Artur Zadikyan "Binary code: Mystery number one"

Center Zero is an organization to which all the world's intelligence agencies legally transfer information without knowing it themselves. As it turns out later, this transfer was agreed upon by a super-secret group called "the Collegium", which includes gray cardinals, the rulers of the world. Accordingly, the center "Zero" controls everything and everyone in the world. But it turns out that for many years this is not the main concern of the collegium, but something else, labeled by the secret term "problem". Under this term lies the top-secret Perimeter program, created back in the USSR, which controls the entire strategic nuclear stockpile of Russia. It cannot be turned off, it operates autonomously and can launch missiles from any carriers and points at any time it deems necessary; it is connected to all communication systems, seismic stations and satellites in orbit to collect information; in fact, it is an artificial intelligence.

date_range Год издания :

foundation Издательство :Автор

person Автор :

workspaces ISBN :

child_care Возрастное ограничение : 16

update Дата обновления : 12.02.2024


– I can imagine," Ruthra replied quietly, and he realized the precarious ground on which the world and human existence lay. – Are you saying she can launch missiles?

– Exactly. When it happened, Hent looked like he was in first grade and they were asking him to solve an integral equation. I mean, there was no team with Zero.

– So what?

– Nothing. That's what we need to figure out now. That's where it all started.

Both were silent, staring into each other's eyes, unable to find an answer to their many questions. Ivashov covered Rutra's wrist with his palm and said in a friendlier tone:

– In this case, there is no "tug of war". You will most likely have the highest level of clearance. Believe me, everyone will help you. Everyone who knows this problem exists. Keep listening.

Ruthra didn't want to distract the general with questions, so he answered confidently:

– I'm listening.

– Officially, the automated Perimeter system is installed in the area of Kosvinsky Kamen mountain. There are four other points located in different locations that can duplicate the work in case of failure. Their main purpose is to collect, process and transmit data to the main post. The location of some may change. One of them is located here. The others are less significant.

– And where are they?

– Don't be surprised. The points whose locations may change are outside Russia. One is in Belarus, another in Ukraine, and the third in Kazakhstan.

– So how do we control them?

– How? For some people, the USSR fell apart. But for management, everything is the same. Any play can be played out, the main thing is the puppeteers. You should already realize that the power that is visible is not the power that moves the pieces on the global chessboard. Physically at these points cannot give the command to launch, only the hardware will work there to send a signal, if the signal from the head part of the command missile does not pass. But this is the most spare and most improbable scenario.

– Could it be because of them? Isn't what happened an incredible accident?

– All this has been repeatedly tested, and not only by us. You understand that the signal cannot be hidden. And if it is hidden, imagine what level it is. Imagine the depth of penetration and the breadth of possibilities that must be assumed!

Ivashov leaned slightly toward Rutra and said in a whisper:

– The signal is received from all possible sources, even seismic waves. That's not the point, the point is that the hardware accepted it as valid. And the second is that something triggered a primary, weak signal to activate a program to send a signal from any possible transmitting devices. A general anomaly was detected. All transmitting devices, in a chain, like a domino effect, began to transmit an alien, not peculiar to their functions signal, with avalanche-like amplification from the weak to the strong transmitter. That's why we can't find the original source. The instruments were shocked, as in a massive magnetic storm. It's as if the receiver was waiting for some kind of signal to start a timer. I have a sneaking suspicion that the Perimeter program, the computer program itself, which is also called that, had provided for such an option in advance. Although we have to think rationally, but I will tell you, my friend, my tenure allows me to think this way. Even during the launch of the system there were rumors that the developers were part of their closed group and did not trust the power top. Not the legal one, but people like us. After all, behind the back of the CPSU were the same secret structures.

Ruthra pulled back, looking surprised at the postmaster. He realized he was in the wrong place, so he did not pretend to reveal a secret that could have incredible consequences for him and for the logic of his assumptions.

– I can't say anything more about the general technical part. You can get acquainted with the operation of the equipment, codes, ciphers, programs from the technicians who maintain the system or from the manufacturers. In the Western press, the system is known as the "dead hand". You must understand that secret information is secret only for those who do not know that there are structures like ours. Inside our system information is freely transferred, so in search of a solution to the problem you will have access to any database – CIA, MI-6, "Mossad", NSA… The existence of such a structure as ours makes it very easy to manage the world. We know everything, while the secret services fight among themselves, thus ensuring that the world is kept in a "vise".

Rutra realized he had to leave, thanked the general politely, promised to consult him on controversial matters, and left for his room.

The next day Vasilyevich was aware of his conversation with Ivashov, which did not surprise Rutra. Zhidkov didn't emphasize it either; he was glad that Ivashov himself had shown a desire to help.

– It may have been turned on during the incident with Colonel Petrov. The story is, of course, very suspicious," he said abruptly, listening to Rutra's speculation as to the existence of possible collusion.

– Are you referring to the incident of September 26, 1983? The day our world almost died? – Ruthra asked.

– Yes. Understand, despite all the concern about global warming, the most important threat to mankind is still its vast nuclear arsenals. It's hard to suspect him, though. He had the day off and his partner was sick. Petrov was called back to duty at the last minute.

The head of the center sat down in a chair in Rutra's office and began to narrate as usual:

– On the night of September 26, 1983, Lieutenant Colonel Petrov was on operational duty at the Serpukhov-15 command post, 100 km from Moscow. At that time, the Cold War was at its peak: three and a half weeks earlier, the Soviet Union had shot down a South Korean Boeing 747 passenger plane that had violated the border twice. The command center received information from the Oko space early warning system, which had been adopted a year earlier. In the event of a missile attack, the country's leadership was immediately notified, which made a decision to retaliate. On September 26, while Petrov was on duty, the computer reported a missile launch from an American base. However, after analyzing the information that the launches were from only one location and consisted of only a few ICBMs, Lieutenant Colonel Petrov decided that this was a false alarm. Subsequent investigation determined that the cause was the illumination of the satellite's sensors by sunlight reflected from high-altitude clouds. If the cold war turned into a hot war, every second mattered. Everything depended on instantaneous decisions… I talked to him. As he tells it, it all happened suddenly. Alarm lights flashed, sirens blared. The computer said the United States had just started a war. Told how he turned pale. Cold sweat ran down his back. Yet he acted coolly. The computer was literally screaming: "Missile strike imminent!" It didn't make any sense. The computer seemed to have detected three, then four, now five missiles, but the number was still incongruously small. According to the basic tenets of Cold War doctrine, if one side launches a preemptive nuclear missile strike, it should be a mass launch of missiles of crushing power. Accordingly, it is logical that he considered it a mistake. In a friendly conversation, over a drink, he confessed to me that he decided to wait, because besides him, except for his post – the launches should have been recorded by others. The alarm on September 26, 1983 turned out to be false. It turned out that the fiction in the movie was based on the realities of human psychology, mentality, faith.

– About the boy, you mean?

– Yes. "More than twenty percent of your missileers, like this captain, refused to launch…"

– In the movie, the military decided to wait, too," Ruthra said. – Remember, you said there was a similar situation. The military decided to delay a retaliatory strike until the attack was confirmed by the destruction of the first military base, which, of course, did not happen.

– That is exactly why the high commanders in the Kremlin were terrified. However, they were afraid not so much for themselves as for the fact that reckless Ronald Reagan, not fully understanding the consequences, was preparing in Washington the first nuclear missile strike, which, of course, would have to be answered, and then the bulk of the white race would wipe itself off the face of the earth. It was 1983. And, as time showed, the next month and a half was the most dangerous period the world had experienced in its history. The fact that in 1962 the United States and the Soviet Union were on the brink of a world war, when John F. Kennedy and Nikita Khrushchev entered into a tough conflict over missiles in Cuba, is well known to everyone. Those events took place openly, in the public eye. But the crisis of 1983 unfolded behind closed doors, in a world of spies and secrets.

– Of course. "We were ready for World War III," admitted Capt. Viktor Tkachenko, who commanded the missile base at the time, and then added: "If the U.S. had unleashed it.

