Deborah wiped her mouth with a white napkin and clapped her hands. Someone sent a flat plate to the front of the tortured nunnery. It was playing that Glen was in a coma and injected a bottle of red potion. Glen was confused when he woke up. He said what he had and said what he asked.

And these he would rather be cut off ten fingers than say, trying to protect, have long been mastered by the other party.

Looking at Deborah's vicious smile, Glen was almost crazy. He hissed, "why?"

His contact information with the killer company behind the scenes has long been known by the other party. Even if Glen doesn't know much, it is enough to give them clues to the investigation. He is just a chess piece and doesn't know much. He just thinks he is a big man.

Deborah smiled, "I just want to know how stupid you are."

Deborah made a gesture. The big man twisted Glen's head and immediately twisted it to face back. In this way, he won't die. That's superman.

After getting the information he wanted, Deborah immediately arranged for two top hackers to investigate.

They had the login method of Glen's dark network and contacted each other. According to the information extracted from the Internet, they learned Glen's way of speaking and tone: "the idea goes hand in hand, I want to add money."

The other side's pop-up window pops up: "four million! No more!"

"I quit? I don't have a chance."

The other party: "you have received the deposit! As a result, only two marks died. You died."

"I want time."

"We have patience. After we kill mark, the money will call you."

With that, the other party went offline.

Deborah's hacker Brad said: "the other party is very careful, but we have specially designed honeypot software, which can quickly track the other party and lock their ID address."

Deborah said, "how fast is it soon?

Brad said: "ten hours, the concept of dark network was put forward by military scientists in 1994. In May 1996, three scientists from the Naval Research and Experiment Institute submitted a paper entitled" hidden path information ", which proposed to build a system so that users will not disclose their identity to the server when connecting to the Internet. They called it" onion routing " , because the password to protect data is like an onion. In October 2003, this idea began to be officially implemented. The system was originally named tor, which is the acronym of "onion routing", and later called "deep network". Its design is so sophisticated that the designer himself can't destroy it. In the early days of the Internet, users can use pseudonyms to create on the network "Another self" has nothing to do with the real identity in life. However, with the development of the Internet, especially the emergence of "facebook" website, the online identity of netizens coincides with the real identity day by day. Now, wherever we go, we are spreading our own information: our browsing traces, video preferences, social circles, and even where we are. But not on "Shenwang"

Deborah said, "why don't you tell me these useless things? Why don't you hurry?"

Brad Road: "Is it easy to crack the secret system of this onion? It has been given to the FBI faster. Unless you use a supercomputer, I can rank in the top 10 in terms of notes. Guys, do you know why the government wants to build such a system? There are many reasons. Using it, the police can investigate illegal websites without alerting the snake; the military and intelligence agencies can make secret contact; the state affairs department The academy can train foreign dissidents. The characteristic of the dark network is "absolute invisibility" , the website is invisible, the user's identity is invisible, and the IP address is invisible. When we wander around various websites every day and expose our identity and whereabouts at will, these dark network users are doing whatever they want in the online world. Many people just see the invisible characteristics of the dark network, so they begin to do all kinds of things they can't do in the surface network and real life As the invention of the world wide web first announced, it can do everything. "

After chatting for a long time, he found that the other party didn't listen. He was only on the phone, shrugged and continued to work on his notebook.

Deborah finished the phone call and showed the text message in her mobile phone to Brad: "supercomputer remote login permission." he took out a pistol and slapped it on the table: "you only have two hours! If you dare to do anything else with it, don't blame me for not thinking of friends."

Brad landed on the supercomputer host: "shit! This is so exciting. Is this the host of that company?"

Dipola said, "if you want to die, you can check it."

Brad shrugged and used the supercomputer host. He was like driving a Super Star Destroyer. He was very powerful. Lightning cracked one firewall after another and encrypted instructions. Soon he locked the other party's ID and hacked into the other party's system. He was very interested. After transferring the other party's file, he immediately transferred it to his notebook and shouted: "I won't do anything! You have the Star Destroyer."

