Reviews
Description
Information is one of the most, if not the most, essential elements of combat capability. Because telecommunications affects every aspect of a society, and is probably the most important medium which military information is exchanged, this thesis provides an understanding of the telecommunications system and how best to exploit it across the spectrum of conflict. I examine the system's vulnerabilities to both lethal and nonlethal attack mechanisms. While the ability to employ nonlethal technologies are currently limited, I recommend pursuing a strong research and development program to acquire this capability. The reason is that they provide additional policy options to deal with conflict, they are cheap, and because research may not only discover unanticipated capabilities for the US, but also identify countermeasures to protect our own systems. This thesis concludes by offering guidelines to help determine whether to exploit telecommunications with either lethal or nonlethal attack strategies.
EXTRA 10 % discount with code: EXTRA
The promotion ends in 17d.22:31:31
The discount code is valid when purchasing from 10 €. Discounts do not stack.
Information is one of the most, if not the most, essential elements of combat capability. Because telecommunications affects every aspect of a society, and is probably the most important medium which military information is exchanged, this thesis provides an understanding of the telecommunications system and how best to exploit it across the spectrum of conflict. I examine the system's vulnerabilities to both lethal and nonlethal attack mechanisms. While the ability to employ nonlethal technologies are currently limited, I recommend pursuing a strong research and development program to acquire this capability. The reason is that they provide additional policy options to deal with conflict, they are cheap, and because research may not only discover unanticipated capabilities for the US, but also identify countermeasures to protect our own systems. This thesis concludes by offering guidelines to help determine whether to exploit telecommunications with either lethal or nonlethal attack strategies.
Reviews