The Red Alert Begins in the Wasteland

Chapter 594 Grizzly Tank

Cyber ​​warfare, also known as information warfare, is a series of network offensive and defensive actions taken to interfere with and destroy the enemy's network information system and ensure the normal operation of one's own network information system. It is also said to be an increasingly important combat style of high-tech warfare, destroying the enemy's command and control intelligence information and air defense and other military network systems, and even quietly destroying and paralyzing the enemy's commercial and government affairs and other civilian network systems. Subdue without fighting.

However, real cyber wars, unlike real wars, are well known to the world, causing concealment and actual lethality, and often become the preferred choice of various developed countries.

Almost every hotspot area in the world has cyber warfare. This kind of war does not require soldiers to sacrifice their lives, nor does it require any cost of war, but it can often achieve the same effect as war.

At the beginning, Iran's nuclear facilities were subjected to NATO's cyber war. Multiple viruses were implanted into the central data computer of Iran's nuclear energy research institute, which brought Iran's nuclear research to a halt for a period of time.

And South Korea has never stopped its cyber war against North Korea, and the purpose is to influence North Korea's nuclear weapons and satellite tests.

There are two types of cyber warfare: peacetime and wartime. .?? `Period network warfare is that, in the case of a war where both sides do not have firepower to kill or destroy, one party attacks the other party’s financial network information system, transportation network information system, power network information system and other civilian network information facilities and strategic military network information. System, attack by computer virus logic bomb hacking and other means. Wartime cyber warfare is, in a state of war, one party's attack on the other party's strategic military and civilian network information systems.

As early as in the Gulf War, the U.S. military carried out cyber warfare against Iraq. Before the war, the US Central Intelligence Agency sent agents to Iraq to replace the printer chips used in the air defense system it bought from France with chips containing computer viruses.

Before the air strike, the virus was activated by remote control, causing the program of the main computer system of the Iraqi air defense command center to be disordered and the air defense system to fail.

in the Kosovo war. The scale and effectiveness of cyberwarfare continues unabated. Yugoslavia used a variety of computer viruses to organize hackers to carry out network attacks, causing some websites of the NATO army to be blocked by spam, and some NATO computer network systems were once paralyzed.

On the one hand, NATO has strengthened its network protection measures. On the other hand, it launched a network counterattack, injecting a large number of viruses and deceptive information into the computer network system of the Yugoslav army, paralyzing the air defense system of the Yugoslav army.

Prior to this, Cai Ruichen had never established a relevant army, just because there were no such professional talents.

The United States has raised hundreds of thousands of cyber troops. ?. `Network elites from all over the United States and the world are extremely powerful.

In network information warfare, the United States has always been in the strongest position. At the same time, in terms of information warfare, the United States is still the most powerful in the world.

Therefore, it is actually more difficult to surpass the United States in this respect than the actual military lead.

After all, cyber warfare is the fastest-changing mode of warfare. It is possible that the current means of cyber warfare will be obsolete by tomorrow.

Especially with the development of artificial intelligence. Cyber ​​warfare has even more diverse effects. Protecting one's own complete combat system has become the focus of every country's military construction.

To give the simplest example, in the modern warfare environment, a powerful modern warfare relies on the network to establish connections.

Once the network connection is compromised, a lot of fake news and intelligence is injected, and you don't know it.

Disrupting command, intercepting orders communicated to troops, or modifying the content of orders. Under modern line-of-sight attack coordination, it is possible that a missile unit may receive an attack order, but the target of the attack is actually the highest command.

Because everything is based on network connectivity to command troops, so is air strikes. The air defense system, the anti-missile system, and even the overall combat network of the fleet itself cannot do without the support of the information system.

Once such a system is destroyed, it will be very fatal.

Previously, during the confrontation with Israel, the Israeli side also tried to break through the firewall of the Future Technology Group. But all to no avail.

Otherwise, the war has already been decided by then.

That's why Cai Ruichen showed excitement when he saw the appearance of hackers. After all, compared with other weapons and equipment, he was qualified to form a separate army, and the importance of hackers was too great.

"Extract again..."

Cai Ruichen, who was in a good mood, chose the fourth one in the third draw.

"Congratulations, Commander. The army's main weapon, the Grizzly Bear Tank, has been drawn. This draw is over, and there is still one more chance to draw."

On the icon, a tank that looks one size smaller than the Rhino tank slowly emerged.

Grizzly tank, a tank that looks petite, but the tank gun on the icon doesn't look small at all.

Open the production page of the Red Police Armored Vehicle, and the Grizzly Tank is steadily appearing behind the Rhino Tank.

Grizzly Tank:

The main battle weapon unit of the 6th Army, the production price is 6oooo funds, and the construction time is twelve hours.

Description: The third-generation main battle tank of the Army has high maneuverability and good firepower, but poor protection. It can be used for airdrops and amphibious operations. No effective active anti-air weapons, suitable for field operations.

Performance: The whole vehicle adopts an advanced sighting system and a perfect digital control system. The total combat weight is 35 tons, and the maximum cross-country time is 75 kilometers. There are three crew members...

Armament: 125mm smoothbore gun, equipped with various professional shells, a 12.7mm machine gun, controlled by the commander's computer inside the tank, eight smoke emitters on the left and right sides, active reactive armor module...

Performance upgrade description: Without combat laboratories and scientists, it is all nonsense.

Production unit: Chariot factory, which cannot be produced directly from the base.

...

With the same production efficiency as the rhino tank, four tanks can be produced per day, and the price is 40,000 yuan cheaper.

It's just obvious that the Grizzly Tank is not a main battle tank used on the frontal battlefield, and is suitable for airdrops or amphibious operations.

The size of the body is smaller than that of a rhinoceros, and the weight is about ten tons lighter, and the speed is much faster. It can even be loaded into the belly of a mountain-moving tactical transport plane for short-distance air transport. There is no problem, and there is less oil on the transport plane. That's it.

Chapter 623/1987
31.35%
The Red Alert Begins in the WastelandCh.623/1987 [31.35%]