– Logical reasoning. Robert Gates, who was the CIA's deputy director of intelligence at the time, recalled, "We could have been on the brink of war without knowing it." In 1983, the world was living as usual, unaware of the catastrophe it was facing. I was working on Britain at the time. Margaret Thatcher had become Prime Minister for the second time and her potential successor, Cecil Parkinson, had been forced to resign after admitting that he was raising a son with his secretary, with whom he was having an affair. Two young socialist troublemakers, Tony Blair and Gordon Brown, become MPs for the first time. Police count the bodies of serial killer Dennis Nielsen's victims in his London apartment, and a gang of six carry off ?25 million worth of gold from Brinks Mat's warehouse. Hitler's "diary" is found, which turns out to be a fake. England's soccer players fail to qualify for the European finals. Everyone sings Sting's song (Every breath you take), which has these words: "I'm watching every breath you take, every step you take". Unwittingly, Sting has very accurately summarized what we and the Americans have been doing on the international stage. Both sides have new, more powerful and more effective instruments of destruction. Reagan, who replaced Jimmy Carter, raises the stakes in this dangerous game by delivering his provocative speech in which he calls the Soviet Union an "evil empire." And then began the events that almost led to disaster. On November 2, 1983, the North Atlantic Alliance of Western countries led by the United States began a planned ten-day exercise code-named "Skillful Archer" to test its military communications systems in case of war. The exercise scenario included an invasion by the USSR using conventional weapons. The decisive moment was to come with a simulated launch of nuclear missiles. Command posts and missile bases were in full readiness, but, as was repeatedly reported to the USSR leadership, no real weapons were used. In every message our leadership was informed in huge letters that this was "only an exercise". But they, fearing Reagan's supposed recklessness, preferred not to believe these messages.

Vasilievich was meaningfully silent.

– This was the World War II generation that had always remembered how Hitler had deceived Stalin into launching the bloody Operation Barbarossa in 1941 under the pretext of conducting exercises. Gordievsky and other KGB officers around the world received urgent telegrams demanding evidence that the exercises were a cover for a real preemptive nuclear strike. Washington was completely unaware of the powerful effect Skillful Archer had on the Soviet leadership. In fact – Reagan was not preparing for war, but doing the opposite. It turns out that he was impressed by the movie he watched. This is the case when the "invisible weapon" turns out to be stronger than any thermonuclear weapon. At the end of the day, it's the brain that controls everything. Therefore, the strongest weapon is the one that affects it. At his presidential residence, Camp David, Maryland, he recently watched a television version of the sci-fi movie "The Day After," which tells the story of the aftermath of nuclear war. The former Hollywood cowboy was more impressed by the movie than all the military briefings and reports. The movie predicted the deaths of 150 million people. Reagan wrote in his diary, "It made a strong oppressive impression on me. We must do everything we can to make sure that nuclear war never happens." The old warhorse changed course and soon began trying to establish friendly relations with Moscow, which led to his first visit to the Soviet Union and the establishment of bilateral relations. But Reagan nearly missed his chance. When the exercises reached their peak, our outrage reached its highest point. During the exercise, their forces nearly fired a theoretical salvo of 350 nuclear missiles. Our military put the nuclear forces on highest alert, when all that was left to do was press the button to launch a massive retaliatory strike. The pilots of our nuclear bombers sat in the cockpits of their airplanes, engines idling, waiting for the command to take off. Three hundred intercontinental ballistic missiles were ready for launch, and 75 mobile SS-20 launchers hurriedly moved to their secret positions. Navy ships hid in shelters, anchored off the cliffs of the Baltic, and nuclear submarines with their missile arsenals cruised under the Atlantic ice and prepared for missile launches. The situation was saved by two spies, one on each side . The Americans reacted instantly, lowering the heat. Moscow took a step back from that precipice. Only later did America realize how close the world had come to the apocalypse. Greater efforts began to find ways to end the arms race. Today, America's relationship with Russia is strained. To some extent this is reality, to some extent it is a spectacle. It is clear that "Zero", meaning us, is in control of the situation. Be that as it may, the person in power, even if he is controlled, always has very great opportunities. And in this case, the risk is deadly. Now, hopefully, you understand better the essence of the mission that we are carrying, the part of it that will be entrusted to you? Some very important events, for people, unfortunately go unnoticed. Amid growing concern about nuclear proliferation, the staff of the Bulletin of Atomic Scientists has moved its doomsday clock forward, setting it half a minute to midnight. From here on out, you will increasingly realize the gravity and danger of the situation. I hope you pass the tests with flying colors and are invited to the big gathering.

