is led by a member of the CCP’s Politburo Standing Committee.

According to the latest information available, UFWD has a presence across all provinces in China, in all its embassies abroad, in foreign universities and in various international trade organizations as well as in civil society also. According to the ASPI report, “Internally, the department has 10 leaders, at least six of whom hold ministerial rank or higher. It has 12 bureaus, half of which were created after 2015. Bureaucratic changes in 2018 that brought overseas Chinese affairs under the UFWD’s ‘unified management’ also injected dozens if not hundreds of officials with substantial overseas experience into the department. Jinan University, Huaqiao University and the Central Institute of Socialism in Beijing are all subordinate to the UFWD and carry out research and training to support its efforts. Additionally, the UFWD runs dedicated training facilities, such as the Jixian Mountain Estate, which is a complex in the outskirts of Beijing used for training China Overseas Friendship Association cadres.”

Organizations such as the China Overseas Friendship Association, are part of the ‘united front system’. At least two such organizations held special consultative status as non-governmental organizations in the UN Economic and Social Council. According to an ASPI report, “In 2014, an official from one of them, the China Association for Preservation and Development of Tibetan Culture, was barred from a UN human rights hearing after he intimidated a woman testifying about her father, political prisoner Wang Bingzhang.”

The 12 bureaus of UFWD

UFWD’s 12 bureaus deal with separate tasks. Here is how the work has been distributed to them:

First Bureau: Minor Parties Work Bureau (Oversees China’s eight democratic parties)
Second Bureau: Deals with Ethnic Affairs
Third Bureau: Deals with Hong Kong, Macau and Taiwan
Fourth Bureau: Deals with business persons and private companies
Fifth Bureau: Non-Affiliated and Minor Party Intellectuals related work
Sixth Bureau: Targets urban professionals such as employees of foreign companies
Seventh Bureau: Handles Tibet related issues
Eighth Bureau: Handles issues related to Xinjiang province
Ninth Bureau: Overseas Chinese affairs (regional responsibilities)
Tenth Bureau: Overseas Chinese Affairs (Media, Cultural and educational activities)
Eleventh Bureau and Twelfth Bureau: Issues related to religion

Xi Jinping and UFWD

Though UFWD has always been used by the CCP as a key element of its spy network, Xi Jinping pushed it to a new high after he took over as Chinese President in 2012. In 2015, Xi declared in an important central united front work meeting, “The United Front … is an important magic weapon for strengthening the party’s ruling position … and an important magic weapon for realizing the China Dream of the Great Rejuvenation of the Chinese Nation.”

More than 40,000 new personnel were recruited for different wings of UFWD within a few years of Xi taking over the reins of CCP. Xi’s specific focus on UFWD shouldn’t surprise those who know his background. Xi Jinping’s father Xi Zhongxun was known for carrying out UFWD missions in Tibet. One of his key assignments was to influence the Dalai Lama and Panchen Lama. As a Politburo member he supervised the UFWD work in the 1980s. Xi rose in the party by climbing through CCP ranks in Fujian province which is known to be a hotbed of united front activities targeting Taiwan. In 1995, he wrote a paper on united front work in the Chinese diaspora. He advocated several new ideas in this paper regarding UFWD which he started implementing in 2012 and expedited it further after the 2015 conference of united front work.

The result is evident. Countries like Australia, US, Canada have exposed how Chinese have been using their spying arms like UFWD to create a deep Chinese state in their countries especially in their political and policy making sphere.

What Jamie Watt, a contributing Columnist to The Toronto Star, wrote in his column on 23 February 2023, would aptly explain the lethalness of Chinese ‘magic weapons’ such as UFWD. Commenting on how incriminating evidence has come out regarding Chinese interference in Canadian elections benefitting Justin Trudeau’s party, Watt wrote: “Just this past week, the Globe and Mail reported news from CSIS that Canadian politicians, government officials, business executives and Chinese Canadians all have been prime targets of Chinese government espionage. This espionage has deployed blackmail, bribery, and sexual seduction. The range and nature of the tactics used are usually reserved for spy novels, but national security experts now deem China’s espionage infrastructure to go far deeper than even the Soviet’s efforts at the height of the Cold War.”

Watt sounds an alarm bell about Canada which explains how Chinese espionage works through organs like UFWD, “It is time that we understand our politicians have proven incapable of addressing Chinese state influence. Chinese aren’t just at our gates, they own them. And they’re standing idly by flipping us the bird.”

A US State Department report on China’s Coercive Activities Abroad specifically highlights the role of UFWD as it says, “The CCP’s United Front Work Department (UFWD) is responsible for coordinating domestic and foreign influence operations, through propaganda and manipulation of susceptible audiences and individuals. The CCP’s United Front permeates every aspect of its extensive engagements with the international community. It targets the highest levels of Western democracies; creates a permanent class of China lobbyists whose primary job is to sell access to high level Chinese leaders to corporate America. The United Front has also penetrated deeply into state, local and municipal governments through a myriad of front organizations such as the CCP’s sister-cities programs, trade commissions, and friendship associations.”

This report also reiterates that China considers UFWD to be its ‘magic weapon’ used by China to dominate the world and manipulate the global narrative.

Chinese Military intelligence: How a mammoth war machine plays spy games across the globe.

India remains one of the primary targets of the Chinese espionage network. And Chinese military has a significant role to play in this game of cloak and dagger.

One of the key elements of the Chinese espionage network is the military intelligence that it has been able to keep under wraps. What we are witnessing is a new avatar of Chinese Military intelligence under President Xi Jinping who as a head of the Central Military Commission directly controls the Chinese military.

He started restructuring the Chinese military in 2015-16 and that also included revamping of the Chinese military intelligence network. Peter Mattis explained the importance and implications of this exercise of Chinese espionage network in China reorients strategic military intelligence (Janes, 2017), “On 26 November 2015, Chinese president Xi Jinping announced the first significant revision of the People’s Liberation Army (PLA) since its reorganization during the 1950s, when the PLA transformed from an army fighting a civil war to one capable of protecting a nation-state. The reforms removed the Soviet-inspired system of general departments, established a new division of labour, and realigned the PLA organizationally to better fulfil the Military Strategic Guidelines that state the goal of winning informationized local wars.”

“Many elements of the PLA’s modernization effort in the past 25 years have had strictly military implications, but this round of reforms reaches far beyond the Chinese military to reshape how the leadership receives information. To reinforce the Central Military Commission’s (CMC’s) control over operational forces and provide better battlefield intelligence support, the PLA created the Strategic Support Force (PLASSF). The new force consolidated much of the PLA’s technical collection capabilities to direct them towards supporting military operations.”

Chinese Military Intelligence Arm: Joint Staff Department

The Chinese military intelligence arm has been innocuously named as Joint Staff Department (JSD). Earlier it was known as 2PLA or second department of the PLA (People’s Liberation Army) General Staff Department. The JSD came into existence around seven years ago.

According to Clive Hamilton and Mareike Ohlberg (Hidden Hand: Exposing How the Chinese Communist Party is Reshaping the World), “The Intelligence Bureau of the CMC Joint Staff Department is not only responsible for military intelligence but also has a history of extensive activity in civilian domains. It draws on military attachés and signals intelligence to gather intelligence. The Joint Staff Department has its own think tanks — the China Institute for International Strategic Studies, which focuses on research, and the China Foundation for International and Strategic Studies, which engages in academic and policy exchanges. Its Institute of International Relations (now part of the National University of Defense Technology) trains military attachés and secret agents.”

Structure of Chinese Military Intelligence Apparatus

The Chinese Communist Party (CCP) controls the PLA through its Central Military Commission. President Xi Jinping has been the chairman of the CMC ever since he came to power in 2012.

According to a US Congressional Research Report published in June 2021, China’s current military modernization push began in 1978 and accelerated in the 1990s. Xi Jinping, the General Secretary and “core leader” of the CCP, Chairman of the CCP’s Central Military Commission, and State President, has continued to make military modernization a priority and has linked military modernization to his signature issue: the “China Dream” of a modern, strong, and prosperous country.

‘In 2017, Xi formalized three broad goals for the PLA: (1) to achieve mechanization of the armed forces and to make significant progress toward what the United States would call a “networked” force by 2020; (2) to “basically complete” China’s military modernization process by 2035; and (3) to have a “world-class” military by 2049, the centenary of the establishment of the PRC. Xi has initiated the most ambitious reform and reorganization of the PLA since the 1950s, to transform the military into a capable joint force as well as to further consolidate control of the PLA in the hands of Xi and the CCP.’

Institute for Critical Infrastructure Technology (ICIT), a Washington-based think tank has worked extensively on detailing the structure of Chinese military intelligence through their senior fellow James Drew and Researcher Scott Spaniel. According to Scott and Spaniel, “The People’s Liberation Army (PLA) Joint Staff Department (JSD) replaced the General Staff Department on January 11, 2016, as part of Xi Jinping’s military reforms. It manages most military and covert operations. The JSD, as a division of the PLA, is dedicated to warfare. The duties of the PLA JSD include PLA Operations Command, Recruitment, Mobilization, Formation, Training, and Administration.”

Second and Third Department

The JSD has three departments which work in coordination to conduct various intelligence operations. These departments deal respectively with electronic intelligence, human intelligence, and signal intelligence. The section within the PLA’s Joint Staff Department that deals with conventional human intelligence (HUMINT) is known as ‘Second Department’.

