Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 3228 Missing Sentinel

Previous page        Return to Catalog        Next page

    "In other words, the people at the mobile base were the masterminds of hijacking drones, and these terrorists were helping them transport them? And the missing villagers were captured by them and used as free labor. This was a premeditated hijacking  US military drone incident." Sergey nodded.

    "No, I don't think this was a premeditated action. Because there were too many hasty elements in it. Just like these terrorists, they were obviously unprepared and started acting upon receiving orders at short notice. Remember that  A few villagers who were killed? They may not have agreed to leave, so the terrorists killed people to establish their power and forced other villagers to act with them. These do not seem to be sufficiently premeditated." Lin Rui nodded.  "This was a random incident."

    "Accidental incident?" Crazy Horse shook his head and said, "This is a stealth drone that Americans are proud of. I don't believe it was hijacked because of an incidental incident."

    "Listen to what I have to say first." Lin Rui frowned. "Actually, the flight route of the US military drones did not pass through here. And this is the first time they have changed their reconnaissance route. If these people intend to hijack them  A command camp will not be established nearby. Instead, a hijacking strategy should be formulated based on the original route of the drone. This is one. Second, if it has been planned for a long time, it will be better prepared. Instead of letting the villagers  Go help them carry it, after all, the fewer people who know about this kind of thing, the safer it will be."

    Crazy Horse nodded, "Then what should we do next? Go to the landing site of the drone?"

    "No, there must be nothing left there. Going there is just a waste of time." Lin Rui shook his head and said, "According to their previous actions, since they can hijack the drone, they will not leave anything that can be tracked at the scene.  Traces. What¡¯s more, the US military has conducted a comprehensive survey of that place.¡±

    "Then what should we do?" Sergey frowned.

    "Bring the map." Lin Rui waved, took the tactical tablet from Sausage's hand, and called up the satellite image.  "This is the location where the drone lost contact, and this is the point where it was forced to land. And if you go further, you will go deep into the Sahara Desert."

    "Do you think they entered the depths of the desert?" Sergey shook his head.  "There's nothing there, what are they doing there?"

    "They want us to think there is nothing there." Lin Rui whispered, "I suspect there is a camp in the desert, and it may even be semi-permanent. These people may have used the ancient oases in the desert to build  They set up a base, but the purpose was unclear. They obviously didn¡¯t want others to discover this, so when the US military drone approached this area, they were forced to capture the drone.¡±

    "Why not just shoot it down instead of capturing it?" Sergey frowned.

    "Maybe there was a reason why they didn't shoot it down. They weren't sure whether the drone captured any secrets, so they didn't want to risk angering the Americans. If they used hacking methods to hijack it, it could be explained as a signal failure and the loss of contact.  , there has been a similar precedent in the past. So after they captured the drone, they transported it away as soon as possible. I think they will carefully analyze the intelligence in it and destroy it." Crazy Horse whispered.

    ¡°Destroy the intelligence captured by the drone?¡± Sergey frowned.

    "Of course, since humans have had wars, both sides of the war will get a lot of information from the captured weapons of the other party. Think about what a complete rq-170 drone can get if it falls into the hands of a caring person?

    First, they may read the U.S. reconnaissance intentions and key U.S. suspects from the reconnaissance equipment carried by the RQ-170 and possible data storage.  In addition, it may be able to imitate many technologies of the RQ-170, such as stealth appearance, reconnaissance equipment, engines, control components, etc.

    What worries the United States most is that someone may study the wreckage of the RQ-170 and understand the details of its electronic tactics.  For example, what is its stealth performance and where are its weaknesses; what is the frequency of its control data link and radar transmission frequency; how does its identification friend or foe work, etc.  ¡± Crazy Horse explained.

    Sausage nodded and said, "Yes, this kind of leakage of electronic intelligence is often the most fatal. For example, on December 16, 1969, Israeli special forces attacked the Soviet-made P-12 radar site in Egypt, destroying a 7-ton radar and  The relevant equipment was disassembled and shipped back to Israel, and countermeasures were developed by studying the performance of this radar, thus greatly strengthening the air supremacy over the Suez Canal. That¡¯s why the Americans are so nervous. Because they have reason to worry that once the RQ-170 falls  In the hands of an expert, it will have a similar effect.¡±

    Scarface shook his head and said, "This type of cutting-edge drone software is strictly encrypted, and terrorists cannot understand it."

    ¡°Yes, but the terrorists don¡¯t understand that it doesn¡¯t mean that Russia and other major powersNo one can understand it either.  What if this information leaks out?  Crazy Horse asked rhetorically.

    Lin Rui frowned and said, "Doesn't this kind of drone have a self-destruct program? What I mean is that since the consequences of the weapon falling into the enemy's hands are quite serious, the developers naturally hope that the weapon will destroy itself when it leaves the control range of one's own side, but  Why didn¡¯t rq-170 perform self-destruction this time?¡±

    Sausage shook his head and said, "Actually, complete destruction is impossible. For example, the most advanced tanks are developed to be indestructible. How can they completely "self-destruct"? Another example is a nuclear submarine. If it sinks and is salvaged by the other party, it may  It will cause a catastrophic leak, but if it is blown up, it will cause an even more catastrophic leak of nuclear material. Therefore, tanks and nuclear submarines may have devices that destroy some instruments and equipment, delete software and memory storage, but they cannot be said to be self-destructive.

    Because flying weapons are light and small, and structural damage in the air will accelerate their fall to the ground, self-destruction devices on aircraft are relatively common.  Whether the RQ-170 has a self-destruction device remains top secret, and the outside world has no way of knowing whether it is equipped with a self-destruction device.  However, the U-2 reconnaissance aircraft replaced by the RQ-170 does have such a device.  The main purpose of this type of self-destruction system is to blow up the camera on the aircraft, but it can also destroy the structure of the aircraft.

    In addition to self-destruction devices, electronic equipment on the aircraft can also be deleted and destroyed through manual operation by the pilot.  However, the RQ-170 is unmanned, so it is naturally impossible for the driver to destroy it.  Therefore, the aircraft may be equipped with explosives that can be remotely detonated and destroy key equipment, as well as programs that can destroy the memory storage of software.

    The explosive was not detonated. It is likely that when the control was lost, the controller was unable to activate the self-destruction device, or the self-destruction device failed for some reason, and the destructive program was probably not started.  "

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report