Cyberclipper 2
69 pages
English

Vous pourrez modifier la taille du texte de cet ouvrage

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
69 pages
English

Vous pourrez modifier la taille du texte de cet ouvrage

Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

In this novel a couple of cyber computer gurus, Andy and Lori, apply Artificial Intelligence (AI) to create a computer worm virus capable of stopping all operations in a network. Routines generated by a supercomputer defeat any attempt to patch the systems.
A newly elected president, Graham Wilson, seizes the opportunity to apply the technology to thwart the Chinese takeover of America. The worm is released on a secret mission from South Korea. The mission, called Operation Bald Eagle, utilizes the Red Box antigravity device to build a giant Aquaclipper to launch hypersonic stealth missiles to deliver the worm to China’s military, particularly their nuclear arsenal. Two missions force the Chinese into negotiations to halt their half-century campaign to replace the democracy with Communism.
For their contribution to America’s rebirth, the couple receive the Presidential Medal of Freedom. Because of the codes each possesses in memory, they must travel on separate aircraft. The book ends with the couple joining a novel cyber community in Bermuda called SAVOIR. In the end, it becomes quite clear that somebody’s watching over the couple and the Republic.

Sujets

Informations

Publié par
Date de parution 10 mai 2023
Nombre de lectures 0
EAN13 9798823008136
Langue English

Extrait

CYBERCLIPPER 2
CYBER WEAPON ENDS NUCLEAR WAR & CHINA’S TAKEOVER OF AMERICA




JASON O’NEIL









AuthorHouse™
1663 Liberty Drive
Bloomington, IN 47403
www.authorhouse.com
Phone: 833-262-8899






© 2023 Jason O’Neil. All rights reserved.

No part of this book may be reproduced, stored in a retrieval system, or transmitted by any means without the written permission of the author.

Published by AuthorHouse 05/09/2023

ISBN: 979-8-8230-0812-9 (sc)
ISBN: 979-8-8230-0813-6 (e)

Library of Congress Control Number: 2023908757




Any people depicted in stock imagery provided by Getty Images are models, and such images are being used for illustrative purposes only.
Certain stock imagery © Getty Images.

Cover Graphic from Cyberclipper



Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.



Contents
Cast Of Characters

1. Yorktown Heights, NY
2. White House
3. Palmdale
4. Hobart
5. Incheon
6. Subic Bay
7. Palmdale II
8. Beijing
9. Washington
10. Honolulu
11. Seoul
12. Operation Bald Eagle
13. Beijing
14. The Speech
15. Beijing III
16. Incheon II
17. White House II
18. Incheon III
19. Decision
20. The Call II
21. Incheon IV
22. Malayo
23. Fort Knox
24. White House III
25. Savoir



List of Figures
1. Red Box
2. Cyberclipper
3. Tubopod
4. Hypersonica
5. Solarmania
6. Micronations
7. Padlockers
8. Wally 115



Cast of Characters
Andrew “Andy” Lockhart
Cyber Guru at IBM
Age: 32
Similar to: Brad Pitt, Actor
Lori Hamm
Cyber Guru at IBM
Age: 34
Similar to: Lindsey Vonn, Champion Skier
Dr. Logan Tisdale
Director, Watson Supercomputer, IBM
Age: 66
Similar to: Eric Sevareid, TV Analyst
Graham Wilson
President of United States
Age: 64
Similar to: James Stewart, actor
Nancy DeYoung
Vice President of United States
Age: 54
Software Engineer; Project Manager
Similar to: Lauren Bacall, actress
Thomas Sweeney
White House Chief of Staff
Age: 68
Retired Aerospace Executive
Similar to: John McCain, Senator
Rory Flynn
Son of Matt Flynn, Red Box Inventor/Past U.S. President
Age: 65
Manager; $B-size projects and programs
Similar to: Clint Eastwood, Actor
Laura Flynn
Wife of Rory
Age: 63
Aeronautical Engineer
Similar to: Sally Ride, Astronaut
Dr. Orin Schneider
Chief Scientist
Age: 70
Retired USAF General and Director of DARPA
Similar to: Harrison Ford, Actor
Ms. Evelyn Ebbert
White House Communications Director
Age: 58
Similar to: Leslie Stahl, TV Jounalist
General Victor Romita
Chairman, Joint Chiefs of Staff
Age: 68
Retired USMC Commandant
Similar to: Gen. Norman Schwartzkopf
Anthony Holmes
Director, Lockheed Martin’s Shunkworks
Age: 58
Retired USAF Test Pilot
Similar to: Steve McQueen, Actor
Colonel Timothy Wayne
USAF Program Manager
Age: 46
Similar to: Tom Cruise, Actor
Jose Otero
Facility Manager; Subic Bay, Philippines
Age: 59
Similar to: Ricardo Montalban, Actor
Captain Thomas Crowley
Aquaclipper Captain
Age: 60
Similar to: Earnest Hemmingway, Author
Colonel Winpo Park
Harbormaster, Incheon, South Korea
Age: 61
Similar to: Tim Kang, Korean actor
Tam Ree Kim
Hyundai Liaison
Age 55
Similar to: Bruce Lee, actor
Chin Mai Xi
Chairman, Chinese Communist Party (CCP)
Age: 72
Similar to: Ma Huateng, Internet Businessman
Sun Yat Kao
Chief of Staff, Chinese Communist Party (CCP)
Age: 70
Similar to: Jackie Chan, actor
Admiral Key Sham Wong
Chief of Staff, Chinese Forces
Age: 70
Similar to: Li Zuocheng, PLA General
General Andrew Townsend
Commander, NORAD
Age: 56
Similar to: Gene Hackman, actor
Warren Curry
U.S. Secretary of State
Age: 68
Similar to: Mike Pompeo, Former Secretary of State



1
YORKTOWN HEIGHTS, NY
“Ladies and gentlemen, I have the distinct pleasure of introducing two of IBM’s brightest stars here at the Thomas J. Watson Research Center here in Yorktown, Andy Lockhart and Lori Hamm. These two cyber researchers will use the next hour to describe their joint invention which we expect will alter the way nations behave toward each other. Yes, I know that’s a huge claim. So, please focus on this presentation and form your own opinion.
In addition to experts from six of our IBM Research Centers in the audience, IBM is honored to welcome Dr. Orin Schneider, our nation’s chief scientist under President Wilson. As a retired U.S. Air Force General officer and former Director of the Defense Advanced Research Projects Agency (DARPA), you will understand the doctor’s interest in the presentation. This presentation is at the top secret level, and no notes or recordings of any kind are permitted. Please hold your questions until the end. Afterwards, you are invited to join me in the Executive Dining Room for lunch. Andy and Lori, the microphone is all yours.”
“Doctor Tisdale,” began the seasoned cyber guru known as “Einstein” in his youth, “thank you very much for that introduction and this forum. Lori and I are honored to be here to describe our research over the past two years and our protected products.”
“That’s right, Andy,” said Lori. “And it should be clear that what we are about to present was made possible by this incredible facility and the dozens of fertile minds who were consulted to shape this research and ultimate products.”
At this point the duo took their places at podiums on each side of a large screen in the middle of the stage. Laser pointer in hand, Lori brought up the first slide, a giant green worm curled around a wide variety of computers. As the audience gasped, she nodded to her partner to begin the presentation.
“Ladies and Gentlemen, this graphic represents a cyber worm rendering a wide variety of system control computers useless…until we provide the antidote code to release it. Lori and I have been working in the field of Artificial Intelligence (AI) for over a decade. We have been blessed to conduct much of our research using the Watson supercomputer—usually in the wee hours of the when nobody’s around!”
The audience chuckled and knew exactly what he meant.
“After a large number of failures, we finally uncovered and enhanced an Infinite Pulsar Tool (IPT) to install and execute a cyber worm with no known defense in thousands of automated applications. The next slide summarizes several of the tool’s features:
– Worm transmitted in bursts called segments
– Segments are smart, and when they recognize a Central Processing Unit (CPU), they reassemble to infect the device
– Segments move at light speed over networks to avoid detection or any action by a security patch while replicating
– A worm is capable of infecting thousands of systems in each network
– “Stonewall” subroutines prevent owners from protecting encrypted data such as a code to activate a missile
– “Cloud Covers” preclude the determination of the origin of the worm(s)
– Local supercomputers can not predict the next destination to erect a blocking patch
– Once resident in the host operating system, the worm creates so many simultaneous commands that the CPU locks up and is unable to execute an instruction. “Kill Switches” are used if necessary.
– Windows OS is particularly vulnerable. NOTE: Since thousands of Chinese cyber experts educated in America use Windows, the great majority of Chinese systems-commercial, environment and military- are based upon Windows structure, the worm’s effectiveness is enhanced.
“Also, our National Security Agency (NSA) working with us has applied supercomputer-based AI to confirm the code’s capabilities to infect automated networks.”
Dr. Schneider couldn’t resist, he had to ask a question: “Sorry for the interruption, but are you telling me that if properly delivered, the worm could render a nuclear missile useless?”
“Yes, doctor, that is exactly what we are saying. Even our Watson computer has executed trillions of instructions to prove our finding. As an example, a worm could freeze all of the railcar borne missiles under the Great Wall and preclude any movement until we re-segment the worm to neutralize its effectiveness. Indeed, the door to the cave won’t even open, the railcar can’t move, and the missile can’t be armed.”
Loud gasps were heard in the audience of cyber gurus. Andy’s and Lori’s eyes met followed by joint reassuring smiles.
“Does that answer your question, doctor?”
“Yes, sir. It certainly does! Thank you!”

During the next one-half hour, the couple used over 30 slides to show the methodology and results of their research.
Two 3-minute animated videos highlighted the replication and shut-down abilities of the code. At one point Andy took a thumb drive out of his pocket and waved in front of the audience.
“Ladies and Gentlemen, you would not want this inserted into your equipment!”
Nodding heads formed a wave across the theater.
“At this time, Lori and I would be glad to try and answer any questions you may have.”
Over the next 15-minutes, the gurus were pelted with questions which were so cyber-spe

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents