Gunfire, Punk and Necromancer
Chapter 611 Chapter 608 Everyone has problems
Zhuang Xuteng must be the best thief in the world. Shadows, ghost servants and tentacles, coupled with long-distance perception, allow him to perform stealing skills from a few meters to a thousand meters away without fear of being discovered. He has skills such as disguise, concealment, and stealth. In addition to his superb skills, he is also good at picking targets.
For example, workers who are performing mental services on their work chairs are excellent targets. The dream fog machine ensures their sleep quality and ensures that they do not have any outside perception, so it is suitable to start with. Zhuang Xuteng didn't do it for money, he just lent them their mobile phones for use and would return them after using them.
The call, of course, was to Jeremy Dot. Zhuang Xuteng claimed that he had an investment project that was sure to make money without losing money, with an annual interest rate of 25%, and he needed a partner...
Before he finished reading his words, the call was hung up, and of course the number was also blocked. Zhuang Xuteng shrugged, not surprised by this result. He deleted the call history, returned the phone, and connected to another encrypted channel.
"How's it going? Have you found the base station?"
The other end of the encrypted channel is Meteor, who was sent to provide intelligence support, and of course Lucy's approval is indispensable. "I've chased six nodes. According to the timestamp, there should be about three more ahead. To be on the safe side, I'll bury the program first, and then you can find a phone number to call."
This time we have to track down someone inside the company, and it is very likely that it is an important person, so it will definitely be very risky. Conducting intelligence spying directly through the information network is tantamount to suicide. We must not think that the daily network protection personnel of Dingxin Magic will take a collective vacation at this time. Lucy does not allow Meteor to make any dangerous moves, and she is not allowed to try to enter any company's system. She must strictly stay outside the company's firewall. So this time I had to use stupid methods to find someone.
After the mobile phone is started, it will be registered at the nearest base station. The registration information will be formed into a table, passed to the surrounding base stations, and summarized in the upper-level dispatch center. When dialing the other party's number, you must first search for the other party's base station registration information level by level, and then set up a communication line, and data and information will be transmitted from this line.
Because he did not know whether an anti-tracking firewall was installed on Jeremy Dot’s mobile phone, Meteor did not dare to send any illegal information to the other party’s mobile phone. She couldn't stare at the mobile phone number, so she could only try to get the base station list. Knowing which base station the other party is active in can narrow the tracking range. This base station registration table cannot be copied directly from the server of the dispatch center. I have heard the lesson of doing this before: the base station server contains the company's protection program, which targets registered special numbers - in fact, those of people above C All mobile phone numbers - Alarm systems are set up. Any abnormal data detected will alert the security center and be checked by the intelligence officer on duty.
Not even touching the dispatch center, Meteor could only do the next best thing and try to disassemble the network handshake information packet sent to Zhuang Xuteng's stolen mobile phone and disassemble the base station information inside. This table is not stable and often contains some erroneous information, which must be quickly screened. This is called shadow noise in the network by Meteor and other intelligence officers. Some of it is headless data left behind by old equipment, some is network attack information that has lost its target and wanders around, and some is said to be released by the company to inspect the underlying network. Killer program.
These are situations that only intelligence officers will face in their daily work. To Zhuang Xuteng, they are like another world. He was more determined to give up the idea of learning intelligence and spying knowledge, and concentrated on practicing martial arts and spells without distracting his energy.
"It feels like there's so much noise on the Internet... chirping, chirping, chirping... it makes my head numb." Meteor complained to Zhuang Xuteng. After a while, she asked again: "Be careful when you act. I always feel like I have returned to the state when the investigation team was here."
"Okay, I will pay attention. I got another mobile phone and am ready to call it. Please pay attention."
"Wait! Let me recheck the base station hook... Okay, you can dial."
Zhuang Xuteng changed his voice and started selling the house this time. Jeremy Dot hung up the phone faster, and Zhuang Xuteng could feel a trace of anger passing along the phone line. It doesn't matter, it's not your number anyway. Zhuang Xuteng deleted the call history and returned the phone.
"There is still one layer of addresses left. You need to move. I will send you the address and arrive as soon as possible." Meteor said: "When the network is only a few adjacent base stations away, communication can go directly from the base network, and there is no need to Use the transfer center to save time and save traffic. As long as you are close, I can get rid of those dangerous monitoring programs located in the transfer center.”
Zhuang Xuteng immediately started the car after hearing the address. He wanted to get to the vicinity before the other party moved. This method of tracking base station information lacks continuity and can definitely be classified as a stupid method. Its only advantage is that it is hidden and will basically not be discovered by the company.
Fifteen minutes later, Zhuang Xuteng arrived at the designated location. He had already found a new public work station on the way and stole a new mobile phone. Meteor had already laid the hook, and following Zhuang Xuteng's order, she handed over the hook and the new phone.
Jeremy Dot glanced at the number, which was unfamiliar. With the previous two lessons, he already understood that his number was probably sold. Although in theory, the numbers of company employees are protected, and it is basically impossible for the information to be sold. But it’s not impossible that the buyer might have bought a fake product with his number on it.
This time, he hung up the phone without answering.
It’s okay if it’s not connected. Meteor only needs the “try to connect” information packet from the mobile phone network. "The base station has been identified, and I am narrowing the scope based on the map. The target has not moved for at least twenty minutes; the connection and hang-up speeds are very fast, and the mobile phone is with me; plus at this time, the restaurant is more likely, and others Service industry establishments are second.”
"Understood. I'll start searching now."
"Why did you... forget it, pretend I didn't ask, that's your own fault." Meteor said: "There are some ordinary shops around. I can enter their security monitoring system and retrieve the real-time picture - if you if you need."
"Okay, if I need it, I'll find you. Send me the nearby map first, just in the image format." Zhuang Xuteng tapped the embedded keyboard in his body with his fingers, connected to the Internet through an external personal transaction device, and downloaded map. At the same time, he released multiple sensory tentacles and began to monitor this area.
The radius of the strong signal area of a base station is about 500 meters. In order to overcome the complex terrain environment of high-rise buildings in urban areas, the density of signal base stations is high, so the real service range of each base station will be reduced. However, the directional shielding and interference factors of the building structure on the signal must be taken into account. You cannot simply find the base station and draw a sphere, which involves complex calculations. It is possible that a person is very close to a certain base station, but the signal in this direction is severely shielded. If there is no other base station with a smoother connection, he will choose the stronger one rather than the weaker one, and connect to the base station that is farther away but has a better signal.
Meteor retrieved the design blueprints of the surrounding buildings, calculated the electromagnetic shielding coefficient based on their building materials and structures, and prepared to try to generate a model. On the other side, Zhuang Xuteng set the detection range to one thousand meters and searched it first before talking.
In recent times, some progress has been made in sensing multiple tentacles. Zhuang Xuteng found a way to reduce his own burden and improve the mobility of the sensing tentacles, and made certain improvements. He tried to give the vengeful servants in the sensing tentacles the ability to absorb grievances, so that they could provide energy for the entire spell system. Through the process of providing energy, the spirit servants can partially participate in the control of the spell, thereby sharing Zhuang Xuteng's energy consumption.
The progress made so far is the addition of two sensing tentacles, and the observation range at the end of each sensing tentacle has increased by 10%. In this way, all restaurants within one kilometer are covered by Zhuang Xuteng, as well as a bar and two massage parlors. Considering that their never-ending background music does not appear during the call, they are temporarily excluded.
Pick up the phone, dial the number, and observe. First look for people who are holding out their phones, and then look for those who are raising their hands. Because it cannot be ruled out that Jeremy Dot will transfer mobile communications to the built-in personal transaction processor, which can save the action of taking out the mobile phone. However, most personal processors still require some basic physical reactions, and just careful observation...
Not found... just excluded some clearly wrong targets. Zhuang Xuteng dialed the number again. Although he still couldn't find Jeremy Dot directly, he relied on memory and comparison to find people who took the same actions and had similar expression changes when trying to call twice. These people were the focus.
Eight suspected targets, eight sensing tentacles for focused observation.
Jeremy Dot frowned when the same number was dialed for the third time. He was worried that this was someone who knew him and was in an emergency. His phone was broken and he had to borrow someone else's, so he picked up the phone anyway. Zhuang Xuteng suddenly found his target!
"Hello? Who are you looking for?" Jeremy Dot's voice was a little hoarse, as if his throat had been injured. He uses a built-in personal processor and communication antenna, so he doesn't have to move at all to answer the phone. For this call, he had to pause his flirting with his female companion, and had to keep using gestures to tell her what he was doing.
Zhuang Xuteng suddenly thought of a good idea. He lowered his voice and said, "Do you know what you are doing? How dare you develop a relationship with that woman? This is not good for your career development. If you are not careful, you will get into trouble. Now I am giving you a warning. .Also, there is no need to trace the number, it is temporarily borrowed, the trace will be cleared, and the call will be ended.”
Jeremy Dot was immediately confused: Who called me? How did he know that I was dating and that this woman was unreliable? No, I met this woman at a business party... No, this is a bit fishy, so you'd better be careful.
"Wait a moment, I need to deal with it, it will take about five minutes - company matters." Jeremy Dot explained briefly to the female companion across the table, got up and left the table, walked quickly to the bathroom, and immediately contacted the intelligence center. As a member of the Special Department, his authority level is C4 and he can apply for general identity investigation.
Five minutes were enough for Zhuang Xuteng to use his sensory tentacles to rummage through all his things and piece together information such as his address, living conditions, habits and hobbies. Five minutes later, Jeremy came back with a smile on his face, first politely apologized for leaving the table temporarily, and then continued drinking and talking with the woman opposite.
Zhuang Xuteng used his sensing tentacles to observe from a distance, and he did not forget to clear the traces of his phone and send it back immediately. After listening to a few words, he knew that Jeremy was on a "blind date", and the two of them were indeed talented, good-looking, and of the same age, so they could definitely try to get together.
In the information network that Zhuang Xuteng cannot see or hear, the intelligence department of Dingxin Magic is investigating the background information of the woman he is dating for Jeremy. This kind of investigation requires intelligence officers to expend mental energy. Retrieving data is not tiring, but the consumption of cross-reference and correlation mining is considerable. C4-level managers only have three opportunities to apply for this service a year. After they are used up, Definitely not accommodating.
The information was transmitted to Jeremy's pupils in the form of text. There was really some ambiguity about this woman's identity, and she might be more dangerous than she appeared. Jeremy originally thought about continuing the activities at night, but when he saw this prompt, he began to back down. His current money was hard-earned and he couldn't let it fall casually.
There was no direct evidence that there was something wrong with this woman, but some vagueness and suspicion were enough for Jeremy to give up. He began to speed up the progress of the banquet and was already paving the way for the subsequent separation. At the same time, he was also wondering who the kind reminder could be? He first thought of the few special capable people he served. They might help him for the common benefit! Or someone from the company's security department discovered the situation during a routine inspection, thinking of selling themselves a good deal, and then reported it later.
No problem, no problem. It’s completely understandable even if you report based on pictures. Who in the company doesn’t climb up the ladder slowly like this? Everyone needs friends, and no one wants enemies, unless it is a clear act of taking sides. A person who can conduct background checks and can speak conclusively about the problem instead of just having vague suspicions. Either he has strong intelligence analysis skills, or he has relatively high access authority. Either way, it's worth making friends with.
"If this is the case, even though they are looking for me, they are not looking for me, but those people from the Special Department. Well, I have to be more vigilant and don't get fooled. And I have to discuss this matter with those people in advance. The guy reported it and asked if they were helping me."
The thoughts echoed in my heart, and the wine rippled in the glass. Jeremy has already begun to enter the "closing statement". It seems that he is going to end the activities here and prepare to be captured by Zhuang Xuteng when he goes out. But Zhuang Xuteng received an encrypted communication from Meteor. The content was very brief. It came from Sister Lucy: "Gather immediately for a big operation. We need you."
Is it a middleman war? Zhuang Xuteng smelled the smell of blood, and became excited inside. His fingertips felt slightly itchy. He felt that Jeremy Dot's appearance and address were already known, and he could find him more times if he could find him once. The preparations for continuing the tracking were relatively hasty, so it was better to take care of Sister Lucy's big operation first.
It was this decision that allowed him to avoid this wave of enhanced security inspections from Elizabeth Xiao.
You'll Also Like
-
Destroyer from otherworldly
Chapter 187 3 hours ago -
The second young master of the Uchiha family
Chapter 258 3 hours ago -
Douluo's Strongest Son-in-Law
Chapter 1392 3 hours ago -
Three Kingdoms: I Guan Suoqian Turns the Troubled Times
Chapter 49 3 hours ago -
Pokemon Dawn
Chapter 372 3 hours ago -
Douluo Jade Legend
Chapter 71 3 hours ago -
Douluo: Starting from Fooling the Blue Silver Emperor
Chapter 291 3 hours ago -
God of Douluo Continent punishes Qinglong
Chapter 69 3 hours ago -
Douluo Emperor Sword Douluo
Chapter 209 3 hours ago -
Douluo: Miss Tang Sect, she blows up the audience
Chapter 545 3 hours ago