Page 21 - Cyber Warnings
P. 21
The importance of communication systems within a battlefield
Many current concerning areas worldwide would deal with the terrorism, crime and military
conflicts. The vitally important stuff to all of these is an accurate and the right time information. It
appears that the imperative to the modern warfare as well as army operations would be to rely
on trusted communication systems and equipments. How fast the accurate information would
come from one place to another may be significantly important in terms of winning the battle or
even the entire war. From this perspective, we would discuss how the cyber technologies can
find their place within the battlefield of today and why it’s important to the war’s victors to get the
command board of strategic networks in their hands.
The purpose of this contribution is to provide a brief insight into how different police or military
operations may be correlated with the use of emerging technologies. More or less, all the places
with the globe got the similar structure, but somehow distinguishing cultural style. This would
mean that every appropriate accommodation worldwide got some facilities with many utility,
web, phone and the other connections. The authorities with any country got the permission to
control these sorts of private resources.
In sense of an organized crime, we could suggest that the Police Departments and intelligence
community could work together to take the advantages of their command boards and use them
to lead the investigations within some territory. This is not directly linked to the warfare
situations, but from the perspective of the criminology – the defense system is always in a war
with the criminal organizations. Also, some parts of the world such as South America are heavily
approachable by the authorities and, by many sources; they are the real mafia war’s battlefields.
In case of the terrorism or some army conflicts – we would suggest to the Military Forces to
carefully use their communication systems as a vital part of their war’s machinery and also
exploit the benefits of the global web’s command boards trying to create the strategies which
would assure the enemy’s troops communication systems collapse. This recommendation could
be especially useful to combat the terrorism and we would advise the expert’s community to
make as many good suggestions as possible giving the ideas to the army strategists how to
deal at the battlefield.
About The Author
Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and the International Journal of Cyber
Security and Digital Forensics. She writes for American and Asia-Pacific
security magazines. She is a volunteer with the American corner of
Subotica as well as a lecturer with the local engineering society.
21 Cyber Warnings E-Magazine – February 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide