After entering the dormant period, the worm virus is like a drop of water falling into the sea, completely integrated into it.
It can be said that there is no trace of it at all.
Because once it invades the target, the worm will become a part of the computer system.
However, even in the dormant period, it will continue to differentiate.
Once it wakes up from the dormant period, the worms that differentiate into countless worms will swallow the entire computer in an instant.
It can be said that as long as the worm successfully invades.
Then, the end result is already doomed.
And in the next few days, this team is still expanding its achievements.
For example, the US intelligence agency, the Ministry of Commerce, and all the countries participating in this military exercise are almost all under the attack of worms.
However, they did not attack the US navigation satellites,,, communication satellites.
On the one hand, if it invades now, it will be discovered by the US military, so let them take precautions in advance.
In this case, their preparations for the past few days will be in vain.
On the other hand, it is because they do not need to go to great lengths to attack the communications and navigation satellites of the United States.
Because the defense departments of [-] NATO countries and many other important departments have been invaded by worms.
It can be said that once the military exercise starts and countries start to connect to the signal, the worm has been successfully invaded to the satellite of the United States.
So, their task now is... quietly waiting for the start of the military exercises of the United States and NATO countries.
Thinking of this, everyone secretly looked forward to it.
Although they have wanted to do this for a long time.
But never dared to do it.
Because doing so is too risky.
Once discovered by the US government, it will be retaliated by the US.
But things are different now.
You Americans have already bullied us polar bears, do we still have to be afraid of our polar bears? In addition, this opportunity is rare, so you don't have to be afraid.
Anyway... offending a US country is equivalent to offending the entire NATO.
If that's the case, then it's better to offend everyone one by one.
Besides, invading NATO can also get many unexpected gains.
"Report, scan to an encrypted file, whether to copy and transfer."
"Well, copy first, don't rush to transfer, so as not to be exposed."
"Yes."
"Report, a group of photos were scanned, which are......the indecent photos of U.S. Treasury Secretary Arthur Henry"
"Indecent photos"
Nasha couldn't help being taken aback.
I'm still young, what are you talking about with indecent photos, but it seems that this can be used.
"Copy it first, just like them, don't rush to transfer, after the task is completed, all the scanned files will be sent back."
"Yes."
After hearing Nasha's order, all the people showed excitement on their faces.
That is the data of the nineteen nineteen countries in NATO.
in spite of……
Whether it can be found on the Internet or not, it must be packaged first.
When you come back, analyze these files one by one.
Save everything that is useful, and throw away everything that is useless.
They believe that there must be too much important information among these numerous materials.
The ninth update has been delivered, that's all for today's update, see you tomorrow morning.
Today it's because I overslept, tomorrow I won't
309? Exercise officially started ([-])
"Ready to access the public communication platform."
"Accessing."
"It has been connected to the public communication platform and is sharing data."
The day before the start of the exercise, 8 of the [-] member states of NATO officially began to access the US satellite.
In this way, in the next few days of exercises, they can use the positioning satellites of the United States in real time to determine the positions of other friendly forces.
At the same time, they can also use the communication satellites of the United States to communicate with each other, send messages, and command their own troops to fight.
However, they don't know.
It is precisely because of their access that the worm virus was successfully brought into the satellite.
At this time, the computer department formed temporarily by Polar Bear is working all night.
Their current mission can be said to have really begun.
In the next few days, they need to secretly control the satellite,,, secretly manipulate.
Let the huge joint military exercise formed by the NATO countries headed by the United States become a joke in the eyes of the public. …
Early the next morning, with an order from the co-director's department, the military exercise officially started.
According to the content of the military exercise issued by the co-director.
NATO has found traces of the polar bear's navy and army in the Pacific Ocean and neighboring countries of the polar bear.
Therefore, NATO's army and navy will encircle and wipe out the polar bear troops on two battlefields respectively.
Of course, in order to be more challenging, representative and intimidating.
The strength of the army and navy playing the role of the polar bear is still very strong.
In the navy, there are 250 warships of various types and [-] aircraft of various types.
As for the army, tanks, armored vehicles, and various types of artillery and missiles are available.
It can be said that in order to target polar bears, NATO has taken great pains.
After all, the military strength of polar bears is still very strong.
If the troop playing the polar bear is too weak.
I am afraid that it will not only be disdainful by polar bears.
It will also give people in other countries reasons to refute.
Therefore, NATO starts from the comprehensive national strength of polar bears.
Take out all the strength that the polar bear can bear at present.
In this case, no matter how much they abuse the polar bear troops, others will have nothing to say.
Because this is all the strength that polar bears can show.
Even in actual combat situations, the North Pole puts out so many troops.
"Captain, I just received a message from the friendly forces. They sent Xiongjun, asking for our fire support."
"That's it, okay, let's launch the 2-[-] Ax cruise missiles there first."
"Yes."
After hearing the captain's words, the subordinates at the side immediately started positioning and launching.
Although it is a practice.
But in that area, besides... the troop playing the polar bear, who else is there? What's more, the friendly army has confirmed that it is the troop playing the polar bear.
So, the captain didn't care what happened, and ordered the troops to send [-] rounds of Tomahawk cruise missiles to appetize.
When the soldiers on the side press the missile launch button.
On the American Arleigh Burke-class destroyer, one after another Tomahawk cruise missiles flew into the sky, dragging long flames.
At this time, watching the Tomahawk cruise missiles flying high into the sky, Carlos, the captain of the Arleigh Burke-class destroyer, couldn't help showing a smile.
He has been able to predict that after one and a half hours, the twenty Tomahawk missiles will be able to hit the target smoothly.
On the other side, the polar bear computer department has already obtained the communication information from NATO.
"They have just issued a request for firepower strikes, and the Arleigh Burke-class destroyer has agreed to support and has launched twenty Tomahawk cruise missiles."
"Change the navigation data of these missiles to make them deviate from the course, not too much, three missiles are enough."
Nasha thought about it.
"Yes."
After finishing speaking, the members of the computer department started remote control and quietly changed the data of the navigation satellite. …
As time passed by every minute and every second, the Tomahawk cruise missile left quickly according to the pre-set position.
However, three missiles are quietly changing directions and heading towards the other end.
"Report, three Tomahawk cruise missiles seem to have made a mistake and strayed off course."
"three pieces"
"Yes, maybe the parameter is wrong, I'm looking for the reason."
"No need, it will be troublesome if you attack other targets, just start the self-destruct program."
"Yes."
You'll Also Like
-
I have a hundred times reward in online games
Chapter 2281 5 hours ago -
The Dragon That Devoured the World: Begins with Rebirth as a Black Dragon
Chapter 326 17 hours ago -
The Saint Clan is too weak? What does it have to do with my Eternal Imperial Clan?
Chapter 66 17 hours ago -
Uchiha clan extermination night, start as Kanna-chan
Chapter 96 17 hours ago -
I'm just acting like a pervert, I'm actually a good prisoner
Chapter 233 17 hours ago -
Xingtie: My mission master joins the chat group
Chapter 288 17 hours ago -
Xingtie: I, who rub the armor with my hands, ascend to the reincarnation
Chapter 201 17 hours ago -
Martial Arts Immortality: Awakening the Three Colors of Domineering at the Beginning
Chapter 421 17 hours ago -
Transmigrating into a book: Green tea, I want the vicious female supporting role!
Chapter 406 17 hours ago -
Detective: Conan calls me brother-in-law?
Chapter 130 17 hours ago