typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 2302: Achieve one-way transparency of battlefield information

Looking at everyone's interested expressions, Wu Hao smiled and continued to introduce: "These platforms include the drones and unmanned vehicles that are shown to you now, as well as fixed monitoring stations, water monitoring stations and other comprehensive monitoring equipment. This

Not only does it have a graphic monitoring system, it can also collect sound, temperature, air, weather changes, humidity changes, and other data information in the area where these platform devices are located.

In addition, we have also set up underwater monitoring stations. Using sonar systems, we can detect underwater dynamic information in the area covered by this comprehensive battlefield information intelligent monitoring system, including some submarines, frogmen, etc.

Tracks can be detected through underwater monitoring stations.

In addition, we also have some that go deep into the soil to detect moisture in the soil and other data information, etc.

At present, we only have UAV platforms and ground mobile platforms on display. Some other platforms and detection equipment are not displayed due to venue and time reasons. If you are interested, you can go back to make a special introduction or related introductions.

material."

After speaking, Wu Hao looked at everyone and said: "I don't need to introduce the functions of this comprehensive battlefield information intelligent monitoring system. I believe everyone can understand its function. Its advantage is not only that it can cover the entire battlefield, but also more

The key is that it can connect various devices on the battlefield in series to form a comprehensive intelligent battlefield information monitoring system.

For example, the data terminals of armored vehicles, tanks, aircraft, helicopters and other weapons and equipment of various troops on the battlefield, as well as the data terminals of our individual soldiers, and even the data information of our radar and other early warning troops, meteorological support troops, and reconnaissance troops.

All can be summarized together and then displayed comprehensively and dynamically.

In this way, whether it is our rear command center, forward command post, or troop command post, they will be able to understand the rich data information on the battlefield according to their different authority. With these trustworthy battlefield data information, we can know ourselves and the enemy and win every battle.

.

Similarly, these grassroots units, even every armored vehicle, tank, vehicle, aircraft, and even soldiers equipped with battlefield data information personal terminal systems can access these related data information according to their respective permissions, so as to respond to battles more calmly.

Know yourself and your enemy and be victorious in every battle."

Speaking of this, Wu Hao paused for a moment, and then continued to the crowd: "With this comprehensive battlefield information intelligent monitoring system covering the entire war zone, we can achieve precise monitoring of the entire huge war zone.

Every plant and tree inside, and every move of the enemy will be exposed to our field of vision, achieving one-way transparency of information on the battlefield.

In this way, we can keep abreast of all the enemy's activities and deploy and respond in a targeted manner. For example, a series of small-group special operations strategies such as special operations that were mythical in movies and TV series in the past, infiltration operations behind enemy lines, and decapitation operations.

Tactics will have nowhere to hide under this comprehensive battlefield information intelligent monitoring system, and will have no place to use.

No matter what method the enemy uses, whether it is airdropping, parachuting, landing, or other methods, as long as they enter our monitoring range, we will be able to understand their movements and eliminate them in time."

After hearing Wu Hao's introduction, the leaders present all nodded and couldn't help but admire this comprehensive battlefield information intelligent monitoring system. But at this time, a leader of a system scientific research unit said:

: "This comprehensive battlefield information intelligent monitoring system is very powerful, but it is not safe. As you said, these devices scattered all over the battlefield are interconnected. So if the enemy finds a monitoring device,

Or what, wouldn’t it be possible to crack your entire system and gain reverse control of all information on our military activities within the coverage of this system? Isn’t this helping others?”

Hearing the words of the leader of the scientific research unit, everyone present nodded in agreement. Yes, this is a double-edged sword. What if the enemy captures the equipment and captures the entire network.

Although these problems were within Wu Hao's expectation, he was really unhappy when he was pointedly raised by this leader. Of course, he was unhappy, but his sensitivity and professionalism in discovering problems were worth Wu Hao's experience.

Hao praised it, and to a certain extent, this can be regarded as helping them promote it, continuing to increase the leaders’ interest and impression of this weapon and equipment, and answering their doubts.

So thinking of this, Wu Hao couldn't help but glance at this leader. Wu Hao also knew him. He was a leader of a scientific research institute in the military industry system and the person in charge of several projects. He was from a scientific research background, so he was also a leader.

A highly qualified expert. This person's name is Ma Hongsheng. He is over fifty this year and is considered to be in the prime of life.

Facing the inquiring looks of everyone present, Wu Hao smiled and nodded: "The issues you mentioned are indeed concerns of many people. But please rest assured, we are developing this comprehensive intelligent battlefield information monitoring system.

From the beginning of the system, these problems have been thought of and solved in a targeted manner.

First of all, I want to tell you that the system used in this comprehensive battlefield information intelligent monitoring system is a new generation closed system developed by us. This system is very safe and difficult to be broken. Even if supercomputing is used, in a short time

It is also difficult to make progress in a short period of time.

Its predecessor products have also been used in some of our equipment. They have been put into service and have performed well during daily patrols and some exercises. There have been no problems with safety, so its safety has been fully verified.

You don’t have to worry at all.

Secondly, there is the single transmission system we specially opened. These fixed monitoring platforms can only transmit relevant specific data information, and cannot transmit other information other than these specific data information, nor can they receive relevant information.

Therefore, it is basically impossible for the enemy to invade through these fixed monitoring stations. The second is the mobile monitoring platform. Although they have two-way communication, they can only transmit specific content, and other content cannot be transmitted.

And these devices and platforms all have a feature, that is, all the hardware is encrypted. As long as one is touched, the entire system will automatically lock up. Unless it is professionally repaired, it will be a brick and of no use.

Finally, there is the intelligent system's security monitoring and filtering of all data information. The system will monitor all data information in the entire comprehensive battlefield information intelligent monitoring system and filter out suspicious and dangerous data information in real time.

These suspicious and dangerous data information will be verified and confirmed by specialized security systems and personnel before restrictions can be lifted. Otherwise, they will be filtered and isolated to prevent them from intruding into some key equipment systems."


This chapter has been completed!
Previous Bookshelf directory Bookmark Next