Chapter 347: : Tomoki Amami


The island of Hokkaido, in the basement of a separate villa.
Tianhai Zhishu is focusing on the computer screen, and his fingers are constantly tapping on the keyboard. Looking at the code like a flowing window, he still looks blank.
He is a member of the clown organization.
When the Chinese character programming language first came out, someone started a communication group of Chinese character programming languages ​​on the hacking forum, named the clown.
It happened that his father was Chinese. He mastered Chinese and wanted to learn this new computer language, so he joined it.
They have written a variety of codes and tools in Chinese programming languages ​​many times, and the knowledge they have acquired has matured.
The virus that knew the Huaxia Jiangnan virus incident was originally written by the Chinese character programming language. They are all curious, what is the code of the virus, will be so crazy spread, so plan to steal the virus code.
They are ecstatic to discover the powerful spread of viruses and the ability to penetrate firewalls. In order to show their technology to the world, they planned a crazy action to kidnap a city.
This incident caused guilt inside the clown.
The founder and some of the clowns left, and the rest of the others formed a new clown organization.
Planning to kidnap a city successfully, a sense of accomplishment, they also lost money, they rarely disappeared.
However, a sudden burst of time ago, the 'Clown Organization' reappeared and invaded the CIA. As one of them, they are collectively forced.
They have the ability to kidnap a city because ordinary people's firewalls are easy to invade. There is also a strong spread of the 'Clown Virus', which has been successful after many people have planned for a long time.
But the successful abduction of a city's network does not mean they have the ability to break the CIA's computer system firewall.
Someone has done it now.
In the name of ‘clown’, even the style of speaking and arrogance is the same as them.
When they heard the news, they were all shocked and thought it was what other members did. The results were related to each other and it was discovered that the hands-on was not theirs and their Twitter account was hacked.
Not only is the account hacked, but it is also a black pot for others. This is simply a slap in the face of all of them.
If you admit that their account has been stolen, it is to play your own face.
They dared to kidnap a city in order to show their technology to the world. Pride is like them, it is impossible to admit that this kind of face-breaking thing happened to them, otherwise they are a joke.
So the clown organization owner, began to jointly deal with this 'counterfeit goods' and retrieve the Twitter account. After retrieving at least the account number, even if they don't clarify, they can get back a little face, and the name of the invading CIA will fall on them.
So with his current action to crack accounts.
In a few days, the account password still has no meaning to be cracked. It seems that there is an invisible wall in front of him, no progress, and other members have encountered the same problem.
But the cracking action is still going on, just want to use other methods to crack? Tianhai knows the tree.
Drops...
Suddenly, the computer's prompt interrupted his thoughts.
Seeing the words 'cracking success', Tianhai Zhishu dilated and the color of his face slowly emerged.
After cracking for a week, I tried all the means he could use, and did not crack the account password. It’s finally cracked, and it’s more exciting than the computer system he invaded into an organization.
Hesitated for a moment, Tianhai Zhishu hangs on the machine and starts trying to log in to the account.
......
At the same time, the CIA Command Center.
At this time, the command center assembled all the members of the CIA (Network Intelligence Center), which is a division of the DDi (Digital Innovation Division), one of the five major institutions of the CIA.
In addition to the members of CCi, they also concentrated on members of Cog (Computer Network Action Group) and other computer experts in the Office of Science and Technology.
In the hall at this time, in a tense atmosphere. Everyone tightens their nerves and looks for clues about the clown virus.
After Linna returned from the office of the president, she summoned all the masters of the situation.
The goal is to monitor the activities of the clown organization 24 hours a day, hoping to find any clues about the clown organization.
This is almost the biggest move in the history of the CIA, in order to wash the shame that the clown organization brought them.
Their time is only one month.
However, the clown organization suddenly announced that the game is over, it is an account, and will not log in again, it is a problem.
The search for the online world is more troublesome than finding a needle in a haystack. They can start to listen to the global skills, and they may not be able to find clues.
"The clown's account is online again."
Suddenly, a rushing voice made everyone feel shocked.
After waiting for a day, finally there was movement.
"Let's get out." Morrison walked over to the computer screen and glanced at the position of the technician: "Give me a tracking code, I want to locate the account login."
The last time the clown organization kidnapped the city, he and the other party handed over, but ended in failure. The other party made a lot of preparations in advance to let him track down the failure. This time, he was called back again, or a clown organization. He wanted to be ashamed.
"The iP that is logged in is definitely a downtime or a fake iP. We have tried many times to track this trick and have failed. The hidden means of the other party is very good," said the famous employee.
If it can be traced, the clown organization has long been uprooted by them, rather than letting them lose face in front of people all over the world.
"Try to try if you fail," Morrison said.
"Sir, the tracking code has been sent to you."
"Okay, I have received it."
Morrison's fingers are madly tapping on the keyboard, and they are racing against time. It seems that they will be off the assembly line in the next second. In less than half a minute, Morrison pressed the Enter key, and a dotted line appeared on the LCD screen.
"iP tracking..."
The dotted lines continue to jump and connect to addresses that are spread across the globe. The dense dotted lines, on the world map, even the transaction formed an invisible net.
Everyone in the office looks at the LCD screen.
They tried it many times, and the addresses that were eventually tracked were fake or ended in failure. For this attempt, everyone did not have much hope, but still want to see the results.
Drops...
"iP lock is successful."
When I saw the red dot on the map locked in Vancouver, Canada, everyone on the field looked away and tracked successfully? This result is beyond their expectation.
Everyone has a little bit of hope on their faces. They all hope that the address that is locked this time can be true.
"The iP address is locked, check its location." Morrison said.

