Chapter 711: Chapter 615: Pointing to the Internet (Please subscribe!)_1
Soon enough.
The results of Cui Han’s interrogation were sent back to Beijing.
Expectedly, another major case had been cracked. The expressions of the experts were mixed. They were pleased to have witnessed a textbook-like process of crime psychology, human behaviour studies, and micro expression analysis. But there was also...
Frustration.
Damn it. They couldn’t use these methods
It’s like facing a problem you can’t solve, no matter how hard you try. But when the answer is right in front of you, you realize it’s a combination of everything you know. However, you just can’t apply it. The feeling is utterly frustrating.
Reasoning backwards.
Anyone can do it, but when it comes to on-the-spot cases, one falters.
In the office.
Ye Kun and other leaders breathed a sigh of relief. They finally solved the data leakage case. The following arrests had nothing to do with them. That was the task of the team leaders on the other side.
"What do you think of the previous situation?" The office director suddenly asked.
"..."
The others were clueless. They looked up at the director. What did they think? How could they not recognize that the one on the other side was formidable? They had been left in awe many times recently. They were completely unfazed anymore.
The director found the dark looks under the lamps quite amusing and had to make his query explicit. "Do you think this could be accomplished by humans?"
One person immediately realized and exclaimed, "Yeah, how could it be so quick and accurate? They perfectly grasped every expression of Cui Han. Is there some kind of facial recognition software?"
"Right, I also think it’s possible. Although there were many people and Cui Han was acting suspiciously, it was not too obvious. To affirm that he was the culprit, is beyond human capabilities. There aren’t that many psychology experts," another person chimed in.
"Shall we ask?" suggested Ye Kun.
"Ok, let’s inquire about purchasing this software. But I suspect they won’t admit it," the office director had already prepared for the worst.
Soon after.
An office worker sent a text praising the software as great, useful, and expressing gratitude. The message ended with a proposal to buy the software. They thought their bluff would not be taken seriously.
The response, however, made their mouths twitch.
"Not for sale."
A simple phrase, punctuated with a period.
The response...
Quite...willful.
However, it brought a glint to their eyes. It was indeed a software. If they had this software, wouldn’t they be able to break cases quickly? No criminal could escape the interrogation.
This would not only strengthen them considerably but virtually propel them to new heights.
"Ask under what conditions they’d sell it," the director hurriedly instructed.
The office worker sent off another message.
In just a few seconds,
a reply came back.
"There was a typo earlier. In fact, we don’t have this kind of software. Fine. As for the extra resource you requested, we agree to double it. There is also a small gift attached. Goodbye."
Along with the message came a folder.
"..."
The group exchanged glances. A typo? Who would believe that? Obviously, they weren’t willing to sell and decided to outright deny it. Do they take us for fools?
"Director, what should we do now?" Ye Kun asked, as these dealings were above his pay grade.
With a sigh, the office director sounded disappointed. "Let’s report this. Also, I’ll suggest that the Information Warfare Research Center start a project to develop facial recognition software. If they don’t want to sell, can’t we develop our own? I don’t believe it."
"What’s in the attached folder?" Ye Kun asked again.
"It’s software that can restore erased intrusion traces."
...
In the Command Room.
Tang Qing also couldn’t help but laugh at their expressions.
Of course, he purposely had his troops send that message just now. Not to play them, he wasn’t that bored, but for another reason. To be honest, Little Two could create this kind of software, but Tang Qing didn’t want it to be circulated.
It’s too powerful.
Like his soldiers being able to extract bank card passwords during an interrogation without the person saying a word. If this kind of thing was leaked and used maliciously, it would be a big problem for society.
He felt the safest option was to keep it in his own hands.
His goal was also straightforward.
He was waiting for their next request.
Such a good thing, honestly, was it really up to these few people to decide whether to let it go or not? They would definitely find a way to shamelessly buy it. At that time, he could justifiably sell them another software.
Face recognition.
This is different from micro expression recognition, the former is simply recognizing people, while the latter directly recognizes intentions.
Thanks to the previous ’Find Relatives Network’ case, the country is heavily constructing a public video surveillance network, and the services Tang Qing opens up are all major case analysis. So, there is a blind spot.
Now, except for airplanes, other means of transportation have not yet implemented real name verification, thus evading the law’s reach all over the country. There are many criminals; it would be considered a good deed to give this technology out.
He took a moment to rest.
Tang Qing developed an appetite.
He asked one of the soldiers to fetch some fruit from the training area.
