Chapter 594: Grizzly Tank
-
The Red Alert Begins in the Wasteland
- Gorgeous hypocrisy
- 1172 characters
- 2021-03-03 09:37:46
Cyber warfare, also known as information warfare, is a series of network offensive and defensive actions taken to disrupt the enemy's network information system and ensure the normal operation of one's own network information system. It is also said to be becoming an increasingly important combat style of high-tech warfare, destroying the enemy’s command and control intelligence information and air defense and other military network systems, and even quietly destroying and paralyzing the enemy’s commercial and government affairs and other civil network systems. A soldier who fails without a fight.
However, real cyber warfare, unlike real warfare, which is known to the world, causes concealment and actual lethality, and often becomes the first choice of various countries.
Almost every hotspot area in the world has cyber warfare. This kind of war does not require soldiers to sacrifice their lives, nor does it require any war expenses, but it can often achieve the same effects as wars.
At the beginning, Iran’s nuclear facilities suffered from NATO’s cyber war, and multiple viruses were implanted in the central data computer of Iran’s Nuclear Energy Research Institute, which brought Iran’s nuclear research into a halt for a period of time.
And South Korea has never stopped its cyber war against North Korea, and its purpose is to influence North Korea's nuclear weapons and satellite tests.
There are two types of cyber warfare: peacetime and wartime. .??`Usually cyber warfare is when the two sides do not have firepower to destroy or destroy the war, one party to the other financial network information system transportation network information system power network information system and other civilian network information facilities and strategic military network information System, attacks carried out by means of computer viruses, logic bombs, hackers, etc. In wartime, cyber warfare refers to an attack by one party on the other's strategic military and civilian network information systems in a state of war.
As early as the Gulf War, the US military launched a cyber war against Iraq. Before the war, the CIA sent special agents to Iraq to replace the printer chip used in the air defense system purchased from France with a chip containing a computer virus.
Before the airstrike, the virus was activated by remote control, causing the program of the main computer system of the Iraqi Air Defense Command Center to be disordered and the air defense system to fail.
In the Kosovo war. The scale and effectiveness of cyber warfare have increased unabated. Yugoslavia uses a variety of computer viruses to organize hackers to carry out cyber attacks, causing some NATO military websites to be blocked by spam, and some NATO computer network systems were once paralyzed.
On the one hand, NATO strengthens network protection measures. On the other hand, the implementation of a network counterattack has injected a large amount of viruses and deceptive information into the Yugoslav Army’s computer network system, causing the Yugoslav Army’s air defense system to be paralyzed.
Before this, Cai Ruichen had never established a relevant force, just because there was no such professional talent.
The United States has raised hundreds of thousands of cyber troops. ?.`The network of elites from all over the United States and the world is extremely powerful.
In network information warfare, the United States has always been in the strongest position, and in terms of information warfare, the United States is still the world's strongest.
Therefore, it is more difficult to get ahead of the United States in this regard than the actual military.
After all, cyber warfare is the fastest updated mode of warfare. It is possible that the current cyber warfare methods will be out of date tomorrow.
Especially with the exhibition of artificial intelligence. Cyber warfare has more diversified effects, and protecting one's complete combat system has become the focus of every country's military construction.
To cite the simplest example, in the context of modern warfare, a powerful modern warfare depends on the establishment of connections through the Internet.
Once the network connection is breached, a lot of false news and intelligence are injected, and you do not see it.
Disrupt the command, intercept the command transmitted to the troops, or modify the content of the command. With the coordination of modern line-of-sight attacks, it is possible that the target of an attack command received by a missile unit is actually the highest command.
Because everything is based on network connections to command troops, the same is true for air strikes. The air defense system and the anti-missile system, and even the overall combat network of the fleet itself, are all inseparable from the support of the information system.
Once such a system is destroyed, it will be very fatal.
Previously, in the confrontation with Israel, the Israeli side also tried to break through the firewall of the Future Technology Group. But none of them worked.
Otherwise, the war had already been won by that time.
Therefore, Cai Ruichen will show excitement when he sees the emergence of hackers. After all, compared with other weapons and equipment, he is qualified to form a separate force. The importance of hackers is too great.
"Draw again..."
Cai Ruichen, who was in a good mood, chose the fourth in the third draw.
"Congratulations to the commander, I have drawn the Grizzly Tank, the main battle weapon of the 6th Army. This draw is over, and there is still one chance to draw."
On the icon, a tank that looked one size smaller than the Rhino Tank slowly emerged.
Grizzly tank, a tank that looks relatively petite, but the tank gun on the icon does not look small at all.
Open the production page of the Red Police Weapon and Armored Vehicle, the Grizzly Tank appears right behind the Rhino Tank.
Grizzly Tank:
The main battle weapon unit of the 6th Army, the production price-6oooo funds, and the construction time is 12 hours.
Explanation: The third-generation main battle tank of the 6th Army has high maneuverability and good firepower, but has poor protection capabilities and can be used for airdrop and amphibious operations. Without effective active anti-air weapons, it is suitable for field operations.
Performance: The whole vehicle adopts advanced sight and sight system and perfect digital control system, the combat weight is 35 tons~EbookFREE.me~ the maximum off-road time is 75 kilometers, three crew members...
Armament: 125mm smoothbore gun, equipped with various professional shells, a 12.7mm machine gun, controlled by the commander computer inside the tank, eight smoke shooters on the left and right sides, active response armor modules...
Performance upgrade description: Without combat laboratories and scientists, it is all for nothing.
Production unit: tank factory, can not directly use the base for production.
...
With the same production efficiency as the rhino tank, it can produce four vehicles a day, and the price is 40,000 yuan cheaper.
It’s just obvious that the Grizzly Tank is not a main battle tank for frontal battlefields, and is suitable for airdrops or amphibious operations.
The size of the car body is smaller than the rhinoceros, and the weight is about ten tons lighter. The speed is much faster. It can even be installed in the belly of the tactical transport aircraft for short-distance air transportation without any problems. The transport aircraft has less fuel. That's it.