Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> Become a leader through repeated training

Volume 1: Bathed in Fire Chapter 408: The Army¡¯s Revenge

Previous page        Return to Catalog        Next page

    Chapter 408 The Army¡¯s Revenge

    When the signal began to be blocked at the battle scene, the helicopter finally discovered the strong signal source, but this signal source was fixed, and it looked like it was set up at high altitude.  The helicopter pilots mobilized unmanned reconnaissance aircraft several times to conduct reconnaissance, but the downy feathers on the owl's body prevented them from receiving radar reflections.

    For no reason, an invisible and intangible signal source appeared in the local area. Direct contact with the mercenaries was interrupted. The pilots felt something was abnormal, but they did not evacuate immediately. After the signal source disappeared, they made contact for the first time.  After receiving no response from the local mercenaries, these people didn't even make a second contact and took off directly into the air to escape

    The three helicopters flew for three hours in the dark night. It was not until they left the land and landed on the sea that they confirmed their safety and then sent out the news that the mercenaries were missing. However, these pilots did not know that  When they were intensively searching for people on the ground, due to frequent transmission and reception of signals, their computer system had been invaded by Computer Kitten, and now their every move was in the hands of Computer Kitten.

    It wasn't until the computer kitten passed the pilot's message to An Feng that An Feng breathed a sigh of relief and hurriedly called Susanna back to the hiding cave: "The real battle is coming. Let's go back and take a nap to conserve our strength.  Get ready for the fight."

    Susanna raised her eyebrows. She wanted to ask, "How did you know?" But on second thought, she said nothing and followed An Feng back to the hidden soldier cave.

    The superior department that contacted the helicopter pilot was very cunning. They did not talk much with the helicopter pilot and strictly limited the time to three seconds each time. This made it impossible for the computer kitten to follow this communication link and sneak into the other party's computer.  , after the pilot reported the situation, the other party immediately cut off contact.  The pilots who flew the plane were also accustomed to this. They did not hover much on the sea and flew directly to the southwest.

    An hour later, the computer kitten gently woke up An Feng. It quietly communicated with An Feng through the ear canal headset, and the image it obtained was directly projected onto An Feng's retina.

    "Those three helicopters flew directly into the Irish Air Force Base, but they seemed to be a special case of the Air Force Base. After the aircraft was parked, no one was allowed to approach the site. Several men in black directly sent the aircraft into the hangar, and the three pilots  After the pilot left the plane, he entered the rest room attached to the hangar and was never seen again.

    I couldn't find the person who contacted the pilot. They only had five conversations. The caller used compressed pulses to compress the three-minute conversation into three seconds. I couldn't rely on these three seconds.  To find the location of the other party, it is now certain that the commander should be in Northern Europe. The specific location should be near the coast of Norway, covering about 10UU square kilometers of ocean and land including the Norwegian land.  "

    Although the unimaginative computer kitten has the ability of careful logical reasoning, it does not know what it means. An Feng immediately understood, and he immediately replied: "They are on a ship, and this ship may  It may be a submarine, or it may be a large surface cruise ship, or it may be a warship. You follow this idea and find all the ships with frequent radio signals on the North Sea. Monitor them all immediately. You have this  ability."

    When An Feng opened his mouth to say the first sentence, Susanna had already woken up. At this time, An Feng's image was very strange. He had his eyes closed, as if talking to himself in his sleep, but he clearly had something to say and his logic was clear.  .

    Susanna waited for An Feng to finish, then she asked quietly: "What's going on?"

    An Feng answered calmly: "My logistics staff discovered the location of the helicopter, and they monitored the helicopter pilot's conversation"

    "It should be on a submarine," Susanna replied affirmatively. "There is such a fragment in my memory. I seem to have lived on a submarine for a period of time Yes, it is a submarine. Intelligence personnel cannot appear silently somewhere.  "For countries, using submarines to drop intelligence personnel is the most covert method, and it can avoid detection by space satellites."

