Chapter 437: Invasion

In the suburbs Chinese of New York, several small gray buildings are hidden in a lush tree in a compound that looks very ordinary. Outside, there is a red-brick courtyard wall. The environment outside the courtyard wall is elegant, with grass and guardrails. If it weren't for the two heavily armed guards at the door, no one would have thought there was anything special about this place.

Unbeknownst to the residents living nearby, this place is the newly established Independent Cyber Command of the Ministry of Defense of Country M. This unit, which is directly under the jurisdiction of the Ministry of Defense of Country M, is a brand-new and independent force, composed of 200 professional and technical personnel, each of whom is composed of experts in computer information and networking, and the person in charge is Major General Canny of the Ministry of National Defense.

The establishment of the Independent Cyber Command is due to the fact that the computer networks of the Ministry of Defense and other important institutions of country M have been continuously attacked by hackers, although they have not caused major losses and impacts, but they have made the government and the Ministry of Defense of country M pay more attention to the construction of network attacks and protection.

Since the establishment of the Independent Cyber Command, it has single-handedly built the military security defense network of the government of country M, and it has played a vital role in resisting malicious virtual attacks and hacker intrusions by other governments, ensuring that country M will not be defeated in a virtual war that may occur in the future. The fact that a large number of hackers have tried to break in, often to no avail, is another indication of the fact that the Independent Cyber Command has made a significant contribution in this regard. At the same time, his aggressiveness is also unquestionable, and in the "cyber warfare" against Y Rak and X Leah, these two countries have become information islands that have lost contact with the outside world.

The building looks so unremarkable from the outside that it can easily be mistaken for a residential building. The building is divided into two main parts: above ground and underground, with floors 1-6 above ground for some research departments and a computer room on the ground floor, which was designed with various factors in mind, and the safety facilities are extremely tight, which is said to not only withstand a magnitude 10 earthquake, but also ensure that it will not be affected in a nuclear war.

In the underground main control room dozens of meters deep, there was a huge guy who made a buzzing sound. There are some processes running on the display screen on the side. There will be people on duty here 24 hours a day, and the system will alarm any abnormal processes. And it will automatically carry out defensive interception and counterattack tracking, which not only makes the opponent defeated, but also can track the opponent's location in the first time and notify the relevant personnel to arrest. There have been many "daring" hackers who have been imprisoned for this, including Mike, a well-known hacker in the world.

It's late at night.

On duty today is Captain Kester.

He can be regarded as an old man in this special unit, and he was a staff member in the Ministry of Defense who was responsible for network information security when this unit was not established in the Ministry of National Defense. He has also personally participated in the construction of the military security defense network, and is most clear and assured of the meticulous and powerful functions of the system. He didn't believe anything could go wrong.

Stretching, Kester looked at the "big guy", and all the data displayed on it was fine.

But for some reason, Kester always had a bad feeling today, he always felt that there seemed to be something uneasy in the constantly beating process, but no matter how closely he examined, he found nothing.

"Could it be that I'm suspicious and want to prove my abilities too much?" Kester shook his head again, he didn't think he was such a person, maybe it was because he had been too tired lately, he thought.

In a daze, he saw a nuclear submarine without a marked country cruising quietly in the undulating sea surface of the blue sea, and suddenly a huge wave shot out from the front of the submarine, and the figure of the missile slid out of a graceful arc in the water, jumped out of the water, and constantly adjusted its direction, entered the atmosphere, and then flew rapidly to the intended target. Soon, the missile flew over New York, and after a huge flash of flames, a mushroom cloud rose at a distance of 500 meters above the ground, and the Statue of Liberty, skyscrapers, Mercedes-Benzed cars, and crowds of people fleeing in a panic ...... Everything was reduced to ashes in a huge fireball, and after the bright light, the whole of New York City was in shambles, almost wiped off the map......

"Toot toot! ......"A piercing whistle seemed to come from the distant sky, Kester's heart was shocked, and his consciousness seemed to return to his body in a trance, and he suddenly woke up, only to realize that he was dreaming just now, a nightmare.

Shaking his head a little dizzy, when he heard clearly the voice from the host, Kester's body tensed, his face changed greatly, and he rushed to the front of the "big guy" almost immediately, while quickly tapping the keyboard to check the situation, but soon cold sweat oozed from his forehead.

"Impossible, how can this ......" Kester seemed to have seen a ghost, his eyes widened, and his face was full of disbelief, and after a long time he woke up, and hurriedly grabbed the phone on the table, perhaps because of nervousness, the dialer couldn't help but tremble, and even dialed the wrong number several times.

At the same time, in the Pentagon, which is thousands of miles away, countless people watched the extremely dew point and ** small movies that appeared on the computer screen, all of them were stunned and stunned, and they couldn't believe their eyes.

Located in Arlington County, Virginia, southwest of Washington, D.C., the Pentagon is home to the Department of Defense of Country M.

In the 9/11 incident in 2001, a civilian aircraft hijacked by terrorists was attacked, partially damaged, and part of the wall collapsed, killing 125 people in the terrorist attack. After 9/11, the Pentagon's security work has become tighter, not only for the strict control and inspection of people and objects entering and leaving the Pentagon, but also for the storage and security of all classified data and information of the Department of Defense.

In order to ensure the security of important data and materials, the computer network of the Ministry of National Defense is divided into two parts, one part is the external network, which can be connected with the outside world, and the network also has the highest level of security protection to prevent malicious intrusion by others. At the same time, all important data and information are stored in the internal server, and the internal LAN can be accessed according to different permissions, and the external network is not interoperable. In addition to the permanent anti-virus protection program, there are also separate, independent and backup security measures, which is like a castle with a heavy gate and a locked castle, in addition to the outer moat, there is also an impenetrable gate and a separate inner fortress at the core.

All kinds of confidential data and information are also the most closely guarded. There are many restrictions on the storage of data in each section, and only the licensee can activate the part specified in the terms of reference with a password and a special identification card. The part involving military control is even more important, and only a very small number of personnel are allowed to enter this tightly guarded area. All data, every 12 hours, is automatically stored in two copies of the latest data on tape. No matter what part of the system, there is a strict defense system to prevent outsiders from stealing data or importing viruses, and the operating system is specially designed by experts to have the ability to prevent epidemics. If the information is stolen or tampered with, it can have catastrophic and severe consequences.

In addition, according to the Defense Data Network (DDN) program, which was implemented in 1982, existing and new data communication services must enter the DDN. In addition to retaining the original security structure, gateways are added at the interconnections to control access between subnets with different security levels. The principle of access is that the high-level network can access the low-level network, and the peer-level network can visit each other. Each subnet has a monitoring center and an access control center to monitor the secure communications of that subnet.

It stands to reason that such a protection system is impregnable, and even if it is accidentally attacked by others, it will not have any impact on data security.

However, what is happening now is that all the computers in the internal LAN have also appeared in this way, and it is clear that the computer network of the Ministry of Defense has been hacked. The virus invaded by the enemy paralyzed the impregnable computer network protection center of the Ministry of Defense like no one, and the entire internal operating system was contaminated, and even the data in the backup database was destroyed.

It was impossible, but it happened. The entire Ministry of Defense was immediately in a mess.

Not to mention that if some confidential information is stolen, it will cause incalculable losses to the global military layout and weapons data of country M, and if the other side tampers with the instructions and issues wrong instructions, the consequences will be unimaginable. Even strategic weapons loaded with nuclear warheads can be out of control as a result, and if a problem arises, the impact will be more than just that of a plane crash or an artillery shell explosion.

Everyone knows the severity of the consequences, but everyone is at a loss for what to do about it. Because all the computers suddenly popped out of those blushing hot pictures, all the computers were out of control, and no one could stop this from happening, and finally had to urgently cut off the power of the main computer of the Ministry of Defense under the last resort, which allowed a lot of the data in the backup database to be retained.

And it's much more than that. These include government agencies, military agencies, banks, securities firms, Wall Street, hospitals, ...... Almost all the networks in the United States were paralyzed overnight, and all information could not be exchanged and interconnected. Subways, flights, and buses could not operate normally, and banks, hospitals, and securities companies could not operate, and the whole M suddenly fell into chaos. Cat flutter Chinese