Chapter VI: Investigation

In the afternoon of the next day, Xiang Shan found the people from the network security.

"You want to talk to those hackers?" The head of this part of the security department is a Frenchman. He scratched his slightly greasy curls and said, "It's not good, Director Xiang." After all, we are still in the park of the Rama project. If the other party touches the bottom in turn, there will be a big mess. ”

Xiang Shan said: "Really not? ”

"'Zhurong' is there, and maybe other top hackers are also there. Assuming that the people on this website are estimated to be the top black hats, maybe it is 'Zhu Rong' himself. The person in charge said: "It's full of top hackers over there." I don't recommend taking risks. ”

Xiang Shan said: "I'm sorry, please think of a way." It's a job need. ”

Xiang Shan said as he took out a copy of the meeting minutes: "I communicated with other people in the research department in the morning. We unanimously agreed that the ideas that the hackers were discussing were valuable. I've put up a team to validate a few of the key points they raised. I think it's important to join the discussion. ”

"This ......" the person in charge took the record and hesitated for a moment.

Xiang Shan said: "This is also to crack the 'Orenmira Project' faster. Although the Ornmira Project may not be as important as the Obatala Project, it is a shortcut for us humans to understand the makers of Ogon. ”

The person in charge sighed: "I see." Today there was a meeting between the members of the Cyber Security Department and the members of the Hanuman Project. We'll put it under your wisdom for the time being. At the meeting, I opened to present your opinion and work with others on its feasibility. Please note, however, that there must not be any unnecessary exchange of information with the 'at-risk' community until we have the results. ”

Xiang Shan nodded.

That hacker community is home to the most elite "guerrillas" of our time and the most destructive criminals. Especially the special place of the Rama project. The "intelligence" here itself has the potential to impact the existing order of society.

Whether it's uploading data to a website from here, or downloading data from a website, it's risky.

In the former, it is possible to reveal your own location, identity, or alert those hackers.

In the latter case, it is possible to sneak some dangerous code into the park.

These people in the security services are indeed the regular army, the elite of the country. However, at best, they can only guarantee that "the enemy can be destroyed afterwards", but they cannot guarantee that "information will not be leaked."

Saluting to the head of the mountain: "Please." In addition, I would like to join your department for a while. ”

The person in charge showed a confused look: "You? This ......"

"I'm also a programmer. I'm better at hardware and low-level stuff, but it's okay to listen to your discussions, right? "Towards the mountain.

The person in charge muttered. I don't know if he thinks that this Director Xiang is brushing up on his qualifications, or if he thinks he is not doing his best.

But now Xiang Shan is one of the biggest officials in this park. The rest of the people are also on the same level as him. This seemingly nonsense request was actually met.

After all, in the first phase of the "Ollenmira Project", the director proved himself as a scientist.

As Jing Hongtu expected. Xiang Shan is easy to forgive even if there are some operations that are not very compliant - as long as the purpose of these operations is directed to "the project he researches", then everyone can easily forgive him.

After all, he's a crazy scientist.

This is indeed a good character.

Xiang Shan sat in the conference room of the network security personnel, took out a voice recorder in the bright light, and recorded the progress of this time there.

To be honest, the "Hanuman Project" is not going very well right now.

The "Risk" community is a completely anonymous online community. It's very simple in structure, stores almost no "unnecessary data", and has little to no other than a password to protect your account.

At the same time, the community has adopted distributed virtual servers, and even the application framework has been written by a powerful hacker group itself. This website is not an ordinary small website that relies on a server in a small country.

When a user accesses this fixed domain name, it will be temporarily assigned by the algorithm, and in a bunch of volunteer proxy servers, three available ones will be randomly selected to form a temporary data link, allowing the user to ping a server IP that is now available.

But the triple springboard is also only the first step. The triple springboard is sufficient for illegal cyber activity in general, but these hackers are clearly not going to settle for something that has already been compromised by law enforcement agencies.

It can be understood this way. The "ontology" of the "risky" community exists in many different servers, each of which is independent of each other, and at the same time, each part is backed up to each other, and no matter which part is destroyed, it can be backed up again, and it is difficult to eradicate it. The servers on which these "ontologies" are located may even be located in several completely different countries.

These "ontologies", or website source code, are constantly moving themselves to other servers.

And the part of all the servers that are occupied is the "complete virtual server" where this online community is located.

This community is like a swarm of amoebas that exist on the web. It will constantly shift, it will split, it will be deformed. The amoebas are still hiding in the murky water, and it is difficult to see them. And as long as some of these amoebas are missed, they will regrow.

"Smashing" the site is a very tough thing to do in itself.

Every time you connect to the mountain, there is also a huge risk.

It's just that on the side of the mountain, there is a little bit of goodness. They represent a union of the most powerful political entities on the planet.

The entrance to and from the "Internet" itself is managed by or its members.

On top of this, the cybersecurity personnel of the Rama project can disguise themselves with resources unimaginable to ordinary black hats.

In addition, they can call on a huge number of resources to dig up everyone who connects to the site.

For example, they can send out some of their own servers, blend in with the servers that are "jump nodes", and then use DDOS attacks to take down most of the jump nodes that they don't control. No matter how many broilers a hacker group controls, it will not have more resources than these people have.

For example, they could use certain forensic or statistical techniques to dig up the real-world identities of most of the site's hackers. That's what their violent apparatus is better at.

If a single country wants to take down a hacking den, there may be some political restrictions.

But the consortium behind the Rama project has no qualms.

The amoebas hide in the murky water, but in the worst case, this violent entity can even evaporate the pool entirely.

It's just that time isn't there yet.

Hackers wouldn't have imagined that they would be hit on this level.

Soon, after discussing for a long time, the people in the cyber security department still found some solutions.

Of course, this is just an episode.

Their current focus is still on finding "information leakage points".

They are looking for files that may be viruses in all the devices throughout the campus.

They still don't know how the virus came about.

The only thing that is certain is that the "infection" occurred within the park.

"Zhu Rong" is not a hacker who likes to spread Trojans on a large scale. According to intelligence, all previous actions of "Zhurong" were targeted. He will attack the big tech companies, especially those that are trying to build some kind of technical barrier, technological hegemony. He will do his best to dig up the undisclosed technology that the companies control.

Sometimes, he does this by hacking researchers who work for those companies. However, most of the methods are to first manipulate the servers of those technology companies, and then infect the personal devices of those researchers through the servers of those technology companies.

There is no record of ordinary people inadvertently being infected with the virus written by "Zhurong".

So the infection must have occurred when some of the scholars were communicating with the translation software company.

There were already other technicians who had gone to the company posing as police officers — their police badges were all genuine, and they even had resumes that couldn't have been more real.

But the biggest problem is that Ingrid is really just a nominal company in that business. She hasn't been involved with that company for the last year.

Ingrid's device could not have been the first contact with the virus.

She was poisoned in the park.

It's scary. No one knows when the infection of this electronic virus occurred, nor how many people were infected. It's hard to even know how many people's devices this thing is on.

The entire campus is likely to be permeated like a sieve.

If it weren't for the fact that "Zhu Rong" had not yet posted "Sita" on the Internet, and it happened to be noticed by the cyber security personnel of the "Rama Project", I am afraid that "Zhu Rong" would have been able to hollow out the information here.

That's why the United States is eager to send its top experts.

However, the original cyber security department of the Rama project is not really just eating dry food. At the very least, they have built a high wall, physically insulating the further loss of information.

Now, they are desperately searching for possible samples of the virus. They hope that they can do something before the arrival of "Agni" in order to save their reputation

But the gap in levels is still there.

Early in the morning of the third day, there was still no sign of resolving the matter.

And a military vehicle, which also departed from the airport, headed for the park.

Xiang Shan and several other responsible persons were waiting in the reception area.

Soon, a small group of United States soldiers appeared.

They saluted to the mountain: "Gentlemen, the 'goods' have arrived. ”