Get some messages from those clues, Xu Yi later invaded a few personal computers, and finally the Aurora investigation clearly.
Aurora, or translated as "Aurora" is the United States a high supersonic reconnaissance aircraft, which appeared in 1985 in a U.S. Air Force review of the budget plan submitted to Congress, the book is by the U-2 reconnaissance aircraft program to improve the sub. The secret reconnaissance aircraft sent out, they tend to have a huge sonic impact, not only produces harsh roar, and with a strong shock wave. The seismic waves are scholars as "days of shock," because it strongly to the Nevada Seismological Bureau of the observation instrument were received signal. In addition, when the "Aurora" across the sky, often sausage-shaped leaves similar to the knot-type condensation smoke, there is a great difference with the conventional aircraft.
Aircraft engine using a new technology - pulse engine, and new anti-radar stealth technology. Integration of the latest aviation technology, "Aurora" amazing performance of reconnaissance operations, the maximum speed can reach six times the speed of sound, reaching an altitude of 38,800 meters altitude staggering. "Aurora" has a unique triangular shape, the current world of any air defense weapon system, not the "Aurora," the opponent.
Of the 20th century to the late 80 early 90's, many UFO sighting reports a great number. Whether the United States East Coast or West Coast residents are gradually some find that they claim to have seen alien UFO, but in fact the mysterious power of the aircraft is Aurora. Xu Yi collected in these reports, the information has been recorded, it appears that the U.S. government are happy to have their privacy, this push to the alien, disturbing everyone's attention.
This "Aurora" event to come to an end really, Xu Yi archive these data will also be embedded in the Trojan horse that remove the router and no longer care about these.
Xu Yi is not upheld by the hacker spirit of nationalism, he did not intend to include such information to the government, not to mention the plan since it has been carried out so long, the Government can not have not heard, and perhaps some of these early investigations very clear. The reason why he was so interested in this, the main thing is to enjoy the process of investigating the sense of feeling for him to experience the fun, perhaps, this is what the hacker spirit? Xu Yi do not know. He only knows you like to use their knowledge to find answers.
During this time the network has been staring at the United States Government, Natural also received some other information, but how the information he is not interested, perhaps for the country, it is top secret information, but he did not intend to go out of these public . Otherwise, it only to their own trouble, not only the U.S. side will find their own trouble, I believe some people will find their own domestic troubles.
But so much information, from which he found two of interest, which are natural and hackers are all related. And also one on his own.
Since downloading the photos, he nearly was traced to, and now finally know that it is not just one person, but a group of people, the United States FBI Network Security Services Group (ANSG). Since that incident he had been the branch of criminal investigation, it is ironic that they use code-named "Aurora" call their own.
Aurora it? Seems pretty good. But I like its Chinese translation - Aurora. Xu Yi identified himself another name, but XYZ is used to cover. Ah, XYZ's external performance can not be too hard, or else will certainly be very troublesome.
Another even more interesting information, and Xu Yi showed great interest.
Intelligence, Xu Yi saw a "Showers" (TitanRain) hackers, astonished that he is analyzed according to federal investigators, the hackers turned out to be China!
"... ... Showers trail was first discovered early this year, their defense weapons contractor Lockheed - Martin Corporation (LockheedMartin) and Sandia National Laboratories to launch an attack ... ... and they stole all see the file, Even the hard disk hidden sector of data is left off, after all the information package delivered to South Korea, Hong Kong and Taiwan, transfer station, and then sent back to mainland China. The attack time is only 10 to 30 minutes ... ... approach is very professional and very few 'traces' left behind ... ... has a cool and unusual ... they care ... and other general hackers completely different, their purpose clear, attack quickly, but carefully hidden ... way ... "
Nevertheless, the United States or found some clues ANSG.
Consecutive months, beginning every morning, there will be someone with a cutting-edge technology and covert means to sneak into China's chat rooms, BBS and Web site, will all suspicious activity and related information to hackers FBI, FBI a hand on analyze and evaluate this information, master of Chinese hackers hackers dynamic and real level.
In the "Showers" an invasion, ANSG in time, they on the Internet from one computer to another, a computer, and finally, they tracked Showers initial work to port, which is located in south China's Guangdong Province, the three routers, this is the first Internet hackers to enter a connection point. This is very easy, because in the anti-triad operation, the source hackers can find the probability is very low.
Then, ANSG three attacks in Guangdong terminal installed anti-spy programs they write, when hacking action, anti-spy program gave notice that they send a message. Showers are not a lot of action, a total of three operations for months, they received from anti-spyware program has received a lot about thermal propulsion system, fuel tank console, air and solar data. ANSG estimated that at least 6-10 workstations under the command of the three terminal operations. But unfortunately very secretive careful Showers action, and now they have not yet traced to any one of them accurately, but there is no evidence, "Showers" is the Chinese hackers. But in the report, they analyzed Showers likely in China accounted for Jiucheng hackers, and, very likely that these actions by the Chinese government's support ... ...
This information to the Xu Yi is a very big shock, if the analysis in the report really like it, "Showers" is a Chinese hacker organization, it ... ... really great!
Although the hackers have a very clear political bias, but Xu Yi heart was very happy, after all, the Internet has just started in China, it simply is too hard to believe.
In China, Xu Yi is often a kind of master of loneliness. His heart very much like to see the rapid growth of Chinese hackers, to blossom, and he has been more or less for this purpose efforts. Now, he was surprised to see such a report, which he is so unexpected, and definitely unexpected!
Then, "Showers" is China's hackers do it? In the end is the official or the private sector? How many people? ... ...
Xu Yi thought China may have a group of highly skilled hackers cattle, his mind could not help but to excited.
Showers, showers, I must touch it. Guangdong Province router it? Well, to start it from there. Really looking forward to ah!
No comments:
Post a Comment