China’s Analysis of US Army Network Operations Conceptual Concept Conception: To fight for information dominance

US Army Network Operations Conceptual Concept Conception: To fight for information dominance

The US Army Training and Command Command assesses the future combat environment, clearly emphasizing the importance of obtaining information on all relevant aspects of future battlefields. Army forces in the color of people such as action in the face, with a new, network-based, technology-based threats. These threats use emerging technologies to build and maintain a cultural and social advantage; and make full use of these new capabilities for command and control, staff recruitment, logistics coordination, fundraising and dissemination of information. To take action in this new environment, the Army must re-adjust its message “focus”. Army leaders and soldiers must have an in-depth understanding of how to use information-based capabilities to capture and maintain situational awareness. In the future battlefield, know how to fight for information and give full play to information, while denying the opponent’s ability to win more and more important.

The assessment shows that the Army’s existing vocabulary, including, for example, computer network operations (CNO), electronic warfare (EW) and information operations (IO), will become increasingly difficult to meet demand. In order to meet these challenges, the full spectrum of military operations (FSO) should have three interrelated dimensions, each of which has its own set of causal logic and needs to focus on the development of the program:

The first dimension is the confrontation with the psychological will of enemies, hostile factions, criminal gangs and potential opponents.

The second dimension is a strategic alliance, including maintaining a friend in the country, getting ally in a foreign country, and obtaining their support or identity for the task.

The third dimension is the network power confrontation, including the acquisition, maintenance and use of a technical advantage.

The first dimension and the second dimension emphasize how commanders and staff officers should carefully plan and use information to fulfill their mission. The third dimension emphasizes gaining and maintaining an advantage in increasingly converged cyberspace and electromagnetic spectrum (EMS) media. The advantages of the Army’s access to advantages, protection advantages and opponents’ inferiority are included in these three dimensions; and contribute to the achievement of those actions that must be achieved through tactical, operational and strategic levels of unified action. The current combat action makes us more convinced that each dimension needs to have its own corresponding concepts and capabilities.

Information operations (IO) contain all three dimensions, but the word is increasingly becoming a generic term that can be used for any form of information. Computer network operations and electronic warfare itself is not enough to describe the full range of network confrontation. To this end, we are carrying out a comprehensive description of each dimension of the comprehensive research activities. The first two dimensions (Confrontation and Strategic Alliances of Will) will be presented in a conceptual plan to be developed separately, followed by a competency-based assessment.

This manual relates to the electronic warfare, computer network operations and cyberspace in the third dimension – networked confrontation. The Training and Command Command No. 525-7-8 is the first step towards a consensus on how the technological advances can change the operational environment, how the leaders should think about cyber operations, how to integrate their overall actions, and what they need ability. This manual provides a methodology for developing results-based, emphasis-based, and intelligent solutions that will enable the US Army to win in online confrontation. – Director of the Army – Ability Center for Lieutenant General

Executive summary

Describe the problem

The combat environment has changed significantly. The convergence and rapid development of computer and communication network technology, the global proliferation of information and communication technology (ICT) and its impact on social and social networks impact the combat environment. The use of this information revolution in the form of agents (agents) on the United States of key infrastructure and combat missions constitute a huge threat. These actors have both traditional national and non-combatants, multinational corporations, criminal organizations, terrorists, hackers, mischievous hackers and misuse of individuals. They together to create a continuous turbulence, never calm the environment. In this document, unless otherwise stated, the term “opponent” is used to describe them.

Develop a solution

Training and Order Command (TRADOC) 525-7-8, “CyberOps Concepts 2016-2028”, a comprehensive review of the 2016 to 2028 Army future forces how to make full use of cyberspace implementation of effective Network operations. The manual includes a conceptual framework for incorporating cyber operations into full spectrum operations (FSO), laying the groundwork for subsequent development of the order. This conceptual framework outlines how the commander integrates network operations to gain advantage, protect the advantages and set opponents at the disadvantage. The manual also establishes a common dictionary for the Army’s network operations, describing the relationship between cyberspace and the other four domains (earth and sea) and with the electromagnetic spectrum. Finally, it explains how the technology that continues to converge will affect full-spectrum operations and capacity development, providing strong support for Army design, development, acquisition and deployment of fully integrated network capabilities.

