Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter III Rights and Obligations

At the level of national concept, everything including history, geography, human resources, science and technology are a means of exercising its national rights claims.

The global development of network technology has made computer science and technology even more important in national rights claims. No one can ignore the role of the network, whether in military, economic, cultural, or even politically. Similarly, network technology is one of its key research projects in various countries around the world.

The emergence of "Netiuyi" brought a powerful shock to the superstructure in Japan, and also ignited their ambition to build a future world pattern. The constraints of the geographical environment and the awkwardness of geopolitics have always made the superstructure weak and weak. Now, due to the emergence of "Netiuyi", there is finally a kind of relief to break through the shackles and a kind of joy and joy.

The objective factors of the geographical environment have set the national development direction of the superstructure in the future maritime overlords, and what lies ahead of them is the powerful US Navy. The powerful US Navy is the Yinhuo that they always linger. The US Navy stationed in Guam and Okinawa is even more painful in their hearts.

Therefore, after the superstructure mastered the "Net Weasel", its first goal was to focus on the US naval technology. Now, this new task fell on the head of the coach Kawamasa of the First Network Special Forces Brigade.

The high position is the far view, which is the feeling of Chuan when he was secretly accepting the mission. Originally, he believed that the next thing was to carry out "water teeth"-style harassment, or to spy on key laboratories of various countries or to military, economic, and scientific and technological intelligence tasks of various countries. However, he did not expect that it would be such a "national mission" with a clear purpose.

"Netiuyi" is indeed a quick knife, a good knife, this is Kawamasa's experience. All the confidential information of the US Navy stationed in Guam, Okinawa, was captured by the "Netiuyi"'s quick knife. From military deployment, ship command system, communication channels, to commanders' personal preferences and underwear sizes, all fell into Kawamasa's arms and fell into the superstructure research institute under the care of "Netiuyi".

However, this information is never enough. What the superstructure needs is the latest marine technology, the latest technology of aircraft carriers, and the latest technology of various weapons on board. Technical information is what superstructure urgently needs.

Therefore, after achieving local glorious results, Kawamasa's targets focused on confidential naval research institutions in the United States and key weapons research institutions.

After all, "Netiu" is just a new quantum state technology built on traditional networks. Therefore, it still has no way to invade various confidential servers and their intranets that are not affiliated with the Internet at all. Of course, Kawamasa could not find such a server. Although Kawamasa knew very well that there would definitely be such servers and such intranets, this was basically a network of two worlds, and "Netiu" was able to do this step beyond the level of the times.

Kawamasaki was very satisfied, really satisfied. After several days of online carnival, a large amount of technical information had fallen into his pocket. The superstructure was also very satisfied. In the information submitted by Kawamasaki, after evaluation by relevant secret scientific research institutions, the conclusion was that such naval technology could fully improve the country's naval level, so that the navy's technical level could be infinitely close to the current US Navy level.

This is a huge achievement, a huge national contribution. Therefore, Kawamasaki, the creator of this achievement and contribution, was secretly awarded the title of general by the superstructure and promoted to the rank of general. From an incorporated cyber taint hacker, he transformed himself into a national general, which gave Kawamasaki a kind of passion and ambition to sacrifice his head and blood.

Japan's behavior is always under the nose of the United States. Uncle Sam is very confident. He secretly draws personnel behaviors of key enterprises and research institutions, secretly transfers various research materials, and secretly awarding a cyber hacker, all of them are transmitted to the Japanese intelligence research institute of the FBI's intelligence research center through certain channels and transferred to the National Security Intelligence Center.

At the same time, the FBI's National Security Intelligence Center also received reports of cybersecurity accidents that were stolen from several key national defense research institutions and several key research laboratories.

Tom-Joden, director of the Japan Intelligence Research Center at the FBI National Security Intelligence Center, is currently undergoing a work deployment to investigate the connection between Japan and domestic intelligence theft.

The deployment of the First Network Special Forces Brigade, the resume of commander Kawamasa, as well as Kawamasa's trip to China, learning direction, the code name of "Netiu", the secret awards, and some new actions of Japanese superstructure. All relevant information is summarized in detail to TOM.

Through the analysis of all data, TOM issued the first job order: collecting all data on the code name "Netiu".

It is true that we cannot doubt the work ability and efficiency of the FBI agents in Japan. A few days after TOM issued the investigation instructions, detailed information about the relevant code name "Netiu" has been collected on the desk of TOM's office.

TOM is not a scientist, nor is it an expert in computer science. Therefore, he does not understand the technical description of "Netiuyi". But some people understand that the FBI is the most in short supply of experts, all kinds of experts. Therefore, after TOM obtained this information, it immediately sent a copy of the relevant information of "Netiuyi" to an expert group specializing in computer science to evaluate its security issues.

The conclusions evaluated by the expert group made TOM deeply frightened. After submitting them to the head of the FBI Center, it caused a strong panic in Congress. Therefore, a high-level security meeting was immediately held in the Pentagon.

