Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 375 The Gate of the Abyss

Chapter 375: The Gate of the Abyss

In April 1998, Taiwanese police came to a military camp in Taiwan to arrest a young student soldier named Chen Yinghao, charged with spreading the famous "cih" computer virus, causing 60 million computers to be paralyzed worldwide! This virus called "cih" is the first virus that can attack computer bios programs. Judging from the computer level at that time, this attack could hardly be repaired. But to the disappointment of the police, it is said that Chen Yinghao had already retired from illness and seemed to have escaped from Taiwan. There was no clue about the interrogation of their family. Chen Yinghao's family has a history of mental illness for three generations and speaks incoherently. It was just that it seemed that a foreign game company hired Chen Yinghao with a high salary, as if it was called "door"?

At the end of September 1998, in the famous special prison in Scotland Yard, a young man who looked very thin and had a strong foreign accent was called out to the reception room alone in the famous British Scotland Yard Special Prison, from a group of serious murderers, a young man with a strong foreign accent was called out to enter the reception room alone. He looked at the stranger with big glasses like a thick beer cover and messy hair like a chicken coop. Is this his "cousin" who came from Russia thousands of miles away to see him?

It was not until the other party pushed him a letter, and when he opened it, he looked at the dull greeting next to a small eye sign, and asked in a trembling voice: "It was she who sent you, can she forgive me?" Yang Xing had seen Horn, a former CIA computer technician who could hack into the US National Security Agency, smiled mysteriously, "Comrade Vladimir Lenin, although your actions caused the organization to be in trouble, considering that you are one of them, she wants to give you a chance. Are you interested in working for the "Gate of the Abyss"?"

At about the same time, in the federal prison in California, USA, a woman with an ordinary face sat in front of Kevin Mitnik, who is known as the number one hacker in the United States. "Mr. Mitnik, I heard that you are about to be released from prison on parole, but the judge sentenced you to stay away from all electronic products within three years and even use the radio. Just because you used a modem to dial up the Internet in prison, it would be tantamount to moving from a small prison to a large prison. Now I have a chance, a "Gate of the Abyss" company far away in Finland is developing a new game where you can check the errors and omissions of regulatory procedures as a program examiner without touching the computer."

Mitnik was still a little hesitant, but the woman's next words finally moved him, "This time the reward is six figures, and it is thousands of miles away. The environment is beautiful and the people are rarely visited. It is impossible for the US government to keep staring at you."

Later, David Smith, an ordinary programmer at AT&T, who usually looks shy and shy, was intercepted and taken away by several mysterious people on the way home. Sitting in a black Lincoln sedan, a bald black man wearing sunglasses told him seriously: "Mr. Smith, we learned that you are making a powerful computer virus, and you also know that you steal the passwords of American online users as a tool to spread the virus. What you do has threatened the national security of the United States. You must commit crimes and hand over the virus."

Smith's face turned pale when he heard it. He was indeed creating a computer virus called "Melissa". He was about to try its power, but he was discovered before he could do it. Frustrated, he had to obediently obediently follow the arrangements of black "government officials", hand over the virus, and secretly improve the virus for the "government" and find a way to detoxify. These "officials" were quite satisfied with Smith's cooperation and told him that an emergency test for the Internet virus around the world will be conducted soon, and he will be prepared for the "government". After she left, the black bald man took out a satellite phone and said, "The prey has entered the cage, and the door of the abyss is opened."

At the same time, a 15-year-old high school student named Jonathan James was working hard to type on the keyboard and enter lines of data codes at home in Miami, USA, trying to crack the firewall of the military computer network of the US defense threat defense agency (Dtra). The network of this agency controls the integrated internal military network across the United States. If opened, many of the US military's military secrets would be revealed to the world. At this moment, with the rapid sound of breaking the door, a group of people wearing the FBI logo rushed into their home and arrested James's family.

Under conclusive evidence and strong pressure, James honestly explained the entire process of his crime. After discussion, these harsh "FBI" told their whole family that given that James is not yet legally old and the punishment for cybercrime in the US law is still relatively vague, James can give his merits and help the government to check and report similar network vulnerabilities, which can be carried out in secret, and today his behavior will not be leaked to the outside world. Before leaving, "FBI" left James with an online game chat account, and in the future they will contact him through this game called "Gate of the Abyss"!

Similar situations have been staged in many parts of the world since last year. A group of outstanding and well-known online hackers have been slowly gathered under an online game company called "Gate of the Abyss" for various ways and reasons. They were given generous rewards and the most advanced computers and other hardware in the same era. The only requirement is to devalue and improve an online game code called "Gate of the Abyss". Although no one can get a glimpse of the full picture of this huge game, just based on the game code they can view, it can be seen that this is the largest and most complex game program ever composed of hundreds of sub-system codes! Many of them are game enthusiasts and are full of expectations for the release of this program. Even though Mitnik, the world's number one hacker, occasionally merges some of the code and feels that it is far more than the capacity of a game, he still does not have much doubt.

