Chapter 339 Hacking in Progress
In the 1991 Gulf War, the United States defeated Yinlak's 2.4 million-strong army in just 42 days at the cost of 146 sacrifices.
And this battle also woke up the whole world!
This was the first truly modern, large-scale war.
Before the Gulf War began, Saddam once arrogantly believed that the outcome of the war depended on ground troops.
However, as the time entered the 1990s, most of the equipment of the US military, after decades of development after World War II, was far ahead of the world (except the Soviet Union).
During the war, the U.S. military stunned the world by displaying new equipment such as stealth fighters, electronic warfare aircraft, armed helicopters, strategic bombers, cruise missiles, and precision-guided bombs.
at this time.
No matter how dull you are, you have already realized that information warfare has become the main theme of future wars.
April 12, 2004.
In the past half month, multinational forces have deployed thousands of fighter planes every day to conduct carpet bombings on targets of slight strategic significance in Yinlak.
Saddam's staff believes that this is definitely the US military clearing obstacles for the next ground advance.
Next, there will definitely be big moves.
The situation is on fire.
After repeated consideration, they have decided to launch a revenge plan in advance!
....
Akiva and Kane walked side by side into a residential building in New York.
They carefully closed the door and looked at their surroundings through the glass window.
It was working time at this time, and it was quiet outside, except for the occasional few luxury cars passing by on the road.
】
This community is a high-end residential area, and most of the residents are senior white-collar workers from large companies.
The security of the community is responsible and few outsiders can enter.
Americans monitor bank ATM transfers and withdrawals very strictly.
As long as there is a cash withdrawal of more than $10,000, the early warning device will be triggered in the background to alert the FBI that there may be illegal activities using cash transactions.
This brought a lot of trouble to the Mujahideen organization headed by Akiva.
Many organization members do not receive sufficient funding for their activities, and some activities currently being carried out in the United States have also been restricted.
In order to have a place to stay without interference, Akiva smuggled a kilogram of "hard currency" and sold it to the local mafia to raise the funds needed to purchase the house.
In addition to the two of them, there were six or seven people in the living room. Everyone had a computer in front of them and was concentrating on operating it.
Hearing the footsteps, they all turned their heads and grabbed the "nail" in front of the computer.
When they saw the leader coming in, they relaxed their vigilance and returned to their original appearance.
"Are you all ready?" Akiva glanced around the men in the living room and asked in a deep voice.
"Ready!"
There was a low but firm reply in the living room.
Each of their eyes showed a look of determination.
Kane, who was standing aside, raised his left hand, looked at his Rolex watch, and reminded him: "It's almost time, and other team members should be in place."
Akiva looked serious, looked at his subordinates one last time, and waved his hand: "Then let's get started!"
The seven people in the living room immediately opened the program and started operating according to the plan.
Akiva and Kane each found a free computer, sat down, and started the hacking software.
They nervously began to invade a popular American music website.
Some time ago, they exploited loopholes to invade this website and left a backdoor.
Therefore, the invasion speed this time was also very fast.
It only took a minute or two for them to gain control of the website and crack the password of a website administrator who was temporarily offline.
Akiva took out a CD and replaced the website's player and playback source with one of the modified online music player software.
A facilitator passed a top ten song downloaded the day before yesterday through a processor and made some changes.
The modified song has increased the number of bytes by more than ten kb.
Usually, no one will notice this subtle change.
When a user of the website clicks on this song, Akiva's modified player will hide the modified song file under the main control program and reside in the cache while the user reads the cache.
in memory.
Akiva looked at Kane next to him, who was also skilled in the operation, and full of malicious expectations that more people would click on these altered songs.
Thinking about it, since they can enter the top ten of the list, they must be popular songs and there should be quite a lot of people clicking on them.
Akiva is a Yinlak man. To be precise, he is a member of the Yinlak intelligence organization.
His job is to intercept the emails of the US military through the Internet, and then judge the specific combat plans of the multinational forces led by the US military from the bits and pieces of information in these emails.
In fact, as early as 1991, during the first Gulf War, Saddam had fought a beautiful ambush by the US military through the support of intelligence personnel.
Since then, he has enjoyed cyber intelligence warfare.
To this end, he also specially trained thousands of cyber intelligence personnel and spread them to the United States, specifically responsible for invading the Pentagon database and searching for useful network information.
However, in recent years, due to the rapid replacement of computers, many loopholes have been plugged by Microsoft, making it increasingly difficult for them to obtain useful information.
Akiva is the leader among these cyber intelligence agents.
While searching for various intelligence on the Internet, he also met a group of top hackers from all over the world.
Kane is one of them.
Through several years of interactions, he had a clear understanding of Kane, a computer engineer from the former Soviet Union.
He was once an employee of Intel, but was later fired and became a hacker, making a living by helping people collect trade secrets.
Kane is full of anger towards the United States and Intel.
After the disintegration of the Soviet Union, the United States has been targeting Eastern Europe, and people from the former Soviet Union/Maoist Russia have become the targets of their hostility.
An "old man" like Kane still feels sad about the collapse of the Soviet Union deep in his heart, and such emotions are often revealed both inside and outside his words.
Therefore, he became a victim seven or eight years ago and was fired by Intel. He went from being a decent software engineer to becoming unemployed.
In the end, I even had to use my software knowledge to make money and maintain my life.
Akiva has been in contact with him for many years, and gradually determined his reliability, gradually developed him, and absorbed him into Yin Lak's intelligence organization.
This time, the multinational coalition led by the United States increased its bombing of targets in Yinlak.
There are rumors in the world that the United States has completely lost patience with the sanctions against Yin Lac over the years as international oil prices continue to soar.
They have made up their minds to occupy the entire territory of Yinlak and seize Yinlak's oil.
The Yinla people were very nervous about this.
Since the Americans entered the Middle East, the oil underground in Yinlak cannot be converted into U.S. dollars, and international products cannot be purchased.
Yinlak, which was once prosperous, is now in decline.
A large number of vehicles and equipment parts were damaged and could not be replaced. It was difficult for Saddam to maintain an army of one million people, and morale began to gradually decline.
Although there are still more than 700,000 people in the Guard after reorganization, facing the multinational force led by the United States, the chance of victory is still very slim.
Under Saddam's personal command, Akiva stepped up his search for US military intelligence.
At this moment, Kane suddenly gave him an idea.
Kane said that the support point of the United States is its economy. If some method is used, the economy of the United States will be severely damaged.
Faced with the continued deterioration of the economy, it is difficult to say whether it can continue to use troops against Yin Lak and whether it still has sufficient financial resources to support it.
The method proposed by Kane was actually mentioned accidentally when he was communicating with a top hacker.
After a long discussion between the two, combined with Kane's technical details about Intel, they compiled a quite feasible attack plan.
Chapter completed!