Red Alert Somalia

Chapter 409

From the ancient Roman scholar Cicero, to the land power theorist Mackinder, the sea power theorist Mahan, and the air power theorist Du Hei, they all insisted: Who can control the ocean, who can control the world; who can dominate In the heartland, whoever can control the world; whoever controls outer space can control the earth.The 21st century is the information age. The network knows no borders. Whoever controls the information and the network can control the world and win the future.Britain established the "empire that the sun never sets" by conquering the continent; the United States has climbed to the throne of a superpower by controlling the ocean; who will dominate the new century by controlling information and networks?

The world has left the era of relying on violence and money control. In the future, the Rubik's Cube of world politics will be controlled by people with information powers. They will use their control of the network and the right to publish information to achieve the goal that violence and money cannot conquer. .

War is an eternal topic of mankind.At present and in the future, the factors that trigger wars always exist, and the types of wars are also diverse. The main ones include competition for spheres of influence, territorial disputes, border disputes, plundering of strategic resources, market competition, ideological struggles, religious conflicts, ethnic conflicts, etc. There are also various separatist, terrorist and religious extremist forces.Imperialism and hegemonism are the roots of modern wars.The Internet is also full of conflicts of ideas, contradictions and even wars.The real world conflicts of interest and contention, the root causes and factors that trigger wars, have gradually begun to migrate and aggregate to the Internet, triggering wars on the Internet.

In the 21st century, the Internet has become a huge force to change the world and a strategic commanding height for economic and social development.Dominate the future world changes.The biggest change brought about by the Internet is to change the distribution of power.In the network age centered on information technology.Information knowledge has become the most important factor in determining and even defining power without any dispute.The inequality caused by the possession of information will be the same as the inequality caused by the possession of violence and wealth.Information and power are gradually intertwined and become the foundation of the comprehensive national strength of all countries.In the political, economic, and military fields, compared to traditional hard power, information-based soft power has become more and more important.

As the globalization of the Internet advances, based on the traditional dimensions of political, economic and military power, the strategic importance of the Internet has become increasingly prominent.The information and knowledge carried by the Internet is in a way that traditional power policies and internationalism cannot match.It quickly becomes a powerful source of power and wealth that has never been seen before.The wealth and knowledge carried by the Internet have become an important part of national interests, and network power has become an important content for measuring the struggle for interests between nations.

Cyber ​​power is merging with non-state actors, and interconnectivity is promoting the reconstruction of the world order.The new forms of production and resource appropriation changed the balance of power in the social structure, leading to new forms of power.In an era dominated by industrial civilization, whoever owns mines, coal, oil, electric power and transmission machinery will control the world.In the Internet age.A brand-new strategic paradigm has begun to emerge. Whoever has the control and distribution power of the Internet has the dominant power.

National sovereignty is a sacred concept. Internally, it refers to the supreme power of the country. The country has the right to choose the state system and the right to exercise jurisdiction.External means that the country has the right to independently decide its domestic and foreign policies.Now that there is a borderless Internet, the concept of national borders connected with sovereignty is blurring, and traditional national sovereignty is being challenged.

Sovereignty security is the first element of political security. Informatization and networking have changed the scope and space of the form of national sovereignty. Information sovereignty has become an important content in the concept of national sovereignty.Therefore, the struggle for information sovereignty is also an important area of ​​national sovereignty struggle.In this fight for the future global cyberspace, defend the borders of national information.In the struggle to establish and protect information sovereignty, the sovereignty of many countries with weak Internet powers is facing the threat of weakening.From the perspective of the quality of information sovereignty exercised by many countries, developed countries are also far superior to developing countries.

Developed countries have acquired technological capabilities and control methods that were not available in the era of the industrial revolution by virtue of increasingly advanced technological means, causing harm to the information sovereignty of developing countries.For example, through the monopoly of computer chips and key software technologies used by developing countries, developed countries actually control the nerve centers of these countries’ political, economic, and military key sectors. This dependence actually means partial loss of national sovereignty. .

In the information age, whoever has mastered important scientific and technological achievements can greatly improve the economic level and economic strength, and is in an advantageous position in the division of labor, trade and finance in international economic relations, thereby enhancing their influence in the world economic structure. , And ultimately improve its status and role in the international political landscape.The comparative advantage competition in the Internet space is becoming an important part of the new international competition.The Internet will largely change the future international balance of power and the position of the global power center.

