Chapter 51 The shock of the elite team
(Thanks to the book friend "Feng Lingdu" for his reward and full-score evaluation ticket! Thanks to the book friend "140401201703802" for his reward! Thanks to the book friend "140401201703802" for his support! Bow!)
With President Bush's order, the FBI certainly did not dare to neglect it. At 5:30 p.m. that day, the hacker competition was officially over. It would be impossible not to end. No hackers continued to participate. Everyone went to make trouble.
The FBI people shut down the server as soon as possible, removed all the server storage devices, and moved them to an unknown place. Needless to say, they must have used them for research.
Through the news obtained from James, this hacker called God controlled the ninety-one computers of the server through some means. Even if James had the core code of the server, he could not change the server's execution program. This made the FBI people feel that they had found a breakthrough. As long as they cracked the hacker's hands and feet on the server, they could roughly know his hacker's level. He might not be able to find him in this way, but at least they could also learn more about his personal information, right?
As for the computers invaded by the North American Air Defense Command, because the unit is too confidential, even the FBI cannot directly ask them for computers as evidence. However, James hated this hacker called God very much. He immediately gave a very detailed report on the incident and handed it over to the FBI. As for whether the FBI can get help from it, it depends on their own ability.
Early the next morning, Professor Vincent met a person in his office as soon as he got to work. The person's arrival surprised him. Professor Vincent's first thought was: I didn't seem to have done anything bad, right? Why did the FBI people come to me?
Seeing Professor Vincent's expression of surprise, this person smiled and stretched out his hand and said, "Professor Vincent, I am Edward, the head of the FBI Information Security Branch. We have met you. I'm sorry to disturb you. I think we need your help."
Professor Vincent then realized when he heard this. He smiled, stretched out his hand and shook Edward lightly, and then said, "His Excellency Edward, what can I do?"
Edward smiled slightly when he heard this, "Please arrange the work at hand. We will take you to a place, and you will know when you get there."
Forty minutes later, Professor Vincent and Edward came to the Seattle Computer Research Center in the United States by helicopter. This is a research and development center established by the United States. Legend has it that the United States is developing intelligent systems here. When Professor Vincent followed Edward into the basement of the center, he actually saw several acquaintances here, such as Professor Vincent who majored in computer science at MIT, Professor Sora, who majored in computer science at Harvard University in the United States, and Lewis, a senior engineer at the United States International Commercial Machinery Co., Ltd. (IBM).
There are also two who Professor Vincent doesn't know each other. Through Edward's introduction, Professor Vincent learned about their identities. One of them is Ruman, a security expert at Intel, and the other is Russ, a senior engineer at Microsoft. Faced with such a strong lineup, Professor Vincent's heart was shocked. He didn't understand why the FBI brought these people together - was it because of a large-scale hacking riot that happened on the Internet yesterday?
This matter is still fermenting, and the hackers have not stopped attacking. Professor Vincent was busy until after 1:00 a.m. before going home to rest. Early this morning, he rushed to the US Cyber Information Security Center with two panda eyes to work, so he still remembers this matter fresh.
As expected, Edward's next words confirmed Professor Vincent's idea. He stood in front of several people and put away his smile and said, "Everyone is a top expert in computer technology. The FBI has brought everyone here to get help from everyone. I believe everyone has already known what happened on the Internet. Hackers are still attacking major websites. Those people will be handled by other colleagues of mine. Our team has only one purpose, which is to find hackers code-named 'God'."
Edward glanced at a few people, then pointed his hand at the corner of the room and said, "Did you see the computer storage hard drives piled up there? These hard drives were all taken from the computer matrix of a certain server. In addition, we have a report in hand. You can take a look at this report first and then study these hard drives. We will not interfere with your work. And if you have any needs, we will be satisfied. Ladies and gentlemen, let me leave it here to you. Some of you have helped us catch Kevin Mitnik, and hope this time we can help us catch this guy called God."
After Edward said that, he walked out of the room. After the door was closed, the few people in the room looked at each other and smiled. After listening to Edward's words, they all felt that the FBI was a bit of a big deal. Who could have an elite team like us mobilized? If Kevin Mitnik took action again, it would be almost the same!
The reason why Professor Vinson knew several people here was because they had gathered together and worked together to catch Kevin Mitnik. Unexpectedly, this hacker code-named God was so powerful that the FBI added two top computer experts to the original team. He didn't believe it. Could anyone in the hacker industry be stronger than Kevin?
There were three people in the previous team who had the same idea as Professor Vinson. After a few of them laughed, they picked up the report on the table and read it. From the beginning, they were careless to the end, everyone made a series of screams of "buy" and everyone in the room realized such a thing - this person called God... is really God! Look at what he did!
——Through the association exclusion method, the server password was obtained!
——Modify the server program so that even the military with core code cannot regain control of the server!
——After disconnection, it can invade again through the network signal transmission device!
——You can even complete the intrusion through the phone line!
——Can also control voltage intrusion?!!!
This... what kind of organization we are facing... or individuals! If this is what a super hacker organization does, it is reasonable. If this is what an individual does... God! He can really be called God!
After a long time, several people stood there, they heard Professor Vincent say first: "Do you think this 'God' is an organization or an individual?"
Professor Wakate: "It should be an organization..."
Professor Sora: "Yes, who can personally be so comprehensive... and do such an incredible thing...?"
Senior Engineer Lewis: "Well... it should be like this..."
Security expert Ruman: "What if he was really doing it by himself..."
Senior Engineer Ross: "That... is terrible..."
Chapter completed!