Hacking secret U.S. military attempts to control his country’s armed forces
United States recently established the “Network Warfare Command,” further, the network war has become a major Pentagon’s arms. February 4
People – U.S. Deputy Secretary of Defense Lynn recently received the “Time” magazine interview, claimed that many countries are “network war” in the form of narrow its gap with the U.S. conventional forces. Lynn believes that the U.S. financial system, communications and other electronic infrastructure, enemy hackers might be the object of attack. He said the United States within the computer system is suffering from “unprecedented” hacking harassment.
In fact, the Americans also continue to strengthen their ability to network warfare. One of the most important point is that the U.S. military is trying to clandestine activities by hackers, so that the enemy believe that they still control their own armed forces, in fact, these forces are already in U.S. hands. The newly formed United States, “Network Warfare Command,” further, the network war has become a major Pentagon’s arms.
developed under the Joint Chiefs of Staff plan to the United States to have completely destroyed the enemy’s computer systems. U.S. Air Force claimed that want to have “stealth” into computer systems around the world for several years not to be found in latent ability. U.S. cyberwarfare goal is to sit the Pentagon, keyboard, remote control enemy computer systems. U.S. Army and Navy also developed a corresponding characteristics of the network for arms warfare software.
space in the network, no national boundaries, one must always be vigilant defense of all potential enemies to maintain “a clear mind.” The attacking party (hacker), as long as seizing an opportunity can be a heavy blow to the other party. As hackers not directly from their location on the offensive, but to use multiple servers to a “relay”, so efforts to trace the source of almost all hackers failed.
United States recognizes that, once their computer systems were hacked enemy, then the time to take any counter-measures are “too late.” At the moment, the United States must find ways to activate the hidden enemy computer systems in the exploit code in order to achieve the purpose of counter-attack. Network warfare, the “collapse of the opponent from the enemy within”, is always the most effective way. Previously, the United States in fighting the war in Iraq chopper small test network, and achieved good success.
1993, the U.S. National Defense University established the first personnel to develop information warfare information resources management college, the first batch of 16 participants the first generation of computer networks known as soldiers, their mission is to use a computer in a game Bo started a comprehensive information space and fight the enemy. The unit aims to enable soldiers to easily beat sitting in front of the computer keyboard, mouse, let the enemy radar system failure, communications power system outage, unable to mobilize the troops, only defensive.
owned U.S. Network Warfare Command under the jurisdiction of the U.S. Strategic Command, October 2009, the local operation started in October 2010 fully operational. The headquarters of the military services in the United States is currently distributed in the network warfare command structure integration. This marks the world’s largest network warfare to network resources, troops began the war officially on the agenda, conform to the information age war trend.
U.S. soldier recruitment network basic approaches are mainly three kinds: First, recruitment advertising, “the network live.” Because of the economic downturn, many job was only to Silicon Valley’s young people to start joining “the government hackers,” the team. Second year in Las Vegas the world’s hackers hacking competition and different levels of competition in the selection of personnel. Third, other countries, held for hacking contest, the U.S. military is also actively involved.
Although the U.S. has never published the number of network units, but according to defense experts, existing information warfare, U.S. military experts were a total of 3000-5000, 50,000 ~ 70,000 soldiers involved in cyber warfare. If you include the original electronic warfare officers, the number of U.S. combat troops should be in net 8.87 million. This means that the number of U.S. troops battle network equivalent of seven U.S. troops have been the most elite troops of the 101st Airborne Division.
except the United States, Japan, Korea, Russia, India and Israel, have also formed their own network warfare units. An armored cavalry and smoke but not the network arms race between countries are quietly launched. (H Yi Jun)