Chapter 339: When the hack is in progress
In the Gulf War in 1991, the United States defeated Yin Lak's 2.4 million army in only 42 days at the cost of 146 people.
And this battle also woke up the whole world!
This was the first truly modern, large-scale war.
Before the Gulf War began, Saddam Hussein once arrogantly believed that the outcome of the war depended on the ground troops.
However, in the nineties, most of the equipment of the US military, after decades of development after World War II, has been far ahead of the world (except for the Soviet Union).
During the war, the whole world was stunned by the stealth fighters, electronic warfare planes, helicopter gunships, strategic bombers, cruise missiles, precision-guided bombs, and other new equipment displayed by the US military.
This time.
No matter how sluggish people are, they have already profoundly realized that information-based warfare has become the main theme of future wars.
2004, 12 April.
In the past half a month, the multinational forces have carried out carpet bombing of targets of even slight strategic significance in Yinlak with the ultra-high intensity of dispatching thousands of warplanes every day.
Saddam's staff believes that this is definitely the US military clearing the way for the next ground advance.
Next, there will inevitably be big moves.
The situation is on fire.
After much deliberation, they have decided to start the revenge plan in advance!
....
Akiva and Kane, side by side, walked into a residential building in New York.
They carefully closed the door and looked through the glass window to see their surroundings.
It's work time, and it's quiet outside, except for the occasional luxury car passing by the road.
】
This community is a high-end residential area, and most of the residents are high-level white-collar workers from large companies.
The security guards of the community are conscientious and few outsiders are able to enter.
The people of the United States monitor the transfer and withdrawal of bank ATMs very strictly.
As soon as there is more than $10,000 in cash withdrawals, an alert device will be triggered in the background to alert the FBI that there may be illegal transactions using cash.
This has brought great trouble to the Mujahideen led by Akiva.
Many members of the organization do not receive adequate funding for their activities, and some of the activities that are being carried out in the United States are also restricted.
In order to have a foothold that would not be disturbed, Akiva smuggled a kilogram of "hard currency" and sold it to the local mafia to raise the money needed to buy the house.
In addition to the two of them, there were six or seven other people in the living room, each with a computer in front of them, engrossed in the operation.
Hearing the sound of footsteps, they all turned their heads and grabbed the "nail" in front of the computer.
Seeing that it was the leader who had come in, they relaxed their vigilance and returned to their original appearance.
"Are you all ready?" Akiva asked in a deep voice as he glanced around his men in the living room.
"Ready!"
There was a muffled, but resolute answer, in the living room.
Each of them had a resolute look in their eyes.
Kane, who was standing on the side, raised his left hand, looked at his Rolex watch, and reminded him: "It's almost time, and the other team members should be in place." ”
Akiva's expression was serious, and he finally looked at his subordinates again, and waved his big hand: "Then let's start!" ”
The seven people in the living room immediately opened the program and started to operate according to the plan.
Akiva and Kane, too, each found a free computer, sat down, and launched the hacking software.
They nervously began to hack into a popular American music website.
As early as some time ago, they used a vulnerability to hack into this website, and also left a backdoor.
Therefore, the speed of the invasion this time is also very fast.
It only took a minute or two for them to gain control of the site and crack the password of a webmaster who was temporarily offline.
Akiva took out a disc and replaced the website's player and source with one of them, a modified online music playback software.
A helper took a top 10 song downloaded the day before yesterday and made a few changes through a processor.
After the change, the number of bytes has been increased by more than a dozen kilobytes.
Often, no one notices this subtle change.
When the user of the website clicks on the song, the Akiva modified player will hide the modified song file under the main control program and reside in the memory while the user reads the cache.
Akiva looked at Kane next to him, equally skillfully operating, full of malicious anticipation that more people would click on these altered songs.
Come to think of it, since they can enter the top 10 of the list, they must be hot songs, and there should be quite a lot of people who click on them.
Akiva is a native of Yinrak, to be precise, a member of the Yinrak Intelligence Organization.
His job is to intercept the e-mails of the US military through the Internet, and then judge the specific combat plan of the multinational force led by the US military from the bits and pieces of information in these e-mails.
As a matter of fact, as early as 1991, during the first Gulf War, Saddam Hussein fought a beautiful ambush with the support of intelligence personnel.
Since then, he has enjoyed cyber intelligence warfare.
To this end, he also trained thousands of cyber intelligence personnel, who spread to the United States mainland, and were specifically responsible for hacking into the Pentagon's database and searching for useful cyber information.
However, in recent years, due to the rapid replacement of computers, many vulnerabilities have been plugged by Microsoft, making it more and more difficult for them to obtain useful information.
Akiva is one of the best cyber intelligence operatives.
While searching for all kinds of information on the Internet, he also met a group of top hackers from all over the world.
Kane, is one of them.
Through years of association, he has come to know Kane, a computer engineer in the former Soviet Union.
He was an employee of Intel Corp. before being fired and reduced to a hacker who helped people collect trade secrets for a living.
Kane was angry with the United States and Intel.
After the collapse of the Soviet Union, the United States has been targeting Eastern Europe, and people from the former Soviet Union/Maoist Russia have become the object of their hostility.
An "old man" like Kane, deep down, is still saddened by the collapse of the Soviet Union, and such emotions are often expressed both inside and outside his words.
So, seven or eight years ago, he fell victim to being fired by Intel and went from a decent software engineer to an unemployed.
In the end, they even had to use their software knowledge to make money and make ends meet.
Akiva was in contact with him for many years, slowly establishing his reliability, and gradually developing and absorbing him into Yinrak's intelligence organization.
This time, the US-led multinational coalition has stepped up its bombing of targets in Yinlak.
There are rumors in the international community that the United States has completely lost patience with Yin Lak's sanctions after all these years, as international oil prices continue to soar.
They have made up their minds to occupy the entire territory of Yinlak and seize Yinlak's oil.
The Yin Lak people are very nervous about this.
Since the entry of the United States into the Middle East, the oil under the Yin Lak underground cannot be turned into dollars, and international products cannot be purchased.
Yin Lak, who was once rich, is now withering.
After a large number of cars and equipment parts were damaged and could not be replaced, it was difficult for Saddam Hussein to maintain an army of one million, resulting in a gradual decline in morale.
Although there are still more than 700,000 people in the reorganized Guard, the chances of victory against the US-led multinational force are still very slim.
Under Saddam's personal command, Akiwa stepped up his search for US military intelligence.
It was at this time that Kane suddenly gave him an idea.
Kane said that the support point of the United States is its economy, and if it is used in some way, it will deal a heavy blow to the American economy.
In the face of the continuous deterioration of the economy, it is difficult to say whether it can continue to insist on using troops against Yin Lak and whether it will still have enough financial resources to support it.
The method proposed by Kane was actually inadvertently mentioned by a top hacker when he was communicating with them.
After a long discussion, combined with Kane's technical details about Intel, they sorted out a fairly feasible attack plan.
It was only because the involvement was too large and he was afraid of causing retaliation from the United States that his hacker friend did not announce it to the outside world.