Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 6324 Security System

Previous page        Return to Catalog        Next page

    Chapter 6324 Security System

    "You mean to use a high-definition photo and block it in front of the camera. Even second- and third-rate thieves are too lazy to use such a low-level technique." Sergey shook his head.

    "But you can't deny that this is indeed useful." Daniel's eyes lit up.  "If used properly, it might have miraculous effects."

    "Okay, let me ask you, how can you ensure the distance and angle of placing this photo? Surveillance cameras also have focal lengths. If the distance is wrong, the lens will be blurred.

    And the moment you place the photo, it is easy to see through it, because the surveillance screen will shake at that time.  It may be a subtle difference, but it should be noticeable.  "Sergei shook his head.

    "This is just a subtle difference. There are at least hundreds of surveillance camera screens working in the security monitoring room at the same time. No one can guarantee to stare at hundreds of screens at the same time.

    So these surveillance videos must have been reduced so that they can all be displayed on the limited display screen.  Of course, security can zoom in on any of these videos at any time.

    So with such a small display area, there is a slight jitter on our display, which is difficult to see.

    As for the angle and focal length you mentioned, we can find a way to fix the photo with just two thin wires and then block it in front of the lens.  Daniel gestured.

    "If we do this, will there be any problems on the surveillance video?" Lin Rui asked.

    ¡°The screen will flash slightly, but as long as the subsequent display is normal, no one will see the problem. Even if the guards in the security monitoring room have been staring at the screen, they may not be able to detect such a subtle change.

    And even if they are aware of it, they will not rush to the monitoring area immediately.  At most, it can only be observed through monitoring.  As long as there is nothing particularly suspicious, security personnel will not pay special attention.  ¡± Daniel explained.

    "What do you think?" Lin Rui turned to Sergey and asked.

    Sergey was silent for a while, and finally nodded, "Although this method is crude, it has merits. The biggest advantage is that it is fast enough and does not require a lot of effort. I think you can try it."

    Daniel clapped his hands and said, "Okay, now we have a plan. That is to try to enter from the top of the Federal Reserve Bank building, break through the camera surveillance on the top floor, and enter the elevator shaft.

    Then go down the elevator shaft and come directly to the vault dozens of meters underground.  But the door to the safe is similar to the door to the vault.  They are all cylindrical metal bodies, and we cannot destroy them at all, which means they can only be unlocked.

    As far as I know, even the most experienced experts will take several hours to fix this kind of lock.  "

    "You are lucky, we have an expert here." Lin Rui patted Sergey on the shoulder, "Come and meet this ace thief, a locksmith expert in St. Petersburg."

    "How long do you need this lock?" Daniel held up a photo in the file and handed it to Sergey.

    "Maybe it will take a few hours, maybe it won't open at all. You have to try it to know." Sergey replied.

    ¡°That¡¯s not okay, once we do something, there¡¯s no turning back. We have to make sure we succeed. Otherwise we¡¯ll get down to the vault and be trapped outside.

    Nothing could be worse, as every half hour, armed guards check.

    If we fail to open the lock within the stipulated time, it will be too late to evacuate, and the guards will definitely find us.  "Lin Rui whispered. "So we don't have this condition at all, and we don't give you a chance to try.  You must ensure that you can open the door within the specified time.  "

    "The door of the vault is only our first obstacle. After we successfully enter the safe, we still have to find the safe used by the target and open that safe." Daniel sighed.

    "The safe should be easier to open than the door outside, right?" Lin Rui asked.

    "It is true. According to the data, the safe they use is easier to open than the door. If it were me, I am sure I can open it within 20 minutes."

    ¡°That is to say, after we enter, within an hour and a half, we must successfully open the vault door, find and open the safe, and take away the documents.

    So what about the evacuation plan?  How do we evacuate after the matter is settled?  asked Black Mamba.

    "The best way is to go back the way we came, get back to the airship, and evacuate from the air. Before we leave, we have to recover the photos blocked in front of the camera.

    &nbs?Check if you are carrying metal on you.

    Then a full-body inspection will be conducted to eliminate any safety hazards, and then a dedicated person will lead the entry.  Even if the customer deposits and withdraws items from the safe.

    The manager will also be present throughout the process, but in order to protect the customer's privacy, he will turn his back to the customer when accessing the safe.

    ????????????????? Normally speaking, even the bank¡¯s customers have no way to cheat.  As for their security system, it was specially upgraded because of what happened.

    The system will actively identify the information of all visitors. Once illegal access occurs, the connection will be immediately disconnected and an alarm will be issued.  "

    ¡°That is to say, the security system of this bank is an active defense system.¡± Sergey nodded.

    "Yes. In February 2016, the account opened by the Central Bank of Bangladesh at the Federal Reserve Bank of New York in the United States was hacked, and more than US$80 million was stolen.

    After hackers invaded the network of the Bangladesh Bank, they stole the bank transfer security certificate, then attacked the central bank¡¯s account at the Federal Reserve Bank of New York, and issued more than 30 transfer requests, requesting that the money in the account be transferred to some entities in the Philippines and Sri Lanka.

    The hacker successfully transferred four amounts of money totaling US$81 million to the Philippines. However, when making the fifth transfer, the hacker originally wanted to transfer US$20 million to a non-profit organization in Sri Lanka called the Sarika Foundation, but instead transferred the fund.  The English word "foundation" is spelled "fandation".

    This attracted the attention of Deutsche Bank, the intermediary bank for the transfer, who immediately asked the Bangladesh Bank to verify the information.  The central bank noticed that the account had been stolen and immediately terminated the transaction.

    Although they didn¡¯t get everything, the hackers still stole $81 million.  It was one of the largest bank thefts in history.

    Since then, the Federal Reserve Bank¡¯s security system has been upgraded many times, including the concept of active defense.  It is said to be developed by the American fdx company specifically for this bank. It is a unique security system.

    Including the monitoring we mentioned before, as well as various remote locks.  And it is said that when entering the vault, you need to wear special shoes with chips inside.

    It can accurately record the number of steps and movements of the wearer.  Therefore, whether there are personnel activities at the insurance club will be truthfully reflected in the security system.  The entire system makes a security judgment on whether it is compliant.

    Once a problem occurs, an alarm will be triggered.  "

    "We did not enter according to the formal procedures, so of course there is no need to wear those shoes. In this way, the security system will not be able to read our relevant data." Lin Rui thought for a while.

    ¡°Here¡¯s the problem. Wherever we want to enter safely, we must switch to shoes equipped with chips.

    So if we put on these special shoes, it will be equivalent to exposing our actions to the security system.

    ?The security system will soon discover that this is an illegal intrusion.  Then the security system is activated and the doors in each area are blocked.

    Armed officers will arrive within half a minute.  These armed security personnel have undergone professional training, and it is said that their armed forces can even assume the ability to protect a small and medium-sized city.  "Daniel shook his head.

    "So this security system has to be breached or we have no chance." Cobain paced back and forth.  "We had to cause some part of the system to go offline without causing an alarm."

    ¡°It¡¯s easier said than done. To make such a big change, you must obtain the highest-level administrator rights of the entire system.

    But even the head of the bank¡¯s security department does not have such high-level management authority.  They only have system usage rights, but not system management rights.

    You are an expert, so I don¡¯t need to explain the difference between the two to you.  "Daniel shook his head.

    "So can this security system be accessed remotely?" Cobain asked.

    "I'm afraid not, so if you want to log in to this security system, you have to go to the security director's office in the underground vault." Daniel looked at him with some sympathy.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report