Red Alert Somalia

Chapter 410: The Coalition's Cyber ​​Disaster Day

"We must catch them!" Li Lan let out a sigh of relief, then said solemnly.

"The opponent came in very quickly. It seems that they have been prepared for a long time. It should have been probing for a long time before choosing to attack independently. It's just that he doesn't know how many lines of defense we have in the final core!" Ouyang Annan said with some luck. : "But some of the external data is still deleted by him or infected with a virus. We are working hard to repair these data. It is still not sure whether he planted an electronic virus bomb in our peripheral system!"

"Will these things affect this operation?" Li Lan said that the network intrusion plan has been formulated.

"It will affect a little, but it doesn't matter. We have already got the help of our assistants. We can quickly eliminate hidden dangers and ensure the security of the rear network after the invasion begins." Ouyang Annan said helplessly."However, we need some time."

"How long does it take?" Li Lan frowned slightly and asked.The success and failure of a network intrusion is related to the success of the actual battlefield, because after a successful network intrusion, multiple counterattack tactical plans will begin. At this point, there must be no mistakes, otherwise the subsequent wars will be impossible to execute.

"The electronic virus bomb is found, we are dealing with it!" At this time, a person ran over and said: "We have chased the other side, it should be an attack by the US cyber army! We are now fighting with them for control of their computers!"

"It seems that it will take about an hour!" Ouyang Annan thought for a while: "The other party can't just have an electronic virus bomb, there may be other things. We need enough time for maintenance!"

"One hour!" Li Lan's brows tightened when he heard this, and he looked at the watch in his hand.The hour hand has already pointed in the direction of one o'clock, and the first wave of offensive will be launched in another one and a half hours, and the subsequent air force suppression will also require the support of the space-based satellite navigation command system. Now it takes an hour to restore the system to normal operation!"Don't you know the whole plan? One hour is too tight?"

"If it weren't for the help of a supercomputer, we would have spent ten hours instead of one hour." Ouyang Annan of the space-based satellite navigation command system said helplessly: "We will do our best to accomplish this. This task."

"In that case. Then leave it to you." Li Lan knew that something was anxious and could only say helplessly.The plan that had gone smoothly became a shadow at this time.

In the United States, the personnel of the U.S. Cyber ​​Command, who barely got rid of Somalia's tracking, were relieved and lay half on their chairs.

"Spark, if you didn't build a realistic attack location at the end, we might really lose to the Somalis this time!" said a captain rubbing his eyes.

"God! I thought we could easily break through their defenses. But I didn't expect the cunning Somalis to set up a more perverted defense at the end!" Before Spark could answer, another officer shouted loudly."They didn't even leave the back door to themselves. Are they not afraid of the wisdom produced by that supercomputer? It is really evil, we should destroy him! I left dozens of electronic virus bombs in him!"

"Enough! Jesse, if you weren't there for delaying time, could we be chased by the Somalis like this?" Spark said a little angrily: "Now we have been exposed. The attack by the Somalis may be coming soon. Be prepared for defense!"

"Yes, Jesse. I think if God didn't let us create this kind of thing, but let the Somalis create it, I think we're done!" the captain who started talking said again."Okay. Guys, ready to start! I think the Somalis are already a little bit irritated by now. We need to build something to delay them."

"Jesse, you and Jace are responsible for processing the information just downloaded from the download!" The captain gave orders one after another, and the entire headquarters became busy again.

————

In the base network center, Li Lan had not left yet, a staff member ran over and said to Ouyang Annan in front of Li Lan: "We are lost, but it is certain that the Americans did it. From the scope of our attack and From what has been checked, we can judge that the Americans want to know what we are doing now, and also want to know the deployment of our army!"

"Is the mission leaked this time?" Li Lan suddenly interrupted him. This is his biggest concern, and it is also related to the lives of hundreds of thousands of soldiers.

The staff member shook his head and said with a relaxed expression: "They didn't break through the final core department, they only took away some insignificant things, and some were fake documents we made. Perhaps these fake documents will help. Us. But, I hope we can’t just sit back and wait for death. If so, the Americans will attack us unscrupulously.”

"It's necessary to fight back!" When it comes to counterattack, Ouyang Annan reversed his previous seriousness, but on the contrary, it was a cynical smile, slightly triumphant and sinister.

Seeing the smile on the face of this heroic character in front of him, Li Lan suddenly calmed down and said, "You have an idea!"

"Yeah!" Ouyang Annan nodded, the insidious meaning in his smile obviously increased a bit, and said: "The means have been there for a long time, originally this is just a small egg after the attack, now we can only let the enemy taste it first. "

"What do you plan to do?" Li Lan asked again.

"It's very simple. Just use the old method decades ago to send messages and e-mails, and the entire network is completely blocked." Ouyang Annan said.

"Does this thing work now?" Li Lan asked with some suspicion.

"Please rest assured, the commander, let alone the old-fashioned method, but it is still effective. Of course, this requires the cooperation of assistants. The flow of hundreds of millions of emails and hundreds of millions of messages per second is enough to completely paralyze the enemy's civilian network. Of course, you have to think about it. Completing such an attack requires the cooperation of an assistant! Only intelligent programs with such super computing power in the world can accomplish such a feat." Ouyang Annan said very excitedly.

"If you are so sure, then do it!" Li Lan didn't have a detailed concept in his mind, and he was not almighty.He doesn't understand many technical things on the Internet.But one thing is enough, as the base's first hero-level scientist.I'm a computer professional, so I have to have a few brushes in my hand.As long as he understands this, he can rest assured that Ouyang Annan will toss.

