After all, even though she was angry with Murphy, her ex-boyfriend, she was also thirsty for a long time.

Being a department head of a cia is also very stressful. Facing the boss's making things difficult, the subordinate's obedience and injustice, and the intrigues of colleagues, all of them need to be dealt with with full energy.

She, Heather, is not an iron man, so if she keeps a high level of vigilance for a long time, she will get tired, okay?

Therefore, at some point, it is normal to sit on the merry-go-round to relieve stress, right?

Otherwise, if you are in a depressed state of mind for a long time, even if you are not crazy, you will easily have mental problems.

This is a win-win cooperation.

"Sir, there is a machine assigned to the polar bear's Novosibirsk standby team in 1993, and the status on the inventory list is damaged. It is knocking on our door."

Heather's expression froze immediately.

It was originally indefensible, not because of too much external intrusion, but because of internal intrusion.

I didn't say it, it was definitely done by my own people.

People outside can't figure out the inner working mechanism of cia, and it's impossible to follow some clues to find the machine for inventory reimbursement.

traitor!

She hung up the phone, got out of bed, and started looking for clothes.

bra, vest, jacket...

In less than a minute, Heather turned into that serious professional elite again, with a heroic figure and a cold face.

Her hair was raised high, her face was exquisite, and her figure was skinny.

A small black suit that fits close to the body, with a gray vest inside and matching trousers on the lower body, highlighting Heather's intellectual temperament.

"Wow, aren't you? I left halfway...then what should I do?" Mo Fei spread his hands and said helplessly.

"I have an urgent job, how can I take care of you? Solve it yourself!" In desperation, Heather swears directly, and throws Murphy's clothes on him angrily.

Heather left the bedroom in a hurry, and immediately entered the basement, using the equipment inside, the video connection remote command.

Otherwise, by the time she drives there, the day lily will be cold.

In cyber warfare, every second counts.

"Hey, if you find a woman from the secret service organization as your wife, I'm afraid this will be inevitable in the future!" Mo Fei sighed.

Even though Heather has exquisite appearance, elegant temperament and high income, she is definitely not a good candidate to be a wife.

His interest had been interrupted, and Mo Fei was no longer interested in thinking about messy things. He reached for the silver-gray watch on the bedside table and woke up the red queen.

The setting of the red queen is directional, except that Mo Fei himself can hold it, other people can get it, and wearing it on the finger is no different from an ordinary watch.

"Red Queen, search for the information of the person who is invading the internal information of the cia."

The Red Queen responded quickly, projecting the image inside the Reykjavik bunker.

Every computer and camera inside was instantly taken over by the queen.

Strong artificial intelligence, that's it!

"Everyone, our confidential host has suffered a major invasion, let's put down everything we are doing and deal with it."

Inside the computer room, there was a chaotic scene.

"what's the situation?"

"Sir, that person didn't do anything, no external communication, nothing."

"They found a back door..." Heather said: "I need a reverse access script to locate the source."

"Okay, I'll get it!"

Heather turned on the predictive algorithm on her computer.

As a department head of the Science and Technology Department of CIA, Heather's technical strength is quite outstanding. The prediction algorithm is a set of special algorithms compiled by her own strength.

It is a data mining technique that essentially extracts information from various types of data and uses it to predict trends and patterns of behavior.

Including the prediction of future or other unknown events obtained from the analysis of current and historical facts from various statistical techniques such as predictive modeling, machine learning, and data mining.

In the current situation, Heather decided to use a reverse shell to locate the source of the attack, and then trace the route after discovering the IP.

"Sir, I'll send you the script right now."

"receive."

Heather's fingers tapped on the keyboard with lightning speed, which was actually a bit faster than Nicky's.

“Reykjavik!”

After getting Nikki's ip and doing a traceroute, Heather was given a latitude and longitude coordinate.

After comparing the electronic map, she discovered that the ip originated from a secret operation hacker base far away in Reykjavik, the capital of Iceland.

"Access the power grid there and cut off the power to that building for me!" Heather ordered.

"Yes, sir."

While working under her hand, Heather kept her fingers still, and she was implanting malware into the other party.

Malware is software used to interrupt the operation of computers or mobile devices, collect sensitive user data, gain access to users' private computer systems, or display malicious functions such as advertising pop-up windows.

Speaking of malware, malware is a collective term used to refer to viruses, worms, and Trojan horses that intentionally perform malicious tasks on computer systems.