Enthroned with one leg over another.
He ate loudly, enjoying every crispy bite.
This time, Cui Han’s intrusion exploited a vulnerability in Microsoft’s system. After understanding just how many vulnerabilities there are in Microsoft’s operating system, even Tang Qing was surprised. It was astonishing - it could even be described as a system with full of loopholes.
The soldiers had discovered hundreds of these loopholes, all major ones. There are even more minor ones.
Tang Qing had merely endured this.
After all, the existence of most of these vulnerabilities was not intentional on Microsoft’s part. There are too many fundamental codes within the WINDOWS system, it is extremely normal for flaws to exist.
The existence of so many loopholes isn’t too shocking. After all, the soldiers have the assistance of Little Two, and among the loopholes they’ve found, a good portion wouldn’t be discovered by anyone uses throughout the software’s lifecycle.
The key point is that nearly twenty of these vulnerabilities were intentionally left by Microsoft. The command center had intercepted surveillance data from the internet. American intelligence departments such as the FBI and CIA exploited these vulnerabilities in order to monitor public information extensively.
As long as it was something they wanted to know, they could invade any computer connected to the internet with the Microsoft operating system installed. Without triggering any alarms or records, they could attain the highest permissions and secretly browse the contents of the computer.
They could even activate the camera function without turning on the camera light.
The port data mirror display showed that they were extremely rampant.
Tang Qing knew this before, but he didn’t bother to do anything about it. After all, state secrets are on the intranet. Even if the CIA is quite capable, it’s impossible to invade the local area network that is physically disconnected. But Cui Han’s actions were a wake-up call.
The fortress could also be breached from within.
Before, he largely intercepted domestic users’ personal information and computer data. At that time, the people in the country didn’t care too much, and therefore Tang Qing also didn’t bother. After all, even if the CIA obtained this information, they would just delete it as junk information.
But now, discovering their other capabilities,
Tang Qing couldn’t just sit and watch any longer.
It appears that he needs to make Microsoft and those American intelligence departments a little busier. As for completely resolving the domestic information security threats in the short term, it’s impossible. He can’t be expected to help Microsoft patch up their vulnerabilities.
He’s not that benevolent.
Besides, having mastered so many vulnerabilities, it doesn’t seem that challenging to topple Microsoft. If he includes the computing power of his analysts, even if the worst comes to the worst, he could still secure a portion of the empire.
That thought.
Seems a bit crazy.
Tang Qing knew that Microsoft didn’t actually want to leave these vulnerabilities. But faced with the demands of these intelligence departments, for the sake of America’s information security and maintaining a leading global information advantage, Microsoft had to compromise.
This is an opportunity.
Although the status of the Microsoft empire seems incredibly stable now,
In the presence of Tang Qing, who possesses these ’robots’, stability is relative. He inherently has the power to topple this industry.
If Tang Qing wants to get a piece of this industry, he is definitely able to.
"Tang Yi, officially launch the Internet Industrial Alliance Plan, activate all seed companies within the plan," Tang Qing immediately ordered.
"Yes, Commander," Tang Yi responded and began his operations.
This plan had already been established long ago.
It was during the first cooperation with the country to obtain the ’Blue Gene’ supercomputer permissions. At that time, the command center had proposed a government website information security trusteeship service to Beijing.
At that time, he planned to start with the antivirus software industry.
The plan was to establish several information security companies and then gradually control most of the global information security market through various means and mergers and acquisitions. The plan was established based on this idea.
The plan of course involved more than just information security, but also all aspects of the internet, including hardware.
The companies had just been established and it wasn’t time to make waves yet, every industry requires accumulations, so they only created seed companies to a certain extent around the world, allocating in total no more than a hundred million U.S. dollar initial funds.
His plan was to wait until next month after the third Pixiu Plan was completed to launch an impact on both software and hardware together.
But due to today’s incident with Cui Han, Tang Qing decided to take action ahead of schedule. After all, the cost of software is almost zero, at most the promotional costs are a bit high, but it is still within an acceptable range.
As for investment in hardware, it will have to wait until the Pixiu Plan is completed next month.
It’s not that he doesn’t have the money right now.
But many plans are linked, each phase related to the next, and time is needed to execute.
Even if you have ten billion U.S. dollars, you’d still need people willing to sell their goods to you. But why should people sell theirs when everything is going well? How to sell? At what price? How to deal with competitors? How to deal with problems without leaving any trouble behind?
All these require time to operation.
Only then can the maximum benefit be obtained with the least cost.