Chapter 508: Let's Talk About a Business (Part II)

Nandu, National Security Agency, Headquarters Building.

After receiving the notice, Liu Zhenhei, the current director of the National Security Bureau, who was originally holding a regular meeting of the senior management of the National Security Bureau in the conference room on the eighth floor, had a calm face, and together with a dozen or so heads of various departments of the National Security Bureau, went directly to the data center located on the third basement floor of the headquarters building through a special elevator.

As soon as they walked in, they opened the door and heard the alarm in the data center blaring.

Liu Zhen's face became even more ugly, and he walked two quick steps to the side of a tall thin man with a flushed face who was sweating profusely and directing the busy technicians, and asked unceremoniously: "Xiao Wu, has the virus been cleaned up?" What's going on? How can the NSA's intranet make people bury mines? What do you do with your technology? ”

Despite being promoted from an administrative position, Liu Zhen is not very knowledgeable about many techniques.

But it's been almost two years since he took over the NSA, and two years is enough time for him to learn a lot.

For example, he usually rarely surfs the Internet at home, but now he is very clear about the difference between the intranet, the extranet and the dark web.

The NSA's intranet is a self-built local area network, which is not open to the outside world, and can only be accessed by some encrypted computers in the headquarters building.

As the headquarters intranet of China's only two intelligence agencies, the intranet of the State Security Bureau pays more attention to security and confidentiality, and not only has special technical personnel built several sets of heavily guarded firewalls for it, but also regularly maintains and inspects every computer, server, and other equipment that is linked to the intranet of the State Security Bureau.

Therefore, in the nearly 10 years since the establishment of the NSA intranet, there has never been a record of intranet data leakage, or foreign hackers invading the intranet by infecting the computers of the NSA headquarters as broilers.

However, this record has now apparently been broken.

Because just over half an hour ago, a group of technicians responsible for the maintenance of the intranet of the technical group under the National Security Bureau found that a file package suspected of being a Trojan horse or virus had been buried in the intranet of the National Security Bureau during routine maintenance and inspection of the intranet.

Not to mention how the NSA's intranet, which has always been very security-conscious, was easily breached?

It took more than half an hour for the technical team to solve the file that was implanted on the intranet by outsiders and did not know whether it was a Trojan horse or a virus, which was enough to shake the entire National Security Bureau.

Although as a national intelligence agency, the confidential information and information of the National Security Bureau are still kept on paper and will not be stored on the intranet, but a lot of daily work is to use the intranet for transmission and processing, and no one dares to guarantee that there is no confidential information in the leaked data.

Just thinking about it, Liu Zhen was about to break out in a cold sweat.

Xiao Wu, who was held accountable by Liu Zhen, is called Wu Qingyuan, and is the head of the technical section of the technical department under the National Security Bureau, which is responsible for the maintenance of intranet security.

As soon as he saw the stinky face of his boss, Wu Qingyuan didn't care about wiping the oil and sweat on his face, and replied in a hoarse voice: "Director, there is no way to deal with the documents suspected of being Trojans and viruses for the time being...... The operating system used by the computers used to build the intranet in our NSA is based on the open-source software Linux...... The intruder obviously has a root vulnerability in the Linux system that we don't know, so the technology cannot delete or block the access to the intranet information of this suspected Trojan horse or virus software for the time being......"

To put it bluntly, they are actually paying off their debts for their predecessors.

Linux is an open source software created at the end of the last century by Finnish programmer Linus Tovads, which is a Unix-like operating system.

Since Linux was shared with the world by its founders, anyone can use it.

And because the Linux source code is all open to everyone to share the relationship, decades of tens of thousands of computer engineers around the world continue to improve, deduce, Linux was born hundreds of different versions, all countries, enterprises and individuals, according to the needs, to develop a to meet the needs of governments, research institutions, defense agencies to use the operating software.

Developing an operating software is much more difficult than most people think.

This difficulty is not only reflected in the huge amount of code that can be used to operate a software, but also far beyond ordinary software.

The most rare thing is compatibility, compatibility between software and hardware, compatibility between software and software, after all, some compatible technologies can be solved, and some are not solved by technology.

It is no exaggeration to say that if you want to develop a new operating system from scratch, you can't see anything less than 10 billion Chinese dollars.

When Microsoft's CEO promoted win7 to replace XP, he mentioned that Microsoft spent nearly $2 billion to develop this system.

There is definitely moisture in this, but the high cost of developing an operating system for the public can be seen in the tube.

The NSA has its own technical team, and there is also a special national grant every year, but no matter how high this allocation is, it is unlikely that a high-level person will put the cart before the horse and allocate a huge amount of money to develop their own operating software.

The operating system used in the NSA's intranet was purchased from a professional software development company in China.

