Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 2015 Powerful Security

Previous page        Return to Catalog        Next page

    "There is always a way." Lin Rui looked at area No. 6 on the map and said slowly.  "Nowhere is absolutely closed."

    "Theoretically, it's true. As a large military base, the US military has recently mobilized personnel frequently due to exercises, so it is relatively easy to enter the interior of Felsacre Base. But it is indeed difficult to enter Area 6 of the base.  Not easy. Even insiders must have CIA certification, including a series of complex security measures such as fingerprint recognition and electronic keys," Cobain replied.

    Lin Rui pondered for a while and said, "So, can you and your team carry out network penetration?"

    "I'm afraid it's difficult. I have already mentioned this issue last time. The CIA has recently carried out a series of firewall upgrades, and the encryption program has adopted a new algorithm. Even our team cannot hack into their network through ordinary methods.  System." Cobain said truthfully.

    "What are you doing? Guys, don't you always say you can do anything?" Sergey complained.

    "Every ability has its limits. We have never said that we are omnipotent." Cobain shrugged, "But we still have some clues. For example, we have basically mastered the security and defense outside Area 6.  Including their personnel, location, and work and rest time. But we really don¡¯t have much information about the inside of Area 6. We only know that the security system they use is produced by Siemens of Germany. It is specially designed for highly confidential areas.  security system."

    "Tell me the specifics." Lin Rui nodded.

    "This system includes many OTN optical network transmission points, optical fiber network dedicated video input and output modules, dozens of sets of digital video recording systems for monitoring. 1 set of intelligent redundant hot backup system, multiple monitors and terminal display screens  . Hundreds of fixed indoor cameras, 52 outdoor cameras, 75 dome cameras, and hundreds of cameras with PTZ control are connected to the early warning system and multiple management workstations. It can monitor the entire building almost without blind spots." Cobain  replied.

    "Damn it, there is no blind spot surveillance. If we want to sneak in, we have to walk in front of all the guards." Sergey was speechless for a while.

    "Not only that, these surveillance cameras all use new digital video encoding and decoding video compression technology, with built-in hard drives for local storage. Important video data can be preserved even if the network fails. It has high-accuracy motion detection functions and anti-vandal detection.  function, it can accurately identify and alarm camera shift, signal loss, defocus, and occlusion. This means that it is impossible for us to interfere with these new monitors.

    The video motion detection and tracking software designed for special security department applications is even more powerful.  Up to 101376 detection fields can be set up, and special statistical methods are used to compare images to ensure constant signal strength without relying on the speed of the object. It can identify and analyze the size, movement direction, path, etc. of moving objects, and has multiple objects  Simultaneous analysis capabilities.  At the same time, it can also perform perspective analysis, virtual trigger line protection, regional dynamic protection, and can overcome the influence of natural phenomena such as wind, rain, snow, etc., and can be used all day long.  ¡± Cobain replied.

    "What do you mean?" Crazy Horse looked confused.

    "That is to say, even if you are moving at high speed or in smoke, these monitoring devices can accurately identify your actions and transmit the data to the server. Then use the recognition software to reshape your behavioral characteristics. You  The appearance and body shape will be restored in time, so as to analyze your identity." Cobain replied, "If you are willing, you can even use this data through 3D printing technology to print out a real model. This is simply invisible.  .¡±

    "Well, it is indeed very powerful, but these things can also be destroyed." Lin Rui shook his head.

    "I haven't finished yet. The powerful monitoring capability is only one part of the security system. There is also the access control system. This system provides comprehensive access control, identity authentication, alarm and various security management functions. But these are not too big a problem.  , Sergey should be able to handle it." Cobain replied.  "If you manage to avoid these surveillances and destroy all the access controls, then you have to enter the second underground floor of the building. Because that is the real detention area, where the two Russians are held."

    "It sounds difficult." Sergey nodded, "This is really a challenge."

    "It's not over yet." Cobain shook his head. "Even if you rush into the holding area and rescue the people you want to rescue, the time left for you to escape is only a few minutes. By that time, you should have triggered the alarm, and  The entire base is under martial law. You have to break out of the siege of thousands of American troops in these few minutes. The opponent not only has a large number of people, but also has light and heavy weapons, including helicopters and Stryker armored vehicles, and even??Tanks and infantry fighting vehicles.  "

    ¡°Damn it, no matter how you sound about this mission, I think it¡¯s a death mission.¡± Sergey looked frustrated.

    "Since I got this mission, I have made countless assumptions. The final conclusion is that if you really get to that point, your only chance to survive without being shot is to kneel on the ground and surrender with your hands raised." Cobain had no choice but to surrender.  typical.

    Lin Rui shook his head and said, "Okay, Cobain, I'm here to help you. I'm not asking you to spread pessimism. Maybe this mission is a bit nonsense, but we don't have no chance at all. As long as we carefully analyze the total  They can find flaws. Technically speaking, they do have an advantage. But sometimes, technical advantages are not all. Relying too much on technology can lead to mistakes."

    "For example?" Sergey looked unconvinced.

    "Any technology has limitations." Lin Rui shook his head. "If we find this limitation and take advantage of it, we can try to fight against them. Sometimes when the opponent is very meticulous and smart, some simple and crude methods will often become  It is more effective. Because the opponent is very thoughtful and has high-end defense, but he never thought that we would act in the seemingly stupidest but most effective way.

    ????????????????????????????????????????????????????????????????????????????????????? He thought he was safe.  But I didn't expect that a stupid thief came. He didn't even bother to pry into your high-end safe. He just got on the crane, lifted off the roof of his house, hoisted the safe onto the truck, and drove off.  "

    "Pfft!" Yelena couldn't help laughing.

    Sergey listened for a long time and nodded, "It seems to make sense. But why doesn't it feel right? Let me go, are you mocking me for being a stupid thief?!"

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report