"Chapter 119: The Murderer is Jin Yi (Asking for Rewards, Collections, and Recommended Tickets)"

Inside, everyone fell silent for a moment after Chief 1's question. Pen, fun, pavilion www. biquge。 info

After a long while, Wang Yunhai, the head of the State Security Bureau, looked at everyone helplessly, and then continued to speak:

Classified documents were stolen from as many as 30 countries during the cyber disaster, and at the same time.

That is, the confidential documents of these 30 countries were stolen at the same time.

It's like a thief who commits a crime in 30 different places at the same time, it's impossible.

Unless the murderer is not a person, but an organization, but an organization that can have such capabilities, is there any?

After Wang Yunhai explained, everyone understood, and after understanding, everyone took a breath of cool air.

Where cyber protection is strongest in various countries, there is no doubt that classified documents are definitely one of the most important ones.

30 countries, that is equivalent to 30 completely different protection networks, but in the hands of the murderer, these protections are like air, without the slightest effect.

If the same person is attacking the cyber protection of 30 countries at the same time, and at the same time.

None of us here dared to conjecture that the cyber protection of classified documents is basically maintained by the elite of the country's network technology elite.

Not to mention, each country's elite for the protection of classified documents also needs at least about 15 people, just like surrounding Tietong, the inner three layers and the outer three layers are completely protected.

Then the network protection personnel of 30 countries have reached as many as 450 people, and it is under the joint protection of at least 450 people that they can't do a trick in the hands of the other party.

Even, you can't block the other party for a minute.

These 450 people are not cabbages, nor are they mediocre talents, but the elite of the network technology elite, the genius of the genius.

So how terrible is the other party, with such technology, I am afraid that it is not impossible for the other party to destroy time.

If the other side invades the nuclear weapons control systems of various countries and directly launches all the various weapons in service around the world, then it will not be long before the earth becomes full of holes.

Ignoring the shock of the crowd, Wang Yunhai continued:

But this time, it is also very incomprehensible that the time when Huaxia's confidential documents were stolen is inconsistent with the time when confidential documents from other countries were stolen, and there is a time difference of about 20 minutes with other international thefts.

Based on what we've investigated, most of the classified documents we've lost are classified documents that don't cause much damage.

Then it is not difficult to imagine that in these 20 minutes of time difference, the murderer is picking out our Huaxia confidential documents, picking out some less important documents to steal.

From this point of view, the murderer seems to have a good impression of us Huaxia and has no hostility.

So I judged that this murderer is very likely to be from my Huaxia, or that this is an organization.

In this organization, there are Huaxia people, and this person is also the high-level of the murderer's forces.

Otherwise, there would not be such a right to give Huaxia time to select confidential documents.

Through Wang Yunhai's analysis, the people below couldn't help but nodded, but it was good, according to the analysis just now and now, all kinds of signs show that the murderer and Huaxia definitely have a relationship.

This can be guessed by everyone who is doing it, so can't they guess it in country M, in fact, country M has long begun to suspect it.

However, because there was no evidence, there was no way to directly start a fierce confrontation with Huaxia.

Wang Yunhai looked at everyone, there seemed to be nothing wrong, and after a pause, he began to continue to speak.

After these confidential documents were stolen, they were sent to more than a dozen coordinates at the first time.

So far, we only have a few of them, and as for the rest of the coordinates, we can't make a judgment for the time being.

Because of the coordinates that the remaining traces point to, when we were halfway through the tracking, we directly cut off our tracking, and the other party's network technology is also very strong.

So only the approximate coordinates are known, and as for the detailed information, further investigation is needed.

What's more interesting is that several of the hidden coordinates that we secretly monitor are terrorist bases.

And it's the kind that is extremely hostile to country M, and it should be that some people left over from al-Qaeda have started it again.

Listening to Wang Yunhai say this, everyone is very clear, because these hidden coordinates are like a time bomb, so all countries will monitor some hidden coordinates in real time to prevent any unfavorable changes to their own countries.

And among these coordinates of file transfer, there are several of them under the supervision of Huaxia.

Since Huaxia is aware of some of the hidden coordinates, then country M is naturally very clear.

This news was easy to say, and the faces of everyone present became interesting.

Could it be that the murderers of this cyber disaster already knew the details of these hidden coordinates in advance.

That's why they steal the confidential documents of major countries and transmit them to these hidden coordinates.

Don't be the confidential documents of country M, there are several terrorists who are very hostile to country M.

Therefore, it is conceivable what kind of things will be done after these terrorists who hide their coordinates get this information.

Thinking of this, everyone's eyes gathered together, could it be that the other party meant...

If that's the case, then this cross-border lawsuit could be very interesting.

Of course, other possibilities are not ruled out, but at present, it seems that the possibility of this happening is relatively high.

And when Wang Yunhai said this, the eyes of the No. 1 leader lit up suddenly, but it only flashed in an instant, and no one noticed it.

If this cyber disaster was premeditated in advance, the murderer first used his terrifying network technology to investigate these hidden coordinates and learned the information of these hidden coordinates before triggering the cyber disaster.

Especially after learning the coordinates of those terrorists who hate country M, then the murderer has already arranged a way out in his heart.

Since there is a way out, there is no hesitation, so the murderer chose to attack the three giants of Microsoft, Pingguo and Google.

But the murderer did not expect that after decades of development, the three giants have already penetrated into all aspects of online life.

So after the attack began, the novice suddenly discovered that his original intention was to attack the Microsoft Big Three, but it inadvertently caused a cyber disaster, so the murderer immediately stopped the attack and ended this sudden cyber disaster.

After the end of the cyber disaster, the murderer was not at ease, so he deliberately left traces, and at the same time stole confidential information from various countries and sent them to the hidden coordinates he found.

And these hidden coordinates, after getting these confidential documents, are naturally ecstatic.

And those terrorists who hide their coordinates will naturally not let go of such an opportunity, so isn't there someone who will bear the black pot of such a cyber disaster that shocked the world?

Since someone is behind the blame, the threat of the murderer will definitely be much weaker.

After synthesizing his previous guesses, the last trace of fog in the heart of the No. 1 leader disappeared completely, and the guess in his heart was completely determined.

3.29 The murderer of the cyber disaster must be Jin Yi, the founder of Galaxy Technology.