James Scott and Drew Spaniel estimated in their 2016 book, China’s Espionage Dynasty, that this department had around 30,000–50,000 agents around the world. Their primary task is to collect useful, relevant, and confidential information and send it back to China.

‘A common misconception is that agents of the Chinese government are “sloppy”; however, agents of the second department who serve as high level spies or handlers are rarely caught. Rather, low-level assets, often belonging to the overt structure, are more often detected by foreign intelligence agencies.’

The Third Department which is entrusted with the task of signals intelligence (SIGNIT). According to Drew and Spaniel, “The Third Department is the largest intelligence agency in the Chinese government, consisting of an estimated 250,000- 300,000 linguists, technical staff, and cyber soldiers. There are at least four known Research Institutes (56, 57, 58, and 61) under the Third Department. Within the 61 Research Institute are approximately 20 bureaus that launch cyberattacks. The Third Department intercepts phone calls, launches cyberattacks, and monitors communications. Much of its efforts involve hacking devices and exfiltrating targeted data. The Third Department may launch obvious cyberattacks, such as DDoS or ransomware attacks, against target systems to mask the activity of Second Department operatives.”

Fourth Department

The Fourth Department is responsible for electronic intelligence (ELINT) operations. Its prime focus is on intercepting satellite and radar data. The operatives of Fourth Department are experts in altering, jamming, or spoofing of signals.

“It is believed that the Fourth Department research direct methods of disabling enemy communication networks. State-Sponsored APTs (i.e., Chinese state sponsored advanced persistent threats) can be identified based on their choice of targets, their proclivity for cyberespionage, and the language settings on the keyboards used to develop the malware, and their connections to other campaigns. Some groups, such as APT 1 (Unit 61398), APT 2 (Unit 61486) and APT 30 (Unit 78020) can be linked to specific units within the Third Department. Other APTs remain less defined.”

PLA Unit 61398

In May 2014, five officers of the PLA who belonged to its unit ‘61398’ commonly known for cyber espionage and cyberattacks were indicted by a US court. Several cyber security firms have reported about the clandestine operations of this unit which is one of the key parts of the Chinese Military Intelligence apparatus. This unit primarily targets countries with flourishing democracies as they are a perfect antidote to the Chinese authoritarian system. Hence along with several other countries, India has also been one of their targets. Several cyberattacks on the Indian establishment are believed to have been carried out by this unit. It is reportedly headquartered in Datong Avenue of Pudong district in Shanghai. There has been a consistent spurt in its activities.

Conclusion

The Chinese military intelligence is committed to pursue the so-called vision of Xi Jinping and peddle a pro-China global narrative. China Institute of International Studies (CIIS), a front form the Chinese military intelligence network, carried a detailed comment on India. Authored by Lan Jianxue, Director of the Department for Asia-Pacific Studies at CIIS, this is what Chinese military intelligence conveyed, “Noticeably, the connotation of the so-called Asian Century, as understood by the United States, is not quite the same as that understood by the Chinese. The expression “Asian Century” was coined by former Chinese leader Deng Xiaoping in 1988. Deng pointed out that no genuine Asian Century can come until China, India and other neighboring countries are developed.

It is clear the United States remains one of the primary targets of the Chinese espionage network. And the Chinese military has a significant role to play in this game of cloak and dagger.

Chinese General: If hostile forces invade my network sovereignty China can use military means to fight & hack back // 中國將軍:如果敵對勢力入侵我的網絡主權,中國可以用軍事手段進行反擊和反擊

Chinese General: If hostile forces invade my network sovereignty China can use military means to fight & hack back //

中國將軍:如果敵對勢力入侵我的網絡主權,中國可以用軍事手段進行反擊和反擊

(安卫平,北部战区副参谋长)

Original: “National Defense Reference”, No. 3, 2017

The cyberspace was born in the military field. For example, the first computer, the APA network and the GPS navigation system all originated from the military. Today, cyberspace security has been closely related to national security, and the military has once again become the protagonist of maintaining national cyberspace security. Whether facing normalized network penetration or large-scale cyberattacks, it is urgent for the military to move from guarding the “network camp gate” to guarding the “network country gate”, breaking through the traditional military missions and missions, and breaking through the traditional war preparation mode. With a new network of national defense thinking, the founding of the network era of the country’s strong shield.

From the “network camp door” to the “network country door”, the new era brings a new trend of military mission

Cyberspace is not only related to the maintenance of national strategic interests, but also directly affects political, economic, cultural security and social development. It has also become the blood and link of modern battlefield joint operations. The Chinese military cannot be limited to maintaining the internal network security of the military camp. It must also actively adapt to the trend of the times and take the responsibility of the country that guards the “network country.” Network strong army is an important part of the construction of a network powerhouse. From the “network camp door” to the “network country door” is the inevitable trend of the development of the domestic and international situation in the information age.

Guarding the “network country door” is forced by the cyberspace security situation. As the first big Internet country, China’s security situation is not optimistic, and strategic opponents have never stopped preparing for our network operations. The United States, Britain, France and other countries are actively preparing for cyberspace, giving military functions through cyberspace security legislation, developing cyber warfare forces, developing cyber warfare weapons and equipment, and advancing war to the “fifth space” of mankind, especially in China. In the historical process of the rise, under the leadership of the Cold War mentality and the containment subversion strategy, Western countries have used network technology and communication methods to implement uninterrupted harassment, subversion and cyberattacks, seriously affecting China’s national security and social development, and China has gradually become The hardest hit by cybersecurity threats, the test sites for virus attacks, and the destinations of conscious penetration, national security faces enormous risks.

In the coming period, as a new emerging country, China’s conflicts of interest with other parties will intensify. Firmly promoting the network defense strategy and strengthening the operational preparation of cyberspace are the inevitable ways to actively strive for the dominance and discourse power of cyberspace, and also the rise of China. The only way to go. As the main force of national security and stability, the military must adapt to the characteristics of cyberspace characteristics, become the backbone and main force to resist network intrusion and network subversion, and safeguard national security and social stability.

Winning cyber warfare is the trend of new military revolution in the information age. As one of the most advanced productivity in the information age, network technology has made cyberspace warfare a leading factor in guiding the evolution of modern warfare and affecting the overall situation of war. In recent years, from the “seismic net” attack in Iran, the cyber warfare in the Russian-Georgian conflict, the large-scale obstruction of the Ukrainian power grid, and the cyberattack of the US military against IS, the huge role played by cyberspace in actual combat has gradually emerged, indicating that cyber warfare Has become an important style of future joint operations.

The US military attaches great importance to the construction of cyberspace armaments, the establishment of the cyberspace command, the launch of cyberspace joint operations, the extensive expansion of cyber warfare forces, the maintenance of its cyberspace hegemony, and the formation of cyberspace control capabilities as a “third offset strategy”. “Absolute advantage is the most important competitive content.

Many countries in the world have followed suit, and the trend of militarization of cyberspace is obvious. The rigorous cyberspace military struggle situation requires the Chinese military to focus on the changes in the network battlefield space, adapt to the requirements of the information war era, and achieve the strong military goal of smashing and winning in cyberspace.

Effective network warfare is an intrinsic need to accelerate the construction of a network powerhouse. In the process of China’s development from a network power to a network power, it is inseparable from the strong cyberspace military power as a guarantee. The international competition in cyberspace is a comprehensive game of the country’s comprehensive strength. Among them, the quality of network military capacity building is directly related to national security and stability, and it is the core element of the entire national security field.

At present, the interests of countries in the world in the cyberspace are mutually infiltrated, and there is a situation in which you have me, I have you, cooperate with each other, and develop together. However, this kind of common development is not equal. The US and Western powers have taken advantage of the cyberspace dominance and have already achieved certain network warfare advantages, which has made my network development and interests subject to people. How can the military fulfill its mission of defending the earth in the construction of a network-strength country? The premise is to form a network environment that can contain the crisis and control the opponent’s network attack and defense capabilities and ensure peaceful development.

Therefore, the military needs to establish a deterrent strategic goal of effective warfare, form a strategic check and balance ability that can “destroy each other” with the enemy, thereby enhancing strategic competitiveness, ending cyberspace aggression, and ensuring the smooth advancement of the network power strategy.

From “keeping the soil to the responsibility” to “protecting the net and defending the country”, the new situation requires the military to undertake new tasks.

The military is the main force and pillar of national security, and cyberspace is no exception. The National Security Law, which was enacted on July 1, 2015, stipulates: “Citizens of the People’s Republic of China, all state organs and armed forces, political parties and people’s organizations, enterprises and institutions, and other social organizations have the responsibility to safeguard national security. And obligations.” The Cyber ​​Security Law, promulgated in November 2016, emphasizes the need to maintain cyberspace sovereignty and national security.

On the basis of the laws of these two countries, on December 27, 2016, the National Cyberspace Security Strategy (hereinafter referred to as the “Strategy”) was officially launched, providing overall guidance for creating a new pattern of network powers at a new starting point. Basically follow, clearly put forward nine strategic tasks, further embodying the mission of the military in the process of building a network power.

With the national mission of protecting the network, the military must be a strong pillar to defend the cyberspace sovereignty. The first of the nine strategic tasks listed in the “Strategy” is “firmly defending the cyberspace sovereignty” and clearly proposes to “take all measures including economic, administrative, scientific, technological, legal, diplomatic, military, etc., and unswervingly maintain our network.” Space sovereignty.” It can be seen that the military must assume the military mission of using physical space and defend the national mission of the sovereign security and interests of virtual cyberspace.

