Volume 8 A Hundred Years of Grudges Chapter 47 Information Network Warfare
27/122, a day that should always be remembered. [No pop-up novel network]
After a busy all-nighter, Ai Yu was finally able to breathe. After placing an order online for takeout at an hourly fast-food restaurant, Ms. Ai went to the bathroom to take a cool shower. This year's weather was particularly unusual, and although it was late January, the temperature was still very muggy.
After taking a shower, Ai Yu had just put on her pajamas when the doorbell rang downstairs. At exactly 15 o'clock, the staff of the fast food restaurant delivered the takeaway to the door, and it was very punctual.
While chewing the original old Beijing fritters and drinking soybean milk from the best soybeans in Northeast China, Ai Yu sat in front of the computer and entered a string of passwords on the spatial simulation keyboard, and some meaningless character information appeared on the three-dimensional screen.
Where did the MIA get this software?
Ai Yu thought as she checked the results of last night's work one last time.
No matter how good a hacker is, he is still human. Although the guests are all masters of writing computer programs, the outside world has always mythologized the ability of hackers. Under normal circumstances, hackers will only write small programs that mainly take advantage of the vulnerabilities of other people's computer systems to steal information from computers.
Ai Yu is facing a huge scale of "cloud programs".
The so-called "cloud program" is a large-scale program composed of crowd sequences and applied on the network. Each Mini Program has its own independent function, which can still be used after being disassembled. What's more, when all Mini Programs work together, they can generate a very huge "destructive power".
Ai was only responsible for writing one of the programs, and the rest was provided by the Military Intelligence Agency.
Although the bureau has thousands of intelligence analysts and cyber security departments, there are thousands of programming experts that Ai Yu knows. These procedures are certainly not prepared by MIA technicians. Rather, it came from other hackers. To be precise. It's from other "red guests".
What exactly does the CIA want to do?
Ai Yu took a sip of soy milk. The gaze returns to the curtain.
This "cloud program" is not explicitly targeted. It's not about stealing important information, either. It is completely an "information bomb" used to sabotage and paralyze the network.
Ai Yu was already vaguely aware of the purpose of the MIA.
After checking the last "subroutine". Ai Yu connected to the local network of the Military Intelligence Bureau.
"Is it done?"
"It's been checked and ready to use."
"Good, it looks like we didn't pick the wrong person." Liu Xiaobin on the virtual screen showed a satisfied smile, "Now enter the second stage of the operation, and the instructions are in your folder." ”
Ai Yu frowned and pulled up the folder set up for him by the Military Intelligence Agency.
"The old rule is that the documents will destroy themselves. Fifteen minutes later, a team of agents will come and pick you up. ”
"Why?"
"For your safety, we must take you to a safe place before we give you the freedom of life."
"You ......" Ai Yu was shocked.
"Do as directed, fourteen and a half minutes to go."
When the communication ended, Ai Yu dared to hesitate and immediately called up the instruction file in the folder.
After reading the instructions, Ai Yu's eyes widened in surprise.
After only about half a minute of hesitation, Ai Yu completed the rest of the operation according to the instructions of the Military Intelligence Bureau. As he turned off his computer, he heard the sound of the vehicle braking urgently.
Agents 5 rushed in, 2 of them left the house with Ai Yu, and 3 of them planted bombs in the room.
"What are you going to do?"
"Act according to the plan." The agent leading the team glanced at the young man, "All items in the room will be destroyed, and they will provide you with a more advanced computer system when the operation is over." ”
"My profile ......"
"It's already uploaded to a secret server, and there will be no loss."
Ai Yu gritted her teeth and gave up the struggle.
To be precise, the agents used not bombs, but incendiary bombs.
When the convoy left Ai Yu's neighborhood, the fire brigade had just arrived, and nearby residents were also awakened by the sudden fire. The specially designed incendiary bombs can generate thousands of degrees Celsius, enough to melt steel, and even if the fire brigade tried to extinguish the fire as quickly as possible, it would not be able to save the electronics in the room.
Almost at the same time, hundreds of equally bizarre fires broke out in dozens of other cities.
After receiving the news from the various field detachments, Liu Xiaobin breathed a sigh of relief.
"Started?" Li Cunxun has just completed the deployment of another round of operations.
"It's done, and all the hackers who participated in the 'Liaoyuan Fire' operation have been safely evacuated." Liu Xiaobin glanced at his watch and said, "In about four hours, the first batch of hackers will arrive at the secret base in the northwest." According to the plan, until the end of the war, they will all be regulated. ”
Li Cunxun nodded and said, "How is the operation going?" ”
"It's already started, and we'll see results soon." Liu Xiaobin smiled and said, "It's only 7:40 now, about 8:40 Tokyo time, and in about 40 minutes, the first 'information bomb' will be detonated on the server of the Tokyo Stock Exchange, let's wait and see the excitement." ”
It's not just about watching the excitement
Xun and Liu Xiaobin.
