Chapter 770: Data is King!

The task is daunting!

The situation is urgent!

If it weren't for the danger, Lao Zheng would not have summoned Wu Jie back overnight.

But there are too few clues that can be provided to Wu Jie.

In addition to Nangong Yao's confession and mobile phone, there are only some communication records provided by the Beihu organization.

According to the clues provided by Nangong Yao, through his mobile phone number, WeChat account, bank transfer records, etc.

The list of members of the World Destruction Organization is absolutely incomplete.

At present, Meng Sihua and others on the list have been listed as key targets for arrest, and various localities are taking swift action.

The operation plan of the Security Service is divided into two fronts.

The first is realistic arrest.

With the momentum of thunder, the people on the list were quickly arrested and brought to justice, and they were interrogated by surprise overnight.

Pull out the radish and bring out the puree!

If Nangong Yao and Meng Sihua can be caught, the introducers who entered the organization, then they will definitely be able to grasp more information.

With more arrests and interrogations, and the continuous synthesis of information, we will be able to better understand and grasp the situation of the World Destroying Organization.

The second is online investigation.

Nangong Yao's confession, whether it is teaching and training, member exchanges, or fee payment, is all done through the Internet.

There are special student exchange groups, counseling discussion groups, technology sharing groups, and so on.

To be safe and evade regulation, they don't use common social tools like email at all.

Instead, it uses a special encryption software, which is made by absolute top experts, and it is quite difficult to crack.

......

Half past two in the morning.

The departments within the Security Service are still busy.

Realistic arrest operation, don't worry about Wu Jie, his most important task at present is to crack the encryption software.

The biggest task of the cyber security department is to peel back the cocoon and stack data.

According to the members of the organization on the list, according to their social accounts, bank accounts, mobile phone numbers, etc., a large amount of data is collected, including chat records, transaction records, communication records, etc.

Of course, what takeout have you ordered, where have you taken an online car-hailing car, and what have you bought online......

All relevant data is being collected in a steady stream.

Smartphones and mobile Internet have made human life more and more convenient.

People use their mobile phones to chat and socialize, shop online, take a taxi, buy takeaways, ride and take a taxi......

And so!

Unconsciously, people will know what they like to eat, what they wear, what they use, who they talk to, what they talk about, where they like to go, where they often move, their personal consumption habits, and their economic income......

All these bits and pieces of life are 'told' to the APP software used.

Because of this, the current APP software understands users too well.

Using massive amounts of data, the software knows what users want, so now advertising and content promotion are becoming more and more accurate.

Of course.

If you can collect all the data of AP software together for big data analysis.

They are even more familiar with them than their friends, family, and even their parents.

Merely......

Enterprises do not have such capabilities, at most they can use the data accumulated by their own APP software to analyze user characteristics.

Like Alibaba, Tencent, Google......

These big companies, their software is collecting and storing all kinds of data all the time.

But they can't be exchanged with each other because data is valuable and even priceless.

And the Security Bureau, which is the real department, is different.

Through the executive order, the companies can be directly asked to provide relevant data.

And because of the account real-name system, mobile phone number association, friendship account login, IP address information records......

How many software and how many online accounts a person has used is actually easy to find out.

Don't think that if you switch a mobile phone to use two QQ or WeChat, and switch to use a SIM card belonging to a different communication operator, you can pretend to be two people.

In fact, the IP Internet address and network access permit have long been firmly recorded.

Moreover, many software nowadays will obtain privacy authorization when installed, especially space storage, call recording, and location.

You can send pictures, voices, and videos to your smartphone through the software.

The proof software will also know what you have stored on your phone.

Like some unscrupulous software or Trojan horses, they will take control of mobile phones without people noticing.

In the case that the owner did not operate, he acted quietly.

Stealing accounts, transferring money, secretly filming and surveillance, stealing smuggling-secret photos and videos......

Some people do not have a high sense of security precautions, install all software, and save ID cards and other ID photos in their mobile phones.

It will be even worse, not to mention the theft of money, it is even possible to impersonate the identity and do some illegal things.

In a word.

In the age of smartphones, many people are actually 'transparent' and have almost no privacy to speak of.

Law-abiding companies will use data to make money legally and compliantly.

When encountering unscrupulous software and Trojan horses, it is stealing secrets and even impersonating identities.

But at this moment......

Big data analysis is helping to solve cases!

......

One of the people on the list is being arrested one after another.

Where to escape?

Nowadays, when you go out to take a plane or train to stay in a hotel, you must have an ID card, and you also have a license plate number when you travel by car.

In addition, even if the smartphone is not connected to the IFI or turned on the data, it will continue to exchange data with the nearby communication base station.

Through the base station positioning method, the scope of capture can still be narrowed.

If you really want to avoid arrest, you can only evaporate from the world.

Don't bring any smart electronic devices, camouflage covers your face, and avoids being photographed by roadside cameras for face recognition.

Either hide in the deep mountains and old forests, or hide in the market.

But not many people can think of this.

Because Nangong Yao was notorious for deliberately spreading AIDS and posting selfies on Moments, and after he was arrested, the organization was not quickly arrested on a large scale.

Even so far, none of them have been wanted on the Internet, and the arrest of the insiders of the World Destroying Organization was suddenly launched by the Security Bureau.

Judging from the results of the 'Realistic Arrest' operation, many of the gentlemen on the list who have been arrested have not absconded.

But they also knew that after Nangong Yao was arrested, in order to strive for leniency, it was difficult to guarantee that he would not confess.

Therefore, some of the children who were caught uninstalled the software and formatted their mobile phones, and some simply changed their mobile phones and moved to live elsewhere......

It's a pity......

These 'clumsy' counter-reconnaissance methods have not achieved much effect.

The sub-bureaus and offices of the Security Bureau in various localities closed the net overnight and arrested more than 20 people.

These people are different from ordinary criminals, they all have AIDS and are extremely misanthropic with the world.

In the process of arrest, they resisted all kinds of things, and even had to bite the special service in an attempt to infect AIDS.

There are many people who want to jump off buildings and cars and beg for death.

Even if the case is arrested, the situation of surprise interrogation is not very optimistic.

Dead pigs are not afraid of boiling water!

I always feel that if I have AIDS, I will definitely die, so why bother to explain the situation of the case?

did not explain the members of the organization, let alone who went to the book, and whether they were successfully infected with the new mutant virus......

In order to get to the bottom of the case as soon as possible, the Security Bureau seconded a number of experts in criminal investigation and interrogation.

But when encountering such 'dead-skinned' diehards, the progress is not great.

......

The other side.

Wu Jie's cyber security department has been working hard.

Their encryption software is difficult to stop others, but it can't stop Wu Jie.

But it doesn't make much sense to hack it.

According to the date verification, the encryption software stopped running the day after Nangong Yao's arrest.

The server is empty, it has long been deleted, and it has been specially shredded and cleaned, and it is impossible to recover the data.

When encryption software is useless, you can only count on big data analysis.

Wu Jie recruited a supercomputer with a floating-point rate of one billion times to participate in massive big data analysis.

The most important clue to follow is the direction of the flow of funds.

The so-called poor family is rich!

If you want to go to Yuben without spending money on a plane ticket? Is it possible to travel back in time?

Like Nangong Yao and others, who have been arrested, their banks, WeChat and Alipay have all transferred accounts to whom.

If they have transferred money to someone, then that person must be a member of the World Destroying Organization.

And where did the money in this person's account go? to whom did it go, or did it buy something?

Follow the vine and touch the melon.

In the massive data, the final direction of this sum of money will be found.

With the cooperation of many departments and the support of bank databases, continuous and high-intensity continuous operation.

Focus on finding out if you have bought a ticket to the past since the outbreak of the Sakura virus.

If these crazy people want to go to Yuben to get infected with the virus, the first choice must be to take a plane, and they must have a passport and buy a plane ticket to go abroad.

And at the airport, whether it is out of customs or entering customs, there will also be a record.

Therefore.

Check personnel information, date of ticket purchase and use, customs records of major international airports, etc.

After repeated calculations and verifications, a list of suspected suspects was finalized.

After the first outbreak of the Sakura Blossom Virus, there was a ban on sailing.

Before the outbreak, the people of the World Destroying Organization naturally did not know about the virus.

After the ban on sailing, on the international black market network rebuilt by the Northern Fox Organization, knowing that this virus was not trivial, he went to fifteen people.

But......

Because of the specific drugs and vaccines, the epidemic control in Ben was quickly lifted and international flights resumed.

At that time, Sami Muto had not yet mutated.

These fifteen people obviously didn't know the mutated characteristics of the virus, so four people came back one after another.

There are eleven people left, probably because they feel that they have come here, and they should be tourists.

Wu Jie invaded the network on the side of the city and found that the eleven of them were staying in hotels of a high grade, and they had traveled to many cities in the days before the onset of Muto Sami's illness.

Afterward......

Sami Muto induced and spread a new mutant virus broke out.

On the side of the international black market network, the gossip spreads quickly.

And the eleven members of the World Destroying Organization are estimated to be really treasures.

Wu Jie found out that they were diagnosed less than an hour after the condition, so he took the Shinkansen high-speed train and quickly rushed to Dongjing.

Others are hiding from the epidemic, but they are like moths to a fire, going forward one after another.

On the other hand, there seems to be a problem with efficiency.

After the new variant was confirmed, they did not immediately shut down international flights.

It is said that more and more patients with new virus infections are appearing, and it is seen that special drugs cannot cure Sami Muto at all.

It was only after I felt that the matter was serious that I notified the countries and closed the airport.

Before the suspension of flights, the World Destroyer must have known that international flights could be suspended at any time due to the outbreak of a new epidemic.

In order to bring the new mutant virus out of the book, it is necessary to escape from the East Whale as soon as possible before the suspension of sailing.

As long as you can fly away, it doesn't matter where you fly away.

Therefore.

The eleven of them bought tickets to fly out of the city and go to other regions in chronological order.

Nowadays, many countries and regions implement visa-free and visa-on-arrival for tourism, and even with a ticket, you can stay for a few days.

And before they leave for the airport, they must go to a densely populated area to try to be infected with the new mutant virus.

Then, regardless of whether they are infected or not, they will take an international flight to leave the city before the ban on flights.

After careful comparison.

Before the complete ban on sailing, only four of them successfully left the East Whale.

They flew to Saipan, Di Bai, Mani La and Xiang Jiang.

The man who flew to Xiangjiang soon flew back to Shanghai, and some of the passengers who were on the same plane with him may have been infected.

The target person in China is locked, and the other party is very likely to be with Meng Sihua, who is on the run.

Regardless of whether they are infected with the new mutant virus, they must be arrested as soon as possible.

But in the bustling and huge metropolis of Shanghai, there is no news of the two.

I don't know where they are hiding, so how can I catch them?