侦测与交战:一种新的美国战争方式

IF 1.5 3区 社会学 Q2 INTERNATIONAL RELATIONS Survival Pub Date : 2023-09-03 DOI:10.1080/00396338.2023.2261246
David C. Gompert, Martin Libicki
{"title":"侦测与交战:一种新的美国战争方式","authors":"David C. Gompert, Martin Libicki","doi":"10.1080/00396338.2023.2261246","DOIUrl":null,"url":null,"abstract":"AbstractThe threat that paces American force planning is not from Russia, but rather from China. This is leading to a new way of warfare. The authors call it ‘detect and engage’. The confluence of artificial intelligence, applied quantum mechanics and satellite networking permits dispersed and diverse units and platforms to operate as a unified joint force across sea, air, land and space. Cyber operations, practically indifferent to location, further enable the United States to reduce reliance on geographically concentrated and exposed forces. Advanced technology is just one step in operationalising new forms of warfare. Others include anticipating adversary responses; building robust inventories of extended-range weapons; knowing when and how to conduct close-in operations; integrating and empowering defence allies; and maintaining US forward presence. Harnessing leading-edge technology to improve global US military effectiveness reflects neither an isolationist nor an insular policy, but rather one of ongoing engagement.Key words: anti-access/area denial (A2/AD)artificial intelligence (AI)Chinacyberdetect and engagemultidomain operationsquantum technologiesRussiaspaceUnited States Notes1 See Stephen Biddle, ‘Back in the Trenches: Why New Technology Hasn’t Revolutionized Warfare in Ukraine’, Foreign Affairs, vol. 102, no. 5, September/October 2023; ‘The Future of War: A Special Report’, The Economist, 8 July 2023, https://www.economist.com/weeklyedition/2023-07-08?; and Franz-Stefan Gady and Michael Kofman, ‘Ukraine’s Strategy of Attrition’, Survival, vol. 65, no. 2, April–May 2023, pp. 7–22.2 See International Institute for Strategic Studies (IISS), The Military Balance 2023 (Abingdon: Routledge for the IISS), pp. 500–1.3 At the same time, intended vulnerabilities of the United States and its forces to cyber war may affect the viability of a strategy that assumes workable longdistance electronic communications.4 John Warden, a retired Air Force colonel and fighter pilot, has articulated the ways in which US airpower can achieve superiority and control and deliver large volumes of precision munitions at great distances, potentially gaining victory with diminished need for invading troops. See, for example, John A. Warden III, ‘Employing Air Power in the Twentyfirst Century’, in Richard H. Shultz, Jr, and Robert L. Pfaltzgraff, Jr (eds), The Future of Air Power in the Aftermath of the Gulf War (Maxwell AFB, AL: Air University Press, 1992).5 See Harlan K. Ullman and James P. Wade, ‘Shock & Awe: Achieving Rapid Dominance’, National Defense University, Command and Control Research Program, October 1996, http://www.dodccrp.org/files/Ullman_Shock.pdf.6 Emphasising the importance of rapid decision-making is not new. Air Force officer and then consultant John Boyd coined the ‘OODA’ (observe–orient– decide–act) loop in the late twentieth century. It remains a good conception of superior command and control. See John R. Boyd, ed. Grant T. Hammond, A Discourse on Winning and Losing (Maxwell AFB, AL: Air University Press, 2018), pp. 217–44.7 See, for example, Congressional Research Service, ‘Joint All-Domain Command and Control ( JADC2)’, updated 21 January 2022, https://sgp.fas.org/crs/natsec/IF11493.pdf. For a measured critique of multidomain operations, see Franz-Stefan Gady, ‘Manoeuvre Versus Attrition in US Military Operations’, Survival, vol. 63, no. 4, August–September 2021, pp. 131–48.8 See, for example, US Department of Defense, ‘Secretary of Defense Lloyd J. Austin III Message to the Force’, 23 March 2023, https://www.defense.gov/News/Releases/Release/Article/3316641/secretary-of-defense-lloyd-j-austin-iii-message-to-the-force/.9 