Tag Archives: China’s Informatization – 中國信息化

Chinese Military Electromagnetic Spectrum Technology Determines the Future Development of Defeating the US at War

Chinese Military Electromagnetic Spectrum Technology Determines the Future Development of Defeating the US at War

For a long time, in order to solve the A2/AD dilemma and achieve a new offset strategy, the U.S. has launched combat operations such as open space/air-sea warfare, cyber-centric warfare, distributed killing, multi-domain warfare, and mixed warfare. With new ideas, we constantly seek military advantages such as missile offensive and defense, cyber-electromagnetics, and multi-domain space. Today, the electromagnetic spectrum war has become the new darling of leading a new round of military theory and technological innovation. Researching and analyzing the status quo and characteristics of the development of the US military’s electromagnetic spectrum combat has important practical significance for our military’s success in defeating the enemy in the information battlefield.

1  Development of Electromagnetic Spectrum Warfare

In 1956, Admiral Sergei Gorschkov, the former Soviet naval commander, pointed out: “Who controls the electromagnetic spectrum, who will win the next war.” Sixty years later, the electromagnetic spectrum has become one of the key battlefields of modern warfare. In order to compete for the advantages of the electromagnetic spectrum in the battlefield, the US military conducted in-depth explorations from combat theory to equipment technology and developed rapidly.

1.1 Evolution of theory

Electromagnetic spectrum control has a long history. In the early 1970s, Thomas H, chairman of the US Senate Association. Moorer said that the winner of World War III will be a party that can highly control and manage the electromagnetic spectrum. The United States “Old Ravens” Association first proposed the use of electromagnetic control (EMC) as the fourth component of the concept of electronic warfare. In 2009, Strategic Command launched the early concept of electromagnetic spectrum warfare (EMSW), and added tasks such as electromagnetic spectrum management (EMSM), electromagnetic spectrum control (EMSC), and electromagnetic battle control (EMBC) on the basis of electronic warfare [1]. In 2012, the Strategic Command established the Joint Electromagnetic Spectrum Control Center (JEMSCC) to achieve full integration of electronic warfare and electromagnetic spectrum management, and each of the units also established corresponding organizational coordination agencies and detachments [2]. In the same year, the US Navy proposed the concept of Electromagnetic Maneuver Warfare (EMMW) [3], and in March 2015 released the “21st Century Maritime Force Cooperation Strategy,” which outlines the goals, components, technology projects, and implementation paths of the electromagnetic maneuver warfare [4]. In December 2015, Terry Halvorsen, chief information officer of the US Department of Defense, pointed out that the electromagnetic spectrum is expected to be considered as the sixth battlefield following land, sea, air, space, and cyberspace [5]; in the same month, the Center for Strategic and Budgetary Assessments Defining Electromagnetic Waves: Regaining U.S. Dominance in the Electromagnetic Spectrum Field[6] The report proposes the concept of “low-zero-power” electromagnetic spectrum warfare, expounding concept ideas, trend features, capabilities and technical requirements and current obstacles, and presenting views, concepts, Procurement, technical, verification, etc. At the end of November 2016, the 53rd International Conference of the “Old Ravens” Association of the United States took the theme “Global Vision of Electromagnetic Spectrum Operations” as the theme to demonstrate the new concepts and technical achievements of electronic warfare, spectrum sensing and conflict resolution, and explored the electromagnetic spectrum operational environment. Policy regulations, equipment procurement, joint training and combat capabilities, etc. [7]. In January 2017, the new Secretary of Defense Ashton Carter signed the first “Electronic Warfare Strategy” document, officially establishing the electromagnetic spectrum as an independent operational domain and elaborating on how to conduct operations [8].

1.2 Policies and Orders

Strategic policies and military doctrines reflect the development of the US military’s combat theory. From 2006 to 2014, the US Department of Defense updated the “Electromagnetic Spectrum Strategy” to focus on advancing strategic objectives such as development of spectrum equipment, flexibility of spectrum operations, spectrum management, and improvement of policy response capabilities [9]; Strategic Command released in August 2010. Winning the 21st Century Economic and Security Advantage: Strategic Framework for Electromagnetic Spectrum Control, building an electromagnetic spectrum control system architecture from multiple perspectives including objectives, requirements, strategic development, etc. [10]; the Joint Venture Association has promulgated JP6-01 “Joint” in March 2012. “Electromagnetic Spectrum Management Action” joint publication [11], signed in December 2012 CJCSM3320.01C “Chairman’s Handbook of Joint Electromagnetic Spectrum Management Operations in Electromagnetic Operation Environment” [12], issued CJCSI3320.01D “Joint Electromagnetic Spectrum” in January 2013 Operational Instructions [13] and CJCSM 3320.04 “Electronic Warfare Supporting Combined Electromagnetic Spectrum Operations” Manual [14]. In March 2015, the “Electromagnetic Spectrum Operational Joint Concept” document [15] was signed, which systematically stated that the Joint Forces launched electromagnetic spectrum combat operations. Strategic vision, organizational structure and functions, command and management relationships, plan formulation and operational implementation, operational integration and action synergy, and gradually Tactical, technical, and program (TTP) refinement of control, interference cancellation, spectrum management, and electronic warfare reprogramming, etc.; US Army released TRADOC P525-7-16, “The US Army’s Future Modular Force Conceptual Capability in December 2007 Plan 2015-2024 – Electromagnetic Spectrum Operation Manual [16]. Field regulations FM6-02.70 “Army Electromagnetic Spectrum Operations” [17] were issued in May 2010. Field Manual FM3-38 “Network Electromagnetic Actions” was issued in January 2014. [18] Published in December 2015, ATP6-02. 70 “Electromagnetic Spectrum Management Combat Operations Skills” [19], updated in February 2016 AR525-15 “Network Reconfiguration of Electromagnetic Action Software” provisions [20], US Air Force updated 2017 AFI10-703 “electronic warfare integrated reprogramming” instructions [21] Define the concept of electromagnetic spectrum operations under the guidance of joint directives, and elaborate on issues such as organization and responsibilities, operational architecture, plan development and coordination control, task list and decision process, action team and management tools, and DOTMLPF, and promote electromagnetics. The integration of spectrum operations, electronic warfare, and cyberspace warfare. In addition, Kevin D, head of the United States Joint Force Development Department. In October 2016, Scott signed the JDN3-16 “Joint Electromagnetic Spectrum Operation” bulletin[22], standardized terminology and operational framework standards, and made a procedural description of the functional roles, organization, planning, operational implementation, and evaluation. It was awarded the Joint Spectrum Interference Cancellation Program CJCSM3320.02D signed in January and March 2013 by the Joint Committee, CJCSI3320.02F Joint Spectrum Interference Cancellation, and CJCSI3320.02E-1 Joint Spectrum Interference in February 2014. The three major regulations [23][24][25] to eliminate the confidentiality of the program were the important operational support and became the latest guidance for the US military’s electromagnetic spectrum warfare.

1.3 Equipment and Technology

Military technology leads and supports advanced operational concepts. To transform the concept of electromagnetic spectrum warfare from concept to capability, the U.S. military is striving to develop technological innovation and equipment development, and to develop new systems featuring networking, dexterity, multifunction, miniaturization, and adaptability.

On the spectrum management and control system[19][26], the US Department of Defense has developed and deployed the Allied Nations Joint Spectrum Management Planning Tool (CJSMPT) and the Global Electromagnetic Spectrum Information System (GEMSIS) since 2005, followed by the Spectrum XXI and the Modified Spectrum XXIO, Spectrum. Perception Management and Planning System (SSC-SSMPS), Spectrum Situational Sensing System (S2AS), Maritime Electromagnetic Spectrum Operational Action Project (AESOP), Joint Automatic Communication Electronic Action Instruction System (JACS), Host Country Global Online Spectrum Database, etc., with real-time spectrum Measurement and online analysis, spectrum planning and deduction and frequency allocation, electromagnetic interference analysis and conflict elimination, electromagnetic warfare environment modeling simulation, electromagnetic situation sharing and frequency efficiency evaluation, spectrum resource access and database functions and capabilities.

In combat equipment and technology projects [3][26][27], in 2011, the DARPA began to initiate behavioral learning adaptive electronic warfare (BLADE), adaptive radar confrontation (ARC), extreme radio frequency spectrum CommEx, Active Electronic Scan Array (AESA) technology, Near Zero-Power Radio Frequency and Sensor Operation (N-ZERO), under the conditions of the project, through the development of new technologies such as real-time evaluation of countermeasures, autonomous generation of measures, immediate feedback of effects, etc. Unknown waveform and behavioral electromagnetic spectrum threats Real-time tactical confrontation new capabilities; In 2010, the Air Force launched a Cognitive Jammer and HiPERDAC project based on Networked Software Defined Architecture (SDA) and passive RF PRIDE, SWEATER, and CHAMP (Eliminate High-Power Microwave Advanced Missiles) to develop active and passive target threat automatic recognition, real-time assessment and adaptive confrontation technologies and capabilities The US Navy conducts a maritime electronic warfare improvement (SEWIP-Block I/II/III) SLQ-32 shipboard electronic warfare system and ship signalling Equipment (SSEE), electromagnetic command and control (EMC2), integrated mast (InTop) shipborne antenna, next-generation jamming machine (NGJ) and other projects to improve real-time threat assessment and situational awareness, mission program modeling simulation, automatic distribution of electromagnetic spectrum , Combat Operations Analysis and other capabilities; the US Army launched the Electronic Warfare Planning and Management Tool (EWPMT) and Multi-Functional Electronic Warfare (MFEW), Defensive Electronic Assault (DEA) and Silencer Electronics scheduled for September 2016 Warfare and other systems enhance the electronic support for the perception of radio signals and the ability to send electronic signals that interfere with or deceive signals. Earlier this year, the Strategic Command Joint Electronic Warfare Center (JEWC) initiated research on new technologies that provide improved electromagnetic battle management capabilities for electromagnetic spectrum situational awareness and command and control, and plans to implement real-time strategy-based spectrum control and advanced electromagnetic battle sequences (EOB) within five years. ) Characterization and action plan modeling, simulation, analysis, and other capabilities and achieve 7-8 level of technology maturity [28]. Driven by cognitive EW and artificial intelligence technologies, DARPA launched the Radio Frequency Machine Learning System (RFMLS) and Spectrum Joint Challenge Program on August 11, 2017 to develop automatic identification and characterization of target signals from a large number of complex spectrum signals. New technology [29].

2  Joint Electromagnetic Spectrum Theory

The electromagnetic spectrum warfare is the latest theory of information warfare of the US military in the 21st century. As research and understanding continue to deepen, the U.S. military will gradually place new strategic ideas as tactics and tactical measures. In order to unify the battlefield electromagnetic spectrum utilization and control actions, the U.S. military issued a series of directives, regulations, regulations, and other documents to publish a summary of the JDN3-16 “Joint Electromagnetic Spectrum Operation” regulations, and standardized the operational concept, mission category, organization, and combat planning and implementation. Evaluation and so on.

2.1 Basic concepts

Electromagnetic Spectrum Operations (EMSO) is the conceptual starting point for the US military’s electromagnetic spectrum warfare theory. It is based on electronic warfare and spectrum management and is based on joint electromagnetic spectrum operations. The goal is to achieve electromagnetic spectrum advantages in electromagnetic operating environment (EMOE), involving spectrum management operations, joint electromagnetic spectrum operations (JEMSO) and joint electromagnetic spectrum. Management actions and other concepts. According to the US military regulations JP1-02 “Defense Ministry Military Terms Glossary” [30], JP6-01 “Joint Electromagnetic Spectrum Management Action”, JDN3-16 “Joint Electromagnetic Spectrum Operations” and ATP6-02.70 “Electromagnetic Spectrum Management Combat Operations Skills” , United electromagnetic spectrum operations are coordinated military operations carried out by two or more units for use, attacks, protection and management of operational electromagnetic environment. The electromagnetic spectrum management action refers to the interaction between the spectrum management, frequency allocation, host country coordination, policy compliance, and conflict resolution in the entire phase of military operations to jointly promote the planning, management, and implementation of operations within the electromagnetic operations environment. The relationship between various concepts and categories is shown in Figure 1.

Fig. 1 Diagram of related concepts of electromagnetic spectrum operations [19]

2.2 Task Domain Positioning

The U.S. military believes that the joint electromagnetic spectrum combat mission domain is composed of four-dimensional missions of electromagnetic spectrum utilization, management, attack, and protection. Among them, missions include signal intelligence gathering, distribution, and electronic warfare support. Management tasks include electromagnetic spectrum management and electromagnetic battle management. Missions have electronic attacks and navigation warfare, protection tasks have electronic protection and joint spectrum interference cancellation. The operational concept aims to operationally integrate the electromagnetic spectrum operations of the joint forces in the electromagnetic operating environment, establish key priorities, organize action coordination, and eliminate conflicts. Through the full integration of electromagnetic maneuvering schemes, strength and action to strengthen coordination and unification, the electromagnetic spectrum of the battlefield is realized. control. It plays a key role in the formation of joint operational capability in all operational areas, and has a profound impact on the joint forces’ command and control, intelligence, firepower strikes, adjustment and mobility, protection, and maintenance of operational capabilities.

2.3 Organizational Framework

The organization of the joint electromagnetic spectrum operations is responsible for the formulation and publication of policy directives and operational guidelines for commanders and commanders, and for combat planning, operational implementation, coordination of operations, and operational evaluation. The person in charge of electromagnetic spectrum control assigned by the Joint Force Commander shall assume the overall responsibility for the joint electromagnetic spectrum operations. The Joint Electromagnetic Spectrum Operations Unit (JEMSOC) is the chief staff of the Joint Force, and the person in charge of electromagnetic spectrum control assigns a supervisor to direct the command. Each service set up an electromagnetic spectrum operations division, each of which administers an electromagnetic spectrum operational unit, and assumes the functions of integrated network operations, electronic warfare, and spectrum management operations. They are the Army’s electronic warfare officer’s network of electromagnetic action units and the Navy’s maritime operations. The operational center electromagnetic spectrum operational unit, the Air Force air operations center electronic warfare coordination unit, the Marine Corps Combat Development and Integration Command’s cyberspace and electronic warfare coordination unit, and the Multinational Force Joint Staff Operations Department’s contracted electronic warfare coordination unit. The Joint Electromagnetic Spectrum Operational Organization of the Joint Force is shown in Figure 2. The joint electromagnetic spectrum combat unit architecture is shown in Figure 3.

