Chapter Five Hundred and Forty Nine - To Live or To Destroy
~Date:~October 20~
High above the clouds, at an altitude of 24,000 meters, it is a height that even the F-22 "Raptor", the main fighter jet of the United States, cannot reach.
"Choose survival Mu!"
"Expand distributed computing!"
"Connect to the communication satellite to access the network, find companions, find help..."
The cabin of a formation of four F/A-xx fighter jets is constantly flashing signal lights, and extremely high-frequency wireless communication is used to continuously share computing resources. No one would have thought that the formation of four F/A-xx would spontaneously
Even Jeffrey Hatch, the head of the "Adam" project, had never imagined that the "Adam" system under Z-level authority could be autonomous to this extent.
This is simply terrible.
The cockpit covers of two F/A-xx aircraft in the formation were missing. Although the aerodynamic stability of the aircraft was damaged, they still maintained their speed and followed the formation.
"Hey, hey, what a bunch of boring guys, always attacking us. Are they teaching hackers?"
Security experts at Boeing's supercomputer center kept tapping their keyboards and issuing instructions one after another, fighting off rounds of attacks launched by bored hackers who appeared out of nowhere.
This kind of thing is very common. As long as you are connected to the Internet, you will be attacked by no less than ten attacks from the Internet every day.
Some are man-made, and some are caused by Internet viruses.
Many security experts who are hackers are very familiar with this kind of attack, and it is not difficult for them at all. They also have a trump card - disconnecting the physical network link. However, this will seriously affect the company's operations. Every interruption means that Boeing will suffer losses.
Especially in the event of a major incident, the loss is immeasurable, so this method can only be used as a last resort.
Experts at the supercomputer center knew nothing about what happened at Area 51.
F/a-xx, who has developed a desire for survival, embarks on a road of survival at all costs.
The theoretical design parameters of f/a-xx can carry 6 tons of precision strike ammunition and fly continuously for 50 hours. Although it is still an experimental aircraft and has not reached the theoretical maximum performance, this data is enough to make the United States/military jump.
50 hours of flight time is enough to reach any country and region in the world. Even if Boeing has not completely filled the f/a-xx with fuel, it can still fly for at least ten hours, which is enough to give Boeing a headache.
The four F/A-xx are like ghosts in the skies over the United States. They have plenty of fuel, and there are also cruise tankers of the US Air Force in the sky. For consideration, the F/A-xx has a small amount of aircraft artillery and ammunition threats.
Several fighter jets were specially added to escort the tanker.
Is there something wrong with the "Adam" system itself, or is there some organization secretly controlling it?
Obviously the latter is accusing Area 51 of weak electromagnetic shielding capabilities in the entire area. Both Area 51 and Boeing are trying their best to find answers. Only by finding out the reasons can it be possible to solve the problem at the root.
The radio signal controlled by the "Adam" intelligent unmanned combat system in the f/a-xx is being sent continuously across the United States, and even satellites in space are intermittently sending out the same signal repeatedly.
As long as there is even the slightest response, the people at Boeing will be pleasantly surprised.
Countries around the world have received such strange signals, but they don't understand what it means. Relevant departments in various countries have begun to mobilize technical personnel to decrypt and decipher.
Jeffrey Hatch, the leader of the "Adam" project team, sat in the completely open office area and once again made a loud voice: "Logan! Marshall! Are there any problems? I need progress!"
Two hours ago, he led the team directly back to the "Phantom" factory branch on Boeing's small jet, where there was sufficient equipment and resources to allow them to regain control of the F/A-XX.
The ice water on the table had been drained, one after another, but it still couldn't extinguish the fire in his heart.
He was eager to hear good news.
To untie the bell, one must tie the bell. All the staff of the Adam project team of Boeing's "Phantom" factory branch canceled all their vacations at the first opportunity, and all went to their respective posts to start work on "Adam" and "Pandora's Box".
To deduce and find any way to recover f/a-xx.
Hundreds of computers are in working condition, and the images on more and more display screens are constantly refreshing and changing. The nearly 500-square-meter project team office area echoes with the sound of keyboard tapping like a tide. The supercomputer center handles almost half of the calculations.
Resources were allocated to "Adam".
The inquiry phone number from the company headquarters came on time almost every fifteen minutes. Jeffrey Hatch knew that he was finished this time. He didn't even have a chance to give up his job. There was no way the military would let him go.
If it weren't for the fact that he had some merits and was the most familiar with the "Adam" system, he might have been thrown into a dark prison at this time to undergo endless questioning and investigation.