– What kind of tests? – Ruthra asked tensely.

Zhidkov pretended to miss the question.

– Do you know what a big gathering is? – He asked, smiling, and answered: "A big gathering is when all the secret authorities come out of their skechers and onto the center deck.

"He was using a sailors' slang expression. He was among the carriers of the Chegeta," Rutra decided.

Chapter 8. "Dead Hand"

Rutra had just begun to settle into his new life when, on another visit, Vasilievich, in order to "ponder over coffee," as he liked to put it, said:

– Moving on to the next phase. Today we have legalization.

– What the hell is that?

– That's what we do legally.

– And what's that?

– You're giving a lecture to the students today. Understand?

– I understand," Ruthra replied without further question.

– Come on, I'll introduce you.

– Wait, I didn't prepare.

– It's okay, you tell them about the NSA's methods, it'll be great for them.

They went up to the upper level, went to the secret part of the university, where, under the legend of the Institute of Statistics, they were engaged in training specialists for the secret services. Vasilievich introduced Rutra to the undergraduate and graduate students as Paschovsky, a doctoral candidate at the U.S. National Defense University.

A lecturer came up to the pulpit and spoke about new methods of systematizing and analyzing information. Having finished his short speech, he introduced Rutra to the audience once more. Apparently, he had been trained at Zero as well. "So I'll probably meet him again," Rutra thought.

The lecturer stated:

– The following will be told to you by an expert who works in the United States and personally advises the NSA. Mr. Paschowski, please.

Rutra stepped up to the pulpit, looked around the audience, said hello, and, giving his speech an American accent, began to narrate:

– The US National Security Agency, the NSA, is the most powerful data collector. There is a secret agreement under which a group of the world's leading countries have agreed to give the NSA permission to analyze the data flows of their citizens and services both at home and abroad. The rest, as the NSA believes, I will tell you in confidence, you don't have to ask.

Ruthra smiled a little at the last sentence, giving his statement a joking tone that was meant to be taken as truth. The room chuckled approvingly, and Ruthra wondered if he had said more than he should have, for he now knew for certain that in the Echelon 2 system it functioned as a single system. He decided to define his position:

– It seems unbelievable, but NSA spies can use analytical data for their own or third parties' benefit, as they listen and view everything. Edward Snowden, a National Security Agency official, orchestrated the leak of classified documents detailing how the U.S. government uses information technology to spy on potential terrorists. The Secret Service collects millions of phone calls, emails, photos and videos from Google, Facebook, Microsoft and other communications giants. But what do agencies like the NSA then do with that information?

Rutra thought for a moment about how to present his position on the case, for he now knew that Echelon 2 had orchestrated the Snowden story so that Echelon 1 would realize that it would not be possible to use the information to their advantage, that there were structures beyond their control. So they were still puzzling over how that had happened. After a moment's thought, Ruthra continued:

– Data flows around the world and the rapid growth of digital information are attracting the attention of both the private sector and public services. Processing these streams is becoming a promising endeavor. How much data do you and I produce? According to recent research by IBM, humanity generates 2.5 quintillion bytes of information every day. If these bytes were visualized as flattened pennies, they would cover the entire globe in five layers. Data collection by security services relies on the basic thesis that the entire mass of data can be analyzed in such a way that it can be used to identify connections between different people. By analyzing these connections, leads can be found for investigative purposes. The main principle in data processing is to supply each fragment with a label. Based on this metadata, computer algorithms will be able to identify connections of interest to the security service. Metadata is data that describes other data. This is, for example, the names and sizes of files on your computer. In the digital world, a label affixed to a piece of data would be called a tag. Providing data with a label is a mandatory first step in data processing, because it is the label that allows the analyst or his program to classify and organize the available information for further processing and analysis. Tags allow you to manipulate data fragments without having to go into their content. This is a very important legal point in the work of the Security Service, because the US law does not allow to open the correspondence of US citizens, as well as foreigners staying in the country legally, without an appropriate warrant. Therefore, the NSA uses a special, highly sophisticated program that "tags" all collected information. These are the basis for any system that links different types of data: video files, documents, phone records. For example, a data processing system can draw the attention of investigators to a suspect who posts terrorist propaganda online, visits websites that describe the technology of making improvised explosive devices, and buys, for example, a pressure cooker. One such program is called Accumulo. It is used for surveillance in international communication systems, and it was created precisely to tag billions of disparate data fragments. It's the security service's "secret weapon." The NSA has the right to perlustrate international communication channels and collects huge amounts of data. These are trillions of fragments of various messages that people write all over the world. The agency does not hunt for criminals, terrorists or spies that are identified through its work, but simply leaks the information obtained to other government services – the Pentagon, the FBI and the CIA. The work then proceeds according to this scheme. First, one of the 11 judges of the secret FISA court accepts a request from a government agency for permission to reprocess certain data obtained by the NSA. Upon receiving authorization, the request is first forwarded to the FBI's Electronic Communications Surveillance Unit – ECSU. This move is to ensure legal correctness – FBI agents verify the request and confirm that the targets of the surveillance are not U.S. citizens. ECSU forwards the same request to the FBI's Data Interception Techniques Unit. They receive the information from the Internet servers and pass it on to the NSA to run it through their data processing programs. Many communications companies deny that their servers are open to NSA access. Federal officials, on the other hand, report evidence of such cooperation. Finally, the NSA passes the relevant information to the government agency from which the request was made.

Ruthra noticed how attentively his audience was listening. Clearly they had not expected this. Of course, the audience included employees and officials with high security clearances.

– No sooner had the public digested the information about metadata than Snowden bombarded them with a story about another area of the NSA's work, labeled US-984XN. Every search platform, every source of raw intelligence information gets its own designation and code name. The SIGAD US-984XN service is known by the oft-mentioned code name PRISM. The PRISM system is the collection of digital photographs, files stored somewhere and sent somewhere, emails, chats, videos, and video conversations. This information is being seized from nine leading internet companies. The schemes made public by Snowden show that the NSA, among other things, uses real-time surveillance tools in its operations. The agency's analysts can receive alerts when a user connects to a service or sends an email, or logs into a particular chat room. Snowden published a top-secret report that described software that could look at hundreds of different databases. It is now no longer a secret that these programs allow the lowest level analyst to interfere unchecked with other people's information sharing processes. The report gives examples such as, "My client speaks German but is in Pakistan. How do I find him?" or "My client uses Google Maps to find his targets. Can I use this information to determine his email address?" The described program allows, having asked one such question, to simultaneously search through 700 servers scattered all over the world.

Ruthra was silent for a moment and then continued. He described the various schemes of the tracking systems and gave examples.

– Among other things, the NSA itself is asking other agencies to help. So-called information-sharing cooperation. The essence is that, for example, the German intelligence agency BND, commissioned by the NSA, conducts surveillance of targets throughout Europe. Intelligence activities are carried out in accordance with a list of tens of thousands of criteria for information retrieval. These include IP addresses, phone numbers, social media accounts, and email domains.

Ruthra fell silent, then looked at the lecturer who had invited him and said:

– I'm done. Thank you for your attention.

The audience clapped approvingly. The audience tried to get through to Rutre, who was being hurried away by Zhidkov. They were followed by the lecturer, who, in English, suggested that Rutra give periodic lectures as part of the existing arrangements for the exchange of experience. Vasilievich nodded approvingly, arching his eyebrows. The latter nodded back. Rutra did not quite understand the meaning of this gesture, but he noticed that he had made an impression on everyone.

