Intelligent Warfare: Prospects of Military Development in the Age of AI

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book examines the future trend toward "intelligent" warfare considering the global environment, the history of warfare, and scientific and technological advancement. It develops a comprehensive set of theoretical frameworks, application concepts, and evaluation criteria for military intelligence. The volume is packed with theoretical highlights and vivid examples, including the tracking of Osama bin Laden, the decapitation strike against Qasem Soleimani, the remote assassination of Iranian nuclear scientists, the drone war in the Nagorno–Karabakh conflict, modern equipment deployed in the Palestinian–Israeli conflict, and the war between social media groups. In addition, the author envisions a possible future for "intelligent" wars in which adversarial parties engage in combat through virtual and unmanned systems. This nature may help avoid the brutality and high death toll associated with traditional warfare. The book explores the possibility of future civilized warfare. It will be of interest to researchers, academics, and students in the fields of politics, military intelligence, and military technology, and to those who are interested in intelligent warfare in general.

Author(s): Mingxi Wu
Publisher: Routledge
Year: 2022

Language: English
Pages: 453
City: London

Cover
Half Title
Title Page
Copyright Page
Table of Contents
Figures
Tables
Translator’s Preface
Preface
Part I Theoretical Discussions
1 Global Factors That Influence Warfare
1.1 Reshaping the International Strategic Landscape
1.2 Far-Reaching Impact of Scientific and Technological Development
1.3 Global Interconnectivity Is Increasingly Rapidly Upgraded
1.4 The Shaping of New Economic Forms
1.5 Intensifying Competition for Natural Resources
1.6 The Rapid Growth of Megacities
1.7 Long-Standing Religious and Cultural Conflicts
Note
References
2 The Future Trends of Warfare
2.1 World Peace and Security as the Intrinsic Driving Forces
2.2 The Disruptive Effect of Science and Technology
2.3 The Overall Supporting Role of the Economy
2.4 The Transition of Warfare Foundations and Conditions
2.5 New Types of Operational Capabilities
2.5.1 Cyber and Cognitive Confrontations
2.5.2 Unmanned Swarm Operations
2.5.3 Hypersonic Confrontations
2.5.4 Cross-Domain Attacks and Defenses and Multi-Domain Fusion
2.5.5 Integrated Defense
2.5.6 Competitions Caused By Interdisciplinary Biological Technologies
2.5.7 Open-Source Contentions and Exploitations
2.6 The Reconfiguration of Strategic Deterrence
2.7 Warfare Evolving Into a New Stage
References
3 The Transformation of Intelligent Warfare
3.1 A Historical Glimpse of AI
3.1.1 The Birth of AI (1940–1960)
3.1.2 The Golden Age of AI (1960–1970)
3.1.3 The Trough of AI (1970–1980)
3.1.4 The Boom Period of AI (1980–1987)
3.1.5 The Winter of AI (1987–1993)
3.1.6 The Spring of AI (1993–2019)
3.2 The Age of AI
3.2.1 From Quantitative to Qualitative Changes
3.2.2 Arrival of the Inflection Point
3.2.3 Three Major Events
3.3 From Land Power to Intelligence Power
3.3.1 Land Power
3.3.2 Sea Power
3.3.3 Air Power
3.3.4 Space Power
3.3.5 Information Power
3.3.6 Intelligence Power
3.4 AI-Led Rules and Laws of Victory
