Chapter 337: The Need of the Giver
Washington, D.C. B Headquarters.
"What is this? an anonymous report of a serial killer?" suddenly said a young man with an Internet department ID on his chest, and his colleagues around him were obviously interested when they heard the word serial killer, and they all looked at him.
"Aren't you checking for spam, how can someone use the email to report a serial killer?"
"Wait, wait, don't look, wait. When the young man saw a few footnotes on the screen, his expression suddenly changed, and then he called the manager through the guò headset while operating on the keyboard.
The colleagues around him didn't complain when they saw him behave like this, at most they shrugged their shoulders, after all, they were all in a sensitive department and often had access to high-level information, so once someone issued a similar alarm, no one would take the initiative to find out what was going on - the current hackers are simply superb, and there have been many security consultants who are not cautious when tracking down hackers, making themselves live a life of heavy surveillance.
After operating for a while, the young man turned off the screen, stood up and was about to walk to the door of the office, when he saw their supervisor also coming, so he said helplessly: "Head, I must buy a lottery ticket today, checking spam can trigger a confidential alert, how strong do you say my shit luck is." ”
The supervisor is also a little crying and laughing, the people in the network supervision department are so unlucky, you say that these hackers are happy with themselves, why do you have nothing to do to dig up information on the government website, you dig it well, why do you still make it into an encrypted text, so that the people in the network supervision department have to "realistically" The mission is only completed after confirming the integrity of the stolen documents, but since then, everyone has been forced to spy on the secrets of the government departments, and there must be at least a year of residential surveillance......
So the director shook his head and said, "Come on, even if you buy a lottery ticket, you won't win, but it's really possible to step on shit when you go out." ”
The young man spread his hands helplessly, but said nothing.
The director said, "Where's your computer?"
The young man pointed and said, "There, the power has been turned off and the physical connection has been disconnected according to standard procedures. ”
The supervisor diǎndiǎn showed a smile that was neither crying nor laughing, and said: "Hmmm◇dǐng◇diǎn◇小◇Say,.≡.↖os_(); Before the Ministry of Justice came, let me ask you one more question, are you sure it wasn't an attack on us?"
The young man said, "There is hacking, but it's not aimed at us." ”
The director also diǎn diǎn head when he heard the words, and the other people were obviously relieved after hearing the conversation just now, the world is the best peace.
After another five minutes, two people from the legal department also came, so the young man and the supervisor, under the supervision of these two people, took away the computer case he had been using.
The four of them soon arrived in what was apparently a standing operating room, and the four of them signed a document together before the chassis was secured.
While waiting for the machine to turn on for more than ten seconds, the supervisor asked, "How is the hacking behavior dangerous this time?"
The young man knocked on the foot of the table and muttered: "I just saw the watermarks and numbers of police stations or prosecutor's offices in at least five states, and I thought at first that someone had stolen the federal crime database, but I saw that none of them had the electronic seals of the federal department, so I thought it was a cybercrime that stole the documents of multiple state justice systems." ”
The two people from the Ministry of Justice were immediately a little overjoyed when they heard this, there has been a struggle between the federal and state judicial systems over jurisdiction, and the first to bear the brunt is the judicial system of B, although the cases involved in this case are all cases within the states, but they were made into a cross-state federal case by a "cute" hacker, and if you don't consider pursuing cybercrimes, these two people from the Ministry of Justice even want to award a medal to this hacker.
Therefore, the two of them became a little impatient when they waited for the computer to be turned on, and asked with some concern: "Does that hacker set up a virus that automatically deletes emails or something, it's the one you often get when you make computers." ”
The young man shook his head and said, "No, after I alerted the supervisor, I prioritized checking the security of the evidence, and there was absolutely no virus." ”
The two people from the legal department suddenly had some smiles on the corners of their mouths, just at this time the computer was turned on, although the legal department was very concerned about this matter, but the employees on the network monitoring side were afraid that they would not know, so the young man quickly explained when he found the email and how to deal with it, and then gave the computer to the two people from the legal department.
The next thing you can see in the room is the young man and his supervisor, sitting in a corner of the room with a helpless expression, drinking coffee and waiting boredly for the first assessment of the legal department, the two of them are now even turning off the phone, just to stay out of trouble as much as possible.
The two guys from the legal department looked at the computer more and more excitedly, as if what was being displayed on it was not some homicide investigation conclusions and photos, but adult action blockbusters......
About forty minutes later, the two guys from the legal department were obviously even more excited, but fortunately, they still remembered their duties, turned to the two network monitors and said: "The first thing that can be determined is that there was indeed a hacking act on the network, and the stolen text involved twenty-seven states and more than sixty cities and counties, and there is no doubt about it." ”
Hearing someone from the legal department say this, it suddenly made the two members of the network monitoring department who also had some insight goosebumps on their backs - these people who studied legal documents were about to start playing word games again.
