Fortunately, Wang Xu's original intention was good, and he has not officially entered the national security, and he is a key protection object.

Otherwise, one violation punishment is enough for him.

While Chen Chu and Wang Xu were waiting for news, the technical department was already very busy.

Lu Chao handed over all the drones and data he brought back to the technical department for secondary analysis, but soon the people in the technical department were shocked by the drones dismantled by Liu Yuchen.

"Who took it down? It didn't hurt the chip?"

Several people from the technical department gathered around and looked at the chip that had been removed, naturally amazed.

Lu Chao was naturally unaware of this, and he only reacted now.

Yup! who took it down! ?

It must not have been dismantled by Wang Xu. Wang Xu had no such ability, so he must have dismantled the drone after seeking help.

It's just that Lu Chao's attention was all focused on the data he read, and he forgot to ask.

"Even all the hidden protection lines have been found!"

"Is it that great?"

"Lu Chao, where did you invite such a powerful engineer? We have already searched for someone here, and no one can guarantee that the chip will be removed without damaging the chip. Report it!"

"I don't know who it is either." Lu Chao said with tears in his eyes, "Now is not the time to be emotional!"

"Don't worry, the engineer you hired has already found the protection line, so the next work is basically not difficult, we just need to follow the map and follow it."

"Well, the most difficult thing was to find the hidden protection lines. Now that we have found them all, we know which one is easy to handle!"

The people in the technical department did not continue to say more, and hurriedly took the remaining drones for processing. After about ten minutes of tossing, all the drone chips were quickly removed. After technical processing, Immediately forward it to the Program Technology Department.

The program technology department is the real battlefield. Earlier, it analyzed the data of the disassembled chips. Later, by activating the motherboard to track the data signals, it began to determine the website server where these data were uploaded. As more and more chips were sent Over here, the ever-changing data signal finally has a general direction. After half an hour of searching, the destination of the signal is finally confirmed to be a foreign terminal server, and nearly four servers have been built under this server. Fifty sites.

And these websites are all selling dog meat. On the surface, they are even some advertising or game websites. They are nothing more than to confuse the public. In fact, the real purpose is to intercept data.

After determining the target, the program technology department naturally conducted investigation and evidence collection for the first time, and began to try to penetrate into the background of these websites.

Time passed by minute by minute, but what everyone never expected was that in the process of investigating and collecting evidence, one of the programmers suddenly changed his face and exclaimed, "The other party is attacking, everyone must be careful!"

Everyone's expressions changed when they heard it. Sure enough, these websites shut down the background for the first time, and they didn't know what means they used to directly steal the address of the technical department, and they actually began to reverse infiltrate the program technology department of National Security.

A large amount of information bombardment swept across the sky, and everyone in the program technology department was facing a big enemy for a while, and immediately organized a defensive barrier to block all this junk information. Once the information bombardment collapsed the system, then You can take advantage of this momentary loophole to instantly invade the background of the program technology department.

"What's the matter? How did the other party find us?"

While blocking the opponent's attack, everyone in the program technology department was at a loss. After all, their addresses had been encrypted by technical means, and for the sake of prudence, the addresses had been disguised in multiple layers, from Southeast Asia to Europe, and then Turning to the Americas, according to this situation, it is impossible for the other party to directly find their own.

"It's a drone!" Someone immediately shouted, "The other party must have directly locked onto our position through the signal of the drone."

Everyone suddenly came back to their senses and scolded carelessly, but now the signal of the drone must not be cut off, otherwise the data that was finally intercepted directly will definitely be directly destroyed by the other party, and there will be no evidence at that time.

Obviously, the other party also considered the backhand at that time, so he was already prepared.

The enemy is in the dark, and I am in the light.

The program technology department directly suffered a big loss, but now they don't dare to think about it, and they have to block the opponent's attack.

The process of investigation and evidence collection immediately turned into an offensive and defensive battle!

Sun Chong waited for a while and didn't see any news from the program technology department. He frowned, and immediately called to ask what was going on.

"There's a call!" An anxious voice came from the other end of the phone, "Chu Sun, their drones also set up tracking signals. We were careless, and the other side found our hometown by accident!"

Sun Chong's eyes widened, and he couldn't help yelling, "What are you doing?"

There was no explanation on the other end of the phone. After all, who would have thought that the other party would use so many hands and feet on the drone, he hurriedly said, "Sun Chu, we are short of manpower, the other party is already prepared, and we need support!"

"We should be facing a professional technology group that attacked us tens of thousands of times in five minutes. There are at least hundreds of people on the other side, maybe even more."

"The other party's offensive is too fierce, there are only a dozen of us, and the keyboard is almost smoking!"

"You have to block me no matter what, if your hand is broken, you have to block me!"

"Yes!"

Sun Chong hung up the phone, without saying a word, he directly dialed Jiangnan Wangan's phone number, and as soon as the call was connected, Sun Chong hurriedly said, "Old Ke, the situation is urgent, and it's too late to explain, how many people do you have to lend them all? Program Technology Department! I'll report to the top later."

"No, Old Sun, what are you kidding?" There was a voice that couldn't help laughing and crying from the other end of the phone. "Everyone in my place is busy! How can anyone lend you a hand!"

Sun Chong hurriedly said, "I have a fight with foreigners here!"

"Ha!?" The other end of the phone was startled, "Why did you suddenly have a call with someone from abroad?"

"I'll explain it to you later, and quickly lend me someone. If this is broken, it will be a big trouble!"

"Okay!" I saw a shouting voice coming from the other end of the phone, "Immediately connect all those who are on duty with the program and technical department of Guoan, those who are not on duty immediately contact me, and those who are off work on a business trip will also immediately connect with Guoan's side, the situation is urgent. , without delay!"

"Yes!"

Then I heard the other end of the phone say, "There are only a dozen people on my side..."

"It doesn't matter how many people there are, let's talk about it first!"

"OK, OK!"

After Sun Chong hung up the phone, he made several calls immediately.

Jiangbei, Jiangchuan, Jiangdong...

In just ten minutes, Sun Chong shouted everything he could. Seventy or eighty people were all connected to the program technology department, and it was difficult to stabilize the situation.

But before he could catch his breath, the offensive suddenly became fierce again.

The information bombing soon turned into an invasion, and the situation that had finally stabilized became tense again.

It seems that the other side also sent a large number of people at the same time.

Sun Chong's head was so big for a while, it was obviously just a very simple investigation and evidence collection, but he didn't expect it to suddenly evolve into a cyber war.

And now the situation is getting more and more tense. Don't look at the number of seventy or eighty people, but it is already the limit.

After all, the national security manpower in each place is limited, especially the program technology department. Except for the developed areas, no province or city can recruit the basic staff of 30 people. After all, there is indeed a lack of relevant talents in this area. Yes, most of them were dug up by capital.

Seeing that the situation became more and more complicated, Sun Chong naturally reported it immediately for support.

After all, the other party has bullied them into the house?

It can be tolerated! ?

We do not cause trouble, but we are not afraid of trouble!

beat!

Overnight, the battle became more and more intense.

Technicians from more than 70 counties and cities in the three southwestern provinces were immediately involved in this cyber offensive and defensive battle centered on Jiangnan.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like