Figure 2 Electromagnetic Spectrum Operational Organization

Figure 3 Joint Electromagnetic Spectrum Operations Unit Architecture

2.4 Combat Planning Process

Joint electromagnetic spectrum combat planning is jointly completed by all levels of joint electromagnetic spectrum combat units. During task analysis, the combat plan development team develops a staff assessment plan to determine the electromagnetic spectrum support degree in the formulation and analysis of the action plan as a strategic basis for achieving the advantages of the electromagnetic spectrum; after the action plan is selected, joint electromagnetics are developed. The spectrum operations appendix describes mission tasks, priorities, policy strategies, process steps, and implementation procedures for the entire operational phase, establishing coordination measures, specific procedures, and engagement rules for the use of electromagnetic battle management and control systems in the joint operations domain; The Ministry submits its own electromagnetic spectrum operations plan and integrates it into this appendix. During the planning and implementation of the plan, the Joint Electromagnetic Spectrum Operations Unit strengthens the electromagnetic spectrum operations plans of each division and participates in the development of various divisions, establishment of priorities, establishment of operational integration and operational coordination, and the creation of an electromagnetic spectrum control plan. Then, the updated electromagnetic spectrum control plan is adjusted to start the joint electromagnetic spectrum combat implementation cycle to generate an electromagnetic spectrum control sequence that guides the use of the electromagnetic spectrum of the joint force. The combat planning process is shown in Figure 4.

Figure 4 Joint Electromagnetic Spectrum Combat Plan Development Process

2.5 Operational methods

The joint electromagnetic spectrum operations implementation process is a continuous cycle of planning, implementation and evaluation. The united electromagnetic spectrum combat unit completes the formulation of the electromagnetic spectrum control plan and the electromagnetic spectrum control sequence, and establishes the combat cycle for combat operations. After the approval of the person in charge of electromagnetic spectrum control, it publishes and organizes the implementation to each branch’s combat unit and unit. The electromagnetic spectrum combat unit fully participates in the key combat flow of the joint force and adjusts the update plan and sequence in time according to the user needs of the subunits and the electromagnetic spectrum of the battlefield during the operation period to ensure that each electromagnetic spectrum control sequence is effectively generated and efficiently Released and executed. The basic processes are: Formulation and release of control plans, update of control plans for each division, preparation of operational plans, generation and distribution of control sequences, execution and adjustment of operational implementation plans and control sequences, and monitoring and guidance of operational processes. The operational implementation cycle is shown in Figure 5.

Figure 5 Joint Electromagnetic Spectrum Operational Implementation Cycle

3  Electromagnetic Spectrum Combat Development Characteristics

New military capabilities cannot be separated from the new system. As an operational concept that responds to new military challenges in the era of information networks, big data, and artificial intelligence, electromagnetic spectrum warfare has become a new direction for the development of the combat effectiveness of the US military. In order to deepen understanding and be efficient and practical, the U.S. military has pushed the new concept to the battlefield from many dimensions, including the development of policy directives, organization and force adjustment, equipment systems and new technology research and development.

3.1 Reinforce basic concepts and theoretical understanding based on policy directives, promote operational concepts and implement operations

Thought leads action. The U.S. military is good at innovative operational concepts and the concept of electromagnetic spectrum warfare is no exception. The first is to focus on clarifying the concept core and uniting the concept. During the early years of the development of the electromagnetic spectrum warfare, new concepts for the new combat domain were always being demonstrated. The military led high-level forums such as the “Old Ravens” and other professional military and military forums to analyze the related theories involved in the concept, exchange technology development and application methods, and promote deeper understanding. At the same time, in the strategic documents and top-level regulations, the relevant old and new policies were gradually sorted out. The links and distinctions between concepts, and the analysis of their categories and task areas, are increasingly contributing to the clear definition of concepts and the formation of theoretical systems. The second is to use operations on the battlefield, and refine the rules step by step. The U.S. military has always attached importance to the concept of combat to the implementation of warfare and technical measures. It took only about three years from the conception of the electromagnetic spectrum to the entry directives and from the joint directive to the arms and military operational manuals and the TTP. The US Army even established a concept blueprint for the use of battlefields before the Joint Staff. Joint operational and operational guidance for systemic operations at the level of the joint level to the unit level.

3.2 Establish an efficient and integrated force structure based on intrinsic power, and strive to use the full cycle of coordination and order in the battlefield

The troops are the carrier of operations. The U.S. military attaches great importance to the optimization and integration of new concept combat forces and existing capabilities. The first is to focus on the overall planning of the capability system. The trajectory of the capabilities of the US military’s electromagnetic spectrum warfare and cyberspace operations is similar. From the Joint Staff Headquarters, the Joint Forces Command to the military arms, set up combat seats and corresponding implementation teams, and establish a full-flow operation mechanism for operational planning, accusation, implementation, and evaluation to form an efficient and smooth capability integration system. The second is to emphasize the coordination and integration of existing institutions and new forces. Through the clarification of the responsibilities and interrelationships of institutions and forces involved in new capabilities in a timely manner, action-oriented operational procedures and implementation procedures are formulated, and even the relevant regulatory templates for coordination activities are promoted to facilitate the whole-system action coordination of electromagnetic spectrum operations and other mission domains. Orderly. The third is relying on actual drills to verify their capabilities in a timely manner. Based on the new concepts of combat and capability goals, the practice of offensive and defensive battles in the field of electromagnetic spectrum is rapidly promoted, and corrections are made during operational trials. The U.S. Army formed an independent electromagnetic spectrum warfare unit of the 1st battlefield network warfare group from February to May last year and plans to participate in an exercise organized by a regional battle commander at the end of the year [31]; the U.S. Air Force is in the “battle shield” exercise. In response to the “Spectrum Interference Elimination Project”, radar EW system evaluation [5] was implemented.

3.3 Promote the pre-research of the new concept equipment system with the support of scientific and technological strength, transform the high technology into the advantage of combat effectiveness

Strong army must have weapon. High-tech equipment is an important way to give birth to newcomer warfare capabilities. The first is to excavate new battlefield changes and assess new demands. The US Department of Defense’s “Electromagnetic Spectrum Strategy” in 2014 pointed out that it is necessary to quantify spectrum requirements and develop the equipment and technologies needed for the electromagnetic environment to enhance real-time spectrum operation and electromagnetic spectrum system real-time identification, prediction and interference cancellation capabilities [9]. From the bottom up to the top, the U.S. military has established a demand collection and integration mechanism for the deployment and deployment of equipment systems and applications. It collects and sorts regularly and conducts special investigations and demonstrations with the aid of the government audit department, Rand Corporation, and a special panel of institutes. The analysis results can be Directly providing decision support for the Ministry of Defense and the Joint Staff Association, it forms an unobstructed demand management evaluation system, and injects activators for the development of electromagnetic spectrum warfare equipment and the development of new combat capabilities. The second is to pay attention to the integration of pre-research technology to equipment system applications. The U.S. military equipment system development will be based on national defense information architecture standards. It will have system processes and capabilities such as simulation modeling, pre-research, technology integration, and application verification. It will focus on the simultaneous improvement of existing models and the development of new research and development of smart technology and equipment systems. “Determining Electromagnetic Waves” pointed out that the important features of the electromagnetic spectrum warfare in the new phase are passive sensor applications and the use of “low-zero-power” capabilities to counteract the enemy’s anti-electromagnetic confrontation, and intelligent technologies and equipment are the future dominant [6]. The pre-research and integration of electromagnetic spectrum warfare technology and equipment will also be able to achieve a more optimal way to upgrade military capabilities to technological capabilities, integrate cutting-edge technologies with mature methods, and integrate specialized systems into integrated platforms, thus achieving a seamless leap in combat effectiveness.


Original Mandarin Chinese:

电磁频谱技术决定未来战争赢家 美军发展现状需警惕


長期以來,為破解反進入/區域拒止(A2 / AD)困局,達成新的抵消戰略,美軍先後推出空地/空海一體戰,網絡中心戰,分佈式殺傷,多域戰和混合戰爭等作戰新思想,不斷謀求導彈攻防,網絡電磁和多域空間等軍事優勢。如今,電磁頻譜戰成為引領新一輪軍事理論和技術創新的新寵。研究和剖析美軍電磁頻譜作戰發展現狀與特點,對於我軍在信息戰場禦敵制勝具有重要現實意義。


1956年,前蘇聯海軍司令Sergei Gorschkov上將指出:“誰控制了電磁頻譜,誰將贏得下一場戰爭”。六十年後,電磁頻譜成為現代戰爭的關鍵作戰域之一。為爭奪戰場電磁頻譜優勢,美軍從作戰理論到裝備技術進行深入探索,發展迅猛。


電磁頻譜控制由來已久。上世紀70年代初,美參聯會主席Thomas H. Moorer稱,第三次世界大戰的勝利者將是能高度控制和管理電磁頻譜的一方。美國“老鴇鴉”協會最早提出將電磁控制(EMC)作為電子戰概念的第四組成部分。2009年,戰略司令部推出電磁頻譜戰(EMSW)早期概念,在電子戰基礎上增加電磁頻譜管理(EMSM),電磁頻譜控制(EMSC),電磁戰鬥控制(EMBC)等任務內容[1]。2012年,戰略司令部建立聯合電磁頻譜控制中心(JEMSCC),旨在實現電子戰和電磁頻譜管理全面集成,各部隊也分別建立相應的組織協調機構和分隊[2]。美海軍同年提出電磁機動戰(EMMW)概念[3],並在2015年3月發布“21世紀海上力量合作戰略”,概要闡述了電磁機動戰目標,構成,技術項目和實現路徑[4]。2015年12月,美國防部首席信息官TerryHalvorsen指出,電磁頻譜有望被視作繼,海,空,天,賽博空間之後第六作戰域[5];同月,戰略與預算評估中心在“決勝電磁波:重拾美國電磁頻譜領域主宰地位”[6]報告中提出“低 – 零功率“電磁頻譜戰概念,闡述了概念思想,趨勢特點,能力和技術需求及當前障礙並提出視圖,概念,採辦,技術,驗證等方面建議。2016年11月底,美國”老鴇鴉“協會第53屆國際研討會以“電磁頻譜作戰全球視野”為主題,展示電子戰,頻譜感知與衝突消除的新概念與技術成果,探討電磁頻譜作戰環境,政策條令,裝備採辦,聯合訓練與作戰能力等[ 7]。2017年1月新任國防部長Ashton Carter簽署首部“電子戰戰略”文件,正式確立電磁頻譜為獨立作戰域並闡述如何實施作戰[8]。


戰略政策與軍事條令集中體現美軍作戰理論發展。美國防部2006年至2014年多版更新“電磁頻譜戰略”,聚焦推進頻譜裝備發展,頻譜行動靈活性,頻譜管理和政策響應能力提升等戰略目標[ 9];戰略司令部2010年8月發布“贏得21世紀經濟與安全優勢:電磁頻譜控制戰略框架”,從目標,需求,戰略開發等多角度構建電磁頻譜控制體系架構[10];參聯會先後於2012年3月頒布JP6-01“聯合電磁頻譜管理行動”聯合出版物[11],2012年12月簽頒CJCSM3320.01C“電磁作戰環境中聯合電磁頻譜管理行動”主席手冊[12], 2013年1月簽發CJCSI3320.01D“聯合電磁頻譜作戰”指示[13]和CJCSM3320.04“電子戰支援聯合電磁頻譜作戰”手冊[14],2015年3月簽署“電磁頻譜作戰聯合概念”文件[ 15,系統闡明聯合部隊開展電磁頻譜作戰行動的戰略願景,組織機構與職能,指揮與管理關係,計劃制定與作實施,作戰集成與行動協同等內容,並逐步向電磁控制,干擾消除,頻譜管理和電子戰重編程等操作層的戰術,技術與程序(TTP)細化;美陸軍於2007年12月發布TRADOC P525-7-16“美陸軍未來模塊化部隊概念能力計劃2015-2024–電磁頻譜作戰”手冊[16],2010年5月頒布野戰條令FM6-02.70“陸軍電磁頻譜作戰”[17],2014年1月頒布野戰手冊FM3-38“網絡電磁行動”[18],2015年12月發布出版物ATP6-02.70“電磁頻譜管理作戰行動技能”[19],2016年2月更新AR525-15“網絡電磁行動軟件重編程“規定[20],美空軍2017年更新AFI10-703”電子戰集成重編程“指示[21],在聯合條令指導下界定電磁頻譜作戰概念範疇,深度闡述機構與職責,作戰架構,計劃制定與協調控制,任務清單與決策流程,行動分隊與管理工具及DOTMLPF等問題,並促進電磁頻譜作戰,電子戰與網絡空間戰的融合。此外,美聯合部隊開發部主管Kevin D. Scott於2016年10月簽署JDN3-16“聯合電磁頻譜作戰”條令紀要[22],規範了術語和作戰框架標準,對職能角色,組織機構,計劃制定,作戰實施和評估作了程序性描述,它以參聯會2013年1月和3月簽頒的CJCSM3320.02D“聯合頻譜干擾消除程序”,CJCSI3320.02F“聯合頻譜干擾消除”和2014年2月的CJCSI3320.02E-1“聯合頻譜干擾消除程序保密增本”三大條令[23] [24] [25]為重要操作支撐,成為美軍電磁頻譜戰最新指導。



