Chapter 594: Grizzly Tank (Four More Requests for a Reward Monthly Pass)
PS: Thanks to the book friend "xjk110" for rewarding 10,000 starting coins, this chapter adds more for him.
――――
Network warfare, also known as information warfare, is a series of offensive and defensive cyber operations taken to interfere with and destroy the enemy's network information system and ensure the normal operation of one's own network information system. It is also said that it is becoming an increasingly important form of operation in high-tech warfare, destroying the enemy's command and control, intelligence information, air defense, and other military network systems, and even quietly sabotaging, paralyzing, and controlling the enemy's commercial and government affairs and other civilian network systems, and defeating the enemy without a fight.
However, real cyber warfare, unlike real warfare, is well known to the world, causing concealment and actual lethality, and often becoming the priority choice of all developed countries.
In almost every hotspot area in the world, there is a cyber war, which does not require soldiers to sacrifice their lives or the cost of any war, but can often achieve the same effect as war.
At the beginning, Iran's nuclear facilities were subjected to a cyber war on the part of NATO, and a number of viruses were implanted into the central data computer of Iran's nuclear energy research institute, thus bringing Iran's nuclear research to a halt for a period of time.
South Korea has never stopped its cyber warfare against North Korea, all aimed at influencing North Korea's nuclear weapons and satellite tests.
There are two types of cyber warfare: peacetime and wartime. In peacetime, cyber warfare is an attack carried out by one side on the other side's financial network information system, transportation network information system, electric power network information system, and other civilian network information facilities, as well as on the strategic military network information system, by means of computer viruses, logic bombs, hackers, and other means, provided that there is no war between the two sides that will cause firepower to kill or destroy the situation. And wartime cyber warfare is, in a state of war. Attacks by one side on the other's strategic-level military and civilian network information systems.
Back in the Gulf War. The U.S. military has carried out cyber warfare against Iraq. Before the start of the war. The CIA sent agents to Iraq to replace the printer chips used in the air defense systems it had purchased from France with chips containing computer viruses.
Prior to the air strikes, the virus was activated by remote control, causing the main computer system of the Iraqi air defense command center to malfunction and the air defense system to malfunction.
In the Kosovo war, the scale and effectiveness of cyber warfare continued unabated. The Federal Republic of Yugoslavia used a variety of computer viruses and organized hackers to carry out cyber attacks, blocking some websites of the NATO military with spam information. At one point, some of NATO's computer network systems were paralyzed.
On the one hand, NATO has strengthened its cyber protection measures, and on the other hand, it has carried out a cyber counterattack war, injecting a large amount of viruses and deceptive information into the computer network system of the Federal Republic of Yugoslavia, with the result that the air defense system of the Federal Republic of Yugoslavia has been paralyzed.
Before this, Cai Ruichen had never established a relevant army, just because there were no such professional talents.
The United States has raised more than 100,000 cyber troops, and the network of elites throughout the United States and the world is incomparably strong.
And in the network information war, the United States has always been in the strongest position, and at the same time in terms of information operations. The United States remains the most powerful country in the world.
Therefore, if you want to surpass the United States in this regard, you are actually ahead of the actual military situation. It's even more difficult.
After all, cyber warfare is the fastest and fastest mode of warfare, and it is possible that the current means of cyber warfare will be obsolete by tomorrow.
In particular, with the development of artificial intelligence, cyber warfare has become more diversified, and protecting one's own complete combat system has become the focus of every country's military construction.
To take the simplest example, in the environment of modern warfare, a powerful modern war relies on the network to establish connections.
Once the network connection is breached, it is injected with a flood of fake news and intelligence that you don't notice.
Disrupting command, intercepting orders conveyed to troops, or modifying the content of orders, under modern over-the-horizon attack coordination, it is possible for a missile unit to receive an attack order, and the target of the attack is actually the highest command.
Because everything is commanded according to the network connection, the same is true for air strikes, air defense systems, anti-missile systems, and even the overall combat network of the fleet itself are all inseparable from the support of information systems.
Once such a system is destroyed, it will be very fatal.
Previously, in the confrontation with Israel, the Israeli side also tried to break through the firewall of Future Technology Group, but all of them were ineffective.
Otherwise, the war would have been decided by then.
Therefore, when he saw the appearance of hackers, Cai Ruichen showed an excited appearance, after all, compared with other weapons and equipment, he is qualified to set up a separate army, and the importance of hackers is too great.
"Extract ...... again"
Cai Ruichen, who was in a good mood, chose the fourth one in the third draw.
"Congratulations commander, the Grizzly Tank, the army's main battle weapon, has been drawn, this draw is over, and there is still one chance left to draw."
On the icon, a tank that looks one size smaller than the Rhino Tank slowly emerges.
The Grizzly Tank is a petite tank, but the tank gun on the icon doesn't look small at all.
Opening the production page of the Red Alert Weapons Armored Vehicle, the Grizzly Tank is safely appearing behind the Rhino Tank.
Grizzly Tank:
The main battle weapons unit of the army, the production price - 60,000 funds, the construction time is twelve hours.
Description: The Army's third-generation main battle tank has ultra-high mobility and good firepower, but has poor protection and can be used for airdrop and amphibious operations. There is no effective active anti-aircraft weapon, which is suitable for field combat.
Performance: The whole car adopts advanced observation and sighting system and perfect digital control system, with a total combat weight of 35 tons, a maximum off-road speed of 75 kilometers per hour, and a crew of three people......
Armament: 125 mm smoothbore gun, equipped with a variety of specialized shells, one 12.7 mm machine gun, controlled by the commander's computer inside the tank, eight smoke launchers on the left and right sides, active reactive armor modules......
Performance upgrade description: Without combat labs and scientists, it's all nonsense.
Production unit: Chariot factory, cannot be directly produced from the base.
……
With the same production efficiency as the Rhino tank, it can produce four vehicles per day, and the price is 40,000 yuan cheaper.
However, it is clear that the Grizzly Tank is not a main battle tank for frontal combat, suitable for airdrop or amphibious operations.
The size of the body is smaller than that of the rhinoceros, the weight is also less than ten tons, the speed is much faster, and it can even be loaded into the belly of the mountain-moving tactical transport aircraft for short-distance air transportation, and there is no problem, and the transport aircraft can be loaded with less fuel. (To be continued.) )