In this scenario, what Heather used was to remotely implant a Trojan horse in the cia file downloaded by Nicky.

The Trojan horse program may look harmless, it will not reproduce itself or intentionally infect other files, but the Trojan horse can disguise itself and attract users to download and execute it. Once the Trojan horse is successfully implanted, the intruder can destroy, steal files, Malicious behaviors such as remote control of user systems.

As long as the other party opened the document, Heather would be able to track the other party immediately.

Chapter 260 Three: Self-brain supplementation is the deadliest

When the Trojan horse was implanted, Heather counted down to ten and ordered her subordinates to cut off the power to the building.

It's a pity that it's just a little bit worse!

Two seconds before the power was cut off, the other party completed the copy of cia's top-secret information.

"Shit!" Heather slammed her fist on the table. She actually let the other party invade the cia right in front of her, and even let the other party retreat with the object. This is her shame!

At this time, Heather thought of Murphy again, and couldn't help but itch.

If it wasn't for that dead ghost haunting her, she should be in the cia at this time, and the two-second delay would not have caused the current situation.

Of course, it is impossible to blame her for the current situation.

CIA's agents are also human beings, and when she and Murphy were lingering, it was already off-duty time.

And the intruders didn't find the loopholes in the defense system she designed, but found the equipment used by CIA and carried out internal intrusion. Some warehouse managers were very responsible.

With Heather's background, no one can blame her.

So this incident can only be regarded as the group responsibility of the entire cia.

Sitting on the chair, Heather calmed down for a while, then turned on the computer again, and used the predictive algorithm to track down who was the one who stole the cia's confidential documents.

She connected to cia's supercomputer.

As the world's largest spy agency except for the bug of S.H.I.E.L.D., CIA's technical strength far exceeds the imagination of ordinary people.

In fact, military technology is generally ten years ahead of civilian technology.

In many cases, technology that ordinary people have never been exposed to does not mean that it does not exist, and it is likely that it has not been used by civilians temporarily.

As one of the largest sources of Eagle Sauce information, cia uses the most advanced technology. Although it may be far behind Jarvis of Baby Nini, it is not comparable to ordinary individuals or companies. Many things that only exist in the imagination of ordinary people.

For example, a small and convenient telescope can be used to remotely transmit high-definition images in real time for transmission, which is convenient for background analysis and search; the global camera video surveillance system can quickly fix the focus, and the system is large, fast and stable; both static and dynamic images can be locked at a high speed High-precision face recognition technology; use special networking equipment for global monitoring and tracking, real-time monitoring of all information of networking equipment; and Trojan horse implantation, remote intrusion and other technologies.

"Mark, known device."

"View recent activity."

"Recently viewed, sorted by date."

"Christian Disot."

"Female, early 30s."

Heather narrowed her eyes, and immediately entered the search criteria into the predictive algorithm: "Female, 30-35 years old, Iceland, airport or port."

About 15 seconds passed, a series of comparative analysis...

A big, plain face appeared on the screen.

"Nicky Parsons, Operation Stepping Stone."

Heather focused on a piece of information.

"Related to Jason Bourne."

"Jason Bourne?" Heather rolled her eyes a few times, leaned back on the chair, and murmured, "Interesting."

Between this relationship between Nicky Parsons and Jason Bourne, things are almost clear at a glance. The two combined to betray the cia.

She thought of the document that Murphy gave her again, her eyes flashed misty, she fell into thought, and tapped her fingers on the table idly: "Maybe..."

……

Out of the stealth hacker camp, Nicky's footsteps were quick.

Because she knew the rules of cia, if she didn't leave quickly, maybe cia's troops would arrive soon.

Even in Iceland, there are cia offices.

"Richard Webb...David Webb...The Black Rose Project...Operation Iron Hand..."

If Nicky felt that what she expected was right, she must have become the most wanted criminal of the cia now, and her threat level even surpassed Bourne who made those people feel like a thorn in their backs.

After all, Bourne can only physically threaten a few of them, and what he controls is likely to cause the entire cia to suffer a heavy blow.

Originally, her first goal in coming to Iceland was to help Bourne find himself... Well, the relationship between the two of them used to be a bit ambiguous, but they didn't expect to get so many incredible things...

In this way, one can imagine the intensity of the investigation he suffered.

She has to hide.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like