在頻譜管控系統上[19] [26],美國防部自2005年開發部署同盟國聯合頻譜管理規劃工具(CJSMPT)與全球電磁頻譜信息系統(GEMSIS),隨後的頻譜XXI與改進型頻譜XXIO,頻譜感知管理與規劃系統(SSC-SSMPS),頻譜態勢感知系統(S2AS),海上電磁頻譜作戰行動項目(伊索),聯合自動通信電子行動指令系統(JACS),東道國全球在線頻譜數據庫等,具備實時頻譜測量與在線分析,頻譜籌劃推演與頻率分配,電磁干擾分析與衝突消除,電磁作戰環境建模仿真,電磁態勢共享與用頻效能評估,頻譜資源接入與數據庫等功能與能力。

在作戰裝備與技術項目上[3] [26] [27],2011年,預先研究計劃局(DARPA)開始啟動行為學習自適應電子戰(刀片),自適應雷達對抗(ARC),極端射頻頻譜條件下通信(CommEx),主動電子掃描陣列(AESA)技術,近零功耗射頻和傳感器運行(N-ZERO)等項目,通過對抗行為實時評估,措施自主生成,效果即時反饋等新技術開發針對未知波形和行為的電磁頻譜威脅實時戰術對抗新能力; 2010年,空軍啟動基於網絡化軟件定義架構(SDA)的認知干擾機與大功率高效射頻數模轉換器(HiPERDAC)項目以及無源射頻識別環境(PRIDE),頻譜戰評估技術工程研究(衫),反電子高功率微波先進導彈(CHAMP)等項目,發展有源和無源目標威脅自動感知識別,實時評估和自適應對抗技術與能力;美海軍開展海上電子戰改進(SEWIP-塊1 / II / III)SLQ-32艦載電子戰系統,艦船信號探裝備(SSEE),電磁指揮與控制(EMC2),集成桅杆(InTop)艦載天線,下一代干擾機(NGJ)等項目,提升實時威脅評估與態勢感知,任務方案建模仿真,電磁頻譜自動分配,作戰行動分析等能力;美陸軍啟動計劃在2016年9月投入使用的電子戰規劃與管理工具(EWPMT)和多功能電子戰(MFEW),防禦性電子攻擊(DEA)和“消音器”電子戰等系統,增強射頻信號感知的電子支援和發送干擾或欺騙信號的電子攻擊能力。今年初,戰略司令部聯合電子戰中心(JEWC)啟動面向電磁頻譜態勢感知與指揮控制提供改進電磁戰鬥管理能力的新技術研究,計劃5年內實現基於策略的實時頻譜管控,先進電磁戰鬥序列(EOB)表徵和行動方案建模仿真分析等能力並達到7-8級技術成熟度[28]。在認知電子戰和人工智能技術推動下,DARPA在2017年8月11日又啟動了射頻機器學習系統(RFM LS)和頻譜聯合挑戰項目,開發從大量複雜頻譜信號中自動區分和表徵目標信號的新技術[29]。




電磁頻譜作戰(EMSO)是美軍電磁頻譜戰理論的概念基點。它以電子戰和頻譜管理為基礎,以聯合電磁頻譜作戰為實現方式,目標是在電磁作戰環境(EMOE)中達成電磁頻譜優勢,涉及頻譜管理行動,聯合電磁頻譜作戰(JEMSO)和聯合電磁頻譜管理行動等概念。根據美軍條令JP1-02“國防部軍事術語詞典”[30],JP6-01“聯合電磁頻譜管理行動”,JDN3 -16“聯合電磁頻譜作戰”和ATP6-02.70“電磁頻譜管理作戰行動技能”界定,聯合電磁頻譜作戰是由兩個或兩個以上部隊開展的用於利用,攻擊,防護和管理電磁作戰環境的協同軍事行動。電磁頻譜管理行動是指在軍事行動全階段共同促成計劃,管理和實施電磁作戰環境內作戰行動的頻譜管理,頻率分配,東道國協調,政策遵循,衝突消除等相互聯繫的功能。各概念間關係與範疇如圖1。





















強軍必需利器。高新技術裝備是催生新生作戰能力的重要途徑。一是善於發掘戰場新變化並評估新需求。美國防部2014年“電磁頻譜戰略”指出,要量化頻譜需求,發展電磁環境所需裝備和技術,增強實時頻譜操作和電磁頻譜系統實時識別,預測及干擾消除等能力[9]。美軍由底至頂建立了面向裝備系統研建與作戰部署應用的需求採集與集成機構,在定期蒐集梳理的同時借助政府審計署,蘭德公司和院所專題小組進行專項調研論證,分析結果可直接為國防部和參聯會提供決策支持,形成了暢通有力的需求管理評估體系,為研建電磁頻譜戰裝備和開發新型戰鬥力注入激活劑。二是注重預研技術向裝備系統集成應用。美軍裝備系統研建都會基於國防信息體系結構標準展開,具備仿真建模,預先研究,技術集成,應用驗證等系統流程和完善能力,注重同步進行原有型號改進和新研智能技術裝備系統開發“決勝電磁波”指出,新階段電磁頻譜戰重要特徵是無源傳感器應用和採用“低 – 零功率”。能力對敵進行反電磁對抗,智能化技術和裝備是未來主導[6]。電磁頻譜戰技術裝備預研與集成也將能夠以更優方式實現軍事問題向技術能力升級,前沿技術與成熟方法互融,專用系統向綜合平台集成,進而完成戰鬥力優勢無縫躍升。

Original Source:


中國新的網絡安全法 // Internet Security Law of the People ‘s Republic of China

中國新的網絡安全法 // Internet Security Law of the People ‘s Republic of China

Table of Contents

    Chapter 1 General Provisions

Chapter 2 Network Security Support and Promotion

Chapter 3 Network Operation Safety

Section 1 General Provisions

SECTION 2: Operational safety of key information infrastructures

Chapter 4 Network Information Security

Chapter 5 Monitoring Early Warning and Emergency Handling

Chapter VI Legal Liability

Chapter VII Supplementary Provisions

Chapter 1 General Provisions

The first order to protect network security , safeguard cyberspace sovereignty and national security , public interests , protection of citizens , legal persons and other organizations , to promote the healthy development of economic and social information , this law is enacted .

Article in the territory of People’s Republic of China construction , operation , maintenance and use of the network , as well as supervision and management of network security , this Law shall apply .

Third countries adhere to both network security and information technology development , follow the active use , scientific development , according to management , to ensure the safety policy , promote the network infrastructure construction and interoperability , to encourage innovation and application of network technology , to support the development of network security personnel , Establish and improve the network security system , improve network security protection .

Article 4 The State shall formulate and continuously improve the network security strategy , clearly define the basic requirements and main objectives of the network security , and put forward the network security policies , tasks and measures in the key areas .

Article 5 The State shall take measures to monitor , defend and dispose of network security risks and threats arising from the territory of the People’s Republic of China , protect the critical information infrastructure from attack , intrusion , interference and destruction , punish the network for criminal activities and maintain the network Space security and order .

Article 6 The State shall promote the network behavior of honesty and trustworthiness , health and civilization , promote the dissemination of socialist core values , and take measures to raise the awareness and level of cybersecurity in the whole society and form a favorable environment for the whole society to participate in promoting network security .

Article VII countries active in cyberspace governance , network technology research and standards development , the fight against international exchange and cooperation network and other crimes , to promote the building of peace , security , open , cooperative cyberspace , multilateral , democratic , transparent network Governance system .

Article VIII of the National Network Information Department is responsible for co-ordination network security and related supervision and administration . State Council department in charge of telecommunications , public security departments and other relevant authorities in accordance with this Law and other relevant laws , administrative regulations , responsible for network security and supervision and administration within their respective areas of responsibility .

Local people’s governments above the county level of network security and regulatory functions , determined in accordance with relevant state regulations .

Article IX network and service operators to carry out business activities , must abide by laws , administrative regulations , respect social ethics , abide by business ethics , honesty and credit , fulfill the obligation to protect network security , and accept the supervision of government and society , social responsibility .

Article X build , operate or provide network services through a network , it should be in accordance with laws , regulations and national standards and administrative regulations of mandatory requirements , technical measures and other necessary measures , to ensure network security , stable operation , to effectively deal with network security incidents , Prevent cyber criminal activities , maintain the integrity of network data , confidentiality and usability .

Article XI  network-related industry organizations accordance with the constitution , strengthen self-discipline , to develop guidelines for network security behavior , guide members to strengthen network security , increase network security levels , and promote the healthy development of the industry .

Article XII of  the State protection of citizens , legal persons and other organizations the right to use the network in accordance with law , the promotion of universal access network , improve network service levels , and provide safe , convenient network services , to protect the free flow of network information according to law and orderly .

Any person and organization using the network should abide by the constitutional law , abide by the public order , respect social morality , not endanger the network security , shall not use the network to endanger national security , honor and interests , incite subversion of state power , overthrow the socialist system , incitement to split the country , The destruction of national unity , the promotion of terrorism , extremism , the promotion of national hatred , ethnic discrimination , the dissemination of violence , obscene pornography , fabricating and disseminating false information to disrupt economic order and social order , and infringe upon the reputation , privacy , intellectual property and other legitimate rights and interests of others And other activities .

Article XIII  countries to support research and development is conducive to healthy growth of minors networking products and services , punishing minors using the Internet to endanger physical and mental health activities according to law , to provide security for minors , healthy network environment .

Article 14  Any individual or organization shall have the right to report to the network , telecommunications , public security and other departments that are harmful to the safety of the Internet . The department that receives the report shall handle it in a timely manner and if it does not belong to the duties of the department , it shall promptly transfer the department to be handled .

The relevant departments shall keep the relevant information of the whistleblower and protect the legitimate rights and interests of the whistleblower .

Chapter 2 Network Security Support and Promotion

Article 15 The  State shall establish and improve the network security standard system . The department in charge of standardization of the State Council and other relevant departments under the State Council shall, in accordance with their respective duties , organize and formulate and revise the national standards and industry standards for network security management and network products , services and operation safety .

National support enterprises , research institutions , colleges and universities , network-related industry organizations to participate in network security national standards , industry standards .

Article 16 The   State Council and the people’s governments of provinces , autonomous regions and municipalities directly under the Central Government shall make overall plans , increase investment , support key network security technology industries and projects , support the research and development and application of network security technology , promote safe and reliable network products and services , Protection of network technology intellectual property rights , support enterprises , research institutions and colleges and universities to participate in national network security technology innovation projects .

Article 17 The   State shall promote the construction of a social security service system for network security and encourage the relevant enterprises and institutions to carry out safety services such as network security certification , testing and risk assessment .

Article 18 The   State encourages the development of network data security protection and utilization technology to promote the opening of public data resources and promote technological innovation and economic and social development .

State support innovative network security management , the use of new network technologies , enhance network security level .

Article XIX   governments at all levels and relevant departments should organize regular network security education , and guidance , and urge the relevant units to do network safety publicity and education work .

The mass media should be targeted to the community for network security publicity and education .

Article 20 The  State shall support enterprises and institutions of higher education , vocational schools and other educational and training institutions to carry out network safety-related education and training , and adopt a variety of ways to train network security personnel and promote the exchange of network security personnel .

Chapter 3 Network Operation Safety

Section 1 General Provisions

Article 21 The  State shall implement a system of network security protection . Network operators should be in accordance with the requirements of the network security level protection system , perform the following security obligations , to protect networks from interference , damage or unauthorized access , preventing data leakage or stolen , tampered with :

( 1 ) to formulate internal safety management systems and operating procedures , to determine the network security responsible person , the implementation of network security protection responsibility ;

( 2 ) to take precautions against computer viruses and network attacks , network intrusion and other hazards of network security behavior of technical measures ;

( 3 ) to take technical measures to monitor and record the operation status of the network and the network security incident , and to keep the relevant network log in accordance with the regulations for not less than six months ;

( D ) to take data classification , important data backup and encryption and other measures ;

( 5 ) other obligations stipulated by laws and administrative regulations .

Article 22 The  network products and services shall conform to the mandatory requirements of the relevant national standards . Network products , service providers may not set up malicious programs ; found their network products , services, security defects , loopholes and other risks , should immediately take remedial measures , in accordance with the provisions of the timely notification of the user and report to the relevant authorities .

The providers of network products and services shall provide continuous maintenance of their products and services ; they shall not terminate the provision of safety maintenance within the time limit prescribed by the parties or the parties .

Network products , services with the collection of user information function , the provider should be clear to the user and obtain consent ; involving the user’s personal information , but also should comply with this law and the relevant laws and administrative regulations on personal information protection requirements .

Article 23 The  network of key equipment and network security specific products should be in accordance with national standards of mandatory requirements , qualified by the agency safety certification or qualified safety testing to meet the requirements after , before they sell or provide . The State Network letter department in conjunction with the relevant departments of the State Council to develop and publish network key equipment and network security products directory , and promote safety certification and safety testing results mutual recognition , to avoid duplication of certification , testing .

Article 24 The  network operator shall handle the services such as network access , domain name registration service , fixed telephone and mobile telephone , or provide services such as information release and instant messaging , and enter into an agreement with the user or confirm the service when , should be required to provide true user identity information . If the user does not provide the true identity information , the network operator shall not provide the relevant service .

National implementation trusted identity network strategy , to support research and development of safe , convenient electronic authentication technology , to promote mutual recognition between different electronic authentication .

Article 25  network operators shall develop network security emergency response plan , timely disposal system vulnerabilities , computer viruses , network attacks , security risks and other network intrusions ; in the event of the occurrence of the harm network security , immediately launched the emergency plan , take the appropriate remedial measures , and report to the relevant authorities in accordance with the provisions .

Article 26   to carry out certification of network security , detection , risk assessment and other activities , released to the public system vulnerabilities , computer viruses , network attacks , network intrusions and other network information security , should comply with the relevant provisions of the State .

