首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hur
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hur
admin
2010-06-17
58
问题
Electronic or "cyber" warfare holds the promise of destroying an army’s-or even a whole nation’s ability to function without hurting human life. The technology is reaching the point, however, where cyber warfare may be decisive in its own right. (46)
In highly centralized military operations, communications and data management have become essential tools linking individual small units and the central command structure.
The neutron bomb is one of the most horrid weapons ever devised: It doesn’t damage property; it only kills higher life-forms. (47)
Wouldn’t the opposite be wonderful, a device like the robot’s ray in The Day the Earth Stood Stills which melts down weapons but not soldiers?
Electronic or "cyber" warfare—hacking into an enemy’s computers, jamming radio transmissions, and the like.
The United States has very good electronic warfare capabilities, but has used them only to support conventional military operations. (48)
Before we imagine what such a "cyberwar" scenario might be like, let’s briefly look at how electronic warfare developed.
During the Civil War, operations conducted by the Union army against the Confederate telegraph system foretold modern twentieth-century electronic warfare. Union operatives penetrated Confederate lines to tap into and read military traffic on the Confederate telegraph system. (49)
Not only did these operations yield valuable intelligence information, but some operators even began sending bogus messages to sow confusion in the Confederate ranks.
Just before World War I, radio communication seemed like a real boon to naval operations because it allowed ship-to-ship and ship-to-shore communications, especially in bad weather. Before this time, flags or light blinkers with limited range provided the only means of communication between ships.
Naval ship captains, however, were aware that a sophisticated set of shore-based equipment could locate ships by their radio transmission. By listening to the transmissions, the enemy could ascertain the number and type of ships even if they could not decode actual messages. For this reason, the U.S. Navy was particularly resistant to using radio. However, U.S. military observers aboard British warships soon saw that the tactical advantages of radio outweighed the intelligence losses.
Electronic warfare grew rapidly in World War II with the advent of radar. (50)
Monitoring radar frequencies allowed spoofing or jamming of enemy radar and led to major units and equipment devoted solely to countermeasures and counter-countermeasures.
Gathering intelligence from radio transmissions also increased greatly.
Today, every modem nation has the capability to monitor, jam, or otherwise interfere with an adversary’s radio communications. Most nations have also developed jam-resistant communications and intelligence-gathering equipment.
选项
答案
通过这些行动不仅获得了宝贵的情报资料,一些谍报员甚至还开始发送假消息,以在南部邦联的各级军队中制造混乱。
解析
转载请注明原文地址:https://www.kaotiyun.com/show/my44777K
0
考研英语一
相关试题推荐
Writeanessaybasedonthefollowingchart.Inyourwriting,youshould1)interpretthechart,and2)giveyourcomments.You
Likeatiredmarriage,therelationshipbetweenlibrariesandpublishershaslongbeenreassuringlydull.E-books,however,are
Let’ssayyou’reworkingtowardagoal.Maybeit’stocutoutjunkfood,budgetbetterorstoplookingatyourphonesomuch.Ch
Shortstoriesareduearevival.Inrecentyears,therehavebeencritically【C1】________collectionsbyAmericanwriterssuchas
Studythefollowinggraphcarefullyandwriteanessayinwhichyoushould1)interpretthegraphbriefly,2)analyzepossibler
You’veprobablyexperiencedityourself.Maybeit’sthewayyoufeelwhilescrollingthroughyourTwitterfeed—anxious,twitchy,
Althoughethicsclassesarecommonaroundtheworld,scientistsareunsureiftheirlessonscanactuallychangebehavior;eviden
Anyfair-mindedassessmentofthedangersofthedealbetweentheNHSandDeepMindmuststartbyacknowledgingthatbothsidesm
Sciencehaslonghadanuneasyrelationshipwithotheraspectsofculture.ThinkofGallileo’s17th-centurytrialforhisrebell
Theideaseemssortoffoolish,justanotherexercisetrick.Standforafewminutesonaplatformthatvibrates.Getoffandtr
随机试题
关于淋巴结转移瘤,下列描述不正确的是
A.双卵双胎B.单卵双胎,双羊膜囊,双绒毛膜C.单羊膜囊双胎妊娠D.联体儿E.单卵双胎,双羊膜囊,单绒毛膜分裂发生在晚期囊胚即受精后4~8天
咳嗽变异性哮喘(过敏性咳嗽)的诊断依据之一是( )
批准临时建设和临时用地的使用权限,一般不超过()。
某宗地面积为5000m2,现状容积率为0.8,土地市场价值为4000元/m2,拟进行改造。批准的规划容积率为5.0,楼面地价为1500元/m2,则理论上应补交地价()万元。
下列剧种与其代表作对应正确的是()。
如图,在三棱锥S—ABC中,E为棱SC的中点,若AC=,SA=SB=SC=AB=BC=1,则异面直线AC与BE所成的角为().[img][/img]
简述行贿罪的概念和构成特征。
RSA是一种基于(43)原理的公钥加密算法。网络上广泛使用的PGP协议采用RSA和IDEA两种加密算法组成链式加密体系,这种方案的优点是(44)。POP还可以对电子邮件进行认证,认证机制是用MD5算法产生(45)位的报文摘要,发送方用自己的RSA私钥对
打开考生文件夹下的演示文稿yswg34,按下列要求完成对此文稿的修饰并保存。1.将第二张幻灯片的对象部分动画效果设置为“溶解”:将第一张幻灯片版面改变为“垂直排列标题与文本”,然后将该张幻灯片移为演示文稿的第二张幻灯片。2.页面设置为横向“
最新回复
(
0
)