•+Military+cyberwarfare,+smart+weapons+development,+espionage+(Yazan)

 Cyber-warfare may also be known as cybernetic war or cyberwar. Cyber-warfare is the use of computers and [|Internet] in conducting warfare in the cyber-space meaning the world wide web.  There are many types of cyber-war attacks such as the following:
 * Web vandalism-little of harm, changing websites, deleting information, etc.
 * Propaganda-Political messages being spread through the Internet.
 * Gathering data-espionage from the other side of the world, [|secure] data being abused.
 * Equipment disruption-for example re-programming [|military systems]. This kind of cyber-warfare is very dangerous. Attacking critical infrastructure-Power, water, [|fuel], communications, commercial and [|transportation] are all vulnerable to a cyber attack.

  [|Smart][|weapons]are military hardware that incorporate computer technologies in order to carry out their missions The classic target acquisition cycle is composed of the following five steps:
 * 1) Detection of target area
 * 2) Detection of the target itself
 * 3) Orientation of the target
 * 4) Target recognition
 * 5) Weapon release

  Espionage is the systematic use of spies to get military or political secrets without permission of the holder of the information. "Espionage involves accessing the place where the desired information is stored, or accessing the people who know the information and will divulge it through some kind of subterfuge." In the world of IT espionage could mean stealing information stored electronically via a [|virus]. This virus would break into the suspect system and delete or obtain the important information/data. Also special [|software] may be used to break into the system. This software is illegal and is used to find the [|backdoor] of a program in order to break in it and "steal" or violate important information.

Yazan Hamadeh