LATEST UPDATES

Published at 1st of March 2022 07:28:57 PM


Chapter 586

If audio player doesn't work, press Stop then Play button again




After thinking about it, Jiang Yanhai took out his mobile phone and called Arthur directly. He still had a phone, but he didn't expect that the two people would contact just a few hours apart.

The phone was soon connected, but after it was connected, Arthur was speechless.

People like us should not forget each other in the Jianghu. Then many years later, when we meet, we are still like brothers?

What happened? You called just a few hours after we separated.

There was a strange silence on the phone.

After ensuring the absolute safety of his communication line, Jiang Yanhai was a little strange. The phone was connected. He took his mobile phone and looked at it. It was really in the call state.

Put the mobile phone in his ear again. There was still a strange silence opposite. Jiangyan Haydn looked at it. Anyway, he didn't speak.

In this way, the two big men waited for dozens of seconds before Arthur said, "why don't you talk?"

"Why don't you talk?" Jiang Yanhai was speechless.

"You called me. I thought you were looking for me."

"I have something for you."

"Why don't you talk to me?"

"Then why don't you answer the phone and talk?"

Arthur: "..." just say something.

"What's the matter with you? Well, let me ask you something. Do you know the shrines?" Jiang Yanhai was puzzled. What's the matter with this guy.

"Temples?" Arthur's tone was stunned.

"Good." Jiang Yanhai said simply.

"I've heard of it, but there's only one name," Arthur said in silence. "Wait, Jiang, I have a question for you, too."

"You say." Jiang Yanhai asked very simply.

"Aren't you a rookie who just came out to perform tasks? Why are you investigating these powerful mysterious organizations?"

"I'm ruling out. Maybe one of these mysterious organizations has something to do with my investigation." Jiang Yanhai said simply.

"I've heard of it. It seems that this organization is very powerful. Besides, it's not clear. You didn't search on that website. Try it?" Arthur asked.

"No, forget it. If that website is not necessary, I won't easily search for information."

"I understand. After all, you are different from us. If it's all right, I'll hang up."

"Bye."

Jiang Yanhai dropped two words and hung up the phone.

Now it seems that we have to wait for domestic intelligence. We don't know how much relevant intelligence we know.

He waited silently. After about 20 minutes, he received a message in his mobile phone with only two words.

Jiang Yanhai immediately logged in to the website where he downloaded the intelligence and directly began to download the intelligence. Dozens of seconds later, Jiang Yanhai directly opened the information.

"The Pantheon, whose founding time is unknown, first appeared in the early 21st century. The organization has extraordinary computer technology. They have super strength in many fields of computer."

"As the name suggests, the temple of the gods means that they are the gods on the network. The target members of the organization are unknown. The organization first took action in 2003. A hacker once exposed American crimes on the network. Then the hacker was wanted by the FBI. When the hacker was about to be arrested by the FBI, he applied for asylum to the temple of the gods."

"Then the shrines approved his asylum application, and then he disappeared directly into everyone's sight. Everything about him, all photos circulated on the Internet, surveillance videos, social security files, information files, bank files, online purchase records, consumption records, call records, hospital birth records, etc., and all electronic files, including those stored in the FBI network According to the information in the library, it all disappeared. "

"No one knows where the hacker went, because they can't find any information about him. All the investigations ended without any useful information."

"This is the first recorded shot of the temples. Their shot shocked the U.S. network communication security department and the Department of national security."

"The second recorded shot of the temple was in 2013. After Thomas gable triggered the U.S. financial crisis in 2008 and caused at least tens of billions of dollars in direct losses and trillions of dollars in indirect losses, the U.S. government launched the Guangling plan."

"Guangling plan is a secret monitoring plan launched by the U.S. NSA (U.S. National Security Agency) and the FBI. It directly enters the central server of the U.S. Internet company to mine data and collect intelligence, including 9 Internet giants such as Microsoft, Google, Yahoo and apple."

"The plan was secretly exposed by the project leader, hacker Edward steno, and finally exposed by several media such as the Washington Post in 2013."

"Later, steno sought political asylum in Russia. Later, steno didn't know how to contact the temples. Then the temples shot. Under the monitoring of the Russian intelligence department, steno disappeared without a trace, including all the electronic records of his life. Steno evaporated in the world."

"The organization has only two records, but none of them shows the strong strength of the other party in the Internet age. The organization is marked as red and extremely dangerous! The world's network security is under the threat of the other party anytime and anywhere."

"The organization's operational capability is unknown. Its network destruction capability is the highest among the five stars. Other affiliated organizations, financial status and personnel are all unknown. The above is all information."

After reading the whole document, Jiang Yanhai couldn't help taking a deep breath. There were two words in his mind, niucha!

This is a real ox fork.

Jiang Yanhai knows what a powerful hacker ability it takes to eliminate all the electronic data a person has lived. It is difficult for him to do it now.

At least, this is not something that one person can do. It must have a hacker team, and everyone in the hacker team must be the top one!

As for helping this person escape, to be honest, as long as an adult has the ability to act, with the help of a group of hackers who can help you erase all electronic traces at any time, you can escape without the help of others.

unconvinced? Think about it carefully. All the electronic monitoring around you are under the control of the other party, while the tracking person, your communication, monitoring and so on are under the monitoring of the other party. If you chase people, it is almost impossible.

There is only man to man, but modern monitoring is used to relying on electronic equipment, so it is impossible to man to man. When you are not man to man, you are in a trance, and the enemy leaves your sight, you will never find it again.

Because your actions can be seen by the other party through monitoring, and you can't see the people you want to see through monitoring. People can take the subway and bus openly, even as for the plane, customs system, ticket collection system and ticket purchase system. You can't see what you want, but the enemy can see it.

For example, you want to call the security personnel of the airport, but maybe you think the airport personnel received the call, but in fact they just transferred it to others, and the airport personnel didn't receive it?

The photos you sent to the following tracing personnel have become another person's photos when they arrive at the other party's mobile device?

The other party can leave by plane, but you may not be able to catch it, because the other party can control the customs, ticket checking and other systems.

Leave one city and go to the next. The larger the scope of this target activity, the less likely you are to track it.

Until finally, the other party disappeared without a trace.

As for deleting those data, it's ok if you save them on an independent hard disk, but it's not too simple to completely remove them with the strength of the other party as long as you are connected to the Internet.

As for the data existing on an independent hard disk, you must be careful when viewing these data. As long as your computer is infected with a virus, the virus may be released by the other party and try to delete the file directly.

This is not difficult to achieve! Just like the protagonists of these two events, their data must still be kept by departments such as the FBI, paper data, and even some separately stored server data. However, before the other party acts, you can't keep all the electronic data of this person's body, which must be missing.

As long as the public can't find it and all your information can't be spread through the Internet... How slow is the efficiency? It's unrealistic to trace each other again.

The so-called experts look at the door. The more they understand computers, the more Jiang Yanhai understands that this organization is powerful! In particular, the modern network occupies all aspects of everyone.




Please report us if you find any errors so we can fix it asap!


COMMENTS