For an assessment of the broad range of reforms still needed, see National Defense Science & Technology Strategy Review Task Force, ‘An Innovation Strategy for the Decisive Decade’, 17 July 2023, https://innovation.defense.gov/Portals/63/DIB_An%20Innovation%20Strategy%20for%20the%20Decisive%20Decade_230717_1.pdf.10 See David C. Gompert, ‘Spin-on: How the US Can Meet China’s Technological Challenge’, Survival, vol. 62, no. 3, June–July 2020, pp. 115–30.11 The idea of maximising ‘transaction’ advantage is an insight of Vice Admiral Arthur Cebrowski, a leading pioneer of ‘networkcentric warfare’ at the turn of the twenty-first century. See Arthur K. Cebrowski and John H. Gartska, ‘Network-centric Warfare – Its Origin and Future’, Proceedings, vol. 124, no. 1, January 1998, pp. 28–35.12 Our assumption is that, for better or worse, no arms-control restrictions on intermediate-range missiles will be in place.13 See Barry R. Posen, ‘Command of the Commons: The Military Foundation of US Hegemony’, International Security, vol. 28, no. 1, Summer 2003, pp. 5–46.Additional informationNotes on contributorsDavid C. GompertDavid C. Gompert is Distinguished Visiting Professor at the US Naval Academy, Advisor to Ultratech Capital Partners, Adjunct Fellow at RAND Corporation and former US Acting Director of National Intelligence.Martin LibickiMartin Libicki is the Maryellen and Richard L. Keyser Distinguished Visiting Professor of Cybersecurity at the US Naval Academy.","PeriodicalId":51535,"journal":{"name":"Survival","volume":"39 1","pages":"0"},"PeriodicalIF":1.5000,"publicationDate":"2023-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detect and Engage: A New American Way of War\",\"authors\":\"David C. Gompert, Martin Libicki\",\"doi\":\"10.1080/00396338.2023.2261246\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"AbstractThe threat that paces American force planning is not from Russia, but rather from China. This is leading to a new way of warfare. The authors call it ‘detect and engage’. The confluence of artificial intelligence, applied quantum mechanics and satellite networking permits dispersed and diverse units and platforms to operate as a unified joint force across sea, air, land and space. Cyber operations, practically indifferent to location, further enable the United States to reduce reliance on geographically concentrated and exposed forces. Advanced technology is just one step in operationalising new forms of warfare. Others include anticipating adversary responses; building robust inventories of extended-range weapons; knowing when and how to conduct close-in operations; integrating and empowering defence allies; and maintaining US forward presence. Harnessing leading-edge technology to improve global US military effectiveness reflects neither an isolationist nor an insular policy, but rather one of ongoing engagement.Key words: anti-access/area denial (A2/AD)artificial intelligence (AI)Chinacyberdetect and engagemultidomain operationsquantum technologiesRussiaspaceUnited States Notes1 See Stephen Biddle, ‘Back in the Trenches: Why New Technology Hasn’t Revolutionized Warfare in Ukraine’, Foreign Affairs, vol. 102, no. 5, September/October 2023; ‘The Future of War: A Special Report’, The Economist, 8 July 2023, https://www.economist.com/weeklyedition/2023-07-08?; and Franz-Stefan Gady and Michael Kofman, ‘Ukraine’s Strategy of Attrition’, Survival, vol. 65, no. 2, April–May 2023, pp. 7–22.2 See International Institute for Strategic Studies (IISS), The Military Balance 2023 (Abingdon: Routledge for the IISS), pp. 500–1.3 At the same time, intended vulnerabilities of the United States and its forces to cyber war may affect the viability of a strategy that assumes workable longdistance electronic communications.4 John Warden, a retired Air Force colonel and fighter pilot, has articulated the ways in which US airpower can achieve superiority and control and deliver