Chapter 2019: Strong security


"There is always a way.???" Lin Rui looked at the No. 6 area on the map, slowly speaking. "No place is absolutely closed."
"That’s right in theory. As a large military base, the U.S. military has recently mobilized personnel frequently due to exercises, so it’s relatively easy to enter the inside of the Phils Eck base. But it’s true that you have to enter the No. 6 area of ​​the base. It's not easy. Even insiders must hold a CIA certification, including a series of complex security measures such as fingerprint recognition and electronic keys." Kobain replied.
Lin Rui pondered for a while and said, "Then, can you and your team perform network penetration?"

I’m afraid it’s difficult. I’ve talked about this question last time. The CIA has recently carried out a series of firewall upgrades, and the encryption program has adopted a new algorithm. Even our team can’t hack into theirs through ordinary methods. System." Cobain told the truth.
"What the hell? Man, don't you always say that you are omnipotent?" Sergey complained.
"Any ability has a boundary. We never said that we are omnipotent." Cobain shrugged, "but we still have some clues. For example, the security and defense outside the 6th area, we have basically grasped. Including their personnel, location, and work and rest time. But we really don’t have much information about the interior of Area 6. We only know that the security system they use is produced by the German sIemens Siemens. It is specifically aimed at highly confidential areas. security system."
"Tell me specific." Lin Rui nodded.
"This system includes many oTn optical fiber network transmission points, optical fiber network dedicated video input/output modules, dozens of sets of digital video recording systems for monitoring. One intelligent redundant hot backup system, multiple monitors and terminal displays Screen. Hundreds of fixed indoor cameras, 52 outdoor cameras, 75 dome cameras, and hundreds of cameras with PTZ control connected to the early warning system, multiple management workstations. Almost no blind spots can monitor the entire building." Ke Ben replied.
"Damn, no blind spot monitoring. If we want to sneak in, we are walking in front of all the guards." Sergey was speechless.
"Not only that, these surveillances use brand-new digital video codec and video compression technology, built-in hard disk for local storage, and even if the network fails, important video data can be preserved. High-accuracy motion detection function, anti-destructive detection Function, for the camera shift, signal loss, virtual focus, occlusion can be accurately identified and alarm. This means that we can not interfere with these new types of monitors.
The video motion detection and tracking software designed for special security department applications is even more powerful. You can set up to 1o1376 detection fields, use special statistical methods to compare images to ensure constant signal strength, independent of the degree of the object, can identify and analyze the size, movement direction, path, etc. of moving objects, and have multiple objects The ability to analyze at the same time. At the same time, it can perform perspective analysis, virtual line protection, regional dynamic protection, and can overcome the influence of natural phenomena such as wind, rain, and snow, and use it all-weather. "Cobain replied.
"What do you mean?" Crazy Horse looked blank.
"That is to say, even if you are in high exercise or in the smoke, these monitoring devices can accurately identify your actions and transmit the data to the server. Then use the recognition software to reshape your behavior characteristics. You His appearance and posture will be restored in time. So as to analyze your identity.
Cobain replied,
If you want, you can even print out the real model of these data through 3D printing technology. This is almost impossible to hide. ."
"Well, it is indeed very powerful, but these things can also be destroyed." Lin Rui shook his head.
"I haven't finished talking yet. Strong monitoring capabilities are only part of the security system. There is also an access control system, which provides comprehensive access control, identity authentication, alarms and multiple security management functions. But these are not too big problems. , Sergey should be able to handle it." Cobain replied. "If you manage to avoid these surveillance and break all the access control, then you have to enter the second basement of the building. Because that is the real detention area, and the two Russians are locked there."
"Sounds difficult." Sergey nodded. "This is really a challenge."
"It's not over yet." Cobain shook his head. "Even if you rushed into the detention area and rescued the person you want to save, there is only a few minutes left for you to escape. At that time, you should have triggered the alarm, and The entire base is under martial law. You have to rush out of thousands of US troops within a few minutes. The other side is not only crowded, but also has light and heavy weapons, including helicopters and Stryker armored vehicles, and even tanks. And chariots."
"Damn, no matter how you listen to this task, I think it is a death-seeking task." Sergey looked depressed.
"Since I got this task, I have made countless assumptions. The final conclusion is that if you really get there, then the only chance to survive without being shot is to kneel on the ground and raise your hand to surrender." typical.
Lin Rui shook his head and said, "Okay, Kebain, I am here to ask you to help me. Not to let you spread pessimism. Maybe this task is a bit nonsense, but we don't have no chance. Just analyze it carefully. They can find flaws. Technically speaking, they do have the advantage. But sometimes, the technical advantages are not all. Too much dependence on technology can lead to mistakes."
"For example?" Sergey looked unconvinced.
"Any technology has its limitations." Lin Rui shook his head, "If we find this limitation and make use of it, we can try to fight against them. Sometimes when the opponent is very careful and smart, some simple and crude methods will often change. It is more effective. Because the opponent considers very carefully and defends very high-end, but never expect that we will act in the most stupid but most effective way.
For example, if someone has built the best safe ever, even a smart thief can hardly open it. He thought he was safe. But I didn't expect a stupid thief to come, and they would not bother to pry your high-end safe, went directly on the crane, lifted his roof, hoisted the safe on the truck, and left. "
"Puff!" Yelena couldn't help laughing.
Sergey listened for a long time and nodded, "It seems to make sense. But why doesn't it feel right? I'm going, you are mocking me for being a stupid thief?!"
(End of this chapter)
Latest chapter of Ebook Battlefield Contractor Click here