Chapter 1096 There Is No Such Thing as a Banquet in the World (Please Subscribe!)
see this message.
Whether it's someone from the Information Warfare Research Center.
Still the big guys at the top.
All of a sudden, I became nervous. The involvement of the United States has never been a trivial matter. Once the people of this organization are arrested, the network technology strength of the United States will definitely increase by a lot.
Even if you are not caught.
If they lose their partnership with this organization, they will also lose a lot of help.
To know.
these two years.
This organization has helped them a lot.
Through the Internet, they have obtained a lot of confidential information that they had never had access to before. Many of the cutting-edge military technologies are the core secrets of the world's major arms giants.
Things developed by people with dozens or tens of billions of dollars.
That's it.
Sold it to them at the price of cabbage.
Greatly enriched their military technical reserves.
By tampering with the personnel information of major airlines, it has brought great convenience to the evacuation of some important personnel. Even changing customs information in Western countries, a lot of equipment was shipped back.
It can be said.
They are used to such a powerful ally.
Now.
Suddenly said to terminate the cooperation.
How are they willing.
But.
People said it.
Their whereabouts were discovered by the United States, and they had to run for their lives.
On the occasion of parting.
Just packaged and sent some technology.
after.
I was never able to get in touch again. At the same time, the 'Family Searching Network' is officially under the management of the system. In the future, children will need to complete such incidents by themselves.
They are confident in this.
After so long a blow.
Thousands of people have been arrested, no matter how big or small, and they will be severely punished. There are really not many people who dare to be human traffickers. Of course, this is based on the premise that they can continue to solve cases so efficiently.
Otherwise, the deterrent effect will be greatly reduced.
In addition to the 'family search network'
The foundation is still independently run.
Managed and supervised by an agent selected by that organization, the organization said, they will always pay attention to the development of the foundation.
therefore.
No one is going to waste that money.
otherwise.
See you later.
Everyone's face is not good, and they even feel bad about them, which is more than the gain.
. . .
this news.
Obviously fake.
Because the 'organization' personnel are all in the command room, how can they be traced by the United States? Even if the address is found, they will be transferred to their interior, yes, their interior.
This trick.
It's called 'internal disintegration'.
To infiltrate American intelligence.
The command room inevitably resorted to some underhand tricks.
For example, in the previous leak of General Dynamics nuclear submarine technical data, after several investigations, it took more than three months to find out that the FBI internal technicians had invaded through network vulnerabilities.
The buyer is a polar bear intelligence officer.
The trail ends here.
Because the insider had fled and disappeared, and the intelligence officer of the polar bear was caught by the CIA. At that time, he was still at a loss. I bought the person.
But I didn't get anything.
But.
People have no evidence.
Of course, the matter will not end there. A few days later, a deputy director of the FBI discovered that the memory card for that information was in a gift given to him by the guy who escaped before.
Immediately startled.
This kind of thing, if you get a little bit of it, you have to peel off the skin. Will he suspect that it is an accomplice? In this way, he destroyed the memory card, as if nothing happened, and came to the evidence of destruction.
However.
What he didn't expect was that someone came to the door the next day with a testimony, as well. . . video. . . .
then.
A deputy director has thus become a 'next family'.
. . .
Cooperation for so long.
Tang Qing felt it was time to end his mission.
In the past two years of cooperation, the technical strength of the research center has also grown by leaps and bounds. The soldiers not only taught them many cutting-edge hacking techniques, but also helped them build a very strong defense system.
these two years.
Powerful, followed by attracting hatred, if you are powerful, some people will be jealous.
Someone challenged.
Same as country.
When America was the most powerful country in the world.
All countries will want to pull him off the horse, and they will be very happy if he is not good.
Wait until the future.
Still facing this problem.
When you become the focus of everyone, you will suffer more attacks and accusations, because being strong is a "sin" in itself, and your strength is a security threat to others.
then.
The research center was lively.
two years.
Exercise every day, almost so that they have no free time.
Fortunately.
Two years of training.
tempered into a steel.
All good things come to an end.
It is time for them to 'apprentice', and the tens of billions of rewards they have received for helping them do some things in the past two years are all given to the foundation. If they want to spend it, it will take at least ten years.
. . .
April tenth.
Ministry of Information Industry announced.
"In the next three years, we will accelerate the increase of Internet bandwidth speed and build an information society. At the same time, in early May, 4G licenses will be issued to three operators."
A stone stirred up a thousand waves.
This is after Burma.
The second country to announce the full construction of a 4G network.
Other countries are watching.
They felt that the 3G network speed was sufficient, and they did not need to upgrade so quickly. However, they did not contact the mobile phone, but the 'Skynet' plan announced by the government.
Skynet Project.
Use cameras, sensors, chips and other equipment to comprehensively improve the informatization and automation coverage of all walks of life. For example, monitoring, in the next three years, all public monitoring will be connected to the public security network.
As long as it's not in your own home.
It does not involve company secrets and privacy, and will be connected to public security monitoring.
This consumption of traffic.
Not a little bit.
If you are attentive, you will find that the Internet speed increase has been done a year ago, and it is being done on a large scale, but it has not been announced so solemnly, and problems will be found after analysis.
The main purpose of this time.
It is a 4G license.
The happiest of course is Huawei.
As a local enterprise, it has a natural advantage. After the major operators get the license, they start the preliminary preparation, calculation requirements, networking, large-scale test area, cutover plan, etc.
I can't be busy.
Fortunately, Huawei has given a mature networking plan.
They just need to complete their own demand calculations.