After passing through the guarded secret library, in front of which Zero's security zone was thoughtfully located (the guards wore FSO uniforms), they silently began to descend by elevator. Both of them were thinking, pondering.

The first to break the silence was the chief:

– Now, after all this information flows into our center that no one can know about. Center Zero. Why is it located in Russia? Because it is easier to create a center closed from the public in Russia than in any other civilized country.

***

A general meeting was scheduled for Monday morning. Yuri Vasilievich gave the speech.

– The reason I've gathered you here is the Perimeter system, or rather, a malfunction that was miraculously eliminated. It's lucky that we identified it at all, although, frankly speaking, there have been rumors about the system's "waywardness" for a long time. All right, esteemed employees. This is a very important part of our work, but it should not be to the detriment of other duties. That's the first thing. Second: Rutre Tigrovic is in charge of the investigation. He will do the main work. You'll gather material for him. Third: I'll introduce you to the system in general terms, the rest you'll learn on your own.

Everyone listened to the announcement in silence, glancing around, though some showed no reaction.

– So, what are we dealing with, what is the problem: the Perimeter system is known in Europe and the United States as the "dead hand". It is a complex of automatic control of a massive retaliatory nuclear strike, created in the USSR at the height of the Cold War. It is designed for guaranteed delivery of combat orders from higher levels of control to command centers and individual launchers of strategic missiles on alert, in case of emergency, when communication lines may be damaged. The Perimeter system is an alternative command system for all branches of the armed forces with nuclear weapons. It was created as a backup communications system in case key nodes of the Kazbek command system and communications lines are destroyed by a first strike in accordance with the U.S. concept of "limited nuclear warfare." Let me tell you about the Kazbek system right away. It is known to the general public thanks to the Cheget subscriber complex, or nuclear suitcase. The Cheget subscriber complex is a retaliatory strike tool. It is activated only after receiving a signal of a missile attack on Russia. First, a signal is received from the early warning system about a missile attack. It is checked by the duty general of the command center in Solnechnogorsk. Only then is the Kazbek system put into combat mode. The suitcase contains communication equipment with the General Staff and the command of the Strategic Missile Forces. Hereinafter I will use the abbreviation RVSN. Roughly speaking, it is a telephone, but the information is transmitted not by voice, but by encrypted symbols. It is impossible to block communication. There are three Chegetas on permanent duty: the Head of State, the Minister of Defense and the Chief of the General Staff. There are also duplicate ones. "The main button" in the suitcases is there – it transmits to the command centers of the Strategic Missile Forces a code authorizing the use of nuclear weapons. But missiles will be launched only if commands to do so are received from all three consoles. As I said, the total number of suitcases is more than three, the system is duplicated, but only a very narrow circle of people know about it. In addition, they are changed, checked, repaired. How many of them there are, only Department "C" knows.

Yuri Vasilyevich thought for a couple of seconds and said:

– The only time Cheget was used was on January 25, 1995, after the world's largest meteorological missile, the Black Brant XII, was launched from an island off the coast of Norway. Its flight trajectory resembled that of an American Trident ICBM fired from a submarine. Its final destination could have been a high-altitude nuclear explosion, disabling Russian missile warning radars. The Norwegians' notification of the missile launch got lost in the Foreign Ministry, and the next day Boris Yeltsin said that for the first time he used his briefcase for emergency communication with military advisers. This is a very interesting story in terms of why this happened. I will tell you about it separately, because, as one knowledgeable general said, it was a surprise only for Boris Yeltsin. By the way, I can say that if anyone thinks that such situations are funny, he is very mistaken. To give you an example, let me tell you about some of these situations. Do you remember those very radio sockets in old apartments that broadcast two programs? They were of great importance as a stand-alone, power-independent civil defense warning system in the USSR. There was a similar system in the U.S., and it was regularly tested to make sure it worked. All radio and television stations sent out test messages with alarm codes to check the operability of communications. This was and is handled by a special center at NORAD, i.e. the North American Aerospace Defense Command. At 9:33 a.m. on a February Saturday morning in 1971, a teletype operator at the National Civilian Warning Center ran an erroneous message into the system accompanied by the code Hatefulness, which meant a real emergency, not a drill. 5,000 radio stations and 800 television transmission centers received a message that read, "Attention! This is an emergency message coming directly from the President of the United States. Immediately cease normal broadcasting and begin broadcasting emergency messages beginning with the appropriate code. Stand by for further instructions." Panic broke out across the country and lasted for nearly 40 minutes until a retraction was issued.

