Military Periscope Logo

The Dangerous Cyber Arena

June 27 2012

The use of malicious software doesn't pack the same kind of punch as an artillery piece, guided-missile destroyer or long-distance bomber. Yet, in modern encounters, computer hackers can exploit vulnerabilities of enemies, rip off invaluable information and sabotage key strengths.

Some commanders have even likened the potential results of cyber attacks to those caused by nuclear weapons. In the case of Iran, its alleged nuclear program has become the target of man-made computer...



Please log in to continue reading.

Not yet a subscriber? Take a free trial.

Military Periscope gives you easy-to-use, integrated, open-source intelligence on…

  • More than 7,500 weapons systems and platforms
  • Nearly every country's armed forces
  • Militant organizations
laptop image

Try Military Periscope free for seven days

Military Periscope Logo

Your online source for military news, weapons, and nation's armed forces worldwide

Military Periscope FEDLINK information

Service ID: UC Contract Number: LCFDL19D0065

Military Periscope is a product of GovExec.

600 New Hampshire Ave., Suite 510,

Washington DC, 20037, USA.

(+1) 202-450-3967

©Military Periscope 2022

All rights reserved. Redistribution of the content is prohibited without prior consent of Military Periscope.