large volumes of precision munitions at great distances, potentially gaining victory with diminished need for invading troops. See, for example, John A. Warden III, ‘Employing Air Power in the Twentyfirst Century’, in Richard H. Shultz, Jr, and Robert L. Pfaltzgraff, Jr (eds), The Future of Air Power in the Aftermath of the Gulf War (Maxwell AFB, AL: Air University Press, 1992).5 See Harlan K. Ullman and James P. Wade, ‘Shock & Awe: Achieving Rapid Dominance’, National Defense University, Command and Control Research Program, October 1996, http://www.dodccrp.org/files/Ullman_Shock.pdf.6 Emphasising the importance of rapid decision-making is not new. Air Force officer and then consultant John Boyd coined the ‘OODA’ (observe–orient– decide–act) loop in the late twentieth century. It remains a good conception of superior command and control. See John R. Boyd, ed. Grant T. Hammond, A Discourse on Winning and Losing (Maxwell AFB, AL: Air University Press, 2018), pp. 217–44.7 See, for example, Congressional Research Service, ‘Joint All-Domain Command and Control ( JADC2)’, updated 21 January 2022, https://sgp.fas.org/crs/natsec/IF11493.pdf. For a measured critique of multidomain operations, see Franz-Stefan Gady, ‘Manoeuvre Versus Attrition in US Military Operations’, Survival, vol. 63, no. 4, August–September 2021, pp. 131–48.8 See, for example, US Department of Defense, ‘Secretary of Defense Lloyd J. Austin III Message to the Force’, 23 March 2023, https://www.defense.gov/News/Releases/Release/Article/3316641/secretary-of-defense-lloyd-j-austin-iii-message-to-the-force/.9 For an assessment of the broad range of reforms still needed, see National Defense Science & Technology Strategy Review Task Force, ‘An Innovation Strategy for the Decisive Decade’, 17 July 2023, https://innovation.defense.gov/Portals/63/DIB_An%20Innovation%20Strategy%20for%20the%20Decisive%20Decade_230717_1.pdf.10 See David C. Gompert, ‘Spin-on: How the US Can Meet China’s Technological Challenge’, Survival, vol. 62, no. 3, June–July 2020, pp. 115–30.11 The idea of maximising ‘transaction’ advantage is an insight of Vice Admiral Arthur Cebrowski, a leading pioneer of ‘networkcentric warfare’ at the turn of the twenty-first century. See Arthur K. Cebrowski and John H. Gartska, ‘Network-centric Warfare – Its Origin and Future’, Proceedings, vol. 124, no. 1, January 1998, pp. 28–35.12 Our assumption is that, for better or worse, no arms-control restrictions on intermediate-range missiles will be in place.13 See Barry R. Posen, ‘Command of the Commons: The Military Foundation of US Hegemony’, International Security, vol. 28, no. 1, Summer 2003, pp. 5–46.Additional informationNotes on contributorsDavid C. GompertDavid C. Gompert is Distinguished Visiting Professor at the US Naval Academy, Advisor to Ultratech Capital Partners, Adjunct Fellow at RAND Corporation and former US Acting Director of National Intelligence.Martin LibickiMartin Libicki is the Maryellen and Richard L. Keyser Distinguished Visiting Professor of Cybersecurity at the US Naval Academy.\",\"PeriodicalId\":51535,\"journal\":{\"name\":\"Survival\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2023-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Survival\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/00396338.2023.2261246\",\"RegionNum\":3,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Survival","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/00396338.2023.2261246","RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 0

摘要

