AWAKENING THE DAILY INTELLIGENCE SYSTEM
Chapter 658 - 658 271, a decision concerning the survival of the Northern BorderChapter 658: 271, a decision concerning the survival of the Northern Border.
Chapter 658: 271, a decision concerning the survival of the Northern Border.
Could redemption lie within this?
What does this mean?
Everyone was baffled; no one understood the meaning behind this cover that suddenly appeared on the screen.
A new virus?
Or was it some new tactic played by the terrorists?
…
These were the immediate concerns of everyone in the command vehicle, and soon another question came to mind.
How had they hacked into their dedicated network?
Although the cybersecurity of the Northern Border Country wasn’t top-notch, and they didn’t have massive supercomputers like America and Grand Xia,
as a military network, their encryption level was very high.
Their encryption process was complex and more importantly, they used a dedicated network, an isolated line that didn’t connect to the external internet—ordinary means simply couldn’t breach it.
Yet now, the glaring invasion page appeared so openly before their eyes—how could they not be filled with doubts?
“What should we do?” a technician voiced his thought, then added, “This page has a countdown set, and it will disappear in about 30 seconds.
Source: .com, updated on ƝονǤο.ƈօ
If it disappears, it might be gone forever.
Reopening it would be absolutely impossible.”
They had less than 30 seconds left to consider their options.
The expressions on everyone’s faces were extremely somber because this indeed was a critical issue concerning the whole Northern Border Country.
Not to mention one important point—
The network in their vehicle was connected to the military’s.
If any problem arose, or if the hyperlink contained a highly destructive virus, it would bring them enormous trouble and loss.
No one could bear such a responsibility.
The military commander asked in a grave tone, “Is it possible to ascertain within 30 seconds whether the link contains a virus?
If we can determine that, we can identify the type of virus and then decide whether or not to open it!”
The network was connected to various sectors, containing many crucial intelligence and messages, especially for the military.
Information on significant weaponry was absolutely confidential to a country.
For the Northern Border Country in particular, their deterrence against foreign countries relied on submarines equipped with nuclear weapons.
Those submarines were their greatest nuclear threat, and they absolutely could not afford to be exposed; exposure would mean the loss of their deterrent effect.
Some in the command vehicle even began to think, perhaps the commotion of the concert was just a feint, and the enemy’s real goal was to create such a trap to peer into all the secrets of the Northern Border.
After hearing his request, the technician slowly shook his head and said, “It’s not possible, can’t be done.
No one can break through a link in less than 30 seconds and conduct a complete check of every file.”
“The most potent aspect of viruses is that they can hide in very small files.
Once a file is injected into the network, it can replicate and split itself at an extremely fast pace, quickly taking over the normal space of other files and hiding as a commonplace file, making it very difficult for antivirus software to detect.”
“If an intrusion is successful, achieving what I’ve described isn’t a difficult task.”
“Also, Lieutenant Colonel Comrade, Police Comrade, we’re down to the last 15 seconds.
You must tell me an answer within 15 seconds, whether to activate this software link.”
15 seconds?
Such a short period wasn’t even enough to light a cigarette, let alone contemplate an issue with such severe consequences.
They didn’t even have time to request instructions.
Their first instinct was to abandon the idea; after all, as long as they didn’t open the file, any emerging issues wouldn’t have much to do with them.
They were merely tasked to deal with the situation and had their own methods of handling terrorists.
They could even act as if they never received such a link, then everything could proceed smoothly.
Don’t know where the terrorists are hiding?
That was never a problem because they could adopt the usual practice of Northern Border’s military: a simple assault, and then, despite sacrificing some innocent lives, they could take over the entire concert hall.
This was not particularly difficult, just a heavier toll to pay.
But what did that matter?
As long as the mission could be completed smoothly, and the terrorists were made to pay an unimaginable price, that would deter more terrorists from taking risks.
That was the way to save more people.
This wasn’t difficult to understand; in fact, it was a very easy decision to make.
10.
9.
8.
7.
The numbers on the screen started counting down; they had only ten seconds left.
It seemed very urgent, but in reality, there was no issue because they had already made a decision—they certainly weren’t going to open the link and would stick to their plan.
However,
just as they were preparing to take action and waiting for the countdown to end, the screen flickered and a string of Northern Border script appeared.
It read a sentence.
Do you really think your network is secure?
The words appeared as gently as falling snowflakes yet exploded in everyone’s ears like thunder.
They had contemplated all possibilities and even made a decision, but in those short 30 seconds, they never expected the current scenario to unfold.
Visit and read more novel to help us update chapter quickly. Thank you so much!
Use arrow keys (or A / D) to PREV/NEXT chapter