Cyberspace sovereignty is the core interest of the state and an important component of national sovereignty. It indicates the independence, equal, self-defense and management power of the state in cyberspace. Once the hostile forces violated my cyberspace sovereignty, it would be equivalent to infringing on the national sovereignty of the physical space such as land, sea and air. China will have the right to take all measures including military means to give a firm response.

Internationally, the United States has long proposed a cyberspace deterrence strategy, declaring that attacks on US network information facilities are equivalent to war acts, and the United States will take military strikes to retaliate. Military means are the means of safeguarding national sovereignty and play a vital role in safeguarding national cyberspace security. Therefore, the military, air, sea and air military forces have been given the historical mission of protecting the cyberspace sovereignty. They must rely on the powerful physical space to defend the national interests of cyberspace and effectively deter the hostile forces from cyber-damaging attempts.

In accordance with the era of the Internet, the military must be the ballast stone to defend national security. The second item of the “Strategy” mission emphasizes the need to resolutely safeguard national security, prevent, deter and punish any use of the Internet for treason, secession, sedition, subversion or incitement to subvert the people’s democratic dictatorship.

In the era of information network, the military of all countries in the world has become an important participant in cyberspace. The level of cyberspace capability has become the main indicator for assessing the modernization of a country’s military. It is one of the main duties of the informationized military to carry out cyberspace missions and maintain national security.

Judging from the historical process of China’s development, it is necessary to be highly vigilant against the danger of the country being invaded, subverted, and divided in cyberspace in order to adapt to the national security strategy needs of building a well-off society in an all-round way. Highly alert to the reform caused by cyberspace. The danger of developing the overall situation is destroyed, and we are highly wary of the danger of interference and destruction in the development of socialism with Chinese characteristics.

Preventing problems before they occur requires the state to have the means to cope with and deal with these risks, and to have the powerful force to prevent, stop and legally punish cyberspace violations. Defending the country has always been an unshirkable historical responsibility of the military. The inherent mission and mission have determined that the Chinese military must assume the role of taking various measures in the cyberspace to safeguard the country’s political, economic, cultural security and social stability.

The strategic mission of both offensive and defensive, the military must be a strong backing to enhance the ability of cyberspace protection. The third and eighth items of the Nine Major Tasks in the Strategy clearly state that all necessary measures must be taken to protect key information infrastructure and its important data from attack and destruction, and that technology and management should be adhered to, protected and shocked; We will build a network space protection force that is commensurate with China’s international status and adapts to the network power. We will vigorously develop network security defense methods, timely discover and resist network intrusion, and build a strong backing for national security. Among all the political, diplomatic, military, and scientific and technological capabilities of the country to maintain security, military power has always been the foundation and support for all capabilities, the fundamental guarantee for all capabilities, and the ultimate support for national security.

Therefore, the military must undertake the strategic task of strengthening the national cyberspace protection capability. In the real society, the military is the reassurance of safeguarding national security, and it should also become the security dependence and guarantee of the people in cyberspace. As an important part of the national cyberspace protection capability, the military must achieve both offensive and defensive capabilities and a unified warfare. It has the ability to resolutely safeguard the interests and security of the country and the people in cyberspace, and effectively eliminate the various crises caused by cybersecurity threats. The turbulence of thoughts enables the people to truly feel that production and life are effectively protected and become the confidence of the people of the whole country in their confidence in the national network protection capabilities.

With the global responsibility of UNPROFOR, the military must be an important support for maintaining global cybersecurity. The last item of the “Strategy” mission clearly proposes to strengthen international cooperation in cyberspace, support the United Nations in playing a leading role, promote the development of universally accepted international rules on cyberspace, international anti-terrorism conventions on cyberspace, and improve the judicial assistance mechanism against cybercrime. International cooperation in the areas of policy and law, technological innovation, standards and regulations, emergency response, and protection of key information infrastructure.

Cyber ​​terrorism and cybercrime are new forms of global threat catalyzed by information network fermentation. They pose a huge threat to the political, economic, military and cultural security of all countries in the world. It is not enough to rely solely on the power of the government and the people. Western countries have given the military the responsibility to protect cybersecurity and the power to fight cyber terrorism. Maintaining the security and stability of global cyberspace is in the fundamental interests of China and the rest of the world. The military should become an important defender of global cyberspace security and an important force in combating global cyber terrorism and cybercrime.

The globalization and unbounded nature of the Internet determine the international demand for combating cyber terrorism and transnational cybercrime. The military should promote military cooperation in network governance between countries under the framework of the UN Security Council, and use the strategies and technologies of the network era to establish joint defense and joint defense. Mechanism to effectively safeguard the security of the national and world cyberspace.

From “field training” to “network preparation”, new areas require new preparations for the military

Under the new historical situation, cyberspace puts forward new requirements for the military training and preparation mode. It should adapt to the new characteristics of cyberspace and the new mission of the military to carry out innovative reforms on the traditional model, and take the goal of strengthening the country and strengthening the military as the overall plan, and strengthen macro-coordination. Focusing on the legal needs of military operations in cyberspace, it closely follows the natural attributes of the “military and civilian integration” of cyberspace, builds a network security attack and defense system that combines peacetime and warfare, and builds a network defense force of “military and land use”.

Legislation empowerment provides a legal basis for the military to carry out its functional mission. The countries of the world, especially the western developed countries, attach great importance to the issue of network defense in cyber security legislation. The United States has successively issued a series of policies and regulations such as “National Security No. 16 Presidential Decree”, “Network Space Action Strategy”, and has continuously deepened and standardized on how to protect national network security in the field of network defense.

At present, it is necessary to clarify the duties and responsibilities of the cyberspace military from the legal level. It should be based on the National Security Law and the Cyber ​​Security Law, and introduce the network defense law and related cyberspace military operational regulations, for the construction of the network defense field and the military. The action provides regulatory support and a program of action to make the military’s responsibilities and mission in cyberspace more specific and specific.

First, through network defense legislation to further define network sovereignty and network frontiers, clear the scope of the military’s responsibilities.

The second is to establish the operational authority of the military to defend the national cyberspace security through the construction of cyber warfare laws and regulations, and to distinguish military means against network intrusion and network destruction. Third, through the cyberspace international cooperation policy, the military will coordinate with other countries and civilian forces to combat international cyber terrorism and cybercrime.

The integration of military and civilian provides an innovative driving force for the construction of a network powerhouse. The integration of military and civilian is the main practice for the world powers to enhance the competitiveness of cyberspace. For the construction of China’s network powerhouses, building a military-civilian network security attack and defense system and developing a military-land dual-use defense information infrastructure is to inspire the innovation of military cyberspace combat capability. Source.

The first is to coordinate the military, civilian, and functional departments of the state, the military, and various levels of government, set up special command and coordination agencies, mobilize all national network forces, and build a network security attack and defense system that combines “military and civilian integration” and “peace and war.”

The second is to issue guidance on the in-depth development of cybersecurity military-civilian integration as soon as possible, and gradually carry out basic legal research and demonstration of military-civilian integration to guide the development of medium- and long-term military-civil integration.

Third, relying on the country’s existing public mobile communication network, optical fiber communication network and satellite system, the military and civilians will jointly build an information infrastructure covering the entire army of the whole country, and realize the unified construction and sharing of military and civilian.

The fourth is to establish an emergency response mechanism for military-civilian joints, increase the ability to train military authorities to control events, strengthen experts and emergency professional strength, and enhance the ability to quickly recover damaged networks or information systems.

Military-civilian joint training provides a practical environment for the generation of cyberspace military capabilities. The military-civilian sharing characteristics of cyberspace make military-civilian joint training an important means of military training in cyberspace around the world. The United States and NATO countries and other cyberspace joint military and civilian exercises have formed a series of, “network storm” and “network guards” and other exercises have attracted the participation of the government, enterprises, research institutions and even civilian hackers. Our military cyberspace military strength training also needs to attract a wide range of civil forces to participate.

First, do a good job in military and political cooperation, establish a military-civilian joint offensive and defensive drill mechanism, learn from the red-blue confrontation training methods in cyber warfare drills in developed countries such as the United States, actively build a “national network shooting range”, plan a series of joint exercises of the government and non-government organizations, and enhance the integration of military and civilian. The level of attack and defense of the network of the government and the people.

The second is to do a good job in military-enterprise cooperation, relying on net-based enterprises to set up a training field on the Internet, to promote the ability of the military and civilians to attack and defend, and jointly improve the ability to prevent unknown risks.

The third is to organize private network security companies and hacker talents, carry out network security competitions and other activities, and verify each other to jointly improve the level of network security protection technology and tactics.

The network reserve service provides a source of strength for building a powerful network army. As a backup supplement to the national defense force, reserve service has both military and civilian characteristics and is a powerful measure to realize the organic unification of cyberspace economic development and national defense construction.

First, it is led by the national security department, and overall planning is carried out according to national interests. A series of laws and regulations conducive to the construction of the network national defense reserve are introduced. From the top level, the main division of labor, promotion strategy, interest coordination, etc. of the military and civilian construction in the network defense reserve construction are solved. problem.

The second is to innovate the reserve organization and comprehensive coordination mechanism, and plan to integrate the reserve construction into all levels and fields of national network information development.