Program Background: Three dimensions of full spectrum combat

A, the US Army Training and Command Commander (CG) instructs the Joint Arms Center (CAC) to lead a working group to organize the mission domain for cyberspace, cyber warfare and information operations, as well as the training and commanding forces The modernization of the structure suggests a conceptual framework. On October 16, 2009, the Command and Command Command (CG) submitted a series of recommendations to the Army Deputy Chief of Staff. In his suggestion included the following:

(1) The Joint Arsenal Center believes that existing vocabularies (cyber-e-warfare) are enough at the moment, but will be increasingly insufficient to describe the challenges the Army faces in future combat environments.

(2) The joint arms center draws conclusions that should be considered from three dimensions, which run through full spectrum operations, and each dimension needs to be addressed by the design of forces and the development of orders.

(3) Thus, while the Army can now describe functions related to network and spectrum military operations as network-electronic warfare – information operations, the Joint Arms Center firmly believes that the future Army should describe them in the following ways:

The first dimension – the first dimension is the confrontation with the psychological will between the enemy, the hostile faction, the criminal gang and the potential opponent.

The second dimension, the second dimension, is a strategic alliance, including maintaining a friendly relationship with allies in the country, forming an alliance abroad, supporting or focusing on the mission of the military operations area.

The third dimension – the third dimension is the net – electromagnetic against. The continuous development of wired, wireless and optical technologies provides the conditions for convergence and cross-linking of computers and communication networks.

B, Training and Command Command No. 525-7-8 manual is mainly about how to win in this third dimension, that is, network confrontation, and put forward a concept – that is, network operations can promote the completion of the other two tasks.

Core point of view

A Win in cyber confrontation means getting progress in three ways: gaining the edge, protecting the advantage, and setting the opponent at a disadvantage.

B. The commander seeks freedom of movement in cyberspace and electromagnetic spectrum while losing opponents at the time and place they are determined; thus supporting various military in cyberspace and the other four domains of cyberspace (land and sea) activity. Cyberspace military operations are included in the network confrontation to take advantage, to protect the advantages and opponents in the disadvantages to take action. Network operations itself is not the ultimate goal, more as an important component of the whole spectrum of operations, to win the network confrontation is in peacetime military confrontation in the attention of the general activities. Network operations are ongoing and confrontation takes place every day, and in most cases there is no need for other forces to participate.

Solution framework

The existing terms of the term do not fully address the scope of the relevant tasks according to the definition of the Department of Defense cyberspace and cyber warfare. As a result, the framework developed by the manual defines four major components of network operations: CyberWar, CyNetOps, CyberSpt, and Cyberas.

Chapter 1 Introduction

1.1. Related background

The combat environment (OE) has changed significantly. The hostile activities in cyberspace and through cyberspace have reached unprecedented levels, threatening the basic elements of the key infrastructure, financial systems and national power of the United States. These threats come from a wide range of sources, unknowingly hackers to sovereign states, and the level of competencies varies. They together to create a continuous turbulence, never calm the environment. In this document, unless otherwise stated, the term “opponent” is used to describe them.

B. The rapid development of technology and its widespread proliferation make it increasingly difficult to win in full spectrum operations. The combination of wired, wireless and optical technology leads to the convergence of computers and telecommunications networks; handheld computing devices are growing in number and performance. The new generation of systems is emerging to form a global, mixed adaptive network that combines wired, wireless, optical, satellite communications, monitoring and data acquisition (SCADA) and other systems. In the near future, the network will provide users with ubiquitous access, so that they can be near real-time on-demand collaboration.

