274 Three plans for the Pentagon
US Pentagon Staff Headquarters. Pen @ fun @ pavilion wWw. ļ½ļ½ļ½Uļ½Eć ļ½ļ½ļ½ļ½
"Do you have any thoughts on the status released by the King of Tuvalu?"
Someone replied: "I think there are two possibilities, the first is that the king of Tuvalu has set up a timed cyber attack, and the attack time needs to be reset every 12 hours, otherwise, the cyber attack virus he set up before will explode in full force and carry out indiscriminate attacks all over the world." The second possibility is that the King of Tuvalu was trying to mix the lights and prevent physical and devastating attacks on Tuvalu by other countries. ā
The U.S. Secretary of Defense asked, "Has a similar virus been found on our domestic network?"
"From the time Tuvalu carried out a large-scale cyber attack on New Zealand to the present, we have conducted a nationwide network and even the user's network hardware, and found a total of 11298563 viruses, but none of them can have the effect of attacking Tuvalu New Zealand," said the head of the US Cyber Security Center. ā
The Secretary of Defense asked, "In other words, Tuvalu did not drop so-called cyber nuclear weapons on our domestic Internet or domestic hardware equipment?"
"We can't guarantee that. The person in charge of the cyber security center said: "First of all, we have not completed the inspection of networked hardware devices across the country. Secondly, the detection we carried out is cloud detection, which cannot deeply detect some viruses hidden in the user's personal networked device. Finally, after technical analysis, we believe that the cyber nuclear bomb in Tuvalu is most likely not a virus. ā
"Not a virus?"
"Nope. The head of the Cyber Security Center said, "What I'm saying is that it's not a virus. Viruses in the traditional sense are similar to the lone ranger, focusing on only one function. For example, stealing user information, seizing relevant control rights, and so on. According to our analysis, the situation that New Zealand encountered at that time was diverse. ā
The person in charge motioned to his assistant and after distributing some of their analysis, continued: "On the surface, there are only two manifestations of a cyberattack in Tuvalu, the first is a power outage, and the second is a signal loss. We can even classify a broken signal as a power outage. But in reality, the cyber attacks that New Zealand suffered at that time were diverse. ā
He picked up the report in his hand, flipped to one of the pages, and said: "Everyone, please turn to the seventeenth page of the research report, which has a detailed description of the cyber attacks suffered by New Zealand, after our incomplete statistics, there are about 207 species, and these 207 species, if you refine them, will become 1063 viruses, and these 1063 viruses, of which 90 percent, are brand new." ā
The Minister of Defense put down the information in his hand and asked, "You mean, the king of Tuvalu has researched 1,063 viruses himself, and then put them on the Internet or related hardware storage in New Zealand in advance, and then controlled their outbreak to attack?"
"Not bad!" said the person in charge of the Cyber Security Center, "Moreover, it is very amazing that these 1063 viruses, when analyzed individually, it is completely impossible to find their true functions, and they do not even have any attack capabilities." Only when they are combined with each other can they form an effective attack. ā
"So. The representative of the White House suddenly asked: "Have these 1,063 viruses been found on our domestic equipment?"
"So far, none have been found. ā
Hearing this, many people at the scene breathed a sigh of relief, but before this breath was finished, they heard the person in charge continue: "However, we suspect that these viruses are all generated by some kind of cyber attack algorithm, and they do not have any real meaning. ā
"Cyber attack calculations?"
"Yes, it's like a cyber attack virus generator, which can generate these 1063 virus combinations to attack in order to achieve the attack effect, and can also regenerate another 1063 or even more new viruses in order to achieve the attack effect. ā
The Minister of Defense asked: "Is there a solution?"
"In fact, if the King of Tuvalu had set up a timed attack, there was nothing we could do to deal with it. The person in charge said: "The only thing we can do at the moment is to try our best to complete the systems of the relevant facilities and disconnect the important facilities." ā
"What if some of the devices were disconnected and they didn't get the instructions from the King of Tuvalu to reset the timed attacks, and then the attacks broke out?"
"We can only try to minimize this loss, and even hope that we can get more samples of the virus and then roll back the cyber nuclear attack formula for Tuvalu. ā
The White House representative asked, "How much time, how many resources do you need?"
"Resources are inversely proportional to the time consumed, and the more resources we get, the less time we have to solve this problem," the person in charge said. However, according to the current test speed, it will take at least 6 months to crack this new attack equation even if the world's resources are gathered. ā
"Six months?" the Minister of Defence asked, "What do you think, the King of Tuvalu, how long did it take to study this attack formula, and how many people did it take?"
