Rebirth without Regrets

Chapter 672 Invasion

Chapter 672 Invasion

In the suburbs of New York, several small gray buildings are hidden among lush trees in a compound. They look very ordinary. There is a red brick courtyard wall outside. The environment outside the courtyard wall is elegant, with grass and guardrails. If it weren't for the entrance

With two armed guards, no one would think there was anything special about this place.

Residents living nearby do not know that this place is the newly established independent Cyber ​​Command of the U.S. Department of Defense. This force is directly under the jurisdiction of the U.S. Department of Defense. It is a brand-new and independent force composed of 200 professional and technical personnel.

The personnel composition, each one is composed of experts in computer information and network. The person in charge is Major General Canney of the Ministry of National Defense. He combines network attack and network protection. He has the ability to attack the Internet and can also launch "cyber warfare" against other countries.

.

The establishment of the Independent Cyber ​​Command was due to the fact that the computer networks of important organizations such as the U.S. Department of Defense were continuously attacked by hackers. Although they did not cause major losses or impacts, it made the U.S. government and the Department of Defense pay more attention to network attacks and protection.

of construction.

Since the establishment of the Independent Cyber ​​Command, it has single-handedly built the U.S. government's military security defense network. It plays a vital role in resisting malicious virtual attacks and hacker intrusions by other governments, ensuring that the United States has a strong future.

The possible virtual war will not be completely defeated. A large number of hackers try to invade, but often fail. This also shows that the Independent Cyber ​​Command has played a great role in this aspect. At the same time, his aggressiveness cannot be doubted.

, in the "cyber war" against Iraq and Syria, these two countries became isolated islands of information that lost contact with the outside world.

This building looks very inconspicuous from the outside, and it is easy for outsiders to mistake it for a residential building. The building is mainly divided into two parts: above ground and underground. The first to sixth floors above ground are some research departments, and the underground is the computer main control room.

, its design fully considered various factors, and the safety facilities are extremely tight. It is said that it can not only withstand a ten-magnitude earthquake, but also ensure that it will not be affected in a nuclear war.

In the underground main control room, which is tens of meters deep, there is a huge guy, making a humming sound. There are some processes running on the display screen next to it. There are people on duty here 24 hours a day, any abnormal process system

will call the police. And it will automatically carry out defensive interception and counterattack tracking. Not only will the opponent be defeated, but it will also be able to track the opponent's location immediately and notify relevant personnel for arrest. There have been many "daring" ones.

The hacker went to jail for this.

The night is already deep.

On duty today is Captain Kester.

He can be regarded as an old man in this special force. Before the Ministry of National Defense established this force, he was a staff member of the Ministry of National Defense responsible for network information security. He also personally participated in the construction of military security defense networks.

He was most aware and assured of the system's rigorous and powerful functions, and the duty was actually just in case. He simply did not believe that anything would go wrong.

Stretching, Kester looked at the "big guy". All the data displayed on it were normal.

But for some unknown reason, Kester always had a bad feeling today. He always felt that there seemed to be something in the constantly beating process that made him uneasy, but no matter how carefully he checked, nothing could be found.

not found.

"Is it because I'm paranoid and want to prove my ability too much?" Just as this thought came to his mind, Kester shook his head again. He felt that he was not such a person. Maybe it was because he was too tired recently, he thought.

.

In a daze, he saw an expanse of blue sea. A nuclear submarine with no country marked was cruising quietly in the undulating sea water. Suddenly, a huge wave shot out from the front of the submarine, and the silhouette of the missile slid in the water.

It made a beautiful arc, jumped out of the water, constantly adjusted its direction, entered the atmosphere, and then quickly flew towards the intended target. Soon, the missile flew over New York, and a huge flame flashed after

, a mushroom cloud rising 500 meters above the ground, the Statue of Liberty, skyscrapers, Mercedes-Benz cars, people fleeing in panic... everything was instantly reduced to ashes in a huge fireball, bright light

After that, the entire New York City was in a mess, almost wiped off the map, and disappeared into thin air...

"Dudu! Dudu..." A harsh whistle seemed to come from the distant sky. Kester's heart was shocked, and his consciousness seemed to have returned to his body in a trance, and he suddenly woke up. After hearing clearly that it was the host transmitting

When the sound came, his body tensed up and his face changed drastically. He rushed in front of the "big guy" almost immediately, typing on the keyboard quickly to check the situation, but soon blood oozed from his forehead.

