June 27 2012
The use of malicious software doesn't pack the same kind of punch as an artillery piece, guided-missile destroyer or long-distance bomber. Yet, in modern encounters, computer hackers can exploit vulnerabilities of enemies, rip off invaluable information and sabotage key strengths.
Some commanders have even likened the potential results of cyber attacks to those caused by nuclear weapons. In the case of Iran, its alleged nuclear program has become the target of man-made computer...
Sources:
undefinedPlease log in to continue reading.
Not yet a subscriber? Take a free trial.
Military Periscope gives you easy-to-use, integrated, open-source intelligence on…
Try Military Periscope free for seven days
Military Periscope FEDLINK information
Service ID: UC Contract Number: LCFDL19D0065
Military Periscope is a product of GovExec.
600 New Hampshire Ave., Suite 510,
Washington DC, 20037, USA.
(+1) 202-450-3967
©Military Periscope 2022
All rights reserved. Redistribution of the content is prohibited without prior consent of Military Periscope.