At 9:30 Tokyo time, the world watched as the Tokyo Stock Exchange opened for trading.
Because of the sudden attack on the server, the assets of tens of millions of investors were wiped out in an instant, and the Tokyo Stock Exchange was suddenly in chaos. In a matter of minutes, the service calls of the exchange, as well as the external service calls of the relevant departments of the Japanese government, were flooded by angry and frightened investors.
At 9 o'clock, the servers of "Daiwa Telecom" and "All Day Wireless Information" were attacked.
Although the two telecommunications companies have the most advanced network security technology in Japan, in just one minute, the servers of the two telecommunications companies were breached by "hackers", and Japan's telecommunications facilities were paralyzed.
For modern society, the paralysis of communication means that the neural network of the entire country is interrupted!
At 0:00 a.m., Japan's Ministry of Information Industry activated the satellite communication system according to the emergency plan.
Although the capacity of the satellite communication system is far less than that of the optical fiber communication system, under special circumstances, it is more important to keep the information flowing than the information flow.
At 5 o'clock at 1C, the phone on Li Cunxun's desk rang.
Chao Xiaobin glanced at it, but Li Cunxun did not answer the phone.
"I'm Xiaobin...... Okay, got it. Putting down the telephone microphone, Liu Xiaobin smiled coldly and said, "It has been determined that Japan's communication satellite is in orbit change maneuver and will be in place in about fifteen minutes." ”
"Contact the General Staff, it's time for them to act."
Liu Xiaobin nodded, picked up the phone again, and told the news to the General Staff.
At 0:20, 5 ground "military communication stations" located in the northeast of the Republic and Wonsan, Busan and other places in North Korea entered combat readiness.
Each communication station has one or several "laser satellite jamming systems".
With the activation of these jamming systems, the "low-orbit high-frequency communication relay satellite" that had just been transferred to the orbit and reached the skies over Japan immediately became the target of public criticism.
The so-called "laser satellite jamming system" is, in fact, a simplified version of the "ground-based laser interception system" being developed in the republic. The "ground-based laser interception system" is mainly aimed at ballistic missiles and low-orbit military satellites, and it has not been successfully developed because of its technical difficulty and high energy level. The "laser satellite jamming system", which was improved from it, cannot shoot down ballistic missiles, nor completely destroy military satellites, but only destroys the electronic equipment on them.
At 0:25, the communication antennas of the 1 Japanese communications satellites were burned.
It wasn't until after 11 o'clock that the Japanese government realized that it was not the hackers of a certain country who attacked Japan's information network system, but a certain country!
At 11:15, Murakami received the news.
The war has broken out!
The Prime Minister of Japan made a very accurate judgment. Although Murakami has every reason to believe that it must have been China's electronic information warfare forces that attacked Japan's information system, there is no evidence to support Murakami's speculation, and there is no way to blame China.
What annoys Murakami even more is, is this an act of war?
Until now, at least, no country or international organization has considered an attack on an information network to be an act of war.
In fact, with the exception of the warring parties during the "East China Sea War," which attacked each other's financial networks, no country attacked each other's basic information network facilities during the war.
Even if it can be proved that China is dealing with Japan's information network, it will be difficult for Japan to start a war against China.
Besides, Murakami Sadamasa does not want to go to war with China.
After letting the technology department stabilize the financial information system first, Murakami Sadamasa had nothing to do.
What does China's attack on the information network sector indicate?
Nothing can be said about it!
At least in Murakami's view, China's sudden attack was not aimed at crushing Japan. It is impossible to achieve the goal of defeating Japan by simply destroying Japan's information network, after all, any country's important information is backed up, and as long as the attack is over, it can be restored within a few hours. If China prepares for war against Japan, the first thing to strike at is not Japan's basic information network, but Japan's nuclear facilities.
While Murakami was thinking about this issue, other countries, including the United States, realized that it must be China that attacked Japan's information networks.
What exactly does China want to do?
At 15:30 Beijing time, Ye Zhisheng, Minister of Defense of the Republic, set off for Islamabad.
Although the Republic did not announce the relevant news, in the eyes of the outside world, Ye Zhisheng went to Islamabad at this time, and he must have discussed the matter of joint operations with Pakistan on behalf of Wang Yuanqing.
Is China's purpose in striking Japan's information networks against India?
It seems that the two have little to do with each other; In fact, there is a close connection between the two.
When China goes to war with India, the biggest concern must be that Japan is behind it. As long as Japan is left to take care of itself, China can rest assured that India will be bold.
All of a sudden, news of China's imminent declaration of war on India spread around the world. To be continued, if you want to know what will happen next, please log in to qidian, more chapters, support the author, support genuine reading!