After thinking about it, Jiang Yanhai took out his cell phone and called Arthur directly. He still had a phone call, but he didn't expect that the two people would be in contact after they were separated for a few hours.

The call was quickly connected, but after it was connected, Arthur was also speechless.

People like us shouldn’t have forgotten each other, and after many years, when we meet, are we still like brothers?

The results of it? You just called after a few hours of separation.

There was a strange silence on the phone.

After ensuring that his communication line was absolutely safe, Jiang Yanhai was a little strange. The call was connected. He took his cell phone away and looked at it. It was indeed on a call.

Putting the phone to his ear again, there was still weird silence on the other side, Jiang Yanhai paused, he did not speak anyway.

Just like this, the two big men waited for dozens of seconds before Arthur spoke: "Why don't you speak?"

"Why don't you speak?" Jiang Yanhai was a little speechless.

"It was you who called me, I thought you were looking for me for something."

"I am looking for you for something."

"Why don't you talk to me if you have something to do."

"Then why did you answer the phone and not speak?"

Arthur: "..." Just say something.

"What's wrong with you, okay, let me ask you one thing, do you know the temples?" Jiang Yanhai was a little dumbfounded, what is wrong with this guy.

"The temples?" Arthur's tone was taken aback.

"Not bad." Jiang Yanhai said straightforwardly.

"I've heard of it, but there is only one name." Arthur was silent for a while, and then said, "Wait, Jiang, I have a question for you too."

"You said." Jiang Yanhai asked bluntly.

"Aren't you a rookie who just came out on a mission? Why are you investigating these powerful mysterious organizations?"

"I'm excluding, maybe one of these mysterious organizations has something to do with the investigation I'm investigating." Jiang Yanhai said simply.

"I've also heard about it. It seems that this organization is very powerful. Other than that, I'm not quite sure. Didn't you try it on that website?" Arthur asked.

"No, forget it. If that website is not necessary, I won't search for information easily."

"Understood, after all, you are different from us, then if it's okay, I'll hang up."

"goodbye."

Jiang Yanhai dropped two words and hung up the phone.

Now it seems that we can only wait for domestic intelligence. I don't know how much relevant intelligence is known in the country.

He waited silently. About twenty minutes later, he received a message on his mobile phone with only two words.

Jiang Yanhai immediately logged in to the website where the information was downloaded and started downloading the information directly. After dozens of seconds, Jiang Yanhai opened the information directly.

"The temple of the gods, the time of its establishment is unknown. It first appeared in the early 21st century. The organization has extraordinary computer technology, and they have super strength in many fields of computer."

"As the name suggests, the temple of the gods is where the gods are located. It means that they are the gods on the Internet. The target members of the organization are unknown. The organization's first attack was in 2003. A hacker exposed the crimes of the United States on the Internet. The hacker was wanted by fbi. Just when the hacker was about to be arrested by fbi, he applied for asylum to the temples."

"Then the temples passed his asylum application, and then he disappeared from everyone's sight. Everything about him, all the photos circulating on the Internet, surveillance videos, social security files, information files, bank files, online purchases Records, consumption records, call records, hospital birth records, etc., all electronic files, including those stored in the fbi networked database, have all disappeared."

"No one knows where the hacker went, because they couldn't find any information about him. All investigations ended without any disease and there was no useful information."

"This is the first time that the Temples have recorded a shot. Their shots have greatly shocked the U.S. Department of Network Communications Security and the Department of National Security."

"The second record of the Temple of Gods shot was in 2013. After Thomas Gable triggered a national financial crisis in 2008, and caused at least tens of billions of dollars in direct losses and trillions of dollars in indirect losses, the U.S. government launched the Lightning Plan. "

"The Light Edge Project is a secret monitoring project initiated by the US National Security Agency (NSA) and fbi. It directly enters the central server of the US Internet Corporation to mine data and collect intelligence. 9 Internet giants including Microsoft, Google, Yahoo, and Apple have joined it. ."

"The plan was revealed in 2013 by the hacker of the project, Edward Steinnow, and was finally exposed by several media including the Washington Post in the United States."

"After Steinno sought political asylum in Russia, then Steinno didn’t know how to contact the temples, and then the temples took action. Under the supervision of the Russian intelligence agency, Steinno disappeared without a trace, including all the electronics of his life. All the records have disappeared, and Steinno has evaporated."

"The organization has only recorded two shots, but all of them show the strong strength of the other party in the Internet era. The organization is marked as red and extremely dangerous! The world's network security is under threat from the other side anytime and anywhere."

"The organization's operational capability is unknown, and its cyber-destructive capability is the highest in five stars. Other affiliated organizations, financial status, personnel, etc. are all unknown. The above is all information."

After reading the entire document, Jiang Yanhai couldn't help taking a deep breath. There were only two words in his mind, Niucha!

This is a real cow.

Jiang Yanhai knows how powerful a hacker ability is to eliminate all the electronic data that a person has lived in. It is very difficult for him to do it now.

At least, this is not something that one person can do. This requires a hacker team, and everyone in the hacker team must be the top one!

As for them to help this person escape, to be honest, as long as an adult has the ability to move, with the help of a bunch of hackers who can help you erase all electronic traces at any time, you can escape by yourself without even using other people's assistance. Of it.

Do not believe? Think about it carefully, all the electronic monitoring around you, etc., are all under the control of the other party, and the tracking person, your communication, monitoring and so on are all under the other party's monitoring. If you chase someone, it is almost impossible. possible.

There is only human-marking, but modern surveillance is accustomed to relying on electronic equipment, and it is impossible to human-mark people. When you are not human-marking, you will be in a trance, and the enemy will leave your sight, and you will never find it again.

Because your action can be seen by the other party through the monitoring, and you cannot see the person you want to see through the monitoring, people can take the subway, bus, and even the plane, customs system, ticketing system, and ticketing system with all the systems. You can't see what you want, but the enemy can see it.

For example, you want to call the security guard at the airport, but maybe you think the airport staff received it in your phone call, but in fact it was just transferred to someone's house, but the airport staff did not receive it?

Has the photo you sent to the investigator below turned into another person's photo when it reached the other party's mobile device?

The other party can leave by plane, but you may not be able to catch it, because the other party can control and pass through customs, ticket checking and other systems.

Leave one city ~www.wuxiaspot.com~ and go to the next city. The larger the scope of this target activity, the less likely you are to track it.

Until the end, the other party disappeared without a trace.

As for deleting those data, it's okay if you save it on an independent hard disk, but as long as you are connected to the Internet, with the strength of the other party, it should not be too simple to completely remove it.

As for the data that exists on a separate hard disk, you must be careful when viewing these data. As long as your computer is infected with a virus, the virus may be released by the other party and try to delete the file directly.

This is not difficult to achieve! Just like the protagonist of these two incidents, their data must be kept in departments like fbi, paper data, and even part of the server data stored separately must be there, but you can’t transfer this person before the other party acts. All electronic data of the body level is kept and backed up, and there must be some missing.

As long as the public can't find it, and all your information can't be disseminated through the Internet... How slow is the efficiency? It is no longer realistic to track down the other party.

The so-called expert watching the doorway, the more you understand computers, the more Jiang Yanhai understands that this organization is powerful! Especially the modern Internet occupies every aspect of everyone. l0ns3v3

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like