Article 27   No individual or organization may not engage in illegal intrusion into networks of others , interfere with the normal function of the network of others , active network data theft and other hazards network security ; not provide specifically for the network in the invasion , interfere with the normal function of the network and protective measures , theft Network data and other activities that endanger the network security activities , tools ; knowing that others engaged in activities that endanger network security , not to provide technical support , advertising , payment and settlement help .

Article 28 The   network operators shall provide technical support and assistance to the public security organs and the state security organs to safeguard the national security and the investigation of crimes according to law .

Article 29 The   State supports between network operators to collect information on network security , analysis , reporting and emergency response and other aspects of cooperation , to improve the security capabilities of network operators .

Relevant industry organizations to establish and improve network security norms and mechanisms for cooperation in this sector , to strengthen the analysis and evaluation of network security risks , regularly risk warning to the members , to support , to assist members to deal with network security risks .

Article 30   Network and Information Department and relevant information acquired in the performance of network security protection responsibilities , only for the need to maintain network security , shall not be used for other purposes .

SECTION 2: Operational safety of key information infrastructures

Article 31 The   state public communication and information services , energy , transportation , water conservancy , finance , public services , e-government and other important industries and fields , as well as other once destroyed , the loss of functionality or data leakage , could seriously endanger national security , people’s livelihood , the critical information infrastructure of public interest , on the basis of network security protection system on , special protection . The specific scope and safety protection of key information infrastructure shall be formulated by the State Council .

The country encourages network operators outside key information infrastructures to participate voluntarily in critical information infrastructure protection systems .

Article 32  in accordance with the division of duties prescribed by the State Council , responsible for the protection of critical information infrastructure security departments are working to formulate and implement the industry , the art of critical information infrastructure security planning , guidance and supervision of the safe operation of critical information infrastructure protection Work .

Article 33 The   construction of the critical information infrastructure to support business should ensure it has a stable , continuous operation performance , and technical measures to ensure the safety synchronized planning , simultaneous construction , simultaneous use .

Article 34   In addition to the provisions of Article 21 of this Law , critical information infrastructure operators shall perform the following security obligations :

( A ) set up a special safety management and safety management agency in charge of people , and the negative security background screening of responsibility and the key staff positions ;

( 2 ) regularly carry out network security education , technical training and skills assessment for employees ;

( Iii ) disaster recovery of critical systems and databases ;

( D ) the development of network security incident contingency plans , and regular exercise ;

( 5 ) other obligations stipulated by laws and administrative regulations .

Article 35 Where  a operator of a key information infrastructure purchases a network of products and services that may affect the safety of the State , it shall pass the national security review organized by the State Network Department in conjunction with the relevant departments of the State Council .

Article 36 of   the critical information infrastructure of network operators purchasing products and services , shall sign a confidentiality agreement with the security provider in accordance with the provisions , clear security and confidentiality obligations and responsibilities .

Article 37  Personal information and important data collected and produced by operators of key information infrastructure operators in the territory of the People’s Republic of China shall be stored in the territory . Due to business needs , do need to provide to the outside , should be in accordance with the State Network letter department in conjunction with the relevant departments of the State Council to develop a safety assessment ; laws and administrative regulations otherwise provided , in accordance with its provisions .

Article 38   critical information infrastructure operator shall himself or entrust their network security services and the possible risk of network security test and evaluation carried out at least once a year , and will assess the situation and improve the detection measures submitted to the responsible Key information Infrastructure Security protection work .

Article 39 The   State Network Letters shall coordinate the relevant departments to take the following measures for the protection of key information infrastructures :

( A ) the security risk of critical information infrastructure will be random testing , suggest improvements , can be entrusted network security services when necessary for the existence of network security risk assessment to detect ;

( 2 ) to organize the operators of key information infrastructures on a regular basis to conduct network security emergency drills to improve the level and coordination capability of responding to network security incidents ;

( 3 ) to promote the sharing of network security information between the relevant departments and operators of key information infrastructures and relevant research institutions and network security services ;

( Four ) emergency response network security incidents and recovery network functions, etc. , to provide technical support and assistance .

Chapter 4 Network Information Security

Article 40  network operators should collect information on its users strictly confidential , and establish and improve the user information protection system .

Article 41 Where a  network operator collects or uses personal information , it shall follow the principles of lawfulness , reason and necessity , publicly collect and use the rules , expressly collect and use the purpose , manner and scope of the information and agree with the collectors .

Services unrelated to the personal information of the network operator shall not collect its offer , shall not violate laws , administrative regulations and bilateral agreements to collect , use of personal information , and shall be in accordance with laws , administrative regulations and the agreement with the user , process save Of personal information .

Article 42   network operators shall not be disclosed , tampering , destruction of personal information it collects ; without the consent of the collectors , may not provide personal information to others . However , except that processing does not recognize a particular person and can not be recovered .

The network operator shall take technical measures and other necessary measures to ensure that the personal information collected by it is safe to prevent leakage , damage and loss of information . Or may occur in the event of leakage of personal information , damage , time lost the case , it should take immediate remedial measures , in accordance with the provisions promptly inform the user to the relevant competent authorities report .

Article 43   personal discovery network operators violate laws , administrative regulations or bilateral agreements to collect , use their personal information , the right to require network operators to delete their personal information ; find network operators to collect , store their personal The information is wrong , the right to require the network operator to be corrected . The network operator should take action to remove or correct it .

Article 44   No individual or organization may steal or acquire personal information in any other illegal manner and may not illegally sell or illegally provide personal information to others .

Article 45 The   departments and their staff members with network security supervision and administration according to law , must be aware of personal information in carrying out their duties , privacy and trade secrets strictly confidential , shall not disclose , sell or illegally available to others .

Article 46   No individual or organization shall be responsible for the use of network behavior , not set up to commit fraud , to teach criminal methods , production or sale of prohibited items , sites illegal and criminal activities of controlled items, etc. , communication groups , should not be used Internet publishing involves the implementation of fraud , the production or sale of prohibited items , control of goods and other criminal activities of the information .

Article 47   network operators should strengthen the management of information published by its users , we found that laws , administrative regulations prohibit the release or transfer of information , should immediately stop the transmission of the information , to take measures to eliminate the disposal, etc. , to prevent the diffusion of information , save The relevant records and report to the relevant authorities .

Article 48  electronic information sent by any individual and organization , application software provided , shall set up a malicious program , shall not contain laws , administrative regulations prohibit the release or transfer of information .

Send electronic information service providers and application software download service provider , shall perform the safety management obligations , know that the user is under the aforesaid acts , it should stop providing services , to take measures to eliminate the disposal, etc. , keep the relevant records , and the relevant authorities Report .

Article 49 The  network operators shall establish information such as complaints and reporting systems for network information security , announce complaints and report methods, and promptly accept and handle complaints and reports on the security of network information .

Supervision and inspection network operators to network and Information Department and relevant departments according to law , shall cooperate .

Article 50   National Grid and other departments concerned to fulfill the letter of network information security supervision and administration according to law , found legal , information and administrative regulations prohibit the release or transfer , should be required to stop the transmission network operator , to take measures to eliminate the disposal, etc. , keep the relevant records ; the above information comes from outside the People’s Republic of China , it shall notify the relevant agencies to take technical measures and other necessary measures to interrupt transmission .

Chapter 5 Monitoring Early Warning and Emergency Handling

Article 51 The   State shall establish a network security monitoring and early warning and information communication system . The national network letter department should coordinate the relevant departments to strengthen the network security information collection , analysis and notification work , in accordance with the provisions of unified release of network security monitoring and early warning information .

Article 52   is responsible for critical information infrastructure security affairs , shall establish and improve the industry , network security monitoring and early warning and communications systems in the art , and network security monitoring and early warning information submitted in accordance with the provisions .

Article 53   National Grid and Information Department to coordinate relevant departments to establish and improve network security risk assessment and emergency response mechanisms , the development of network security emergency response plan , and regular exercise .

Responsible for key information infrastructure security work departments should develop the industry , the field of network security incident contingency plans , and regularly organize exercises .

Network security emergency response plan should be in accordance with the degree of harm after the incident , the network security incidents were graded sphere of influence and other factors , and provides the appropriate emergency measures .

Article 54   of network security event that occurs when the risk increases , the provincial people’s governments shall, in accordance with statutory authorities and procedures , and the characteristics of the network security risks and possible harm , take the following measures :

( A ) asked the relevant authorities , institutions and personnel timely collection , reporting information , strengthening the monitoring of network security risks ;

( Two ) organizational departments , agencies and professionals , network security risk assessment information for analysis , predicting the likelihood of events , the scope and extent of harm ;

( C ) to the community release network security risk early warning , release to avoid , reduce the harm measures .

Article 55   of network security incidents , should immediately start emergency response plan network security , network security incident investigation and assessment , require network operators to take technical measures and other necessary measures , to eliminate safety hazards , prevent harm to expand , and in a timely manner Publish public-related warning messages to the community .

Article 56  above the provincial level people’s governments in the implementation of network safety supervision and management responsibilities , found that there is a big security risk or network security incidents , be in accordance with the authority and procedures of the legal representative of the network operator’s Person or main person in charge . The network operator shall take measures as required and carry out rectification and rectification to eliminate the hidden danger .

Article 57  because of network security incidents , the occurrence of unexpected events or production safety accidents , should be in accordance with the ” Emergency Response Law of People’s Republic of China “, ” Production Safety Law of People’s Republic of China ,” the relevant laws and so on , disposal and administrative regulations The

Article 58 for the maintenance of national security and public order , require major emergency incidents disposal of social security , the State Council decision or approval , can take temporary measures such as limiting network traffic in a particular area .

Chapter VI Legal Liability

Article 59 Where the   network operator fails to perform the obligations of the network security protection stipulated in Article 21 and Article 25 of this Law , the relevant competent department shall order it to make corrections and give a warning ; refusing to correct or cause harm to the network security and other consequences of , at 100,000 yuan fine of $ 10,000 or more , the person directly responsible for the 50,000 yuan fine of $ 5,000 or more .

If the operator of the key information infrastructure fails to perform the obligations of the network security protection as prescribed in Article 33 , Article 34 , Article 36 and Article 38 of this Law , the relevant competent department shall order it to make corrections and give a warning ; refuse to correct or cause harm network security consequences , at 1,000,000 yuan fine of $ 100,000 or more , the person directly responsible for at 100,000 yuan fine of $ 10,000 or more .

Article 60   in violation of the first paragraph of Article 22 of this Law , (2) and the first paragraph Article 48 , any of the following acts , ordered by the competent department of corrections , give a warning ; refuse to correct Or cause harm to the network security and other consequences , at 50,000 yuan to more than 500,000 yuan fine , the person in charge directly responsible for more than 10,000 yuan more than 100,000 yuan fine :

( A ) set up malicious programs ;

( Two ) of their products , security flaws services , risk exposure and other remedial measures are not taken immediately , or failing to promptly inform the user of the report to the relevant authorities ;

( 3 ) to terminate the security of its products and services .

Article 61   network operators who violate the provisions of Article 24 first paragraph , did not require users to provide real identity information , or provide related services for the user does not provide real identity information , by the competent authorities ordered to make corrections ; or refuse to correct the circumstances are serious , at five hundred thousand fine of $ 50,000 or more , and may be ordered by the competent authorities to suspend the relevant business , ordered to stop , to close the site , revoke the relevant business license or business license revoked , directly responsible for The person in charge and other directly responsible persons shall be fined not less than 10,000 yuan but not more than 100,000 yuan .

Article 62  in violation of Article 26 of this Law , to carry out certification of network security , detection , risk assessment and other activities , or to the public distribution system vulnerability , computer viruses , network attacks , network intrusions and other network security information , by the relevant the competent department shall order correction , given a warning ; refuse to correct or circumstances are serious , at 100,000 yuan fine of $ 10,000 or more , and may be ordered by the competent authorities to suspend the relevant business , ordered to stop , to close the site , revoked or related business license revoke the business license , the persons in charge and other directly responsible personnel directly responsible for 50,000 yuan fine of $ 5,000 or more .

Article 63   violation of Article 27 of this Law , engaged in activities that endanger network security , or to provide dedicated program to endanger network security activities , tools , technical support, or to endanger the security of network activity for others , advertising , payment settlement and other help , not constitute a crime , the public security authorities confiscate the illegal income , 5 days detention , can fine of over 50,000 yuan to 500,000 yuan fine ; the circumstances are serious , at least five days 15 days of detention , and may impose a fine of not less than 100,000 yuan but not more than one million yuan .

Units with the conduct of , the public security authorities confiscate the illegal income , at a fine of one million yuan more than 100,000 yuan , and directly in charge and other directly responsible personnel shall be punished in accordance with the preceding paragraph .

Violation of Article 27 of this Law , subject to administrative penalties for public security personnel , shall not engage in network security management and network operators work in key positions within five years ; people subject to criminal punishment , he may not engage in key positions in operations and network security management network Work .

Article 64 A  provider of a network operator , a network product or service shall , in violation of the provisions of Article 22 , paragraph 3 , and Article 41 to Article 43 of this Law , violate the right of the personal information to be protected according to law , ordered to make corrections by the competent authorities , can be a warning or a fine according to the seriousness single office , confiscate the illegal income , illegal income more than doubled a fine of ten times , there is no illegal income , at a fine of one million yuan , directly responsible Supervisors and other directly responsible persons shall be fined not less than 10,000 yuan but not more than 100,000 yuan ; if the circumstances are serious , they may order to suspend the relevant business , suspend business for rectification , close the website , revoke the relevant business license or revoke the business license .

Violation of the provisions of Article 44 of this Law , theft or other illegal means to obtain , illegally sell or illegally provide personal information to others , does not constitute a crime , the public security organs confiscated the illegal income , and more than double the illegal income ten times If there is no illegal income , a fine of not more than one million yuan shall be imposed .