C. With the rapid development of technology, the ability of national opponents also increased, which makes the combat environment more complex. Who can gain, protect and exploit the advantages in competitive, crowded cyberspace and electromagnetic spectrum, who will master the initiative. On the contrary, if a party fails in the confrontation, or because the system was disturbed or destroyed and can not be effective action, it will give a huge advantage to the opponent.

D. Access, protection and advantage are not easy. US rivals use the commercial market as a platform for their development, making them more agile and adaptable than Army’s long research, development, testing and identification, and acquisition processes. Opponents are increasingly good at using cyberspace and electromagnetic spectrum capabilities and activities that are often outside the sight of our Army’s conventional operations. In order to capture and maintain the battle and tactical advantages for these flexible opponents, the Army must make cyberspace and electromagnetic spectrum the core and conventional components of its operations; and commanders also need the relevant competencies and the corresponding experts to apply them.

1.2. Purpose

The purpose of the Handbook No. 525-7-8 of the Training and Command Command is to examine how the Army’s future forces will integrate the cyberspace capabilities and cyber operations into full spectrum operations between 2016 and 2028.

1.3. Scope

The 525-7-8 Handbook of the Training and Command Command draws out how the commander can integrate cyber operations with other capabilities to gain advantage in full spectrum operations and to protect the advantages of concatenating opponents’ initial research results. The results of the study will be further refined through a competency-based assessment and development process. The manual describes how the commander seeks freedom of movement in cyberspace and electromagnetic spectrum while losing opponents at the time and place they determine; thus supporting the cyberspace as well as using cyberspace in the other four domains (land and sea) Of various military activities. This manual establishes a common dictionary and framework for network operations and describes the relationship between cyberspace and air, land, sea, and domain, and electromagnetic spectrum. It also explains how the technologies that continue to converge increase the impact on full spectrum operations and capacity development; identifies the network operations and support capabilities needed to support future force modernization initiatives; and suggests the cyberspace and electromagnetic Spectrum related to research questions.

1.4 method

This manual follows the design process approved by the Training and Command Command. Chapter 2 describes the existing conditions and requirements for cyberspace in combat environments. Chapter 3 compares the existing conditions and the desired final state in the operational environment, thus establishing a plan for the formulation of the program. Chapter 4 presents frameworks, core ideas, support ideas and dictionaries. Appendix A contains the required and related references. Appendix B describes the structure of the evolving network operations. Appendix C describes how to incorporate cyber combat as an organic component into the whole process, rather than being free from the entire action, according to the commander’s intentions and objectives. Appendix D (published) and Appendix E (confidential) discuss the required capabilities. Appendix F identifies issues at the executive level throughout the process, organization, training, equipment, leadership and education, personnel, and equipment (DOTMLPF) to support subsequent cost-benefit analysis efforts.

1.5. Key Definitions

A, cyberspace is defined as “a global domain in the information environment, interconnected by information technology infrastructures, including the Internet, communications networks, computer systems and embedded processors and controllers.”

B, the network war is: “the use of cyberspace capabilities, its primary purpose is to achieve goals in cyberspace or through cyberspace, which includes computer network operations, as well as operational and defensive activities of the global information grid” The

C, the electromagnetic spectrum is from zero to infinite electromagnetic radiation frequency range. It is divided into bands numbered by 26 letters.

1.6. Relationship with the concept of union and the concept of the army

A The Manual No. 525-7-8 of the Training and Command Command is consistent with the concept of joint and the concept of the Army, which includes the concept of joint operations and the top concept of the Army. The capabilities described in this manual may be incorporated into the Joint Capability Domain (JCA) and related operational functions. The Department of Defense uses a joint capacity domain to describe how the various capabilities support the joint function. The joint competency domain establishes the foundation of the process based on the capabilities of the Department of Defense, and the network combat capability can be embedded in the combined capabilities of the first level of force use, protection, combat space perception and network center action. Similarly, the network combat capability not only strengthened the Army’s operational functions and combat elements, but also their necessary composition.