Sure enough, the person from the Ministry of Justice said: "But I personally think that the behavior of this hacker is very much in line with the standards of the earliest hackers, that is, a qiē takes justice and justice as the code of conduct, and what he wants to expose is the incompetence of the police agencies in various states, and the guide is ......."
As soon as this guy was halfway through speaking, he was stopped by his companion and said: "I also think that the original intention of this hacking act is out of justice and justice, he is trying to expose a sensational serial killer to us, because the characteristics of this killer are too inconspicuous, so that the local police agency did not expect such a serial killer at all, so it was not reported to the Investigation Bureau, which also leads to the fact that from 1996 to the present, at least 62 young people have been killed, some are not even under the age of eighteen, it is simply mad!" ”
The two people from the Cyber Department, although one of them was in charge, were still a little stunned by the two guys from the Ministry of Justice, especially the last sentence of the man just now, which aggravated the tone of "madness", which made people very suspicious of whether he was describing the serial killer or the state police agencies.
However, their words also revealed a message, it is estimated that the Ministry of Justice is ready to make this matter known to everyone, otherwise why would they be so indignant. Since everyone knows what they want to do, then the two people who are monitoring the network are naturally more relaxed - there shouldn't be a year's residential surveillance now, right?
In fact, they guessed wrong, from a legal point of view, if B really wants to intervene in the investigation of this serial killer, then he really can't use the evidence provided by the hacker to spread it around, after all, the way to obtain this evidence is not legal.
If B wants to intervene in this matter without saying anything at all, the first thing to do is to pretend that he does not know about the hack. Of course, at the same time, it is necessary to secretly disseminate the text and analysis provided by this hacker to everyone, and then B only needs to say that it is evidence found from public information, and there will be a legitimate reason to intervene.
No way, the struggle for jurisdiction is even more fierce than the struggle for constitutional amendments.
But in this way, B is faced with a question, who is this hacker, and does he mind if B does he mind spreading the text?
Of course, B can actually wait for this hacker to be anxious, maybe this hacker will walk out by himself, but the federal agency has a characteristic, whatever it likes is controllable, no one knows what kind of situation he will make if he lets this hacker do it himself, it is better for us to do it ourselves. But before doing it, we still have to try to get a certain amount of mutual understanding with this hacker, after all, it's difficult for us to b......
However, tracing the source of the email was very difficult, and the network monitoring department finally found only a set of servers located in Silicon Valley, and the email seemed to be automatically generated in this server, and there was no useful information if you checked it further. The worst part is that everyone doesn't even know the name of this hacker, and this hacker seems to be purely doing it to expose this serial killer, not to make a name for himself.
This is completely unthinkable in the online world......
In the end, B had to tentatively name it "Killer Buster", a name that apparently wouldn't anger the hacker.
You may ask, what does this matter have to do with Phoebe?
In fact, it has a lot to do with it, as mentioned earlier, when Phoebe was in a car accident after arriving in Boston and saved two policemen, because of media reports, she showed her face on TV, and some people praised her, and naturally some people hated her to the core, and the one who hated her the most was a serial killer.
And a few days ago, the person who was caught as a car thief by the Boston police under Phoebe's design is actually this super patient serial killer, he is characterized by killing all the righteous and brave, especially those who are young and brave, and he has never been confined to the form of weapons when he commits crimes, and the murder weapons are mostly different forms of knives, sometimes pistols, and even used a steel pipe baseball bat - any murder weapon that can be encountered in a robbery case, he will use one randomly.
In addition, his targets are all young people who have been on TV because of their righteousness and bravery, and the police in various states are actually dissatisfied with this kind of people, unless they are helping the police, rather than setting off the incompetence of the police, and the killer will conduct a follow-up investigation of the victim for at least two weeks, and study the way of committing the crime, so that every victim is like being killed by the gangsters after fighting beyond their strength after being robbed, and the police themselves are involved in the investigation with prejudice, and naturally only find out such results- Of course, robbery cases are actually the most difficult type of cases to detect, and it can't be said that the police are not serious, but the killer is so realistic that the police will not notice him at all when they look for the suspect.
It can even be said that if B's behavioral analysis team is called, they will not be able to find out if they don't mention to them in advance that there is such a serial killer, because the souvenir that the killer seized is not a real thing.
And B, the hacker who is called the "killer buster", has linked every crime committed by this serial killer since 1996, forming a complete and convincing chain of evidence, of course, it is still difficult to identify the killer itself, but there is no doubt about proving the existence of this serial killer - for B, proving the existence of this killer is obviously more important than finding who the killer is.
And the only person who can build a new structure through the aggregation of public information, and who can also silently create emails that cannot be found by cybersecurity experts even if they are not traced to the source, is the only one mentioned in our book.
That's right, this is a "big gift" from Phoebe anonymously to B, but when has her purpose ever been noble? Even SNN, who is closest to her, will scoff at such a statement......