A cybernetic saboteur or the protection of secrets |
The dual use of functions of the "sabotage" |
The example of a successful destruction of highly sensitive systems |
Author: Old Gocs Berlin February 2014
The article on the right-hand side is based on the evaluation of open sources (press publications) only over a longer time period
|