Chapter 277: The Identity of the Mysterious Hacker (I)
All in all, the top management of the Metropolitan Police Department has mobilized because of this major case, and they have done their best to deal with this case, and it is necessary to ensure a high degree of secrecy in the operation.
Because something like the success of a hacker in a bank doesn't need to be too detailed, as long as the slightest bit can cause panic in society, and then trigger a financial crisis in countries of varying scales. No one could afford such a responsibility, so the size of the Serious Crime Team was reduced to the extreme, and it was completely unknown to other colleagues.
Takahui Sato was once again selected to join the group, and although her last case, the mission to investigate the scientist's resignation failed, everyone knew the nature of the incident, and no one would blame anyone. This short-haired female police officer who has just turned 30 is outstanding, especially as a front-line officer, and she is extremely powerful, and it is impossible to leave her behind in this mission.
Gao Hui did not inform her brother, who was abroad. In fact, she has a hunch of a good thing, that is, she has been participating in some very special actions recently, not only today and last time, but also many times in the past. According to the practice in the hall, this was likely a precursor to sending her to Interpol headquarters in Lyon, France, for training.
And then today she joined this serious crime team, with the rank of police department, as the deputy leader of the action team to catch the hacker group, which is a very luxurious combination. Because the captain is a police officer, this higher-level commander only exists to assess Gao Hui's ability, and will not dictate the operation itself. So this meaning is obvious, Gao Hui knows in her heart that when this case is over, she should be able to be sent to Leon?
It's enough to think about this qualification, in an international financial theft case, serving as the executor of the action team that directly arrests and arrests the bad guys, even the most picky personnel can't say that the resume is thin. Gao Hui, her brother and even their father are all police officers, and they know everything about the system, and the process must be like this.
Therefore, the only thing she needs to do at present is to wait for the entire serious crime team to find the address of the criminal, and in the process, she will continue to place the people who called the police to collect information in an orderly manner. This is not an easy task, because as the chief of the police council said, by the weekend after the meeting, the number of police officers had soared to more than 5,000!
Therefore, the amount of stolen money is also getting bigger and bigger, so there are more accounts and information channels involved, which leads to more and more pressure on the work of the network monitoring team, and overtime and drinking espresso pressurized coffee are the norm, although that is their normal state.
Thankfully, Tokyo is a large metropolis that is home to more than a quarter of the country's population and is internationally renowned for its population density, so the task force is quick to gather intelligence. Gao Hui and her colleagues walked the streets every day, and in just one week, they visited the 100 people who had suffered the most and aggregated the report and information from other sources into big data.
"Criminals are well aware of their goals. The average annual household income of these people is more than 10 million, which is a very standard middle-class member, and the annual income of the rich group is also one-tenth, which proves that criminals should have access to the distribution of citizens' income. If you just blindly check in your bank account...... Will it work? ”
"If there are conditions set in the intrusion program, it is possible."
The police officer of the network monitoring team answered the question of his superior: "That is, the number of the annual amount of money is set, and it is a very simple screening order, if it is only superficial work, even a computer college student can do it." But if the target is the entire banking system, or even the intrusion itself, it's not clear......"
As time went on, the results of the investigation gradually emerged, that is, the criminals did not only target the accounts of ordinary people, but also targeted some institutions with huge amounts of money. In fact, this is the victim who took the initiative to call the police, so that the police can find clues, and this time the single amount is huge, but it is not just a small amount of people's deposits.
In fact, this is also quite funny, ordinary people have less savings, so they can know immediately if there is a loss, but those industrial companies, financial institutions, and government units have not been able to find out in the first time because of the huge amount of property and the redundancy of personnel. However, precisely because this group of victims has already appeared on the scene, the development of the situation has undoubtedly reached the most urgent juncture, although it has not yet been stabbed to the media, but all those involved in the case have been forced to tense all their nerves.
Who is the murderer?
Where did the money go?
How exactly did they hack into the bank?
The strength of the cyber police is limited, and nothing has been found after more than a week, so that the high-level officials almost plan to alarm the US side to enter the CIA. But they at least already know who the original victim was, which is Sakura Bank, one of the top three banks in the country, where the virus broke out and then spread to more areas.
That's right, this is the most terrifying situation for all those in the know, that is, after the criminals successfully hacked into the system of Sakura Bank, they went up into the financial system of the whole country, and then went down to other major banks in the country. The cyber police have found these traces of intrusion, and they probably understand its principle, that is, it is similar to the technique of contact bypass. But just knowing the principle, what kind of ghost can make up such an earth-shattering code of ghosts and gods?
"The most important thing is speed."
"The more powerful the software, the more code it needs, so the more cumbersome it is, which is unavoidable," the cyber police explained. Therefore, network intrusion should always be like this, hackers invade the code on the spot, alarm the firewall and be automatically counterattacked by the system, if the degree is serious, it will cause the maintenance programmer to take the initiative to defend, and even anti-tracking. Then, when the IP address is found by the defenders, if it is an arrest operation, it is when the nearest local police officer immediately intervenes...... This is the normal process. ”
"So, I was able to break through the firewall without knowing it, and I was able to get the information I needed without being discovered, and I was able to invade all levels along the port of Sakura Bank...... It's simply impossible! And after all, how did the murderer get into the bank's intranet!? ”
There are many ways to isolate the inside and outside of the Internet, and one of the easiest ways is to plug a specific piece of hardware into the motherboard of your computer. So, even if the murderer found the intranet interface, how did he affect the hardware from the software level?
"Those machines, didn't say that the hardware burned out?"