Monster Factory

Chapter 705 Chapter 704: Unfogging (II)

The more information you comb up, the more amazing the whole thing becomes.

According to police scrutiny, Cloud Poetry's relationship network is simple enough to be a model for a good baby.

Then who did she offend?

Can you let those guys, at all costs, forge multiple license plates, threaten Cloud Poetry, and take her away?

“It's not easy, this man and woman in the car, even less so.” Zhang Zhi stared at a photograph sent by the Wu Cheng police and said, “Choosing the Lanyi model and picking up multiple license plates to mess up the real license plates and seamlessly avoiding surveillance and pursuit is not a technique that ordinary criminals can master. ”

The photo is of the woman with the mask and hat after noise reduction. In the car sat a man, same mask and hat.

“Then change your mind and don't bite the Laney yet.” Ye Qing nodded and agreed, "At present, cloud poetry is likely to be affected by the pond fish. ”

“What do you mean?” Zhang questioned.

“Cloud poetry in the company, with me recently. In the first six months of her career, I used to ask her to come to the office to sort out documents and bring tea and water. I also asked her to come and take her on business trips to the United States, including when hosting important clients. ”

“How is it possible for ordinary people to attract such professional criminals? ”

“Probably a competitor of our company, mistakenly thinking that Yun Poetry is the secretary or assistant next to me, and then plotting this case carefully? ”

“Yes, and no.” Zhang Zhi shook his head, "If he really came at you, it was impossible for four days to pass, and they didn't ask you yet. ”

“Besides, Cloud Poetry knows these people, or has contacted them before. ”

“Contact?” Ye Qing suddenly thought of something, excited: “Weren't Cloud Poetry's phones still at home? There are no abnormalities in the phone records. What about WeChat, Mailbox, QQ? ”

“Yeah.” Zhang Zhihao's cheerful desk, “Wu Cheng police what the hell, mobile phone such an important clue, why not investigate? Always chewing on surveillance? ”

As soon as the table was taken, Zhang Zhi called the Wu Cheng Public Security Bureau using his office telephone. Of course, the tone is still very polite, after all, Wu Cheng side belongs to assist in handling the case.

“Captain Zhang, of course we dare not ignore that.” The Wu Cheng Public Security Bureau police officer who answered the phone had also spoken to Zhang Zhiju twice before. He poured water on the phone, "Zhang, we've brought the phone back to the police station. ”

“But that's an iPhone 6 Plus with a six-digit password lock that the FBI doesn't even know about.” The officer kept laughing on the phone, "Yunshi's father didn't know the password, so we had to answer the phone and couldn't get into the operation page. ”

“Apple phone again!” Zhang Zhi made a joke, "I'm sorry, Officer Liu, the Apple phone really doesn't understand. ”

Without the password, you must not see the information in the phone!

No reason, just because it's an Apple phone.

Let's not talk about the Huaxia police, even the famous American FBI, in front of this, will sink into the sand.

In last year's shooting in San Bernardi, the FBI speculated that the suspect had material in his cell phone, so they asked Apple to unlock the suspect's Apple phone ID.

Results…

Apple declined for reasons that protect user privacy.

This sounds like some Tianfang Night Tan, Apple dares to refuse the FBI's investigation request, and the famous FBI can be stuck by Apple's phone account password?

In Huaxia, the internet is full of ads that break Apple's password. What remote unlock, flash unlock, vulnerabilities unlock.

But it's all a deceitful old toothpick.

The FBI of the United States, trying to crack the killer's iCloud account while retaining his cell phone data, has been hard at lawsuits with Apple for over a month. Is the FBI sick enough to go to court?

On Huaxia's side, the only really viable solution is to replace a few hardware chips inside the Apple phone, including the flash memory that stores the information so that all the information on the phone is emptied.

The FBI also had to file a lawsuit with Apple to keep the flash memory.

“Six digit power-on password?” Ye Qing didn't feel comfortable swinging, “it may be a little difficult to crack the iCloud account, but turn on the password and ask them to send the phone and we can solve it in five minutes. ”

“Really... really?” Zhang Zhi revealed an irrepressible joy, and the position of smartphones in life grew more and more important. Their public security system has also become increasingly frequent in dealing with mobile phones, especially in the current popular case of cyberfinance, where dozens of mobile phones can be searched.

Although the code can be used in a “civilized interrogation” manner to sensitize the suspect and allow him to proactively share the code. There are really “hard bones" that can bite your teeth to death. Or only mobile phones involved, and there are no cases of persons involved.

Like cloud poetry.

Apple can even resist pressure from the FBI. How could the cops be on this side of Huaxia?

When Zhang Zhiqing passed the news to Wu Cheng Police Department, there was no accidental bombing of the nest across the street.

“Ah, really? ”

“Send, immediately. ”

“Captain Zhang, how many other Apple phones do we have involved here? Could you please ask President Ye to unlock them together? ”

“We're going to take the highway. It's only 8: 00, 11: 00 at the latest. ”

Wu Cheng is 400 km from Zhongyun. Wu Cheng Police arrived at Zhongyun at 10: 40 at night and then took the Zhongyun Public Security Bureau's car straight to the Beast Industry Building.

The decryption site is located in the electronic laboratory in the building.

Wu Cheng Police also sent two technical police officers to observe the cracking process.

Ye Qing generously promised and even asked an electronic messenger to give them the principle of Cope cracking.

“A six-digit power-on password, consisting of six-digit zeros to nines, with all combinations less than a million times, we attack the password with brute force, just seconds away. ”

Inside the lab, the electronic messenger in the white coat demolished the first Apple case with great skill, revealing the motherboard hidden at the bottom of the screen.

“Ah?” The police in Wu Cheng and Zhongyun City almost dropped their chin, “this master, the password is wrong three times, it takes a minute to lock the plane. Too many errors and direct and automatic destruction of internal information. How come on your side...”

“How did it know how many times we entered the password? ”

The electronic messenger grinned, unplugged the screen line of the Apple phone, connected it to an instrument where the motherboard and chip were exposed, and connected the line of the instrument to the motherboard to make the bridge.

“We use a little trick to mislead this phone into thinking it's always the first time you've entered a password. ”

When the voice dropped, several policemen discovered that on the screen of the disconnected phone, they began to see the password unlock screen, then the screen was full of [try again] jitter prompts, and then the screen was jammed directly because it was refreshing too quickly.

Less than ten seconds later, the electronic messenger nudged his mouth, “Okay, change the part. ”

Police from Wu Cheng stunned and handed out another Apple phone.

“Yo, combination of numbers and English passwords?” The electronic messenger laughed.

“Can you solve this one?” The police looked at the electronic messenger and brought English into the password, almost impossible to decipher by brute force. But this phone, which is related to a criminal fraud case, was solved and the case probably broke the meritorious reward.

“Simple, disassemble the flash memory, and we read the data directly from the flash memory.” The electronic messenger said to remove its enclosure manually, "Perhaps you should ask, the flash memory data is encrypted, and the FBI doesn't have the technology to read the contents directly. ”

“But I'm telling you, when we first made phantom phones, we were bored studying Apple technology. This decryption algorithm, the encryption method written directly in the CPU, seems silly to us. So when you buy a cell phone, you have to buy a phantom phone. ”