17kNovel

Font: Big Medium Small
Dark Eye-protection
17kNovel > Surviving the Zombie Apocalypse With My Military System > Chapter 231 They are Still Online

Chapter 231 They are Still Online

    <h4>Chapter 231 They are Still Online</h4>


    Meanwhile, on one of the interceptor sites of the United States Armed Forces located in the Midwest, military personnel were engaged in a simr state of urgency. The screen in theirmand center showed the tracking of a bogey missile, which was now a direct threat to national security.


    "Sir, the iing missile has been confirmed as hostile," a technician reported to themanding officer. "It''s on a direct path to New York City."


    Themanding officer, a stern-looking individual with years of military experience, assessed the situation quickly. Based on the signature of the missile alone, it''s no doubt it is an ICBM. But what nation wouldunch a nuke on them?


    "We need to intercept that missile before it reaches its target. Prepare tounch a Ground-Based Interceptor (GBI)."


    The Ground-Based Interceptor, part of the United States missile defense system, was designed to detect, track, and then destroy iing ballistic missiles by colliding with them outside the Earth''s atmosphere, a process known as "hit-to-kill."


    "GBIunch sequence initiated," another technician announced as he activated the system. Themand center''s atmosphere was tense as everyone focused on their screens, watching the interceptor missile being prepared forunch.


    Within moments, the Ground-Based Interceptor wasunched. Its trajectory was calcted to intersect with the Minuteman missile, aiming to neutralize it before it could reach its target. The GBI soared into the sky, leaving a trail of fire and smoke as it raced towards the iing threat.


    Back at Richard''smand center, the situation was rapidly unfolding. The screens showed the GBI''sunch and its trajectory converging with their Minuteman missile.


    "Sir, it is positive. The U.S. Armed Forces haveunched a Ground-Based Interceptor. It''s on a collision course with our missile," Sara reported, her voice tense.


    "So the U.S. is not knocked out from this world eh? Well since theyunched an interceptor missile meant that they really wanted this missile down. Very well, initiate the self-destruct mechanism on our Minuteman," Richardmanded firmly, his eyes fixed on the screen.


    Sara quicklyplied, tapping into themand system of the missile. "Initiating self-destruct sequence for the Minuteman missile," she confirmed.


    Within seconds, themand center''s screen disyed the confirmation of the self-destruct sequence''s activation. The Minuteman missile, still in flight and on a collision course with the GBI, suddenly detonated in mid-air, far from its intended target. The explosion was contained in the upper atmosphere, preventing any damage to the ground below.


    Richard watched as the screen showed the aftermath of the explosion. The threat to New York City was averted, but so was their n to eliminate the high concentration of zombies in the area.


    He turned to his team, his expressionposed yet visibly frustrated. "The U.S. The Armed Forces are still operational and capable of intercepting our attacks. Well, let''s say we avoid hitting continental America first and focus on other targets. In the meantime, let''s try to reach out to them. Sara, since you are the expert in that field, please, set up directmunication between them and us."


    "Well sir it''s going to be hard," Sara said.


    "What do you mean?" Richard tilted his head to the side, prompting her to exin.


    Sara took a deep breath, readying herself to exin theplexities of their situation. "Establishing a direct line ofmunication with the U.S. Armed Forces is challenging for several reasons," she began, her tone indicative of the technical hurdles they faced.


    "Firstly, the U.S. military employs highly sophisticated, encryptedmunication systems. These systems are designed to be impervious to external ess, especially in times of potential threats or conflicts. They use advanced encryption protocols, making unauthorized ess nearly impossible without the correct decryption keys."


    "Additionally," she continued, "the military''smunicationworks are segmented andpartmentalized. This means there isn''t a single point of entry. Each segment operates independently, with its own set of security protocols. It''s a decentralized system, making it harder to find a direct line to the decision-makers ormand units we need to reach."


    "Furthermore, attempting to breach or tap into theirmunication lines could be perceived as an act of aggression. It could escte tensions and lead to further defensive actions from their side. We don''t want to trigger a cyber warfare scenario, especially when they are already on high alert due to the missile incident."


    "Lastly," Sara concluded, "even if we managed to bypass their security and establish a connection, there''s no guarantee they would be willing tomunicate. They might simply shut down the line or trace it back to us, exposing our location and capabilities, possiblyunching their nukes to retaliate."


    "So, what you''re saying is, it''s risky, nearly impossible, and could potentially make things worse," Richard summarized.


    "Exactly, sir," Sara affirmed.


    "Then can you at least track where that missile was fired from?" Richard asked, shifting to a more tactical approach.


    Sara nodded, her focus returning to her console. "I''ll see what I can do. It won''t be easy, but we might be able to trace theunch point of the interceptor missile. It should give us an idea of where the U.S. Armed Forces is based."


    ***


    Inside the interceptor site in the Midwest.


    Sir, the iing missile has self-destructed," a technician announced urgently, drawing themanding officer''s attention back to the screen.


    Themanding officer studied the monitor, which now disyed the dissipating cloud from the missile''s detonation. "Self-destructed? That''s an unexpected move. It suggests whoeverunched it has direct control and is monitoring the situation closely," he mused aloud. "But the missile, it''s Minuteman right?"


    "Based on the signature and trajectory, it''s highly likely it was a Minuteman missile," another technician confirmed, analyzing the data on his screen.


    "Try to trace theunch point," themanding officer ordered. "We need to find out who is behind this and why they targeted New York City with such a weapon."


    The technician nodded and immediately set to work. "Based on the missile trajectory, it''s most likely the origin point is in Asia."


    "Not Europe?"


    The technician shook his head. "If it''s in Europe, the flight path would be different. The trajectory suggests an Asian origin, possibly Southeast Asia."


    "Do we have silos in Southeast Asia that may have beenpromised?"


    "I don''t know, it''s way above my pay grade. Perhaps the top brass would have an answer to that question."


    "Okay, I''m going to inform the Joint Chiefs of Staff, the President, and the National Security Council in Raven Rock Mountain Complex of this development."
『Add To Library for easy reading』
Popular recommendations
The Wrong Woman The Day I Kissed An Older Man Meet My Brothers Even After Death A Ruthless Proposition Wired (Buchanan-Renard #13)