eas deposits may be a zero.
U.S. military proudly pointed out that such methods of warfare against the backward countries of the technology, the more magical and invulnerable, only combatants and attack on party can really feel the power of technology warfare, operational features, first paralyze the enemy military center network systems and other infrastructure, and then by force the enemy into pieces island, the last in their government and the army caught in a helpless situation and doomed.
During the Gulf War, once the computer batch Netherlands thieves to Iraq said that they can interfere with the U.S. military deployment to the Middle East through information attacks, the asking price is $ 1,000,000. Saddam this proposal scoffed. In fact, the U.S. Army was through the Internet a lot of communication,hockey jersey, with unforeseeable consequences,blue air max 95, if the the computer thief recommendations adopted.
In 1985, the army began to information warfare; 1987, the Because when people have not yet fully aware of the information era, scholarly articles on information warfare also the lack of attention it deserves. In March 1990, our military scholars Our military experts believe: from mechanized warfare to information warfare, not mere combat mode change, but the change of the form of war. The rise of information warfare, to accelerate the arrival of the military revolution in information technology as the foundation and core. In the face of new military revolution, abandoned the old knowledge and learn new knowledge are equally
No comments:
Post a Comment