Gunfire, Punk and Necromancer

Chapter 611 Chapter 608 Everyone Has a Problem

Zhuang Xuteng must be the best thief in the world. Shadows, ghost servants and tentacles, coupled with long-distance perception, allow him to perform stealing skills from a few meters to a thousand meters away without fear of being discovered. He has skills such as disguise, concealment, and stealth. In addition to his superb skills, he is also good at picking targets.

For example, workers who are performing mental services on work chairs are excellent targets. The dream fog machine ensures their sleep quality and ensures that they do not have any outside perception, so it is suitable to start with. Zhuang Xuteng didn't do it for money, he just lent them their mobile phones for use and would return them after using them.

The call, of course, was to Jeremy Dot. Zhuang Xuteng claimed that he had an investment project that was sure to make money without losing money, with an annual interest rate of 25%, and he needed a partner...

Before he finished reading his words, the call was hung up, and of course the number was also blocked. Zhuang Xuteng shrugged, not surprised by the result. He deleted the call history, returned the phone, and connected to another encrypted channel.

"How's it going? Have you found the base station?"

The other end of the encrypted channel is Meteor, who was sent to provide intelligence support, and of course Lucy's approval is indispensable. "I've chased six nodes. According to the timestamp, there should be about three more ahead. To be on the safe side, I'll bury the program first, and then you can find a phone number to call."

This time we have to track down someone inside the company, and it is very likely that it is an important person, so it will definitely be very risky. Conducting intelligence spying directly through the information network is tantamount to suicide. We must not think that the daily network protection personnel of Dingxin Magic will take a collective vacation at this time. Lucy does not allow Meteor to make any dangerous moves, and she is not allowed to try to enter any company's system. She must strictly stay outside the company's firewall. So this time I had to use stupid methods to find someone.

After the mobile phone is started, it will be registered at the nearest base station. The registration information will be formed into a table, passed to the surrounding base stations, and summarized in the upper-level dispatch center. When dialing the other party's number, you must first search for the other party's base station registration information level by level, and then set up a communication line, and data and information will be transmitted from this line.

Because he did not know whether an anti-tracking firewall was installed on Jeremy Dot’s mobile phone, Meteor did not dare to send any illegal information to the other party’s mobile phone. She couldn't stare at the mobile phone number, so she could only try to get the base station list. Knowing which base station the other party is active in can narrow the tracking range. This base station registration table cannot be copied directly from the server of the dispatch center. I have heard lessons from doing this before: the base station server contains the company's protection program for registered special numbers - in fact, those of people above C All mobile phone numbers - Alarm systems are set up. Any abnormal data detected will alert the security center and be checked by the intelligence officer on duty.

Not even touching the dispatch center, Meteor could only do the next best thing and try to disassemble the network handshake information packet sent to Zhuang Xuteng's stolen mobile phone and disassemble the base station information inside. This table is not stable and often contains some erroneous information, which must be quickly screened. This is called shadow noise in the network by Meteor and other intelligence officers. Some of it is headless data left behind by old equipment, some is network attack information that has lost its target and wanders around, and some is said to be released by the company to inspect the underlying network. Killer program.

These are situations that only intelligence officers will face in their daily work. For Zhuang Xuteng, they are like another world. He was more determined to give up the idea of ​​learning intelligence and spying knowledge, and concentrated on practicing martial arts and spells without distracting his energy.

"It feels like the noise on the Internet is so loud...chirp, chirp, chirp...it makes my head numb." Meteor complained to Zhuang Xuteng. After a while, she asked again: "Be careful when you act. I always feel like I have returned to the same state as when the investigation team was here."

"Okay, I will pay attention. I got another mobile phone and am ready to call it. Please pay attention."

"Wait! Let me recheck the base station hook... Okay, you can dial."

Zhuang Xuteng changed his voice and started selling the house this time. Jeremy Dot hung up the phone faster, and Zhuang Xuteng could feel a trace of anger passing along the phone line. It doesn't matter, it's not your number anyway. Zhuang Xuteng deleted the call history and returned the phone.

"There is still one layer of addresses left. You need to move. I will send you the address and arrive as soon as possible." Meteor said: "When the network is only a few adjacent base stations away, communication can go directly from the base network, and there is no need to Use the transfer center to save time and save traffic. As long as you are close, I can get rid of those dangerous monitoring programs located in the transfer center.”

Zhuang Xuteng immediately started the car after hearing the address. He wanted to get to the vicinity before the other party moved. This method of tracking base station information lacks continuity and can definitely be classified as a stupid method. Its only advantage is that it is hidden and will basically not be discovered by the company.

Fifteen minutes later, Zhuang Xuteng arrived at the designated location. He had already found a new public work station on the way and stole a new mobile phone. Meteor had already laid the hook, and following Zhuang Xuteng's order, she handed over the hook and the new phone.

Jeremy Dot glanced at the number, which was unfamiliar. With the previous two lessons, he already understood that his number was probably sold. Although in theory, the numbers of company employees are protected, and it is basically impossible for the information to be sold. But it’s not impossible that the buyer might have bought a fake product with his number on it.

This time, he hung up the phone without answering.

It’s okay if it’s not connected. Meteor only needs the “try to connect” information packet from the mobile phone network. "The base station has been identified, and I am narrowing down the range based on the map. The target has not moved for at least twenty minutes; the connection and disconnection speeds are very fast, and the mobile phone is by my side; plus at this time, the restaurant is more likely, and others Service industry establishments are second.”

"Understood. I'll start searching now."

"Why did you... forget it, pretend I didn't ask, that's your own fault." Meteor said: "There are some ordinary shops around. I can enter their security monitoring system and retrieve the real-time picture - if you if you need."

"Okay, if I need it, I'll find you. Send me the nearby map first, just in the image format." Zhuang Xuteng tapped the embedded keyboard in his body with his fingers, connected to the Internet through the external personal transaction device, and downloaded map. At the same time, he released multiple sensory tentacles and began to monitor this area.

The radius of the strong signal area of ​​a base station is about 500 meters. In order to overcome the complex terrain environment of high-rise buildings in urban areas, the density of signal base stations is high, so the real service range of each base station will be reduced. However, the directional shielding and interference factors of the building structure on the signal must be taken into account. You cannot simply find the base station and draw a sphere, which involves complex calculations. It is possible that a person is very close to a certain base station, but the signal in this direction is severely shielded. If there is no other base station with a smoother connection, he will choose the stronger one rather than the weaker one, and connect to the base station that is farther away but has a better signal.

Meteor retrieved the design blueprints of surrounding buildings, calculated the electromagnetic shielding coefficient based on their building materials and structures, and prepared to try to generate a model. On the other side, Zhuang Xuteng set the detection range to one thousand meters and searched it first.

In recent times, some progress has been made in sensing multiple tentacles. Zhuang Xuteng found a way to reduce his own burden and improve the mobility of the sensing tentacles, and made certain improvements. He tried to give the vengeful servants in the sensing tentacles the ability to absorb grievances, so that they could provide energy for the entire spell system. Through the process of providing energy, the spirit servants can partially participate in the control of the spell, thus sharing Zhuang Xuteng's energy consumption.

The progress made so far is the addition of two sensing tentacles, and the observation range at the end of each sensing tentacle has increased by 10%. In this way, all restaurants within one kilometer are covered by Zhuang Xuteng, as well as a bar and two massage parlors. Considering that their never-ending background music does not appear during the call, they are temporarily excluded.

Pick up the phone, dial the number, and observe. First look for people who are holding out their phones, and then look for those who are raising their hands. Because it cannot be ruled out that Jeremy Dot will transfer mobile communications to the built-in personal transaction processor, which can save the action of taking out the mobile phone. However, most personal processors still require some basic physical reactions, and just careful observation...

Not found... just excluded some clearly wrong targets. Zhuang Xuteng dialed the number again. Although he still couldn't find Jeremy Dot directly, he relied on memory and comparison to find people who took the same actions and had similar expression changes when trying to call twice. These people were the focus.

Eight suspected targets, eight sensing tentacles for focused observation.

Jeremy Dot frowned when the same number was dialed for the third time. He was worried that this was someone who knew him and was in an emergency. His phone was broken and he had to borrow someone else's, so he picked up the phone anyway. Zhuang Xuteng suddenly found his target!

