Font
Large
Medium
Small
Night
Prev Index    Favorite Next

28 peekaboo, hide and seek

If the war theory of war power in ancient times, such as sea control, air control, electromagnetic control, information control, space control, etc., are all human beings' profound understanding and application of the dimension of time and space, then to this day, the theory of war power that utilizes and counter-uses, fights and fights in the era of interstellar war has even shown an unprecedented appearance with the continuous replacement and progress of technology.

In the deep starry sky, five patrol boats have gradually occupied positions in the space orbit of the frozen stars, and are posing for maneuvering at any time.

As time passes by minute by minute, the hidden and seek game of searching and hiding gradually reaches a white-hot state, and the entire frozen star is shrouded in the gloomy and desolate atmosphere.

These sneaky visitors who claim to be the Border Guard's National Assault Force (NSF) "Emergency Search and Rescue Team". While constantly sending hyperspace messages to get the target response signal, they also call on various data on the "microsatellite constellations" for competition and analysis, and use the hyperspace detection equipment on the boat to scan the entire frozen star back and forth, using the dragnet method to find the location of the target person.

In the interstellar void, various models of "hyperspace detection scanning array" equipment can use hyperspace technology to detect nearly real-time ultra-long-distance messages in the far deep space universe, and can suppress and filter interference from various "signal-noise backgrounds", correct distortion signals, and achieve synchronous hyperspace imaging observations. However, its detection capabilities will still be affected by the performance limitations of the equipment model itself and the "signal-noise background" composed of various cosmic environmental parameters, which may lead to a reduction in detection distance, a shortening of detection depth, a decrease in detection accuracy, and a decrease in resolution.

This is already the case in the relatively single interstellar void. When performing hyperspace detection and scanning operations in the inner planet, the effect of the complex environmental parameters of the inner planet is far less than that of the interstellar void. Therefore, when performing the scanning operation of the inner planet, the performance requirements of the "hyperspace detection and scanning array" equipment are higher, and ordinary civilian equipment is completely incompetent. It is not easy to find a hidden target person on a huge planet. Although people can use the detection and scanning capabilities of the "hyperspace detection and scanning array" equipment, it is only a little less difficult than finding a needle in a haystack. This requires that the target planet is not protected by the "spatial interference and shielding network". Otherwise, it is impossible to use hyperspace detection and scanning equipment to scan and search the entire planet. On the contrary, traditional ancient electronic radar, optical observation, and photoelectricity

Remote sensing, sound-light remote sensing analysis, spectral observation, infrared imaging and other close-range observation methods are more competent for this search and scanning operation. The "mental remote sensing" that relies purely on the sensory capabilities of smart humans is the most effective means to scan and search the inner circle of a planet so far. Obviously, for hackers who are accustomed to staying away from the work site and performing remote attack and remote control cracking in a single information space dimension, anti-natural "mental remote sensing" is one of the things they cannot do under the current situation. What hackers can rely on is their supercomputers, intelligent servers, and various advanced detection, communication, intelligence, surveillance, command, control and other technical equipment systems. With their powerful computing power and excellent hacking technology, they still have hope to search, lock the target position in the shortest time possible, and remotely control the weapon system on the patrol boat to launch an attack and destroy the target.

In Louis' case, he did not believe in those sneaky visitors who claimed to be government emergency search and rescue teams: first of all, because they (they) arrived too early, with Louis's understanding of the border guard management system and the time necessary for the return of rescue information, the real government search and rescue teams should never be so early from emergency dispatch to the real arrival of the frozen star field. This is the reason alone, Louis would not believe them;

Another is because the smart shackle rings all have passive trigger signal transmission modules, which have stable and powerful performance. Under ideal conditions, federal prison institutions can use the trigger information sending module at any time to grasp the real-time location information of prisoners. Although this is a national level 4a top secret, the external publicity of the smart shackle ring does not include this function, and ordinary citizens and prisoners have no way to understand it. They generally only know that the smart shackle ring uses special alloys and can be detected and locked by special instruments for military and police within a certain range (this is indeed undoubtedly, but the real scanning detection distance is very limited, only within the detection radius of the instruments for fifty kilometers.

Only when the target is accurately locked by a special instrument, the target will be completely lost after more than 300 kilometers). That is to say, a real government search and rescue team should be able to apply for a temporary trigger key of the smart shackle ring from the prison through formal channels (with time limits, expired and invalidated) to quickly determine his location. Usually, it does not require back and forth to use detection and scanning equipment to determine his real-time position coordinates with a net-like method. Louis has long inferred this state secret from some information provided to him by Sieger Military Resources and Security Consulting Company, so he can use this to judge and determine that the "coming is not good."

