Chapter 3812: Investigation task
-
Battlefield Contractor
- Don't do it
- 1139 characters
- 2021-01-31 12:17:31
"Investigating a private company? This does not seem to be our business scope. And I believe that your CIA is better at this type of investigation than we are." Lin Rui shook his head.
"We are indeed better than you, but we can't do that. So you have become our best choice, after all, you have the best infiltration experts.
The O2 team has had many successful infiltration experiences. According to our records, you have even infiltrated the Cheyenne Mountain North American Air Defense Command.
Underground nuclear facilities are heavily guarded and armed soldiers guard them day and night. You can all sneak in successfully, this time it must not be a big problem. "Mr. K looked at Lin Rui and said.
"But the situation that time was different from the situation we are facing now. The security assessment work that we undertook for that task, as long as we found a loophole.
But this time, we are facing top private companies with super-advanced security measures. And we still don’t know what we are looking for. Lin Rui shook his head.
"Relevant materials and files related to virus research." Mr. K replied, "We need to know where their research has reached."
"But such a secret study. How could they keep a record in their company headquarters?" Lin Rui shook his head.
"The projects they are researching are very cutting-edge and very dangerous technologies. This means that all their research results must be absolutely confidential and must be kept properly. So all the storage technologies they use are so-called cloud technologies. "Mr. K replied.
"Cloud technology?" Lin Rui frowned.
"A type of distributed computing technology. Its most basic concept is to automatically split a huge computing processing program into countless smaller subprograms through the network, and then submit them to a huge system composed of multiple servers. , After calculation and analysis, the processing result will be returned to the user.
Through this technology, network service providers can process tens of millions or even billions of information within a few seconds, and achieve network services that are as powerful as supercomputers.
The management middleware and resource pool layer are the most critical parts of cloud computing technology. The functions of the SOA building layer rely more on external facilities to provide services.
One of the important applications is cloud storage. It is a mode of online online storage, that is, storing data on multiple virtual servers usually hosted by a third party instead of dedicated servers.
Their research team will save their research results in the cloud in time for confidentiality and data security. And these virtual servers are built inside their company.
This ensures that the data will not be lost to the greatest extent and can be accessed immediately. Because these data are stored inside their company and they use virtual servers, they are very safe and can avoid tracking. "Mr. K replied.
"In other words, we need to find their servers and steal their data about this virus test and research." Lin Rui frowned, "This is a technical job, and we can't do such a thing."
"As far as I know, you have experts in this area. Cobain is still in your company. He and his team can be said to be a real top hacker team.
As long as you are responsible for sneaking in, he can do the rest through remote operations. In other words, you are responsible for sneaking in, and he is responsible for stealing data. "Mr. K looked at Lin Rui and said.
"It sounds like this task is quite complicated. I don't have very difficult tasks, but I don't like complex tasks.
Because it is complicated, it means that the entire task has to be composed of multiple links, and if any one of the links goes wrong, the task will be lost. What if it fails? Lin Rui shook his head and said.
"We have made proper arrangements. In case of failure, a private hacker organization will take responsibility.
Remember the shadow agent organization we dealt with before? They are a radical hacker organization dedicated to fighting the government and international corporations. It's up to them to carry this black pot, and all aspects can be explained.
You don't have to worry about these. All you have to do is sneak into that company’s data center, steal the data, and return safely.
If the mission fails, withdraw everyone in time without leaving any evidence. "Mr. K nodded.
"You really arranged it so that it didn't leak. The task hasn't started yet, and the people who will help you with the scapegoat are already ready." Lin Rui mocked.
"Be prepared. They are very alert and we can't alarm each other. In fact, this mission is a one-shot deal in your Chinese words. If it can be done, it will be done. If it fails, there will be no chance again.
This deadly virus will spread in Africa and a large number of innocent people will die. The secret society will achieve the effect they want and gradually control northwest Africa. "Mr. K replied.
"Don't say so awe-inspiring, we are not the kind of superhero you Americans say, we are just some mercenaries. We never care about how many people die, only care about whether the compensation is appropriate." Lin Rui shook his head.
"In terms of remuneration, we have never let you down. This time it will be no exception." Mr. K smiled.
"I understand what you mean. We took this task." Silver Wolf Michelle nodded.
"Very good. We will send you relevant information materials later. In fact, we already have a lot of information, which will definitely help you in this mission." Mr. K nodded and walked out.
After Mr. K left, Lin Rui asked Silver Wolf Michel in a low voice, "Mr. Michel, do you really plan to take this task?"
"We have no other choice. The technology that the secret agency is studying is very dangerous. And it should mainly target the Maghreb countries in Northwest Africa.
Most of these countries are our sponsors or partners. If something happens to them, we will lose more than 60 to 70% of our business in Africa. This is a fatal blow to us.
For example, these countries are farmers who shepherd sheep, and we are employed by them to shear sheep. Once all the sheep are dead, not only the farmers will not be able to mix, but the sheep shearers will also lose their jobs. "Yinlang shook his head.
"But I don't think this matter will be too simple. Although Mr. K said awe-inspiringly, I don't believe him at all." Lin Rui shook his head.
"He is the spy leader of the CIA, and I won't believe him. However, business is always business. And from the perspective of the overall situation, we'd better take this task.
We cannot fight the secret agency alone. In this case, we must take advantage of the situation, and the CIA is a force that can be used. "The Silver Wolf whispered.