The Next World War: Computers are the Weapons and the Front Line is Everywhere
It is a silent, invisible, and deadly weapons system. It can paralyze an entire nation without a single soldier being sent to war. We glimpsed its potential on television when surgical strikes on radar sites, electrical power plants, and command networks crippled Iraqi forces during the Gulf War. Now, in "The Next World War," James Adams shows how a new chapter in military history is being written as the Information Age comes to the battlefield: to bigger and stronger, now add smarter. As increasingly sophisticated computers and microtechnology have become available, the concept of "conventional" warfare has changed. Technology has already made its way to the front lines: soldiers are now equipped, for example, with new "smart" technologies such as handheld computers that allow them to e-mail their commanders. There are devices that can sense an enemy's presence before the enemy is visible, by detecting body heat or by communication with satellites overhead. Robotic "bugs" can even be sent in swarms to sabotage weapons or subdue enemy soldiers. But the most significant and important use of information warfare won't be on the battlefie
74 pages matching Air Force in this book
Results 1-3 of 74
What people are saying - Write a review
We haven't found any reviews in the usual places.
AFIWC agents Aidid Air Force aircraft allied American armed Army Arsenal Ship attack battle battlefield Beijing bombs Bosnia Bravo Two Zero British called capability Center challenge China Chinese civilian Clinton command companies computer security create cyberspace Dark Tangent Datastream Defense Delta Force demonstrated developed economic electronic encryption enemy enemy's equipment espionage FAPSI fight fire future Gulf hacker hacking Haiti Ibid Information Age information revolution information warfare infosphere infrastructure intelligence agencies intelligence community Internet Interview Iran Iraqi Land Warrior Marines MEMS missile mission Mogadishu national security Navy networks nonlethal nuclear Office operations Pentagon political President radio Rome Labs Russian Saddam satellite Saudi Saudi Arabia secret senior soldiers Somalia Soviet strategic tactical target terrorist threat tion U.S. military UAVs United vulnerable Warrior Washington weapons