Volume 8 Hundred Years of Resentment Chapter 47 Information Network Warfare
122nd of 27, a day that should always be remembered.
After busy all night, Ai Yu was finally able to breathe. After placing a takeaway order for a fast food restaurant that was open for business online, Ai Yu went to the bathroom to take a cold shower. The weather this year was particularly abnormal. Although it was late 10 months, the temperature in the morning was still very stuffy.
After taking a shower, Ai Yu had just put on his pajamas and a doorbell sound came downstairs. At about 15 o'clock, the staff of the fast food restaurant delivered the takeaway to the door, which was very punctual.
While chewing the original old Beijing fried dough sticks and drinking soy milk squeezed from Northeast high-quality soybeans, Ai Yu sat in front of the computer and entered a string of passwords on the space simulation keyboard. Some character information that ordinary people thought was meaningless appeared on the three-dimensional screen.
Where did the Military Intelligence Bureau get these software?
Ai Yu thought about doing the last check of the work results last night.
No matter how powerful a hacker is, he is still a human being. Although customers are masters of computer programs, the outside world has always been mythical about the hacker's ability. Generally speaking, hackers only write some mini programs, mainly using vulnerabilities in other people's computer systems to steal information from computers.
Ai Yu faces a huge "cloud program".
The so-called "cloud program" is a large program composed of a series of programs and applied on the network. Each mini program has its own independent functions and can still be used after being disassembled. More importantly, when all mini programs work together, it can generate a huge "destructive power".
Ai is only responsible for writing one of the procedures, and the rest are provided by the Military Intelligence Bureau.
Although the bureau has thousands of intelligence analysts and the cybersecurity department, thousands of programming experts are known to Ai Yu. These programs are definitely not written by technicians in the military intelligence bureau. They come from other hackers. To be precise, they come from other "red guests".
What exactly does the Military Intelligence Bureau want to do?
Ai Yu took a sip of soy milk and her eyes returned to the curtain.
This "cloud program" is not clearly targeted, nor is it intended to steal important information. It is entirely used to destroy and paralyze the "information bomb" on the network.
Ai Yu had already vaguely realized the purpose of the Military Intelligence Bureau.
After checking the last "subprogram", Ai Yu connected to the military intelligence network.
"Are you finished checking?"
"It has been checked and can be used at any time."
"Very good, it seems we didn't choose the wrong person." Liu Xiaobin on the virtual screen showed a satisfied smile. "Now we are entering the second stage of the action, and the instructions are in your folder."
Ai Yu frowned and called out the folder set up by the Military Intelligence Bureau for him.
"The old rules, the documents will be destroyed by themselves. In fifteen minutes, a team of agents will come to pick you up."
"Why?"
"For your safety, we must take you to a safe place and then give you freedom in life after the end of the call."
"You..." Ai Yu was shocked.
"As for the order, there are still fourteen and a half minutes."
After the communication was over, Ai Yu dared not hesitate and immediately called up the command file in the folder.
After reading the instructions, Ai Yu's eyes widened in surprise.
After only half a minute of hesitation, Ai Yu completed the rest of the operation according to the instructions of the Military Intelligence Bureau. When he turned off the computer, the sound of emergency braking of the vehicle came from outside.
Five agents rushed in, and two people took Ai Yu away. Three people outside the house set up bombs in the room.
"What are you going to do?"
"Action as planned." The agents led the team looked at the young man, "All items in the room will be destroyed. They will provide you with a more advanced computer system after the operation is over."
“My profile…”
"It has been uploaded to the secret server and there will be no losses."
Ai Yu gritted her teeth and gave up and struggled.
To be precise, the agents used not bombs, but incendiary bombs.
When the convoy left the neighborhood where Ai Yu lived, the fire brigade's vehicles had just arrived, and nearby residents were awakened by the sudden fire. The specially made incendiary bombs could generate thousands of degrees Celsius, which was enough to melt the steel high temperature. Even if the fire brigade extinguished the fire at the fastest speed, it could not save the electronic equipment in the room.
Almost at the same time, hundreds of equally bizarre fires occurred in dozens of other cities.
After receiving the messages sent back by various field teams, Liu Xiaobin breathed a sigh of relief.
"It's started?" Li Cunxun had just completed the deployment of another round of operations.
"It's done, all hackers involved in the 'Liaoyuan' operation will be evacuated safely." Liu Xiaobin glanced at his watch and said, "In about four hours, the first batch of hackers will arrive at the secret base in the northwest. According to the plan, they will all be regulated before the war ends."
Li Cunxun nodded and said, "How is the action going?"