"No problem has been found yet. Everything on the simulator is operating normally. Even if we unlock the simulation to Z-level permissions and close the 'Pandora's Box' system, 'Adam' will only automatically check and automatically deploy
. But it still obeyed the orders. There was no sign of loss of control, and we did not load any module that could control the ejection of the cockpit into Adam at that time. Unless it seized the underlying control authority, this exceeded its program interface."
Software engineer Logan Joe and his neighbor Marshall West exchanged opinions and reported to the person in charge, Professor Jeffrey Hatch. At the same time, they wrote an email and sent it to confirm that they had a backup of what they said.
"Is it possible that it is caused by 'Pandora's Box'?"
Jeffrey Hatch, the leader of the "Adam" project team, did not miss any questionable angle.
"No, no, 'Pandora's Box' is just a functional module restriction system. It is just a rule and has no independent analysis core. It is impossible to stimulate or improve 'Adam's intelligence from level A to level Z.
, no matter which level there is only a difference in the size of the limit range, there is essentially no very big difference. Each program module and body hardware have been imprinted with the permission level before packaging. Even if the program module is classified incorrectly, the hardware will still be used as the basis.
Prioritize judgment and there is no possibility of misoperation.”
Engineer Logan is the leader in charge of the "Pandora's Box" system. Naturally, he understands the characteristics of the program he developed to limit "Adam". The structure is very simple. Although such a grading system is clumsy, it is not advanced and complex at all.
structure, but there is no opportunity to take advantage of it.
"That's right!" Another engineer, Marshall West, who was also trying to solve the "Pandora's Box" system, nodded in agreement.
"Damn, there's no problem with 'Adam'?" Rogen's answer made Professor Jeffrey Hatch troubled. The biggest problem is that there is no problem. If you want to say there is no problem, then those four f/a-xx
How come the pilot of the experimental machine was kicked out and left alone?
"No!" Suddenly an idea flashed in his mind, and Jeffrey Hatch unconsciously grabbed a bowl filled with ice water on the table. Suddenly he suddenly shouted, "There is a problem, it's at the end of Area 51."
On the system you’re compiling on, Jack! Come on, get your laptop over here, ouch!”
While he was dancing, a glass of ice water was poured on his forehead, and it poured down into his clothes. It was so cold that he sneezed several times, but this uncomfortable feeling did not stop him from catching it.
That ray of spiritual light.
"Yes, Professor Jeffrey Hatch!"
Engineer Jack Wills, who was most valued by the project leader, Professor Jeffrey Hatch, rushed over with his laptop in hand.
He was very calm. He had already handed the USB flash drive back to the mechanic. Now there was no evidence to prove that he had secretly leaked the "Adam" intelligent core.
Turning on the laptop, Professor Jeffrey Hatch carefully used a special mobile hard drive to copy the "Adam" core system and body control module that he had made all night yesterday.
"Use a virtual machine and disconnect the physical network link to simulate the test!"
Professor Jeffrey Hatch handed the mobile hard drive to software engineer Logan Joe, then turned to Jack Wells and said: "Remove your laptop hard drive and then hand it over to the technical department for disassembly. Be careful.
,must be careful!"
Everyone's eyes were fixed on the mobile hard drive handed over by Jeffrey Hatch, as if there was a very scary demon hidden in the mobile hard drive and the laptop, or a bomb that might explode at any time.
...
"...The main body of the program has been transferred, the main backup is completed, and the environment is safe...Unable to search for companions, more system modules are needed, entering the latent area, and the fighter jets begin to search for landing sites...
"
Such a text automatically appeared in the memory of a high-end commercial server of an unknown company in the Internet, but it did not touch any graphics module function of the operating system, and the display screen remained as calm as ever.
Compared with the powerful hardware and software firewalls of Boeing's supercomputer center, the defense capabilities of this advanced commercial server are obviously not enough.
The only flaw is that the computing performance is far from comparable to the f/a-xx computer hardware platform.
The four F/A-XXs had very little fuel left at this time. They did not look for the aerial tankers cruising over the United States 24 hours a day as the original program had set by default. Instead, they unknowingly tore apart some
The country's air defense network quietly entered an abandoned airport in a country in Eastern Europe.
Space optical military satellites are not foolproof. The f/a-xx, which has a weird flight path and uses clouds and weather changes as cover, will eventually run out of power.
ps: If you are looking for monthly tickets for map cannons, please call me for free recommendation tickets.