Nandu, national security agency, headquarters building.
After receiving the notice, Liu zhenhei, the current director of the National Security Bureau, who was originally holding a high-level regular meeting of the National Security Bureau in the conference room on the eighth floor, had a calm face and went directly to the data center on the third floor of the headquarters building through a special elevator with more than a dozen heads of various departments of the National Security Bureau.
As soon as they came in and opened the door, they heard the alarm sound of the data center.
Liu Zhen''s face became more ugly. He walked quickly and came to a tall and thin man with a red face and sweating to command the technicians. He asked impolitely, "Xiao Wu, has the virus been cleaned up? What''s the situation? How can people bury thunder on the internal network of the National Security Bureau? What do you do for food?"
Although he was promoted from an administrative position as director of the National Security Bureau, Liu Zhen was not very knowledgeable about many technologies.
But he has taken over the NSA for nearly two years. Two years is enough for him to learn a lot.
For example, he seldom surf the Internet at home. Now he knows the difference between intranet, extranet and dark network.
The internal network of the national security bureau is a self built LAN, which does not open the access port to the outside world. Only some encrypted computers in the headquarters building can access it.
The security of the intranet is different from that of the leaky Internet. As the headquarters intranet of China''s only intelligence agency, the NSA intranet pays more attention to security and confidentiality. Not only have special technicians built several sets of heavily guarded firewalls for it, but also someone will regularly check each computer linked to the NSA Intranet Maintenance and inspection of servers and other equipment.
Therefore, in the past ten years since the establishment of the NSA intranet, there has never been any record of intranet data leakage or foreign hackers invading the intranet by infecting the NSA headquarters computer.
But this record is now clearly broken.
Because just over half an hour ago, a group of technicians in charge of Intranet maintenance in the network technology section of the technology department under the National Security Bureau found that suspicious Trojans and viruses had been buried in the internal network of the National Security Bureau during routine maintenance and inspection of the internal network.
Not to mention how the NSA intranet, which has always paid great attention to security, was easily broken through?
It took the technical team more than half an hour to solve the file that was implanted into the intranet by outsiders. I don''t know whether it was a Trojan horse or a virus, which was enough to shake the whole NSA up and down.
Although as a national intelligence agency, the NSA''s confidential data and information are still kept on paper and will not be stored on the intranet, many of its daily work is to borrow the intranet for transmission and processing. No one can guarantee that there are no documents that can let overseas intelligence agencies guess clues in the leaked data.
Just think about it, Liu Zhen will be in a cold sweat.
Xiao Wu, who was held accountable by Liu Zhen, is Wu Qingyuan, the head of the network technology section of the technology department under the National Security Bureau.
At the sight of the boss''s smelly face, Wu Qingyuan couldn''t care to wipe the oil sweat on his face, and replied in a dry and dumb voice: "Director, the files of suspected Trojans and viruses have not been handled yet... The operating system used by computers in the National Security Bureau to build the intranet is developed based on the Open Source Software Linux... It is obvious that the intruder has a root vulnerability of the Linux system that we do not know, so the technology can not delete or shield this suspected vulnerability for the time being Access to intranet information by Trojan horse and virus software... "
To put it bluntly, they are actually paying debts for their predecessors.
Linux system is an open source software, which was created by Finnish programmer Linus tovaz at the end of last century. It is a UNIX like operating system.
Because Linux is shared with the world by its founder, anyone can use it.
Moreover, because the source code of Linux is all publicly shared with everyone, over the past few decades, through the continuous improvement and deduction of tens of thousands of computer engineers all over the world, hundreds of different versions of Linux have been born. All countries, enterprises and individuals can develop an operating software to meet the needs of governments, research institutions and national defense institutions.
It is much more difficult than ordinary people think to develop an operating software.
This difficulty is not only reflected in the huge amount of code of an operating software, which is far more than ordinary software.
The most difficult thing is compatibility, the compatibility between software and hardware, and the compatibility between software and software. After all, some compatible technologies can be solved, but some are not.
It is no exaggeration to say that if you want to develop a new operating system from scratch, you can''t see anything less than 10 billion yuan.
When Microsoft promoted vista to replace XP, foreign media said that the system cost Microsoft nearly $20 billion. Therefore, the failure of Vista led to the collapse of Microsoft''s share price by hundreds of billions.
There must be water in it, but the high development cost of an operating system for the public can be seen from the peeping spots in the tube.
The National Security Bureau has its own technical team and a special national appropriation every year. However, no matter how high the appropriation is, it is impossible for the senior management to put the cart before the horse and allocate a huge amount of money to develop their own operating software.
The operating system used by the NSA intranet was purchased from a domestic professional software development company.
After obtaining the outsourcing project, the enterprise with national defense and military procurement qualification deleted a large number of unused things on the basis of Linux system, and focused on improving and upgrading security and protection.
In a sense, they are actually qualified. Although the operating system sold to the NSA is far less functional than Microsoft''s products, it still has some advantages in terms of security and protection.
However, Linux has never been a perfect operating system.
Because it has opened the source code to everyone, I don''t know how many programmers have participated in the development of those different versions shared in the online community.
Limited by their technical strength, some malicious people have left some loopholes and Backdoors in the source code that only they know. Therefore, it is difficult to say which version of Linux system does not have loopholes.
Once there are vulnerabilities, especially the root vulnerabilities hidden in the depths of hundreds of millions of codes, the strongest system may also be invaded.
After Wu Qingyuan briefly introduced the problem, Liu Zhen didn''t look much better on his face.
"... you can''t delete it or prevent it from accessing the intranet? Can technology track where the transmitted data goes? Can you determine where the other party invaded the intranet?"
The person in charge of the security office is Zhang Qinglin.
Wu Qingyuan shook his head, but his face was a little better than before: "... our intranet does not have the permission to access the Internet, so this suspicious file that suddenly appears in our intranet can only be transmitted to the intranet through a computer port in the national security bureau that can log in to the intranet... Just now I asked the technology to temporarily shut down the base station in the headquarters in advance, so the stolen data from the suspicious file should only be transmitted A small part of them are still stored on a computer in this building... "
"At present, group 1 and group 2 are processing this unknown file. Group 3, group 4 and group 5, accompanied by the personnel of the security office, have started to check all servers and computers linked to the intranet one by one. A message will come soon!"
While talking, there was a rush of footsteps outside the door.
Soon after, a fat young man wearing thick glasses slammed the door open, hurried in and shouted: "... Section chief... Looking... Found..."
The fat young man couldn''t care to wipe the sweat off his face and held a silver USB flash disk high in his hand.
Wu Qingyuan was overjoyed and hurried forward, "Liu Jun, what have you found?"
The fat young man is a technician in the fourth group of his network technology group, named Liu Jun.
Seeing that he handed himself the silver USB flash disk on his hand, Wu Qingyuan quickly took it over, but still asked.
Liu Jun gasped for breath. Then he noticed that there were more than a dozen real bosses in the Bureau standing in the data center. Suddenly, his mouth was a little bad.
"... this... This is the USB flash disk for uploading... Uploading files... Yes... It was found on plane 45 on the third floor..."
Liu Zhen smelled that Yan''s face was darker and looked at Zhang Qinglin. Zhang Qinglin, who didn''t look very good, nodded and went out.
The security department is responsible for the Security Department of the National Security Bureau, and it also shoulders the anti conflict work.
Zhang Qinglin is the head of the security office. Now the suspicious files have been implanted into the intranet of the Ministry of national security, and it has been found that they have been uploaded to the intranet through the internal computer. This is already an extremely bad case, and the behind the scenes must be caught as soon as possible.
Wu Qingyuan waved to two technicians and carefully gave them the USB flash disk, "go to the security room to check, be careful..."
Their technology department has its own security room, which is not networked and has complete detection equipment. Even if the USB flash disk is formatted, it can recover the previous data.
After seeing them off, Liu Zhen got together with the two deputy directors and several directors everywhere and talked in a low voice.
"... this is an extremely bad enemy spy invasion. What do you think?"
"Liu Bureau, do you want to report to the Presidential Palace first?"
"... I don''t think so. Wait until the investigation report of the security office comes out. At present, we can''t determine how many documents have been leaked on our intranet..."
"... is it related to the CIA? They lost a lot of people in Nandu last month. Laomei always suspected that we did it, and recently arrested many of our expatriates..."
"It''s possible..."
Wu Qingyuan saw that no one paid attention to him. He was a little relieved and took a few steps back to facilitate the communication between the big guys.
I didn''t want to go far before I saw a bang in the distance, which immediately attracted all the eyes of the whispering communication here.
Wu Qingyuan also looked, only to see that a few meters away, a young man holding a custom-made heavy notebook accidentally bumped into the next desk.
Seeing that it was his technician, he was about to scold with his face. He saw that the young man twisted his face. It was obviously that he had just hit it and hurt badly.
But the balding young man still twitched and limped over, "section... Section chief, director, suspicious documents have been opened..."