After entering the dormant period, the worm virus is like a drop of water falling into the sea, completely integrated into it.
It can be said that there is no trace of it at all.
Because once it invades the target, the worm will become a part of the computer system.
However, even in the dormant period, it will continue to differentiate.
Once it wakes up from the dormant period, the worms that differentiate into countless worms will swallow the entire computer in an instant.
It can be said that as long as the worm successfully invades.
Then, the end result is already doomed.
And in the next few days, this team is still expanding its achievements.
For example, the US intelligence agency, the Ministry of Commerce, and all the countries participating in this military exercise are almost all under the attack of worms.
However, they did not attack the US navigation satellites,,, communication satellites.
On the one hand, if it invades now, it will be discovered by the US military, so let them take precautions in advance.
In this case, their preparations for the past few days will be in vain.
On the other hand, it is because they do not need to go to great lengths to attack the communications and navigation satellites of the United States.
Because the defense departments of [-] NATO countries and many other important departments have been invaded by worms.
It can be said that once the military exercise starts and countries start to connect to the signal, the worm has been successfully invaded to the satellite of the United States.
So, their task now is... quietly waiting for the start of the military exercises of the United States and NATO countries.
Thinking of this, everyone secretly looked forward to it.
Although they have wanted to do this for a long time.
But never dared to do it.
Because doing so is too risky.
Once discovered by the US government, it will be retaliated by the US.
But things are different now.
You Americans have already bullied us polar bears, do we still have to be afraid of our polar bears? In addition, this opportunity is rare, so you don't have to be afraid.
Anyway... offending a US country is equivalent to offending the entire NATO.
If that's the case, then it's better to offend everyone one by one.
Besides, invading NATO can also get many unexpected gains.
"Report, scan to an encrypted file, whether to copy and transfer."
"Well, copy first, don't rush to transfer, so as not to be exposed."
"Yes."
"Report, a group of photos were scanned, which are......the indecent photos of U.S. Treasury Secretary Arthur Henry"
"Indecent photos"
Nasha couldn't help being taken aback.
I'm still young, what are you talking about with indecent photos, but it seems that this can be used.
"Copy it first, just like them, don't rush to transfer, after the task is completed, all the scanned files will be sent back."
"Yes."
After hearing Nasha's order, all the people showed excitement on their faces.
That is the data of the nineteen nineteen countries in NATO.
in spite of……
Whether it can be found on the Internet or not, it must be packaged first.
When you come back, analyze these files one by one.
Save everything that is useful, and throw away everything that is useless.
They believe that there must be too much important information among these numerous materials.
The ninth update has been delivered, that's all for today's update, see you tomorrow morning.
Today it's because I overslept, tomorrow I won't
309? Exercise officially started ([-])
"Ready to access the public communication platform."
"Accessing."
"It has been connected to the public communication platform and is sharing data."
The day before the start of the exercise, 8 of the [-] member states of NATO officially began to access the US satellite.
In this way, in the next few days of exercises, they can use the positioning satellites of the United States in real time to determine the positions of other friendly forces.
At the same time, they can also use the communication satellites of the United States to communicate with each other, send messages, and command their own troops to fight.
However, they don't know.
It is precisely because of their access that the worm virus was successfully brought into the satellite.
At this time, the computer department formed temporarily by Polar Bear is working all night.
Their current mission can be said to have really begun.
In the next few days, they need to secretly control the satellite,,, secretly manipulate.
Let the huge joint military exercise formed by the NATO countries headed by the United States become a joke in the eyes of the public. …
Early the next morning, with an order from the co-director's department, the military exercise officially started.
According to the content of the military exercise issued by the co-director.
NATO has found traces of the polar bear's navy and army in the Pacific Ocean and neighboring countries of the polar bear.
Therefore, NATO's army and navy will encircle and wipe out the polar bear troops on two battlefields respectively.
Of course, in order to be more challenging, representative and intimidating.
The strength of the army and navy playing the role of the polar bear is still very strong.
In the navy, there are 250 warships of various types and [-] aircraft of various types.
As for the army, tanks, armored vehicles, and various types of artillery and missiles are available.
It can be said that in order to target polar bears, NATO has taken great pains.
After all, the military strength of polar bears is still very strong.
If the troop playing the polar bear is too weak.
I am afraid that it will not only be disdainful by polar bears.
It will also give people in other countries reasons to refute.
Therefore, NATO starts from the comprehensive national strength of polar bears.
Take out all the strength that the polar bear can bear at present.
In this case, no matter how much they abuse the polar bear troops, others will have nothing to say.
Because this is all the strength that polar bears can show.
Even in actual combat situations, the North Pole puts out so many troops.
"Captain, I just received a message from the friendly forces. They sent Xiongjun, asking for our fire support."
"That's it, okay, let's launch the 2-[-] Ax cruise missiles there first."
"Yes."
After hearing the captain's words, the subordinates at the side immediately started positioning and launching.
Although it is a practice.
But in that area, besides... the troop playing the polar bear, who else is there? What's more, the friendly army has confirmed that it is the troop playing the polar bear.
So, the captain didn't care what happened, and ordered the troops to send [-] rounds of Tomahawk cruise missiles to appetize.
When the soldiers on the side press the missile launch button.
On the American Arleigh Burke-class destroyer, one after another Tomahawk cruise missiles flew into the sky, dragging long flames.
At this time, watching the Tomahawk cruise missiles flying high into the sky, Carlos, the captain of the Arleigh Burke-class destroyer, couldn't help showing a smile.
He has been able to predict that after one and a half hours, the twenty Tomahawk missiles will be able to hit the target smoothly.
On the other side, the polar bear computer department has already obtained the communication information from NATO.
"They have just issued a request for firepower strikes, and the Arleigh Burke-class destroyer has agreed to support and has launched twenty Tomahawk cruise missiles."
"Change the navigation data of these missiles to make them deviate from the course, not too much, three missiles are enough."
Nasha thought about it.
"Yes."
After finishing speaking, the members of the computer department started remote control and quietly changed the data of the navigation satellite. …
As time passed by every minute and every second, the Tomahawk cruise missile left quickly according to the pre-set position.
However, three missiles are quietly changing directions and heading towards the other end.
"Report, three Tomahawk cruise missiles seem to have made a mistake and strayed off course."
"three pieces"
"Yes, maybe the parameter is wrong, I'm looking for the reason."
"No need, it will be troublesome if you attack other targets, just start the self-destruct program."
"Yes."
You'll Also Like
-
When they suddenly realize, I am already the strongest villain
Chapter 575 14 hours ago -
One Piece: The greatest swordsman of the Rocks era!
Chapter 301 14 hours ago -
Naruto Uzumaki: Born Evil
Chapter 229 14 hours ago -
Zongman: Fat otakus also have dreams
Chapter 173 14 hours ago -
If I ask you to shoot a web drama, would you shoot Collapse of the Star Railway?
Chapter 236 14 hours ago -
Hogwarts: I can load entries infinitely!
Chapter 153 14 hours ago -
The World I Was Supporting Was Real
Chapter 50 15 hours ago -
The Romance of the Three Kingdoms: Lu Bu is good at being filial
Chapter 80 15 hours ago -
The Guardian Knight of Affection-Starved Young Ladies
Chapter 102 15 hours ago -
The Chairman Who Wants to Play and Eat
Chapter 60 15 hours ago