Sunday, January 15, 2012

U.S. Army attempt controls his country through secret hacker activity armament

Lin En of undersecretary of department of defense of electric United States was accepting people web recently on Feburary 4 " times " when weekly is interviewed, allege, a lot of countries are being passed " network battle " the form is contractible the difference of its and force of U.S. Army convention. Lin En thinks, financial system of the United States, communication and o most popular selling resealable bags ther electron infrastructure, become the target of sneak attack of enemy state hacker possibly. He discloses, all of computer science department of American churchyard is encountering " unprecedented " hacker activity harassing attack.



modern dining chairsActually, him American also is in the ability of battle of ceaseless aggrandizement network. Among them a bit the most important, it is the underground that the U.S. Army is trying to pass a hacker, let enemy state believe, they still are controlling their armament, and actually, these armament had lain in the U.S. Army's control. The United States establishs recently " network battle headquarters " farther specification, network battle has made the important arms of service with subordinate the Pentagon.



According to the program that joint resealable bags for food meeting of U.S. Army chief of staff establishs, want to have the capacity that destroys interconnected system of hostile computer science department thoroughly for the United States. Air force alleges, the hope can be had " concealed body " the ability that infiltrates conceal of system of computer of world each country is not discovered several years. The target of battle of beautiful square network is, sit in the Pentagon, tap keyboard, remote control is hostile computer system. American army and navy also developed the network battle software that suits characteristic of arm of services accordingly.



Inside net the most popular hans wilhelm work space, without national dividing line, defensive one party always must raise vigilance, maintain to all and potential enemy " sober brains " . And aggression one party (hacker) , want to seize an opportunity only, can hit with heavily to the other side. Because the hacker won't be direct,from oneself seat launchs offensive, want have the aid of however many servers will undertake " relay " , because this finds out the effort of hacker origin,end in order to fail almost.



The United States admits, once oneself computer system makes a surprise attack by hostile hacker, so right now reassume any striking back measure " when be late already " . At the moment, the United States must think method activation is concealed in the hacker code in hostile computer system, achieve the goal that strike back thereby. To network battle, "From adversa the best selling resealable bags ry of enemy interior disintegrate " , it is dearfoam slipper size the most efficient way forever. Before this, the United States ever was in Iraqi war small try kni dearfoam slipper sears fe of network battle ox, and gained good victory. hans wilhelm



1993, the information natural resources that university of American national defence took the lead in holding water to aim to develop information battle person with ability runs an institute, 16 first student are called soldier of network of generation computer, their task uses the computer to spread out overall message to defy in the space that surpass gain and enemy namely. This branch group aims to let a soldier sit before computer to tap keyboard easily, click a mouse, let malfunction of hostile radar system, communication power system is interrupted, cannot mobilize force, can passive take a beating.



plantronic wireless headset

Headquarters of battle of U.S. Army network puts in headquarters of U.S. Army strateg dearfoam slippers for women y 's charge administer, began in October 2009 local run, begin to be run in the round to October 2010. This headquarters is in the United States to dispersing at present the orgnaization of network war commander in each army services undertakes conformity. This action is indicating the army that resource of battle of the largest network has on the world begins a network resealable bags best buy battle to carry the order of the day formally, complied with the tide that informatization times war develops.



The basic approach of soldier of network of U.S. Army recruit basically has 3 kinds: It is to publish advertisement recruit " network true person " . Because of economic depression, numerous go only for a time the young Cai Jun of Silicon Valley to apply for a job, begin to join in " governmental network hacker " this one team. 2 it is annual talent of the choose in the hacker contest of the global hacker contest in the Las Vegas that bet a city and different level. 3 it is the hacker contest that holds to other country, american army also is taken an active part in.



Although the U.S. Army never has announced network unit number, but evaluate according to defense expert, at present the U.S. Army has expert of 3000-5000 name information battle in all, 50 thousand ~ battle of network of sortie of 7 resealable bags for clothes 0 thousand soldiers. If increase original electronic battle staff, number of network battle unit should be controlled in eighty-eight thousand seven hundred person. This means number of unit of battle of U.S. Army network to had been equivalent to the military strength of 7 U.S. Armies' pickeddest 101 airborne division.



Besides the United States, the country such as Japan, Korea, Russia, India and Israel, also established oneself network battle unit in succession. One does not see the network armament race of a symbol of war and smoke of gunpowder, spreading out stealthily between each country. (Gao Yi army)

No comments:

Post a Comment