These manifestations included reports of computer hacking to gather intelligence, malware attack programmes to subvert and exercise remote control over hostile computer networks, the use of booby-trapped messages on email, and the use of social media to spread fear in specifically-targeted sectors of the population. But in mid-2014 there were reports that some aspects of the armed conflict had risen to unexpected heights of contemporary sophistication, with the apparent use of cyberspace as a domain for hostilities. ![]() ![]() The multi-faction insurgency that has been tearing Iraq apart ever since the fall of Saddam Hussein’s regime in 2003 has often involved the use of such crude and indiscriminate methods and means of warfare as the suicide bomb and the improvised explosive device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |