美军是世界上信息技术最发达的国家 ~ The U.S. military has the most IT development in the world
2013-3-01 13:59 来源：新浪
Rough Mandarin Chinese Translation:
Preparing for the soldiers is not a good soldier, the rise of the modern network warfare, and will not affect the adage utility. Although the U.S. military is very clearly the network paralysis be military operations have a significant impact, but exaggerated his ability to adapt to this crisis. If the U.S. military continues to ignore the build of the whole army's ability to respond to cyber attacks, and then suffered cyber attacks, the U.S. military will not be able to respond with a prompt and effective response coordinated. Newspaper freelance writer Kasyapa U.S. military faces four serious threat of network warfare
The U.S. Army is the army of the highest level of information technology in the world, but also the highest military dependence on the network. In early October 2012, U.S. Defense Secretary Panetta warned that the United States is vulnerable to cyber attacks, power grids, transportation systems, or financial systems have been cyber attack is only a matter of time. In the worst case, the adversary will launch a cyber attack against the United States a number of key infrastructure at the same time, and with physical attacks on the United States. Well, what kind of network attacks may encounter?Draw on a global network warfare wars, American analysts have given four hypothetical:
Scenario: important national sites were shut down. The Estonian network warfare broke out in 2007 is the most famous wars. Then Estonian capital, Tallinn, a former Soviet military commemorative image transferred to the Military Cemetery, shortly after the country's government, political parties, banks and media sites have been subjected to a large-scale cyber attacks. This network warfare, "denial of service attack," the most important mode of attack that hackers use a computer to send a large number of requests to the target site, the network was forced to close due to overload.
In this network warfare, the United States need to pay attention to the problem of three things: first, Estonia is a very advanced country; Second, the outbreak of the war of the network is unexpected; worse, it is difficult to find a network warfare culprit culprit. Estonia accused Russia is behind the attacks, saying an attack server from the Russian government. However, the Russian government has denied this.
Scenario 2: hacking into military networks, malicious program, and to play a role in combat or network warfare. Due to the very high level of U.S. military network hacking U.S. military network system, can significantly undermine its combat effectiveness. For example, professional hackers will be able to be re-directed to the Global Positioning System. According to reports, the "worm" virus written by the United States andIsrael had penetrated Iranian nuclear facilities, and the thousands of centrifuges in Iran to a standstill. This is the maximum use of the network to attack the real world wars.
Rough Mandarin Chinese Translation:
The Pentagon had warned that if the cyber-attacks constitute the impact of reality, such as damage to critical infrastructure or casualties, the United States is likely to respond to military action. However, Professor Susan Brenner of the University of Dayton, the United States pointed out that, although hackers can invade a military network system and steal important information, but the private sector (rather than government) is the most vulnerable to cyber-attacks target.
Scenario three: the hacker will destroy critical infrastructure, such as power grids, financial systems or transportation networks. U.S. policy makers are most concerned about a possible. Herb Lin, chief scientist of the U.S. National Academy of Sciences, pointed out that the attacks the grid cause blackouts, and took nine months to rebuild a grid. Obama also derailment, for example - many transport systems rely on computer network scheduling - to describe the transport system have been the consequences of cyber-attacks will.
Scenario 4: Hackers broke out economic warfare, theft of proprietary information or funds from the U.S. private sector. When the driving force behind the government of a country, cybercrime and espionage is likely to be transformed into war. The American suspect that Russia and other countries in gaining economic advantage through the activities of this network. Therefore, the United States must regularly upgrade the defense system to prevent the invasion of new viruses and worms.
Such attacks are not uncommon. Some people call it the "Network Cold War", the related countries competing to develop the most advanced offensive and defensive software. Connaught Shield in autumn 2011 Symantec security report cybercrime cause a loss of $ 388 billion a year, and basically the same drug smuggling. Important goal of this type of network attacks is the private sector, the operation of the network not controlled by policy makers. Network warfare exercise plan there are significant gaps in the
Although the United States is facing the threat of multiple networks, but the U.S. military combat readiness situation but really worrying. U.S. Air Force Network Warfare Command, Major General Richard Webber has pointed out, the U.S. Air Force is responsible for providing mission assurance, rather than "information protection", the meaning of the U.S. Air Force's main goal is not to protect the computer, but to ensure that the commanders in the network continue fighting in the war environment. Although the U.S. Army wording is different, but the Army Network Warfare Command was held the same view and the Air Force. To achieve this goal, the Pentagon has launched Web banner fortress defenders, network attacks, network efforts exercises. However, these mostly belong to the regiment level and above echelon exercises, and the U.S. military network warfare exercise plan is not stringent enough.
In many cases, the exercise commanders and planners will assume that the U.S. military can still use the network resources, or unrealistic able to quickly restore the operation of the network. Moreover, the U.S. military exercises time is often very short, limited exercise plan in loss of network resources, and be able to clearly distinguish the loss is caused by human or natural cause. This allows commanders and soldiers to be able to infer its environment have not yet encountered, and prepared to answer ready. The U.S. military in wishful thinking that it can retain the basic network resources, and the ability to quickly restore network capacity in high-altitude electromagnetic pulse explosion environment, but also be able to overcome any natural or man-made network damage. In fact, even in the face of actual network capacity without rehearsal, "Pearl Harbor," the situation of network degradation or the extent of the loss is less than the U.S. military echelon still not be able to respond effectively.
Rough Mandarin Chinese Translation:
U.S. troops prepare for failure in the field of network warfare, in stark contrast to its in preparing for the case of the eighties and nineties. U.S. can learn from the two emergency exercises plan formulated under the environment of network warfare exercise plan: First, persistent and non-persistent in the environment of chemical warfare exercises; Second, use the signal operation in platoon level battalion level operations Instructions renounce the use of radio. Natural, chemical warfare exercise plan is different from the the network warfare exercise plan. However, network warfare, and today the United States must face the same type.
U.S. military years ago was willing to invest a lot of human resources, including a senior commander, to counter the biological and chemical warfare, the use of time-consuming combat exercise to improve combat capability. When the U.S. military to develop exercise plans, and to develop standard operating procedures for machinery and armored forces, at least not ensure battalions suffered heavy casualties due to the small-scale chemical attack. However, in the field of network warfare, the U.S. military has yet to work out such a plan and operational procedures in response to the attack on the issue of the future network warfare, Pentagon officials seem to deal with than when Soviet chemical attack more confident. Enhance the combat ability of the non-network warfare environment
From the the temporary paralysis network to complex continuing threat, to the explosion of high-altitude electromagnetic pulse from submarine landslides, a variety of potential network problems pose a threat to the U.S. military relies heavily on a network system. However, the rehearsal network competition environment operations, U.S. military combat echelon capability gap. If the U.S. military can not be fully prepared to prevent hostile use of the gap can be expected to, its bound to suffer heavy losses in the future network warfare.
The above mentioned second emergency exercise plan requires the U.S. military to regain their skills has long been overlooked: the prolonged lack of large-scale networks and radio battlefield combat. In order to deal with this situation, the U.S. military echelon commanders can take the following measures: First: Reduce daily C2, medical, logistical, personal, financial and communication network bandwidth applications;, and higher-level commanders collaboration, requesting non-destructive defensive capabilities. Third, the rehearsal for network defense operations, deployment less susceptible to the threat of network assets; Finally, the analog network, paralyzed or restricted practice other mode of communication.
In short, the U.S. military should be most dangerous adversaries network operations on a regular basis for the exercise plan, find solutions to deal with this crisis. Moreover, it also can not delusions network suddenly interrupted, it will return to normal in the short term or nearly normal. In addition, the U.S. should take advantage of the practice to test its combat capability of the network is limited, and not simply trust the technology and information superiority.
Naturally, you want to do this, the U.S. military also faces challenges. For the U.S. military to carry out comprehensive network warfare exercises, we must first invested heavily, followed by the U.S. military also bear many superiors assigned training goals down - not the Commander reasonable arrangements can be achieved according to the timetable and budget target. However, in this case, the U.S. can choose to enhance the operational capability on tactical operations and network warfare similar combat exercise.