My Wife is Actually a top-tier Soldier King?!
Chapter 844 - 844 844 Difficulty Off the Charts!

844: Chapter 844: Difficulty Off the Charts!

844: Chapter 844: Difficulty Off the Charts!

Speed is of the essence in warfare!

Wu Jie immediately contacted the External Affairs Bureau to request some data.

In any major military power, military and civilian networks are separate entities.

Although both utilize mobile wireless communication technology, the differences between them are significant.

Civilian networks, to meet the demands of a massive user base and high-speed, large-capacity needs, continually adopt the latest technologies, progressing from 2G to 3G and 4G, with ever-increasing internet speeds.

However, connectivity issues and slow speeds are common in different places and at different times, especially where cell towers are sparse and mobile phone usage is high, resulting in extremely frustrating lag.

Military networks, on the other hand, are designed with strong reliability and resistance to destruction in mind, ensuring timely and effective data transmission so that during wartime, connectivity issues won’t prevent the delivery of orders and intelligence.

Hence, military networks typically choose very mature communication technologies, with a focus on secrecy and interference resistance, and are generally a generation behind civilian networks.

Nowadays, the 4G intelligent world is widespread, and as long as there is enough data, people can enjoy video entertainment and video calls, but data security is a worrisome issue, with many often receiving spam messages sent by fake cell towers.

Although military networks are still in the 3G era, they possess technologies like spread spectrum, frequency hopping, directed communication, power control, and waveform encryption, which ensure the stability, security, and anti-interference capabilities of military data transmission.

The technical details also exhibit significant differences.

Military networks use data links to achieve point-to-point connections, resulting in a simpler system.

It’s akin to warships being able to directly exchange data with stealth fighters via data links without the need to build cell towers or data centers.

To ensure stable communication over various distances, numerous different frequency communication devices are equipped.

Within tens of kilometers, frequencies such as C-Ku band, millimeter-wave, and C-band are used.

Although they can’t utilize the ionosphere for beyond-line-of-sight skywave communication, they can transmit data rapidly, achieving speeds of several megabytes per second.

Over several hundred kilometers, HF frequency is used, which can reflect off the ionosphere, the ground, and water surfaces to achieve large transmission distances unimpeded by the Earth’s curvature, although at a slower speed of less than one megabyte per second.

For communication over thousands of kilometers, either communication satellites are used for data relay, or one has to resort to using long wave or very long wave signals at a speed of only a few bytes per second.

Therefore, to ensure data communication over all ranges, both warships and stealth fighters are seen bristling with antennas.

Especially warships, their masts teeming with tactical communication antennas, satellite communication antennas, very high frequency antennas, HF antennas…

And for those units like tanks and infantry fighting vehicles that engage at closer ranges, less distant from one another, their antennas are fewer.

This also reflects that military networks primarily facilitate team communication.

An aircraft carrier battle group, for example, only needs to communicate amongst its various types of equipment within a few hundred kilometers.

Cross-branch, cross-unit, cross-equipment, long distances…

These are handled by specialized communication satellites for data transmission.

The network doesn’t collapse just because a warship sinks or a fighter jet is destroyed.

Civilian networks, however, have a centralized tree-like structure, extremely complex and vast.

Mobile phones exchange data through cell towers, which are linked together with communication lines to management servers at data centers, equipped to support various communication protocols such as 2G/3G/4G.

That’s also why when the 4G signal is weak, smartphones automatically switch to 3G or even revert to 2G.

In remote wilderness with no cell towers, or in underground basements and deep mountain valleys with severe obstructions, cell phones have no signal at all, and if servers crash and go offline, the whole network becomes unusable.

As can be seen,

Civilian networks, although seemingly more technologically advanced and faster, are actually less stable and reliable than military ones.

With Wu Jie’s technical prowess, civilian network infrastructures like those built by Langsico CSA, with their server network architecture and security defense systems, are no secret to him; infiltrating and disrupting them to cause network failures is not difficult.

Just that…

Causing the collapse of civilian networks would have a severely detrimental effect on societal functions.

Being unable to access the internet, make or receive calls, and send or receive text messages would seriously impact all industries.

Nowadays, in public transit, subways, and on the streets…

everyone is glued to their phones.

Smartphones have become integrated into people’s daily lives for binge-watching series, gaming, stock trading, chatting…

Should the internet suddenly go down, hailing rides online becomes impossible, shared bikes unusable, food delivery orders cannot be placed, stocks cannot be traded, bank account funds can’t be transferred, and numerous businesses are unable to operate normally…

And Tan clearly knows that targeting civilian networks is too ruthless, the destructive power too great.

