You can search "Special God of War" in Baidu to find the latest chapter!
With the cooperation of hundreds of field personnel and more than a dozen technical personnel, Baodao¡¯s manpower dispersed in various disguises in the city came into the sight of the task force one by one.
As of the fourth day, thirteen key members have been confirmed, and the remaining three are limited by technical means and have only roughly locked down the activity area. The field team still needs to continue secret investigation to finally confirm the person.
In addition to these key members, there are also a large number of peripheral personnel who have surfaced.
These people have parking lot security, some police stations to assist officers, and even uncle who played the night shift of the family members of the Municipal Bureau.
Of course, most of these people have no idea what their actions mean.
In their understanding, they only help those "big bosses" and "little bosses" to keep an eye on the movements of the public security and various law enforcement units, so as to help them be prepared when there are any major inspections and operations, thereby reducing trouble.
In the end, the bosses were punished less and gave less gifts, and they also got a little money to smoke a few cartons of cigarettes. It is convenient for others and for your own convenience.
Just when many field officers were glad that the investigation operations were always carried out secretly, otherwise they would probably alert the other party, good news came from classmate Gao Yueyue.
She successfully intercepted and deciphered an encrypted email. The content of the email was that the local Baodao spies felt uneasy because the air was too "quiet" after Fu Boheng was arrested.
They are eager to enter the dormant period as soon as possible, and then hope to go up to the peak to urge the American side to take action as soon as possible.
"Shangfeng"'s reply was very quick. Even though the encryption method was changed, it was like a miracle to find the high key of the encryption logic. With the powerful computing power of the central server of the Naval Information Office, it only took more than ten minutes to crack the reply email.
Four words - "wait for the opportunity".
The reply is very simple, but it reveals a very important message, that is, the United States is not ready yet.
Thinking about it, although the research center is on the seaside, it is located deep in the bay and far away from the open sea.
Not to mention the tight defense itself, there is a military port seven kilometers away. If there is a slight disturbance, we can quickly provide support at sea, on the road, and in the air.
Even if the United States sends a special operations team to raid, we will ensure that he never comes back.
"The United States is not a fool. If you want to destroy such a defense-level target, hard means are definitely unrealistic and unconditional.
At this time, the internal screening in the base has gone through several rounds, and the leader of the screening team guaranteed with his head that there is absolutely no problem with the purity of everyone at this stage.
This point basically eliminates the possibility of the fortress being breached from the inside.
So what does the United States plan to do?
?? Could it be that the world is too big to do anything but use tactical missiles?
How long should you wait for the opportunity to use missiles?
What kind of cooperation do we need from Treasure Island¡¯s agents?
¡°Could it be that they just want to push out the treasure island agents to attract attention, but in fact, those people are not needed at all in the attack?
A series of questions made everyone on the task force wonder how much hair they had lost.
At this time, Team Leader Yang, who was the backbone of the task force, pointed out that speculation without evidence should be put aside for now, and everyone should focus on the word "timing."
So, what can be called "timing"?
Is it a layout that takes time to complete, or is it a preparation that requires certain equipment or requirements to be met before it can be launched?
Just when everyone was trying their best to find possibilities, a seemingly ordinary fight case was reported to the task force by the police station below.
The case was very ordinary, just a fight over collecting scraps. There were no casualties, so it could be considered a public security case at best.
The reason for the report was that the characteristics of the person who was beaten were highly consistent with the characteristics of the suspect in the arrest warrant issued by the task force.
The description of the portrait on the wanted poster comes from Liu Yi, and it is the general characteristics of the island nation's ninja when he was disguised as an old man.
The mere fact that the appearance and characteristics are highly consistent is not enough for the police station to report the situation. After all, the short, thin and slightly rickety old man can be seen everywhere on the street.
What really made the police pay attention were some details in the case.
At the time of the incident, the police station received a call from the public, saying that an old man who was riding a donkey backwards to collect waste was being beaten by several men.
By the time the police arrived at the scene, the parties and onlookers had already dispersed.
After visiting surrounding shops, the police learned that the old man who was beaten wasFor military units, most of these units are connected to military networks.
Considering the difficulty and especially cost of wiring, many military network switch rooms are set up in cities to facilitate extension to surrounding military units.
Since the location of this computer room has not yet been involved in the case, it is completely outside the scope of the task force's attention.
In other words, no one in the group knows where the military network switches are located.
But Gao Yao knows!
¡°After all, before she was transferred here, she was bored in the base all day long, racking her brains to figure out how to improve the security of the private network.
This "security" is not just about software, hardware and circuits are all within the scope of prevention.
Now Gao Yao has pointed out this situation, and the problems that have troubled everyone before have been solved.
It turns out that "jounin" has changed his mind and no longer hopes to find Academician Qin through tracking. Instead, he thought that since Academician Qin did not go to the research center, he would definitely guide the experimental process remotely through the Internet.
Such a high-density experiment would definitely not use a wide area network. A dedicated line from the hideout to the base cannot be pulled out in a short time.
Therefore, the military network has almost become the only option.
As for her, as long as she successfully invades the main control room of the local military network, she is likely to find clues to determine the physical address of the suspicious port and find the specific location through the address.
Knowing what the other party was planning, Yang Shengli immediately ordered that all the field personnel who had been sent out to search for the target be withdrawn, and at the same time, two capable teams were sent to the computer room to put on makeup and wait.
In addition, the SWAT team is on standby and ready to arrest at any time! (Remember the website address: www.hlnovel.com