Second, the development trend:
1. With the development of the information society, the status of information as a strategic resource will be higher, and the competition around obtaining information resources, building an information-based army and occupying the highland with information advantages will be intensified. Countries will invest more money in the construction of social information infrastructure and try their best to maintain their own advantages in information construction.
2. The new format of ultra-wideband information in expressway will be continuously promoted, and the capabilities of network attack and network defense will be improved simultaneously. Information technology will increasingly dominate politics, economy, finance, environment, culture, life, production and other fields.
3. In the military field, countries will increase the intensity and speed of information-based military construction, and constantly innovate military weapons and equipment, military theory, establishment system and personnel training. And try to open the distance between the country and other countries' military information capabilities.
Extended data:
Methods of information warfare
Reconnaissance and counterreconnaissance
Electronic warfare is an organic part of information warfare and an electromagnetic struggle between hostile parties. There are three main methods: reconnaissance and anti-reconnaissance, interference and anti-interference, destruction and anti-destruction. All this is based on electromagnetic waves as a "weapon", and the target is not the enemy's effective strength, but the enemy's electronic equipment such as communication, radar and computer network.
Its purpose is to interrupt the enemy's communication, blind the radar, lose control of the weapon and paralyze the command. Electronic reconnaissance is to find out the enemy's electronic system and collect military intelligence by using reconnaissance satellites, reconnaissance planes and reconnaissance devices in offensive weapons loaded with precision electronic equipment. For example, if the other side launches a missile, the infrared detector in the reconnaissance satellite can quickly detect the whereabouts of the missile.
These information are immediately sent to the ground radar network, which instructs the radar network to track missiles and sends relevant information to the computer in the command center. The computer quickly analyzes the flight direction of the missile and directs its own missile to intercept it.
Interference and anti-interference
Electronic jamming is to interfere with the normal work of enemy electronic equipment by electronic means. The electronic means mentioned here refers to the conscious emission or reflection of certain electromagnetic waves, which makes the other party's electronic equipment have an "illusion" or fail to work normally. According to different jamming objects, electronic jamming can be divided into communication jamming, radar jamming, guided weapon jamming and command system jamming.
Where there is interference, there must be anti-interference. The purpose of anti-jamming is to make every effort to weaken or even eliminate the adverse effects of enemy interference on us. Its means are also varied. In modern warfare, interference and anti-interference are really "the height of the Tao is one foot, the height of the devil is one foot", and they do not give in to each other.
Destruction and anti-destruction
"Destruction" is a hard way to kill. With the cooperation of electronic reconnaissance, the important electronic equipment or systems of the enemy are permanently disabled or completely destroyed by means of electronic destruction or force destruction.
In this respect, besides explosive weapons, electromagnetic energy weapons (such as high-energy lasers and microwave weapons) and computer viruses are widely used. There are also many means of "anti-destruction". For example, in communication, multiple communication means are often used at the same time to realize multiplex transmission, so that when one system is destroyed, other systems can replace or detour.
Some people think that in the 2nd1century, a sudden attack like 1942 "Pearl Harbor Incident" is likely to be repeated in the form of information warfare. It does not attack planes, artillery and nuclear weapons, but the enemy's computer system; Not only military systems, but also a wider range of civilian systems. The means used include computer virus, hidden code, data destruction program, etc.
Its purpose is to block or even destroy the enemy's computer network, resulting in its command failure, traffic chaos, power outage and financial paralysis.
For example, in the Gulf War in the early 1990s, American intelligence agencies secretly replaced the related components of computer printers of air defense systems imported from France by chips containing solidified viruses, and then activated the viruses through remote control, which eventually led to the paralysis of Iraq's air defense systems.
The British "Time" magazine claims that the United States will soon be able to use keyboards, mice and computer viruses to launch rapid, silent, extensive and devastating attacks on the enemy's military and civilian infrastructure without firing a shot. Accordingly, we can think that in the future war, there is no difference between the front and the rear, and wherever the network system reaches, it may become a battlefield.
In modern information warfare, communication secrecy is very important. Therefore, the warring parties often have to decide on communication security measures. It is a common encryption measure to digitize voice analog signals and then change the sending order. In order to prevent the other party from deciphering, not only the password needs to be changed frequently, but also the encryption method is becoming more and more mysterious.
Baidu encyclopedia-information warfare