    An Feng quickly added: "The submarine is sinking in the sea and remains completely dormant. There should be a signal relay ship on the ground. This ship should not be far from the submarine."

    Susanna tilted her head and looked at An Feng. An Feng hurriedly explained: "The submarine wants to avoid leaking any radio signals. He can only use two methods, but the two methods are actually the same type, both of which are to let the surface vessel tow a radio signal."  cable, and then use this cable for closed-circuit transmission.

    Submarine cables are erected kilometers long at a time. If a surface vessel tows a submarine cable under the ship, the submarine should be within 25 kilometers of the surface vessel.

    Another communication method is transoceanic communication. The surface ship hovers near the submarine cable repair port and connects to the repair port through the cable towed from the bottom of the ship. The submarine may be anywhere in the world and also connects to the submarine cable repair port on the seabed.  , transmitted in a closed-circuit manner.? number.

    If the surface ship is not directly connected to the submarine, then you can know by checking where the surface ship is parked. If there happens to be a submarine cable passing within nautical miles near the ship, then we can determine that the submarine is not near the surface ship. Otherwise,  The surface vessel must be towing a cable directly connected to the submarine, and the submarine is near the surface vessel.  "

    Susanna shook her head: "I don't understand such professional words. Just say it directly. What does it mean?"

    "There is only one submarine cable in the entire North Sea near Norway. It was built during the Cold War and is a military command hotline from the United Kingdom to the Danish front line. As long as we check if there are any suspicious ships near this line, we can determine whether there are any suspicious ships nearby.  There are submarines.¡±

    As he spoke, An Feng drew a picture in the void with his finger. It was a map projected into his mind by a computer kitten. This map only covered a little bit of the passage routes of submarine cables. This little intersection area was very close.  In mainland Norway, according to the prevailing rules, intelligence agencies will not drive submarines to such a near-shore area.

    "So, the submarine must be nearby, so, kitten, give up all the land and search the ocean area."

    Fully digital search makes it difficult to hide traces. It only took a few minutes for the computer kitten to immediately find three suspicious ships on the sea. One of the three suspicious ships was a private scientific research vessel and the other was a government ship of a certain country.  weather ship, and the third ship is said to be a destroyer on cruise missions.

    These three ships all have strong communication capabilities. When Computer Kitten noticed them, the scientific research ship was sailing away from the suspected area and continued to advance towards the North Pole. The other two ships stayed in place and continued to sway slowly.

    At this time, the mercenary¡¯s frontline command center had discovered an abnormality. They continued to call the mercenaries at the front, but did not receive a single answer. They checked the images from the high-altitude reconnaissance aircraft and found nothing abnormal, but everyone knew that something happened on the frontline.

    The mercenary world also has its own rules. These rules are similar to online games. Each mercenary team has its own level and needs to continuously accumulate experience to climb up the level.  As for what kind of difficult tasks the employer has, he only needs to check the mercenary level to know which team he should hire.

    Unlike the world of online games, the level of mercenaries does not only indicate the difficulty of their ability to perform tasks, because sometimes the so-called difficulty of a task is not the intensity of the battle or the level of danger of the task in the usual sense.  For example, serving as a security guard in US military bases across Asia is the most difficult level task, but it is not difficult to survive, but the mercenary team must be large enough.

    The level of the mercenary team on this mission on the ground is not high, but it is recognized in the industry as a mercenary organization that is good at performing difficult tasks. They have carried out countless operations to break into other countries to rescue hostages. It is said that they have selected generals from them in Ten Thousand Armies.  The head is like searching a bag to retrieve something.

    This time, this mercenary team accepted a commission to capture Susanna. The commission required them to send out the best team. They followed the instructions and selected the team best at handling complex situations.