The third is to focus on the reform of the military and local management modes. Based on the management mechanisms of the provincial and municipal governments, the military, and local enterprises and institutions, establish a network of national defense reserve personnel to jointly cultivate and use the mechanism, improve the national emergency mobilization mechanism, and establish a national network defense special talent. The database will include the construction of network militia and reserve forces into the scope of mobilization of the people’s armed forces. In normal times, they will be incorporated into the militia emergency detachment for training. In an emergency, select the capable personnel to participate in the non-war military operations missions, and the wartime will be recruited according to the requirements. To transform the national defense potential into national defense strength. 

Original Mandarin Chinese:

原載:《國防參考》2017年第3期

網絡空間誕生於軍事領域,如首台計算機、阿帕網和GPS導航系統等都源於軍方,時至今日,網絡空間安全已與國家安全息息相關,軍隊又再次成為維護國家網絡空間安全的主角,無論是面對常態化的網絡滲透,還是大規模的網絡攻擊,都迫切需要軍隊從守衛“網絡營門”走向守衛“網絡國門”,突破傳統的軍隊使命任務,突破傳統的應戰備戰模式,以全新的網絡國防思維,鑄造網絡時代國之堅盾。

從“網絡營門”到“網絡國門”,新時代帶來軍隊使命新趨勢

網絡空間不僅事關國家戰略利益維護,直接影響政治、經濟、文化安全和社會發展,也成為現代戰場聯合作戰的血脈和紐帶。中國軍隊不能局限於維護軍營內部網絡安全,更要主動適應時代趨勢,勇於承擔把守“網絡國門”的國家擔當。網絡強軍是網絡強國建設的重要一環,從“網絡營門”走向“網絡國門”是信息時代國內外形勢發展的必然趨勢。

守衛“網絡國門”是網絡空間安全形勢所迫。中國作為第一網絡大國,安全狀況不容樂觀,戰略對手從未停止對我網絡作戰準備。美、英、法等國積極備戰網絡空間,通過網絡空間安全立法賦予軍隊職能,發展網絡戰部隊,研發網絡戰武器裝備,將戰爭推進到了人類的“第五空間”,特別是在中國日益強大崛起的歷史進程中,西方國家在冷戰思維和遏制顛覆戰略的主導下,利用網絡技術手段和傳播方式實施不間斷的騷擾、顛覆和網絡攻擊行動,嚴重影響我國家安全與社會發展,中國逐漸成為網絡安全威脅的重災區、病毒攻擊的試驗場、意識滲透的目的地,國家安全面臨著巨大風險。

未來一段時期內,中國作為新興大國,與各方利益衝突還將加劇,堅定推進網絡國防戰略,加強網絡空間的作戰準備,是積極爭取網絡空間的主導權和話語權的必然途徑,也是中國崛起的必由之路。軍隊作為國家安全穩定的主要力量,必須適應網絡空間特點要求,成為抗擊網絡入侵、網絡顛覆的中堅和主力,維護國家安全和社會穩定。

打贏網絡戰爭是信息時代新軍事變革所趨。網絡技術作為信息時代最先進生產力之一,使得網絡空間作戰成為引導現代戰爭形態演變的主導因素,影響著戰爭全局。近年來,從伊朗“震網”攻擊、俄格衝突網絡戰、烏克蘭電網遭大規模阻癱以及美軍對IS的網絡攻擊,網絡空間在實戰中所展現出的巨大作用逐漸顯現,預示著網絡作戰已成為未來聯合作戰重要樣式。

美軍高度重視網絡空間軍備建設,成立網絡空間司令部,推出網絡空間聯合作戰條令,大幅度擴編網絡戰部隊,極力維護其在網絡空間霸權,把對網絡空間控制能力作為形成“第三次抵消戰略”絕對優勢最重要的競爭內容。

世界多國紛紛跟進,網絡空間軍事化趨勢明顯。嚴峻的網絡空間軍事鬥爭形勢要求中國軍隊著眼網絡戰場空間變化,適應信息化戰爭時代要求,實現在網絡空間能打仗、打勝仗的強軍目標。

有效網絡懾戰是加速網絡強國建設內在所需。在中國由網絡大國向網絡強國發展過程中,離不開強大的網絡空間軍事力量作為保障。網絡空間國際競爭表現為國家綜合實力的全面博弈,其中,網絡軍事能力建設的好壞,直接關係到國家安全與穩定,牽一發而動全身,是整個國家安全領域的核心要素。

當前,世界各國在網絡空間的利益互相滲透,出現“你中有我、我中有你,互相合作,共同發展”的局面。但是這種共同發展是不對等的,美國及西方強國利用網絡空間主導權,已經取得了一定的網絡懾戰優勢,使我網絡發展及利益受制於人。軍隊如何在網絡強國建設中完成守土有責的使命重托,前提就是要形成能夠遏制危機、懾控對手的網絡攻防能力,確保和平發展的網絡環境。

因此,軍隊需要確立有效懾戰的威懾戰略目標,形成能與敵“相互摧毀”的戰略制衡能力,從而增強戰略競爭力,懾止網絡空間侵略,保障網絡強國戰略順利推進。

從“守土有責”到“護網衛國”,新形勢要求軍隊承擔新任務

軍隊是保衛國家安全的主力和柱石,網絡空間也不例外。 2015年7月1日施行的《國家安全法》規定:“中華人民共和國公民、一切國家機關和武裝力量、各政黨和各人民團體、企業事業組織和其他社會組織,都有維護國家安全的責任和義務。”2016年11月頒布的《網絡安全法》強調了要維護網絡空間主權和國家安全。

在這兩個國家法律的基礎上,2016年12月27日,《國家網絡空間安全戰略》(下文簡稱《戰略》)正式出台,為在新的起點上開創網絡強國新格局提供了總體指導和基本遵循,明確提出了九大戰略任務,進一步體現了軍隊在建設網絡強國進程中的使命任務。

全力護網的國家使命,軍隊要做捍衛網絡空間主權的堅強柱石。 《戰略》中列出的九大戰略任務首項就是“堅定捍衛網絡空間主權”,明確提出要“採取包括經濟、行政、科技、法律、外交、軍事等一切措施,堅定不移地維護我國網絡空間主權”。可見,軍隊須承擔起運用實體空間的軍事手段,保衛虛擬網絡空間主權安全和利益的國家使命。

網絡空間主權是國家的核心利益,是國家主權的重要組成,表明國家在網絡空間所擁有的獨立權、平等權、自衛權和管理權。一旦敵對勢力侵犯了我網絡空間主權,就等同於侵犯了我陸海空等實體空間的國家主權,中國將有權利採取包括軍事手段在內的一切措施給予堅決回擊。

在國際上,美國早就提出網絡空間威懾戰略,宣告對美國網絡信息設施的攻擊等同於戰爭行為,美國會採取軍事打擊措施進行報復。軍事手段是維護國家主權的保底手段,在維護國家網絡空間安全中發揮著至關重要的作用。因此,陸海空天軍事力量理所應當地被賦予了保護網絡空間主權的歷史使命,必須憑藉強大的實體空間武力保衛網絡空間的國家利益,有力震懾敵對勢力的網絡破壞企圖。

依網衛國的時代擔當,軍隊要做保衛國家安全的壓艙石。 《戰略》任務的第二項著力強調要堅決維護國家安全,防範、制止和依法懲治任何利用網絡進行叛國、分裂國家、煽動叛亂、顛覆或者煽動顛覆人民民主專政政權的行為。

信息網絡時代,世界各國軍隊都已經成為網絡空間重要參與者,網絡空間能力水平成為評估一個國家軍隊現代化程度的主要指標,遂行網絡空間使命任務、維護國家安全成為信息化軍隊的主要職責之一。

從中國發展所處的歷史進程來看,要適應全面建成小康社會決勝階段的國家安全戰略需求,必須高度警惕國家在網絡空間被侵略、被顛覆、被分裂的危險,高度警惕由網絡空間引發改革發展大局被破壞的危險,高度警惕中國特色社會主義發展進程被干擾、破壞的危險。

防患於未然,要求國家必須具有應對和處置這些危險的手段措施,具有防範、制止和依法懲治網絡空間違法破壞行為的強大力量。保衛國家歷來是軍隊不可推卸的歷史責任,固有的使命任務決定了中國軍隊必須承擔起在網絡空間採取各種措施,維護國家政治、經濟、文化安全和社會穩定的時代擔當。

攻防兼備的戰略任務,軍隊要做提升網絡空間防護能力的堅強後盾。 《戰略》中九大任務的第三項和第八項明確提出,要採取一切必要措施保護關鍵信息基礎設施及其重要數據不受攻擊破壞,要堅持技術和管理並重、保護和震懾並舉;要建設與我國國際地位相稱、與網絡強國相適應的網絡空間防護力量,大力發展網絡安全防御手段,及時發現和抵禦網絡入侵,鑄造維護國家網絡安全的堅強後盾。在國家所有維護安全的政治、外交、軍事、科技能力中,軍事力量歷來是所有能力的基礎和支撐,是所有能力的根本保障,是國家安全的最終依托。

