Chapter 232 You are so good, it makes me very stressed.
Fort Meade, Maryland, North America.
NSA.
This is a building complex that is far larger than the CIA headquarters.
Within it, there are as many as 68,000 talents related to cryptography, language translation, and electronic technology.
And it has more than 4,000 listening stations, more than 200 spy satellites, and more than 300 supercomputer systems around the world that can monitor 1 million phones at the same time.
It can be said to be the largest monitoring center in the world today.
It is not only responsible for monitoring important targets considered by North America on a global scale, but also responsible for monitoring the telephone business of North American people, and monitoring North American and global network activities through the second key of the win system - NSAkey.
During the Klin administration.
Influenced by the Smith family, the NSA conducted large-scale surveillance and eavesdropping on Sanyuan Agriculture.
For example, the technical staff who followed Mrs. Smith on her first visit to Ten Mile Camp grafted ‘eavesdropping branches’ on many large trees.
The device is no different from an ordinary tree branch, but it can monitor sounds within a radius of 10 kilometers.
Another example is the remote control command of some tourists to throw some bean-like eavesdropping devices into certain areas that are not frequently cleaned, but can prevent birds and animals from swallowing them.
But Yu Sanyuan seemed to know this and never discussed corporate strategy with a think tank, or even set up a think tank.
In addition, certain words, such as praising Madam and thanking Madam, cannot be delivered to Old Smith.
As a result, the NSA's surveillance and eavesdropping on Sanyuan Agriculture provided very limited help to the Smith family.
Now that the Clinton administration is about to be disbanded, the NSA has taken refuge in the Bush family in advance in order to obtain more funds and resources.
And according to Lao Bu's instructions.
The NSA needs to invade, steal, and paralyze Sanyuan Agriculture's computer system within a short period of time.
Normally, this requires the use of a large number of hackers.
However, the advent of the graphics card matrix has made it difficult for traditional hackers to participate in large-scale capital games.
Because hacker techniques include targeting the target website - watering hole attack, blocking server resources - Dos attack, forging emails or URLs - spoofing attack, hiding code - Trojan horse, inserting code into vulnerabilities - script attack...
But no matter which one, even if a virus program is written, it still needs to lurk and be transmitted.
It even requires a lot of simple and tedious operations, constantly looking for website vulnerabilities, constantly changing IPs to prevent tracking, and constantly directing teammates to coordinate attacks.
The graphics card matrix consists of tens of thousands of graphics cards. If you write a set of programs and use distributed parallel processing technology, this is equivalent to tens of thousands or even hundreds of thousands of hackers attacking at the same time in a few tenths of a second. A point.
Or rather.
Hackers are like a group of stock investors buying lottery tickets. If they want to win the jackpot, they need to calculate a probability value through massive calculations, but they may not succeed in the end.
The graphics card matrix is like tens of thousands of people buying lottery tickets at the same time.
And tens of thousands of people kept buying lottery tickets at the same time.
Even hundreds of thousands of people buy lottery tickets repeatedly at the same time.
Who is faster?
Who has a higher probability of winning?
And the graphics card matrix can also act as a firewall for the server, forming tens of thousands or even hundreds of thousands of defenses.
Even if someone organizes hundreds of thousands of hackers to break through this defense in a time-consuming and labor-intensive manner, it can still reconstruct tens of thousands or even hundreds of thousands of defenses in a few tenths of a second.
Therefore, the graphics card matrix is not a product that people can face at all.
It can even be said that it rewrote the history of computing.
Therefore, considering the importance of the Eastern market, North America awarded Pingdong Science and Technology Bureau the highest honor in the computer field - the Turing Award.
The NSA, under Lao Bu's instructions, must first consider the graphics card matrix of the Pingdong Science and Technology Bureau to attack the Sanyuan Agricultural Computer Network.
Otherwise, traditional hacking methods will be used to alert the other party, and the data from the graphics card matrix will flood into the NSA headquarters. The NSA firewall without the graphics card matrix will be breached in an instant.
By then, computer systems, various databases, and various dedicated websites will all fall.
To this end, the NSA used a large amount of resources to obtain the backdoors retained by the manufacturers through graphics card manufacturers, motherboard manufacturers, chip manufacturers, etc., and directly damaged the electronic equipment of the Pingdong Science and Technology Bureau.
After confirming that the graphics card matrix there was completely paralyzed, the NSA used hacking techniques to attack the networks, websites, and servers of the three series of industries.
…
NSA command center.
The head of the NSA, 56-year-old Michael Hayden, stood in the hall wearing glasses, looking up at dozens of splicing screens that were constantly beating.
"Success?"
"Yes, Director, we have obtained the encrypted data string containing characters such as ballastless track technology, steel recycling technology, etc., and are currently attacking the internal network of Xintai City where Sanyuan Pharmaceutical is located. Perhaps we will soon be able to extract data from the server there. , obtain the genetic optimization technology of three-dimensional agriculture.”
"Well done!"
Michael Hayden nodded and took out a piece of information, "Make it public."
If the NSA uses hacking technology to break through the Pingdong Science and Technology Bureau’s firewall, the NSA can use “I am not a hacker” to avoid responsibility.
However, the NSA uses manufacturer backdoors. Without exposing the existence of the NSA and the manufacturer's backdoors, North America is bound to release some sensational news in order to confuse the public.
Coincidentally, since last year, hackers from the East and North America have been attacking each other due to various practical problems.
This attack on Sanyuan Agriculture can be described as "Eastern hackers attacked the website of a North American security agency, and the North American security agency fought back, accidentally injuring Sanyuan Agriculture." ’
As for whether to ask for compensation...
That's Lao Bu's business and has nothing to do with the NSA.
A little bit.
The NSA’s superior, North American Defense Systems, disclosed the news of the ‘Hacker War’.
The news not only pointed out the North American hacker organization headed by GP, but also the Eastern hacker organization headed by Hongke Alliance. It also announced that it had temporarily raised the alert level of North American network information security.
Then an early warning was issued to Sanyuan Agriculture.
North American Defense Spokesperson: "Just now, we have intercepted multiple messages that the hacker alliance intends to seize the graphics card matrix of Pingdong Science and Technology Bureau. Here, we hope that Sanyuan Agriculture will respond as soon as possible and make the greatest contribution to world peace and development. effort……"
…
other side.
The person in charge of Pingdong Science and Technology Bureau felt that the sky was falling when he saw four-fifths of the graphics card matrix destroyed.
After all, this is a graphics card that the superiors are selling out.
Now that so much has been ruined, he must be held responsible.
Of course, living in Shili Camp, what he is most worried about is not his future, but that without the graphics card matrix, Sanyuan Agriculture's servers are equivalent to being defenseless.
The enemy's intention is obviously three-dimensional agriculture.
He can be dismissed and investigated, but his wife and children cannot have a future.
The person in charge of Pingdong Science and Technology Bureau quickly took the factory's emergency rail car and rushed to the northern suburbs of Fei City.
When he entered the chairman's office at the International Convention Center, he looked up and saw the spokesperson of the North American Defense System shouting "thief".
"Evil capitalist imperialism!"
Then he looked at Yu Yang.
"Director Yu, according to the damage details, it should be a North American hardware manufacturer that provides a backdoor for illegal organizations. This backdoor allows user mode (ring3) code to bypass the system protection mechanism and force free reading and writing of kernel mode (ring0) data. The depth of pollution is The embedded instruction set (DEIS) will eventually overload the hardware and cause heat damage. "
"We should protest against North America's use of military resources to engage and attack our businesses."
"And require the hardware supplier to compensate Pingdong Science and Technology Bureau for all losses, including the losses of Sanyuan Agriculture."
Yu Yang picked up the handwritten material and handed it over, "Is protesting useful? If it was useful, I would have protested early in the morning."
"..."
"Convene a press conference and publicize the content on the paper as soon as possible."
The person in charge of the Science and Technology Bureau looked down and said, "Thank you for the intelligence provided by North America? We will closely cooperate with North America in combating cybercrime and other illegal organizations?"
"Um."
"This, this... we have lost so much, are we too cowardly?"
"In terms of losses, after an hour, they were much bigger than us."
"???"
After the person in charge of the Science and Technology Bureau was stunned, he hurriedly agreed and was about to turn around and leave when he suddenly stopped, "Director Yu, shall I make the announcement?"
