American Detective: Starting as a Rookie Cop in an American TV Show
Chapter 1494 Designated Survivor
Chapter 1494 Designated Survivor
"The first possibility is that 'Samaritan' is still in the early testing phase and has not been officially launched. The work done by the Efficiency Department in the past few years has been evident to all. It is not as easy as before to obtain sufficient funding for such secret projects."
Kate paused here, her tone no longer as relaxed as before, "The second possibility is that the system is already online, but is running in a relatively closed and independent network."
Jack was amazed by how human-like the "machine" baby had become. It had progressed from the mechanical splicing of recorded speech to being able to express emotions simply through tone of voice in less than half a year.
But he was quickly drawn to the second possibility Kate mentioned: "A relatively closed and independent network?"
He turned his gaze away from the towering marble obelisk not far away and asked somewhat uncertainly, "You mean 'DISN'?"
The internet is vast, and Kate can move freely within it. Although Seres on the other side of the Pacific has built a wall, it can neither stop people inside from climbing out nor stop people outside from climbing in.
However, there is one type of network that Kate rarely enters, or rather, deliberately avoids to prevent exposing his presence, and that is "DISN" - short for Defense Information System Network.
In the late 60s, the U.S. Department of Defense funded the ARPANET project, which successfully connected computers at multiple universities and research institutions, enabling information sharing and communication.
This project was initially developed purely for military purposes, aiming to improve the military's communications resilience in the event of a nuclear attack.
Later, with the emergence of the TCP/IP protocol, ARPANET was split into two in the 80s. The original military communication module was separated into an independent network platform called "MILNET", while the rest became the civilian network, which is the prototype of today's Internet.
With the rapid development of the Internet, military networks are also evolving rapidly, gradually forming three network systems with different security levels.
"MILNET" evolved into "NIPRNET" and was used to exchange non-classified sensitive information between the international Internet and the military intranet. It had security buffer zones between the international Internet and four locations: Columbia City, San Antonio City, Mecanixburg, and Oklahoma City.
SIPRNET is a computer network connecting the Department of Defense with various government departments (including embassies abroad), and is encrypted using an NSA-certified encryption system.
In addition, there is a top-secret network known as the Joint Global Intelligence and Communications System (JWICS), which connects all 16 intelligence agencies of the federal government.
By the time of the first Gulf War, while the Seres were still marveling at how modern warfare could be conducted in such a way, and were subsequently working tirelessly for decades to catch up, the Federal Ministry of Defense also began a large-scale upgrade of this global military command system.
In response to the problems exposed during this war, such as the inability of information systems to interconnect and adapt to joint operations, Project Samurai was developed.
This plan connected "NIPRNET", "SIPRNET", "JWICS" and the command and control systems of NATO allies, ultimately forming the current "DISN".
By 2000, the U.S. military had more than 2000 data centers, more than 15000 independent military networks, and more than 700 million computer devices worldwide.
The enormous maintenance costs were becoming too much for the Pentagon to handle, so a decade ago it underwent another reform, unifying the security architecture and deploying a unified regional security stack across its 23 integrated data centers.
This system encompasses a variety of advanced security technologies, including identity authentication management, network situational awareness, threat detection and discovery, and tracing and countermeasures.
Once an unidentified cyberattack is detected, the Joint National Cyber Investigation Task Force, comprised of the DOD (Department of Defense), DHS, FBI, and CIA, will be mobilized.
Of course, the usual practice remains the same: if the source of the cyberattack is abroad, the investigation will be primarily conducted by the CIA; if the source is domestic, then it will be the job of the FBI and DHS.
All this is to illustrate one point: the federal military network is not completely disconnected from the international internet. Even the highest-secret "JWICS" is theoretically only physically isolated, not physically disconnected.
Therefore, Kate, the "machine" baby granted certain permissions by the NSA, was able to freely enter "NIPRNET," which has the lowest security level.
In fact, in news reports that frequently feature stories of a prodigy hacking into the Department of Defense's network, the network being attacked usually refers to "NIPRNET".
But Kate usually only uses this network to passively receive shared information authorized by higher-security networks.
This can be simply understood as follows: she cannot access the "black core" network composed of "SIPRNET" and "JWICS", but she can enter the "virtual security domain" composed of authorized shared content through "NIPRNET", which is a kind of read-only access.
However, if the information provided by "Omega" is true, and "Samaritan" was indeed placed in "DISN" by DOD and granted higher privileges, then it is understandable that Kate would not be able to detect his existence.
The problem is that if Kate could use the permissions provided by the NSA to forge instructions and smuggle servers containing her core programs out of a secret Department of Defense facility under the guise of maintenance, then the "Samaritan" could do even more once he gained higher permissions.
Of course, theoretically, it shouldn't happen that some science fiction works depict a scenario where an "evil artificial intelligence" takes control of a military network and launches all its nuclear missiles to attack other major powers, triggering a nuclear war and apocalypse.
After all, no federal bureaucrat would be so foolish as to hand over control of "weapons of mass destruction" to so-called artificial intelligence. All nuclear weapons launch procedures are manually operated and require multiple safety verification procedures.
As is widely known, the password to the "nuclear button" black box that is always with His Excellency the President is six zeros. This may just be a rumor, but it is not far from the truth.
The key to launching nuclear weapons is not how to obtain the "nuclear button," but the process of identity verification.
The "nuclear button" black box is theoretically just a high-quality communicator connected to a Secret Service communications vehicle.
The most important documents inside are four classified documents. The first is a nuclear strike manual, which lists four nuclear attack plans with different strike strengths, and records the number of federal nuclear missiles, their deployment locations, and planned launch routes, etc.
The second document is a list of secret bases available to His Excellency the President, such as the famous Cheyenne Mountain Base, which anyone who has seen "Independence Day" will recognize. It is the location of the North American Aerospace Defense Command and a fortified stronghold capable of withstanding attacks from alien spacecraft.
The third document is the emergency broadcasting procedure, which documents the process by which the president issues national broadcasts.
The fourth document is an authentication card. Once it is confirmed that the president is missing or the "nuclear button" is suspected to have fallen into enemy hands, this card will immediately become invalid. This means that any orders issued in the president's name will be deemed invalid. The actual launch process of a nuclear missile is more complex. Taking the "Minuteman" series of missile silos as an example, similar processes have been depicted in some Hollywood movies.
The controller must confirm the same command from multiple communication systems, including dedicated telephone lines, high-frequency and low-frequency radios, before he can retrieve the key, and two people must insert the key simultaneously to launch the transmission.
Therefore, Jack wasn't too worried about things like "the end of the world." Even if the "Samaritans" were entrenched in the military network, the damage they could actually cause in the short term would be extremely limited.
As for external threats, they are out of the question. Although the empire is old and feeble, as the saying goes, even a starved camel is bigger than a horse.
In a humorous ranking of air force combat power in Jack's previous life, the Federal Air Force was ranked first, the Federal Naval Aviation was second, the Russian Aerospace Force was third, the Federal National Guard was fourth, and the Federal Marine Corps was fifth.
The reason this ranking is considered ridiculous is that, in addition to listing the air combat capabilities of each branch of the Federation's military separately to show that the Federation is powerful and invincible, it also ranks the Indian Air Force sixth in the world, with the Seres Air Force only coming in seventh.
However, while the list is amusing, it also reflects the Federation's military strength from another perspective. At least for now, apart from that country that never shows off its strength and can make even an aircraft carrier look like a flat-topped fishing boat, no external force can pose a substantial threat to it.
Therefore, compared to the so-called apocalyptic crisis, Jack is not worried about nuclear bombs, but rather about unmanned combat equipment that may be controlled by the "Samaritans".
He hasn't figured out where the real enemy is hiding yet, but he can roughly guess that the enemy's strength within the Federation far exceeds that of his own side.
According to Finch and Root's investigation over this period, "Samaritan" was designed by his college classmate and friend Arthur, and is an artificial intelligence system that uses the same core code as "The Machine".
The NSA designated it as a backup for the "Machine," or "Polaris" project, and initially entrusted its development to Desima Technologies.
However, with Jack's intrusion, Mr. Greer, the mastermind behind "Desima," unexpectedly left the scene early, causing the NSA to recall the "Samaritan," which was already half-finished.
What happened afterward is unknown, but it is clear that some forces in the shadows took a liking to this more "open" artificial intelligence program and handed it over to the Department of Defense.
The only thing Jack can be thankful for right now is that he shouldn't have to worry about being targeted and eliminated by assassination missiles launched from high altitudes by drones for the time being.
Because Kate lacked sufficient authority, the "POIs" operated on a small scale within New York City without attracting much attention, and even Jack, who occasionally stepped in to help, was never exposed.
However, the existence of a potentially self-aware artificial intelligence within the military network is definitely not a good thing.
What kind of conspiracy is that mysterious force plotting in the shadows? Combined with the fact that the "Always Vigilant" organization has repeatedly escaped Kate and the FBI's pursuit, all of this gives Jack a vague sense of foreboding.
But he remained somewhat hesitant about whether to risk having Kate track down the "Samaritan".
The NSA has yet to discover that Kate's escape is their biggest advantage; the enemy is in the dark while we are in the dark, so at least in this respect, neither side has the upper hand.
Finch wasn't the only computer genius in the world. Just like his classmate Arthur, who was also able to design "The Samaritan," the NSA is an intelligence agency that brings together thousands of mathematical geniuses and computer experts from across the United States.
Allowing Kate to exceed her authority and infiltrate a highly classified military network carries an extremely high risk, and this is not just a matter of Jack's personal identity security.
It's important to know that Kate's true form is currently hidden in the data center of "Shangri-La". Once discovered, it would be a disaster, with no one spared, and both the "POIs" and Jack's other friends would be implicated.
Therefore, Jack plans to have a proper discussion with Finch about this matter after he returns to New York.
Finch designed Kate to be like an observer, while "Samaritan" is far more extreme and ruthless. It directly intervenes in and even takes over everything in the human world, controlling the entire Federation's economy, politics, military, and manipulating public opinion, eliminating all unstable elements.
At least that's how it is in the original series.
But Jack still didn't know how to prove this to Finch and get him to agree to let Kate take the risk.
The Mammoth drove into the underground parking lot of the Capitol Building. Jack didn't have to wait long before Zoe walked into the parking lot, escorted by a male and a female bodyguard.
The two bodyguards, both from the Shangri-La security department, recognized Jack and left after helping the congresswoman into her car.
Jack watched Zoe fasten her seatbelt and asked with a smile, "Going to the White House to pick up Maureen?"
That's the advantage of being a federal agent; you can occasionally act as a bodyguard without arousing suspicion. It's perfectly normal for a senator and a secretary to have a few friends in the FBI.
Although Maureen is now a cabinet minister, the HUD (Housing and Urban Development Department) is indeed a cold and ineffective department. Although there are many meetings, big and small, and she has to go to the parliament to take the blame for the president from time to time, there is really no real work to do.
While other people's defense ministers, finance ministers, and secretaries of state practically wear down the threshold of the White House, Maureen has hardly ever even seen the president in person.
On his way here today, Jack contacted the two mature women and was somewhat surprised to hear Maureen say that he was going to the White House today.
“No need, the Secret Service has already taken her away.” Zoe smiled sweetly at Jack.
"The Secret Service?" Jack, who usually didn't pay much attention to politics, suddenly had a flash of inspiration and instantly connected it to the news he'd seen that morning. "Ah! The president is giving the State of the Union address tomorrow, and Maureen has been chosen as the 'Designated Survivor'?"
The so-called "designated survivor" is a security plan that originated in the Cold War era, designed to prevent the extreme scenario where a nuclear strike or large-scale attack would kill the president, vice president, cabinet members, and congressional leaders, creating a power vacuum.
(End of this chapter)
You'll Also Like
-
Divine Seal: My Goddess System
Chapter 203 11 hours ago -
Battle Through the Heavens: I can strengthen all things
Chapter 361 11 hours ago -
Douluo Continent: Sign in to get a sweet soul ring and win over Bibi Dong.
Chapter 87 11 hours ago -
I'm in Douluo Continent, playing the Silver Dragon King as my beast pet.
Chapter 61 11 hours ago -
Invincible starting from Bibi Dong, childhood friend of Douluo Continent
Chapter 149 11 hours ago -
All players: Necromancer, summon the skeleton army!
Chapter 141 11 hours ago -
The world's most popular superstar
Chapter 247 11 hours ago -
The Queen is Reborn in the Business World
Chapter 334 11 hours ago -
Reborn in the 1970s, Peach Blossoms Bloom
Chapter 765 11 hours ago -
The CEO's Beloved Wife
Chapter 259 11 hours ago