制约美国军事计划的威胁不是来自俄罗斯,而是来自中国。这导致了一种新的战争方式。作者称其为“发现并参与”。人工智能、应用量子力学、卫星网络等技术的融合,使分散的、多样化的单位和平台能够跨越海、空、陆、天,形成统一的联合力量。网络作战实际上与地点无关,这进一步使美国能够减少对地理上集中和暴露的力量的依赖。先进技术只是实现新型战争的一个步骤。其他包括预测对手的反应;建立强大的远程武器库存;知道何时以及如何进行近距离行动;整合和授权防务盟友;维持美国的前沿存在。利用尖端技术来提高美国的全球军事效能,既不是孤立主义政策,也不是孤立主义政策,而是一种持续接触政策。关键词:反介入/区域拒入(A2/AD)人工智能(AI)中国网络探测与参与多域作战量子技术俄罗斯空间美国注1参见Stephen Biddle,“回到战壕:为什么新技术没有彻底改变乌克兰的战争”,《外交事务》,第102卷,第2期。2023年9月/ 10月;《战争的未来:特别报告》,《经济学人》,2023年7月8日,https://www.economist.com/weeklyedition/2023-07-08?;弗兰兹-斯特凡·加迪和迈克尔·科夫曼,“乌克兰的消耗战略”,《生存》,第65卷,第65期。参见国际战略研究所(IISS),《军事平衡2023》(阿宾登:IISS的劳特利奇),第500-1.3页。与此同时,美国及其部队对网络战争的预期脆弱性可能会影响假设可行的远程电子通信战略的可行性退役空军上校兼战斗机飞行员约翰•沃登(John Warden)阐述了美国空中力量如何取得优势和控制权,并在远距离投放大量精确弹药,从而在减少入侵部队需求的情况下取得胜利。例如,参见约翰·a·沃登三世,“在21世纪使用空中力量”,载于小理查德·h·舒尔茨和小罗伯特·l·普法茨格拉夫(编),《海湾战争后空中力量的未来》(麦克斯韦空军基地,AL:空军大学出版社,1992年)见Harlan K. Ullman和James P. Wade,“震慑与敬畏:实现快速优势”,国防大学,指挥与控制研究计划,1996年10月,http://www.dodccrp.org/files/Ullman_Shock.pdf.6强调快速决策的重要性并不是新的。空军军官兼顾问约翰·博伊德在20世纪后期创造了“OODA”(观察-导向-决定-行动)循环。它仍然是高级指挥和控制的好概念。参见约翰·r·博伊德主编格兰特·t·哈蒙德,《关于输赢的论述》(麦克斯韦空军基地,AL:航空大学出版社,2018年),第217-44.7页,例如,参见国会研究服务处,“联合全域指挥与控制(JADC2)”,更新于2022年1月21日,https://sgp.fas.org/crs/natsec/IF11493.pdf。关于多域作战的慎重批评,见Franz-Stefan Gady,“美国军事行动中的机动与消耗”,《生存》,第63卷,第6期。例如,参见美国国防部,“国防部长劳埃德·j·奥斯汀三世致部队的信息”,2023年3月23日,https://www.defense.gov/News/Releases/Release/Article/3316641/secretary-of-defense-lloyd-j-austin-iii-message-to-the-force/.9对于仍需进行的广泛改革的评估,参见国防科学与技术战略审查工作组,“决定性十年的创新战略”,2023年7月17日。https://innovation.defense.gov/Portals/63/DIB_An%20Innovation%20Strategy%20for%20the%20Decisive%20Decade_230717_1.pdf.10见David C. Gompert,“Spin-on:美国如何应对中国的技术挑战”,《生存》,第62卷,第2期。“交易”优势最大化的想法是Arthur Cebrowski中将的见解,他是21世纪之交“网络中心战争”的主要先驱。参见Arthur K. Cebrowski和John H. Gartska,“以网络为中心的战争——它的起源和未来”,Proceedings, vol. 124, no。我们的假设是,不管是好是坏,对中程导弹没有军备控制限制参见Barry R. Posen,“公共指挥权:美国霸权的军事基础”,《国际安全》,第28卷,第5期。1, 2003年夏季,第5-46页。其他信息:贡献者说明 Gompert是美国海军学院的杰出客座教授、Ultratech Capital Partners的顾问、兰德公司的兼职研究员和前美国国家情报局代理局长。Martin Libicki是美国海军学院的玛丽莲和理查德·l·凯泽网络安全杰出客座教授。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Detect and Engage: A New American Way of War
AbstractThe threat that paces American force planning is not from Russia, but rather from China. This is leading to a new way of warfare. The authors call it ‘detect and engage’. The confluence of artificial intelligence, applied quantum mechanics and satellite networking permits dispersed and diverse units and platforms to operate as a unified joint force across sea, air, land and space. Cyber operations, practically indifferent to location, further enable the United States to reduce reliance on geographically concentrated and exposed forces. Advanced technology is just one step in operationalising new forms of warfare. Others include anticipating adversary responses; building robust inventories of extended-range weapons; knowing when and how to conduct close-in operations; integrating and empowering defence allies; and maintaining US forward presence. Harnessing leading-edge technology to improve global US military effectiveness reflects neither an isolationist nor an insular policy, but rather one of ongoing engagement.Key words: anti-access/area denial (A2/AD)artificial intelligence (AI)Chinacyberdetect and engagemultidomain operationsquantum technologiesRussiaspaceUnited States Notes1 See Stephen Biddle, ‘Back in the Trenches: Why New Technology Hasn’t Revolutionized Warfare in Ukraine’, Foreign Affairs, vol. 102, no. 5, September/October 2023; ‘The Future of War: A Special Report’, The Economist, 8 July 2023, https://www.economist.com/weeklyedition/2023-07-08?; and Franz-Stefan Gady and Michael Kofman, ‘Ukraine’s Strategy of Attrition’, Survival, vol. 65, no. 2, April–May 2023, pp. 7–22.2 See International Institute for Strategic Studies (IISS), The Military Balance 2023 (Abingdon: Routledge for the IISS), pp. 500–1.3 At the same time, intended vulnerabilities of the United States and its forces to cyber war may affect the viability of a strategy that assumes workable longdistance electronic communications.4 John Warden, a retired Air Force colonel and fighter pilot, has articulated the ways in which US airpower can achieve superiority and control and deliver large volumes of precision munitions at great distances, potentially gaining victory with diminished need for invading troops. See, for example, John A. Warden III, ‘Employing Air Power in the Twentyfirst