Desperate Hacker

Chapter 38 Peaker

Chapter 38 Peaker
Langley, Virginia, USA!
This is the headquarters of the notorious intelligence agency, the CIA.

At this time, a group of people wearing vests were conducting cross-country obstacle training in the jungle around Langley.

A drone follows them, monitoring their performance.

These images are transmitted back to the data center at the headquarters in real time.

With the rapid advancement of technology, the equipment here is also being updated at an alarming rate.

In fact, most of the technologies on the market, when you see them, mean that these technologies are outdated in the military and intelligence fields.

In the early 60s, when U.S. intelligence agencies were still using tapes to record data.

CIA engineers developed a voiceprint recognition system.

Relying on the phone signals collected by the early warning drone, they can clearly distinguish the voices of those guys on the wanted list who are wanted globally and endanger Uncle Sam's safety, and then locate their presence.

As a Hercules transport plane landed at a nearby airport, several staff on site began to push the cargo out of the plane one by one.

Several of the containers had top secret signs posted on them.

A new generation of standard drones installed by the US military was actually hijacked.

what does this mean?
This meant that Langley's intelligence system was compromised.

Although I don’t understand why this time the target of the attack was an industrial park on the border between Myanmar and Thailand.

But imagine if this drone was hijacked on American soil and the target of the attack was Washington or the Pentagon.

So the threat posed...

Just thinking about this horrific scene makes people shudder.

One of the responsibilities of intelligence organizations is to nip these threats in the bud.

What most people don't know is that if the hard drive is not completely destroyed, even if the data inside is deleted, it can still be recovered.

Some people even say that only by reformatting the hard drive multiple times will the data on it be completely erased.

In fact, what people usually call deletion is just to erase the link identifier of the file.

In the original part, the stored information is actually still there.

Of course, this is a meticulous job, and if an in-depth investigation is to be conducted, general data recovery software cannot meet the requirements of intelligence organizations.

So they developed their own.

Even if it is just a fragment of a hard drive, they can still read the information that was once stored on it.

So these servers were sent to the experimental center, and several technical experts who had been waiting for a long time?
The cracking started immediately.

At this time, in the office outside, Tony Scott was looking through all the information collected over the past few days.

Information about bombed industrial complexes.

and records of searches for escapees from the front lines in Burma.

There is also a series of other information related to this incident.

Bits and pieces of information were brought together.

However, these analyzes alone have not yet allowed them to find the answers they want.

That's how the drone was hijacked?

CIA security experts told them that it was absolutely impossible for someone to hijack those planes without any reason.

So there must be a traitor within. The question is, where does this guy who leaked the information belong?
Is it an insider of the US military or a mole belonging to the Indian Air Force itself?

None of this is known now.

But, a few days before the bombing, a piece of news broke out in that park that caused a lot of discussion.

That is, a doctor from the Chinese Academy of Sciences was once detained in that park.

Logically speaking, this kind of character is very similar to the person they imagined hijacking the plane.

And the incident was too coincidental.

Not long after the doctor named Xu Jun was rescued, the electronic fraud park was blown to pieces.

Is it to vent your anger, or for something else?
No matter what, Tony had to find out.

...While Tony was busy, suddenly there was a knock on the door outside.

The secretary placed a cup of coffee on his desk and told him disappointing news.

"The higher ups rejected our request?"

"what?"

"They said it was too risky and it wasn't worth it for the current information?"

"These old stubborns, do they know that someone has deciphered the key key to the global reconnaissance system? If that guy is willing, there is now a way to hijack a fully armed unmanned reconnaissance aircraft from the nearest air force base and fly it To the skies above Washington..."

"You'd better report this matter to the superiors yourself!"

"Forget it, I'll make a call!"

Tony Scott was talking.

Then there was a knock on the door, and then a somewhat reserved Chinese subordinate wearing glasses stood at the door.

"Come in!"

Scott greeted the other person, and then the guy came in.

"Director, we found something that might be important!"

"Tell me in the simplest way, what did you find? My time is limited now..."

"In the first period of modification of log information, we found that there was logo information on the server for a period of time, and the time record was not quite right..."

"What do you mean?"

"This is some content that we tried our best to recover. It seems to be some conversations. Someone asked for help from the outside world, and then the guy agreed, but put forward conditions..."

Scott quickly picked up the report handed over by the other party, and then read it carefully.

There were some superficial codes on the report, but it didn't look like it was made by professional intelligence personnel.

"What does H mean?"

"110 is the police number in China, but here it's 911!"

"That is to say, at that time, someone in the electronic fraud park asked for help from the outside world!"

"Probably so!"

"Are you from China?"

"Yes, but I am an American now and loyal to the United States!"

"Very good... It seems that the guy who called himself Peaker in the conversation... should be the person we are looking for..."

……

Scott didn't know at this time that at the same time the Chinese man was reporting to him.

A very handsome man with Persian ancestry was slowly driving away from here.

When he passed by the laboratory just now, he said hello to the Asian colleagues inside.

Then after getting off the night shift, he drove all the way to his favorite Turkish barbecue restaurant in the city.

After ordering a barbecue set meal, he did not enjoy it in the store, but drove to a nearby park.

Then he sat next to a man who was reading a newspaper.

"Is there something important? Contact me suddenly?"

"A ridiculous thing happened. Someone has the key key to hacking into the CIA's aerial intelligence network?"

"What do you mean?"

"The drone that India attacked Myanmar before was actually hijacked. The hacker who hijacked called himself Peaker!"

"This is impossible!"

"It's absolutely true. If we can find this person, maybe we can solve the trouble you are currently facing! But the CIA is also investigating simultaneously, so you must be one step ahead of them..."

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like