A tactic that involves using computer or network technology for destructive or disruptive purposes, such as disabling an enemy's communication systems.
A tactic that involves using computer or network technology for destructive or disruptive purposes, such as disabling an enemy's communication systems.