Century’, in Richard H. Shultz, Jr, and Robert L. Pfaltzgraff, Jr (eds), The Future of Air Power in the Aftermath of the Gulf War (Maxwell AFB, AL: Air University Press, 1992).5 See Harlan K. Ullman and James P. Wade, ‘Shock & Awe: Achieving Rapid Dominance’, National Defense University, Command and Control Research Program, October 1996, http://www.dodccrp.org/files/Ullman_Shock.pdf.6 Emphasising the importance of rapid decision-making is not new. Air Force officer and then consultant John Boyd coined the ‘OODA’ (observe–orient– decide–act) loop in the late twentieth century. It remains a good conception of superior command and control. See John R. Boyd, ed. Grant T. Hammond, A Discourse on Winning and Losing (Maxwell AFB, AL: Air University Press, 2018), pp. 217–44.7 See, for example, Congressional Research Service, ‘Joint All-Domain Command and Control ( JADC2)’, updated 21 January 2022, https://sgp.fas.org/crs/natsec/IF11493.pdf. For a measured critique of multidomain operations, see Franz-Stefan Gady, ‘Manoeuvre Versus Attrition in US Military Operations’, Survival, vol. 63, no. 4, August–September 2021, pp. 131–48.8 See, for example, US Department of Defense, ‘Secretary of Defense Lloyd J. Austin III Message to the Force’, 23 March 2023, https://www.defense.gov/News/Releases/Release/Article/3316641/secretary-of-defense-lloyd-j-austin-iii-message-to-the-force/.9 For an assessment of the broad range of reforms still needed, see National Defense Science & Technology Strategy Review Task Force, ‘An Innovation Strategy for the Decisive Decade’, 17 July 2023, https://innovation.defense.gov/Portals/63/DIB_An%20Innovation%20Strategy%20for%20the%20Decisive%20Decade_230717_1.pdf.10 See David C. Gompert, ‘Spin-on: How the US Can Meet China’s Technological Challenge’, Survival, vol. 62, no. 3, June–July 2020, pp. 115–30.11 The idea of maximising ‘transaction’ advantage is an insight of Vice Admiral Arthur Cebrowski, a leading pioneer of ‘networkcentric warfare’ at the turn of the twenty-first century. See Arthur K. Cebrowski and John H. Gartska, ‘Network-centric Warfare – Its Origin and Future’, Proceedings, vol. 124, no. 1, January 1998, pp. 28–35.12 Our assumption is that, for better or worse, no arms-control restrictions on intermediate-range missiles will be in place.13 See Barry R. Posen, ‘Command of the Commons: The Military Foundation of US Hegemony’, International Security, vol. 28, no. 1, Summer 2003, pp. 5–46.Additional informationNotes on contributorsDavid C. GompertDavid C. Gompert is Distinguished Visiting Professor at the US Naval Academy, Advisor to Ultratech Capital Partners, Adjunct Fellow at RAND Corporation and former US Acting Director of National Intelligence.Martin LibickiMartin Libicki is the Maryellen and Richard L. Keyser Distinguished Visiting Professor of Cybersecurity at the US Naval Academy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Survival
Survival Multiple-
CiteScore
2.10
自引率
16.70%
发文量
88
期刊介绍: Survival, the Institute"s bi-monthly journal, is a leading forum for analysis and debate of international and strategic affairs. With a diverse range of authors, thoughtful reviews and review essays, Survival is scholarly in depth while vivid, well-written and policy-relevant in approach. Shaped by its editors to be both timely and forward-thinking, the journal encourages writers to challenge conventional wisdom and bring fresh, often controversial, perspectives to bear on the strategic issues of the moment. Survival is essential reading for practitioners, analysts, teachers and followers of international affairs. Each issue also contains Book Reviews of the most important recent publications on international politics and security.
期刊最新文献
The Gaza War and the Region NATO at 75: The Perils of Empty Promises The Primitivisation of Major Warfare Applying History: Gaza and the Twentieth Century The Gaza Horror and US Policy
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1