    It is such a team, with a total of 13 people including logistics support personnel, and they are fully digital soldiers. There are unmanned reconnaissance aircraft hovering in the sky, satellites in space assist, and front-line command and dispatch personnel account for about one-third of the personnel.  With this kind of structure and human resources, I have to say that they are very strong.

    But they disappeared without a trace?  How can this be?

    They actually didn¡¯t even make a counterattack, and even the most advanced electronic equipment didn¡¯t detect any trace of the enemy. This is something that cannot be accomplished by humans.

    The four digital engineers in the dispatch center were no longer on duty. They even gave up their vigilance. They all sat in front of the computer and searched for the images captured by the soldiers' individual glasses Of course, in this case, facing such a powerful  Even if the enemy and four engineers placed sentries outside the tent, it would have no effect.

    ¡°There are a total of five individual glasses that were extinguished in the first batch. It is impossible for our opponents to have five people and launch attacks from five different aspects at the same time.

    If the opponent sets a time bomb in advance, causing five individual glasses to be damaged at the same time, the explosion will produce a fire. The drone will detect the fire and even the electromagnetic waves released by the explosion, but there is nothing on the screen now.  .  "A dispatch officer whispered to himself.

    Another dispatch officer next to him quickly added: "There were only two units in the second batch of extinguished units, which were very close to the third and final wave of extinguished units. The drone still did not detect the explosion.  The fire and electromagnetic waves generated indicate that all the individual glasses were probably destroyed by physical means, but the first batch of five individual glasses were extinguished at the same time, which is difficult to explain. It is impossible for five people to attack him at the same time. "

    Four digital engineers repeatedly watched the final scene of the individual soldier's glasses going out. Minutes before they went out, the glasses recorded the swaying of tree branches and even the ground.There were ants and insects crawling on the surface, and the infrared rays of a few rabbits were also photographed, but that was all. No infrared spots larger than rabbits were found in all the images.

    At this time, the computer kitten was trying to use hacking techniques to sneak into the computer engineer's computer network. However, because it was facing computer experts, the computer kitten moved very slowly for fear of alerting the four people.

    Finally, one of the digital engineers made up his mind. He grabbed the pistol from the desk, loaded it, and then called to his companions: "Transmit the data, end everything here quickly, let us leave, God bless us,  Hopefully we can get out alive."

    The other three engineers nodded slightly. They each took out their own pistols, loaded the bullets, and then began to deal with the computer equipment in the tent. One of the engineers set up an automatic forwarding program on the computer. He looked at the progress bar.  progress, roughly estimated the time, and casually placed several special time bombs.

    Originally, it was a standard intelligence mode to transfer data to H drive and take it away.  But several engineers here were worried that they would not be able to escape, so they would rather abandon the computer and take the risk of leaking the secrets of the hard disk to transmit it instantly.

    Later, the engineer who was the first to decide to give up began to shake hands with his companions one by one. He said calmly: "Let's break out separately. I hope one of us can escape. We still have two hours at most. After two hours, even if our  The target is not coming to us. After yesterday¡¯s hard work, the local army is about to arrive.¡±

    The four engineers all knew the seriousness of the matter. They hugged each other for the last time, and then ran into the jungle in four directions without looking back.  As soon as the four people left, An Feng and Susanna arrived behind. Susanna reached out to grab the computer on the table, but An Feng hurriedly stopped her: "Shh, this is a mercury bomb. It will explode automatically if there is any vibration. Forget it, don't worry about it."  Those computers, these people are sophisticated and will not leave anything too valuable.

    "Take all the supplies they brought. This is still of some value. Let's go to the mine immediately."  "

    Time was running out. Susanna picked up a large airborne bag, turned around and ran towards the entrance of the mine. After walking out in three or five strides, Susanna's steps were messy because she heard something strange behind her and glanced behind her.  They found An Feng carrying an airborne bag and chased him, but where were the other airborne bags?