B, Training and Order Command Manual 525-3-0. The manual argues that war is the will of the will, and that in order to win, the army must try its best to play a psychological and technical influence as one of the six main ideas that support the top concept of the army. The top-level concept declares that the Army is increasingly dependent on the continuous integration of electromagnetic, computer networks and space-based capabilities, so the technical influence requires troops to prepare for a new “cyber battlefield” to fight and win. Because the technology that affects the movement of information is developing too fast, the Army must continually assess what capabilities it needs to acquire, protect and exploit advantages in high-intensity cyberspace and electromagnetic spectrum. This handbook supports this top-level concept by determining the capabilities required to successfully perform full-spectrum operations.

C, Training and Command Command No. 525-3-1 Handbook and Training and Command Command No. 525-3-2. These two manuals, in order to support the Army’s operational concept, define the capabilities of operational command, intelligence, fire and protection needed to carry out effective campaigns and tactical maneuvers in future combat environments. Network capabilities and the advantages of cyberspace for the future of the Army in the mobility of command and control to reduce operational risk is critical. The Training and Command Command Manual No. 525-7-8 complements the Army function concept that supports campaign mobility and tactical maneuver.

D, Training and Order Command Manual 525-7-6. With the convergence of wired, wireless and optical technologies, future force commanders will use electronic warfare and cyber warfare capabilities. The use of wired and optical technology is becoming increasingly frequent

美國陸軍網絡作戰概念能力構想:要為信息力而戰
美國陸軍訓練與條令司令部評估未來作戰環境時明確強調了獲取未來戰場全部相關方面信息的重要性。陸軍部隊要在各色人等中行動出沒,面臨著全新的、網絡化的、基於技術的各種威脅。這些威脅會利用新興技術建立並保持一種文化和社會優勢;並充分利用這些新能力進行指揮控制、人員招募、後勤協調、資金籌集及消息傳播。要在這種新的環境中有效行動,陸軍就必須重新調整其信息“著力點”。陸軍領導人和士兵們必須深入地了解如何使用基於信息的能力獲取並保持態勢感知。在未來戰場上,懂得如何為信息力而戰並充分發揮信息力,同時拒止對手的這種能力,對於取勝越來越重要。

評估表明,陸軍的現有詞彙,包括例如計算機網絡作戰(CNO)、電子戰(EW)和信息作戰(IO)等,都將越來越難以滿足需求。為了應對這些挑戰,全譜軍事作戰(FSO)應有三個相互關聯的維度,其中每個維度都有自己的一套因果邏輯,並需要集中製定方案:

第一維是與不能和解的敵人、敵對派別、犯罪團伙和潛在對手的心理意志的對抗。

第二維是戰略結盟,包括在國內維持朋友、在國外獲得盟友以及獲得他們對任務的支持或認同。

第三維是網電對抗,包括獲得、保持和利用一種技術上的優勢。

第一維和第二維強調指揮官和參謀人員應如何精心籌劃和使用信息力來履行使命。第三維則強調在日益融合的網絡空間和電磁頻譜(EMS)媒介中獲得和保持一種優勢。陸軍獲取優勢、保護優勢和置對手於劣勢的概念都包含在這三個維度中;並且有助於達成那些必須通過戰術、戰役和戰略級別的統一行動才能實現的效果。當前的作戰行動更讓我們堅信,每一維都需要有自己相應的概念和能力。

信息作戰(IO)包含所有這三維,但這個詞卻越來越成為一個對任何形式的信息使用都可以指代的泛名詞。計算機網絡作戰和電子戰本身又不足以描述網電對抗的全部範疇。為此,我們正在開展一項充分描述每一維的全面攻關活動。前兩維(意志的對抗和戰略結盟)將在即將單獨制定的概念能力規劃中進行陳述,之後還將進行基於能力的評估。

