Current location - Quotes Website - Personality signature - What is electronic deception? How to cheat an IP?
What is electronic deception? How to cheat an IP?
"Electronic deception" refers to the use of electronic equipment and equipment to send electromagnetic signals, simulate the actions and deployment of our own troops, deceive the enemy's electronic equipment, and make the enemy misjudge their own deployment, combat capability and combat attempt, thus confusing and disturbing the enemy's military attempt.

With the development of computer network, digital communication, electromagnetic spectrum, optical instruments, multimedia and other high-tech, electronic deception is leading the way with its unique characteristics and strategic significance, and is favored by military strategists. There are many measures for "electronic deception", both technical and tactical; There are both confusion and inducement. Its main technical means include: electronic jamming chaff, corner reflector, ionized air suspension, anti-radar jamming smoke screen, anti-radar metal net, radio wave attenuation jammer, structural radar radio wave absorbing material, anti-radar camouflage net, infrared decoy bomb, computer network deception technology and so on. The main tactical methods are as follows:

Simulated deception. Under modern battlefield conditions, electromagnetic signals become the "shadow" of military activities. Once one side captures the electromagnetic signal of the other side, it can judge its battle formation, deployment area, moving direction and speed. Simulated cheating is just the opposite. At present, most electronic simulation deception targets are mainly enemy warning radar, fire control radar and missile guidance radar.

Pretend to cheat. Use your own radio station to impersonate the enemy's radio station, fish in troubled waters, make it difficult for the enemy to distinguish between true and false, and be deceived. In the Vietnam War, the Vietnamese army used the "electronic ambush method" to impersonate the US military to guide the B-52 bomber, which made it repeatedly recruited. During the Iraq war, the U.S. military used unmanned electronic aircraft to compile fake orders through various frequency bands, formats and electronic identification features, pretending to be Iraqi leaders to release information or spread "battlefield fog", showing the battlefield power of modern military technology deception.

Induce deception. Is according to their own needs cleverly set bait to lure and mobilize the enemy, let him fall for it. A successful example is the electronic feint deception carried out by the allied forces when they landed in Normandy in World War II. In order to confuse the enemy and conceal the landing site, the Allied Forces set up the "American First Group Command" in Dover, southeast England, more than a month before landing, constantly emitting radio waves of various frequencies, creating the illusion that the Allied Forces would land from Calais, while the Germans relaxed the defense of the Normandy defense line, resulting in a complete rout.

Internet cheating. Nowadays, the network has become a new battlefield of information warfare, and all kinds of wars that interfere with and block information systems with information as the carrier, "hacking" technology and "network deception" technology will be launched in the "cyberspace" without smoke. Therefore, high-quality network deception technology and means have become an effective "weapon" in network operations. The main methods of network deception: first, network bait deception. That is, put a small amount of attractive target bait in the place where intruders can easily find it, and induce them to concentrate their technology and energy on the bait, thus protecting truly valuable information and system resources; The second is cyberspace deception. That is, by using multiple IP addresses and network interface attributes of a computer system, the workload of intruders is increased and a lot of resources are consumed by increasing the search IP address space, so as to achieve the purpose of network security protection and greatly reduce the probability of real network servers being detected; The third is network virus deception. Using the virus warning information release mechanism, false network virus warning information is released on the Internet to confuse intruders or collect network intrusion information, so as to grasp the network intrusion situation in time. /question/859623.html? fr=qrl3