    This mercenary team carried five airborne bags. They were preparing to conduct a week-long search in this mountainous area, so the supplies were very sufficient.  The engineers opened an airborne bag, set up a tent, and used some electronic equipment. Then there should be at least four airborne bags left on site. One airborne bag contained at least enough equipment to last the entire mercenary team for two days.  supplies.

    But, except for the airborne bags carried by Susanna and An Feng, the ground is empty now.

    This is not weird. The weird thing is that Susanna clearly heard the sound of throwing things several times, but now there is nothing around. The things An Feng threw seemed to be thrown into the void. There was no sound of things rolling around, and it was completely invisible.  There is nothing new on the ground.

    " However, people in this field are not problem-savvy. They know what to ask and what not to say.  Time was running out at the moment, and there were still kilometers to go, so Susanna suddenly thought about it, said nothing, and walked forward with her airborne bag on her back.

    After traveling for about a kilometer, An Feng passed Susanna and became the leader. When the two sides passed each other, An Feng urged Susanna: "Hurry up, hurry up. Don't delay."

    The army is a violent organization with strong vengeance. The local army suffered some losses in this mountainous area yesterday. It is impossible for them to swallow this breath without saying a word.  However, the local army was slow to respond. After the withdrawn team returned to the camp, they had to report to the higher levels. After the superior department made the final decision, the time should be this time. Immediately, the army's retaliatory action came.

    An Feng had forgotten this before, but the four digital engineers did not forget to monitor the movements of the local army at all times. Since they said there were two hours left before leaving, the army would definitely use the last resort after two hours.

    Never underestimate the violent methods of the military. Once the military shows its power, personal strength cannot withstand the sea of ????hell.

    Two hours were enough for An Feng and Suzanne to run through the kilometer of mountain road. When they arrived at the entrance of the mine, An Feng hurriedly restructured the mine's power supply line and installed the nuclear battery deep in the mine to prevent damage, which delayed the two of them.  It took a few minutes, but as soon as they entered the hiding place, they felt waves on the ground around them.

    A moment later, the army's retaliation came. They first announced that they would conduct a bombing exercise in the nearby mountainous area, but three minutes after the announcement, three bombers and two helicopter squadrons carried out indiscriminate bombing of the area where the fighting took place.  The four digital engineers failed to escape the flames and were all killed in the bombing.

    Fortunately, the military still has some ideas about this abandoned copper mine, and their bombing firepower is smallCarefully avoiding the ravine where the mine was located, after the one-hour bombing, about RU0 soldiers from a reinforced battalion entered the abandoned mining area and conducted a blanket search of the place. Of course, they found no trace of humans.

    At the same time, exercise observers entered the bombing area on multiple helicopters. They claimed to be observing the bombing effect and assessing the air force's firepower, but in fact they were looking for the bodies of those killed in the bombing.

    After some searching, they found the remains of several mercenaries in the jungle, found the bodies of some dead soldiers, and also found a complete body of a digital engineer This harvest greatly exceeded the exercise commander's prediction.

    "Obviously the army was looking for two lone killers, a man and a woman, but they found the remains of four strange soldiers and a complete body that was obviously that of an office clerk.

    Of course, the gun carried on the body of the office clerk showed that this gentle man was not just like a drop of pure water, but this is all for later. Because of these corpses, the military was in a panic  .  The panic did not last long. That night, a national security officer drove four military vehicles into the military camp with a warrant from the Ministry of National Defense. He directly took away the remains of five corpses and the severed limbs collected at the scene, and then issued an order.  Got a gag order

    The security officer led the convoy transporting the corpses back into the mountainous area. He returned to the mine. Half an hour before he arrived, the top military officials who were ordered not to discuss the matter had issued a withdrawal order, and the entire mining area became deserted.  But all the doors were open.

    The convoy entered the abandoned smelting plant of the copper mine through the open door. The national security officer jumped out of the car. He strolled in front of the car and lit a cigarette for himself. He looked up and saw that 40 people suddenly appeared in the empty smelting plant.  There are other masked men in black.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report