首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hur
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hur
admin
2010-06-17
62
问题
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hurting human life. The technology is reaching the point, however, where cyber warfare may be decisive in its own right. (46)
In highly centralized military operations, communications and data management have become essential tools linking individual small units and the central command structure.
The neutron bomb is one of the most horrid weapons ever devised: It doesn’t damage property; it only kills higher life-forms. (47)
Wouldn’t the opposite be wonderful, a device like the robot’s ray in The Day the Earth Stood Stills which melts down weapons but not soldiers?
Electronic or "cyber" warfare—hacking into an enemy’s computers, jamming radio transmissions, and the like.
The United States has very good electronic warfare capabilities, but has used them only to support conventional military operations. (48)
Before we imagine what such a "cyberwar" scenario might be like, let’s briefly look at how electronic warfare developed.
During the Civil War, operations conducted by the Union army against the Confederate telegraph system foretold modern twentieth-century electronic warfare. Union operatives penetrated Confederate lines to tap into and read military traffic on the Confederate telegraph system. (49)
Not only did these operations yield valuable intelligence information, but some operators even began sending bogus messages to sow confusion in the Confederate ranks.
Just before World War I, radio communication seemed like a real boon to naval operations because it allowed ship-to-ship and ship-to-shore communications, especially in bad weather. Before this time, flags or light blinkers with limited range provided the only means of communication between ships.
Naval ship captains, however, were aware that a sophisticated set of shore-based equipment could locate ships by their radio transmission. By listening to the transmissions, the enemy could ascertain the number and type of ships even if they could not decode actual messages. For this reason, the U.S. Navy was particularly resistant to using radio. However, U.S. military observers aboard British warships soon saw that the tactical advantages of radio outweighed the intelligence losses.
Electronic warfare grew rapidly in World War II with the advent of radar. (50)
Monitoring radar frequencies allowed spoofing or jamming of enemy radar and led to major units and equipment devoted solely to countermeasures and counter-countermeasures.
Gathering intelligence from radio transmissions also increased greatly.
Today, every modem nation has the capability to monitor, jam, or otherwise interfere with an adversary’s radio communications. Most nations have also developed jam-resistant communications and intelligence-gathering equipment.
选项
答案
在我们想象"网络战"可能会是怎样的场面之前,让我们先简要地看看电子战是怎么发展的。
解析
转载请注明原文地址:https://kaotiyun.com/show/hy44777K
0
考研英语一
相关试题推荐
Cognitivedeclinehasbeenpartoftheagingprocessforallofhumanhistory,butateamofresearchersfromAustraliasaysan
TherearemanyreasonsforthesorrystateofcommercialaviationinAmerica.ButIcometoyouasatechnologycolumnisttotel
Runningmaybethesinglemosteffectiveexercisetoincreaselifeexpectancy,accordingtoanewreviewandanalysisofpastre
IfIaskyouwhatconstitutes"bad"eating,thekindthatleadstoobesityandavarietyofconnecteddiseases,you’relikelyto
Thereweresomeconsistentpatternsamongtheheavierreaders:Fortheyoungerchildren—ages6to11—beingreadaloudtoregul
Thereweresomeconsistentpatternsamongtheheavierreaders:Fortheyoungerchildren—ages6to11—beingreadaloudtoregul
AnonymityisnotsomethingwhichwasinventedwiththeInternet.Anonymityandpseudonymityhasoccurredthroughouthistory.For
Shortstoriesareduearevival.Inrecentyears,therehavebeencritically【C1】________collectionsbyAmericanwriterssuchas
You’veprobablyexperiencedityourself.Maybeit’sthewayyoufeelwhilescrollingthroughyourTwitterfeed—anxious,twitchy,
Poets,songwritersandpoliticianshatetheidea,butfordecadesopinion-pollevidencehasbeenclear;moneybuyshappinessand
随机试题
SocialHistoryoftheEastEndofLondon1.1st—4thcenturiesProducewasusedto【T1】________thepeopleofLondon.2
又名病毒唑:干扰病毒穿入宿主细胞并抑制其脱壳而抗病毒的药物:
A.交替脉B.颈静脉怒张C.水冲脉D.脉短绌慢性右心衰竭可出现
子宫内膜癌最常见的转移途径是
A、杜仲B、桑白皮C、厚朴D、黄柏E、牡丹皮断面较平坦,粉性的药材为
某甲针织厂进行了一系列的不正当竞争行为,而这些不正当竞争行为给被侵害的某乙针织厂造成了损失,但是由于市场的变幻莫测,所遭受的损失难以计算,被侵害人某乙针织厂可以请求的赔偿额为()。
对一建筑高度为118m的综合楼的电气消防设计中的下列问题作出正确选择。符合避难层的设计要求的包括()。
关于砌体结构特点的说法,正确的是()。
下列词语加横线字的读音,完全相同的一组是()。
HTML的核心作用是描述如何显示文档,而XML的核心作用是______。A.数据格式表示B.数据的描述C.数据的传递D.数据的搜索
最新回复
(
0
)