Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 1493 Second Plan

Previous page        Return to Catalog        Next page

    "What's the problem?" Lin Rui asked in a deep voice.

    "Because it is difficult to hide this from these Americans. Their security program will perform regular self-checks in about ten minutes. The improved algorithm will easily detect system problems and then discover that the host has been invaded. So I must  You do it the moment before you act, so even if I am discovered later, you have already successfully infiltrated." Cobain replied.

    "That is to say, you cannot obtain permission in advance." Lin Rui paced, "It must be a few minutes before taking action."

    "Yes, because the whole process should be within seven minutes. Within these seven minutes, I must connect to the host to obtain permissions, and complete the data modification to help you use a fake identity to obtain permissions. And within these few minutes, I must  Clean up all traces of operations within the company to avoid being discovered or even tracked." Cobain said slowly, "As far as our current situation is concerned, I have done my best to achieve this step."

    "Well, I think Cobain is right. They have attached great importance to network defense in recent years. There are some technical limitations that Cobain cannot break through." Shogan nodded.

    "But if he obtains permission a few minutes before the operation, the requirements for our infiltration will be even higher. The time must be accurately controlled to the second, and the slightest flaw will reveal the truth." Crazy Horse frowned.  "For example, if we are slow to verify our identity, the US military personnel on duty will find that our identity is not on the reservation list."

    Lin Rui also nodded and said, "Or we didn't have time to modify the information when we swiped the card, or we didn't have time to crack the password when verifying it. These may all expose the secret."

    "That's right." Cobain sighed and said, "The risk will increase exponentially, but we currently have no other better way, only this plan, which is more practical."

    "Thank you, Cobain. We need to discuss it, and we'll talk about it later." Shoishi turned off the tactical computer.  Walking back and forth, "This is not good news. I didn't expect their precautions to be so strict. Even Cobain is not very sure."

    "I have already said that you need to be prepared with both hands." Sergey shook his head.  "Now it seems that this is simply necessary. If Cobain's network intrusion fails, what remediation should we do, these are all things we should consider."

    Lin Rui was silent for a while and said, "Yeah, let's deal with things one by one. With Cobain's cover and without Cobain's cover, we have to consider it. Now let's put aside the issue of helping Cobain crack the system.  We¡¯ll wait until his equipment arrives tomorrow. Let¡¯s figure out how we¡¯re going to get into the base without Cobain¡¯s cover.¡±

    "It's definitely not possible to break in." Crazy Horse shook his head.

    "Don't even think about sneaking in." Jiang An shook his head.

    ¡°If fakery doesn¡¯t work, then we¡¯ll make it real.¡± Snake Eyes was silent for a while and suddenly said.

    "How can it be true?" Lin Rui frowned.

    "According to intelligence, everyone who enters the Cheyenne Mountain Military Base will be shown on the electronic list, right?" Snake Eyes suddenly said.

    Shogishi nodded, "Yes. However, an electronic list will be formed for everyone who has made an appointment. If there is a person who is not on the list, the soldiers at the checkpoint will confirm it separately. Find out who the person is, who to look for, and what to do.  matter."

    "That is to say, as long as it is on the list, it will not be checked too carefully, right?" Snake Eyes said slowly.

    "Theoretically, that's the case." Jiang An frowned.

    "It's simple. This list is actually a receiving information. That is to say, as long as other military units make requests, they will respond. For example, if people from the Air Force Academy want to enter this base, they can make up a reason and make an appointment in advance.  Yes. It is a bit difficult for us to sneak into other places, but it is very easy to sneak into the academy." Snake Eyes whispered.

    "You mean, we pretended to be the leaders of the college and made up a reason to enter the Cheyenne Mountain Base." Jiang An said with genuine interest.

    "Why not? The principal of the U.S. Air Force Academy has the rank of lieutenant general. Besides, the Cheyenne Mountain Base is an Air Force unit, and most of the officers graduated from this school. He has a lot of connections here." Snake Eyes said.

    "We can't pretend to be the principal. He's too famous. Maybe the guards know him." Lin Rui shook his head and said, "But we can try to pretend to be other people, college staff, or students. Try to use some trivial matters as an excuse.  Anyway, as long as we successfully make a reservation, it will be displayed on the list. This means that we can pass the first level.

    "But what to do next? This is just the first one. It barely allows us to pass through the outermost iron fence, and we can't even enter the tunnel. They will still verify our identity and purpose of coming here, and then give us  IC card for our visitors."He said with eyebrows.

    "Who should we check with? College staff and students generally do not have formal records. They can only be identified through ID cards. If we can find an expert to forge the ID card, then this level of problem is not big." Sergey had an idea.  Yidong said.

    "It's hard to fake, and if you ask what's going on here? What's our answer? We have no idea at all." Crazy Horse shook his head. "This plan is not only risky, but also crazy. We will be discovered outside,  There¡¯s no way to get through the entrance.¡±

    "Their defenses are so tight? Tell me again their emergency procedures." Lin Rui frowned.

    "Okay, more than 20 people are on duty for the tunnel's peripheral defense all year round, concentrated near the entrance. This is the first time around the barbed wire fence. There is another layer inside the barbed wire fence. There are checkpoints outside the tunnel and sniper alerts at high places. The key is that once it is triggered  Alert. The people of Unit 721 will immediately form combat effectiveness and quickly support the entrance.

    And with their fast communication capabilities, special forces will arrive here within a few minutes, drones will immediately monitor the surroundings, and even the Air Force will dispatch a few F35s.  None of this would matter if Cheyenne Mountain did suffer a terrorist attack.  This is a strategic command center with the ability to mobilize all forces of the entire US military.  "Jiang'an explained.

    "That is to say, once the situation at the entrance changes, they will choose to retreat temporarily. They will use the strong internal resistance of Unit 721 and the highly mobile backup of the US military to resolve the battle. Generally, they will not take the initiative to attack." Lin Rui frowned.

    "Of course, this is determined by the nature of their force. This is a guard force. Protecting the Cheyenne Mountain underground base is their goal. When attacked, they will naturally rely on the base to defend. Then, without losing their footing, they can calmly inform  Other troops arrived. Tactically, this is very realistic. There is no problem." Shogan thought for a while.

    "But their response plan has a fatal flaw that can be exploited." Lin Rui smiled slightly.

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report