Chapter 581 The Temple of the Gods
After thinking about it, Jiang Yanhai took out his mobile phone and called Arthur directly. He still had a phone call, but he didn't expect that the two would be in touch just a few hours apart.
The call was quickly connected, but after the connection, Arthur was also a little speechless.
Shouldn't people like us forget each other in the rivers and lakes, and then many years later, when we meet, are we still like brothers?
The results of it? It's only been a few hours since you had a phone call.
There was an eerie silence on the phone.
After ensuring that his communication line is absolutely safe, Jiang Yanhai felt a little strange. The call was connected. He took off his mobile phone and looked at it. It was indeed in a call state.
Putting the phone to his ear again, the opposite was still eerily silent, Jiang Yanhai paused, but he didn't speak anyway.
Just like this, the two big men waited for dozens of seconds before Arthur spoke: "Why don't you speak?"
"Why don't you speak?" Jiang Yanhai was speechless.
"You called me. I thought you had something to call me."
"I'm looking for you on something."
"Why don't you talk to me for something."
"Then why did you pick up the phone and didn't speak?"
Arthur: "..." If you have something to say, just say it.
"What's wrong with you, okay, let me ask you one thing, do you know the temples of the gods?" Jiang Yanhai was a bit dumbfounded, what was wrong with this guy.
"The temples?" Arthur's tone was stunned for a moment.
"Not bad." Jiang Yanhai said simply.
"I've heard of it, but there's only one name." Arthur was silent for a while, and then said, "Wait, Jiang, I also have a question for you."
"You said." Jiang Yanhai asked very simply.
"Aren't you a rookie who just came out on a mission? Why are you investigating these powerful and mysterious organizations?"
"I'm ruling it out. Maybe one of these mysterious organizations has something to do with my investigation." Jiang Yanhai said simply.
"I just heard about it. It seems that this organization is very powerful. Other than that, it's not very clear. You haven't searched on that website and tried it?" Arthur asked.
"No, forget it, if that website is not necessary, I will not easily search for information."
"Understood, after all, you are different from us, then if it's okay, I'll hang up."
"goodbye."
Jiang Yanhai dropped two words and hung up the phone.
Now it seems that we can only wait for domestic information. I don't know how much relevant information is known in China.
He waited silently, and after about 20 minutes, he received a message with only two words in his mobile phone.
Jiang Yanhai immediately logged in to the website for downloading the information and started downloading the information directly. After dozens of seconds, Jiang Yanhai opened the information directly.
"The Temple of the Gods, the time of its establishment is unknown. It first appeared in the early 21st century. The organization has extraordinary computer technology, and they have super strength in many fields of computing."
"The temple of the gods, as the name suggests, the temple where the gods are located, means that they are the gods on the Internet. The target members of the organization are unknown. The organization first took action in 2003. A hacker once exposed American crimes on the Internet. The hacker was wanted by the FBI, and just as the hacker was about to be apprehended by the FBI, he issued an asylum application to the Pantheon."
"Then the pantheon approved his asylum application, and then he disappeared directly from everyone's sight, everything about him, all the photos circulating on the Internet, surveillance video, social security files, information files, bank files, online purchases Records, consumption records, call records, hospital birth records, etc., all electronic files, including those stored in the FBI's online database, disappeared."
"No one knows where this hacker went because they couldn't find any information on him at all, and all investigations ended in vain without any useful information."
"This is the first time the pantheon has recorded a shot, and their shot has greatly shocked the US network communication security department and the Ministry of National Security."
"The second time the Temple of the Gods recorded a shot was in 2013. After Thomas Gable triggered the US financial crisis in 2008 and caused at least tens of billions of dollars in direct losses and trillions of dollars in indirect losses, the US government launched the Prism plan. "
"The Prism Project is a secret surveillance program initiated by the US NSA (National Security Agency) and the FBI, directly entering the central server of the US Internet Corporation to mine data and collect intelligence, including Microsoft, Google, Yahoo, Apple and other 9 Internet giants to join it ."
"The plan was exposed in 2013 by the project leader Hacker, Edward Steno, and finally exposed by several media such as the Washington Post in the United States."
"After Stenno sought political asylum in Russia, Stenno did not know how to contact the pantheon, and then the pantheon took action. Under the surveillance of the Russian intelligence department, Stenno disappeared without a trace, including all the electronic information in his life. The records are all gone, and Steno is gone."
"The organization has only recorded two shots, but both of them show the strong strength of the other party in the Internet age. The organization is marked as red and extremely dangerous! The world's network security is under the threat of the other party anytime, anywhere."
"The organization's operational capabilities are unknown, the network destruction capability is the highest five-star, and other affiliated organizations, financial status, personnel, etc. are all unknown. The above is all information."
After reading the entire document, Jiang Yanhai couldn't help but take a deep breath, and there were only two words in his mind, Niu Cha!
This is real beef.
Jiang Yanhai knows how powerful hacking skills are required to eliminate all the electronic data that a person has ever lived, and it is difficult for him to do it now.
At least, this is not something that can be done by one person. It requires a hacker team, and everyone in this hacker team must be the top one!
As for saying that they assisted this person to escape, to be honest, as long as an adult has the ability to move, with the help of a group of hackers who can erase all electronic traces for you at any time, even without the assistance of others, you can escape by yourself. .
Do not believe? Think about it carefully, all the electronic surveillance around you, etc., are all under the control of the other party, and the person you are tracking, your communications, monitoring, etc. are all under the monitoring of the other party. If you are chasing people, it is almost impossible possible.
There is only man-marking, but modern surveillance, accustomed to relying on electronic equipment, makes man-marking impossible. When you are not man-marking, you will be in a trance and the enemy will leave your sight, and you will never be able to find it again.
Because the other party of your actions can be seen through monitoring, but you cannot see the person you want to see through monitoring, people can take the subway, bus, and even plane, customs system, ticket inspection system, and ticket purchasing system in an open and honest way. You can't see what you want, and the enemy can.
For example, you want to call the security personnel at the airport, but maybe you think that the airport personnel received the call, but in fact it was just transferred to someone else's house, but the airport personnel did not receive it?
What if the photo you sent to the following investigators has become a photo of another person when it arrives on the other party's mobile device?
The other party can take the plane and leave in a grand manner, but you may not be able to catch it, because the other party can control the customs, ticket inspection and other systems.
Leaving one city and heading to the next, the greater the scope of this target's activity, the less likely you are to track it.
Until the end, the other party disappeared without a trace.
As for deleting those data, it's fine if you save it on a separate hard drive, but as long as you are connected to the Internet, with the strength of the other party, it's not too simple to completely remove it.
As for the data that exists in the independent hard disk, you must be careful when viewing these data. As long as your computer is infected with a virus, the virus may be released by the other party and try to delete the file directly.
It's not hard to achieve! Just like the protagonists of these two incidents, their data must still be preserved by departments like the FBI, paper data, and even some separately stored server data. All electronic data of the body level are kept and backed up, and there must be some missing.
As long as the public can't find it and all your stuff can't be spread over the internet...how slow is that efficient? It is no longer realistic to track down the other party.
The so-called expert's way of looking at the door, the more he understands computers, the more Jiang Yanhai understands, the power of this organization! Especially the modern network occupies all aspects of everyone.