"According to our analysis, the king of Tuvalu will not spend more than three months researching this kind of cyber nuclear bomb, and in fact, there is no one around him who can participate in this research," said a staff officer. ā
"Is it possible that the attack was carried out by other countries in the name of Tuvalu......?" Huaxia!"
A staff officer said: "Impossible, although Huaxia may have this kind of technology, but in this incident, Huaxia will not be able to get the benefits that match it." Moreover, it is impossible for a major country to use this method of cyber attack. ā
"Not bad. Another staff officer continued: "We call this type of attack a cyber nuclear bomb, which means that it is not a conventional weapon, but a deterrent weapon." If countries such as China and Russia can easily use this kind of weapon, then we can also attack them in the form of cyber attacks. The end result is chaos in the world. ā
The White House representative said: "You mean, because Tuvalu is a small country, even if it doesn't have the Internet for the time being, it doesn't matter, so it won't be afraid of us or New Zealand and carry out cyber attacks on them?"
"Not bad. A staff officer said: "Only a country like theirs would dare to use deterrent weapons so easily, just as there is an old Chinese saying, those who are barefoot are not afraid to wear shoes." ā
The Minister of Defence concluded: "In other words, we have nothing to do with Tuvalu now, and our national security is not guaranteed at all?"
"In reality, cyber attacks cannot completely destroy a country, which means that if we are willing to suffer a certain amount of damage, it is completely possible to directly and humanely destroy the whole of Tuvalu," said the head of the Cyber Security Centre. ā
The head of the White House asked: "How big is this loss?"
A staff officer said: "Based on the damage of New Zealand's black three minutes, and the subsequent large-scale riots, we believe that if this kind of cyber nuclear bomb begins to explode without reservation, our direct economic losses will reach more than 16 trillion US dollars, and the indirect economic losses are immeasurable." ā
"$16 trillion?"
"Indirect economic losses?"
Many people exclaimed that the total GDP of the United States in 2012 was only more than 16.1 trillion US dollars.
"Not bad. The staff officer said: "The indirect economic damage is the most serious, and when the society is in complete chaos, it will even take us two to three years to completely restore social order, and even prepare for the independence of some states." ā
The Minister of Defense slapped the table hard and said, "Can't you come up with a practical plan except for alarmism?"
After a moment of silence, someone said, "Since the King of Tuvalu has kidnapped the whole world, we can kidnap him personally." As long as we can contain him before he launches a cyberattack, then we may be able to get him to stop the cyberattack. And seize his cyber attack calculations. ā
"Maybe?"
"Because we cannot guarantee that we will be able to use unconventional means to get the King of Tuvalu to cooperate with our actions. ā
"Has the character report of the King of Tuvalu been analysed?" asked the Minister of Defence.
A staff officer immediately replied: "According to our analysis of his previous behavior, the result is ...... It is quite possible that he would rather die than give in. ā
I grass!
The Minister of Defense's heart instantly had 10,000 grass and mud horses galloping by, and he could no longer hold back the anger in his heart, and roared: "Do you mean that the most powerful country in the world will give in to a small country with an area of only 26 square kilometers?"
"In fact, after Tuvalu moved to the Auckland Islands, they have reached 612.47 square kilometres. ā
The Minister of Defense almost had a heart attack at this remark, and held back his anger and asked, "What is the probability that Tuvalu will attack our United States?"
A staff officer replied: "According to our analysis, the King of Tuvalu does not have the intention of attacking any country on his own initiative, otherwise, he would not have been able to release that picture of the remote control to us." ā
The White House representative concluded: "That is, if we had not had a conflict between the United States and Tuvalu, we would not have been attacked by cyber nuclear bombs?"
"Not bad!"
The representative of the White House nodded and said, "So, can I understand that the national security of the United States now depends entirely on the mood of the King of Tuvalu?"
After a moment of silence, the head of the White House said: "I will report the contents of today's meeting to Mr. President in its entirety." So, can you give us a detailed solution?"
After about half an hour of discussion, the defense minister concluded: "We will develop three plans, the first of which is to reduce the cybersecurity vulnerabilities related to the country and do a good job of separating the network of relevant facilities." The second is to reach out to other countries to conduct joint technical analysis and find a way to completely eradicate a cyber bomb attack in Tuvalu. The third is to prepare a special operations force that can directly control the King of Tuvalu himself in the event of an unforeseen situation. (To be continued.) )