3.4.1 Evolution of the Form of Warfare
3.4.2 The Essence and Dominant Role of Intelligence
3.4.3 Kill Chain Acceleration
3.4.4 Higher-Order Feature Reflected
3.5 The Rising Role of Virtual Space
3.5.1 Ubiquitous Interconnection
3.5.2 Cyber Battlefield
3.5.3 Virtual Practices
3.6 Operational Patterns Dominated By Unmanned Vehicles
3.6.1 Introduction to Unmanned Systems
3.6.2 Three Stages of Unmanned Operations
3.6.3 Trends in Autonomous Behaviors
3.6.4 The Talisman of Humanity
3.7 All-Domain Operations and Cross-Domain Attack and Defense
3.7.1 The Concept of Innovative Operations
3.7.2 From Joint to Integrated
3.8 Human–AI Hybrid Decision-Making
3.8.1 Decision-Making Revolution
3.8.2 Human Brain + AI
3.9 Non-Linear Amplification and Rapid Convergence
3.9.1 Emergence Effects
3.9.2 Operational Focus
3.10 Organic and Symbiotic Human–Equipment Relationships
3.10.1 Qualitative Changes in Equipment Patterns
3.10.2 Separation of Physicality and Concentration of Mentality
3.10.3 Management Reform
3.11 Evolution By Self-Learning and Self-Confrontation
3.11.1 Principles of Evolution
3.11.2 Pathways of Evolution
3.12 Intelligent Design and Manufacturing
3.12.1 Challenges to the Tradition
3.12.2 New Modes of Combat Effectiveness Generation
3.13 Risk of Loss of Control
3.14 Innovation in Inheritance
3.15 Comprehensive Forms and Characteristics
3.15.1 Shorter Duration and Greater Impact
3.15.2 Front-Loaded Military Construction and Operations
3.15.3 Virtual–Real Parallel Interactions
3.15.4 Three “Chains” Underpinning War Victory
3.15.5 New Capabilities Contributing to Asymmetric Advantages
3.15.6 Unmanned Operations Breeding Civilized Warfare
References
4 Military Intelligence and Intelligent Technologies
4.1 Basic Concepts
4.1.1 Intelligence
4.1.2 Artificial Intelligence
4.1.3 Intelligent Systems
4.1.4 Military Intelligence
4.1.5 Military Intelligent Technologies
4.2 Classification
4.2.1 Functions
4.2.2 Applications
4.2.3 Technical Focuses
4.3 Framework
4.3.1 Fundamental Technologies
4.3.1.1 Machine Learning
4.3.1.2 Big Data Intelligence
4.3.1.3 Transmedia Perception and Calculation
4.3.1.4 Hybrid and Augmented Intelligence
4.3.1.5 Swarm Intelligence
4.3.1.6 Autonomous Cooperation and Optimal Decision-Making
4.3.1.7 Brain-Like and Quantum Intelligent Computing
4.3.1.8 Intelligent Chips and Systems
4.3.1.9 Natural Language Processing (NLP)
4.3.1.10 Interdisciplinary Biology
4.3.2 Systematic Technologies
4.3.2.1 Intelligent Combat System Architecture
4.3.2.2 Cognitive Network Communication
4.3.2.3 Deep Battlefield Cognition
4.3.2.4 Distributed Intelligent Cloud for Command and Control
4.3.2.5 Parallel Combat Simulation and Assessment
4.3.3 Domain-Specific Technologies
4.3.3.1 Intelligent Combat Vehicles
4.3.3.2 Manned–Unmanned Cooperation
4.3.3.3 Intelligent Precision Strikes
4.3.3.4 Virtual Space and Intelligent Information Countermeasures
4.3.3.5 Autonomous/Bionic Unmanned Swarms
4.3.3.6 Anti-Hypersonic, Anti-Swarm, and Anti-Terrorist Technology
4.3.3.7 Intelligent Security and Maintenance
4.4 Expertise
4.4.1 Machine Learning
4.4.1.1 Concept
4.4.1.2 Basic Structure
4.4.1.3 Learning Strategies
4.4.1.4 Representations
4.4.1.5 Applications
4.4.1.6 Comprehensive Classification
4.4.1.7 Forms of Learning
4.4.1.8 Research Fields
4.4.2 Deep Learning
4.4.2.1 Concept
4.4.2.2 Connotations
4.4.2.3 Issues
4.4.2.4 Basic Ideas
4.4.2.5 Key Technologies
4.4.2.6 Applications
4.4.3 Bionic Technology
4.4.3.1 Concept
4.4.3.2 Materials and Structures
4.4.3.3 Sensing and Detection
4.4.3.4 Navigation and Guidance
4.4.3.5 Swarm Control
4.4.3.6 Bionic Control
4.4.3.7 Trends
4.4.4 Swarm Intelligence
4.4.4.1 Concept
4.4.4.2 Background
4.4.4.3 Basic Principles
4.4.4.4 Features
4.4.4.5 Typical Models
4.4.5 Hybrid Intelligence
4.4.5.1 Concept
4.4.5.2 Forms
4.4.6 Knowledge Graphs
4.4.6.1 Concept
4.4.6.2 Characteristics
4.4.6.3 Improved Search Results
4.4.7 Brain–Computer Interface
4.4.7.1 Concept
4.4.7.2 Background
4.4.7.3 Basic Structure
4.4.7.4 Classification
4.4.7.5 Applications
4.4.8 Mental State Assessment
4.4.8.1 Concept
4.4.8.2 Criteria
4.4.8.3 Key Technologies
4.4.8.4 Applications
References
5 AI-Based Intelligent Ecology
5.1 AI Brain Systems
5.2 Distributed Clouds
5.3 Super Networks
5.3.1 Space-Based Information Networks
5.3.2 Military Mobile Communication Networks
5.3.3 Data Links
5.3.4 Novel Communications
5.3.5 Civil Communication Infrastructures
5.4 Collaborative Swarms
5.4.1 Collaborative Advantages
5.4.2 Cost Advantages
5.4.3 Autonomous Advantages
5.4.4 Decision-Making Advantages
5.5 Cloud Terminals
Reference
6 Parallel Military and Intelligent Training
6.1 Parallel Theory
6.2 Parallel Military
6.2.1 Knowing Oneself and One’s Enemy, and Foreseeing the Results Before the Battle Begins
6.2.2 Developing a Strategy and Outwitting the Best With the Worst
6.2.3 Interaction Between the Virtual and the Real Worlds, Using Virtuality to Promote Reality
6.2.4 Winning Real Battles Through Virtuality
6.3 Parallel Systems
6.4 Virtual Battlefield Environment
6.5 Parallel Soldiers
6.6 Parallel Equipment
6.6.1 Digitalized Virtual Equipment Systems
6.6.2 Equipment Simulation Training Systems
6.6.3 Parallel Equipment AI Systems
6.7 Parallel Forces
6.8 Virtual Staff Officers and Commanders
6.9 Personnel Recruitment and Training
References
7 The Evolution of OSoS
7.1 Ecological Chain
7.2 Distribution and Diversity
7.3 Parallel Processing and Storage
7.4 Network Connectivity and Mutual Feedback
7.5 Self-Repairing
7.6 Self-Learning and Evolution
7.7 Operation Rules
7.8 Self-Adaptive Factory
7.9 Survival of the Fittest
Part II Strategic and Tactical Applications
8 Unmanned Operations
8.1 Development of Unmanned Technology
8.2 UAVs
8.3 UGVs
8.4 USVs and UUVs
8.5 Bionic Robots
8.6 Intelligent Ammunition
8.6.1 Fully Modularized Flexible Ammunition
8.6.2 Intelligent and Controllable Ammunition
8.6.3 Guided Ammunition
8.7 Unmanned Ground Operations
8.7.1 Single Unmanned System Operation
8.7.2 Manned–Unmanned Cooperative Ground Operations
8.7.3 Low- and Medium-Altitude Manned–Unmanned Cooperative Operations
8.7.4 Air–Ground Integrated Unmanned Operations
8.7.5 Low- and Medium-Altitude UAV Swarm Operations
8.7.6 Medium- and Long-Range Loitering/End-Sensitive Missile Swarm Operations
8.7.7 UGV Swarm Coordinated Operations
8.7.8 Human–Robot Mixed Formation Operations
8.7.9 Unattended Ground Systems
8.8 Unmanned Marine Operations
8.8.1 Single Unmanned System Operation at Sea
8.8.2 Manned–Unmanned Aerial Vehicle Cooperative Operations at Sea
8.8.3 3D Unmanned Sea-To-Ground Attacks
8.8.4 3D Unmanned Attacks Against Ships
8.8.5 3D Unmanned Attacks Against Submarines
8.8.6 Unmanned Air-To-Sea Operations
8.8.7 Maritime Unmanned Swarm Operations
8.8.8 Sea–Air Integrated Unmanned Operations
8.8.9 Unmanned Marine Operation System
8.8.10 Cross-Media Unmanned Maritime Operations
8.9 Unmanned Aerial Operations
8.9.1 Single UAV Operations
8.9.2 Manned–Unmanned Cooperative Aerial Operations Supported By Loyal Wingman
8.9.3 Early-Warning Aircraft + Mixed Formation Aerial Operations
8.9.4 Manned–Unmanned Coordinated Ground Operations
8.9.5 Air-Launched UAV Swarm Operations
8.9.6 Air–Ground Integrated Unmanned Ground Attacks
8.9.7 Anti-Stealth, Anti-Hypersonic, and Anti-Swarm Operations
8.10 Space and Cross-Domain Unmanned Operations
8.10.1 Space-Based Controllable Unmanned Operations
8.10.2 Land–Sea–Air–Space Integrated Defense
8.10.3 Suborbital High-Speed Space-To-Ground/Sea Strike
8.10.4 Near-Space Information Support and Strike
8.11 Autonomous Swarm Operations
8.11.1 Swarm Effects and Advantages
8.11.2 R&D Goals of Swarm Systems
8.11.3 Multi-Vehicle and Multi-Task Cooperation
8.11.4 Communication Between Swarm Vehicles
8.11.5 Swarm Control Theory and Algorithm
8.11.6 Swarm Attack Vehicles and Ammunition
8.12 Human–Computer Intelligent Interaction
8.13 UAV Warfare in Turkish–Syrian and Nagorno-Karabakh Conflicts
8.14 Intelligence in Israeli–Palestinian Conflict
References
9 Cyberspace Operations
9.1 Cyberspace
9.1.1 The System Domain
9.1.1.1 Network Module and Structure
9.1.1.2 Protocols and Data Packets
9.1.2 The Content and Application Domain
9.1.2.1 Content Storage
9.1.2.2 Application Architecture
9.1.3 The Human and Social Domain
9.1.4 The Governance Domain
9.2 Cyber Information
9.3 Cyber Battlefield
9.4 Cyber Attack
9.4.1 Spyware
9.4.2 Bot Software
9.4.3 Phishing
9.4.4 “Puddle” Attack
9.4.5 USB Flash Drive Infection
9.4.6 Packet Flooding as a Denial-Of-Service (DoS) Attack
9.4.7 Critical Infrastructure Vulnerabilities
9.5 Cyber Defense
9.5.1 Web-Based Defense
9.5.1.1 Firewall
9.5.1.2 Web-Based Intrusion Detection System
9.5.1.3 Web-Based Intrusion Prevention System
9.5.1.4 Network Encryption
9.5.2 Host-Based Defense
9.5.2.1 Anti-Malware Tools
9.5.2.2 Host-Based Intrusion Prevention System
9.5.2.3 Host-Based Encrypted Files
9.5.3 Security Tactics
9.5.3.1 Response Plans
9.5.3.2 Terminal System Security Mechanisms
9.5.3.3 User-Centered Security Tactics
9.5.3.4 Network Security
9.5.3.5 Security Assessment and Patch Management
9.5.4 Next-Generation Defensive Measures
9.6 Electromagnetic Attack and Defense
9.7 Public Opinion Control
9.8 The Future of Internet and IoT
9.8.1 Virtualization
9.8.2 High-Performance Computing
9.8.3 IPv6
9.8.4 Blockchain
9.8.5 Embedded Sensing and IoT
9.8.6 Multi-Source Information Fusion
9.9 New Models and Trends
References
10 Hypersonic Confrontation
10.1 Hypersonic Operations
10.2 Hypersonic Weapons and Munitions
10.3 Hypersonic Aircraft
10.3.1 X-51A Hypersonic Aircraft
10.3.1.1 Pneumatics
10.3.1.2 Heat Resistance
10.3.1.3 Supercombustion Stamping
10.3.1.4 Ignition Technology
10.3.1.5 Fuel Technology
10.3.2 SR-72 Hypersonic Reconnaissance and Strike (R/S) UAVs
10.3.3 Bomber B-3
10.4 Directed Energy Weapons and Electromagnetic Cannons
10.4.1 High-Power Microwave Weapons
10.4.2 Solid-State Laser Tactical Weapons
10.4.3 Electromagnetic Cannons
10.5 Intelligent Hypersonic Attacks