"I promise there is absolutely no problem, otherwise I won't have sex with Ouyang." Ouyang Annan patted his chest and promised straight.

"Haha!" Li Lan shook his head, and didn't bother to say anything to this guy who always liked to make fun of his surname.

Now that the plan is finalized, there is no time to delay.Under Ouyang Annan's operation, the assistant quickly received a large number of compressed message packets. These compressed message packets were sent to the United States, France, Italy, and Japan at a speed of more than 200 million times per second. It is constantly being sent out through the civil networks of the four countries and various media information channels in the four countries.

In just two short minutes, everyone felt that something was wrong.In the four countries, each website and media organization and various companies’ online media.Private mobile phones and computers have received a large amount of information and documents in a short period of time.It doesn’t matter if there are only dozens of them, but there are hundreds of them, especially those large-scale network media organizations, which receive more than 10,000 spam messages at once.The network of government departments and financial institutions in four countries.It is the focus of attention. When netizens from the four countries wanted to log on to the website, they realized that they could not open anything.

Banks, government agencies, stock markets, and other networks soon crashed, all data was basically out of circulation, and all traffic was occupied by spam and emails.All cash machines and portable network devices.Also all suffered.All networks in four countries, in half an hour.All came to a halt.

"Stuck, it's so hard to send an email!"

"Don't squeeze, let me tap!"

"I'm mm, will you let me do it? I only do a hundred times!"

"There is no way to even withdraw money, what the hell is going on!"

...

Cursing in front of computers on various occasions continued, and classic lines kept popping out.What's more different in the past is that although these lines are very ridiculous, no one laughs at them.

While the U.S. network was being tested, the base network was also being tested.All the spare servers were turned on, which just met the crazy operation of the assistant, and the amount of sending was increasing as much as possible.On the contrary, it is an assistant, and it feels very fun, and I am not tired of it.

The first wave of attacks on US military websites was paralyzed at the same time.Some U.S. portals that can smell a bit of war have voluntarily shut down their websites.

"Jessie, I don't think we can do anything. Somalis are crazy!" Spark was still busy and was still depressed about why the internet is so stuck, but he quickly understood the truth.Information sea tactics make all your cyber hacking methods useless. This kind of helplessness is also a kind of sadness.Sometimes the dumbest method is often the most effective method.

The madness of the Somalis has forced the United States to temporarily shut down its network services abroad when it is forced to do so.In the cyber war that lasted less than ten minutes, the Somalis used Foolish Father to move mountains and Jingwei to fill the sea to let the Americans know that infinity is power.The United States could not bear it, and so did the other four countries. Italy collapsed first, followed by France and Japan.

All the financial industries of the four countries crashed instantly, no money was obtained, all transfers and remittances also failed, and the entire country's economy stopped in an instant, and then it retreated rapidly.

At the same time, some countries with poor relations between Europe and Somalia have also shut down their own network services to foreign countries.As a result, the economies of some countries have suffered a certain blow.In particular, NATO cyber security agencies have suffered a lot of congestion, causing many NATO countries to fall into a cyber crisis.As for the various complications that occurred afterwards, no one had thought of it, which also put Somalia's European policy into a certain crisis.

When a large area of ​​websites all over the world could not be opened, Li Lan realized the real power of the assistant. The deletion speed of the other party was not as fast as the receiving speed. The passively closed servers are the best assistants. masterpiece.

Under the indiscriminate bombardment of tens of trillions of news, no one can bear it.Netizens in the four countries of the United States, France, Japan, and Italy have at least experienced more than six hours of no network time, and the economic loss is a huge astronomical figure. There are also many servers and mobile phones because they cannot withstand the huge traffic. , Resulting in hardware damage and system chaos.

And this is just the beginning. When the base's cyber forces started to counterattack, the cyber security forces of various countries who were fighting fires suddenly fell into more crisis, the most serious of which was the US Department of Defense.This is known as the most powerful network firewall in the world. Under the cooperation of assistants and many network masters at the base, the layer of defense network was quickly torn.

This world-class cyber tsunami has also attracted countless cyber masters from all over the world, especially those from Russia, China, Iran, North Korea, Pakistan and other countries. In addition, many private cyber masters around the world have followed the Somali cyber forces. Behind, fish in troubled waters.

Led by the absolute main force of the assistant, with more than one million attacks per second, various network security measures have been rapidly dismantled, and there are still ignorant network virus bombs ambushing all kinds of information. The fast speed spreads wildly in the world network.

More than 100,000 cyber masters of the US Cyber ​​Security Command tried to prevent such crazy attacks, but the results were all in vain.The firewall of the US Department of Defense, which took decades to build, was ruthlessly torn apart layer by layer.

In just half an hour, a large number of military network institutions and satellite control centers of the US military and NATO were completely paralyzed. The most direct disaster was that many countries were unable to contact their troops, and the network and data links were completely ineffective.

What is most unacceptable to the United States is that a large number of military secrets have been stolen, and various war secret documents have also been downloaded in large numbers.When the wave of attacks began to fade, the US 100,000 cyber troops took a look at the last firewall guarding the Department of Defense network.But when they started trying to repair the network, they discovered that the attackers had left countless virus software and false information. It would take at least forty-eight hours to clean up these junk and viruses.During this period, the military network will remain paralyzed.

ps: Gorgeous doesn't know anything about the Internet, I hope everyone will not be too serious.Occasionally, it is the need of the plot. It can only be used to catch the ducks on the shelves.In the outline setting, the assistant plays an important role in protecting the base's network security and network attacks. This can be regarded as a big bug in the protagonist's technology. Like the base's defense circle, it is a bug-level existence.