Chapter 1 The past is like smoke
Chapter 1 Past
Upload physical version chapters from time to time, and when the physical version catches up with the old version, it starts to update as usual...
==============================================================
Humans, a subtle sense of animals!
Because of this, no matter how ordinary a small person is, he will have his own wonderfulness, so this world participated by all kinds of people seems particularly colorful!
Looking at the new type of crime filing in recent years, the most mysterious cyber hackers have always been at the top of the list!
In the early 1960s, university computer facilities with giant computers, such as the MIT Artificial Intelligence Laboratory, became a stage for hackers to show their skills.
Initially, "hacker" was just a compliment, referring to computer elites who tried their best to tap the greatest potential of computer programs, but later it gradually became divided into two types, one was real hacker, who discussed the skills and attitudes of software hackers, as well as the tradition of sharing culture.
Tracing its history back to the first time-sharing minicomputers and the earliest ARPA network experiments decades ago, members of this group invented the term “hacker.”
So hackers built the Internet. Hackers did today's UNIX operating system. Hackers ran Usenet and hackers did the Internet work. If you were part of this group, if you contributed to it and other hackers and they called you hackers, then you were a hacker.
And the other, they are not. These people (mainly men in adolescence, and the first half of the protagonist in this book also belongs to them) break into computer systems, steal phone systems, and even steal various secrets. The real hackers call these people "Crackers" and hope they have no relationship with them.
Real hackers usually think that CRACKER is lazy, irresponsible, and not wise enough. Unfortunately, many people are fooled by journalists and film directors, using the word "hacker" to describe "Cracker", which makes ordinary people regard those "Crackers" as "hackers", causing the term "hackers" to slowly move closer to derogatory meaning! But the most important point of distinction: hackers are established, and Cracker is destroyed.
1983
The FBI arrested six teenage hackers for the first time, known as the "414 hacker" because of the area code of Milwaukee where they live. The six teenage hackers were charged with hacking into more than 60 computers, including the Slohn-Kateling Cancer Memorial Center and the Los Alamos National Laboratory. In the end, a hacker was exempted from being acquitted for his testimony, and five others were sentenced to probation.
1987
17-year-old high school student Hulbert Zin (called "Shadow Eagle" by law enforcement authorities) admitted to hijacking ATT computer networks in Betminster, New Jersey. Federal law enforcement accused him of breaking into ATT (manipulating a computer in a bedroom in a suburban Chicago) of ATT. Zin was the first person to be found guilty after the Computer Fraud and Abuse Act came into effect in 1986. He was arrested for boasting in an electronic bulletin board that he had attacked ATT's computer system.
1988
Cornell graduate student Robert Morris (22 years old) uploaded a "worm" program to the Internet. The program was designed to attack the flaws of UNIX systems. It was able to enter other computers in the network and reproduce itself. After surfing the Internet, it quickly spread and infected more than 6,000 systems - almost 1/10 of the Internet at that time. It occupied a large amount of system resources and actually paralyzed the network. Morris was soon arrested by law enforcement officers. Experts said the "worm" program he designed caused $15 million to $100 million in economic losses, but he denied that he had such a motive. He faced up to five years in prison and a fine of $250,000, but was eventually sentenced to only three years of probation, 400 hours of community service and a fine of $10,000.
In the same year, after a hacker was discovered to have invaded a connected computer of the Milnet, the US Department of Defense cut off the physical connection between the non-confidential military network and the Apa Network, that is, the early Internet.
1989
Cliver Stoll, a system administrator at the University of California, Berkeley, discovered five West German computer spies invaded the US government and university computer networks and conducted in-depth investigations. As a result, the five West Germans were eventually arrested and prosecuted for espionage, three of whom were charged with selling the intelligence they obtained to the Soviet KGB, and were found guilty. But in fact, they did not spend a day in a career. Stoll later published the book "Cuckoo Egg" in detail telling the story of his tracing of hackers.
That same year, Kevin Mitnik was found guilty of stealing software from DEC and stealing long-learning codes from MCI. He was imprisoned for a year in jail and was banned from using or contacting other hackers after being released from prison.
1990
Four members of the "Doom Legion" (a hacker group in the southern United States) were arrested for stealing technical secrets from Southern Bell's 911 emergency telephone network. Three of the four hackers were found guilty.
In the same year, the Federal Agents launched a "Sunshine Crime Operation" in 14 cities to crack down on hackers.
1991
U.S. police arrested Jenstin Turner Peterson in Dallas for possession of a stolen car, and subsequently searched computer files showed that he had hacked the TRW computer network. He later helped the FBI and the Federal Secretariat investigate computer crimes. He reportedly assisted investigators in the Mitnik case. He disappeared suddenly in October 1993, and soon the authorities declared him a fugitive. In 1994, he was re-arrested for his involvement in the Kevin Poulson case (see 1993).
In the same year, the General Audit Office of the Congress announced that during the Gulf War, several Dutch teenagers had invaded the Ministry of Defense's computers and modified or copied some non-confidential sensitive war-related information, including military personnel, military equipment and important weapons and equipment development status transported to the Gulf.
1992
The "Master of Deception" (a teenage hacker in New York City) was found guilty of hacking computer systems of AT&T, Bank of America, TRW and the National Security Agency. Police used eavesdropping devices in the case.
1993
Kevin Polson used computers to destroy three radio stations in Los Angeles to fight. It is reported that Polson cheated two Porsches, $20,000 in cash and two trips to Hawaii. He was charged with conspiring with two other hackers, Ronald Austin and Jenstin Turner Peterson to control the radio's telephone lines so that their phones could be made in, thus "winning" the grand prize.
1994
The computer network of Griffith Air Force Base and NASA were attacked by two hackers. Scotland Yard investigated and arrested a 16-year-old British hacker code-named "Data Flow". Another hacker, Kuji, is still at large.
In the same year, the Independent reported that a temporary BT employee discovered the phone numbers of the Queen of England, Prime Minister Major and several other senior MI5 officials with an easy-to-get password. All of these numbers were made public on the Internet. Later, the author of the report admitted that BT had worked and stole the above phone numbers.
The hackers launched a full-scale attack on security expert Shimozuki's computer at the Santiago Supercomputer Center. Shimozuki later participated in the tracking operation of Mitnik.
1995
The number one hacker in the United States, Mitnik, was arrested. He was accused of breaking into many computer networks and stealing 20,000 credit card numbers and copy software. Mitnik was imprisoned until March 1999, awaiting trial. He admitted to committing seven serious crimes. He was subsequently imprisoned for 10 months and was released in January 2000. Without police approval, he was not allowed to use computers until 2003.
Russian hacker Levin (30) was arrested in the UK. He was charged with illegally transferring at least $3.7 million from Citibank in New York to accounts controlled by him and his accomplices around the world. Levin was later extradited to the United States and sentenced to three years in prison and return $240,000 to Citibank.
1996
Codenamed Johnny, the hacker, sent email bombs to about 40 politicians, business leaders and other individuals, made up as many as 20,000 spam messages in one weekend. The hacker is still at large.
In the same year, he had been mysterious and alone, graffiti on the homepages of major websites and disclosed commercial secrets. The super hacker code-named "Angel" went through three years of investigation by federal authorities and finally fell into the legal tender. But for some reason, the federal court did not openly hear the case, which became a major mystery at that time!
1997
The InterNIC domain name registration network managed by the Network Solutions Company was attacked by competitors. The AlterNIC administrator later admitted that he designed a destructive program to "hijack" InterNIC website visitors to his own website.
1998
The US Department of Defense announced that the hackers launched the "largest and most systematic attack on the Pentagon website" and entered many government-non-confidential sensitive computer networks to query and modify wage statements and personnel data. Soon, the police arrested two California teenage hackers. Three weeks later, the US police announced that the Israeli teenage hacker "analyst" was arrested.
The navigation system in Woochester Airport in Massachusetts was interrupted for 6 hours due to a teenager hack.
Hackers claiming to be part of the hacker group "Download Master" broke into the Pentagon website and stole confidential software, thus gaining control of a US military spy satellite. The hackers threatened to sell the software to terrorists. The Pentagon then denied that the software was confidential and allowed the hackers to gain control of the satellite, but admitted that a network with a low level of confidentiality was successfully hacked by the hacker.
May-June 1999
The U.S. Senate, White House, U.S. Army networks, and dozens of government websites were captured by hackers. In every hacker attack, hackers left messages on the webpage, but the messages were quickly wiped out. The most striking message left by hackers on the U.S. News Agency website: "Crystal, I love you." The name is: Zyklon.
November 1999
The Norwegian hacker group "Decompilation Engineering Master" cracked the decoding keys protected by DVD copyright. The organization compiled a DVD decoding program and published it on the Internet, which triggered a series of lawsuits.
February 2000
In three days, hackers paralyzed several top American Internet sites - Yahoo, Amazon, Electronic Harbor, and CNN -. Hackers used a "denial of service" attack method, that is, blocking the servers of websites with a large amount of useless information, so that they could not provide normal services.
In New York, USA, the dark night sky, dark clouds float by, covering the bright moon in the sky from time to time!
The skyscrapers of different shapes are towering into the clouds, decorated with colorful lights, and shining with the neon lights on the street, forming a night view that is different from the daytime, which is pleasing to the eye!
February 11, 1996, an ordinary day, but for someone, today is a turning point in life.
At 3 a.m. midnight, Manhattan, a world-famous rich area, for some reason, a group of federal government officials dressed in black, wearing hoods, and with FBI behind them were neatly blocking the intersections of the two sections of the Fifth Street using obstacles; while another fully armed operational personnel followed the command of the commander on the scene and quietly approached an ordinary red bungalow next to the road. The atmosphere at the scene was depressing, and everyone felt inexplicably nervous.
"Are you arresting the mafia leader?" The armed personnel walking in the front, seeing the current situation, couldn't help but secretly speculate in their hearts!
At this time, the villa was silent. A little boy who looked like a porcelain doll was having a sweet dream. The saliva on his mouth unknowingly fell on the white bed sheets. His mother, like him, had already fallen deeply in her sleep. They were completely unaware of what was about to happen outside. A crisis was about to come to them, which would also change the boy's life.
In the early morning of February, the wind was still chilly, and the small trees on the roadside were swaying slightly. The neighbors' houses near the small villa were dark and there was no light. They only occasionally heard a few barking dogs, breaking the quiet long night.
After the operation personnel deployed everything, the man who looked like a commander saw that there was not much time left, so he picked up the walkie-talkie and issued an order to force an attack!
I saw a man at the door skillfully using several special steel wires to stuff them into the keyhole, then gently thrust his fingers a few times, and the strong-looking door opened.
Then, the agent in the front made a gesture, and a group of operation personnel behind lowered their waists, turned on the gun searchlight, and rushed into various rooms in the house with clear goals.
"Don't move! FBI!" The masked agent in black carried a spear and quickly arrived in the two bedrooms where he had already clearly located, and pointed the cold muzzle of the M4 at Pan Junyu, who was lying on the bed; and in the next room, Xiao Junyu's mother, Weng Li, was being treated the same.
"What are you doing? Why are you arresting me? I am a Chinese citizen, I ask for protection!" The messy footsteps and mother's shouting came from the next door. Xiao Junyu rubbed his eyes in a daze, looking at the FBI agent holding the gun. He was not as scared as other children of the same age. Just as he was confused, his mother in pajamas had been brought to him by the FBI agents.
"Mom!" Pan Junyu shouted softly, and he rushed into his mother's arms with agility, "Don't be afraid, Junyu is fine!" Several agents looked at each other. Could it be that the Chinese child in front of him be the target of this operation? Unfortunately, he is an operation staff member and has no right to intervene according to the FBI's confidentiality regulations. Otherwise, out of curiosity, he really figured out what he was doing?
"Junyu is good, if you have a mother here, don't be afraid!" Weng Li hugged her beloved son nervously and worriedly, and looked at the group of government machines coldly. She didn't care. Why didn't she wait for her to speak, but her son comforted herself in advance.
At this time, the FBI agents did not give them a chance to continue the conversation. They immediately separated them, then put tape on their mouths, put on black hoods, and walked out of the house with Weng Li and Pan Junyu. Under close guard, they got on two black official vehicles with government license plates, pulled them onto the car door, leaving the ground staff to clean up the mess, and the armed personnel took Pan Junyu and his son to roar.
※※
About three and a half hours later, although the sun had already revealed its hot round face, two agents were illuminating Pan Junyu's mother with strong lights and interrogating her with fatigue tactics.
"Ms. Weng, we know that you are an authoritative ophthalmologist who enjoys special allowances from the US government, but you are currently on the land of the United States and are more obliged to cooperate with our investigation. Please do not treat us with such uncooperative attitude, otherwise you will be prosecuted for the crime of obstructing justice. You may face up to three years in prison!" One of the black agents saw that the interrogation was nearly two hours but still found nothing, so he slapped the table without hesitation and said viciously at Weng Li.
"Hmph! I don't cooperate with your work? Are you wrong with the FBI? I think my thirteen-year-old son will use illegal means to steal the commercial secrets of large companies on the Internet and publish them to the public, causing the commercial secrets of several large companies such as General Motors, Microsoft, Boeing to leak, and stocks were copied by speculators, causing losses to most retail investors. But what you made up is ridiculous! If he is really as powerful as you said, can you catch him? You know, he is just a thirteen-year-old child!" Weng Li sneered, with an expression of disbelief.
"Ms. Weng, first of all, I have to admit from my personal standpoint that your son's computer technology is very powerful, and I can tell you frankly that although the US government does not have enough evidence to sue your son, the FBI technicians have just recovered all the Internet records from your computer. As long as the time when several major companies were invaded is checked, there will be an answer in less than half an hour. Even if you want to say it, it will be too late." The white agent in the interrogation room finished speaking, and in just a while, the same staff member who had just knocked on the door and entered the house bit his ears and nodded with satisfaction while listening. When the staff member who entered the house left a document, the white agent quickly changed the countermeasures and threw a thick stack of documents in front of Weng Li with confidence, saying with a cunning smile.
Under the dazzling light, Weng Li looked up at the two federal agents, doubted, took the folder with trembling hands, slowly opened it, and read it carefully.
I saw a lot of online records printed on the paper, many of which were drawn out with red lines: on September 3, 1995, at 14:43:20, access to the Pentagon Central System; on 15:22:21, access to the internal documents of the Ministry of Defense, and on 19:09:38, on the 14th, entering the White House website. On 22:59:27, on the 14th, entering the US Space Agency Global Surveillance Satellite... After turning a few pages, the number of intrusions recorded later became more and more frequent, and there were thousands of red lines in the thick files. As a mother of the child, she did not expect that her son, who was only thirteen years old, would do these things that even ordinary people could do.
"How is it? You should believe what we are saying now!" The black agent looked at Weng Li's surprised expression with satisfaction and asked with a smile.
When Weng Li faced the facts, she could only nod her head helplessly. She suddenly thought of something, quickly stood up, and said nervously: "Sir, my child is still young, he is ignorant, so he can do these things. I am his guardian. If you want to arrest me, just arrest me!"
"Ms. Weng, I am also the father of the child. I also tell you as a parent that if your child is not just a hacker this time and does not publish the commercial secrets on the Internet, he will be deported to the country at most and will not be sentenced to any criminal offenses; but the crime he committed this time has a huge impact. Several companies have close ties with the US government. What will happen in the end? It will still be tried in federal court!" The white agent looked at Weng Li, who is a mother, kindly poured a cup of coffee and handed it to her.
"No, I'm just such a son. His father is still waiting for him to go back to spend the summer vacation in China. Please let me see my son. He is still young and will definitely be scared by himself!" Weng Li really couldn't bear to let her son suffer. The mother and son were in love. Suddenly, her emotions were out of control and she cried out.
※※
The first to fourth volumes are a bit rubbish. Since they have been published, I have not revised them. But I have gradually worked hard later, so please patiently and decide whether to not read it. Is it OK?
Chapter completed!