本手冊與第三維——網電對抗中的電子戰、計算機網絡作戰和網絡空間有關。訓練與條令司令部525-7-8號手冊是對以下問題形成共識的第一步,包括技術上的進步如何改變作戰環境,領導人應該怎樣思考網絡作戰,怎樣整合他們的整體行動以及需要哪些能力。本手冊提供了製定基於效果、強調集成並且充滿智慧的解決方案的方法,這些方案將使美國陸軍在網電對抗中獲勝。 —邁克爾-文恩陸軍中將 陸軍能力集成中心主任

執行概要

描述問題

作戰環境已經顯著變化。計算機與通信網絡技術的會聚和迅猛發展、信息與通信技術(ICT)的全球擴散及其對社會和社會網絡的影響衝擊著作戰環境。利用這一信息革命的形形色色的行動者(agents)對美國的關鍵基礎設施和作戰任務構成了巨大威脅。這些行動者既有傳統的民族國家,也有非戰鬥人員、跨國公司、犯罪組織、恐怖分子、黑客聯盟、惡作劇的黑客以及誤操作的個人。他們共同創造了一個持續動盪、永無平息的環境。在本文件中,除非另行說明,均採用“對手”一詞描述他們。

制定解決方案

訓練與條令司令部(TRADOC)525-7-8號手冊,“美國陸軍網絡戰(Cyber​​Ops)概念能力規劃2016-2028”,全面審視了2016到2028年陸軍未來部隊如何充分利用網絡空間實施有效的網絡作戰。該手冊包括1個把網絡作戰納入全譜作戰(FSO)的概念框架,從而為後續的條令開發工作奠定基礎。這個概念框架勾勒了指揮官如何整合網絡作戰從而獲取優勢、保護優勢並置對手於劣勢。該手冊還為陸軍網絡作戰建立了一個通用詞典,描述了網絡空間與其它四個域(陸海空天)以及與電磁頻譜之間的關係。最後,它解釋了不斷會聚的技術將如何影響全譜作戰和能力發展,從而為陸軍設計、開發、採辦和部署充分集成的網絡能力提供有力的支撐。

方案背景:全譜作戰的三個維度

a、美國陸軍訓練與條令司令部司令(CG)指示聯合兵種中心(CAC)領導一個工作組,為網絡(cyber)、電子戰和信息作戰的使命域的組織以及訓練與條令司令部有關部隊的結構現代化的建議確定一個概念框架。 2009年10月16日,訓練與條令司令部司令(CG)向陸軍副參謀長提交了一系列建議。在他的建議中包含了以下幾條:

(1)聯合兵種中心認為,現有的詞彙(網絡-電子戰-信息作戰)在目前還夠用,但將越來越不足以描述陸軍在未來作戰環境中所面臨的挑戰。

(2)聯合兵種中心得出結論,應從三個維度進行考慮,這三個維度貫穿於全譜作戰中,並且每一維都需要解決兵力設計和條令制定問題。

(3)因此,雖然陸軍現在可以把與網絡和頻譜軍事行動相關的功能描述為網絡-電子戰-信息作戰,但聯合兵種中心堅信,未來陸軍應該用以下方式來描述它們:

第一維——第一維是與不能和解的敵人、敵對派別、犯罪團伙和潛在對手之間心理意志的對抗。

第二維——第二維是戰略結盟,包括在本土保持與盟友的友好關係、在海外形成同盟、支持或關注軍事行動區域實施的任務使命。

第三維——第三維是網電-電磁對抗。有線、無線以及光學技術的不斷發展為計算機和通信網絡的會聚和交聯提供了條件。

b、訓練與條令司令部525-7-8號手冊主要是關於如何在這個第三維,即網絡對抗中獲勝,並提出一個觀念——即網絡作戰能促進另兩維中任務的完成。

核心觀點

a.在網絡對抗中獲勝意味著同時在三個方面取得進步:獲取優勢、保護優勢以及置對手於劣勢。

b.指揮官尋求在網絡空間和電磁頻譜中的行動自由,同時在他們確定的時間和地點使對手失去自由;從而支撐在網絡空間以及借助網絡空間其它四個域(陸海空天)的各種軍事活動。網絡空間軍事行動包含在網絡對抗中為獲取優勢、保護優勢以及置對手於劣勢而採取行動。網絡作戰本身並不是最終目的,更多的是作為全譜作戰的一個重要組成,贏得網絡對抗是在和平時期軍事對抗中受到關注的普遍活動。網絡作戰不斷進行,對抗行動每天發生,大多數情況下不需要其他力量的參與。

解決方案框架

現有的條令術語沒有完全解決根據國防部網絡空間和網絡作戰的定義明確相關任務的範圍。因此,該手冊所製定的框架確定了網絡作戰包括四個主要組成部分:網絡戰爭(Cyber​​War)、網絡(空間)網絡作戰(CyNetOps)、網絡支援(Cyber​​Spt)和網絡態勢感知(Cyber​​SA)。

第一章引言

1.1.相關背景

a.作戰環境(OE)已經顯著地改變了。在網絡空間以及通過網絡空間進行的敵對活動已達到空前水平,威脅到了美國的關鍵基礎設施、金融系統和國家力量的基本要素。這些威脅來源廣泛,從不知情的黑客到主權國家,能力水平參差不齊。他們共同創造了一個持續動盪、永無平息的環境。在本文件中,除非另行說明,均採用“對手”一詞描述他們。

b.技術的突飛猛進及其廣泛擴散使得在全譜作戰中獲取勝利日益困難。有線、無線和光學技術的結合導致了計算機和電信網的融合;手持計算設備在數量和性能上不斷增長。新一代系統不斷湧現,構成了一個全球性、混雜的自適應網絡,它綜合了有線、無線、光學、衛星通信、監控和數據獲取(SCADA)及其它系統。不久的將來,網絡將為用戶提供無處不在的接入,使他們能近實時地按需協作。

c.隨著技術飛速發展,國家對手的能力也隨之提高,這使作戰環境更加複雜。誰能在競爭激烈、擁擠的網絡空間和電磁頻譜中獲取、保護和利用優勢,誰就將掌握決對主動。反之,如果一方在對抗中失敗,或由於系統遭到干擾或破壞而不能有效行動,則會把巨大的優勢拱手讓給對手。

d.獲取、保護和發揮優勢並非易事。美國的對手把商業市場作為他們發展戰鬥力的平台,使他們比陸軍冗長的研究、開發、試驗與鑑定以及採辦過程更加敏捷,適應性更強。對手越來越善於利用網絡空間和電磁頻譜能力及活動,而這些能力和活動到目前為止往往還處於我們陸軍常規行動的視線之外。為了獲取並保持針對這些靈活對手的戰役和戰術優勢,陸軍必須使網絡空間和電磁頻譜成為其作戰的核心和常規組成部分;而指揮官也需要相關的能力以及相應的專家來應用它們。

1.2.目的

訓練與條令司令部的525-7-8號手冊的目的是研究2016-2028年間陸軍未來部隊如何將各種網絡空間能力和網絡作戰整合納入全譜作戰。

1.3.範圍

訓練與條令司令部的525-7-8號手冊得出了指揮官如何把網絡作戰與其它能力相整合以在全譜作戰中獲取優勢、保護優勢並置對手於劣勢的初步研究成果。該研究結果還將通過基於能力的評估和條令開發過程進一步提煉。該手冊描述了指揮官如何尋求在網絡空間和電磁頻譜中的行動自由,同時在他們確定的時間和地點使對手失去自由;從而支撐在網絡空間以及借助網絡空間在其它四個域(陸海空天)的各種軍事活動。這份手冊為網絡作戰建立了一個通用的詞典和框架並描述了網絡空間與空、陸、海、天各域以及電磁頻譜之間的關係。它還解釋了不斷會聚的各項技術如何加大對全譜作戰和能力發展的影響;確定了支持未來部隊現代化倡議所需的網絡作戰和支撐能力;並提出了適合開展試驗的網絡空間和電磁頻譜的有關研究問題。