因此,軍隊必須承擔起提升國家網絡空間防護能力堅強後盾的戰略任務。現實社會中,軍隊是維護國家安全的定心丸,在網絡空間也同樣應成為人民群眾的安全依賴和保障。軍隊作為國家網絡空間防護能力生成的重要一環,必須做到攻防兼備、懾戰一體,有能力堅決維護國家和人民在網絡空間的利益和安全,能夠有效消除網絡安全威脅造成的各種危機和思想動盪,使人民能夠切實感受到生產生活得到有效保護,成為全國人民對國家網絡防護能力充滿信心的底氣所在。

聯防聯治的全球責任,軍隊要做維護全球網絡安全的重要支撐。 《戰略》任務最後一項明確提出要強化網絡空間國際合作,支持聯合國發揮主導作用,推動制定各方普遍接受的網絡空間國際規則、網絡空間國際反恐公約,健全打擊網絡犯罪司法協助機制,深化在政策法律、技術創新、標準規範、應急響應、關鍵信息基礎設施保護等領域的國際合作。

網絡恐怖主義和網絡犯罪是經過信息網絡發酵催化出的全球威脅新形態,對世界上所有國家的政治、經濟、軍事、文化安全都構成巨大威脅,僅僅依靠政府和民間的力量是不夠的,美國等西方國家紛紛賦予軍隊保護網絡安全的職責和打擊網絡恐怖主義的權限。維護全球網絡空間安全與穩定符合中國以及世界各國的根本利益,軍隊應成為全球網絡空間安全的重要維護者,成為打擊全球網絡恐怖主義和網絡犯罪的重要力量。

網絡的全球化、無界性決定了打擊網絡恐怖主義和跨國網絡犯罪的國際需求,軍隊應在聯合國安理會的框架下,推進國家間網絡治理軍事合作,利用網絡時代的戰略和技術,建立聯防聯治機制,切實維護國家和世界網絡空間安全。

從“沙場練兵”到“網絡備戰”,新領域需要軍隊備戰新舉措

在新的歷史形勢下,網絡空間對軍隊練兵備戰模式提出了全新的要求,應適應網絡空間新特點和軍隊新使命對傳統模式進行創新改革,以強國強軍目標為統攬,加強宏觀統籌,著眼網絡空間軍事行動的法理需求,緊扣網絡空間“軍民一體”的天然屬性,建設“平戰結合”的網絡安全攻防體系,打造“軍地兩用”的網絡國防力量。

立法賦權,為軍隊遂行職能使命提供法理依據。世界各國尤其是西方發達國家在網絡安全立法上高度重視網絡國防問題。美國先後出台了《國家安全第16號總統令》《網絡空間行動戰略》等一系列政策法規,對如何在網絡國防領域保護國家網絡安全進行了不斷的深化規範。

當前,從法律層面釐清網絡空間軍隊的職責任務非常必要,應以《國家安全法》《網絡安全法》為依據,出台網絡國防法和有關網絡空間軍事作戰條令法規,為網絡國防領域建設和軍事行動提供法規支撐和行動綱領,使軍隊在網絡空間的職責和使命更加明確具體。

一是通過網絡國防立法進一步界定網絡主權和網絡邊疆,清晰軍隊的職責範圍。

二是通過網絡作戰法規建設,明確軍隊遂行保衛國家網絡空間安全的行動權限,區分應對網絡入侵、網絡破壞等行為的軍事手段。三是通過網絡空間國際合作政策,明確軍隊協同他國、民間力量等打擊國際網絡恐怖主義、網絡犯罪的職能任務。

軍民融合,為網絡強國建設提供創新動力。軍民融合是世界強國提升網絡空間競爭力的主要做法,對於中國網絡強國建設來說,構建軍民融合網絡安全攻防體系,開發軍地兩用的國防信息基礎設施,是激發軍隊網絡空間作戰能力創新的源泉。

一是統籌國家、軍隊和各級政府等軍民融合職能部門,設置專門的指揮協調機構,調動一切國家網絡力量,建設“軍民一體”“平戰結合”的網絡安全攻防體系。

二是盡快出台網絡安全軍民融合深度發展指導性意見,逐步展開軍民融合基本法律研究論證,指導中長期軍民融合發展。

三是依托國家現有公共移動通信網、光纖通信網及衛星系統,軍民共建覆蓋全國全軍的信息基礎設施,實現軍民統建、分管共享。

四是建立軍民聯合的應急響應機制,加大培訓軍地主管部門控制事態的能力,加強專家和應急專業力量,提升快速恢復受損網絡或信息系統的能力。

軍民聯訓,為網絡空間軍事能力生成提供實戰化環境。網絡空間的軍民共用特性使得軍民聯訓成為世界各國網絡空間軍事演訓的重要方式。美國及北約等國家的網絡空間軍民聯合演習已經形成系列化,“網絡風暴”“網絡衛士”等演練活動吸引了政府、企業、研究機構甚至民間黑客的廣泛參與。我軍網絡空間軍事力量訓練也需要廣泛吸引民間力量參與。

一是搞好軍政合作,建立軍民聯合攻防演練機制,借鑒美國等發達國家網絡戰演練中的紅藍對抗訓練方法,積極建設“國家網絡靶場”,策劃政府、民間機構系列聯合演習,提升軍民一體、官民一體的網絡攻防水平。

二是搞好軍企協作,在互聯網上依靠網信企業設置演練場區,促進軍民之間攻防能力磨合,共同提高防範未知風險能力。

三是組織民間網絡安全公司和黑客人才,開展網絡安全競賽等活動,互相印證,共同提高網絡安全防護技戰術水平。

網絡預備役,為建設強大網軍提供力量源泉。預備役作為國防力量的後備補充,兼有軍事和民用雙重特點,是實現網絡空間經濟發展與國防建設有機統一的有力舉措。

一是以國家安全部門為主導,依據國家利益進行統籌規劃,出台有利於網絡國防預備役建設的系列法規政策,從頂層上解決網絡國防預備役建設中軍民共建的主體分工、推進策略、利益協調等問題。

二是創新預備役組織領導體制和綜合協調機制,有計劃地把預備役建設融入國家網絡信息化發展的各個層面和各個領域。

三是著眼軍隊和地方兩頭管理模式改革,以各省市政府、軍隊和地方企事業單位的管理機制為依托,建立網絡國防預備役人才聯合培養使用機制,完善國家應急動員機制,建立國家網絡防禦專用人才數據庫,將網絡民兵和預備役部隊建設納入人民武裝動員的範圍,平時按規定編入民兵應急分隊進行訓練,急時挑選精干人員隨隊參加遂行非戰爭軍事行動任務,戰時按需要成建制徵召使用,使國防潛力轉變為國防實力。

Referring url: http://military.people.com.cn/n1/2017/0417/c1011-29215670.html

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar // 中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Chinese Military Strategic Support Force – Skynet Army: It Will Change the Face of Cyberwar //

中國軍事戰略支援力量 – 天網軍隊將改變網絡戰的面貌

Author: Source: Netease military

DTG: 2016-01-04 08:XX:XX

Strategic support forces are not logistical support or more powerful than the Rockets. Three tears on, how effective has China’s SSF become in the realm of cyber warfare?

Abstract: On December 31, 2015, the PLA Army Leadership, Rocket Army, and Strategic Support Forces were established. Xi Jinping, General Secretary of the CPC Central Committee, President of the State Council, and Chairman of the Central Military Commission, awarded the newly established three major units. The major steps marking the reform of the PLA’s army are beginning to be gradually implemented. Among the three new units, the strategic support force is definitely a brand new name, which naturally raises many questions. What kind of force is this?

The strategic support force should be called Skynet Army: it will change the war.

Strategic support is not logistical support

The newly established three units, the Army’s leading body is also the Army’s headquarters. The former PLA has always been the army’s boss. The mainland’s thinking is deeply rooted. Therefore, only the navy and air force headquarters, and no army command, the top leaders of the army are all from The army, the head of the navy and air force ranks among the members of the Central Military Commission, and it is more symbolic. The establishment of the Army Headquarters now means that the status of the Army will gradually be lowered and will be consistent with other services. This will lay the foundation for the model of the highest military leadership in the rotation of the heads of the Western military in the future, and further strengthen the synergy for the various services. The conditions.

The Rockets are no strangers to military fans. They are the former Second Artillery Corps, which is essentially a strategic missile force. The strategic missile unit of the former Soviet Union was called the Strategic Rocket Army. When the PLA established the strategic missile force, the international situation was surging. For the sake of low-key restraint, Zhou Enlai proposed the name of the Second Artillery. Now renamed the Rocket Army, the name is more prestige, more directly strengthen the significance of strategic deterrence.

Relative to the above two units, for those concerned about national defense construction, the strategic support force will be much more strange. When many people hear this name, the first reaction is the logistics support force, which is a big mistake! The strategic support force is actually a genuine combat force. It is nominally supportive. In many cases, it is the first open-minded pioneer to fight, even to enter the battlefield earlier than the land, sea, air force and rocket forces. According to the spokesman of the Ministry of National Defense, the strategic support force is a new type of combat force for safeguarding national security and an important growth point for our military’s new combat capability. It is mainly a strategic, basic, and supportive type. The support force is formed after the functional integration.

The strategic support force should be called Skynet Army: it will change the war.

Specifically, the strategic support force will include five parts: intelligence reconnaissance, satellite management, electronic countermeasures, cyber offense and defense, and psychological warfare. It is a combination of the most advanced corps, the net army, and other battlefields on the battlefield. More specifically, it is a combat force dedicated to the soft kill mission.