Article 65 of the   critical information infrastructure of operators in violation of the provisions of Article 35 of this Law , used without safety review or not to review the security of the network through a product or service , by the competent authorities ordered to stop using , at the purchase amount More than ten times the fine ; the person directly in charge and other directly responsible persons shall be fined not less than 10,000 yuan but not more than 100,000 yuan .

Article 66   critical information infrastructure operators in violation of the provisions of Article 37 of this Law , outside the network data storage , or network data provided to the outside , ordered to make corrections by the competent authorities , be given a warning , confiscate the illegal income , of fifty yuan fine of $ 50,000 or more , and may be ordered to suspend the business , ordered to stop , to close the site , revoke the relevant business license or revoke the business license ; in charge and other directly responsible personnel directly responsible yuan and not Fine of not more than 100,000 yuan .

Article 67   in violation of the provisions of Article 46 of this Law , the website set up for the implementation of criminal activities , distribution group , or use the Internet release of information related to the implementation of criminal activities , does not constitute a crime , the public security organs 5 days detention , can impose a fine of 100,000 yuan ; the circumstances are serious , at least five days custody for 15 days or less , you can fine of over 50,000 yuan to 500,000 yuan fine . Close the website for the implementation of criminal activities , communication groups .

If the unit has the preceding paragraph , the public security organ shall be fined not less than 100,000 yuan but not more than 500,000 yuan , and shall be punished in accordance with the provisions of the preceding paragraph for the person directly in charge and other directly responsible persons .

Article 68  network operators in violation of the provisions of Article 47 of this Law , legal , administrative regulations prohibit the release or transfer of information transmission is not stopped , to take measures to eliminate the disposal, etc. , keep the relevant records , ordered by the competent department of corrections , given a warning , confiscation of illegal gains ; refuse to correct or circumstances are serious , at 500,000 yuan more than 100,000 yuan , and can be ordered to suspend the relevant business , ordered to stop , to close the site , revoke the relevant business license or business license revoked , A fine of not less than 10,000 yuan but not more than 100,000 yuan shall be imposed on the person directly in charge and other directly responsible persons .

Electronic messaging services provider , application software download service providers , non-compliance and safety management obligations specified in the second paragraph of Article 48 of this Law , in accordance with the preceding paragraph shall be punished .

Article 69   network operators in violation of the provisions of this Act , any of the following acts , by the competent authorities shall order rectification ; refuse to correct or circumstances are serious , at 500,000 Yuan more than 50,000 yuan , directly responsible for the charge and other directly responsible personnel , at one million yuan to 100,000 yuan fine :

( A ) not in accordance with the requirements of the relevant departments of the law , administrative regulations prohibit the release or the information’s transmission , taken to stop transmission , disposal measures to eliminate such ;

( 2 ) refusing or hindering the supervision and inspection carried out by the relevant departments according to law ;

( 3 ) refusing to provide technical support and assistance to the public security organs and the state security organs .

Article 70  issued or transmitted in Article 12 (2) and other laws , administrative regulations prohibit the release or transfer of information , in accordance with relevant laws , penalties and administrative regulations .

Article 71   of this Law prescribed offenses , in accordance with relevant laws , administrative regulations credited to the credit files , and to be publicized .

Article 72 Where  an operator of a government organ of a state organ fails to perform its obligations under the provisions of this Law , it shall be ordered by its superior organ or the relevant organ to make corrections , and the directly responsible person in charge and other directly responsible persons shall be punished according to law .

Article 73  Network and Information Department and relevant departments in violation of the provisions of Article 30 of this Law , the information acquired in the performance of network security protection responsibilities for other purposes , given to the persons in charge and other directly responsible personnel directly responsible according to law Punish .

The network department and the relevant departments of the staff neglected duty , abuse of power , favoritism , does not constitute a crime , according to the law to give punishment .

Article 74 Whoever , in violation of the   provisions of this Law , causes damage to others , shall bear civil liability according to law .

Violation of the provisions of this Law , constitute a violation of public security management behavior , according to the law to give security management punishment ; constitute a crime , shall be held criminally responsible .

Article 75   The organs , organizations and individuals engaged in activities , such as attack , intrusion , interference or destruction , which violate the key information infrastructure of the People’s Republic of China , cause serious consequences, and shall hold legal liabilities according to law ; the public security departments and relevant departments of the State Council the institution may decide , organize , to freeze property or other necessary personal sanctions .

Chapter VII Supplementary Provisions

Article 76   The meaning of the following terms in this Law :

( A ) network , refers to a computer or other information terminals and associated equipment consisting of the information collected in accordance with certain rules and procedures , storage , transmission , switching , the system processing .

( Two ) network security , refers to taking the necessary measures , to prevent attacks on the network , intrusion , interference , destruction and illegal use and accidents , the network is in a state of stable and reliable operation , integrity, and protect network data , privacy , The ability to be available .

( C ) network operators , refers to the network of owners , managers and network service providers .

( D ) network data , refers to the network through the collection , storage , transmission , processing and production of various electronic data .

( Five ) personal information , refer to various identification information can be used alone or in combination with other natural personal identity information electronically recorded or otherwise , including but not limited to a natural person’s name , date of birth , ID number , personal biometric information , Address , telephone number and so on .

Article 77 The   storage , processing network information involving state secrets operational security , in addition shall comply with this Act , shall also comply with privacy laws , administrative regulations .

Article 78   security protection of military networks , otherwise provided by the Central Military Commission .

Article 79   of this Law since 2017  6 June 1 from the date of implementation .

Original mandarin Chinese:

目    录

    第一章  总    则

第二章  网络安全支持与促进

第三章  网络运行安全

第一节  一般规定

第二节  关键信息基础设施的运行安全

第四章  网络信息安全

第五章  监测预警与应急处置

第六章  法律责任

第七章  附    则

第一章  总    则

第一条  为了保障网络安全,维护网络空间主权和国家安全、社会公共利益,保护公民、法人和其他组织的合法权益,促进经济社会信息化健康发展,制定本法。

第二条  在中华人民共和国境内建设、运营、维护和使用网络,以及网络安全的监督管理,适用本法。

第三条  国家坚持网络安全与信息化发展并重,遵循积极利用、科学发展、依法管理、确保安全的方针,推进网络基础设施建设和互联互通,鼓励网络技术创新和应用,支持培养网络安全人才,建立健全网络安全保障体系,提高网络安全保护能力。

第四条  国家制定并不断完善网络安全战略,明确保障网络安全的基本要求和主要目标,提出重点领域的网络安全政策、工作任务和措施。

第五条  国家采取措施,监测、防御、处置来源于中华人民共和国境内外的网络安全风险和威胁,保护关键信息基础设施免受攻击、侵入、干扰和破坏,依法惩治网络违法犯罪活动,维护网络空间安全和秩序。

第六条  国家倡导诚实守信、健康文明的网络行为,推动传播社会主义核心价值观,采取措施提高全社会的网络安全意识和水平,形成全社会共同参与促进网络安全的良好环境。

第七条  国家积极开展网络空间治理、网络技术研发和标准制定、打击网络违法犯罪等方面的国际交流与合作,推动构建和平、安全、开放、合作的网络空间,建立多边、民主、透明的网络治理体系。

第八条  国家网信部门负责统筹协调网络安全工作和相关监督管理工作。国务院电信主管部门、公安部门和其他有关机关依照本法和有关法律、行政法规的规定,在各自职责范围内负责网络安全保护和监督管理工作。


第九条  网络运营者开展经营和服务活动,必须遵守法律、行政法规,尊重社会公德,遵守商业道德,诚实信用,履行网络安全保护义务,接受政府和社会的监督,承担社会责任。

第十条  建设、运营网络或者通过网络提供服务,应当依照法律、行政法规的规定和国家标准的强制性要求,采取技术措施和其他必要措施,保障网络安全、稳定运行,有效应对网络安全事件,防范网络违法犯罪活动,维护网络数据的完整性、保密性和可用性。

第十一条  网络相关行业组织按照章程,加强行业自律,制定网络安全行为规范,指导会员加强网络安全保护,提高网络安全保护水平,促进行业健康发展。

第十二条  国家保护公民、法人和其他组织依法使用网络的权利,促进网络接入普及,提升网络服务水平,为社会提供安全、便利的网络服务,保障网络信息依法有序自由流动。


第十三条  国家支持研究开发有利于未成年人健康成长的网络产品和服务,依法惩治利用网络从事危害未成年人身心健康的活动,为未成年人提供安全、健康的网络环境。

第十四条  任何个人和组织有权对危害网络安全的行为向网信、电信、公安等部门举报。收到举报的部门应当及时依法作出处理;不属于本部门职责的,应当及时移送有权处理的部门。


第二章  网络安全支持与促进

第十五条  国家建立和完善网络安全标准体系。国务院标准化行政主管部门和国务院其他有关部门根据各自的职责,组织制定并适时修订有关网络安全管理以及网络产品、服务和运行安全的国家标准、行业标准。


第十六条  国务院和省、自治区、直辖市人民政府应当统筹规划,加大投入,扶持重点网络安全技术产业和项目,支持网络安全技术的研究开发和应用,推广安全可信的网络产品和服务,保护网络技术知识产权,支持企业、研究机构和高等学校等参与国家网络安全技术创新项目。

第十七条  国家推进网络安全社会化服务体系建设,鼓励有关企业、机构开展网络安全认证、检测和风险评估等安全服务。

第十八条  国家鼓励开发网络数据安全保护和利用技术,促进公共数据资源开放,推动技术创新和经济社会发展。


第十九条  各级人民政府及其有关部门应当组织开展经常性的网络安全宣传教育,并指导、督促有关单位做好网络安全宣传教育工作。


第二十条  国家支持企业和高等学校、职业学校等教育培训机构开展网络安全相关教育与培训,采取多种方式培养网络安全人才,促进网络安全人才交流。

第三章  网络运行安全

第一节 一般规定

第二十一条  国家实行网络安全等级保护制度。网络运营者应当按照网络安全等级保护制度的要求,履行下列安全保护义务,保障网络免受干扰、破坏或者未经授权的访问,防止网络数据泄露或者被窃取、篡改:






第二十二条  网络产品、服务应当符合相关国家标准的强制性要求。网络产品、服务的提供者不得设置恶意程序;发现其网络产品、服务存在安全缺陷、漏洞等风险时,应当立即采取补救措施,按照规定及时告知用户并向有关主管部门报告。



第二十三条  网络关键设备和网络安全专用产品应当按照相关国家标准的强制性要求,由具备资格的机构安全认证合格或者安全检测符合要求后,方可销售或者提供。国家网信部门会同国务院有关部门制定、公布网络关键设备和网络安全专用产品目录,并推动安全认证和安全检测结果互认,避免重复认证、检测。

第二十四条  网络运营者为用户办理网络接入、域名注册服务,办理固定电话、移动电话等入网手续,或者为用户提供信息发布、即时通讯等服务,在与用户签订协议或者确认提供服务时,应当要求用户提供真实身份信息。用户不提供真实身份信息的,网络运营者不得为其提供相关服务。


第二十五条  网络运营者应当制定网络安全事件应急预案,及时处置系统漏洞、计算机病毒、网络攻击、网络侵入等安全风险;在发生危害网络安全的事件时,立即启动应急预案,采取相应的补救措施,并按照规定向有关主管部门报告。

第二十六条  开展网络安全认证、检测、风险评估等活动,向社会发布系统漏洞、计算机病毒、网络攻击、网络侵入等网络安全信息,应当遵守国家有关规定。

第二十七条  任何个人和组织不得从事非法侵入他人网络、干扰他人网络正常功能、窃取网络数据等危害网络安全的活动;不得提供专门用于从事侵入网络、干扰网络正常功能及防护措施、窃取网络数据等危害网络安全活动的程序、工具;明知他人从事危害网络安全的活动的,不得为其提供技术支持、广告推广、支付结算等帮助。

第二十八条  网络运营者应当为公安机关、国家安全机关依法维护国家安全和侦查犯罪的活动提供技术支持和协助。

第二十九条  国家支持网络运营者之间在网络安全信息收集、分析、通报和应急处置等方面进行合作,提高网络运营者的安全保障能力。


第三十条  网信部门和有关部门在履行网络安全保护职责中获取的信息,只能用于维护网络安全的需要,不得用于其他用途。

第二节 关键信息基础设施的运行安全

第三十一条  国家对公共通信和信息服务、能源、交通、水利、金融、公共服务、电子政务等重要行业和领域,以及其他一旦遭到破坏、丧失功能或者数据泄露,可能严重危害国家安全、国计民生、公共利益的关键信息基础设施,在网络安全等级保护制度的基础上,实行重点保护。关键信息基础设施的具体范围和安全保护办法由国务院制定。


第三十二条  按照国务院规定的职责分工,负责关键信息基础设施安全保护工作的部门分别编制并组织实施本行业、本领域的关键信息基础设施安全规划,指导和监督关键信息基础设施运行安全保护工作。

第三十三条  建设关键信息基础设施应当确保其具有支持业务稳定、持续运行的性能,并保证安全技术措施同步规划、同步建设、同步使用。

第三十四条  除本法第二十一条的规定外,关键信息基础设施的运营者还应当履行下列安全保护义务:






第三十五条  关键信息基础设施的运营者采购网络产品和服务,可能影响国家安全的,应当通过国家网信部门会同国务院有关部门组织的国家安全审查。

第三十六条  关键信息基础设施的运营者采购网络产品和服务,应当按照规定与提供者签订安全保密协议,明确安全和保密义务与责任。

第三十七条  关键信息基础设施的运营者在中华人民共和国境内运营中收集和产生的个人信息和重要数据应当在境内存储。因业务需要,确需向境外提供的,应当按照国家网信部门会同国务院有关部门制定的办法进行安全评估;法律、行政法规另有规定的,依照其规定。

第三十八条  关键信息基础设施的运营者应当自行或者委托网络安全服务机构对其网络的安全性和可能存在的风险每年至少进行一次检测评估,并将检测评估情况和改进措施报送相关负责关键信息基础设施安全保护工作的部门。