"yes."
"What's my position? I'm not the North American Defense Press Spokesperson."
"That's right, then, you can find the person in charge of the publicity system of the Shiliying Sub-district Office, who was the former director of the Investment Promotion Office, and ask him to select a spokesperson with a good image from the publicity system of the Sub-district Office and read out the manuscript."
"ah?"
"Your level is too high, and the director of the Investment Promotion Office is also a high level. We can only use this compromise method."
"..."
"They are all grass-roots teams, afraid of a ball."
"..."
Fifteen minutes later.
The spokesperson of the publicity system of Shiliying Subdistrict Office, a female college student who has just graduated from the Oriental Drama Academy, held a press conference on the hacker attack.
"First of all, on behalf of the Shiliying Sub-district Office and Sanyuan Agricultural Headquarters, I would like to express my heartfelt gratitude to the North American defense system for issuing the warning notice."
"And inform the defense system of North America that our police station will closely cooperate with North America in combating cybercrime and other illegal activities. Currently, our police station has tracked the suspected IP that is causing damage."
"We will launch a comprehensive arrest of the hackers in 40 minutes and work hard for world peace!"
………
at the same time.
The NSA's electronic technicians have been like a swarm of bees, overwhelmingly breaking into the Trade Hall, Sanyuan Agriculture, Sanyuan Construction, Sanyuan Building Materials, Sanyuan Heavy Industry, Sany Soybean Oil, Shili Mall, etc., and a series of Shiliying headquarters enterprises.
Now they are hijacking a large number of broilers, that is, puppet computers, passing through the Tai City network and flooding into the Xintai City intranet.
The NSA's deciphering personnel have already begun processing the three-series encrypted data obtained from the Shiliying headquarters.
Michael Hayden, the head of the NSA, laughed disdainfully when he learned of the statement made by the Shiliying Subdistrict Office.
"Tracing the suspected IP?"
"Are you kidding? Even if it's not a disguised IP."
"Given twenty years, can you track me down?"
The words are not finished yet.
The NSA electronic technicians who broke through the Xintai City firewall had just let out loud cheers. Suddenly, the sound suddenly stopped.
The next moment.
All the computers in the NSA lobby all had blue pages popping up.
Immediately afterwards, rows of familiar codes jumped out quickly...
"Report, our computer system has been invaded."
"Report, our key is being cracked, but the other party's progress is very slow. It is expected to take... twenty years?"
"Report, our server memory is being occupied, but the occupancy rate is very low, about 15MB per second, which can rule out the impact of data flood..."
Michael Hayden lit a cigarette, "Tell me, what happened?"
"Report, we found a very large cluster IP in Xintai City. Preliminary estimate is that it has at least 460,000 independent IP addresses."
"New graphics card matrix?"
Michael Hayden frowned slightly.
The graphics card matrix can certainly break through the NSA firewall.
But he didn't panic because the NSA had a large number of backup servers.
Even if the graphics card matrix can be broken one by one, it will still take a certain amount of time.
Moreover, all NSA data has undergone multi-layer encryption, and has been implanted with programs that forcibly crack the keys and self-destruct important data.
At this time, it was discovered that the hidden graphics card matrix may even be the most important server of Sanyuan Agriculture...
"It's a hidden graphics card matrix. Good opportunity. Cut off the power and network first, then activate the emergency server. Track this big guy. I want to destroy it!"
Accompanied by voice.
The characters on the blue screen jump more frequently.
The lights overhead also began to flicker on and off due to excessive power consumption and unstable voltage.
Immediately the entire hall fell into darkness. Then the backup power comes on...
The computer screen that was originally turned off suddenly restarted, had a blue screen, and continued to skip codes.
"Fuck!"
"Cut off all power!"
finally.
NSA headquarters, everything is plunged into darkness.
Only the green warning light in the emergency exit remains.
for a long time.
NSA head, Michael Hayden, "Activate contingency plan, counter-tracking!"
Five minutes later.
"Report, the administrator computer of the emergency system requires a password."
"Password? You asked me?"
"But it does require a password, otherwise we can't activate the contingency plan."