This is also the adjustment of the military reform at the military level. The PLA is divided into the traditional land, sea and air force, the strategic deterrent and the attacking rocket army and the most modern “sky-net” army. The three levels of division of labor are clear, and they can strengthen each other. The synergy between the two, to maximize the advantages of the overall war, is undoubtedly the highlight of this military reform.

Five major parts highlight high-tech content

Let’s take a closer look at the five major components of the Strategic Support Army. First, intelligence reconnaissance. This is not a spy war in the traditional sense. It is not like the old movie “The Crossing River Scout”, which disguise itself as a deep enemy. More is technical reconnaissance. With the increasing popularity of modern equipment, the leakage of various technical information is difficult to avoid, such as radio signals, electromagnetic signals, infrared signals, etc., through the collection and analysis of these signals, a large amount of valuable information can be obtained, strategic support forces The reconnaissance is mainly the technical reconnaissance in this respect, which can be carried out through modern equipment such as reconnaissance satellites, reconnaissance planes, drones, and sensors.

The strategic support force should be called Skynet Army: it will change the war.

Satellite management is the so-called “Heavenly Army”. This is a new type of force that has emerged with the rapid development of space technology, especially satellite information reconnaissance, tracking and surveillance, guided navigation and aerospace weapons. The United States established the National Space Command in 1985, marking the birth of the world’s first heavenly army. Russia subsequently separated the military space force and the space missile defense force from the strategic rocket army and established a space force with a total strength of about 90,000 people. Then with the military reform of the People’s Liberation Army, the “Heavenly Army” under the strategic support force was formally formed and became a force dedicated to space operations in the future. The significance is significant.

The history of electronic confrontation is much longer than that of the Tianjun. As early as in the First World War, both sides have had the information of the other party and the communication of the other party. To the Second World War, the means of electronic confrontation. Both the scale and the scale have been greatly developed. In July 1943, the British army used metal foil strips to interfere with the German radar in the bombing of Hamburg, Germany, which was considered the beginning of modern electronic confrontation. During the Middle East War in the 1960s, electronic confrontation played a decisive role. Under today’s technical conditions, there is no need to spend more on electronic countermeasures.

Network attack and defense is also called cyber warfare. It is the rise of the network, exploiting the loopholes and security flaws of the network to attack and destroy the data in the hardware, software and systems of the network system. In 2001, there was a large-scale civil hacking incident between China and the United States, which stimulated the United States to a certain extent. By 2009, the world’s first cyber command was established. Through the opportunity of military reform, China has set up a specialized cyber warfare force and began systematically investing and developing in the fields of information construction and network attack and defense. This is a milestone for the future war, which is bound to spread to the network. meaningful.

003

In the end, it is psychological warfare, that is, by applying the principle principle of psychology, taking human psychology as the battlefield, and systematically adopting various means, including the means of communication, such as the Internet, television, and broadcasting, which cannot be separated from modern life. Cognitive, emotional, and will exert influence, mentally disintegrating enemy military and civilian fighting spirits or eliminating the influence of enemy propaganda, thus combating the enemy’s mind, in exchange for the greatest victory and benefits at the least cost. Psychological warfare sounds very mysterious. In fact, as mentioned in “Sun Tzu’s Art of War·The Tactics”: “It is the victorious battle, the good ones who are not good, the soldiers who do not fight and the good, and the good ones.” The “war without a war” is the ultimate goal of today’s psychological war. In the Battle of Normandy in the Second World War, the Allies used a large number of psychological warfare methods, which seriously affected the judgment of the German commander-in-chief and made great contributions to the victory of the battle. Since then, from the Korean War, the Vietnam War, to today’s Iraq War and the Afghan War, the US military has had professional psychological warfare troops to participate in the war. Therefore, this is the most easily overlooked military means, but it is a high level of military struggle, and even more efficient and effective than advanced aircraft cannons.

Therefore, it can be said that the strategic support force is the highest in the five major services after the reform of the PLA’s army. It can even be said to be completely different from the traditional war style of the past, and it is more characterized by ultra-modern flow.

004

Soft killing

According to the strategy disclosed on the network, the armbands are supported on the network. The above is the eight-and-five-pointed star. Below is the triangular arrow and the electronic cloud orbit. Surrounded by the surrounding wheat ears, it can be seen from this pattern that the strategic support force is not a traditional one. In the sense of steel contest, you can’t see the scene of the smoke, and there is no such thing as a nuclear weapon to destroy the horror of the sea, but the soft kill of the soldiers. In a sense, soft killing is no less inferior than hard killing, and even playing a role is more important than hard killing.

In contrast, until today, the US military has only independent scattered Tianjun, Net Army and psychological warfare units, but the PLA Strategic Support Forces have integrated these units directly in the preparation, and they are able to cooperate and play the greatest combat effectiveness. . It can be said that this major reform of the military, especially the establishment of the strategic support force, is definitely a major improvement in the system.

Imagine that without the strategic support force’s satellites accurately positioned and navigated, without the electronic escaping forces and cyber warfare forces escorting, the Rocket’s strategic missiles will be difficult to function; if there is no strategic support for the technical reconnaissance intelligence support, Satellite communication links, then the land, sea and air forces on the vast battlefield are blind and deaf, and the combat effectiveness is greatly reduced. Therefore, the strategic support forces will play a major role in the invisible four-dimensional and five-dimensional battlefield space.

Original Mandarin Chinese:

战略支援部队可不是后勤支援,或比火箭军更厉害

摘要:2015年12月31日,解放军陆军领导机构、火箭军、战略支援部队成立,中共中央总书记、国家主席、中央军委主席习近平给新成立的这三大单位授旗。标志着此轮解放军军队改革重大步骤正开始逐步落实,在这三个新单位中,战略支援部队绝对是个全新的名称,自然会引起不少的疑问,这到底是支怎样的部队呢?

战略支援部队就应该叫天网军:将改变战争

战略支援可不是后勤支援

这次新成立的三个单位,陆军领导机构也就是陆军总部,原来解放军历来就是陆军老大,大陆军的思想根深蒂固,所以只有海军、空军司令部,而不设陆军司令部,军队最高领导全都出自陆军,海空军首长位列中央军委委员,也更多是象征意义。现在设立陆军总部,也就意味着陆军的地位逐渐下调,将和其他军种相一致,这为今后仿效西方各军种首长轮流担任军队最高领导的模式打下了基础,同时也对各军种进一步加强协同创造了条件。

火箭军对于军迷来说也是并不陌生,就是以前的第二炮兵,实质就是战略导弹部队。前苏联的战略导弹部队就叫战略火箭军,解放军成立战略导弹部队时,国际形势风起云涌,出于低调克制的考虑,由周恩来提议采用了第二炮兵的名称。现在改称火箭军,在名称上就威风多了,更直接地强化了战略威慑的意义。

相对上述两个单位,对于关心国防建设的人来说,战略支援部队就要陌生多了。很多人一听到这个名称,第一反应就是后勤支援部队,那就大错特错了!战略支援部队其实一样是货真价实的作战部队,名义上是支援,很多时候反而是第一个冲锋陷阵的开路先锋,甚至要比陆海空军和火箭军更早地投入战场。按照国防部发言人的话来说,战略支援部队是维护国家安全的新型作战力量,是我军新质作战能力的重要增长点,主要是将战略性、基础性、支撑性都很强的各类保障力量进行功能整合后组建而成。

战略支援部队就应该叫天网军:将改变战争

具体来说,战略支援部队将包括情报侦察、卫星管理、电子对抗、网络攻防、心理战等五大部分,是综合了这个时代最先进的天军、网军等看不见硝烟的战场上的作战部队,更确切地说是专门担负软杀伤使命的作战力量。

这也是此次军队改革在军种层面的调整,将解放军分为传统的陆海空军、战略威慑和打击的火箭军和最现代化的“天-网”军,三个层次分工明确,又能强化相互之间的协同配合,最大限度地发挥出整体战的优势,无疑是本次军队改革的重头戏。

五大部分凸现高科技含量

再来细看战略支援军的五大组成部分,先是情报侦察,这可不是传统意义上打入敌人内部的谍战无间道,也不是像老电影《渡江侦察记》那样乔装改扮深入敌后,而更多的是技术侦察。随着现代化装备越来越普遍,各种技术信息的泄漏很难避免,比如无线电信号、电磁信号、红外信号等等,通过对这些信号的搜集和分析就可以获取大量宝贵的情报,战略支援部队的侦察主要就是这方面的技术侦察,可以通过侦察卫星、侦察机、无人机、感应器等现代化装备来进行。

战略支援部队就应该叫天网军:将改变战争

卫星管理就是所谓的“天军”,这是随着航天技术的飞速发展,特别是卫星信息侦察、跟踪监视、制导导航及航天兵器的广泛应用,应运而生的新型部队。美国在1985年成立了全美航天司令部,标志着世界上第一支天军的诞生。俄罗斯随后也将军事航天部队和太空导弹防御部队从战略火箭军中分离出来,成立了一支总兵力约9万人的航天部队。那么随着解放军这次军事改革,隶属于战略支援部队的“天军”也正式组建,成为今后专门承担航天作战的部队,意义可谓重大。