On Christmas 1998, this free trial version of "Gate of the Abyss" that was highly anticipated by players was widely circulated online. The exquisite pictures, grand world architecture, and rare 3D scenes made it immediately become a hot topic on the Internet and quickly spread throughout the world. Of course, what is unknown is that under the cover of the huge data flow of "Gate of the Abyss", financial and political information from all over the world gathered into the interior of a huge computer information center like the speed of light.

In Israel, a small Jewish country in the westernmost part of Asia, there is a small town with a dull appearance near the edge of the Negev Desert. No one would have thought that Yang Xing's "Shaw Hunting Project" base camp was located here. The most cutting-edge fiber optic network is buried underground, and the scorching sun overhead for more than ten hours provides sufficient energy for the huge solar panels on the roof of the building. The most important thing is that the wires and fiber optic networks here are all connected to the network of the Atomic Energy Research Institute, which is not far from the desert. With the Israeli caution and their special relationship with the Americans, it is enough to ensure that it is difficult to discover here.

What is issued here is the order to start the operation of "Gate of the Abyss". As Yang Xing's idea of ​​establishing his own network surveillance agency, when he received the order from Cheng Canghai to deal with the smuggling group, Yang Xing thought of using this unique network to achieve his goal. When he fought with the smuggling group, the most difficult part was not to wipe out the smuggling group, but to recover the smuggling funds scattered overseas. Originally, most of these funds were scattered in tax avoidance places around the world, and it was almost impossible to recover them all.

However, Yang Xing boldly took advantage of the opportunity of setting up a century-old gambling game on the gambling ship to gather these smuggling groups to sign a group money laundering agreement, and also used the surveillance equipment on the ship to accurately record their funds operation mode and whereabouts. After these times, the hackers around the world were deliberately or unintentionally cracked, the programs hidden under the game codes had clearly depicted the distribution map of the overseas funds of the entire smuggling group.

Last time, the central government took an attitude of not investigating the past, asking smuggling groups to cooperate to transfer overseas accounts to Hong Kong and China. But Yang Xing didn't believe that these old foxes would do the truth. They symbolically handed over some funds, and the big head would definitely stay overseas. It is also a guarantee when there is any disturbance. Cheng Canghai and Yang Xing both understood this, but they could not tolerate these people taking advantage of political advantages to take advantage of policy loopholes, resulting in a large loss of national tariffs. If the country lets them go, they cannot still want to keep a move! So when Yang Xing and Cheng Canghai discussed the "shark hunting" plan, his attitude was that I don't care what you did, just recover the property of those countries.

So after Yang Xing got the hidden picture of the funds of the smuggling group, he formulated a bold idea to use the "Gate of the Abyss" to break through the overseas bank accounts of the smuggling group and rob the global banks. His idea was inspired by the Matrix. Before he was reborn, he read a book about the deeds of more than a dozen of the most famous hackers in history. He was very impressed by famous hackers such as Mitnik, Smith, and James. Although they were all fighting each other, Yang Xing's secret operation, these extremely dangerous cyber hackers are now gathered together to launch an unprecedented offensive against the global financial system!

The English hacker of the term hacker originally refers to computer experts who were enthusiastic about computer technology and had excellent skills in the early days of the Internet, especially programmers who were committed to software free and open. Many early hackers believed that the network had no boundaries and that anyone could gallop on it. It was not allowed to set up any kind of obstacles. They took it as their mission to break through these obstacles. Many hackers at that time became famous later, such as Li Nas, the founder of the open operating system Linux, and Wozniak, the founder of Apple Computer, were all hackers.

As Clinton became president, he proposed to build an information highway as a national policy. The Internet era officially arrived, and a large number of young, active-minded but poor moral awareness gradually became the mainstream of hackers. The term hacker gradually expanded to people who specialize in using computer networks to engage in sabotage or mischief. The name was also changed to cracker (hacker). The hackers' interests expanded and began to challenge authoritative institutions and governments.

Since the 1990s, websites of governments at all levels in the United States have been captured, and large bank phone companies and other major banks have been deeply affected by hackers. Even the most closely guarded American networks have been repeatedly captured. In the early stage of the Internet era, everything fell into chaos. Although Yang Xing's plan to use hackers to invade bank networks sounds whimsical, as long as he plans to plan carefully, success may be great.
Chapter completed!
Prev Index    Favorite Next