1.4 方法

這份手冊遵循訓練與條令司令部批准的設計過程。第二章描述了作戰環境中屬於網絡空間範疇的現有條件和所需條件。第三章比較了作戰環境中的現有條件和所需最終狀態,從而為製定方案建立了想定。第四章提出了框架、核心思想、支撐觀點和詞典。附錄A包含了所需的以及相關的參考文獻。附錄B介紹了演化中的網絡作戰的結構。附錄C描述根據指揮官的意圖和目標,如何將網絡作戰作為有機組成納入到整個行動中,而不是游離在整個行動之外。附錄D(公開的)和附錄E(保密的)討論了需要的能力。附錄F指出了貫穿於條令、組織、訓練、器材、領導和教育、人員以及設備(DOTMLPF)全過程中的執行層面的問題,從而為後繼的成本效益分析工作起步提供支持。

1.5.關鍵的定義

a、網絡空間被定義為“信息環境中的一個全球域,由信息技術基礎設施互相依賴結網而成,包括了因特網、通信網絡、計算機系統和嵌入式處理器和控制器。”

b、網絡戰是:“對網絡空間能力的運用,其首要目的是在網絡空間中或借助網絡空間達成目標。這類行動包括計算機網絡作戰,以及操作和防禦全球信息柵格的各種活動” 。

c、電磁頻譜是從零到無限大的電磁輻射頻率範圍。它被劃分為以26個字母進行表示的頻段。

1.6.與聯合概念和陸軍概念的關係

a、訓練與條令司令部的525-7-8號手冊與聯合概念和陸軍概念是一致的,這些概念包括聯合作戰頂層概念和陸軍頂層概念。本手冊所描述的能力可納入聯合能力域(JCA)和相關作戰功能。國防部用聯合能力域來描述各種能力如何支持聯合功能。聯合能力域奠定了基於國防部能力的過程的根基,而網絡作戰能力可內嵌於兵力運用、防護、作戰空間感知和網絡中心行動這些第一層次的聯合能力域之中。同樣,網絡作戰能力不僅強化了陸軍各項作戰功能和戰鬥力各要素,同時也是它們的必要組成。

b、訓練與條令司令部525-3-0號手冊。該手冊認為,戰爭是意志的較量,為了獲勝,陸軍必須盡量發揮心理上和技術上的影響力,並將其作為支撐陸軍頂層概念的六個主要思想之一。頂層概念宣稱陸軍越來越依賴不斷集成的電磁、計算機網絡和天基能力,因此發揮技術影響力要求部隊準備在新出現的“網絡戰場”中作戰並打贏。因為影響信息運動方式的技術發展太快,陸軍必須不斷地評估需要哪些能力在高強度的網絡空間和電磁頻譜中獲取、保護和利用優勢。這份手冊通過確定成功遂行全譜作戰所需的能力來支持這一頂層概念。

c、訓練與條令司令部525-3-1號手冊和訓練與條令司令部525-3-2號手冊。這兩本手冊為了支撐陸軍的作戰概念,確定了在未來作戰環境中實行有效戰役和戰術機動所需的作戰指揮、情報、火力和防護方面的各種能力。網絡能力和發揮網絡空間優勢對於陸軍未來部隊在機動中實現指揮控制和降低作戰​​風險非常關鍵。訓練與條令司令部525-7-8號手冊補充了支持戰役機動和戰術機動的陸軍功能概念。

d、訓練與條令司令部525-7-6號手冊。隨著有線、無線和光學技術的會聚,未來部隊指揮官將綜合運用電子戰和網絡作戰能力。對有線和光學技術的使用日益頻繁

Leave a Reply

Your email address will not be published. Required fields are marked *