"This is a revolution in computer technology! This technology absolutely threatens our cybersecurity, even national security." The leader of the computer technology expert group also attended the meeting and first pointed out the technical security issues of "Netiu" at the meeting.

"This technology was developed by the Japanese First Cyber ​​Special Forces Brigade led by Japanese hacker Kawamasa." TOM also immediately added the origin of the technology.

"So, what level does this technology have at its security level?" The director of the National Security Department of the Ministry of Defense personally attended the meeting and asked.

"This is a large-scale weapon of destruction! Although it is in the network field, it is definitely a weapon of mass destruction." The director of the FBI Security Technology Department defined the security level for "Netiu".

"Well, this definition makes sense. Several of our key institutions have also suffered from intelligence theft. Such things were simply impossible to happen at the same time in the past. Remember, they happened at the same time, so it is absolutely not an exaggeration to define it as a weapon of mass destruction!" The director of the FBI Center agreed with such a definition of security level.

"Is its threat really that great? It is not that simple to know that the definition of weapons of mass destruction is not a simple matter." The director of the National Security Department of the Ministry of Defense asked questioning.

"It can definitely be defined like this, but this lethality is mainly reflected in the field of networks, yes, in the field of network security." The leader of the computer technology expert group said with certainty.

"The current field of cybersecurity is also equivalent to the field of real national security." The director of the FBI Security Technology Department added.

"Well, judging from the fact that several key institutions have also suffered from intelligence theft, this technology has indeed threatened the security of our country. Moreover, it is quite serious. These laboratories are all about our country's most advanced defense and naval technology." The director of the FBI Center analyzed.

"Yes, those key institutions are all studying cutting-edge naval technology. Now it is indeed certain that the threat of this technology is quite large and seriously threatens our country's coastal defense security issues." The director of the National Security Department of the Ministry of National Defense confirmed the authenticity of the words of the director of the FBI Center.

"Okay, colleagues, now we can be sure that this technology developed by Japan has posed a serious threat to our country's security. The level of this threat has even reached the scale of weapons of mass destruction. Then, I will report this situation to the superiors and let relevant departments negotiate. Japan cannot own weapons of mass destruction, whether it is realistic or online, right?! This technology must also be mastered by us, which is our right. Other work will be arranged by the superiors now. Now your work is mainly to eliminate the losses we have suffered and how to remedy it." The director of the National Security Department of the Ministry of National Defense summarized the results of the discussion at this meeting.

Soon, a diplomatic note issued by the U.S. Embassy in Japan was submitted to the Japanese cabinet. In addition, a negotiating team composed of senior members of the Ministry of Defense Security Department also went to Japan to negotiate related reasons.

The importance of "net-powered people" has indeed attracted great attention from the United States. The computer expert team has now begun to study this epoch-making technology. I believe that it will not take long for the new generation of network technology to change the existing network pattern.

The Japanese cabinet members are now very depressed and helpless.

"Netiuyi" is no longer their highest state secret, which made the Prime Minister's first order to replace the Minister of Defense Intelligence. Such an important intelligence leak made the Prime Minister's dream of drawing a beautiful blueprint for the future of the country immediately collapsed.

A diplomatic note was staged in Japan's parliament.

"According to our intelligence, you have now developed a new generation of network technology code-named "Netiu" and used it to make some small moves." The director of the Ministry of Defense Security Department personally came to the stage to accuse the Japanese side of their actions.

"According to the identification of our experts, the network technology of "Netiu" is a weapon of mass destruction. Of course, although it belongs to the field of network. Referring to the agreement we signed with your country with your country, your country cannot have a treaty on the Weapons of Mass Destruction, we now have the right to object. I hope your country can provide active cooperation." The Security Department of the Ministry of National Defense said bluntly.

"How can there be weapons of mass destruction on the Internet? "Netiuyi" is just a network technology, how can it be compared with weapons of mass destruction?! You are a false accusation!" The Japanese Minister of Science and Technology Industry made great efforts to defend.

"It is your right to conduct technical research, and we have absolutely no reason to interfere, but when technology threatens the security of our alliance, then you have this obligation to submit relevant technologies to our alliance. This is your obligation. You must know that your national defense is still being carried out by us." The Security Department of the Ministry of Defense pointed out the interests of the Japan-US alliance and raised threats.

...

...

An asymmetric diplomatic mediation was carried out in the Japanese parliament.

As a result of the meeting, Japan unconditionally handed over the "Net-Weasel" technology and promised that without the permission of the United States, it would never use relevant technologies to undermine the alliance relations between the two countries.

The US still leaves room for Japan, that is, the US will not interfere with Japan's actions without destroying the alliance between the two countries.

In this diplomatic note, the US obtained technical information about "Net Weasel" and asked Japan to ensure that it would not destroy the alliance between the two countries and steal network resources.

The dream of Japan's maritime overlord was cut off again.

Although Japan is a strong country in terms of economy, it is an undeniable weak country in terms of politics.

A weak country has no diplomacy!

This is the truth and cannot be questioned!
Chapter completed!
Prev Index    Favorite Next