Chapter 274: 3 plans for the Pentagon

Name:King Who Will Cross Author:She Da
( ) Pentagon Staff Headquarters.

"What do you think of the status announced by the King of Tuvalu?"

Someone replied: "I think there are two possibilities. The first is that the King of Tuvalu has set up a timed network attack, and the attack time needs to be reset every twelve hours. Otherwise, the network attack virus he set up before, It will break out in an all-round way and carry out indiscriminate attacks all over the world. The second possibility is that the king of Tuvalu is trying to confuse the audience and prevent other countries from launching physically destructive attacks on Tuvalu.”

The U.S. Secretary of Defense asked: "Have any similar viruses been found on our domestic network?"

The person in charge of the US Cyber ​​Security Center said: "From Tuvalu's large-scale cyber attack on New Zealand to now, we have checked the nationwide network and even the user's networked hardware, and found a total of 11,298,563 viruses, but None of them have had the effect of attacking Tuvalu and New Zealand."

The Minister of Defense asked: "In other words, Tuvalu has not placed so-called cyber nuclear weapons on our domestic Internet or domestic hardware equipment?"

"We cannot guarantee this." The person in charge of the Cyber ​​Security Center said: "First of all, we have not completed the detection of networked hardware devices across the country. Some viruses hidden in the user's personal networking equipment. Finally, after technical analysis, we believe that the network nuclear bomb in Tuvalu is probably not a virus."

"Not a virus?"

"No." The person in charge of the Cyber ​​Security Center said: "What I'm talking about is—not a virus. Viruses in the traditional sense are similar to lone rangers, focusing on only one function. For example, stealing user information, capturing Relevant control rights and so on. According to our analysis, the situation encountered by New Zealand at that time was diverse."

The person in charge motioned to his assistant, and after distributing some of their analysis reports, he continued: "On the surface, there are only two manifestations of cyber attacks in Tuvalu, the first is a power outage, and the second is a power outage." The signal was lost. We can even classify the signal loss as a power outage. But in fact, the cyber attacks New Zealand suffered at that time were diverse.”

He picked up the report in his hand, turned to one of the pages, and said: "Everyone, please turn to the seventeenth page of the research report, which contains detailed information on the cyber attacks New Zealand suffered. According to our incomplete statistics, there are about 207 If these 207 types are subdivided, they will become 1063 types of viruses, and 90% of these 1063 types of viruses are completely new."

The Minister of Defense put down the information in his hand and asked: "You mean, the king of Tuvalu has researched 1063 kinds of viruses, and then put them on New Zealand's Internet or related hardware storage in advance, and then controlled their outbreak. attack?"

"Not bad!" said the person in charge of the Network Security Center: "Moreover, what is amazing is that when these 1063 viruses are analyzed individually, it is completely impossible to discover their real functions, and they do not even have any attack capabilities. Only the mutual Only after combination can an effective attack method be formed."

"So." The representative of the White House suddenly asked: "Have these 1063 viruses been found on the related equipment in our country?"

"So far, none of them have been found."

Hearing this sentence, many people at the scene breathed a sigh of relief, but before the breath was over, the person in charge continued to say: "However, we suspect that these viruses are all caused by some kind of cyber attack algorithm. Generated, they have no real meaning."

"Cyber ​​attack formula?"

"Yes, it's like a network attack virus generator. It can generate these 1063 virus combinations to achieve the attack effect, and it can also regenerate another 1063 or more new viruses to achieve the attack effect. Make a combo attack."

"Is there a solution?" asked the Defense Secretary.

"In fact, if the King of Tuvalu sets up a timed attack, we have no way to deal with this attack." The person in charge said: "What we can do at present is to try our best to complete the system of the relevant facilities and make important The facility will be disconnected from the network.”

"What if after some devices are disconnected from the network, the king of Tuvalu cannot get the instruction to reset the timing attack, and then the attack breaks out?"

"We can only try our best to reduce this loss, and we even hope to get more virus samples, and then deduce Tuvalu's network nuclear bomb attack formula."

"How much time, how many resources do you need?" the White House representative asked.

The person in charge said: "Resources are inversely proportional to the time consumed. The more resources we get, the less time we will have to solve this problem. But judging from the current test speed, even if we gather resources from all over the world, It will take at least 6 months to decipher this brand new attack formula."

"Six months?" the Minister of Defense asked, "How long do you think it took the king of Tuvalu to study this attack formula? How many people did he use?"

A staff officer said: "According to our analysis, the king of Tuvalu will not spend more than three months researching this kind of network nuclear bomb, but in fact, there is no one around him who can participate in this research."

The representative of the White House asked: "Is it possible that other countries used the name of Tuvalu to carry out the attack? For example... Huaxia!"

A staff officer said: "Impossible, although Huaxia may have this kind of technology, but this incident, Huaxia will not be able to get matching benefits. Moreover, it is impossible for a big country to use this kind of network attack method."

"Yes." Another staff officer continued: "We call this attack method a cyber nuclear bomb, which means that it is not a conventional weapon, but a deterrent weapon. If China, Russia and other countries use this weapon easily, Then we can also use cyber attacks to attack them. The final result is chaos in the world."

The representative of the White House said: "What do you mean, because Tuvalu is a small country, it doesn't matter even if it doesn't have the Internet temporarily, so it won't be afraid of us or New Zealand and carry out cyber attacks on them?"

"That's right." A staff officer said: "Only a country like them would dare to use deterrent weapons so easily. As an old Chinese saying goes, barefoot people are not afraid of wearing shoes."

The Minister of Defense concluded: "In other words, we have nothing to do with Tuvalu now? Moreover, our national security is not guaranteed at all?"

The person in charge of the Cyber ​​Security Center said: "Actually, cyber attacks cannot completely destroy a country. That is to say, if we are willing to bear a certain loss, we can directly and humanely destroy the entire Tuvalu."

The head of the White House asked: "How big is this loss expected to be?"

A staff officer said: "According to the loss of New Zealand's black three minutes and the subsequent large-scale riots, we believe that if this kind of network nuclear bomb starts to break out without reservation, our direct economic loss will reach 160,000. The indirect economic loss is incalculable."

"16 trillion dollars?"

"Indirect economic loss?"

Many people exclaimed that the total GDP of the United States in 2012 was only over US$1.61 trillion.

"That's right." The staff officer said: "The indirect economic loss is the most serious. When the society falls into complete chaos, it will even take us two to three years to completely restore social order, and even do a good job. Some states are preparing for independence."

The Minister of Defense slapped the table hard and said, "Can't you come up with a practical plan other than scaremongering?"

After the audience was silent for a while, someone said: "Since the king of Tuvalu has kidnapped the whole world, we can kidnap him personally. As long as we can control him before he launches a cyber attack, then maybe we can make him He stops cyberattacks. And takes his cyberattack algorithms."

"Maybe?"

"Because we cannot guarantee that we can use unconventional means to get the King of Tuvalu to cooperate with our actions."

"Has the character report of the King of Tuvalu been analyzed?" asked the Minister of Defense.

A staff officer immediately replied: "According to our analysis of his previous behavior, the result is...he is very likely to choose death rather than surrender."

I'm stupid!

In an instant, ten thousand grass and mud horses galloped through the mind of the Minister of Defense. He could no longer bear the anger in his heart and roared: "You mean to say that the most powerful country in the world wants to surrender to a country with an area of ​​only 26 square kilometers. small country to succumb?"

Someone with a wink reminded: "In fact, after Tuvalu migrated to the Auckland Islands, their land area has reached 612.47 square kilometers."

The Minister of Defense was almost outraged by this sentence, suppressed his anger, and asked, "What is the probability that Tuvalu will attack us?"

A staff officer replied: "According to our analysis The King of Tuvalu did not actively attack any country, otherwise, he would not have released the picture of the remote control for us to see."

The White House representative concluded: "In other words, if we did not have a conflict with Tuvalu, we would not be attacked by cyber nukes?"

"good!"

The White House representative nodded and said, "So, can I understand that the national security of the United States now depends entirely on the mood of the King of Tuvalu?"

After a moment of silence at the scene, the person in charge of the White House said: "I will report the content of today's meeting to Mr. President completely and without errors. So, can you give a detailed solution?"

After discussing on-site for about half an hour, the Minister of Defense concluded: "We will formulate three plans. The first is to reduce domestic related network security vulnerabilities and do a good job in network separation of related facilities. The second is to contact countries and conduct Combined technical analysis, find a way to completely eliminate Tuvalu’s cyber-nuclear attack. The third is to prepare a special operations force that can directly control the Tuvalu king himself in the event of an accident.” (To be continued. )