According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...At least Xiao Tian and his wife are together; the only thing he misses is their child.
However, while the entire project team was busy...
Several photos were displayed on the desk in the CIA headquarters director's office.
Two or three of these photos show Xing Baohua standing in front of the ghost, observing, visiting, and talking with certain people.
The bureau chief pointed to Xing Baohua's photo and asked his subordinates, "I want to know his role in this."
“Chief, we’ve been working on this intelligence for a long time, and we finally got this information. We can’t continue now. Whatever role this person played, the fact that he was there means he was involved,” the subordinate replied.
"The GPS server was hacked, and the technical team has fully recovered the hacking process. This is a new tactical approach, and I have reason to suspect that it was done by the CEO of the Rice Group."
"Perhaps, if one's thinking weren't so flexible, how could such a large company be built? I think the blocking plan should continue."
The director nodded and said, "Sending people there is very risky. There's an old Chinese saying: 'Luring the snake out of its hole.'"
Let's see how to lure him out of his hideout, then we'll make our move from the outside. At the same time, send men over to monitor his movements if necessary.
"No need to send anyone. We have people in the rice factory who have already infiltrated. We might not be able to kill him, but we can still get some intelligence out of him."
Starting with GPS vulnerabilities and working backwards, they discovered that their overconfident high-tech capabilities were utterly vulnerable in the face of some truly exceptional individuals.
Who would have thought that a vulnerability in GPS could be used to infiltrate the Ghost system? If this were the case, most fighter jet upgrades would be at enormous risk.
We consulted with multiple experts to discuss how to defend against it. The first point is to disconnect the connection, just like when you encounter a hacker and don't know what to do, you unplug the network cable and the power supply.
Disconnect him from the satellite signal, and he won't be able to connect to the internet. As for navigation, it's not necessary for now.
Of course, this also means losing many of its advantages.
They don't yet know that what truly harms the Ghost is not GPS, but the extremely high frequency (EHF) radio bands.
Of course, without GPS, the virus could not be implanted on this line, and the extremely high frequency would not play a major role. In addition to GPS, Xing Baohua also came up with another idea: a wireless receiver. Establishing a connection would take a lot of effort, as it would need to be on the same frequency band to receive the signal. By amplifying the signal, the frequency band would be fed back to the other party.
Anyone who has ever used a walkie-talkie knows that sometimes it's easy for the station to switch channels. You can think of it as something as simple as a walkie-talkie switching channel.
At the same frequency, establishing a frequency band channel is equivalent to having a medium, which acts as a repeater.
It synchronizes signal transmission between two different brands of Wi-Fi. Once your device receives the other's signal frequency band, it can easily access the other's system, much like cracking the Wi-Fi network.
Is it simple? This guide alone could fill a book as thick as an instruction manual. And it's a waste of time. Plus, the first challenge you'll encounter is the encrypted program, just like Xiaotian's complete lack of understanding of it.
Now that we have a solution to crack the encryption, it will be much easier to get in next time.
GPS companies and GPS hardware manufacturers have upgraded their equipment, especially the hardware, adding a firewall to the receiving devices. A key is required to access the system via the GPS data channel.
They only protected one external channel, but in reality, many interesting suppression schemes were found among the Ghost's various wireless devices.
For example, if we know their wireless power levels, we can suppress those power levels.
Especially with electromagnetic interference, no matter how many frequency bands you target, if we know the channel, we can interfere with you, catching you off guard and even preventing you from having a chance to transmit.
Sometimes when a formation goes on a mission, there will be an aircraft with an external jamming pod, which is specifically designed for electronic jamming.
It not only interferes with your chat, but it also completely freezes some of your functions, like a system crash, and you don't dare to restart it.
As this project progressed, many technologies emerged.
Outdated meter-wave radars need to be redefined and redesigned so they can be placed in multi-purpose equipment.
If new radar technology emerges and needs to be shared with fire control systems, it will pose a threat to incoming enemy aircraft.
We usually try to persuade people to quit if we can, and we generally won't use the fire control unless they disobey.
With the existence of the Sky Eye, many projects will be added according to subsequent needs. At that time, it will not be like now, where we can only watch but cannot take action, which is very frustrating and can even cause internal injuries.
The escorts are all preparing to undergo surgery, but not everyone can succeed in the procedure.
The risks to oneself are extremely high; if things go wrong, one might not even have the chance to parachute.
If it were in the vast ocean, rescue wouldn't even be possible in time.
After more than twenty days, Xing Baohua was finally able to go home. Xiao Tian and his wife were temporarily transferred, and since their Chinese language system was not yet fully developed, Xiao Tian would have to continue playing the spot-the-difference game.
When Xing Baohua got home, his mother asked him what he had been doing outside and why he hadn't called home for so many days.
Unable to say anything, Xing Baohua simply smiled.
Su Ya told Xing Baohua that from the first to the fifth day of the Lunar New Year, many people came to pay their respects, and she remembered most of their names. She must say, her memory is really good.
In addition to relatives, some local leaders and wealthy individuals also came to offer their condolences.
Xing Baohua looked at the list. Some people needed to be called back, some needed to make a trip in person, and some didn't even need to be addressed.
This chapter is not finished, please click the next page to continue reading!