After hearing this, Michael Hayden hurried to the emergency center, found the administrator's computer, and found that the screen indeed prompted: Please enter your password.
He pondered for a moment, took out the handover handwriting of the previous person in charge, and searched for relevant records.
Unfortunately, they are all marked: No password.
Nonsense, how is it possible to set a password for the administrator computer of the emergency system?
After all, the NSA's firewall, as well as backup firewalls, are the entire agency's strongest defense.
If someone could break through the NSA's many firewalls, the emergency response system within the NSA would be ineffective.
So it doesn’t matter whether you set a password or not.
Moreover, if a password is set, important things may be delayed.
Such as now.
"password!!!"
Michael Hayden roared, summoning the elite code breakers, "Get it done!"
Two minutes later.
The NSA's codebreakers do have real skills.
He quickly came up with a set of more than 300-digit passwords that were mixed with Japanese, Korean, Thai, and various punctuation marks. The whole thing looked like gibberish.
After entering.
[Correct password]
[Please enter password]
"???"
The NSA codebreaker was stunned for a moment before retyping.
[Wrong password]
"???"
NSA codebreakers, enter again.
[Password is correct]
[Please enter password]
"It's a double-layered code that needs to be deciphered again."
Another ten minutes later.
[Password is correct]
[Password is correct]
[Please enter password]
"Three layers of password?"
for a long time.
Technicians disassembled the hardware of the emergency system administrator's computer and conducted inspections.
"The report shows that the main components, especially the memory, have been set with 460,000 layers of passwords. It will take about... twenty years to decipher them."
"..."
soon.
The office computers in the hall, including NSA servers and backup servers, have been tested successively.
"Report, the situation is exactly the same as the emergency system administrator's computer, and a password is required."
NSA head Michael Hayden was stunned on the spot when he heard this.
"Is there still such an operation?"
But this operation is indeed the most difficult.
Or rather.
If the graphics card matrix hidden by Sanyuan Agriculture breaks through the NSA firewall and steals data, the NSA computer system can use the self-destruct program to scrap all computers from the software layer and hardware layer, and then ask Congress for money to buy new computers.
As a result, Sanyuan Agriculture could not get any data, and even helped the NSA complete the replacement.
But now...
Sanyuan Agriculture uses a hidden graphics card matrix to replace the NSA's firewall and build hundreds of thousands more firewalls. Are they going to tell the Congressmen: We can't crack it?
Michael Hayden, the head of the NSA, lit a cigarette with a livid face, and a set of funny pictures from the East suddenly appeared in his mind.
An office worker was worried that his bicycle would be stolen, so he bought a lock and locked his bicycle on a telephone pole on the side of the road.
The other party thought this was foolproof, but when he returned from get off work, he found that the bicycle had been locked dozens of times by others.
And even the parts are locked.
At this time, should you find a locksmith company or give up on the bicycle?
If you look for a locksmith company, the only one that can unlock locks is probably Sanyuan Agriculture.
If I give up this bicycle, my family members, that is, the Congressmen, will definitely call themselves dogs.
"The evil Yu Sanyuan!"
After NSA director Michael Hayden finished cursing, he suddenly remembered something, "Satellite!"
"Report, password required."
"Fuck!"
"Including the ground receiving station, a password is also required to open the door."
"F~~~"
NSA head Michael Hayden was halfway through his scolding when he thought of something again. He hurried to the gate and took his fingerprints.
[Please enter password]
"Grass!"
for a long time.
More than a dozen fire trucks from the North American 911 team arrived at the NSA headquarters.
Because the confidentiality standards here are too high, simple tools cannot break through the anti-eavesdropping electric doors and windows and the anti-eavesdropping steel-concrete walls. Explosions must be used to rescue the people trapped inside. They have no power, no water, no food, and even the fresh air system is shut down. They are gradually breathing. 68,000 people are in difficulty.
It took time for the National Guard to arrive, so the NSA had no choice but to call the police.
(The 911 call did not originate from the plane hitting the building)
…
Texas.
Lao Bu quickly learned everything that the NSA had gone through.
The first thing he thought of was not to fight back, but to use the graphics card matrix of the Lao Bu family to launch computer system protection software.
