首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hur
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hur
admin
2010-06-17
44
问题
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hurting human life. The technology is reaching the point, however, where cyber warfare may be decisive in its own right. (46)
In highly centralized military operations, communications and data management have become essential tools linking individual small units and the central command structure.
The neutron bomb is one of the most horrid weapons ever devised: It doesn’t damage property; it only kills higher life-forms. (47)
Wouldn’t the opposite be wonderful, a device like the robot’s ray in The Day the Earth Stood Stills which melts down weapons but not soldiers?
Electronic or "cyber" warfare—hacking into an enemy’s computers, jamming radio transmissions, and the like.
The United States has very good electronic warfare capabilities, but has used them only to support conventional military operations. (48)
Before we imagine what such a "cyberwar" scenario might be like, let’s briefly look at how electronic warfare developed.
During the Civil War, operations conducted by the Union army against the Confederate telegraph system foretold modern twentieth-century electronic warfare. Union operatives penetrated Confederate lines to tap into and read military traffic on the Confederate telegraph system. (49)
Not only did these operations yield valuable intelligence information, but some operators even began sending bogus messages to sow confusion in the Confederate ranks.
Just before World War I, radio communication seemed like a real boon to naval operations because it allowed ship-to-ship and ship-to-shore communications, especially in bad weather. Before this time, flags or light blinkers with limited range provided the only means of communication between ships.
Naval ship captains, however, were aware that a sophisticated set of shore-based equipment could locate ships by their radio transmission. By listening to the transmissions, the enemy could ascertain the number and type of ships even if they could not decode actual messages. For this reason, the U.S. Navy was particularly resistant to using radio. However, U.S. military observers aboard British warships soon saw that the tactical advantages of radio outweighed the intelligence losses.
Electronic warfare grew rapidly in World War II with the advent of radar. (50)
Monitoring radar frequencies allowed spoofing or jamming of enemy radar and led to major units and equipment devoted solely to countermeasures and counter-countermeasures.
Gathering intelligence from radio transmissions also increased greatly.
Today, every modem nation has the capability to monitor, jam, or otherwise interfere with an adversary’s radio communications. Most nations have also developed jam-resistant communications and intelligence-gathering equipment.
选项
答案
通过这些行动不仅获得了宝贵的情报资料,一些谍报员甚至还开始发送假消息,以在南部邦联的各级军队中制造混乱。
解析
转载请注明原文地址:https://kaotiyun.com/show/my44777K
0
考研英语一
相关试题推荐
Asageneralrule,AmericanmenearnmorethanAmericanwomen.Thisholdstrueacrossindustries,acrosseducationlevels,anda
Asageneralrule,AmericanmenearnmorethanAmericanwomen.Thisholdstrueacrossindustries,acrosseducationlevels,anda
Asawisemanoncesaid,weareallultimatelyalone.ButanincreasingnumberofEuropeansarechoosingtobesoataneverear
Likeatiredmarriage,therelationshipbetweenlibrariesandpublishershaslongbeenreassuringlydull.E-books,however,are
Supposeyouhavemadearoomreservationduringtheholiday.Nowwritealetterofinquiryasregardssomerulesconcerned.You
WhentheislandofSingaporebecameanindependentcountryin1965,ithadfewfriendsandevenfewernaturalresources.Howdid
Poets,songwritersandpoliticianshatetheidea,butfordecadesopinion-pollevidencehasbeenclear;moneybuyshappinessand
WhenIdecidedtoquitmyfull-timeemploymentitneveroccurredtomethatImightbecomeapartofanewinternationaltrend.
Theideaseemssortoffoolish,justanotherexercisetrick.Standforafewminutesonaplatformthatvibrates.Getoffandtr
随机试题
Hawaii,theyoungeststateoftheUnitedStates,isdifferentinmanywaysfromthemainlandstates.TheHawaiianpeopleaream
患者,女性,28岁,4年来全身各大小关节疼痛,伴有晨僵,活动后减轻,拟诊为类风湿性关节炎。以下何药不作为该患者首选
下列组织对X线感受性最低的是
患者男,23岁,工人。操作机器时被飞出的异物碰伤左面部2小时,伤后无昏迷,神志清,查体合作,步入诊室。查体见,左外眦下方至左下颌角皮肤呈直线型裂开,深达肌层,创面可见渗血、无搏动性出血。张口无明显受限、下颌运动尚可。如检查发现面神经缺损,则可考虑
下列因素中,属于SWOT分析中的优势和劣势分析因素的是()
防烟楼梯间及其前室的门应为()。
科学发展观的提出,标志着我们党()。
委员会成员:作为一名长期的大学信托委员会的成员,我认为在过去的时间里该委员会运作得很好,因为它的每一个成员都有丰富的经历和兴趣。因此,如果将来有些成员被选举主要为了坚持要求某一政策,如减少学费,那么这个委员会就不再会起那么好的作用。上述观点依赖下面哪个假设
GregFocker,playedbyBenStiller,representsagenerationofAmericankids(1)_____inthe1980sonthephilosophythatanyac
UML提供了四种结构图用于对系统的静态方面进行可视化、详述、构造和文档化。其中,(1)_____是面向对象系统规模中最常用的图,用于说明系统的静态设计视图:当需要说明系统的静态实现视图时,应该选择(2)_____;当需要说明体系结构的静态实
最新回复
(
0
)