"Hello? Who are you looking for?" Jeremy Dot's voice was a little hoarse, as if his throat had been injured. He uses a built-in personal processor and communication antenna, so he doesn't have to move at all to answer the phone. For this call, he had to pause his flirting with his female companion and had to keep using gestures to tell her what he was doing.

Zhuang Xuteng suddenly thought of a good idea. He lowered his voice and said, "Do you know what you are doing? How dare you develop a relationship with that woman? This is not good for your career development. If you are not careful, you will get into trouble. Now I am giving you a warning. .Also, there is no need to trace the number, it is temporarily borrowed, the trace will be cleared, and the call will be ended.”

Jeremy Dot was immediately confused: Who called me? How did he know that I was dating and that this woman was unreliable? No, we met this woman at a business reception... No, this is a bit fishy, ​​so you'd better be careful.

"Wait a moment, I need to deal with it, it will take about five minutes - company matters." Jeremy Dot explained briefly to the female companion across the table, got up and left the table, walked quickly to the bathroom, and immediately contacted the intelligence center. As a member of the Special Department, his authority level is C4 and he can apply for general identity investigation.

Five minutes were enough for Zhuang Xuteng to use his sensory tentacles to rummage through all his things and piece together information such as his address, living conditions, habits and hobbies. Five minutes later, Jeremy came back with a smile on his face. He first politely apologized for leaving the table temporarily, and then continued drinking and talking with the woman opposite.

Zhuang Xuteng used his sensing tentacles to observe from a distance, and he did not forget to clear the traces on his phone and send it back immediately. After listening to a few words, he knew that Jeremy was on a "blind date", and the two of them were indeed talented and beautiful, and of similar age, so they could try to get together.

In the information network that Zhuang Xuteng could not see or hear, Dingxin Mochuang's intelligence department was investigating the background information of the blind date woman for Jeremy. This kind of investigation requires intelligence officers to spend brainpower. Retrieving data is not tiring, but the consumption of cross-comparison and association mining is considerable. C4-level managers only have three opportunities to apply for this service a year, and they will never be accommodating after they have been used up.

The intelligence was transmitted to Jeremy's pupils in the form of text. There were indeed some ambiguities in the identity of this woman, and she might be more dangerous than she showed. Jeremy originally wanted to continue his activities at night, but when he saw this prompt, he began to back off. His current financial prospects were hard-earned, and he couldn't just fall.

There was no direct evidence that there was something wrong with this woman, but some ambiguity and suspicion were enough for Jeremy to give up. He began to speed up the banquet, paving the way for the separation. At the same time, he was also wondering who the kind reminder would be? He first thought of the special talents he served, who might help him for the common good! Or someone from the company's security department, who discovered the situation during a routine inspection and wanted to sell him a good deal, and then report back.

No problem, no problem, even if it is a report back, it is completely understandable. Who in the company didn't climb up slowly like this? Everyone needs friends and doesn't want enemies, unless it is a clear line of defense. A person who can conduct background checks and can speak with certainty about the problem, rather than just vague suspicions, either has strong intelligence analysis capabilities, or has a higher level of access. Either way, it is worth making friends.

"If this is the case, although they are looking for me, they are not looking for me, but those people in the special department. Well, I have to be vigilant and don't be fooled. And I have to report this to those guys in advance, and ask if they are helping me."

The thought echoed in my heart, and the wine rippled in the glass. Jeremy has begun to enter the "closing statement". It seems that he is going to end his activities here and prepare to be captured by Zhuang Xuteng after he goes out. But Zhuang Xuteng received an encrypted communication from Meteor. The content was very brief, from Sister Lucy: "Gather immediately, big action, you are needed."

Is it a middleman war? Zhuang Xuteng smelled the bloody smell, and his heart began to get excited, and his fingertips felt slightly itchy. He felt that Jeremy Dot's appearance and address were already clear, and if he could find him once, he could have more times. The preparations for continuing the tracking were relatively hasty, so it would be better to take care of Sister Lucy's big action first.

It was this decision that allowed him to avoid this wave of security reinforcement inspections from Elizabeth Shaw.

Chapter 611/671
91.06%
Gunfire, Punk and NecromancerCh.611/671 [91.06%]