In order to find the enemy today, armed forces point information collection assets, which may identify anything from a visual signature to a unique radio frequency, in the direction they think the enemy is until they find the enemy’s location. This model is outdated because cyberspace’s growth into a global control network that connects devices has created a new, data-swept battlefield, covered by billions of networked devices that are constantly sharing information and can be exploited to find the enemy more efficiently.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Army University Press |
Published: | November 1, 2020 |
License: | Public Domain |