Since the visitor's sneaky and incompetentness were confirmed, Louis was almost certain that these guys who claimed to be government rescue teams were simply fictitious. Ninety-nine percent were hackers who had previously invaded the command and control center of the prisoner's transport ship, and tried to kill him - either the "hacker mercenaries" who worked hard for money or the terrorists of a "hacker club". Anyway, they were not good birds - these people were definitely not on the patrol boat at this time, but in the high-end office buildings or villas of a certain administrative planet, remotely controlling the instruments and weapons loaded on the five patrol boats, trying to find and kill him.

How could Louis be willing to show up at this time?

Carefully sneaking in the hot magma, Louis regretted not sinking into the deeper strata earlier. At this time, it would not be so convenient for him to enter the inner circle strata closer to the core through short-distance transitions. The special transition energy fluctuations are really easy to expose his location, and the danger coefficients rise straight up. At this critical moment of hide-and-seek, and it is related to his life and death, it is not cost-effective to do those unnecessary adventures - only when the other party takes action, the space energy fluctuates violently, and the signal-to-noise background completely submerges the fluctuation frequency of the short-distance transition, he has the opportunity to take a risky jump, and this opportunity is often fleeting and difficult to grasp.

In theory, procrastination is beneficial to Louis. The later the Louis is discovered and locked by the other party, the safer it is.

However, Louis knew very well that procrastination was just his delusion. Since the other party dared to come, he would definitely want this and would have the corresponding equipment to deal with his procrastination tactics.

As expected, when the remote survey was temporarily fruitless, the sneaky guest quickly tore off his warm veil and showed his hideous fangs.

These sneaky visitors obviously had prepared in advance, and each patrol boat was equipped with a hyperspace multi-dimensional directional focus ‘worm remover’ system.

Compared with those hackers who act relatively mildly, mostly legal sources of income, and low social harm, hackers with extremely high social harm are all people with hundreds of thousands of federal coins a minute. The illegal business they engage in is extremely high, so they are naturally unwilling to hide and seek with a serious prisoner in this ice and snow. Louis can consume time, but they cannot afford it. Previously, they could not deceive, but as soon as the remote survey operation was over, the hackers immediately began to intensively cover and focus on the entire planet, especially the "blind spots" for the detection that the target may hide. The hackers even turned up the intensity of focus and did not care about the damage to the geological structure of the frozen star at all, even if their behavior was defined as terrorist acts in federal law.

Hyperspace multi-dimensional directional focus technology, a government control technology that is not often used, is mainly used to remove potential threats on certain administrative planets, such as certain high-risk organisms, bacteria, viruses and other deadly microorganisms. In the history of the Milky Way, it was used to thoroughly clean up high-risk biochemical research products in serious biochemical leakage accidents, so it has a nickname - "worm remover", and the most professional "worm remover" equipment system in the Galaxy Federation is the "Lancet" produced by the "Taurus Consortium".

The ‘worm remover’ system is similar to the ancient medical gamma knife, which irradiates the lesion target foci through ‘hyperspace three-dimensional directional focus’ to remove the lesion site. However, the prerequisite is that there is no spatial environment with ‘spatial interference and shielding network’ or if there is no spatial interference device such as ‘transition interference bomb’ is used, ‘hyperspace multi-dimensional focus’ can be achieved; another point is that ‘multi-dimensional directional focus’ requires strong computing power and energy support.

Although the 'worm remover' system is very powerful, with the number of only five patrol boats, in order to reach the level of dense coverage, the number of its system nodes is obviously insufficient and cannot be compensated with quality advantages. Therefore, there must be many gaps in the space area where it acts, and it cannot completely block Louis's activity path.

The hackers obviously just want to use the "worm remover" system to compress the target's range of activities and gradually drive the target out of the hiding point to facilitate their next attack, just like spraying insecticides in the room, driving the hidden insects out of their hiding place and then killing them.

While the hackers carried out a "worm removal" attack, Louis took advantage of the momentary opportunity of violent fluctuations in space energy to jump to a deeper stable formation at a short distance, and covered up his whereabouts with the huge and chaotic energy environment deep in the earth's core, which won him some time, but it would not delay it for too long.

The ‘worm remover’ system continues to focus on illumination, and Louis keeps moving.

The "worm remover" system does not blindly focus back and forth on the illumination. Each directional focus has a specific purpose. Through repeated focus illumination, the energy explosion point impacts, and sneaky visitors are getting closer and closer to the target of "locking Louis".

The focus of the 'worm remover' system is no longer densely covered, but a time difference and azimuth difference. As both sides frequently maneuver one attack and one defense, focus and illuminate, the angle of the impact point changes rapidly and adjusts continuously, gradually forming a surround and drive away Louis from all directions. This is obviously a logically rigorous probability calculation, and the knowledge of geometric structure, spatial structure, mathematical analysis and other aspects is used in a very exquisite way, and the intuitive prediction ability of the intelligent server's 'artificial neural network' is used, etc.
Chapter completed!
Prev Index    Favorite Next