
As promised, the next day Liza came again with the hacking experts. It was a matter of stopping about visiting permission. The status of the hacking expert that Liza conveyed seemed to sound foreign and suspicious to the officers on guard.
Luckily someone who introduced himself as his lawyer came along. He said the hacking expert was part of his team. The officer allowed them to enter.
Without wasting time, Budi told the chronology of the accusations addressed to him. From a short message that is very unlikely to be sent by the owner of that number. Because the owner is under arrest. And the phone is in the hands of the investigator.
The hacking expert was trying to trace Stevani's number. Checking the traffic of his messages. It turned out that he discovered the unusual activity of the number. Symptoms such as the phone has been infiltrated by a high level of virus. Which can move behind the screen, without any change in appearance. Even when the phone is being used.
The hacking expert tried to dig deep again. In a way, he found traces of the hacking.from the short message server as well, there are traces of unusual activity. Traces of a virus software that can hear, record, read messages, change the contents of messages, even change the clock in the message.
Hearing the word clock, Budi remembered the photo of a short message shown Sandi. The first thing he wanted to know was the photo of his watch. A clock that contains a special identification code of its own.
The hacking expert tracked her down, armed with photos from the password the Princess kept. And sure enough, there is a trace of a date change due to a virus being fired from somewhere. The original date was just a few days ago, being the same date two years ago.
Budi also asked the hacking expert to track short messages from numbers listed in other photos. For this one case, the hacking expert found something unusual.
The so-called Stevani bodyguard's number turned out to be two. One was tracked in the police, one was tracked in Papua. And after being traced, it turns out that there was someone who tried to steal the identity of the bodyguard.
The perpetrator blocked the bodyguard's number so that no other number could be reached outside of the two-kilometer radius. Only within a two-kilometer radius could contact him. The perpetrator has modified another number so that it becomes this number. If anyone calls or sends him a message, it will be connected to another number that has been forgotten this.
“Loh, means all this time, the police have misdelivered, dong?” ask Budi.
“Can be. To destroy a person's good name, this way is quite reliable. Suck someone to act as a confidant of the targeted person.” replied the hacking expert.
“This is an interesting finding, Budi” said the lawyer.
“If continued, this would be the same as mitigating the suspected sister of SL” he continued.
“I have nothing to do with my fall. Like the word today is he is free, I am not papa. What matters to me now is, who would dare to slander me?” the lawyer did not answer. Just nodding.
“Terus, who is the sender of sms-sms? He knows my secret code. It doesn't seem like people are far away. He knows me closer than anyone else” asked Budi at the hacking expert.
The hacking expert was trying to trace one of the numbers. Incidentally, it was detected that the phone used by the number was a smart phone. With special software, he tried to get into the phone of the owner of the number, through the application of a million people.
“This number is also controlled remotely, pak” said the hacking expert.he directed his monitor screen to Budi.
“Means the culprit depends on android. What else is it?” ask Budi. The hacking expert was tracking back the other numbers. And the result is the same. The numbers were controlled remotely.
“Means he chose randomly. The important thing can be infiltrated” comments Budi.
“More or less so” replied the hacking expert.
“Terus, where did the virus come from?” ask Budi.
The hacking expert tried to browse again.
But he seems to be having trouble. Many times he shook his head. Sometimes he smiles too.
“With that technology, he can blur his tracks by hiding in many IP” continued the hacking expert.
“Means?”
“He uses multiple IPs in chain. He made one IP as a scapegoat. When an IT expert finds out that IP is just a scapegoat, he uses a lot of IP layered behind him. He hopes, IT experts will be fooled by assuming the second IP is the culprit. If number two is found only a scapegoat, there is still number three. As soon as the next. So it will be difficult for IT experts to find it” replied the hacking expert.
“Super computer?”
“Ya”
“It looks like it would be better if we meet the investigator first”, the lawyer told the hacking expert.
“This condition is even good. We have strong evidence that there are perpetrators still in hiding. We can take it down with the investigators. And will strengthen our argument” continued.
“But don't get blunders! IP address of my phone does my computer know it appears?” sahut Budi's.
“With such a strong computer capacity, anything can happen, pak” replied the hacking expert.
“Search first, until the end! New to investigator” pinta Budi.
“Good, pak” replied the hacking expert.
The hacking expert again focused on tracing the digital trail. Very long. Luckily the officer on guard can be invited to cooperate. Until after lunch, the hacking expert was still struggling with his computer.
“This, pak”. All eyes were on him.
“The place is not far from here. Easy to reach” he continued. Be careful to look and pay close attention to what is displayed on the screen of the hacking expert monitor.
“Well, report to investigator!” budi's Order.
“Good, pak” replied the hacking expert.
Together with the lawyer, he prepared a reporting strategy. Some steps they have agreed to go in line. Some scenarios are also discussed if the investigator will take more information from Budi. After agreeing, the two of them came out of Budi's nursery and headed for the police.
“Still yes,Liz” said Budi, after the two men came out of his nursery.
“Sama-sama, mas. I can only help this. Hopefully they can immediately free the Budi mas from this suspect status”
“Amiin” Budi, Putri, and bu Ratih guarantee Liza's hope together.
As the Javanese saying goes, ketitik becik, olo ketoro, the investigation team from the police agreed with the lawyer and hacking expert Budi. The evidence they presented was confirmed by IT experts from the police. And the police immediately mobilized its personnel to catch new suspects the results of this digital search.
.