fog city detective

Chapter 73 Sales

Chapter 73 Sales
After 24 hours, things have become clear.

Because of sewers and modern people's preference for pizza, the UK has been plagued by rats and has a strong ability to resist rodenticides. Even the Prime Minister has raised cats to defend against rats.The hardest hit is animal husbandry, with people even taking up sniper rifles to defend their pastures.Many ranchers ask rat trappers to clear the rats on their own sites at the price of 0.5 or even a pound, which even forms an industrial chain.

Some mice were acquired by scientific research institutions, but scientific research institutions prefer artificially bred mice, so most of the captured mice were humanely or inhumanely destroyed.The rats that attacked the Blade were ordered from Edinburgh Rat Masters and transported to London in a lorry.During the two days of transportation, more than [-] mice did not eat, and only barely drank a little water.Going without food for two days did not reduce the vitality of the mice, but increased their predatory appetite.

歹徒投放老鼠的位置是3号楼的地下室、3号楼的下水管和3号楼暖气管道。歹徒明显比伊莎更了解房子构造。这几栋楼的下水管是相通的。3号楼地下室排水口和2号楼地下室的排水口只间隔一堵墙,两根管子朝下汇合成一根大管子。歹徒用物品塞住了主管道,老鼠笼开了一个口对着3号楼地下室的排水管道。只要一开老鼠笼的栅门,老鼠就会朝2号地下室的下水管出口出来。

Heating in the UK is individual heating.The old house has been remodeled and the pipes are close together.No need to chisel walls, just remove some of the exhaust vents to connect the heating pipes of the two rooms together.

The owner of Building 3 is in Norway, and Building 3 is a vacant house.The community watch team explained the situation to Isa about the neighbors. After all, it was a temporary office base, and Isa didn’t care.

In this attack, the gangsters used a remote control mechanism. Opening the mouse cage is a remote control device, and lighting a car in the parking lot is a remote control device.As for the mystery of the package delivered by the deliveryman, it has not yet been solved, and it is not certain that the package that has been burned to ashes is the cause of the rat attack.

After reading and listening to the summary of the case, Isa found a big problem: the attackers knew them well.The criminals knew how many people there were at the base at that time and the location of the base.When the gangsters are set up in Building 3, they always choose the time when they are not at the base.On top of that, Blade's only valuable dozen hard drives and computer mainframes will only be at the base this morning.The gangster knew exactly when the hard drive arrived, which only Isa and Fiona knew.

They exchanged opinions on the data issue three days ago, and they proposed to set up their own database and get all the information related to the police department and counter-terrorism to the blade server.Due to the inclusion of photos and videos, the data is huge and it is not practical to rely on data transfer.Fiona proposed to use the hard disk copy method, copy all the data from the police department, copy it to the blade server, and finally destroy all the hard disks.

Due to Isa's high authority, they can copy materials without the consent of the people in the National Police Agency, so only Isa and Fiona knew about it.The gangster accurately grasps the time, and the premise of the complete implementation of the plan is to know the blade well.How did the gangster do it?

Isa connected to Mark: "Did you lose some special equipment?"

Mark replied: "Yes. A powerful laser bug." After the blade was attacked, Mark knew he could no longer keep it a secret.

Isa wanted to scold her mother. If she knew that a gangster had such a bug, she would take corresponding security measures.Isa asked, "Why are you hiding it from us?"

Mark explained: "Before I thought this laser bug was an experimental product from the British Fungi. Before the dune and your knife showdown, the Mediterranean asked me to hide the existence of this bug. The reason is that this bug's chip is Butterfly News personnel stole it from an ally. Once the eavesdropping device falls into the hands of an ally, it will lead to leg cramps and difficulties in intelligence work. The device we stole is an experimental product based on chip development, and it was given to us for testing purposes. The operational capability of the device. So we cannot admit that this bug was our lost device.”

Isa said, "You should tell me."

Mark said helplessly: "This is an order, I'm sorry."

Isa: "Although there were no casualties in this attack, it made our blade disgraced and ridiculed by everyone. The boss of your mi5 even gave me a business card of a stray pet shelter and suggested that we adopt a group of cats to defend the blade. "

Mark can only say: "I'm sorry, I'm sorry."

Isa asked, "Who are these people?"

Mark said: "At the beginning, we suspected that it was the Chameleon team, but the behavior of this group of people is very different from that of the Chameleon team. For the time being, we haven't figured out their identities."

"I need to answer a call, I'll contact you later." Isa answered the waiting call: "Hello."

"Isa! Hehe, I heard that you were a beautiful woman 20 years ago, and you are very beautiful now. Are you interested in dating me behind your back?" Electronic voice.

Isa smiled and replied, "Of course. Should you tell me your name before the date?" Isa gestured, and Fiona went to work immediately.

"My name is Thresh." Thresh said: "The private words you and Fiona have said in the past few days have made my heart skip a beat. Unfortunately, Fiona and my brother Liang Xi have a close relationship. I have no choice but to ask you out."

Isa smiled and asked, "Handsome guy, how are you going to date?"

Thresh said, "How about £5 million?"

Isa asked, "What do you mean?"

Thresh said: "The hard disk, twelve hard disks, the information in this is very exciting. I believe that rich Arabs will charge a sky-high price to buy it. However, you are so tasteful, of course, you are the first consideration."

Isa: "It's too expensive, how about £100?" Neurotic, will anyone buy these materials?
The first type of person is a fugitive terrorist. He already knows that he is being hunted, and then confirms from the information that he is being hunted. Is he sick?The second kind of person: relatives of the bad guys who were shot to death, do you want to remember the death?The third type of person, the person who is going to become a bad person, has no information about you at all, so what are you going to do with it?

This is a pirated stand-alone version of the data, and if you get the hard disk, you cannot tamper with the data of the National Police Agency, nor can it be updated regularly.The information that can be entered into the system is the information that can be seen by people.Arabs are rich, but they are not stupid.Or want to modify your DNA or fingerprints?
It is only useful to hack into the system and tamper with the data.What can you do with a hard drive?Isa guessed that Thresh was deliberately provoking Blade.After provoking MI5, after provoking the fan team, now it's the blade's turn.Liang Xi may be right, the gang isn't all about the money.

Thresh thought for a while: "100 is fine, but there is a condition."

Isa asked, "What conditions?" She would be happy if she could get 100 back, after all, Fiona spent a lot of time, and the hard drive itself is worth a little money.In terms of value, the only value is undercover action.If you carefully study all the police information, it is likely to speculate on the undercover identity of some of the police's previous operations.

Not to mention that these undercover agents are very old, and it took hours to copy the information. How many people do you need to read the information?
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like