And these military networks…

they’re much more difficult.

Around two o’clock in the morning,

Wu Jie had gradually finished downloading the materials provided by the External Affairs Bureau.

Military networks, being relatively independent and closed systems, are unfamiliar to those not exposed to them.

And these classified materials had also been obtained through various surveillance methods.

The goal was simple: to collect electronic and electromagnetic signals.

Because any radar or communication device, once operational, would generate signals.

By conducting reconnaissance, one could master the enemy’s radar and communication devices’ working frequencies, frequency hopping characteristics, and more.

Once war broke out, electronic warfare aircraft and fighters with electronic warfare pods could be dispatched to execute corresponding electronic disruption, electromagnetic suppression, or even destruction attacks using anti-radiation missiles.

Therefore, that’s why whenever other countries’ aircraft or ships appeared during exercises, the exercises would be suspended, or some key equipment would be urgently shut down, to prevent the leakage of electronic and electromagnetic signals.

If the opponents entered the exercise area, then arrangements would have to be made for jet fighters or naval ships to monitor and drive away the intruders.

So…

The data Wu Jie had acquired was a hard-won treasure of the External Affairs Bureau, but it might not be applicable.

After all, the use of core equipment was always handled with extreme caution.

For things like a phased array radar, if it’s not switched on for use, how could one possibly monitor and record it?

Or take the encrypted satellite communication data links, which are hardly ever used for communication, how could one intercept the signals?

However…

Having this data was good; at least it ensured Wu Jie wasn’t completely ignorant of their military network.

Their military network technology strength and level of advancement were indeed the best in the world.

There were many communication data links, besides the commonly used Link 16/22 for sea, land, and air, the navy also had the specialized CEC, and even stealth fighters had their own MADL and IFDL, equipped with the S-TADIL satellite communication data link for ultra-long-range communication.

Moreover, for their strategic bombers, attack submarines, and intercontinental missiles…

These national treasures also had their dedicated longwave communication and satellite communication.

In summary, there was an array of types, diverse technologies, all heavily encrypted.

Interfering wasn’t difficult.

Because the radio frequency range is extensive, from low to high frequencies, from microwaves to long waves.

Using a large electronic warfare aircraft, one could detect the enemy’s electronic equipment operating frequency band and then specifically transmit a massive amount of noise signals in this band to disrupt the opponent’s communications.

But is this interference meaningful?

It’s like someone constantly chattering and cursing next to others who are talking; it doesn’t cause substantial harm.

What Wu Jie wanted was to infiltrate, not to disrupt!

To stab with a cold blade, rather than to merely bluster.

Just that…

After studying for over an hour, he still couldn’t find a viable method.

The difficulty was off the charts!

Military networks were typical of dedicated networks with specialized use, and even the devices accessing the networks came with their encryption key systems.

It was similar to how each computer on the civilian network had a fixed IP address.

However, these encryption key systems would be updated regularly or irregularly and would perform identity recognition checks.

When communicating with each other, they would ‘exchange passwords’ as if to conduct friend-or-foe identification; those who didn’t match the encryption key were considered the enemy.

Such methods were designed to prevent losses during wartime, such as aircraft being shot down, equipment being looted, and the enemy using one’s communication equipment for ‘eavesdropping and monitoring’ purposes.

This ‘dedicated network’ level of secrecy was even higher and harder to infiltrate than that of the Northern Fox Organization.

Northern Fox’s network was still based on the civilian internet.

Even so, Wu Jie had managed to infiltrate by entering their branch in Zanan City and using a specialized server.

Now, the military network was more advanced and secretive.

Without their specialized communication equipment, without the encryption key system… how the hell was he supposed to infiltrate?

The time had reached three o’clock.

Wu Jie looked at the data, continuously pondering his course of action.

And Tang Xiao, who was by his side, could no longer fend off the drowsiness.

“I can’t do it, I just can’t; it’s like a whole different world to me, I really don’t understand it.

You keep thinking; I’m going to sleep!”

Tang Xiao couldn’t hold out any longer and fell asleep as soon as she lay down.

Wu Jie closed the laptop and slowly lay down.

With hands cushioning the back of his head, he stared at the ceiling, lost in thought.

Conventional methods were no good.

But with the system possessing him, the system’s store had more good things than he could count…

Tip: You can use left, right keyboard keys to browse between chapters.Tap the middle of the screen to reveal Reading Options.

If you find any errors (non-standard content, ads redirect, broken links, etc..), Please let us know so we can fix it as soon as possible.

Report