第三十九条  国家网信部门应当统筹协调有关部门对关键信息基础设施的安全保护采取下列措施:





第四章  网络信息安全

第四十条  网络运营者应当对其收集的用户信息严格保密,并建立健全用户信息保护制度。

第四十一条  网络运营者收集、使用个人信息,应当遵循合法、正当、必要的原则,公开收集、使用规则,明示收集、使用信息的目的、方式和范围,并经被收集者同意。


第四十二条  网络运营者不得泄露、篡改、毁损其收集的个人信息;未经被收集者同意,不得向他人提供个人信息。但是,经过处理无法识别特定个人且不能复原的除外。


第四十三条  个人发现网络运营者违反法律、行政法规的规定或者双方的约定收集、使用其个人信息的,有权要求网络运营者删除其个人信息;发现网络运营者收集、存储的其个人信息有错误的,有权要求网络运营者予以更正。网络运营者应当采取措施予以删除或者更正。

第四十四条  任何个人和组织不得窃取或者以其他非法方式获取个人信息,不得非法出售或者非法向他人提供个人信息。

第四十五条  依法负有网络安全监督管理职责的部门及其工作人员,必须对在履行职责中知悉的个人信息、隐私和商业秘密严格保密,不得泄露、出售或者非法向他人提供。

第四十六条  任何个人和组织应当对其使用网络的行为负责,不得设立用于实施诈骗,传授犯罪方法,制作或者销售违禁物品、管制物品等违法犯罪活动的网站、通讯群组,不得利用网络发布涉及实施诈骗,制作或者销售违禁物品、管制物品以及其他违法犯罪活动的信息。

第四十七条  网络运营者应当加强对其用户发布的信息的管理,发现法律、行政法规禁止发布或者传输的信息的,应当立即停止传输该信息,采取消除等处置措施,防止信息扩散,保存有关记录,并向有关主管部门报告。

第四十八条  任何个人和组织发送的电子信息、提供的应用软件,不得设置恶意程序,不得含有法律、行政法规禁止发布或者传输的信息。


第四十九条  网络运营者应当建立网络信息安全投诉、举报制度,公布投诉、举报方式等信息,及时受理并处理有关网络信息安全的投诉和举报。


第五十条  国家网信部门和有关部门依法履行网络信息安全监督管理职责,发现法律、行政法规禁止发布或者传输的信息的,应当要求网络运营者停止传输,采取消除等处置措施,保存有关记录;对来源于中华人民共和国境外的上述信息,应当通知有关机构采取技术措施和其他必要措施阻断传播。

第五章  监测预警与应急处置

第五十一条  国家建立网络安全监测预警和信息通报制度。国家网信部门应当统筹协调有关部门加强网络安全信息收集、分析和通报工作,按照规定统一发布网络安全监测预警信息。

第五十二条  负责关键信息基础设施安全保护工作的部门,应当建立健全本行业、本领域的网络安全监测预警和信息通报制度,并按照规定报送网络安全监测预警信息。

第五十三条  国家网信部门协调有关部门建立健全网络安全风险评估和应急工作机制,制定网络安全事件应急预案,并定期组织演练。



第五十四条  网络安全事件发生的风险增大时,省级以上人民政府有关部门应当按照规定的权限和程序,并根据网络安全风险的特点和可能造成的危害,采取下列措施:




第五十五条  发生网络安全事件,应当立即启动网络安全事件应急预案,对网络安全事件进行调查和评估,要求网络运营者采取技术措施和其他必要措施,消除安全隐患,防止危害扩大,并及时向社会发布与公众有关的警示信息。

第五十六条  省级以上人民政府有关部门在履行网络安全监督管理职责中,发现网络存在较大安全风险或者发生安全事件的,可以按照规定的权限和程序对该网络的运营者的法定代表人或者主要负责人进行约谈。网络运营者应当按照要求采取措施,进行整改,消除隐患。

第五十七条  因网络安全事件,发生突发事件或者生产安全事故的,应当依照《中华人民共和国突发事件应对法》、《中华人民共和国安全生产法》等有关法律、行政法规的规定处置。

第五十八条 因维护国家安全和社会公共秩序,处置重大突发社会安全事件的需要,经国务院决定或者批准,可以在特定区域对网络通信采取限制等临时措施。

第六章  法律责任

第五十九条  网络运营者不履行本法第二十一条、第二十五条规定的网络安全保护义务的,由有关主管部门责令改正,给予警告;拒不改正或者导致危害网络安全等后果的,处一万元以上十万元以下罚款,对直接负责的主管人员处五千元以上五万元以下罚款。


第六十条  违反本法第二十二条第一款、第二款和第四十八条第一款规定,有下列行为之一的,由有关主管部门责令改正,给予警告;拒不改正或者导致危害网络安全等后果的,处五万元以上五十万元以下罚款,对直接负责的主管人员处一万元以上十万元以下罚款:




第六十一条  网络运营者违反本法第二十四条第一款规定,未要求用户提供真实身份信息,或者对不提供真实身份信息的用户提供相关服务的,由有关主管部门责令改正;拒不改正或者情节严重的,处五万元以上五十万元以下罚款,并可以由有关主管部门责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照,对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。

第六十二条  违反本法第二十六条规定,开展网络安全认证、检测、风险评估等活动,或者向社会发布系统漏洞、计算机病毒、网络攻击、网络侵入等网络安全信息的,由有关主管部门责令改正,给予警告;拒不改正或者情节严重的,处一万元以上十万元以下罚款,并可以由有关主管部门责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照,对直接负责的主管人员和其他直接责任人员处五千元以上五万元以下罚款。

第六十三条  违反本法第二十七条规定,从事危害网络安全的活动,或者提供专门用于从事危害网络安全活动的程序、工具,或者为他人从事危害网络安全的活动提供技术支持、广告推广、支付结算等帮助,尚不构成犯罪的,由公安机关没收违法所得,处五日以下拘留,可以并处五万元以上五十万元以下罚款;情节较重的,处五日以上十五日以下拘留,可以并处十万元以上一百万元以下罚款。



第六十四条  网络运营者、网络产品或者服务的提供者违反本法第二十二条第三款、第四十一条至第四十三条规定,侵害个人信息依法得到保护的权利的,由有关主管部门责令改正,可以根据情节单处或者并处警告、没收违法所得、处违法所得一倍以上十倍以下罚款,没有违法所得的,处一百万元以下罚款,对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款;情节严重的,并可以责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照。


第六十五条  关键信息基础设施的运营者违反本法第三十五条规定,使用未经安全审查或者安全审查未通过的网络产品或者服务的,由有关主管部门责令停止使用,处采购金额一倍以上十倍以下罚款;对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。

第六十六条  关键信息基础设施的运营者违反本法第三十七条规定,在境外存储网络数据,或者向境外提供网络数据的,由有关主管部门责令改正,给予警告,没收违法所得,处五万元以上五十万元以下罚款,并可以责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照;对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。

第六十七条  违反本法第四十六条规定,设立用于实施违法犯罪活动的网站、通讯群组,或者利用网络发布涉及实施违法犯罪活动的信息,尚不构成犯罪的,由公安机关处五日以下拘留,可以并处一万元以上十万元以下罚款;情节较重的,处五日以上十五日以下拘留,可以并处五万元以上五十万元以下罚款。关闭用于实施违法犯罪活动的网站、通讯群组。


第六十八条  网络运营者违反本法第四十七条规定,对法律、行政法规禁止发布或者传输的信息未停止传输、采取消除等处置措施、保存有关记录的,由有关主管部门责令改正,给予警告,没收违法所得;拒不改正或者情节严重的,处十万元以上五十万元以下罚款,并可以责令暂停相关业务、停业整顿、关闭网站、吊销相关业务许可证或者吊销营业执照,对直接负责的主管人员和其他直接责任人员处一万元以上十万元以下罚款。


第六十九条  网络运营者违反本法规定,有下列行为之一的,由有关主管部门责令改正;拒不改正或者情节严重的,处五万元以上五十万元以下罚款,对直接负责的主管人员和其他直接责任人员,处一万元以上十万元以下罚款:




第七十条  发布或者传输本法第十二条第二款和其他法律、行政法规禁止发布或者传输的信息的,依照有关法律、行政法规的规定处罚。

第七十一条  有本法规定的违法行为的,依照有关法律、行政法规的规定记入信用档案,并予以公示。

第七十二条  国家机关政务网络的运营者不履行本法规定的网络安全保护义务的,由其上级机关或者有关机关责令改正;对直接负责的主管人员和其他直接责任人员依法给予处分。

第七十三条  网信部门和有关部门违反本法第三十条规定,将在履行网络安全保护职责中获取的信息用于其他用途的,对直接负责的主管人员和其他直接责任人员依法给予处分。


第七十四条  违反本法规定,给他人造成损害的,依法承担民事责任。


第七十五条  境外的机构、组织、个人从事攻击、侵入、干扰、破坏等危害中华人民共和国的关键信息基础设施的活动,造成严重后果的,依法追究法律责任;国务院公安部门和有关部门并可以决定对该机构、组织、个人采取冻结财产或者其他必要的制裁措施。

第七章  附    则

第七十六条  本法下列用语的含义:






第七十七条  存储、处理涉及国家秘密信息的网络的运行安全保护,除应当遵守本法外,还应当遵守保密法律、行政法规的规定。

第七十八条  军事网络的安全保护,由中央军事委员会另行规定。

第七十九条  本法自2017年6月1日起施行。

Communist Party of China referring URL:



China’s Civilian & Military Informatization Development Strategy 国家信息化战略中的军民结合

China’s Civilian & Military Informatization Development Strategy


“中辦發〔2006〕11號各省、自治區、直轄市黨委和人民政府,中央和國家機關各部委,解放軍各總部、各大單位,各人民團體: 《2006—2020年國家信息化發展戰略》已經黨中央、國務院同意,現印發給你們,請結合實際認真貫徹落實。”


國 務 院 辦 公 廳

China Communist Party

“Affecting all Chinese provinces, autonomous regions, municipalities directly under the Communist Party of China, all committees and governments, central ministries and state organs, the People’s Liberation Army headquarters, major units, and people’s organizations:” This 2006–2020 National Informatization Development Strategy applies effective immediately”

[Foreign military and civilian strategy [1] ]

(A) legal form of integrating the armed forces to implement the strategy

The United States and other developed countries attach great importance to integrating the armed forces of institutional strengthening to the people, as a national strategy and to promote it in the form of legislation. After the Cold War, according to changes in the international situation, the US Congress and the Department of Defense issued a “National Defense Authorization Act ( 1993 ) “and” streamlining of the Federal Acquisition Act ( 1994 ), “affirmed the principle of legal form of military and civilian integration. The United States has enacted the “Defense transition strategy”, “National Security Strategy of Science and Technology ( 1995 ) “and” National Defense Science and Technology Strategy ( 2000 ) “, the strategic goal is:” to create a both to meet military requirements and meet the business needs of advanced national technology and industrial base. ” US Department of Defense in 2003, released in a new version of DOD5000.1 , stressing that “give priority to civilian products, technology and services”, provides that “to the extent feasible, the task can be modified requirements to facilitate civilian products, technology and services,” the procurement . British Ministry of Defense in 2001 for the promulgation of the 21 century national defense science and innovation strategy, clearly the long-term development of national defense science and technology point of view, the Ministry of Defence must attract the world advanced technology in the civilian sector to participate in defense research and development, accelerate weapons Update pace. French 1994 annual defense white paper also clearly announced that “the defense industry to consider the direction of the dual-use and military research and civilian research to combine as far as possible.”

(B) to promote the development of dual-use technology from both the investment and organization

The main countries in the world to start and accelerate new revolution in military affairs and military information technology, which is to implement the military strategy of the important people skills background. US Department of Defense in 1995 and published in “dual-use technology, aimed at obtaining affordable cutting-edge technology of the national defense strategy” and proposed to have important military needs but also has the potential transfer of dual-use technology, do need government intervention, clear by the government to invest in development. In 1998 the US Department of Defense promulgated the “National Defense Authorization Act”, asked the military to increase investment in the development of dual-use technology, and provides dual-use technology sharing principle of project funds. From the 20 century, 90 years began, the United States has implemented a variety of special programs to support the development of dual-use technology. In recent years, a substantial increase in the US defense budget, the 2007 fiscal year reached 5064 billion US dollars, compared with 2003, an increase of one-third of the defense budget in the 30-40% invested in the defense industry, it is worth noting that the US Department of Defense 20 Century 90 ‘s end total annual investment in IT is about 500 billion dollars in 2006 increased in 742 million US dollars, focus on supporting the development of dual-use of information technology. US Defense Advanced Research Projects Agency ( DARPA ) attaches great importance to the development and application of dual-use technology, which is half of the office responsible for the development of dual-use technology.

In order to facilitate the implementation of civil-military integration, the United States in 1993, including the establishment of the armed forces and the Ministry of Commerce, the Department of Energy, Department of Transportation, the National Aeronautics and Space Administration (year NASA ) and the National Science Foundation ( NSF ) and other units’ defense technology transition committee ” . The United States also developed a joint research and development agreement ( CRADA ), to support the development of federal technology transfer to the private sector, encouraging joint investment with industry to develop dual-use technologies and projects. If we say that the era of mechanization technologies accounted for all military and civilian technology military equipment 30-40% , then the era of military and civilian integration of information technology will account for 80-90% . In enhancing the economic competitiveness of key technologies and key defense technologies listed in the US Department of Defense Department of Commerce elected in respect of about 80% overlap. British Ministry of Defense and Trade and Industry jointly invest in the development of dual-use technology, including a number of areas, including aviation, the British set up a special bureau defense technology transfer, scientific research institutions engaged in management of civil defense projects and funding contracts, using competitive mechanisms to encourage having strong technical force of civilian institutions to develop military technology. France through the implementation of the space program, space program, nuclear programs and electronic, information and communication plans a number of projects to develop dual-use technology. Japanese defense procurement is mainly aimed at using defense contracts as a means to promote the development of advanced technologies, especially having a civilian or dual use of advanced technologies.