电子对抗的历史就要比天军更为悠久,早在第一次世界大战中交战双方就都曾有过侦收对方的信息和干扰对方通信联络,到第二次世界大战,电子对抗的手段和规模都有了很大发展,1943年7月英军在对德国汉堡的轰炸中大规模使用金属箔条干扰德军雷达,被认为是现代电子对抗的开始。到60年代中东战争期间,电子对抗更是发挥了决定性的作用。在今天的技术条件下,电子对抗就不用再多费口舌了。

网络攻防也叫网络战,是随着网络的兴起,利用网络存在的漏洞和安全缺陷对网络系统的硬件、软件及其系统中的数据进行攻击和破坏。2001年中美之间就曾发生过大规模的民间黑客攻击事件,这在一定程度上刺激了美国,到2009年成立了世界上第一个网络司令部。中国此次借着军队改革的契机,组建了专业化的网络战部队,开始系统地在信息化建设和网络攻防领域进行投入和发展,这对于未来战争势必波及到网络的大趋势,是具有里程碑意义的。

003

最后则是心理战,也就是通过运用心理学的原理原则,以人类的心理为战场,有计划地采用各种手段,包括现代生活须臾不能脱离的网络、电视、广播等传播手段,对人的认知、情感和意志施加影响,从精神上瓦解敌方军民斗志或消除敌方宣传所造成的影响的对抗活动,从而打击敌方的心志,以最小的代价换取最大胜利和利益。心理战听起来很是玄乎,其实《孙子兵法·谋攻篇》中所提到的:“是故百战百胜,非善之善者也;不战而屈人之兵,善之善者也。” 这里的“不战而屈人之兵”就是今天心理战所要达到的终极目标。在第二次世界大战中的诺曼底登陆战役,盟军就曾运用了大量的心理战手段,严重影响干扰了德军统帅部的判断,为战役的胜利做出了巨大贡献。此后,从朝鲜战争、越南战争,直到今天的伊拉克战争和阿富汗战争,美军都曾有专业的心理战部队参战。因此,这是最容易被忽视的军事手段,但却是军事斗争的高级层次,甚至要比先进的飞机大炮更有效率和作用。

因此,可以说战略支援部队是解放军军队改革之后五大军种中,高科技含量最高的,甚至可以说是完全不同于过去传统战争的样式,更多地带有超现代流的特色。

004

不容小觑的软杀伤

根据网络上披露的战略支援部队臂章图案,上面是八一五角星,下面是三角箭头和电子云轨道,周围是环绕的麦穗,从这个图案中就可以看出,战略支援部队并不是传统意义上钢铁的较量,看不到硝烟滚滚的场景,更没有核武器那样毁山灭海的恐怖威力,而是兵不血刃的软杀伤。从某种意义上来说,软杀伤丝毫并不比硬杀伤逊色,甚至所发挥的作用更要比硬杀伤重要。

相比之下,直到今天美军才只有独立分散的天军、网军和心理战部队,但解放军战略支援部队则将这些部队直接在编制上整合在一起,更能协同配合,发挥出最大的战斗力。可以说是这次军队的大改革,特别是战略支援部队的成立,在体制上绝对是一大进步。

试想一下,如果没有战略支援部队的卫星准确地定位和导航,没有电子干扰部队、网络战部队的保驾护航,那么火箭军的战略导弹就难以发挥作用;如果没有战略支援部队技术侦察的情报保障、卫星的通讯联系,那么分布在广阔战场上的陆海空军部队就是眼盲耳聋,战斗力也要大打折扣。因此,在看不到的四维、五维战场空间,战略支援部队必将发挥出重大的作用。

Original Referring URL:  http://war.163.com/16/0104/08/

Chinese Military Review : US Army issued the “cyberspace and electronic warfare operations” doctrine // 中國軍事評論美國陸軍頒布《網絡空間與電子戰行動》條令

US Army issued the “cyberspace and electronic warfare operations” doctrine// 中國軍事評論美國陸軍頒布《網絡空間與電子戰行動》條令

The field command FM3-12 provides instructions and guidance for the Army to implement cyberspace and electronic warfare operations using cyberspace electromagnetic activity in joint ground operations. The Fields Act FM3-12 defines the Army’s cyberspace operations, electronic warfare, roles, relationships, responsibilities, and capabilities, and provides an understanding of this to support Army and joint operations. It details how Army forces protect Army networks and data, and explains when commanders must integrate custom cyberspace and electronic warfare capabilities within military operations.

On the basis of the 2006 National Cyberspace Operations Military Strategy (NMS-CO), the US Joint Chiefs of Staff announced the joint publication JP 3-12 in February 2013 as an internal document. October 21, 2014 The published document for public release is Joint Publication JP 3-12(R). The order states that “the global reliance on cyberspace is increasing, and careful control of offensive cyberspace operations is required, requiring national-level approval.” This requires commanders to recognize changes in national network policies that are mandated by operations. Potential impact. On April 11, 2017, the US Army issued the field command FM3-12 “Network Space and Electronic Warfare Action” on this basis. The field war said that in the past decade of conflict, the US Army has deployed the most powerful communication system in its history. In Afghanistan and Iraq, enemies lacking technological capabilities challenge the US military’s advantages in cyberspace, and the US military has taken the lead in cyberspace and electromagnetic spectrum (EMS) operations. However, regional rivals have demonstrated impressive capabilities in a mixed-operational environment that threatens the US Army’s dominance in cyberspace and the electromagnetic spectrum. Therefore, the Order states that the integration of cyberspace electromagnetic activity at all stages of combat operations is the key to acquiring and maintaining freedom of maneuver in the cyberspace and electromagnetic spectrum, while preventing the enemy from doing so. Cyberspace electromagnetic activity can synchronize capabilities across a variety of domains and operational functions, and maximize synergies within and through the cyberspace and electromagnetic spectrum. Intelligence, signal, information operations (IO), cyberspace, space and firepower operations are critical to planning, synchronizing, and implementing cyberspace and electronic warfare operations.

The Fields Order FM3-12 supports the Joint Cyberspace and Electronic Warfare Act and the Army Doctrine Reference Publication ADRP3-0, Combat, and provides a background to define the Army’s doctrine reference publication ADRP5-0 “Operational Process” and Cyberspace and The relationship between electronic warfare operations. In order to understand the basic principles of integration and synchronization of cyberspace and electronic warfare operations, you must first read the Army’s doctrine publication ADP2-0, the Army’s doctrine reference publication ADRP2-0, the Army doctrine publication ADP3-0, and the Army doctrine reference publication ADRP3. -0, Army doctrine publication ADP5-0, Army doctrine reference publication ADRP5-0, Army doctrine publication ADP6-0, Army doctrine reference publication ADRP6-0, Army technical publication ATP2-01.3, field bar FM3-13 And FM6-0. By planning, integrating, and synchronizing cyberspace and electronic warfare operations, cyberspace electromagnetic activities can integrate functions and capabilities across operational functions, defend networks, and provide critical capabilities to commanders at all levels during joint ground operations. Cyberspace and electronic warfare operations affect all combat functions and are also affected by them.

Network space visualization operating environment of electromagnetic spectrum

The field battles present detailed tactics and procedures for Army cyberspace and electronic warfare operations. The field command replaced the field title FM3-38 dated February 2014. The Fields Order FM3-12 is an Army cyberspace and electronic warfare campaign advocacy publication. The field battles contain the basic principles and guiding principles of cyberspace operations, electronic warfare, and cyberspace electromagnetic activities in a single publication. It provides a comprehensive account of how they support and achieve action, and how to support the missions and functions of the various levels of force. The field battles laid the foundation for subordinate Army technical publications.

Cyberspace and e-war operations incorporate established joint and Army processes into operations such as intelligence processes, targeting processes, and military decision-making processes (MDMPs). The field battles explain the basic ideas of the Army’s cyberspace and electronic warfare operations. Content includes staff responsibilities, contributions to military decision-making processes, cyberspace and target work in the electromagnetic spectrum, and reliance on intelligence and operational environment readiness (OPE) in cyberspace.

The field battles describe the relationship between cyberspace operations, missions, operations, electronic warfare, electromagnetic spectrum, and each other’s actions. This elaboration also includes cyberspace electromagnetic activity, providing compliance for military forces and the following combat forces planning, integration, and simultaneous electromagnetic activities.

Schematic diagram of electromagnetic spectrum

The first chapter provides an understanding of cyberspace, cyberspace operations, missions, actions, and effects. It describes cyberspace and situational understanding, situational awareness, threats, risks, vulnerabilities, and their relationship to information and operational environments. The level and characteristics of cyberspace confirm the legal authorization applicable to cyberspace and cyberspace operations, and discuss the basic information and spectrum management functions of electronic warfare related to cyberspace and electronic warfare operations.

Chapter 2 provides information on the use of cyberspace operations and tasks, rather than day-to-day operations, pointing out that information operations, intelligence, space operations, and targeted work can affect cyberspace, electromagnetic spectrum, cyberspace operations, and electronic warfare operations. Commanders and staff officers have integrated and synchronized all of these aspects of cyberspace and electronic warfare operations.

The third chapter expounds the Army’s cyberspace electromagnetic activity and mission-style command, the role of the commander, the cyberspace with combat functions and the electronic warfare action, and discusses how to incorporate the planning elements of cyberspace and electronic warfare operations into the operational process. This includes planning, preparation, implementation, evaluation, and targeting. The discussion of the operational environment is combined with the military decision-making process, followed by an overview of the preparation requirements, implementation tactics, and how to assess cyberspace and electronic warfare operations.