10.6 Intelligent Hypersonic Defense
References
11 Joint All-Domain and Cross-Domain Operations
11.1 Battlefield Expansion and Force Synergy
11.2 Multi-Domain Warfare
11.2.1 Motives
11.2.2 Concept
11.2.3 Mechanisms
11.2.4 Characteristics
11.2.5 Measures
11.3 Joint All-Domain Operations
11.4 Cross-Geographic Domain Operations
11.4.1 X-37B Reusable Orbiter
11.4.2 Submersible Aircraft and Air–Water Strike Vehicles
11.4.3 Long-Range Gliding Air–Sea Cooperative Operational Aircraft
11.5 Cross-Functional Domain Operations
11.5.1 Virtual and Physical Fusion Operations
11.5.2 Cross-Domain Intelligence Support
11.5.3 Cross-Domain Command and Control With Interoperability
11.5.4 Cross-Domain Fire Support
11.5.5 Cross-Domain Defense
11.5.6 Cross-Domain Support
11.5.7 Land-Based Multi-Domain Joint Operations
11.6 Intelligent Focus
11.6.1 Joint Mission Planning
11.6.2 Cross-Domain Intelligence
11.6.3 Military Effectiveness Expansion
11.6.4 Intelligent Collaboration of Operation Forces
11.6.5 Unified Standard Specifications
References
12 Cognitive Confrontation
12.1 Perceptual Confrontation
12.2 Data Mining
12.3 Decision-Making Competition
12.4 Key Target Monitoring
12.5 Social Media Warfare
12.6 Psychological Warfare and Mind Confrontation
References
13 Global Military Operations
13.1 World Powers’ Strategic Demands
13.2 Global Information Network System
13.3 Space-Based Resources Application and Control
13.4 Strategic Delivery and Rapid Action
13.5 Consumption of Overseas Operations
13.6 New Developments in Overseas Forces
13.7 Intelligent Global Action
13.7.1 Operation Simulations
13.7.2 Multi-Source Intelligent Perception
13.7.3 Dynamic Mission Planning
13.7.4 Intelligent Remote Logistics
13.7.5 Operational Cooperation
References
14 Future Urban Operations
14.1 Introduction: Failure-Related Lessons
14.1.1 Black Hawk Down
14.1.2 Grozny Street Battles
14.2 Urban Constructions
14.2.1 Urban Layouts
14.2.2 Urban Terrain
14.2.3 Urban Functions
14.2.3.1 Industrial Districts
14.2.3.2 High-Rise Areas
14.2.3.3 Residential Areas
14.2.3.4 Commercial Districts
14.2.3.5 Military Zones
14.2.4 Urban Infrastructures
14.2.5 Urban Population
14.2.6 Urban Information
14.3 Urban Operations
14.4 Multi-Domain Reconnaissance and Perception
14.5 Multi-Dimensional Block Control and Precision Operations
14.6 Virtual and Cross-Domain Operations
14.7 Theoretical and Technical Support
References
15 Gray Zone Operations
15.1 Network Infrastructure Protection
15.2 Power Protection
15.3 Petroleum and Natural Gas Security
15.4 Food Chain Management
15.5 Competition for Traffic Lines
15.6 Financial System Risks
15.7 Military Industrial Security
References
16 Intelligent Construction and Evaluation
16.1 Cyber Contribution
16.1.1 Network Power
16.1.2 Data Power
16.1.3 Computing Power
16.2 Parallel Intelligence
16.3 Autonomy
16.4 Swarming
16.5 Quick Chain
16.6 Emergence Effects
16.7 Controllability
16.7.1 Precision Strike and Controllable Damage
16.7.2 Key Target Tracking and Influencing
16.7.3 Precise Control of Infrastructures
16.7.4 Risk Management for Unmanned Systems
16.8 Economy
16.9 Side Effects
16.9.1 Data Redundancy
16.9.2 Energy Consumption
16.9.3 Privacy Leakage
16.9.4 Security Risks
16.9.5 Social Ethics
References
Concluding Remarks: Is There a Bright Future?
Postscript
Index