Chapter 123: Trojan Horse Slaughters the City
The hard disk fragments on the table, coupled with the fact that there are no copies of the clones that have been copied from the past, mean that this time, the plan to decipher the data has completely failed.
As the world's largest intelligence agency, momentary setbacks did not bring them down. They sat together, racking their brains to see if there were any other clues.
Looking at a pile of computer accessories and printers, suddenly a young computer expert named Mike shouted: "I thought of it, maybe there is a chance, find this guy hiding behind the scenes!"
The people who were awakened by his loud shouting looked at him, a little confused. All the clues are on this computer, the computer hard drive is finished, can there be any other clues?
Mike excitedly pointed to the printer and said: "This printer has always been connected to this computer, and it is basically not used for anything other than printing the information provided by the other party."
Also, after the last printing of that information, the computer broke down, so the printer was never used again. ”
So, the people around him want to know, what is he going to say next?
"Therefore, the cache of this printer has not been refreshed repeatedly, which means that there is a great chance that the information, printed content, or URL is still in the cache of the printer, and we only need to interpret the cache of this printer to catch the little tail of this guy who has lost a lot of money. ”
Hearing this, everyone's eyes lit up, yes! There must still be valuable information in the printer's cache, as long as there are clues, it is a rare opportunity to find this guy.
Deciphering printer caching can be difficult for individuals, but it's all too easy for an intelligence agency like the CIA.
To be on the safe side, they found several printers of the same model, and after testing them a few times, there were no problems. Only then did he carefully remove the cache on the printer that printed the information. Then, the contents of the cache were successfully interpreted.
Looking at the interpretation on the printing paper, according to the date, sure enough, it was basically all about the intelligence of the NATO coalition forces.
The F-117A has the most content, and it is precisely based on the weakness of the stealth bomber provided by the other side that the Sam people have lost a big face in front of the whole world.
There is also a lot of content in the raid on the Celestial Empire's embassy in the Federal Republic of Yugoslavia, and it can also be seen from the content of the intelligence that the other side knows the situation of the NATO coalition forces very clearly, and even the time of the attack, how many minutes it takes, it is simply unimaginable how the other side obtained these messages.
The CIA also made great efforts to track down the mailbox that provided intelligence to the Federal Republic of Yugoslavia, and the IP address of the mailbox was forwarded through a free proxy server, and the proxy server found was located in Sam's Country, but the proxy server was personal, and some time ago due to the damage of the hard disk, it had been replaced with a new hard disk, and the broken hard disk was thrown into the trash at that time and completely disappeared.
Intelligence experts seriously suspect that the damage to the hard drive of the proxy server was also the work of the black hand hiding behind the scenes.
The tracing operation, by this time, was achieved some results, but also reached a dead end.
And Haijin, thousands of miles away, Zhang Yi saw an email in a secret mailbox through multiple agents, and the content of the email was only one simple word: finish.
He smiled mysteriously, emptied his inbox, and then, entering the email provider's database, erasing all the records of the email address, and then deleting the email address from the database as if it had never existed.
Soon after, the email provider's technicians discovered that the hard drive on which the data was stored was damaged. After replacing the hard drive with a new one, the old hard drive went to the recycling bin and was crushed into countless metal pieces.
So far, the development of this matter has completely disconnected from him.
From the day all this is done, the mailboxes of the world's major news agencies will receive some inexplicable emails.
At first, no one paid much attention to it, but later it turned out that the content of the email was all about Sam's Country CIA, and the content was all-encompassing.
There is product news about major technology companies, and even one of the internal emails actually mentions Microsoft's most popular operating system, windwows 2000 Some vulnerabilities that can be exploited, there are half-believing reporters, according to the vulnerability description, try to test it, and are surprised to find that all this is true, and the vulnerabilities described are all vulnerabilities existing in the current operating system.
For a while, all major news agencies reported on this hot event, and the bewildered Microsoft company quickly stood up and said that the company did not know the existence of these vulnerabilities at all, and would immediately organize experts to fix these vulnerabilities. It also condemned units or individuals who exploit operating system vulnerabilities for profit, pointing the finger at the CIA, which is still in the dark.
Soon, the intelligence experts of the CIA discovered this unusual leak, and the contents of the emails were received by the world's major news agencies.
Sam's NBC and ABC actually have them, but they didn't pay attention to them at all, because they didn't think they were just joking and pranks. This time, it was preempted by other news agencies, which is too undeserved.
There is only a strange country like Sam's Country, which does not have the slightest affection for the intelligence services, and prefers to expose the ugly faces of these departments.
As a result, the TV stations and newspapers of the developed Sam Country, like a holiday, reported the CIA's intelligence in a variety of ways according to the content of the email, and even the TV station, created a talk show for this purpose, and every day there was a new topic for the CIA.
As a result, the CIA was tragic, as a low-key intelligence agency, but it was ridiculed as a joke every day. What's even more embarrassing is that a lot of the content is still top-secret information, and it has been revealed to the world without any concealment.
Annoyed and angry, the CIA went crazy and wanted to find out the reason for the leak. All the computers in Lanli's headquarters were tested one by one by virus experts to find out this evil Trojan horse. The detailed inspection of thousands of computers has exhausted these experts into dead dogs, but no abnormalities have been found.
The CIA experts really had no other way, and even thought about completely deleting the email address from which the email was sent.
However, this approach simply does not work.
Because, the mailbox for forwarding emails is different every day, and you can't close everyone's emails.
The director of the CIA, who was involved in the scandal, could only be regarded as a substitute for the dead in the midst of domestic and foreign difficulties, and chose to take the blame and resign.
The newly appointed director of the CIA, after synthesizing the opinions of all parties, also believes that the problem lies in the CIA's Lanli headquarters, but it is impossible to replace all the hard disks and empty all the servers.
When the CIA experts have been helpless, they can only ask the major security software companies for help, hoping that these industry professionals can find a solution.
And the intelligence department of the Celestial Empire looked at the mailing list with joy, and the lines of information that could not be obtained with great difficulty, were open to them like a beautiful girl.