They used this high technology to quickly lock in each other.

He immediately called Stanley, "boss, we're locked."

Stanley said, "don't keep alive!"

It's naive to find out the real murderer behind the scenes when you find the killer company? Who would foolishly tell a group of killers their identity? The two sides trade through intermediaries.

This is an example. In my territory, no one can mess around without my permission.

Deborah said, "I see!"

The headquarters of the killer company is a publishing company. They use this to hide their identity. The killer company named seaman is dressed in the cloak of a publishing company and is engaged in murder. It is famous both in the light and in the dark.

But what makes people feel terrible is that the second order doesn't know that there is such a famous killer company in their territory, which shows the depth of each other's hiding.

This is also related to the fact that there is no business between the two sides.

However, seaman company is unlucky tonight. Since they are criminal organizations, they naturally have strict security here and advanced high-tech security system, but there is nothing on the surface?

People in the second order cover up in all directions.

Brad broke through the other party's firewall and took over their system. He immediately said, "action!" he cut off the other party's power as he said.

There are two sets of power supplies here. The normal power supply is cut off and the backup power supply is started immediately. However, he was cut off immediately as soon as he started, and the whole building is dark.

The law enforcement team of the second order was armed. They wore night vision helmets and fired a large amount of tear gas. It is exaggerated that three helicopters rushed to, one attacked from the roof, and the other two provided fire cover from the side floor. If Fargo of the Los Angeles Police Department saw it, he would marvel: "thieves are more powerful than soldiers“

As the nest of killer companies, seaman company hides many killers, and their response is not man. Almost at the moment of power failure, there is a response mechanism immediately. Some people resist with guns and others destroy data.

But all this was futile in the face of the other party's overwhelming offensive. The other party took a black raid, well-equipped, powerful firepower, and also used a large amount of tear gas. Although these killers were powerful, they were attacked, their eyes were invisible, and choked with gas. The battle started in an instant and ended soon. These more than 30 killers were not killed To kill is to be captured.

It took seaman nearly ten years to establish the company, but it was destroyed in almost two minutes. Even the important information had no time to be destroyed, and they didn't know who their opponent was.

The people in the second order quickly cleaned up all floors and eliminated these killers one by one. The dead and undead were repaired. There is no possibility of fooling around.

The captured seaman snapped, "who are you? Why kill my family!"

At first, he thought it was the special police of the police, because the other party used the same equipment and tactics, but judging from the ruthless style of the other party, the people of the police would not do so. If they fell into the hands of the police and followed the judicial procedure, there was always a glimmer of vitality. If they were in the hands of the opponent, they might not have at all.

Deborah came out and introduced herself: "Deborah, chief legal officer of the second order, I need your cooperation, Mr. seaman."

Seaman said, "we have no hatred. Why did you kill me?"

Deborah said: "the second order is dignified and orderly in California. You run a killer company here without our permission. It is an unforgivable challenge to our dignity and dare to touch our customers."

This is authoritarianism. I can do it, but you can't. If not, how can they call themselves the second order?

Under Stanley's leadership, this second order is not as powerful as before, but it is stronger and more controlling.

Seaman said, "I would give everything, but please spare my life."

Deborah said, "you are of no value to us unless you know who wants to kill mark."

Seaman said, "we never ask or get information from guests. If so, business can't go on."

Deborah said, "hand over everything. I promise to kill only the people in your company, or even the nine families. This is a warning against our authority."

Seaman said, "what is killing the nine families?"

Deborah said, "this is one of the ancient oriental punishments, that is to say, if a person breaks the law, he needs to kill all the people who have contact with him. For example, his parents, brothers, sisters, uncles, elders and relatives on his wife, there are nine types, which can basically kill all the people who have relationship with him, eliminate contacts and the possibility of revenge."

Seaman was shocked and said, "you can't do this!"

Deborah said: "of course we can. In fact, I'm the person in charge of this project. We will choose the list and make it into robbery, shooting, car accident, etc. It's like death in the movie. They all died in an accident. The police can't find out anything, and we cut the roots."