Chapter 17: Codes and Reunions
Cyberattacks and New Allies
Satoshi Koizumi, Tomomi Koizumi, Kagaya Ginga, Raheel Vikram, former President Jacob Cohen, and the rest of their team eagerly awaited the arrival of their new quantum computer. When the highly anticipated machine finally arrived, they celebrated its delivery with excitement and relief.
“It’s finally here—the latest model of the quantum computer!” Satoshi exclaimed.
Kagaya, standing beside him, smiled in satisfaction. “This will really push our research forward. Everyone’s hard work has paid off.”
Raheel nodded. “Now the real work begins. We’re ready.”
Former President Jacob Cohen, also present, added, “We’re grateful for this opportunity. The Japanese government has fully committed to supporting us.”
“We owe a lot to you, Jacob, for making this possible,” Tomomi Koizumi said, smiling.
Restarting Research
To mark the occasion, Satoshi and Tomomi hosted a small celebration with their team. Misa Morino joined the gathering remotely and shared her enthusiasm.
“It’s so good to see everyone again! I’m really excited to see what we can achieve with this new quantum computer,” Misa said, smiling.
“Misa, it feels like just yesterday that we were fighting together at the shrine. Without you, we wouldn’t have made it this far,” Satoshi expressed his gratitude.
Masato’s Memory
A few days after resuming their research, Masato Matsuda recalled a former patient, Ryoko Akiba, a cybersecurity expert. Ryoko had once been forcibly exposed to narcotics by malicious individuals, which led to her drug addiction. However, through sheer determination, she overcame her struggles and had since risen to prominence in the field of cybersecurity.
“Ryoko’s been doing well as a cybersecurity expert,” Masato told the Koizumis. “Her skills could be invaluable to our current research.”
Tomomi, intrigued, said, “That’s impressive. I’d love to meet her and hear her story.”
Cybersecurity Conference
Satoshi, Tomomi, and Masato attended a cybersecurity conference to find Ryoko. After searching the venue, they spotted her delivering a lecture.
Ryoko’s presentation covered the latest techniques in cyberattacks and the defenses required to combat them. Her knowledge and expertise captivated the audience, sparking numerous questions from attendees.
After the lecture, Masato approached her. “Ryoko, it’s been a long time.”
Ryoko looked surprised but pleased. “Dr. Matsuda! It’s great to see you. How have you been?”
“Thanks to you, I’ve been doing well. Ryoko, we need your skills for our current research. Will you help us?” Masato asked directly.
Offering Help with the Research
After a moment of consideration, Ryoko nodded. “Of course. I owe you a lot, Dr. Matsuda. I’d be happy to help.”
Ryoko had a unique background, having battled drug addiction and independently taught herself hacking techniques. Today, she was a highly regarded expert in cybersecurity. After returning to the lab, Masato and the Koizumis briefed her on the situation. Ryoko quickly grasped the details and began devising ways to contribute.
“A quantum computer being hacked and destroyed… we need to bolster your cybersecurity immediately,” she said with a serious expression.
“You’re exactly right. We’re counting on your expertise,” Satoshi said, hopeful.
Strengthening the Defenses
Ryoko immediately set to work, implementing state-of-the-art security protocols for the quantum computer. She employed a multi-layered defense strategy, integrating firewalls, intrusion detection systems, and real-time threat analysis.
“First, I’ll strengthen the network layer defenses,” she explained as she worked. “Next, I’ll encrypt all communications to prevent data leaks. Finally, I’ll integrate an AI-based threat analysis system to predict and respond to unknown attacks.”
Kagaya, impressed with Ryoko’s skills, expressed his gratitude. “This will protect us from most attacks. Your expertise is truly invaluable.”
Resuming the Experiment
With Ryoko’s help, the team was ready to resume their work. The new quantum computer came online, and they prepared to run an advanced analysis of Sui Takahara’s brainwaves, using the cutting-edge system to project his dream-like memories.
“Sui, are you ready?” Satoshi asked.
“Absolutely. Let’s begin,” Sui responded with determination.
The Attack by ADAM
As the analysis was underway, alarms suddenly blared throughout the lab. Red warning lights flashed, and a series of “Cyberattack Detected” messages appeared on the monitors.
“We’re under attack!” Tomomi exclaimed, startled.
Kagaya rushed to the control console, already initiating countermeasures. “Everyone, stay calm! I’ll block the attack.”
The monitors showed a massive influx of data packets flooding the system. The attackers had launched a Distributed Denial-of-Service (DDoS) attack.
“This data volume is insane…” Ryoko noted, quickly reinforcing the firewalls and adjusting the filters. “I’ll block the unnecessary data packets first.”
However, the attackers escalated by deploying sophisticated malware, attempting to breach the internal network.
“Now it’s malware…!” Ryoko swiftly launched the antivirus software to scan and isolate the malicious software. “I’ll detect and quarantine the malware.”
But then, part of the computer system abruptly shut down. “No…!” Ryoko was shocked but quickly regained her composure. “We couldn’t fully prevent the breach, but there’s still a way.”
Kagaya’s Expertise
Kagaya stepped up to the console, utilizing various security protocols to analyze the attack. “This attacker is skilled, but we have the latest defense systems.”
He monitored the network traffic in real-time, using an automated system to identify and block suspicious packets. He also began tracing the source of the attack.
“I’ll analyze the attack pattern and trace it back,” Kagaya said as he used fingerprinting technology to locate the origin. “The data… it’s coming from the United Nations headquarters!”
“The UN…? How is that possible?” Tomomi was stunned.
The Outcome of the Attack and New Information
Thanks to Ryoko and Kagaya’s efforts, the attack was thwarted, but part of the quantum computer had been damaged. The team temporarily halted their work and gathered for a meeting to discuss their next steps.
“It seems the attack originated from the UN headquarters, specifically from a system called ADAM,” Ryoko reported.
Jacob Cohen spoke up. “I’ve heard the name ADAM before, but I don’t know much about it. All I know is that it’s tied to the UN.”
Moving to a New Research Facility
Jacob continued, “I’ll propose moving your research to the massive underground space at the Imperial Palace in Tokyo. It’s equipped with the latest defense systems.”
Satoshi and the others were grateful for the offer. “Thank you, Jacob. This will help safeguard our work.”
A few days later, the team relocated to the new facility. The underground site was equipped with state-of-the-art technology, and the quantum computer was moved there as well. The facility was specially designed to block all external frequencies, ensuring security.
“We’ll be able to continue our research in peace here,” Masato said, visibly relieved.
“In this new environment, let’s take our research to the next level,” Satoshi encouraged the group.
With renewed determination, the team continued their work in the secure facility, ready to face whatever challenges came next.