The Goddess Shines on America

Chapter 221 Please Catch the Hackers

"Welcome, Alice."

When the car stopped at the entrance of the Pentagon, then-FBI Director William Webster and NSA Director Dominic Flair greeted Alice at the door.

When the breeze came out, Alice swept her long hair: "Gentlemen, what's the matter with looking for me in such a hurry? The phone just said to come as soon as possible."

Today, Alice is wearing a decent yet energetic outfit, a white lace shirt and a red skirt, plus a pair of low-heeled high-heeled shoes and a Louis Vuitton handbag, which is as formal as possible.

"A big thing, Alice, let's talk about it when we come in."

The speaker was NSA director Dominique. He patted Alice on the back and led her into the Pentagon. The three of them were moving quickly in the corridor. During the process, hurried staff could be seen everywhere. Many people couldn't help but stop for a moment when they saw a girl of high school age running side by side with these two characters.

"The basic situation is like this."

While walking, Dominic explained: "You know, things like computer networks were first used by the Pentagon for military use, and they were established as early as the 1960s. It is only in recent years that we have dismantled them." The military-only restrictions on the network were removed, and it was opened to civilian use.

"uh-huh."

"A few months ago, the incident of IBM hacking the NASDAQ exchange was a cyber security threat that caused a sensation all over the world, and it was a commercial crime with the company as the main body. So not long after it happened, we put your Please come to the Pentagon..."

Alice's pace slowed down, because the office ahead was leading to the Pentagon's network management center.

She looked at Dominic with strange eyes: "You...you won't be invaded, right?"

Sure enough, the director of the NSA and the head of the FBI on the side both showed embarrassing expressions.

"You guessed it, Alice, we..."

"Normally, there must be many experts among the people. Your network is now only maintained by a group of programmers, and it is normal for it to be breached."

Alice directly interrupted Dominique, and said by herself: "As for the firewall, our company is currently developing it, and it will take a while."

It's easy to talk to smart people, but Dominique still asks, "How long will it take?"

The three of them just chatted in the corridor, but fortunately there was no one around.

"This..."

Alice pursed her lips.

In fact, it makes sense. After receiving 30 million U.S. dollars in research and development funds from the Ministry of Defense, Alice directly stuffed it into her small coffers—even though it was Cisco's corporate funds on the books.

After all, for her who currently focuses her talent tree on the computer field, whether it is software programming or hardware design drawings, it only takes one day to complete. The reason why it was not delivered to the Pentagon immediately was just to give a normal "development cycle".

"Probably another month!"

After thinking about it carefully, Alice gave an accurate answer: "It's already June now, and I'm going to England to attend high school in September, so I can probably give you the things before then. Without me, the Cisco team would like to take that Things will be developed... at least December will be."

The total time of six months, the difference of three months, Alice is still extremely reserved. God knows, because of the limited area of ​​the office building, Cisco has not recruited new employees for a while, and everyone is almost busy. After all, there are not many orders in this period of time.

If she really proposes a firewall project right away, before she recruits new employees, she may not be able to complete it in June next year!

"One month? That would be great, and I'm really looking forward to the early launch of this product."

With a sigh of emotion, Dominic pushed open the office door.

This room is not small, and it is full of computer equipment, and many programmers are busy in a daze.

"Remus!"

Dominic waved and shouted: "Let me introduce you, Remus, the director of the Network Management Office, Remus, the boss of Cisco Systems, Alice."

"Oh my God, finally, finally!"

Remus was a short, bald man. When he saw Alice coming, he shook hands with her excitedly: "The master is finally here!"

"Network, is the director of the management office?"

Putting an accent on the word "administration," Alice said, "I thought it would be the Office of Cyber ​​Security."

Remus blushed a little. It was not a good experience to be ridiculed by such a little girl, even though she is now highly valued by all bureau chiefs.

William Webster, who hadn't spoken for a long time, spoke: "Remus, let's introduce the situation to Alice, I don't want that kid to slip away when I have already picked up the pen to sign the arrest warrant. "

"Yes, yes, no problem."