Accelerate the development of dual-use technologies in the military, while information technology and services in the national economy, resulting in huge economic benefits, a study reported that the US Congress, the second application of space technology, each invested one dollar, we can produce seven dollars efficiency [2] . 2006 early American NASA Goddard Space Flight Center will be awarded the development of a simple, safe and low cost of the patent license single-walled carbon nanotube manufacturing method of ISM company, formed a production capacity of single-walled carbon nanotubes, these Nanotubes can be widely used in various fields of medical, fuel cells, video displays, solar batteries, etc., to promote the economic development of the United States [3] .

Management and equipment procurement mechanisms (iii) the reform of research projects, encourage enterprises to participate in civilian research and production equipment

Civilian high-tech enterprise innovation system and a flexible, quick response, the results of many. Supporting civilian enterprises to develop products for the military, it has become the guidelines of the US military. 2003 introduced the “defense industrial transformation roadmap,” emphasized the need to change the main contractor control defense market situation, through the bidding and government procurement forms to encourage enterprises to participate in civilian research and production equipment, guide and encourage enterprises to master the innovative technology into the civil defense thereby forming the size of both, the new defense market structure of many vendors. For example, the US communications equipment maker Motorola Inc. have independent military communications equipment manufacturing sector, both the production of Boeing civil aviation with the machine also produces military aircraft, Lockheed – Martin, the company’s main business is system integration, aviation, aerospace and technical services, are dual-use technology. To support SMEs, the United States has enacted the Small Business Innovation program. The US scientists, engineers, nearly half of military-related research, about one-third of enterprises and military production, whereas the Ministry of Defence orders for the total order amount accounts for 90% . British military research facilities management reform measures, encourage the use of military research facilities in the civilian sector technology development. France set up an integrated project team from the Department of Defense Weaponry Department, the military services Staff, industry composition, management of weapons and equipment procurement program development and projects. French Defense Weaponry Department promptly inform the military to SMEs development plan, acquisition plan set aside 10% for small and medium enterprises, to encourage them to participate in the competitive procurement of weapons and equipment. German weaponry annual plan by the General Armament Department operations departments, the services bureau, defense technology and industry cooperation Acquisition Department developed together. Germany developed a “Federal Republic of Germany ordered assignments principles” clearly defined weaponry defense contractor general contractor in the task, the task must be assigned to military orders to subcontractors by means of competition, in the form of legislation to protect small and medium enterprises to participate in defense research mission competition. Note that the Japanese government has the military capacity to foster private enterprise, the Japanese are eligible to receive military orders of enterprises has reached two thousand, basically formed a technologically advanced, wide range and great potential of military research and production system. Russia’s two ways to establish the defense industry system integration of military and civilian, in the implementation of the defense industry group, the formation of large-scale military company at the same time, part of the military enterprises demutualization, privatization, so that military enterprises retain the core military production capacity at the same production civilian.

A greater proportion of military production undertaken by civilian enterprises, contribute to the formation of military bidding competition mechanism, thereby reducing costs, improving quality and production of military enterprises to civilian products companies face appeared, facilitate international technical exchange and absorption of foreign advanced technology. Military through purchase orders, to strengthen cooperation with the civilian high-tech enterprises, to provide abundant funds or venture capital, which has become a developed country WTO era important mode of government to support their strategy of industrial development, enhance international competitiveness, in addition, military and technical performance of the process of challenging requirements, promote the growth of civilian high-tech enterprise technological innovation and high-quality scientific and technological talents. The development of civilian high-tech enterprises to grow, for the defense industry has laid a solid foundation, also contributed to the national economic development, and enhance the strength of the country.

(Iv) open defense procurement, maximize the use of civilian norms and standards

In order to promote the development of civil-military integration, many countries have carried out reforms to military standards, the equipment acquisition process and vigorously promote the use of civil standards and commercial specifications. US forces continue to pursue the reform of military standards, based on the past all military standards and specifications to conduct a comprehensive clean-up review, the repeal of the 4000 military specification remainder (including single-piece specification) and 300 remainder military standards, adopted the 1784 item civilian standards ( non-governmental standard), the equipment acquisition process, limit the use of military norms and standards, not only does the civil standard is available to meet the military requirements when considering the use of military standards, and the use of military standards must be approved or existing civilian standards can not. UK Equipment Acquisition management, not to military standards and military specifications and performance-based specifications proposed procurement requirements, given enough freedom and flexibility contractor. Japan 1999-2002 years, a total amend or repeal the military technical standards and technical specifications 10231 , accounting for all military technical standards 74 percent . In 2003 , the Defense Agency also proposed in its new weapons and equipment procurement policy making, instead of using civilian technology standard about 18,000 entries Defense Agency dedicated military standards and norms.

US defense scientist famous Gansler estimate, the implementation of civil-military integration, the United States Department of Defense Department of Defense procurement could save the equivalent of the total annual fee of 20% or more. Although the US military R & D expenditure of the United States the proportion of total funding from the last century, 60 years of 50% is reduced to the current 15% , but the US military technology but gained rapid development, mainly due to integrating the armed forces of the new system.

[To change the information into a new military and civilian military features, integrating the armed forces]

A new era of international competition, information into the characteristics of modern military equipment is becoming one of the core content of the new revolution in military affairs of States. An information era notable feature is the combination of surface defense economy and social economy more widely, military technology and civilian technology deeper degree of integration, association technological innovation and new revolution in military affairs increasingly tight. Developed countries have the information technology as a strategic national research priorities, the United States and Japan in the field of R & D investment in information separately account for the total R & D investment of 40% or more, the United States Department of Defense 2005 budget on science and technology information systems and sensors accounted for 35.7% .

(A) information technology in all areas of civil industrial technology is the most easy to achieve also the people’s army also

Information industry is large in scale compared to other industrial sectors and technology updates quickly, there is no other information technology fields like civil industry as more people realize also the military also. The United States since 1999 years has launched the “fast bird”, “Ikonos” and other dual-use high-resolution satellite, in 2001 in Afghanistan, “Operation Enduring Freedom”, the US “fast bird” and “Yi Kenuo Sri Lanka “satellite to 20 US dollars / km ² price to US Department of Defense provides photographic reconnaissance image related operations area. IT-based civilian battlefield information network in the Iraq war also played an important role, via satellite, drones and other airborne sensors to obtain information on a computer map updated every friendly and enemy positions every five minutes. The Pentagon claims that China and the US Air Force, the war in Iraq, the extent of information the Navy reached 70% , ground forces also up 50 percent or more. US information technology has made ​​such rapid progress, China has played an important role in military technology.

(B) in the civilian market-wide test of IT applications in the military low-cost and reliable utility

Dedicated to the military use of information technology, although in training and military exercises, but without a real baptism after the test is limited. Civil information products market is large, hundreds of millions or even billions of people subjected to extensive tests using its technology, fierce competition in the market also contributed to accelerate its improvement and perfection, easy-to-use products, the cost to decline rapidly. From the military GPS and the Internet is a good example, which after a civilian market competition and popularity improvement to mature and reliable and cost-effective way reflect the greater value in military applications.

(C) Information technology can rapidly increase the combat effectiveness of military applications

Performance information weaponry is much higher than the mechanized weaponry, but the development of high risk, high investment, an increase in its cost of IT accounts for a large proportion. Many civilian high-tech product development of low cost, standard upgrade quickly, just put a small amount of money to improve its performance can meet the requirements of military systems, make full use of civilian IT achievements can significantly reduce costs. United States, Britain, Japan and other developed countries in the development of information technology weaponry and equipment system, especially when a variety of military information systems, directly from the market civilian technology sector and corporate purchasing high-tech equipment, such as communications equipment, all kinds of computers, all kinds of computer software, security anti-virus software, satellite image analysis equipment to minimize the risk of national defense research and development investment. US Department of Defense contractor is due to the direct use existing commercial software and hardware, greatly reducing development time information Weapon System.

In addition, the use of information technology to transform and upgrade weapons systems is rapidly effective measures to improve the combat effectiveness. A typical weapon system development cycle for up to 7-15 years, the high cost of its replacement. The typical development cycle civilian IT hardware and software business a few months to a few years, mobile phones and PC replacement is faster, with a civilian rapid development of information technology to transform weapons and equipment, only a few funds, Every few years the performance of existing weapons and equipment will be able to a higher level, thereby prolonging the service life. Western countries show a measure of existing mechanized weaponry information transformation, the development time and cost required, roughly equivalent production of new weaponry 1/4 to 1/3 .


(D) The information construction in the military use of civil IT and products beneficial to the national defense mobilization

Army civilian information technology products through the use of these technologies to deepen understanding, familiar with the use of these products, once wartime there is a need to quickly collect a large number of civilian products, and in the armed forces of these products can be quickly effective. US troops in 95 percent of the computer is in the civilian military communications conducted online, with commercial networks linked up to 15 million units changed hand, the Iraq war, the US military also requisitioned and rented some commercial satellites and civilian information networks, in order to bridge the information transfer capability deficiencies. IT complexity it becomes replace the faulty equipment maintenance module, civilian technology products helps to reduce the use of troops and equipment spare parts inventory. In addition, the use of civil information technology products also provide the possibility for civilian IT enterprises to participate in military equipment maintenance, thus reducing maintenance costs of troops and equipment. 2003 , the United States in the Iraq war, has with the world’s four 10,000 manufacturers signed a 50 million copies of material support contract, “the contractor battlefield” socialization of military logistical support.

(E) The development of intellectual property in the competition for civil defense information technology helps improve information security

IT field of international, market-oriented walking in front of other areas, competition is quite fierce patents, the United States, Japan and other developed countries to ten in 2005 by the end of the cumulative patent applications in China in 46.27% concentrated in the field of information. Many IT even basic technology is also likely to be used in the military field, the developed countries are often incorporated into this limit exports of the column, especially China, and therefore unable to equip our troops or through the introduction of foreign advanced weapons systems procurement. At a critical time in international politics, the military situation changes, do not rule out the possibility of the introduction of certain key parts weaponry stuck or certain functional failure exists. On the other hand, China’s civilian IT through international competition, hard work, has been the rapid development, the domestic IT companies are also corresponding increase innovation capability, some of the technology has reached the world advanced level, such as third generation mobile communication TD-SCDMA . In order to compete and reduce costs needs, many domestic enterprises have developed information technology products dedicated chip, to change the long-standing dependence on foreign chip status, while developing the capability to rapidly increase, to undertake the task of developing national defense to lay a good foundation dedicated chip . These chips use civilian high-tech and specialized in military equipment in the army would avoid the kinds of information security with its own technology.

(F) make full use of local advantages of network professionals prepared to deal with cyber warfare preparation

Information is double-edged sword, information technology to improve the combat capability of the armed forces but also requires special attention to the information network security. An essential feature of cyberwarfare is asymmetric, low cost and easy to attack and attack and hard to defend, particularity cyber warfare means will lead to future war ” civilians ” trend, “hackers” may become a war hero. To prevent ” network’9.11′ incident , ” President George W. Bush early in 2002 on the release of the first 16 numbers , ” National Security Presidential Directive , ” the history of the formation of the US military is the world’s first network hacker troops – cyber warfare capabilities constitute the Joint Command, The Army and Navy also have a computer emergency response unit, the Air Force is responsible for the implementation of the establishment of a network of Air Force attack these troops from the world’s top computer experts and ” hacker ” , and currently has formally incorporated into the order of battle in Las Vegas on the largest computer exhibition, former US Assistant Secretary of Defense Sihamoni had in his speech on the ” hacker ” who said: ” If you considered the rest of his life to doing, make sure you do not forget the Department of Defense. ” In addition, the US military also hired some hackers specialize in computer vulnerability testing. 2004 In September , the US set up by 28 international industry consortium composed of major companies specialized home – NCW Industries Alliance, to strengthen the military and civilian aspects of the field of information technology coordination.

(G) make full use of scientific and technological resources of a strong army and civil service

It was reported that the US Air Force in terms of the lack of high-tech professional officer Capt up to two-thirds of the Army Navy also facing the same problem. US Department of Defense, NASA and other very seriously the role of the United States Academy of Engineering and universities and other research institutions and companies in the defense consulting RAND research and personnel training. According to foreign military experts estimate that the United States, Britain, France, Germany, Japan and other major developed countries developing high-tech weapons and equipment information required for 80-90% from local businesses, 10-20% from their military research institutes that the basis of dual-use items and technology sector may bear the civil, defense, science and technology department and the military technology sector specializing in purely military projects, and overall system project. US military reconnaissance plane EP-3 electronic information system consists of a variety of functional equipment components, many of them readily available on the market and are not necessarily technologically advanced products, but its integrated performance of the system on a higher level, visible integrated innovation You can increase the value.

The total amount of scientific and technical personnel and research and development staff accounted for the world’s first and second place, to make good use of the intellectual resources will significantly enhance our military’s strength in the balance of forces. Establish civil-military integration of scientific and technological innovation system, the development of military and civilian science and technology co-ordinate the project and reasonable deployment of dual-use items, do not repeat and can complement each other to achieve the optimal combination of scientific and technological resources of the country, at the same time vigorously develop local resources by means of force personnel to ensure national defense construction in a strategic initiative. The Central Military Commission in 2007 issued a “attract and retain high-level military professional and technical personnel provisions”, the increased focus on the introduction and use of high-quality human resources community efforts to further improve the policy mechanism innovation. System established academicians, academicians hired as technical adviser, full use of the state’s top talent and intelligence resources to better serve the army major decision-making advice, major scientific research and high-level personnel training; in preparation for military struggle and closely related major research projects (project) and key disciplines, a chief expert positions, for the community to hire high-level professional and technical personnel.

