Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 3811 Investigation Mission

Previous page        Return to Catalog        Next page

    "Investigating a private company? This does not seem to be our business scope. And I believe that your CIA is better at this type of investigation than us." Lin Rui shook his head and said.

    "We are indeed better at it than you, but we can't do this. So you have become our best choice, after all, you have the best infiltration experts.

    The O2 team has many successful infiltration experiences. According to our records, you have even had the experience of infiltrating the North American Aerospace Defense Command in Cheyenne Mountain.

    The underground nuclear defense facilities are heavily guarded and armed soldiers guard them day and night.  You all were able to infiltrate successfully, so it won't be a big problem this time.  "Mr. K looked at Lin Rui and said.

    "But the situation that time was different from the situation we are facing now. The security assessment we undertook for that mission only required the discovery of infiltration vulnerabilities.

    But this time, what we are facing is a top private company, which also has ultra-high-level security measures.  And we don't know yet, exactly what we're looking for.  "Lin Rui shook his head.

    "Relevant information and files related to virus research." Mr. K replied, "We need to know what stage their research has reached."

    "But such a secret research. How could they keep a record at their company headquarters?" Lin Rui shook his head.

    "The projects they are researching are very cutting-edge and very dangerous technologies. This means that all their research results must be absolutely confidential and must be properly kept. Therefore, all the storage technology they use is so-called cloud technology.  "Mr. K replied.

    "Cloud technology?" Lin Rui frowned.

    "A type of distributed computing technology, its most basic concept is to automatically split a huge computing processing program into countless smaller subroutines through the network, and then hand it over to a huge system composed of multiple servers for search  , After calculation and analysis, the processing results are returned to the user.

    Through this technology, network service providers can process tens of millions or even billions of information in a matter of seconds, achieving network services as powerful as supercomputers.

    The management middleware and resource pool layer are the most critical parts of cloud computing technology. The functions of the SOA construction layer rely more on external facilities and application services.

    One of the important applications is cloud storage.  It is an online storage model that stores data on multiple virtual servers, usually hosted by third parties, rather than on dedicated servers.

    Their research team will save their research results in the cloud in a timely manner for confidentiality and data security.  These virtual servers are built within their company.

    This ensures to the greatest extent that data will not be lost and can be accessed immediately.  Because the data is stored within their company and uses virtual servers, it is very safe and can avoid tracing.  "Mr. K replied.

    "That means we need to find their servers and steal their data on experimental research on this virus." Lin Rui frowned, "This is a technical job, we can't do such a thing."

    "As far as I know, you have experts in this field. Cobain is still in your company, and he and his team can be said to be a truly top hacker team.

    You only need to be responsible for infiltrating, and he can do the rest through remote operation.  In other words, you are responsible for sneaking in, and he is responsible for stealing data.  "Mr. K looked at Lin Rui and said.

    ¡°It sounds like this task is quite complicated. I don¡¯t have too many difficult tasks, but I don¡¯t like complicated tasks very much.

    Because it is complex, it means that the entire task must be composed of multiple links, and if any one of them goes wrong, the task will be ruined.  What if it fails?  Lin Rui shook his head and said.

    ¡°We have made proper arrangements. If it fails, a private hacker organization will take responsibility.

    ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? Remember the shadow agent organization we dealt with before?  They are a radical hacker group dedicated to fighting governments and international corporations.  It is reasonable for them to take the blame in all aspects.

    You don¡¯t have to worry about these.  What you have to do is sneak into that company's data center, steal the data, and then return safely.

    If the mission fails, withdraw everyone in time without leaving any evidence.  Mr. K nodded.

    "You guys have really arranged everything perfectly. The mission hasn't even started yet, and the people who will take the blame for you are already ready." Lin Rui mocked.

    "Be prepared. They are very vigilant and we cannot alert the other party. In fact, this mission, in the words of you Chinese, is a one-shot deal. If it can be successful, it will be successful. If it cannot succeed, there will be no more missions in the future."?Opportunity.

    This deadly virus will spread in Africa, killing a large number of innocent people, and the secret society will achieve the results they want and gradually control northwest Africa.  "Mr. K replied.

    "Don't sound so righteous. We are not the superheroes you Americans call us. We are just mercenaries. We never care about how many people die, we only care about whether the pay is appropriate." Lin Rui shook his head.

    "We have never let you down in terms of remuneration. This time will be no exception." Mr. K smiled.

    "I understand what you mean. We have taken over this task." Silver Wolf Michelle nodded.

    "Very good. We will send you relevant intelligence information later. In fact, we have already mastered a lot of information, which will definitely be helpful to your mission." Mr. K nodded and walked out.

    After Mr. K left, Lin Rui asked Silver Wolf Michelle in a low voice, "Mr. Michelle, are you really planning to take on this mission?"

    "We have no other choice. The technology the secret society is researching is very dangerous. And its main target should be the Maghreb country in northwest Africa.

    Most of these countries are our financial sponsors or partners.  If something happens to them, we will lose more than 60 to 70% of our business in Africa.  This is a fatal blow to us.

    For example, these countries are sheep farmers, and we are employed by them to shear sheep.  Once all the sheep die, not only the farmers will be unable to survive, but the shearers will also lose their jobs.  "Silver Wolf shook his head and said.

    ¡°But I don¡¯t think this matter is too simple. Although Mr. K¡¯s words are upright, I don¡¯t believe him at all.¡± Lin Rui shook his head.

    "He is the spy chief of the CIA, and I won't trust him. However, business is business. And from the perspective of the overall situation, it is best for us to accept this mission.

    We alone cannot fight against the secret society. In this case, we must take advantage of the situation, and the CIA is a force that can be used.  "Silver Wolf whispered.

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report