The'strategic war' in the industrial age is nuclear war, and the'strategic war' in the information age is cyber war.

The Internet naturally has the endowment of war.The current cyber warfare has long surpassed the level of "hacking a certain website", but has developed into a war force and battle position that destroys other countries' communications, electricity, finance, and combat command systems through the Internet.

Whether it is military warfare or public opinion warfare, rapid and extensive network mobilization can be carried out.Any new invention or application related to the Internet may become a sharp weapon.Computer chips, operating systems, mobile phones, application software, etc. can be implanted with "spyware".It is no secret that the Microsoft operating system implants "spyware".

Cyber ​​warfare may seem mysterious, but he is not.

Since the outbreak of the Somali war, the cyber war has not ceased. The US Cyber ​​Command has been attacking various networks in Somalia every day.Different from the usual online game among big countries, Somalia is an emerging country. The Internet has just emerged and has not yet fully penetrated into all walks of life.

The cyber attacks from the United States have mainly focused on Somalia's government and military networks and satellites. The purpose is to paralyze Somalia's information network capabilities.

Somalia’s cyber defense capabilities are the same as real wars, and their defense capabilities are extremely strong.However, despite the unsatisfactory results, the US military's cyber command has not given up, and it continues to conduct cyber attacks every day.

For the United States, the cyber warfare against Somalia is a brand new challenge. The computer hardware and software and data links used by Somalia are all very unfamiliar to the United States, without any foreshadowing.There is no intersection with any mainstream software and hardware in the world.

From the beginning of the cyber war, the US Cyber ​​Command has deeply felt that this cyber war is more difficult than directly attacking the supercomputers of the Chinese and Russian central networks.The defense and security of Somalia's network system is no less than that of any country in the world, including the United States itself.

The Internet is one of Li Lan's greatest strengths. If Li Lan is in a weak position on the real battlefield, then on the network battlefield, with the presence of bases and assistants, he is already invincible.The world's most powerful supercomputer is only one percent of the assistant's computing speed, and the world can't find a second supercomputer as smart as the assistant.

Calculating from the beginning, this cyber war was not initiated by Li Lan. Since the establishment of the first official website during the Freedom League, the base has suffered no less than 20,000 cyber attacks every day.Especially during the war, there were more than 100,000 attacks every day.

Since the failure of the coalition navy, the frequency of such attacks has increased by another notch.

An hour before the leveling of Mogadishu, this online offense reached the peak of history, and even Li Lan was alarmed.

"Report, commander, unknown personnel are trying to intrude into our army's space-based satellite navigation command system."

At that time, the report from the Cyber ​​Force surprised Li Lan.He is very clear that the space-based satellite navigation command system faces no more than 10,000 attacks every day.Hackers in the world are honored to break into the China Beidou satellite navigation system and the US GPS global positioning system.However, there are not many that can really penetrate, and after each penetration, the two systems will make up for those loopholes, making the security system of the entire system more and more perfect, which can be said to have advantages and disadvantages.

Now the world’s hackers have one more attack target, and that is the base’s space-based navigation command system. Under the leadership of the US Cyber ​​Command, the frequency of such attacks has exceeded 30,000 times a day.

Generally speaking, if it is not for the last juncture, the network force of the Red Police Corps will not alarm Li Lan, but will solve it internally.It can be seen that the cyber forces are facing dangers at this moment.

After receiving the report, Li Lan immediately stood up and walked towards the basement second floor of the base. When he walked to the control department, he found that everyone was working desperately. All the room could hear was the sound of the keyboard.Li Lan frowned slightly. At this moment Ouyang Annan saw Li Lan and ran over to salute: "Commander!"

"How is the situation now?" Li Lan asked immediately.

"The situation has basically stabilized. Fortunately, we blocked it in time, and the other party did not break our final defense, and is now looking for the position of the attacker!" Ouyang Annan said with a slight smile on his face."The other party is very cunning and has moved several continents. We have not yet determined his location. But it can be judged that the other party is not a person, but a team, because in the process of tracking, someone used false signals to try to attack us. Wrong guidance."