[Seize the opportunities of information technology, to promote civil-military integration, integrating the armed forces]

China’s national defense scientific research and industrial system is set up on the basis of the planned economy, the planned economy of management concepts and tools still play a leading role in the management and self-contained closed hinder the establishment of a market-oriented philosophy, is not conducive to cooperation and innovation culture the formation, performance assessment indicators of military units rely on the lack of industrial development and promote the civil requirements or mission, in research programs and equipment procurement in military and civilian disjointed. Since reform and opening, the defense industry began with the development of a single military structure structure change, the nuclear industry, shipbuilding industry, information industry to the military and civilian, to benefit from the transfer of military technology to civilian use, the radiation leading role in the defense industry to the local economy and society significantly enhanced, but these transfers have not yet risen to the institutional level. On the other hand, our country has grown to a group of innovative and industrial capacity of civilian high-tech enterprises, capable military mission, but the lack of demand for military communication channels norms, policies and regulations related to the imperfection of reason, basically it less involved in national defense tasks. If there are no civilian technology sector urgent national security needs, it is impossible to obtain in the areas of national defense and security level of strong support, it is difficult to play a greater role in supporting the civilian sectors to support and not to assume the task of training defense, nor conducive to its development and growth. Compared with developed countries, China’s military and civilian from positive interaction and coordinated development goals are still many gaps, more prominent is the lag corresponding laws and regulations and institutions. Military and civilian national behavior and reflects the will of the state, not only to rely on technological innovation, but also to rely on innovation and institutional innovation to achieve.

In the CPC Central Committee and State Council in 2006 issued in ” 2006-2020 National Information Development Strategy “, pointed out the global information technology are causing profound changes in today’s world, reshaping the world political, economic, social, cultural and military a new pattern of development. Accelerate the development of information technology, it has become the common choice of all countries. And clearly put forward the development of China’s information technology strategic approach – the overall planning, resource sharing, deepen the application, seek practical, market-oriented, based on innovation, military and civilian, safe and reliable.

In the implementation of the national development strategy, we need to learn from foreign ideas, to address the constraints of institutional issues from military and civilian regulations, coordination mechanisms, standards and procurement policies and other strategic height. The current need to establish and improve the bidding system, the formation of fair and equitable competition, maximize the use of mature private standards, guidance and encouragement to master innovative technology enterprises, especially small and medium sized companies to enter the defense sector, so as to form a new multi-vendor defense industry system, led military mission to enhance the level of civilian development, adding vitality to economic development, to achieve military and civilian interaction.

In an important experience in promoting foreign military and civilian aspects of the information is from the start. Revolution in military affairs in the world today, is the rapid development of information technology and its wide range of applications in the military field for direct power, high-tech advantages of local wars in conditions of informationization to be achieved, relying solely on national defense science and technology sector and the military system itself to be ineffective, soldiers and civilians combined, integrating the armed forces is the key, information technology is one of the important starting point. In the task of industrialization, information technology integration and development of our country with the military mechanization and informatization complex development goals, information technology has become a very good combination of points overall economic construction and national defense construction. In particular, most of the reform of the State Council, gave birth to the Ministry of Industry and Information Technology, not only from the organic unity of the organization will be industrialization and information management, and the civilian industry and the defense industry closely, from the institutional to seize information strategic opportunity to strengthen civil-military integration provides an important guarantee. Ministry of Industry and Information Technology at the same time implementation of national information technology and new industrial development strategy, will give full consideration to the development needs of the defense industry and the development of weapons and equipment, the establishment of military and civilian national level to promote policies and coordination mechanisms to promote industrialization, information technology and defense comprehensive and coordinated development and enhance the independent innovation capability of science and technology industry, and actively explore market-oriented approach combining military and civilian, military and civilian industries planning to achieve convergence between supply and demand docking and resource sharing [4] , two-way play the leading role, promoting the national economy and national defense modernization.

Seventeenth Party Congress report pointed out that “national defense and army building, we must stand on national security and the development of strategic height, overall economic development and national defense building” . “To attain the building computerized armed forces and winning the information war strategic objectives, accelerate composite development of mechanization and information, and actively carry out military training under conditions of informationization, build a modern logistics, intensify training a large number of qualified military talent, effectively change the mode of generating combat. ““Reform of the defense industry to adjust and of weapons and equipment procurement, improve weapons and equipment developed by independent innovation capability and quality benefits. Establish and improve military and civilian, combine military weaponry and equipment research and production system to the people, military personnel training and military security system , adhere to thrift and hard work, out of a Chinese characteristics, civil-military integration path of development. “Discuss these important military and civilian strategic approach is to achieve scientific development. We must seize the opportunities of information technology, integrating the armed forces to do this great article, make our country prosperous and our armed forces powerful while building a moderately prosperous society in all respects.

Original Mandarin Chinese:





世界主要國家啟動和加速推進新軍事變革和軍隊信息化建設,這是推行民技軍用戰略的重要背景。美國國防部於1995年發表《兩用技術,旨在獲取經濟可承受的前沿技術的國防戰略》,提出了對有重要軍事需求同時又具有轉移潛力的兩用技術,確實需要政府介入的,明確由政府進行投資開發。 1998年美國國防部頒布的《國防授權法》,要求軍方必須加大對兩用技術開發的投資,並規定了兩用技術項目經費的分攤原則。從20世紀90年代開始,美國還實施了多種專項計劃,支持軍民兩用技術開發。美國近年來大幅度增加國防預算,2007財年達到5064億美元,比2003年增加了1/3,國防預算中30-40%投資到國防工業,值得注意的是,美國國防部20世紀90年代末每年對信息技術的投資總額約為500億美元,2006年增至742億美元,重點支持軍民兩用信息技術的開發。美國國防部國防先進技術研究計劃局(DARPA)十分重視軍民兩用技術的開發和應用,其半數辦公室負責軍民兩用技術的發展。

為了推動軍民一體化的實施,美國於1993年成立了包括三軍和商務部、能源部、運輸部、國家航空航天局(NASA)以及國家科學基金會(NSF)等單位的“國防技術轉軌委員會” 。美國還制定了聯合研究和發展協議(CRADA),支持聯邦開發的技術轉讓給私營部門,鼓勵與工業界聯合投資和合作開發兩用技術項目。如果說機械化時代軍民技術結合占到全部軍事裝備技術的30-40%,那麼,信息化時代軍民技術融合將會占到80-90%。在美國國防部推選的國防關鍵技術與商務部列出的提高經濟競爭力的關鍵技術中就有約80%是重疊的。英國國防部與貿工部聯合投資開發包括航空領域在內的多項軍民兩用技術,英國還專門成立國防技術轉化局,管理民用科研機構從事國防項目的合同和經費,採用競爭機制,鼓勵具有較強技術力量的民用機構開發軍用技術。法國通過實施航天計劃、航空計劃、核能計劃和電子、信息與通信計劃等多項計劃來開發軍民兩用技術。日本國防採購主要著眼於利用國防合同作為一種手段,促進先進技術特別是具有民用或兩用用途的先進技術的發展。

發展軍民兩用技術在加速軍隊信息化建設的同時,服務於國民經濟,產生巨大的經濟效益,美國國會一份研究報告稱,航天技術的二次應用,每投入1美元,能產出7美元的效益[2]。 2006年初美國NASA戈達德航天飛行中心將所開發的一種簡單、安全且費用較低的單壁碳納米管製造方法的專利許可權授予ISM公司,形成了單壁碳納米管生產能力,這些納米管可廣泛應用於醫療、燃料電池、視頻顯示器、太陽能電池等各個領域,推動了美國經濟的發展[3]。


民用高新技術企業創新體系機制靈活,反應快,成果多。扶持民用企業為軍方開發產品,已成為美軍方的指導方針。 2003年出台的《國防工業轉型路線圖》強調,必須改變主承包商控制國防市場的局面,通過招標和政府採購形式鼓勵民用企業參與裝備科研生產,引導和鼓勵掌握創新技術的民用企業進入國防領域,從而形成大小兼備、眾多供應商的新型國防市場格局。例如,美國的通信設備生產商摩托羅拉公司就有獨立的軍事通信設備生產製造部門,美國波音公司既生產民航用機也生產軍用機,洛克希德-馬丁公司的主營業務就是系統集成、航空、航天和技術服務,都是軍民兩用的技術。為了扶持中小企業,美國還專門製定了小企業創新計劃。目前美國的科學家、工程師中有近半從事與軍事有關的研究,約有1/3的企業與軍工生產有關,而訂貨量約佔國防部總訂貨量的90%。英國改革軍用科研設施管理辦法,鼓勵民用部門利用軍用科研設施進行技術開發。法國成立了由國防部武器裝備總署、軍種參謀部、工業界組成的一體化項目小組,參與武器裝備採辦計劃的製定和項目的管理。法國國防部武器裝備總署及時向中小企業通報軍品發展計劃,專門留出採辦計劃的10%給中小企業,鼓勵他們參加武器裝備採辦的競爭。德國的武器裝備年度計劃是由總裝備部各業務局、各軍種局、國防技術採辦總署和工業界一起合作制訂的。德國製訂了《聯邦德國訂貨任務分配原則》,明確規定武器裝備的總承包商在承包國防任務後,必須用競爭手段向分包方分配軍工訂貨任務,以法規形式保護中小型企業參與國防科研任務的競爭。日本政府注意扶植有軍工生產能力的民間企業,日本有資格接受軍品訂貨的企業已達兩千餘家,基本形成了一個技術先進、門類齊全、潛力巨大的軍事科研生產體系。俄羅斯從兩方面建立軍民一體化國防科技工業體制,在實行國防工業集團化、組建大型軍工集團公司的同時,將部分軍工企業股份化、私有化,讓軍工企業在保留核心軍工生產能力的同時生產民品。



為了推動軍民一體化的發展,許多國家都紛紛對軍用標准進行了改革,在裝備採辦過程中大力倡導利用民用標準和商業規範。美軍不斷推行軍事標準改革,在對過去所有軍用標準和規范進行全面清理審查的基礎上,廢止了4000餘項軍用規範(含單篇規範)和300餘項軍用標準,採納了1784項民用標準(非政府標準),在裝備採辦過程中,限制使用軍事規範和標準,只有在確實沒有民用標準可用,或現有民用標準不能滿足軍事要求時才考慮使用軍用標準,而且使用軍用標準必須經過批准。英國在裝備採辦管理中,不以軍用標準和軍用規範而以性能規範為主提出採購要求,給予承包商足夠的自由度和靈活性。日本1999-2002年間,共修改或廢止軍事技術標準及技術規範10231項,佔所有軍事技術標準的74%。 2003年,防衛廳在其製定的新武器裝備採辦政策中又提出,用民用技術標準取代約18000項防衛廳專用的軍品標準和規範。












軍隊通過使用民用信息技術產品加深了對這些技術了解,熟識這些產品的使用,戰時一旦有需要可以迅速徵集大量民用產品,而且在部隊中這些產品能迅速發揮效用。美軍中95%的軍事通信是在民用網上進行的,與商業網相聯的計算機達15萬台之多,伊拉克戰爭中美軍還徵用和租用了部分商業衛星和民用信息網絡,以彌補信息傳輸能力的不足。信息技術的複雜性使其裝備的維修變為故障模塊的更換,民用技術產品的採用有利於減少部隊裝備備件的庫存。另外,民用信息技術產品的使用也為民用信息技術企業參與部隊裝備維修提供了可能,從而也降低了部隊裝備的維修費用。 2003年,美國在伊拉克戰爭中,先後同全球4萬個生產商簽訂了50萬份物資保障合同,“承包商上戰場”實現軍隊後勤保障的社會化。




信息化是雙刃劍,軍隊的信息化建設在提高作戰能力的同時也需要特別關注對信息網絡的安全防護。網絡戰的一個基本特點是不對稱性,攻擊成本低且易攻難守,網絡戰手段的特殊性將導致未來戰爭的“平民化”趨勢,“黑客”有可能成為戰爭的主角。為了防止出現“網絡’9·11’事件”,布什總統早在2002年就發布了第16號“國家安全總統令”,組建美軍歷史上也是世界上第一支網絡黑客部隊——網絡戰聯合功能構成司令部,陸軍和海軍也各有電腦應急反應分隊,空軍則建立了專門負責實施網絡進攻的航空隊。這些部隊由世界頂級電腦專家和“黑客”組成,目前已經正式編入了作戰序列。在美國拉斯維加斯最大的計算機展覽上,美國前助理國防部長莫尼曾在演講中對“黑客”們說:“如果你們考慮過餘生要幹些什麼,請務必不要忘記國防部。”此外,美軍還僱用一些黑客專門從事計算機漏洞測試工作。 2004年9月,美國成立了由28家專業化大公司組成的國際工業財團——網絡中心戰工業聯盟,加強信息技術領域方面的軍民協調。









黨的十七大報告指出,“國防和軍隊建設,必須站在國家安全和發展戰略全局的高度,統籌經濟建設和國防建設”。 “堅持科技強軍,按照建設信息化軍隊、打贏信息化戰爭的戰略目標,加快機械化和信息化複合發展,積極開展信息化條件下軍事訓練,全面建設現代後勤,加緊培養大批高素質新型軍事人才,切實轉變戰鬥力生成模式”。 “調整改革國防科技工業體制和武器裝備採購體制,提高武器裝備研製的自主創新能力和質量效益。建立和完善軍民結合、寓軍於民的武器裝備科研生產體系、軍隊人才培養體系和軍隊保障體系,堅持勤儉建軍,走出一條中國特色軍民融合式發展路子”。上述重要論述是實現軍民結合科學發展的戰略方針。我們要抓住信息化的機遇,做好寓軍於民這篇大文章,在全面建設小康社會進程中實現富國和強軍的統一。

Original Source(s)

(1) http://www.cia.org.cn/subject/subject_08

(2) http://www.gov.cn/gongbao/content/2006/content