300. Strange software
"It's good to resign, the kind of job of the director of the public security bureau, the salary is not high, and the pressure is great, so it's better to play chess and chat all day long like me." Yu Cheng said with a smile.
"Don't talk nonsense, this case only depends on you, and we are inferior to you in the police academy. After all these years, it's still fucking inferior to you. ”
"People are divided into three, six, nine and so on, some people are suitable for doing things, some people are suitable for being officials, and everyone has their own specialty." Yu Cheng and him looked carefully at the new information brought by Zheng Chunlei while being poor, of course he knew what it would mean to Director Ma if this case could not be solved after many years of brotherhood, so even if Zheng Chunlei did not speak, he would use his strength to find all kinds of doubts left by the criminals.
After carefully watching the video and the materials, he said: "If you can determine the target group of the criminal, I can identify him 100 percent." ”
Zheng Chunlei said: "What clues do you see again?" ”
"It's not that I deliberately sold Guanzi, it's too early to say, I know that your biggest headache at the moment is that you don't have the slightest clue about the man in black, I can make an idea for you to let him throw himself into the net, but before that, you must launch a secret investigation of Wu Changxiu. Just use information investigation to carefully find out all the traces of Wu Changxiu's activities on the Internet, I believe that the clues that Chen Likun cannot provide will definitely be found in Wu Changxiu. ”
"Are you so sure? On what basis? ”
The basis is that he sent someone to investigate Chen Likun, if he is not sorry in this matter, why do he do this? And you must use his guilt for the deceased Wang Yishan to open a breakthrough from him, and the two clues will advance together, and I guarantee that you will make earth-shaking discoveries. ”
"You said before that there was a way to make the murderer throw himself into the net, but now you can say it?"
Yu Cheng frowned and thought for a while: "I may not be 100% sure, but now I can only try boldly, you can make a fake video, just say that there is an emergency patient with non-red blood in this city who needs a blood transfusion, in short, I don't care how you make up this reason, but it must be like that." Then you're going to do a full deal in the hospital, and I guess there's a good chance that the killer will show up. ”
Again, we heard inexplicably: "Non-red blood? Is there anyone whose blood is not red? ”
"Of course, there have been blue bloods in Chile, and this is not just a Wesleyan novel, let alone blood. The sweat is still blue and red, and you are too lonely and unheard, in short, you listen to me to do these two things well, and I guarantee that Lao Ma will not only not resign, but will even be promoted. ”
"You pull it down, he is already the director of the bureau and is still promoted, is it possible to become the secretary of the municipal party committee?"
"It's not impossible, how many municipal party secretaries have been promoted from the post of director of the public security bureau, and others don't know, don't you know?"
After Zheng Chunlei went back, he conveyed Yu Cheng's ideas for handling the case, and Director Ma did not hesitate to immediately prepare to implement it.
First of all, they asked colleagues from the Ministry of Information to hack into Wu Changxiu's internal and private networks by "special means" to investigate his traces of surfing the Internet, and on the other hand, they began to use makeup technology to find a professional actor and make a video about seriously ill patients with "green blood" who need blood transfusions, hoping that the majority of "non-red blood citizens" would come to test for blood type pairing.
on TV. The Internet, radio, and newspapers all publicized it. This is an extremely risky move, once it is rumored that the news is fake, then Director Ma does not need to wait for the day when the case is determined to be undetectable, and he will be immediately dismissed on the spot, but the truth is well protected under the "concerted efforts" of the "patients and" the police officers.
What the task force did not expect was that there were many people with "non-red blood" in Linjiang City, who received blood tests from at least 100 people in three days, but only one of these people had slightly black blood, that is, between black and dark red, and the rest were all normal red blood, but those "blood donors" took the trouble to say that their blood was not red.
As for what color it is, everyone has different theories, and after further examination, it was found that the vast majority of these people who claim to have "non-red blood" are mentally abnormal, another part has certain psychological problems, and a small number are color blind.
And Wu Changxiu's clues soon had a breakthrough, he used the VIP mailbox to send five mailboxes to send the words "must stop", after deciphering the identity of the other five mailbox registrants, they are all one of the best entrepreneurs in Linjiang City, with strong strength, although it is impossible to compare with Wu Changxiu, but the business community in Linjiang City is all pivotal figures.
However, the business they run has nothing to do with Wu Changxiu, but why did Wu himself repeatedly send the words "must stop" to these five people? What did Wu Changxiu want them to stop? What are they doing again, what Wu Changxiu feels "must stop".
After a night of discussion, the task force made another decision, they decided to take the risk of copying the data from the hard drives of the five people.
In the wrestling field between criminals and the police, both sides often do everything in order to achieve the final victory, and both sides will use many unconventional means, so criminal investigation is by no means as simple as Sherlock Holmes who only needs one person to find out the murderer by eye and brain analysis, in fact, many times solving the case is the result of a group of people working together, and the police will also use some illegal means when necessary, of course, this premise is that they have to do it in order to maintain justice.
The era of the Internet has brought great convenience to human office life, but it has also left great security risks, because no matter how good the firewall technology is, someone can always break through its limitations, and from that moment on, your computer will begin to be shared with others.
You don't know anything about this process, there is a hacker in London who is keen to hack into the surveillance of other people's computers, watch young girls in the most private actions in the room, and masturbate to the video, many girls unknowingly do a thing of his obscenity, and what the Public Security Bureau has to do this time is to analyze the criminal clues that may be hidden in the hard disk the size of a palm.
For those five people, what decided their fate was actually the tool they relied on the most on a daily basis.
Soon, by implanting the virus program, the task force easily hacked into the hard drives of the five people, three of whom were not only hacked into the company's office computers, but also personal laptops.
However, according to the law, the information obtained by this means cannot be used as evidence, and at the critical juncture of solving the case, it is impossible for the special case team to let a little episode hinder the process of solving the case. Sub-pit double blood.
After five technicians worked around the clock, they finally locked on to an app.
The reason why this application is locked is because the five people are not the same as the personal computer data but have this section of the program at the same time, and from the registry information, the installation path of these programs and the resulting directory names are exactly the same, but from all the commercial software on the market does not have this software, so it naturally aroused the suspicion of the task force.
However, this software can not be used at all, the technician told the task force that this software uses the technical means of locking the serial number of the operating software, that is to say, to install this software, you must first use the genuine "window" operating system, because all genuine operating software has a serial number, in order to distinguish the rest of the same operating software, and the application software in the five-person hard disk will first determine the serial number of the machine generated during installation before each run, and if the data does not match, the operation will be interrupted. So the technicians are worried about this.
"Can you think of a way to solve this problem?" Director Ma said.
"Director, theoretically speaking, as long as each program is written by a person, there is a possibility that it will be cracked, but the difference is when it can be cracked, this software according to my experience if you want to decipher it must have source code, and secondly, you need to log in from the software itself to analyze this should be an Internet application software, that is to say, even if we get the source code, it is only the code of the client, so your requirements may not be easy to achieve, at least in terms of the current technical level of our bureau, unless you have external aid."