Cold sweat.

"Impossible, how is this possible..." Kester seemed to have seen a ghost, his eyes widened with disbelief on his face. After a long time, he woke up and hurriedly grabbed the table.

I picked up the phone. Perhaps due to nervousness, my dialing hands could not help but tremble, and I even dialed the wrong number several times.

At the same time, thousands of miles away in the Pentagon, countless people were watching the extremely revealing short movie that appeared on the computer screen. Everyone was dumbfounded and shocked, and they couldn't believe their eyes.

The Pentagon is located in Arlington County, Virginia, southwest of Washington, DC. It is the seat of the U.S. Department of Defense. When viewed from the air, the building is shaped into a regular pentagon, hence the name "Pentagon".

As the seat of the highest military command body in the United States, the Pentagon is also the primary target of terrorist attacks. In the 9/11 incident in 2001, a civil aircraft hijacked by terrorists was attacked and partially damaged. Parts of the walls collapsed. 125 people were killed.

He was killed in this terrorist attack. After the 9/11 incident, the Pentagon's security work became more stringent. Not only was strict control and inspection of people and objects entering and exiting the Pentagon, but also the storage and security of all confidential data and information of the Ministry of National Defense were tightened.

Take the strictest precautions.

In order to ensure the security of important data and information, the computer network of the Ministry of National Defense is divided into two parts. One part is the external network, which can communicate with the outside world. The network also has the highest level of security protection to prevent malicious intrusion by others. At the same time, all important data

and information data are all stored in the internal server. The internal LAN can be accessed according to different permissions and cannot communicate with the external network. In addition to the resident anti-virus protection program, security measures of separation, independence and backup are also adopted.

, it is like a castle with heavy doors and deep locks. In addition to the outer moat, there are also unbreakable gates and an independent inner castle at the core. As for the storage room in the cellar.

All kinds of confidential data and information also have the most stringent protection. The data storage of each department is subject to heavy restrictions. Only authorized persons can activate the designated departments within the scope of authority with passwords and special identification cards. And it involves military control.

The most important part is even more important. Only a very small number of personnel are allowed to enter this tightly protected area. All data will be automatically stored in duplicate on the tape every twelve hours. Regardless of any

Each department has a strict defense system to prevent outsiders from stealing data or importing viruses. The operating systems are specially designed by experts and have the ability to prevent epidemics. If the data in it is stolen or tampered with, it will cause catastrophic consequences.

as a result of.

Moreover, according to the National Defense Data Network (DDN) plan implemented in 1982, it is stipulated that existing and new data communication services must enter the DDN. In addition to retaining the original security structure, gateways are added at the interconnection to control different security levels.

Access between networks. The principle of access is: high-level networks can access low-level networks, and peer-level networks can access each other. Each subnet is equipped with a monitoring center and an access control center to monitor the confidential communications of this subnet.

It stands to reason that such a protection system is so impregnable that even if it is accidentally attacked by others, it will not have any impact on data security.

However, what is happening now is that all the computers in the internal LAN are showing this kind of picture. It is obvious that the computer network of the Ministry of National Defense has been invaded. The virus invaded by the enemy is like paralysis in a deserted place.

The Defense Department's impregnable Computer Network Protection Center was compromised, the entire internal operating system was contaminated, and even the data in the backup database was destroyed.

This was impossible, but it happened anyway. The entire Ministry of National Defense was immediately in chaos.

Not to mention that if some confidential information is stolen, it will cause immeasurable losses to the United States' global military layout and weapons information. If the other party tampered with the instructions and issued wrong instructions, the consequences would be disastrous. Even strategic weapons equipped with nuclear warheads

, will also be in a state of control. Once a problem occurs, the impact will not be comparable to that of a plane crashing or an artillery shell exploding.

Everyone knew the seriousness of the consequences, but no one could do anything about it. Because after those blushing hot pictures suddenly popped up on all the computers, all the computers lost control, and no one could stop it.

All this happened, and in the end, under unavoidable circumstances, the power supply to the computer host of the Ministry of National Defense had to be cut off urgently, which allowed a lot of data in the backup database to be retained.

And things are far from that simple. Including government agencies, military agencies, banks, securities companies, Wall Street, hospitals... almost all networks in the United States were paralyzed overnight, and all information could not be exchanged and interoperated.

Subways, flights, and buses were unable to operate normally, banks, hospitals, and securities companies were unable to operate. The United States suddenly fell into chaos.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like