"It has started, and the effect will be seen soon." Liu Xiaobin smiled and said, "It's only 7:40 now, and Tokyo time is about 8:40. In about 40 minutes, the first 'information bomb' will be detonated on the server of the Tokyo Stock Exchange Center. Let's wait and see the fun."
It's not just watching the fun
Xun and Liu Xiaobin.
At 9:30 Tokyo time, with the opening of trading on the Tokyo Stock Exchange, the whole world is watching the fun.
Because the server was suddenly attacked, the assets of tens of millions of investors were instantly cleared, and the Tokyo Stock Exchange was in chaos. Within a short time, the exchange's service phone number and the external service phone number of relevant Japanese government departments were blown up by angry and terrified investors.
At 9 o'clock, the servers of "Yamato Telecom" and "Full-day Wireless Information" were attacked.
Although the two telecom companies have the most advanced network security technology in Japan, within just one minute, the servers of the two telecom companies were hacked by "hackers" and Japan's communication facilities fell into a state of paralysis.
In modern society, communication paralysis means that the neural network of the entire country is interrupted!
After 0 o'clock, the Ministry of Information and Industry of Japan launched the satellite communication system according to the emergency plan.
Although the capacity of the satellite communication system is far less than that of the fiber optic communication system, in special circumstances, keeping information smoother than information flow is more important.
At 5 o'clock in the morning, the phone at Li Cunxun's desk rang.
He glanced at Xiaobin, but Li Cunxun did not answer the phone.
"I'm Xiaobin... OK, I know." Putting down the phone and microphone, Liu Xiaobin smiled coldly and said, "It has been confirmed that Japan's communication satellites are undergoing orbital maneuvering and will be in place in about fifteen minutes."
"Contact the General Staff, it's time for them to take action."
Liu Xiaobin nodded, picked up the telephone and told the General Staff the news.
At 0:20, five ground "military communication stations" located in northeastern Republic, Wonsan, North Korea and other places entered combat readiness.
Each communication station has one or several sets of "laser satellite jamming systems".
With the start of these interference systems, the "low-orbit high-frequency communication transit satellite" that had just moved the orbit and reached the sky above Japan immediately became the target of public criticism.
The so-called "laser satellite jamming system" is actually a simplified version of the "ground-based laser interception system" being developed by the Republic. The "ground-based laser interception system" is mainly aimed at ballistic missiles and low-orbit military satellites. Because of its technical difficulty and high energy levels, it has not been successfully developed. The improved "laser satellite jamming system" cannot shoot down ballistic missiles, nor can it completely destroy military satellites, and can only destroy electronic equipment on the satellite.
At 0:25, 1, the communication antennas of the Japanese communication satellite were burned.
It was not until after 11 o'clock that the Japanese government realized that it was not a hacker from a certain country that attacked Japan's information network system, but a certain country!
At 11:15, Sadashi Murakami received the news.
The war broke out!
The Japanese Prime Minister made a very accurate judgment. Although Sasashi Murakami had enough reason to believe that the attack on Japan's information system must be China's electronic information warfare troops, there is no evidence to support Sasashi Murakami's speculation, and there is no way to blame China.
What made Sadashi Murakami even more annoyed was that is, is this a war act?
At least until now, no country and any international organization have counted attacks on information networks as acts of war.
In fact, except for the attacks on each other's financial networks during the "East Sea War", no country can attack the other party's basic information network facilities in the war.
Even if it can be proved that it is China dealing with Japan's information network, it is difficult for Japan to start a war with China.
Besides, Sadashi Murakami doesn't want to go to war with China.
After letting the technical department stabilize the financial information system first, Sadashi Murakami had no choice but to do anything.
What can China’s attacks in the field of information networks show?
Nothing can be explained!
At least in Sadashi Murakami's view, China's sudden attack was not to defeat Japan. It is impossible to destroy Japan's information network by simply destroying Japan. After all, important information from any country is backed up, and as long as the attack is over, it can be restored within a few hours. If China is preparing to start a war against Japan, the first thing it needs to attack is not Japan's basic information network, but Japan's nuclear facilities.
When Sadashi Murakami considered this issue, other countries, including the United States, also realized that it was China that attacked Japan's information network.
What exactly does China want to do?
At 15:30 Beijing time, the Republic's Defense Minister Ye Zhisheng set out for Islamabad.
Although the Republic has not announced the relevant news, in the eyes of the outside world, Ye Zhisheng's trip to Islamabad at this time must be discussing joint war with Pakistan on behalf of Wang Yuanqing.
Is China's purpose of cracking down on Japan's information network to deal with India?
It seems that the two are not much related; in fact, there is a close connection between the two.
When China starts war with India, the most worrying thing is that Japan is making trouble behind the scenes. As long as Japan is unable to take care of itself, China can safely deal with India.
Chapter completed!