Super-brain hacker

Chapter 362 Monitoring

On the way back, he felt that Lin Hong's mood did not seem to be very high in summer. He had been leaning on his seat, thinking about things with his eyes closed, and his constantly beating eyes showed that his heart was not calm.

Lin Hong was indeed a little uneasy in his heart. This visit to Mrs. Rama was originally just a momentary, but when he saw the real person, he found that the one lying in ** was not the real Mrs. Rama.

Although the old man, who is also a vegetable, is very similar to Mrs. Rama, Lin Hong is sure that the other party is definitely not Mrs. Rama.

So, where did the real Mrs. Rama go?

I heard from the nurse that Mrs. Rama has been her nurse since she was transferred to this hospital. It can be seen that at least when Mrs. Rama was transferred to the hospital, she was already a stand-in lying here. That is to say, if Mrs. Rama has woken up, it has been at least three years.

Lin Hong investigated the situation of Mrs. Rama's accident that year. All the signs were superficial. Mrs. Rama heard that there was something wrong with the experiment at that time, and the car accident she encountered on the way back was man-made.

Lin Hong speculated that the mastermind behind the car accident was likely to be Claire. Even Mrs. Rama's son's accident is likely to have been planned by him.

After Lin Hong returned to the Black Lion Base, in order to confirm his speculation, he began to investigate the hospital where Mrs. Rama had stayed before. Due to the early networking of the American medical system, it is more convenient for him to investigate now.

However, he didn't find much useful information. The medical records in the hospital were complete, and there were almost no abnormalities.

Three years ago, for some reason, Mrs. Lama's son suddenly proposed to be transferred to another hospital.

Lin Hong saw it. The only fright is the change in the attitude of Mrs. Rama's son before and after the transfer.

Starting from that transfer. Mrs. Rama's son almost never visited her again, and before that, he would come here almost every week.

Does this mean that Mrs. Rama has actually woken up at that time?

Lin Hong is not sure.

However, he is not sure whether the news is good or bad for him for the time being. Lin Hong added the collection of information about Mrs. Rama in the super worm.

"Stone, this World Religious Peace Conference is very lively." In the basement, Lao Long came in. The EO company has received a lot of orders. In addition, we Black Lion have also received a lot of commissions, those religious tycoons. Very insecure. It's too precious for your own life.

With that, he handed Lin Hong a list, which was the list. It is the list of delegates to the World Conference on Religious Peace.

This list includes not only common sect leaders such as Buddhism, Christianity, Catholicism, Hinduism, Mahayana, Judaism, Muslimism, Sikhism, Shintoism, Soroaistism, etc., but also some new sect representatives have appeared.

This is mainly because this topic, which is related to "inclusion" and "peace", has accepted applications from some emerging sects.

Lin Hong nodded: "The exclusivity of religion is very strong, although many sects promote the concept of kindness to others. But in fact, the most extreme is these believers. Once there is a conflict of ideas, it is best to use violence to solve it, and one is more ruthless than the other.

Lin Hong has already obtained this list through the super worm, and he has been investigating the people on this list separately.

These characters are the focus of national governments, so they are generally introduced in detail in the database of government intelligence agencies.

Lao Long continued, "I received a message that it is said that the person from the Holy See is the Pope himself."

"Oh?"

Lin Hong looked at him unexpectedly, but the news surprised him a little.

For such religious meetings, the Holy See generally sends members of the cardinals to participate, which is often referred to as the cardinal.

And this time, the Pope of the Holy See will attend the meeting in person, which is an unusual signal.

Lin Hong asked, "Is the news accurate?"

"It should not be wrong, because the news was revealed by a cardinal." Lao Long said proudly.

"Cardinal?" Lin Hong was a little surprised, "Such a person will also become your source of intelligence?"

"It's not him, but the people around him."

Lin Hong did not ask again. He had a hunch that the appearance of the Holy See should have a connection with Angela.

"We need to focus on monitoring the Pope." Lin Hong made a decision.

Anglas is too mysterious, and the information he can have is really limited. However, if the other party is for the Pope, as long as he keeps an eye on the Pope, he can find out the movement of Anglas.

After thinking about it, Lin Hong continued to say, "Lao Long, you call ten intelligence analysts, and I will set up a monitoring room in another place to monitor the phones of key monitoring objects 24 hours a day."

"Monitoring phone calls?" Lao Long was slightly stunned, "How to monitor?"

There is no shortage of intelligence analysts, Black Lion Company. Although it has just been established, this department has been established. The sources of these people are very reliable, and many of them are former peripheral members of Mole.

Lin Hong smiled and said, "Anyway, it can be achieved technically. I'll explain the technical details to you, and you don't understand."

"That's right."

After Lao Long finished speaking, he nodded: "Okay, I'll let them come over immediately and gather at the base."

Lao Long finished speaking and left.

Lin Hong sat in front of the computer, thought for a while, and then started a terminal interface and connected to a specific server. After entering several instructions, a successful connection screen was displayed in the terminal.

After several characters were brushed, several graphics drawn with characters appeared in the terminal interface... The system was developed by the FBI in the early days to entrust the American Telegraph Company to make it easier to monitor the designated target by telephone. This system is parasitic in the entire telephone network. It can be said to be a companion network, and it has powerful functions and absolute control. It can monitor, intercept, actively dial, etc. for a certain line in the telephone network at will.

In those years, Mitt Kevin Nick showed Lin Hong the powerful functions of the system. It was false to say that Lin Hong was not careful at that time, but at that time, Kevin did not tell him how to invade the system, and Lin Hong did not have such needs. At the same time, he was not sure that he could escape from the other party after the He has never touched the mind of this system.

After recovering his memory, he remembered this system. After all, with this system, when Mole performs tasks, collecting intelligence becomes very convenient.

At that time, Lin Hong spent a few days collecting all the information of the system, and soon gained a very in-depth understanding of the system, and finally became one of the users of the system. In several missions, due to the timely intelligence, the intensity of the task was greatly reduced, so that the other members of the Mole even thought that the task was too unchallenging.

Although the SAS system is an old system, it still works well. As far as Lin Hong knows, both the FBI, CAI and the National Security Agency are extremely dependent on this system, especially those old agents. It can be said that most of the work is based on this system.

Although there is a more advanced and powerful AUROLA system, these old agents refuse to use it because the operation of the new system has been changed too much. Many of them are old and are over the age to be willing to learn a new complex system. Anyway, the old system can also complete its own work. Why do you still need to use the new system?

The new system should be used by those new colleagues. I will continue to use the old system. Anyway, I will retire in a few years - this is the idea of many old agents.

The operation of the SAS system is very simple. As long as you have an access password, you only need to use a phone to monitor the specified number. The new AUROLA system requires auxiliary equipment, at least one computer is indispensable, and it also needs to go through strict permission authentication to finally obtain such permissions. The operation steps are very cumbersome.

It is the simplicity of the SAS system that makes it very easy to be used by hackers, because there is a lack of sufficient authentication in the middle, and there is also a lack of an effective tracking mechanism. As long as someone breaks through the SAS system, they basically have the monitoring permissions. The new system has solved this bug, but what it sacrifices is the simplicity of operation... The system Lin Hong has also successfully invaded, but because the system has fully considered various intrusion possibilities at the time of design, its security is very high, with very strict permission control, a certain level of account There are strict regulations on what functions can be used, and any operation may leave traces.

In general, a loophole in the new system is exploited and will soon be detected by the other party and replenished in time. The second time, it is very likely that it will not be possible to invade through the same method. It is almost impossible to use this system for a long time, and it takes a lot of time and energy to fight against the administrators of the AUROLA system.

Therefore, in order to be simple and avoid trouble, Lin Hong prefers to use the SAS system rather than the AUROLA system.

Lin Hong decided to focus on monitoring several people participating in the World Conference on Religious Peace, so that intelligence analysts can monitor all external calls of the target people at any time.

However, before that, he had to write a shell software to graphically encapsulate the SAS system. On the one hand, it is to further simplify the operation. For example, he only needs to enter the other party's number, and then press the OK key to monitor the target number and record the call content at the same time.

On the other hand, it is also to keep the SAS system confidential and prevent intelligence personnel from direct access to the system. ( To be continued) RQ