Computer Sabotage Crime 计算机破坏类犯罪
This week the Pentagon said that computer sabotage coming from another country can constitute an act of war, to which it may respond using traditional military force.
这个星期五角大楼称来自其它国家的计算机破坏行为将构成战争行为,对此美国将会使用传统军事力量作为回应。
On the contrary, many of these crimes, such as embezzlement of funds, the alteration of records, theft, vandalism, sabotage, and terrorism, can be committed without a computer.
相反,许多此类犯罪,如挪用资金、篡改记录、盗窃、破坏公物、蓄意破坏和恐怖主义,都可以在没有计算机的情况下进行。
The Pentagon has developed a list of cyber-weapons and -tools, including viruses that can sabotage an adversary's critical networks, to streamline how the United States engages in computer warfare.
五角大楼开发了一系列的网络武器和工具,包括病毒可以用于破坏一个敌人的重要网络,强化美国从事电脑作战的能力。
应用推荐