Those gathered continued to listen intently.

– Here's another similar incident. Once at 8:50 a.m. computers in three U.S. command centers at once – in NORAD, in the Pentagon and in the Reserve Command Center in Maryland – sounded the alarm: "The United States has been subjected to a massive nuclear strike by the USSR. For the next six minutes, the fate of the world was decided. A Threat Assessment Commission consisting of senior officers from all three centers was immediately convened. ICBM launch sites received advance warning of the strike and instructions to prepare a retaliatory strike. Ten fighter-interceptors took to the air on alert, while others prepared for immediate departure. A so-called "doomsday plane" even took to the air, intended for the high command and the president, who would be able to command troops even if all ground command centers were destroyed.

The Threat Assessment Commission worked quickly and smoothly: all reports were cross-checked and data from long-range radar stations and space satellites were received, none of which confirmed the launch of even one Soviet missile. The system was rebooted and the alarm was declared false. The investigation revealed that the cause of the false alarm was a mistake by an Air Force command center officer who ran a training program simulating a full-scale Soviet attack on a computer included in the NORAD unified command system, which caused the general alarm. This possibility was later eliminated by physically separating the training and combat systems.

Yuri Vasilyevich spoke without stopping, confidently and clearly.

– Another similar case, again related to the NORAD center. One day, in the middle of the night, the computers of the Strategic Air Command and the Pentagon received messages from this center about the launch of missiles on U.S. territory. The counter of launched missiles suddenly changed its value and began to show 002 or 200 attacking missiles. The duty officers were alarmed, and an alert was declared. Pilots took their places in the bombers, the engines were started, the launching points of missiles "Minuteman" received instructions for a retaliatory strike. Minutes counted. A decision from the Risk Assessment Commission was required to launch a retaliatory attack. And the counter continued to go crazy – the "zeros" and "twos" kept changing places. This raised doubts about its serviceability. Then the control messages from the early detection stations were checked, which showed no threat. The alarm was canceled and the counter was reset. Three days later, the situation was exactly the same, and then the Commission was able to find the cause – it was a defective microchip in the computer system NORAD, costing only 46 cents, which arbitrarily changed the values of the counter because of a failure in its own electronic circuit. So a penny electronics could have destroyed the entire humanity… The point of my digression is to emphasize once again that the world is fragile, people are emotional, computer systems are imperfect.

There was another case on the subject of the nuclear suitcase. It was 1991, during Yeltsin's hunting trip to Zavidovo near Moscow. When we were sailing on a boat on the lake, one foreign guest kept looking at a black suitcase at the bottom of the boat. He thought it was nuclear. He tried to stay away from the suitcase, trying to sit on the edge of the boat. When they opened the suitcase on the island and took out two bottles of vodka and pickles, the guest laughed for a long time.

Some of the staff, hearing the story for the first time, chuckled. The colonel was silent for a moment and continued:

The F Division officer, a thin man with a shrewd eye, raised his hand, gesturing that he wanted to ask a question. The chief looked at him, nodded his head.

– So it's already been signaled to attack from us, but without us? – he asked worriedly.

– Maybe," Zhidkov replied, giving him a leering look.

– Can't you ask the supreme commander-in-chief? – he continued.

– That's the interesting part. Who is the supreme commander in chief? Where does the initial order to open the bags of pre-posted orders come from?

Ruthra realized that the chief was asking questions to which he knew the answers. "Do the others know this manner of Zhidkov's dialog?" – he thought.

– What about the signal to stop the combat algorithm? – The "F" department officer did not stop.

Все книги на сайте предоставены для ознакомления и защищены авторским правом