The address is the island of Hokkaido, Tenri, which is an independent villa.

A satellite map that locks over a villa.
The director of the CIA next to him also looked cautiously: "I will immediately investigate the archives of the owner of the villa."
"I found out that Tianhai Zhishu, a native of the island, graduated from Kyoto University with a major in computer science. After graduation, he worked as an engineer in a software company. He resigned a year ago and is a freelancer..."
"It is him, let the hawk in the island of Hokkaido act immediately, go to this address immediately, carry out the arrest, do not worry about exposing identity, use the fastest speed."
"Listen to my command and hack into his computer system." Morrison was not disturbed by other people, and his eyes were locked on the computer screen.
At this time, the atmosphere in the command center was already very tense.
"it is good."
All members of the cyber action team began the invasion.
Dennis blackened his face and played a twelve-point spirit. This is his shameful opportunity. The clown organization succeeded in invading him. He hit his face slyly. If he didn't find the other person, it would become a hurdle in his heart.
At that time, he could even get into the computer system of the US Air Force. Now the other party is just a hacker. For him, the problem should be small.
"Finding system vulnerabilities, I found each other a back door." Dennis saw the computer's display.
"Black is going in."
Warning: Unauthorized access was detected.
Pants lock Daller (by)!
Seeing the warning on the computer display, Tianhai Zhishu’s face changed greatly, and he couldn’t help but burst into a foul mouth and began to resist the invasion.
He knows that this account belongs to many people's attention accounts, but he overestimates his personal ability and underestimates the other's ability to track.
This is the official account of the ‘clown organization’! Thinking, Tianhai Zhishu cold sweat DC. Being tracked by the other party to the iP, he knows that his location and identity are definitely exposed.
If you fall into the hands of the CIA, the consequences can be imagined, and he thinks he has a chill.
At this time, Tianhai Zhishu could not wait to fan himself, but he just regretted that it was useless. After calming down, he began to repair computer loopholes. He also held the last trace of luck.
Time passed by in a minute, and the cold sweat of Tian Haizhi’s forehead was getting denser.
Oh...
During his thoughts, the alarm of the villa was invaded, and the villa's camera was seen. Only a few black people had entered the villa.
So fast? Tianhai Zhishu’s face was pale, and it was less than half an hour. The other party had already found it.
"idiot."
Tianhai Zhishu did not hesitate to pick up the hard disk of the desktop and escape from the back door of the basement.
The CIA intelligence network was destroyed. It is conceivable that even if he hides in the ends of the earth, the CIA will still find him. In today's situation, only official asylum can be sought, which is stronger than falling in the hands of the CIA.
Latest chapter of Ebook Science and Technology Library Click here