Figure cyberspace electromagnetic activity combat framework

Appendix A discusses cyberspace operations and various joint operations partners.

Appendix B highlights the location of cyberspace operational information in the Combat Command and Appendix 12 to Annex C. This appendix includes an example of Appendix 12 to Annex C, which describes the types of information contained in this appendix and sections.

Appendix C contains the procedures for handling cyberspace operations requests from military, military, and military units, as well as fields and information for the Cyber ​​Operations Application Form (CERF). Blank copies of the cyber operations application form and field explanations are all part of the process.

Appendix D includes fields and information for the Electronic Attack Request Form (EARF). A blank copy of the electronic attack application form and a five-line brief with field interpretation are part of the program.

Cyberspace and Electronic Warfare Actions Directory

Preface

preface

Chapter 1 Network Space and the Basic Principles of Electronic Warfare Action

Section 1 Overview of Cyberspace and Electromagnetic Spectrum

First, the network space domain

Second, combat operations and cyberspace domain

Third, cyberspace tasks and actions

Section 2 Understanding Network Space and Environment

1. Network space and electromagnetic spectrum

Second, cyberspace and information environment

Third, the network space level

Fourth, the characteristics of cyberspace

5. Cyberspace as part of the operational environment

Sixth, risk in cyberspace

Seven, authorization

Section III Electronic Warfare Action

First, the electromagnetic spectrum action

Second, electronic warfare

Third, the application of matters needing attention

Fourth, spectrum management

Chapter 2 Relationship with Cyberspace and Electromagnetic Spectrum

I. Interdependence

Second, information operations

Third, intelligence

Fourth, space operations

V. Target determination

Chapter III Electromagnetic Activities in Cyberspace in Operation

First, the basic principle

Second, matters needing attention

Third, the role of the commander

Fourth, empower resources

V. Planning work and cyberspace electromagnetic activities

Sixth, network effect application form and target determination activities

Appendix A Integration with Unified Action Partners

Appendix B Cyberspace in Combat Commands

Appendix C Network Effect Application Form

Appendix D Electronic Attack Application Form

Thanks for compiling/reviewing: Shen Song

Article source: Zhiyuan Strategy and Defense Research Institute

Electric Defense Research

Original Mandarin Chinese:

野战条令FM3-12为陆军在联合地面作战中使用网络空间电磁活动实施网络空间和电子战行动提供了指示与指导。野战条令FM3-12界定了陆军网络空间行动、电子战、角色、关系、职责和能力,并提供了对此的理解,从而为陆军和联合作战提供支持。它详述了陆军部队保护陆军网络与数据的方法,并阐述了指挥官必须在军事行动范畴内整合定制网络空间与电子战能力的时机。

在2006年《国家网络空间作战军事战略(NMS-CO)》基础上,美军参谋长联席会议在2013年2月只是以内部文件形式公布了联合出版物JP 3-12。2014年10月21日对外公开发布的条令文件为联合出版物JP 3-12(R)。该条令指出,“在全球范围内,对网络空间的依赖日益增加,需要仔细控制进攻性网络空间作战,需要国家层面的批准。”这就要求指挥官认识到国家网络政策的变化对作战授权的潜在影响。2017年4月11日,美国陆军在此基础上颁布了野战条令FM3-12《网络空间与电子战行动》。该野战条令认为,在过去十年的冲突中,美国陆军已经部署了其历史上最强大的通信系统。在阿富汗和伊拉克,缺少技术能力的敌人挑战美军在网络空间内的优势,美军在网络空间和电磁频谱(EMS)行动中取得了主导权。但是,地区同等对手已经在一种混合作战环境中展示了令人印象深刻的能力,这种混合作战环境威胁了美国陆军在网络空间和电磁频谱中的主导权。因此,该条令指出,在作战行动的所有阶段整合网络空间电磁活动是在网络空间和电磁频谱内获取和保持机动自由的关键,同时可以阻止敌人这么做。网络空间电磁活动可以同步贯穿各种域和作战职能中的能力,并在网络空间和电磁频谱内及通过它们最大程度地发挥互补效果。情报、信号、信息作战(IO)、网络空间、太空和火力作战对计划、同步和实施网络空间与电子战行动是至关重要的。

野战条令FM3-12支持联合网络空间与电子战行动条令以及陆军条令参考出版物ADRP3-0《作战》,并提供了条令背景以明确陆军条令参考出版物ADRP5-0《作战过程》和网络空间与电子战行动之间的关系。为了理解整合与同步网络空间与电子战行动的基本原理,必须首先要阅读陆军条令出版物ADP2-0、陆军条令参考出版物ADRP2-0、陆军条令出版物ADP3-0、陆军条令参考出版物ADRP3-0、陆军条令出版物ADP5-0、陆军条令参考出版物ADRP5-0、陆军条令出版物ADP6-0、陆军条令参考出版物ADRP6-0、陆军技术出版物ATP2-01.3、野战条令FM3-13和FM6-0。通过计划、整合和同步网络空间与电子战行动,网络空间电磁活动就可以横跨作战职能整合各种职能与能力,保卫网络,并在联合地面作战期间为各级指挥官提供关键能力。网络空间和电子战行动影响到所有的作战职能,也会受到它们的影响。

电磁频谱的网络空间可视化操作环境

本野战条令提出了陆军网络空间和电子战行动的详细战术和程序。该野战条令取代了日期标注为2014年2月的野战条令FM3-38。野战条令FM3-12是陆军网络空间和电子战行动倡导出版物。本野战条令将网络空间作战、电子战和网络空间电磁活动的基本原理与指导原则都包含在一本出版物中。它全面阐述了他们如何支持并达成行动,以及如何支持各级部队的使命任务和职能。本野战条令为下属陆军技术出版物奠定了基础。

网络空间和电子战行动将已经制定的联合和陆军流程纳入作战行动之中,比如情报流程、目标确定流程和军事决策流程(MDMP)。本野战条令阐释了陆军网络空间与电子战行动的基本想法。内容包括参谋职责、对军事决策流程的贡献、网络空间和电磁频谱中的目标工作、网络空间中对情报和作战环境准备(OPE)的依赖性。

本野战条令阐述了网络空间作战、任务、行动、电子战、电磁频谱以及相互间与所有陆军行动之间的关系。这种阐述还包括网络空间电磁活动,为军及以下规模的作战部队计划、整合和同步电磁活动提供遵循。

电磁频谱示意图

第一章提供了对网络空间、网络空间作战、任务、行动和效果的理解,阐述了网络空间和态势理解、态势感知、威胁、风险、脆弱性及其与信息和作战环境的关系,阐述了网络空间的层次与特点,确认了适用于网络空间和网络空间作战的法律授权,论述了与网络空间和电子战行动有关的电子战基本信息和频谱管理职能。

第二章提供了有关使用网络空间行动与任务的信息,而不是日常业务,指出信息作战、情报、太空作战和目标工作可能影响网络空间、电磁频谱、网络空间作战和电子战行动。指挥官和参谋人员对网络空间和电子战行动中的所有这些方面进行了整合和同步。

第三章阐述了陆军网络空间电磁活动和任务式指挥、指挥官的作用、具有作战职能的网络空间和电子战行动,论述了如何将网络空间和电子战行动的计划工作要素纳入作战流程。这包括计划、准备、实施、评估和目标确定。对作战环境的论述与军事决策流程结合在一起,随后概述了准备要求、实施战术以及如何评估网络空间和电子战行动。

图 网络空间电磁活动作战框架

附录A 论述了网络空间作战与各种联合行动伙伴。

附录B 强调了网络空间作战信息在作战命令和附件C之附录12中的位置。本附录包括一个附件C之附录12的例子,描述了本附录和各部分所包含的信息类型。

附录C 包含了在军、军以下、军以上级别部队处理网络空间作战行动申请的程序,以及网络作战行动申请表(CERF)的字段和信息。网络作战行动申请表的空白副本和字段解释都是该程序的组成部分。

附录D包括了电子攻击申请表(EARF)的字段和信息。电子攻击申请表的空白副本和带有字段解释的五行式简令都是该程序的组成部分。

《网络空间与电子战行动》目录

序言

导言

第一章 网络空间与电子战行动基本原理

第一节 网络空间和电磁频谱概述

一、网络空间域

二、作战行动与网络空间域

三、网络空间任务与行动

第二节 了解网络空间与环境

一、网络空间和电磁频谱

二、网络空间和信息环境

三、网络空间层次

四、网络空间的特点

五、作为作战环境组成部分的网络空间

六、网络空间中的风险

七、授权

第三节 电子战行动

一、电磁频谱行动

二、电子战

三、运用注意事项

四、频谱管理

第二章与 网络空间和电磁频谱的关系

一、相互依存

二、信息作战

三、情报

四、太空作战

五、目标确定

第三章 作战中的网络空间电磁活动

一、基本原理

二、注意事项

三、指挥官的作用

四、赋能资源

五、计划工作与网络空间电磁活动

六、网络效果申请表与目标确定活动

附录A 与统一行动伙伴的整合

附录B 作战命令中的网络空间

附录C 网络效果申请表

附录D 电子攻击申请表

感谢编译/述评:沈松

文章来源:知远战略与防务研究所

转载请注明出处

电科防务研究

Original Source:  http://cpc.people.com.cn/