Although Yuan Youchong proposed to set up a cordon here to prevent anyone from approaching, after notifying Cheng Wei, he learned that Cheng Wei had nothing to find in the warehouse, and he was idle at this time, so he could come over immediately, so he didn't bother to run back and forth, so he simply pulled Yu Chen aside to smoke and stare at this place at the same time.
After about ten minutes, Cheng Wei arrived here with three trace inspectors, and after Yu Chen and Yuan Youchong told him all the findings and requirements, he patted his chest and took the task, saying that it was on him.
Yu Yuan and the others stopped caring and returned to the No. 3 warehouse to join Fan Yuhong.
"Did you find it" Fan Yuhong said: "The suspect should have removed the traces of the operation and programming of these automatic disassembly, loading and unloading equipment, and nothing has been found from these equipment."
The computer in the warehouse, which is the control center, is still intensifying research and investigation, and nothing has been found. ” Yuan Youchong frowned: "That is to say, as of now, the technical team has not learned anything" "It can't be said that nothing has been found."
He shook his head and said: "The system in the warehouse has not been found for the time being, but the system or equipment of the customs has made us find some problems." ” "Oh" He explained: "The internal management and control network of the customs is actually an internal network, well, it is isolated from the external network, physically isolated. ” "This can ensure that even if the technology is strong and powerful hackers, it is impossible to invade, which is also the reason why most of the more important government agencies and electronic archives preservation management systems use intranets, even to prevent intrusion."
"Is it impossible to invade" Yu Chen frowned: "However, it has been found that at least seven monitors can be determined to be "I know," Fan Yuhong waved his hand and said, "The detective also asked our technology to help them speed up a period of monitoring to the limit, of course we know this." ” "Well," Yu Chen nodded: "Si Junnong did say this."
But, since it can't be hacked, how can the surveillance still be monitored?"
"Team Yu, you listen to me first," Fan Yuhong interrupted him again, saying: "Indeed, the intranet cannot be broken by using the Internet and related technical means from the outside, after all, it is physically isolated, and the data is isolated, and it cannot be touched at all." ” "But that doesn't mean you can't conquer it from within."
"Oh" "To put it simply, you need an internal response, you need to write a Trojan horse, and you also need a long-range wireless signal repeater called a repeater, which is not very accurate, this device must have the functions of sending and receiving signals, as well as signal transcoding and compilation."
In fact, it is not difficult to understand this idea, the reason why the internal network is secure is because the signals between the internal and external networks are not interoperable and isolated from each other.
Since it is physically isolated, it is natural that the internal network can also be connected to the external network with physical devices. ” "The Trojan is plugged into the computer that relies on the internal network to work, and then the repeater is connected to the device.
In this way, the suspect is equivalent to opening a backdoor in the internal network system of the customs, which can attack and manipulate the internal network from the outside world. ” "As for the specific degree of control, it depends on many aspects, including the technical strength of the suspect, the information throughput of the equipment connecting the internal and external networks, and the complexity of the Trojan they wrote."
"And now, we have found the intrusion into the system, and continue to copy, with the help of the Trojan horse spread on the intranet, the program decipherment work is also underway.
Among the features that have been discovered so far is the tampering of internal data. ” "But this alone can actually do a lot of things, such as doing things on surveillance video files, and even changing the customs clearance list, and so on."
"Hmm" Yuan Youchong had a flash of inspiration: "Change the customs clearance list" "Yes," Fan said, "the efficiency of this customs today is largely due to a high degree of automation, which naturally relies on the operating system and the data within the system." ” "Before the change, tampering with the customs clearance list may not be of any use, because although the loading and unloading of goods, testing and other work, although there are also mechanical equipment to assist, but also inseparable from manual work, tampering with the list is easy to be discovered."
"But now, if you want to find the problem, I'm afraid it's not so easy."
Yuan Youchong interrupted him and asked: "So, will there be such a possibility that the goods that should not have been released in the first place have been tampered with due to the tampering of the list and become the released goods, and after the system issued the instructions, they were automatically loaded and sent away by the automatic disassembly and unloading equipment in the warehouse."
"This" Fan Yuhong thought for a while, shook his head and said: "It's still impossible in theory, the customs clearance list or something is just a list, and the release involves a series of quite complicated procedures, which cannot be bypassed with current hacking technology." ” "When the customs clearance items are loaded, the system will actually re-check the various authorization procedures, and after confirming that they are correct, they will issue instructions to load the items.
However, if the item itself does not pass a series of procedures, such as tax payment, authorization and release, etc., even if it is on the list, it will be returned. ” "In fact, there is no point in tampering with the types of items on the list, and when I mentioned high automation, what I actually wanted to talk about was the number of items tampered with."
"For example, it was originally twenty-five boxes of materials, but after tampering, it became twenty-four boxes, so the remaining box that is not included in the record will naturally be given to you by someone who cares.
Of course, the deviation in quantity is also a problem of how to hide it from the importer or the purchaser. ” "However, since it is illegal theft by hackers, they naturally don't care so much, and in the end, the importer finds out the problem, and it is the customs that they are looking for instead of them, and they make a profit from it, which is completely reasonable."
"Of course, it's just that hackers have the ability to tamper with the customs list, but whether it has been tampered with, I can't say for sure, these are not the directions we are good at after all, I'm afraid we have to hand it over to the prosecutor or a colleague in the investigation to investigate."
"It's just that I personally think that if the list is changed, it must be the quantity, not the type, and only by changing the quantity can hackers take advantage of it to grab illegal benefits."
"Quantity," Yu Chen muttered, and suddenly his eyes lit up: "Let's ignore whether hackers are greedy for other things, the focus is still on the theft of black powder itself." ” "And since they can tamper with the quantity, presumably in addition to deletion, they can also add it, for example, the original fifty boxes of goods have been changed to seventy boxes."
Punishment and murder :