Twenty-one-seven, the Devil's Hand
2548 accepted Tang Yingjie's gift, and finally agreed to help Tang Yingjie, he followed the network cable and took down a bionic Tianniu on the network cable on the balcony.
2548 told Tang Yingjie that it was the hacker who transferred your money.
Tang Yingjie asked eagerly: "Brother, I know what you said, the problem is that evidence is needed...... Can I get my money back? How can you catch this hacker? β
2548 looked at Tang Yingjie apologetically, and said in an affirmative tone: "Money? β¦β¦ I can't say that it will never be recovered, but the probability is almost zero. As for how to find this hacker, this person is too clever, if I run into him, I will kneel and beg for three days and three nights to worship him as a teacher, if I have such means, I will not be where I am today, I rely on! I was so stupid, stupid. β
2548 said with a depressed head and a face full of frustration.
Everyone finally understood why he slapped himself and why he was so depressed. Some sneered, some joking, and some were surprised.
Tang Yingjie then asked: "If the police have evidence, everything will be easy to handle, what did you find?" ββCan you provide it to the police? β
2548 shook his head, looked at Tang Yingjie and said, "Mr. Tang, tell me the truth, I know the importance of evidence, if you find evidence, you can find people, and money will be found." However, this person is so powerful, it can be said that there is no trace of stepping on the snow, leaving no traces, I can't help it, it's not that I'm talking big, no one can help it. β
Tang Yingjie was like being hit hard by a punch, and his face immediately changed.
The provincial department came to two network security experts, one surnamed Wang, one surnamed Shi, these two experts have not put 2548 in their eyes, the leader let him deign to follow, this way is arrogant, condescending contempt 2548, it is no wonder that the province's famous network security experts, how would they put a small hacker in their eyes.
At this time, the two experts stared at the bionic unicorn bull on the table, listened to 2548's words, and the questions in their minds appeared like bubbles.
Expert Wang coughed lightly and spoke first, he said: "I have a question for you, the computer background shows that this computer has implemented the transfer operation, and the time is the second half of the night, but no one enters this room at that time in the monitoring, no one in this room, that is to say, no one operates this computer, how is the transfer implemented?" β
There are four network security experts present today, two from the provincial department, Wang and Shi; The Thuan An Public Security Bureau also sent two cyber policemen. The conceit of experts Wang and Shi from the provincial department 2548 looked at it in their eyes and was very disgusted; On the contrary, the two Internet police officers in Shun'an had a modest attitude and made a good impression on 2548.
At this time, Expert Wang asked, 2548 snorted with his nose, glanced at Expert Wang, and sneered: "Hmph! I'm a little hacker who has lost in your hands, and I can't afford to ask for advice. You are experts, you publish papers, evaluate job titles, take taxpayers' money, specialize in cybersecurity, and now there is a problem, should you come up with the answer? I'm a criminal, and I don't dare to get an axe. β
2548's words were too direct and too slap in the face, and Expert Wang immediately blushed, his lips moved and he held back, and turned his head to the side hatefully.
The big-bellied warden couldn't look at it, and said in a tone of lesson: "What is this talking about? How can you say that? Don't be too crazy, boy, it's no good. β
This is a blatant threat, 2548 stalked his neck, and he didn't dare to refute it, the so-called county officials are not as good as taking care of them, and it is not fun to offend the prison warden.
The fat director interjected and said: "Young man, there is a reason why so many people are here with you today, it can be said that I can afford you, and it is also a rare opportunity. β
2548 took a sip of beer, blinked his eyes, and turned his head to look at Tang Yingjie.
Tang Yingjie smiled and said: "Brother, you must help me with this favor, my sister is the financial director of the group, for this matter, my sister is suspicious, some people say that it is the account transferred with this computer, my sister has a mouth that can't be said clearly, I can't think about it for a while yesterday, I looked for a short time, took sleeping pills, fortunately, I rescued in time and picked up a life." β
2548 looked at Tang Yingjie in surprise and said: "So that's the case, when I met the expert who was in the wine bag and rice bag, he insisted that it was operated by this computer, which made people suspect that the financial personnel were guarding and stealing it." Of course, I can't tell. β
Tang Yingjie nodded. 2548 said, "Wronged, your sister is a great wrong." β
Song Jun was also suspicious of this question, and privately suspected that Tang Yingjie was secretly manipulating, so he took two cans of dark beer and put it in front of 2548 and said: "Brother, you can unravel this matter, what the hell is going on, otherwise, the two layers of skin on the human mouth are really spitting on the stars and drowning people." β
2548 smiled slightly, took a sip of beer, moistened his throat, picked up the one-horned bull and said, "See? This is the tool of the crime. The other side used a new technology, some people called it 'Wan Icke Stealing', others called it 'Screen Radiation Stealing'. This is a spy technique that was discovered in 1985 by a scientist named Wan Eyck. That year, Van Icke used a television set and a $15 device to monitor and steal signals from a considerable distance. As soon as this technology appeared, it immediately attracted the attention of the intelligence departments of various countries, and the intelligence departments of various countries immediately organized experts to continuously study, improve, and break through technical difficulties in this field; up to now, the latest technology can not only steal signals, but also remotely operate the other side's computers, mobile phones, and other terminal equipment. Do you understand? Remote operation, what does it mean? It is to operate other people's computers, mobile phones and other terminal devices in a long distance. Of course, such equipment is not available on the market, only in intelligence services, such as the CIA, Russia's KGB, Israel's Mossad, Britain's military intelligence and other spies. In the circle, this technique is called the 'magic hand', which means the magic hand that is traceless, omnipresent, and omnipotent. β
2548 put down the unicorn and said: "This little thing is very important, this is the evidence, the other party is through it, the electromagnetic signal is imported into the terminal, to achieve remote operation, there should be some secrets hidden here." β
Everyone was amazed. Not to be outdone, Expert Wang and Expert Shi muttered: "I've heard of it, I've heard of this technology, but I haven't seen it." β
"This one does."
