Font
Large
Medium
Small
Night
Prev Index    Favorite Next

The four hundred and fortieth chapters

Updated: 2012-09-10

However, for Duke and his monitoring system, this actual combat comprehensively tested the capabilities and shortcomings of the system. It turned out that many of the imperfect designs in the system were exposed very fully in this actual combat, which is of great significance to the improvement of this monitoring system.

Kerry is able to decrypt his opponent's communication encryption measures in real time and have been fully verified, fully proving that Duke's whimsical plan is no longer an impossible task, but has gradually evolved into a very operational reality.

For Duke, the only last step left to achieve this impossible task is to crack the invasion of the Global Hawk Control System one by one. Although this is also a very challenging task, for Kerry, as long as he gives it enough time, there will always be a time to break through this system.

But Duke doesn't know how much time it takes to break this system. There are not many research materials available for reference in China for Global Hawk's control system, and only know that it should be a Unix-like system. So what Duke wants to do next, in addition to further improving the accuracy and practicality of the monitoring system, is to find as many Unix-like systems as possible for cracking intrusion experiments, so that Kerry can accumulate more cracking experience.

With such a demand, if someone is paying attention to the dynamics of Duke, he will definitely find that during this period, various companies under Duke are doing a strange job to collect as many operating systems as possible, whether they are public source code, non-public source code, or embedded systems or server operating systems, hundreds of sets were collected in a short time.

Duke threw all these systems to Kerry for trouble, and soon Kerry sorted them into more than a dozen types. The encryption of most embedded systems or desktop systems is extremely weak for Kerry, even if brute force cracking is used, it can be done in minutes.

Only those brute force cracking methods based on minicomputer or supercomputer systems will be frustrated when high-strength encryption measures are adopted. However, Kerry, which has studied multiple large operating systems, can reverse cracking based on the encryption principle algorithms of these operating systems. This method is countless times more efficient than brute force cracking.

With this "skill", Duke began to be a "geek". He first tried the Pentagon's system, and indeed he successfully invaded the Pentagon's system connected to the public network. Although he obtained some so-called secrets that are still confidential to the public, after reading these "confidential" information, Duke felt that the value was not very high. None of the materials such as deployment and user manuals were found in the form of Global Hawk.

It seems that in this regard, Uncle Sam is not a fool. He will not connect truly confidential things with the public network at all, but will put them in an environment with a ** physical network.

After this experience, Duke immediately visited the networks of Boeing, General Motors, Grumman, Lockheed, and Martin on the public network. Although he did not get much important information of the true top-secret nature, the various aircraft operating manuals and maintenance manuals they collected can also give Kerry some side tips. These confidential information will also have high reference value for Duke's future development of drones.

However, the origin of these materials is not open and honest, so Duke is not enough to tell outsiders. He just needs to convert these things into his own things after the company produces results in the future.

Duke is very busy here, and Cheng Chongjin and the others are also starting to get busy. The biggest culprits who ended this mission regretfully, the old J-7 aircraft were replaced with Qin Tairan's strong intervention. As a tracking unit designated by Qin Tairan, Cheng Chongjin's squadron was transferred to the HNA system as a whole. Now it has been replaced with a new generation of Flying Leopard fighter with a larger combat radius. The three of them finally realized their dream of flying a third-generation aircraft as they wish.

Moreover, due to the special requirements of Cheng Chongjin's squadron, the fighter they drove was the latest Flying Leopard, which was equipped with the latest Qinling turbofan engine WS-9c. This new engine made of Duches Heavy Industry's new ultra-high-precision machine tools and the latest developed special materials has qualitative improvements in quality and performance compared to previous generation products.

This new fighter, whose internal code is JH-7c, has a combat radius of more than 2,000 kilometers without a secondary fuel tank. After adding the secondary fuel tank, the combat radius exceeds 2,500 kilometers. With an economical cruising speed, the maximum range can reach 5,500 kilometers and can accept air refueling.

Obviously, this is almost an ideal model tailored for Cheng Chongjin's mission.

Therefore, after Cheng Chongjin's squadron transferred to HNA, he began crazy training. For them, the third-generation fighter jets only had more precision equipment and better fire control systems, and there was not much difficulty in flying adaptation. They quickly mastered skillful take-off and landing skills. Due to more automated control measures, driving was relatively easier most of the time.

However, compared to the J-7, Cheng Chongjin and others are not as agile as the J-7 in terms of maneuverability, but these things are not too big a problem. In the process of tracking the Global Hawk, they do not need to make many difficult maneuvering actions.

Qin Tairan was not idle either. According to Duke's improvement plan for the monitoring system, he needed to organize a man to rush to build the second generation of Global Hawk monitoring systems. In addition to the existing ground monitoring stations and air monitoring systems, Duke designed a maritime monitoring system that can use smaller sizes and less energy consumption to complete the task of detecting Global Hawk communication signals.

In other words, this new thing just activates a signal light, so the structure is more delicate and low-cost, and can be deployed on the sea surface or on unmanned islands and reefs. Each such monitoring device can detect signals sent by the Global Hawk within a range of 60-80 kilometers, so a global Hawk "cordon" that can be established at a very low cost.

Obviously, for countries like our country with extremely vast sea and borders, this kind of low-cost monitoring signal is very practical. Although it cannot provide more information, it can tell you in time whether the "thief" has slipped in.

The improved ground monitoring system and air monitoring system have higher accuracy and stronger positioning functions. For some important military areas, installing this system can quickly locate the general location of the Global Hawk and create conditions for the next step of driving away or destroying it.

Therefore, after the new preparations for the Global Hawks, Duke is ready to launch his last blow to capture the Global Hawks one by one!


Chapter completed!
Prev Index    Favorite Next