Remus wiped the sweat from his brow as a gesture, not sure how nervous he really was.

The basic situation is this.

Just three nights ago, the Pentagon's military website was hacked, and the visitors were so frantic that they browsed many core confidential documents of the Ministry of Defense. When the people in the network management center found traces of the intrusion, they immediately started tracking it, but because the other party's technology was too high, the programmers in the leader management center circled hundreds of broilers halfway around the world, and then disappeared directly.

"So, you really have been invaded by private hackers."

Alice gloated and said with a smile: "And there have been cases, right? After all, computer networks have existed for many years. It is impossible that no one has ever thought of intruding into other networks."

William Webster patted Alice on the shoulder with a wry smile: "That's true, many people who study computers are young lads, but if someone among them has mastered the technology of intruding into the network, it is not easy to stop them. "

"But most of them are pranks, and some people even patch the compromised websites, right?"

Alice nodded and said, "Really malicious intrusions are still rare, and this thing is too technical, so the current situation is that there are few cases and the legislation is not perfect. Unless there is a big trouble, it is basically... hum."

With a cough, Director Dominic interrupted Alice's chatter: "I can't tell you what he browsed, but I can tell you his identity."

Dominique said: "His name is Kevin Mitnick. He is in his early twenties now, but he is already a habitual offender. As early as three or four years ago, we arrested him for his intrusion. Stop it, but at that time, not to mention the current IBM incident, cybercrime itself is very rare, there is no law to follow, so we can simply put him in the juvenile correctional center for two days."

"But the kid is endless!"

William Webster interjected: "Alice, I'm not afraid of your jokes. This kid invaded the North American air defense command system as early as 15 years old! We have been investigating him for a long time and have arrested him, but he It's just endless..."

"Let's talk about what you have lost first."

Alice waved her hand to stop Webster's words: "If it's just for an ordinary invasion, call me all the way from the west coast, and the service fee will be doubled."

Webster looks to Dominic.

During this, the staff of the Cyber ​​Security Center had no room to intervene, and only Remus stood by their side.

After a moment of silence, the head of the National Security Agency said: "What he saw was the contract orders between the Ministry of Defense and several arms contractors, which involved absolute state secrets. Although the technicians did not find any traces of the data being copied, but There is no guarantee that he erased the operation records, I need you to help us find the IP address of that kid, and the FBI stationed there will act immediately to arrest him!"

The action begins now.

Alice was also really interested in the identity of the intruder.

Kevin Mitnick, she hadn't heard of this kid's name, but anyone who could become a top hacker in the 1980s was undoubtedly the most talented person. After all, the popularity of online teaching at this time is far inferior to that of the 21st century. The masters who can be born in such a small base and simple environment, after growing over time, are definitely top-notch and terrifying guys!

She waved her little hand: "Give me three computers with the best configuration, and then, give me three keyboards and a cup of black tea."

Remus, who was in charge of the implementation, was stunned: "I can understand black tea, three computers, three keyboards?"

Alice squinted at him with small eyes: "I'm very fast, do you have a problem?"

Dominic laughed: "Get ready, Alice is not an ordinary programmer!"

This is the network management center. There are computers everywhere. It is not difficult to find the three with the highest configuration, but it takes a little effort to place them.

At the same time, it was accompanied by Alice's complaint: "One is facing me, two are placed on the left and right, and the keyboard can be placed directly on the table. Hmm... It's a bit crowded. I said, sir, you didn't order a bigger one." table?"

And Remus' helplessness: "Son, this is a government office, we can't buy large desks like the bosses of private companies."

Then Alice squinted again: "I'm just complaining, what can you explain?"

Then, she folded her arms with a smile, and looked at Remus slyly: "It is said that explaining is a cover-up, is it true that anyone in your Pentagon is wasting extravagance? There should be purchase records in your computer, let me see Well?"

After saying this, the faces of the two bosses standing by were all blue.

"Alice, we invited you to catch hackers, don't be addicted!"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like