After getting the outsourcing project, the company with the qualification of national defense and military procurement deleted a large number of things that were not needed on the basis of the Linux system, and at the same time focused on improving and upgrading security and protection.

In a sense, they actually did a decent job, although the operating system sold to the NSA is far inferior to Microsoft's products in terms of comprehensive functions, but in terms of security and protection, there are still merits.

It's just that Linux is never a perfect operating system.

Because of its open-source relationship with everyone, I don't know how many programmers have been involved in the development of the different versions shared on the web community.

Limited by the strength of their technology, there are also some malicious people who have left some vulnerabilities and backdoors in the source code that only they know, so it is difficult to say which version of the Linux system does not have vulnerabilities.

And once there are vulnerabilities, especially the root vulnerabilities hidden in the depths of hundreds of millions of codes, no matter how strong the system is, there is a possibility of being compromised.

After being briefly introduced by Wu Qingyuan, Liu Zhen's face did not look much better.

“…… Can't delete it or prevent it from accessing the intranet? Can technology track where the data that has been passed away has gone? Can you determine where the other party invaded the intranet from? ”

The person in charge of the security department was questioned, and his name was Zhang Qinglin.

Wu Qingyuan shook his head, but his face was a little better than just now: "...... Our intranet does not have the right to access the Internet, so this suspicious file that suddenly appeared in our intranet can only be transmitted to the intranet through a computer port in the National Security Bureau that can log in to the intranet...... Just now, I had already let the technology temporarily shut down the base station in the headquarters in advance, so the data stolen from the suspicious file should only be transmitted, and most of it is still stored on a computer in this kind of building......"

"At present, one group and two groups are dealing with this unknown file, and the third, fourth and fifth groups have begun to check all the servers and computers linked to the intranet one by one, accompanied by the security personnel, and there will be news soon!"

As he spoke, there was a sound of hurried footsteps outside the door.

Soon after, a tall and fat young man wearing thick glasses slammed open the door, hurried in and shouted, "...... Chief...... Look for...... Found ......"

The tall and fat young man didn't care about wiping the sweat off his face, and held a silver USB flash drive in his hand.

Wu Qingyuan was overjoyed when he heard this, and hurriedly stepped forward, "Liu Jun, what did you find?" ”

The tall and fat young man is a technician in the fourth group of the network technology group under him, named Liu Jun.

Seeing him hand him the silver USB flash drive in his hand, Wu Qingyuan hurriedly took it, but still asked.

Liu Jun took two breaths, and then noticed that there were more than a dozen real bigwigs in the bureau standing in the data center, and his mouth suddenly became a little unfavorable.

“…… This...... This is an upload ...... USB flash drive to upload the file...... Be...... It was found on machine 45 on the third floor......"

Liu Zhen's face darkened when he heard this, and he glanced at Zhang Qinglin, who was not very good-looking, and Zhang Qinglin, who was not very good-looking, nodded and walked out.

The Security Department is the department responsible for the security of the National Security Agency, and it is also responsible for the work of the counter-security.

Zhang Qinglin is the person in charge of the security department, and now the Ministry of State Security has been implanted with suspicious files, and it has been found that it was uploaded to the intranet through an internal computer, which is already an extremely bad case, and the culprit must be caught as soon as possible.

Wu Qingyuan waved his hand to call two technicians, and carefully gave them the USB flash drive, "Go to the safe room to check, be careful......"

Their technical department has its own safe room, which is not connected to the Internet and is fully equipped with various tests, even if the USB flash drive is formatted, it can recover the previous data.

After sending them away, Liu Zhen and the two deputy directors and several directors of various departments had already gotten together and talked in a whisper.

“…… This is an extremely bad enemy invasion, what do you think? ”

"Liu Bureau, do you want to report to the presidential palace first?"

“…… I don't think it's necessary for the time being, just wait for the investigation report of the security department to come out, and it is not yet certain how many documents have been leaked in our intranet......"

“…… Could it have something to do with the CIA? Last month, they lost a lot of people in Nandu, and Lao Mei has always suspected that we did it, and recently arrested many of our expatriates......"

"It's possible ......"

Wu Qingyuan saw that no one took care of him, so he breathed a sigh of relief and took a few steps back to facilitate the communication between the bigwigs.

I didn't want to go far, but I saw a bang not far away, which instantly attracted all the eyes that were communicating in a low voice here.

Wu Qingyuan also looked over, only to see that a few meters away, a young man who was holding a custom-made heavy notebook accidentally bumped into the desk next to him.

Seeing that it was his technician, he was about to scold him with a face, when he saw the young man distorting his face, obviously because he had just hit it.

But the somewhat bald young man still limped over with convulsions, "Ke...... Section chief, director, suspicious file opened ......"