2548 glanced at Expert Wang and Expert Shi contemptuously, a little raised his eyebrows.
Cybersecurity experts and hackers are natural adversaries. Network security relies on a wall, called a "firewall", and security experts rack their brains to make the wall strong, without loopholes, and not give hackers a chance to take advantage of it; The hackers tried their best to find loopholes in the walls, storm the castle, and loot it. The two sides attack and defend, swords come and go, the magic is one foot high, and the road is one foot high. This process can be both active and passive. Hackers find vulnerabilities and take the initiative to attack; The "firewall" is passively defensive, patched, and mended.
Cybersecurity experts see hackers as rogue and think they are the natural enemies of hackers; In fact, hackers see cybersecurity experts as masons who are beaten passively and only patched after the fact.
The "firewall" is getting tighter and tighter, and the hacking technology is becoming more and more magical, and the "magic hand" has gotten rid of the old dogma of looking for holes in the firewall, which is a "leap" that has crossed over the wall.
The two Internet police officers in Shun'an have been listening attentively, and asked modestly at this time: "Teacher, there is a question, there should be a record of bank transfers from one bank to another, and the background is clear, why can't this transfer be recorded?" β
2548 gave the Internet police a gentle look and said, "You may not understand this question. β
The Internet policeman who asked the question was stunned with a red face.
2548 said, "Alas! -- This is exactly what I regret about this question. Now, it's too late to regret it! Back then, I was too composed, I started too early, if I do it now, hehe, you won't be able to catch me. β
The Internet police asked in surprise, "What's the matter?" Why? β
2548 stood up, took a few steps on the ground, and said, "There was a hacking case a few years ago. There is a company in the United States called Colonial Nier, and this company's main business is to supply fuel oil to the states on the east coast of the United States through pipelines. That year, the company was hacked and extorted $5 million. Colonial obediently paid $5 million to the hackers. Many people wonder how developed the Internet is in the United States, why don't they track the whereabouts of the funds, follow the vine, and arrest the criminals, just like when I was arrested. ββHehe, this involves a new technology, called 'currency encryption', which is used when transferring money, and it is impossible to track the whereabouts of the funds. However, not only did this hacker use cryptocurrency, he also took a dark path so you can't track it down. β
The Internet police then asked: "Secret way? What do you mean? β
2548 said: "This problem is a bit complicated, and I can't explain it clearly, such as borrowing satellites from other countries, using the dark web, renting paths from international hackers, anyway, in a word, it is to prevent you from tracking." β
The crowd was dumbfounded.
Tang Yingjie had been listening carefully to 2548, and asked at this time: "So people can't find it, and the money can't be recovered?" β
2548 shook his head and said, "It's too difficult, it's impossible to find a marked grain of sand from the desert." β
Tang Yingjie asked again: "You just said that you can't use conventional methods, so what methods work?" β
2548 received Tang Yingjie's gift, as the so-called cannibalistic mouth is short, and the hand of taking people is short, at this time he said patiently: "Mr. Tang, you can think about it this way, such a large amount of money, although its flow is unclear after encryption, and I don't know where it is, but it will eventually flow to a certain account, and the account funds will change greatly, and the capital regulatory department, such as the anti-money laundering agency, will be aware of it; Moreover, money is spent and will not be collected like antiques, so as long as you pay attention to it, you will definitely find clues. β
The fat director and the thin director of the provincial department said in unison: "Yes, it's a way, go back and report, complete the ministerial-level project, and watch the flow of funds, there is hope." β
The ball of dog hair that had blocked Tang Yingjie's heart for two days finally let 2548 come out, and Tang Yingjie felt that his breathing was much smoother.
Director Zhu tugged at Tang Yingjie and said: "Don't worry, Mr. Tang, as the old saying goes, we can touch the vine with the vine, and we can also touch the vine with the melon now!" β
Tang Yingjie understood, smiled at Director Zhu and said, "It makes sense, bother more." β
Director Zhu's words made Tang Yingjie see hope, and suddenly became emotional, and immediately ordered the kitchen to prepare dishes, and asked the leaders and 2548 to stay for dinner.
The big-bellied warden said: "Mr. Tang, I have received my mind, this is really not good, it's not too early, we have to go back." β
Tang Yingjie repeatedly pleaded, the leaders really couldn't stay for dinner, Tang Yingjie instructed Song Jun, each leader a box of Moutai. Deliberately said to 2548: "Brother, I have made up your friend, I will go to see you." β
2548 was very happy, nodded and said, "Mr. Tang is righteous, and I also recognize you as a friend." β
Tang Yingjie suddenly realized that it was no longer good to deal with an opponent like Jin Duo by fighting and killing in the past, and it was necessary to adopt the strategy of fighting poison with poison, asking hackers to deal with hackers, and dealing with Jin Duo in the future, 2548 may have a better way.