Although few people know about the NSA and the inside story of this hacker war, top capital definitely knows.
Perhaps old Morgan and the oil king, who also own graphics card matrices, disdain to engage in protective software.
But Old Smith will definitely not give up such a good opportunity to make money.
Especially since the other party controls a large number of news media in North America. If they launch protective software and expose the inside story of the hacker war...
Lao Bu put down the NSA for the time being and quickly called his assistant to discuss a plan to build computer protection software.
He had a premonition that after this battle, all existing protection software vendors around the world would face bankruptcy.
The only remaining relevant companies are large capital groups that own graphics card matrices.
"NASDAQ is going down!"
After a while.
"Mr. Bu, just half an hour ago, the chairman of Tijuana Shipyard, David Ensig, shorted the Nasdaq and carried out bargain hunting."
Old Bu was slightly startled.
Nasdaq is going to fall because computer protection software vendors are about to go bankrupt on a large scale.
But Nasdaq will continue to rise, and it will rise dramatically, because two major capital companies in North America are about to enter the market.
"Why is David Ensig's sense of smell so sensitive?"
Lao Bu first thought that the other party was Yu Sanyuan's person.
But this hacker war was initiated by him. It was impossible for Yu Sanyuan to predict it. How could he predict that the Bu family and the Smith family were about to form a protection software company?
"Amazing guy!"
…
New York.
Old Smith's reaction finally surpassed that of Old Boo.
He immediately notified the genetic engineering laboratory and took advantage of the open hacker war in North America to use the Smith family's graphics card matrix to invade Microsoft servers.
Then we mobilize technical personnel to set up a protection software company, produce protection software advertisements, publicize NSA encounters, and expose rescue scenes...
"Sure enough, war makes human progress."
"Having played against Yu Sanyuan for so long, I found that I am becoming more and more proficient in business management."
Old Smith sighed and used the power of North American capital to launch the first attack and destroy the graphics card matrix that the third brother had just established.
Almost at the same time, the Lao Bu family also used their own power to destroy many graphics card matrices in Europe.
In terms of capital monopoly, the two have a surprisingly tacit understanding.
…
Northern suburb of Fei City, International Conference Center.
Yu Yang searched overseas news and checked the news in North America.
Originally, he planned to retaliate in kind by breaking through the NSA firewall, activating the other party's self-destruct program, and destroying all NSA computers and databases.
But suddenly, the new graphics card matrix was far from reaching the level of AI hackers, and it could not even be called primary artificial intelligence.
At most, it can be considered a server group that has strong computing power and can find system vulnerabilities on its own, but cannot use the vulnerabilities to cause hacker attacks.
Therefore, he had an idea and thought of locking the bicycle.
So after finding a loophole and breaking through the NSA firewall, we did not exploit the loophole. Instead, we continued to help the NSA build up armor, build an enhanced firewall, and set up more secret keys.
In the process, I searched for information about the NSA office area and discovered a very interesting organization called DARPA.
If it were replaced in a science fiction film and television, it should be called S.H.I.E.L.D.
The opponent not only possesses airborne laser weapons, but also possesses a wolf pack intelligence system.
As well as hypersonic aircraft, X-37 aerospace demonstrator, switch blade drones, autonomous ground vehicles (unmanned vehicles), using small launchers to launch satellites in parts, and then forming large satellites in space...
The organization's slogan is: Change the future, change the world.
Among them, the 'Switch Knife UAV' can be hung on a compact, high-precision air-to-ground missile.
There are currently twelve aircraft deployed in the Asia-Pacific region, with the combat target: Yu Yang.
But these are not the most important.
The other party actually artificially synthesized a 'polio virus' similar to Biohazard.
And using a secret graphics card matrix, a Terminator-like Skynet artificial intelligence defense system is being trained.
We are even training an automated attack and defense system similar to the 'program kills the program' in The Matrix, or a robot hacking system called situational awareness.
"Art comes from life, maybe the inspiration for The Matrix didn't come from here, right?"
"Fuck, you guys are so good, it puts me under a lot of pressure."
Yu Yang picked up a bottle of Scream, drank half of it, and thought about what he had left unused.
Otherwise, you really can't beat it.
(End of chapter)