Editor's note: The creator of the Internet and the originator of the cyber War, the United States, has undoubtedly become the world's only network power, and explicitly China as the largest opponent of cyberspace. All these require us to innovate the theory of network space system, study the attacking and defending tactics of cyberspace, develop the network space weapon equipment, build the network space Combat force, strengthen the network space battlefield construction, and comprehensively plan to win the cyber war.
Editor's note: The creator of the Internet and the originator of cyber warfare, the United States, has undoubtedly become the world's only network power, and explicitly China as the largest opponent of cyberspace. In order to emerge from the network power to the rising of the network power, China must establish the network National Defense Force and form a new type of China-US network power relationship. At the same time, we are faced with non-traditional threats such as cyber terrorism. All these require us to innovate the theory of network space system, study the attacking and defending tactics of cyberspace, develop the network space weapon equipment, build the network space Combat force, strengthen the network space battlefield construction, and comprehensively plan to win the cyber war.
"Throughout human history, countries that have been most effective in moving from one field of human activity to another have always had a huge strategic advantage," said Daniel Ol Greheum, the US strategist. "This has been repeatedly proven by human history. Successful exercised the sea, created Britain this once glorious "day does not fall Empire", successful exercised space, established the United States has been difficult to shake the "Space overlord" status. Entering the information age, the emergence and rapid development of cyberspace has become the strategic commanding heights in the new game of great powers.
Without cyber security, there would be no national security. Cyberspace is a sharp "double-edged sword", in opening the door to economic prosperity and national prosperity, if the militarization of cyberspace is lacking the necessary vigilance, despise the military threat from cyberspace, ignoring the importance of strengthening the preparation of cyber-space military struggle, but also may leave the "Achilles heel" for national security, Even become the fuse and accelerator that led to the decline of the country. "Soviet soldiers bronze statue incident", Russian hackers attacked the Estonian network of bloodless, "" The Arab Spring "the network public opinion quickly" fission "power can be reviewed by the great power of the country, the NATO" Cyber Dawn "network warfare analysis report of the strong murderous, and so on, have left a very deep impression on the world, The cyber war, which heralds the constant fear of the Internet, is on the pace of acceleration.
At present, our country all kinds of network terminals and the number of Internet users in the world, the bat as the representative of the rapid rise of the network, the total size of the Internet economy continued to grow, network space productivity explosion of growth, showing unprecedented vitality and vitality. However, as the wealth of rich and Yu Guoqiang, "net wealth" is not equal to "net strong". Large network space and not strong, "Puffy puffiness", will become a variety of hostile forces coveted objects, once they seize the weakness and attack and use, will seriously threaten our national security. Therefore, while paying attention to the development of network space productivity and cultural power, strengthening the preparation of cyber-space military struggle, enhancing the defense power of cyberspace significantly, is the fundamental guarantee for building network power and winning the future cyber war. To strengthen the preparation of cyber-space military struggle, concretely, we should start with the following several aspects.
Innovate the theory of network space system right. The process of the development and evolution of the theory of the right to make the sea, the air, and the right to make the power of the system shows that each historical stage of the emergence of a war space, then will produce the corresponding theory of the system of power. The new theory of ownership will greatly promote and traction the progress of military technology, as well as the reform of military system and methods of warfare, and become the propeller and catalyst of the evolution of war and military transformation. An American scholar thinks, "the 21st century grasps the network right and 19th century grasps the sea power, the 20th century grasps the air supremacy to have the decisive significance." "Cyberspace is a new fifth combat field, it should be through a profound revelation of the strategic significance of cyberspace, strategic position and strategic value, advance planning to capture the right to make the network strategy, and so on, to introduce a complete system of network space system theory, scientific guidance network space military struggle."
Research on cyber space attack and defense tactics. Cyber-space warfare is a typical "three-non" (asymmetrical, non-linear, non-contact) combat, which embodies the development trend of "three without" (No, Invisible, silent) war. Compared with the traditional combat style, cyber-space warfare has the characteristics of asymmetric attack and defense, vague combat boundary, complex warfare means and strong technical. The traditional combat theory rooted in the real space warfare is obviously unsuitable for the network space combat, only grasping the basic characteristic law of the network space combat, studying the network space attack and defense tactics vigorously, can occupy the initiative and advantage in the network space confrontation. For example, cyber-space warfare is integrated, the concealment is strong, without the troop mobilization and the adjustment deployment, can in the case without the obvious symptom, enhances the attack intensity and speeds up the attack rhythm in the very short time, easy to reach the war time sudden nature, the new network blitz will become the future network war important combat style.
Development of cyberspace weapons and equipment. In order to break through the traditional concept of hardware, it is the concept of weapon and equipment to set up software. Focus on the development of different objects of action, different mechanisms of destruction, different uses of the network space Warfare software, the formation of a complete range of models complete series of network attack and defense software weapons and equipment. For example, in addition to viruses, Trojans and other cyber offensive weapons, also develop the professional firewall for network defense, attack traceability tools and other weapons, as well as network sniffer, vulnerability scanning software, etc. in addition to the Internet and the financial, transportation, telecommunications, electricity, radio and television and other key business network of strategic cyber warfare weapons , but also the development of battlefield communications network, tactical Internet and other military networks of battlefield network warfare weapons, in addition to reducing the efficiency of the other side of the network for the purpose of destructive weapons, but also to develop to penetrate each other's national firewall, a large number of dissemination of propaganda information for public opinion on the network psychological warfare
Build network space Combat force. In cyberspace, this silent battlefield without smoke, dash, the gun is no longer the ordinary soldiers, but armed with knowledge of the high IQ, expert network warriors, they use computer as a weapon, keyboard and mouse is a plate machine, bit is a bullet, not to spell physical, but skills and intelligence. We should vigorously develop and integrate various professional network warfare forces of the army, the formation of a capable and efficient network space combat Regular Army, standing army, at the same time, according to the "small core, large periphery" ideas, and strengthen the construction by the network militia, network police, patriotic hackers, large and medium enterprises network technology personnel, such as the formation of local Professional network warfare force. Through professional institutions and scientific research units targeted training, as well as social recruitment and other channels, the extensive training and absorption of network warfare personnel, especially those special areas and combat desperately needed "wizards, biases, geeks."
Strengthen the network space battlefield construction. In strengthening the construction of network infrastructure, while constructing the military information grid with abundant bandwidth, good security and efficient operation, we should strengthen the network reconnaissance and detection, enhance the network spatial situational awareness ability, draw the global network map, actively develop and set up the overseas cyber Warfare attack array, and intensify the construction of a global network war position system. Through secret control, loophole reserve, backdoor implantation, etc., to carry out large-scale network warfare strategy preset. The network space battlefield construction should draw on the experience and practice of the American Army and other developed countries, such as the U.S. Defense Advanced Research Program Bureau 20L2 years to start the "basic network operation (x plan)". Among them, network map is the core of "x plan", through information collection, model and visualization, real-time reflect the location of network nodes around the world and their connection mode, and send relevant information to other departments in the "X plan" system. Once the network map is successfully plotted, it can generate the general operational situation Map of the network space, which is similar to the traditional entity space Battlefield situation map, and greatly reduce the complexity and difficulty of the network space warfare.
(author of the Department of Operational theory and doctrine, Military Academy of Sciences)
(Source: China information Security)